diff --git "a/results_retrieval/emb_potion_r32M/retrieval_default_openparsecpu.json" "b/results_retrieval/emb_potion_r32M/retrieval_default_openparsecpu.json" --- "a/results_retrieval/emb_potion_r32M/retrieval_default_openparsecpu.json" +++ "b/results_retrieval/emb_potion_r32M/retrieval_default_openparsecpu.json" @@ -1,9 +1,9 @@ [ { "top_k": 10, - "mrr": 0.13569708994708993, - "recall": 0.5366666666666666, - "count_empty_strings": 305 + "mrr": 0.0, + "recall": 0.0, + "count_empty_strings": 8304 }, [ { @@ -19,64 +19,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 374, + "page_end": 374, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 383, + "page_end": 383, + "source_file": "00-80T-80.pdf" }, { - "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThe Regulations amend the International Tax Compliance Regulations 2015 (“the principal \nRegulations”) which give effect to agreements and arrangements reached between the United \nKingdom and other jurisdictions to improve international tax compliance. \n\nRegulation 2(2) extends the application of the principal Regulations to arrangements entered into \nby the United Kingdom for the exchange of financial account information with other jurisdictions \nup to 19th April 2020, the date before the Regulations are made. \n\nRegulation 2(5) omits various accounts from the category of excluded accounts. Regulation \n2(4)(b) amends the definitions of “new account” and “pre-existing account” in relation to those ", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20200438_en.pdf" + "text": "", + "page_start": 382, + "page_end": 382, + "source_file": "00-80T-80.pdf" }, { - "text": "accounts so that these terms are defined by reference to the date that those accounts ceased to be \nexcluded accounts. Regulation 2(3) and (4)(a) make consequential amendments. \n\nRegulation 3 makes a transitional provision for the calendar year 2020 in relation to accounts \nwhich were previously excluded accounts. \n\nA Tax Information and Impact Note covering the International Tax Compliance Regulations 2015 \nwas published on 18th March 2015 and \nthe HMRC website at \nhttps://www.gov.uk/government/publications/tax-administration-regulations-to-implement-the- \nuks-automatic-exchange-of-information-agreements. It remains an accurate summary of the \nimpacts that apply to this instrument. \n\nis available on ", - "page_start": 3, - "page_end": 3, - "source_file": "uksi_20200438_en.pdf" + "text": "", + "page_start": 382, + "page_end": 382, + "source_file": "00-80T-80.pdf" }, { - "text": "At December 31, 2004, we had $93 million of deferred tax assets and $1.9 billion \nof deferred tax liabilities. Except for certain New Jersey state net operating losses \nand certain other New Jersey state deferred tax assets, we believe that it is more \nlikely than not that our deferred tax assets are fully realizable because of the future \nreversal of existing taxable temporary differences and future projected taxable \nincome. The valuation allowance at December 31, 2004 related to the New Jersey \ndeferred tax assets was $6 million. \n\nOur income tax returns are subject to examination by the Internal Revenue Service \n(“IRS”) and other tax authorities. While positions taken in tax returns are some- \ntimes subject to uncertainty in the tax laws, we do not take such positions unless we \nhave “substantial authority” to do so under the Internal Revenue Code and applicable \nregulations. We may take positions on our tax returns based on substantial authority \nthat are not ultimately accepted by the IRS. \n\nWe assess such potential unfavorable outcomes based on the criteria of Statement of \nFinancial Accounting Standards No. 5, “Accounting for Contingencies” (“SFAS 5”). \nWe establish a tax reserve if an unfavorable outcome is probable and the amount of \nthe unfavorable outcome can be reasonably estimated. We assess the potential out- \ncomes of tax uncertainties on a quarterly basis. In determining whether the proba- \nble criterion of SFAS 5 is met, we presume that the taxing authority will focus on \nthe exposure and we assess the probable outcome of a particular issue based upon \nthe relevant legal and technical merits. We also apply our judgment regarding the \npotential actions by the tax authorities and resolution through the settlement process. ", - "page_start": 45, - "page_end": 45, - "source_file": "NYSE_MGM_2004.pdf" + "text": "", + "page_start": 382, + "page_end": 382, + "source_file": "00-80T-80.pdf" }, { - "text": "Current tax is the expected tax payable or \nreceivable on the taxable income or loss for the \nyear, using tax rates enacted or substantively \nenacted at the reporting date, and any adjust- \nment to tax payable in respect of previous years. \nDeferred tax is provided using the liability \nmethod, providing for temporary differences \nbetween the carrying amounts of assets and \nliabilities for financial reporting purposes and \nthe amounts used for taxation purposes. The \namount of deferred tax provided is based on the \nexpected manner of realisation or settlement of \nthe carrying amount of assets and liabilities, \nusing tax rates enacted or substantively enacted \nat the reporting date. \n\nExchange gains and losses which arise on \nbalances between Group entities are taken to \nthe foreign currency translation reserve where \nthe intra-group balances are in substance part of \nthe Group’s net investment. Where as a result of \na change in circumstances, a previously desig- \nnated intra-group balance is intended to be \nsettled in the foreseeable future, the intra-group \nbalance is no longer regarded as part of net \ninvestment. The exchange differences for such \nbalance previously taken directly to the foreign \ncurrency translation reserves are recognised in \nthe profit or loss. \n\nCurrent tax assets or liabilities and deferred tax \nassets arising from unused tax losses assumed \nby the head entity from the subsidiaries in the \ntax-consolidation group, are recognised as \namounts receivable or payable to other entities \nin the tax-consolidation group in conjunction \nwith any tax funding agreement amounts. ", - "page_start": 70, - "page_end": 70, - "source_file": "ASX_KCN_2013.pdf" + "text": "", + "page_start": 382, + "page_end": 382, + "source_file": "00-80T-80.pdf" }, { - "text": "Note 9 – Income Taxes \n\nOur effective tax rate was 22% and 23% for the three and nine months ended September 30, 2024, respectively, \ncompared to 8% and 10% for the three and nine months ended September 30, 2023, respectively. The increase in our effective \ntax rate is primarily due to the impact of releasing the valuation allowance on our U.S. deferred tax assets in the fourth quarter \nof 2023 and changes in the mix of our jurisdictional earnings. \n\nOur effective tax rates for the three and nine months of 2024 and 2023 as compared to the U.S. federal statutory rate of \n\n21% were primarily impacted by the mix of our jurisdictional earnings subject to different tax rates, valuation allowances on \nour deferred tax assets and benefits from our U.S. tax credits and the Inflation Reduction Act of 2022 (“IRA”) manufacturing \ncredits. \n\nWe are subject to tax examinations in the U.S. federal, state and foreign jurisdictions. Given the uncertainty in timing \n\nand outcome of our tax examinations, an estimate of the range of the reasonably possible change in gross unrecognized tax \nbenefits within twelve months cannot be made at this time. \n\nNote 10 – Commitments and Contingencies ", - "page_start": 26, - "page_end": 26, - "source_file": "tesla_form_10q.pdf" + "text": "", + "page_start": 382, + "page_end": 382, + "source_file": "00-80T-80.pdf" }, { - "text": "The head entity of the income tax consolidated group and the controlled entities in the tax consolidated group \naccount for their own current and deferred tax amounts. These tax amounts are measured as if each entity in the \ntax consolidated group continues to be a standalone taxpayer in its own right. \n\nIn addition to its own current and deferred tax amounts, Sundance Energy Australia Limited, as head company, also \nrecognises the current tax liabilities (or assets) and the deferred tax assets arising from unused tax losses and unused \ntax credits assumed from controlled entities in the tax consolidated group. ", - "page_start": 62, - "page_end": 62, - "source_file": "ASX_SEA_2014.pdf" + "text": "", + "page_start": 315, + "page_end": 315, + "source_file": "sg246915.pdf" }, { - "text": "(**a**) S.I. 2010/659; regulation 4 was amended by S.I. 2013/235, 2020/1175, 2020/764, 2021/150 and regulation 4A was inserted \nby S.I. 2020/1175. ", - "page_start": 73, - "page_end": 73, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 315, + "page_end": 315, + "source_file": "sg246915.pdf" }, { - "text": "**(u) Income tax**\n\nTax effect accounting is applied whereby \nthe income tax charged in the statements \nof financial performance is matched with \nthe accounting profit after allowing for \npermanent differences. Income tax on \ntiming differences, which arise from items \nbeing brought to account in different \nperiods for income tax and accounting \npurposes, is carried forward in the \nstatements of financial position as a \ndeferred tax asset or deferred tax liability. \nFuture income tax benefits relating to \nentities which incur losses are brought to \naccount where realisation of the benefits \nis considered to be virtually certain. \n\nSantos Ltd is the head entity in the \ntax-consolidated group comprising all \nthe Australian resident wholly-owned \ncontrolled entities set out in note 22. \nThe implementation date for the \ntax-consolidated group was \n1 January 2003. \n\nLong service leave is provided in respect \nof all employees, based on the present \nvalue of the estimated future cash outflow \nto be made resulting from employees’ \nservices up to balance date. The provision \nis calculated using expected future \nincreases in wage and salary rates \nincluding related on-costs and expected \nsettlement dates, and is discounted using \nthe rates attached to the Commonwealth \nGovernment bonds at balance date which \nmost closely match the terms of maturity \nof the related liabilities. \n\nThe head entity recognises all of the \ncurrent and deferred tax assets and \nliabilities of the tax-consolidated group. ", - "page_start": 57, - "page_end": 57, - "source_file": "ASX_STO_2004.pdf" + "text": "", + "page_start": 382, + "page_end": 382, + "source_file": "00-80T-80.pdf" } ] }, @@ -93,64 +93,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 342, + "page_end": 342, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 417, + "page_end": 417, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\nPENSION ", - "page_start": 22, - "page_end": 22, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 417, + "page_end": 417, + "source_file": "00-80T-80.pdf" }, { - "text": "NOTE 22: PENSIONS \n\nWe have contributory and non-contributory defined benefit pension \nplans that are made available to most of our employees. The plans \nprovide pensions based on years of service, years of contributions and \nearnings. We do not provide any non-pension post-retirement benefits. \nWe also provide unfunded supplemental pension benefits to certain \nexecutives. \n\nDeficiency of plan assets over accrued benefit obligations \nEffect of asset ceiling limit \n\nThe assets of the defined benefit pension plans are held in segregated \naccounts isolated from our assets. We administer the defined benefit \npension plans pursuant to applicable regulations, the Statement of \nInvestment Policies and Procedures and to the mandate of the Pension \nCommittee of the Board of Directors. The Pension Committee of the \nBoard of Directors oversees our administration of the defined benefits \npension plans, which includes the following principal areas: \n(cid:129) overseeing the \n\nNet deferred pension liability **$ (181)**$ (334) \n\nConsists of: \n\nDeferred pension asset \nDeferred pension liability \n**$**\n**8**\n**(189)**\n$ \n9 \n(343) \n\nNet deferred pension liability **$ (181)**$ (334) \nfunding, administration, ", - "page_start": 122, - "page_end": 122, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 417, + "page_end": 417, + "source_file": "00-80T-80.pdf" }, { - "text": "(2) The law to be applied with respect to any pensions benefits (not being \n\nbenefits to which subsection (1) of this section applies) shall- \n\n(a) \n\nin so far as those benefits are wholly in respect of a period of service as a \npublic officer that commenced before the date on which this Constitution comes \ninto operation, be the law that was in force immediately before that date; and \nin so far as those benefits are wholly or partly in respect of a period of service \nas a public officer that commenced after the date on which this Constitution \ncomes into operation, be the law in force on the date on which that period of \nservice commenced, \n\n(b) \n\nor any law in force at a later date that is not less favourable to that person. \n\n(3) Where a person is entitled to exercise an option as to which of two or more \n\nlaws shall apply in his or her case, the law for which he or she opts shall, for the \npurposes of this section, be deemed to be more favourable to him or her than the other \nlaw or laws. \n\n(4) All pensions benefits shall (except to the extent to which under any law \nproviding for the funding of pensions benefits they are a charge on a fund established by \nthat law and have been duly paid out of that fund to the person or authority to whom \npayment is due) be a charge on the Consolidated Fund. \n\n(5) In this section \"pensions benefits\" means any pensions, compensation, \ngratuities or other like allowances for persons in respect of their service as public officers \nor as members of the armed forces or for the widows, children, dependants or personal \nrepresentatives of such persons in respect of such service. \n\n(6) References in this section to the law with respect to pensions benefits include \n(without prejudice to their generality) references to the law regulating the circumstances \nin which such benefits may be granted or in which the grant of such benefits may be \nrefused, the law regulating the circumstances in which any such benefits that have been \ngranted may be withheld, reduced in amount or suspended and the law regulating the \namount of any such benefits. \n\n(7) In this section references to service as a public officer include references to \n\nservice as a public officer of the former Protectorate of Bechuanaland. ", - "page_start": 50, - "page_end": 50, - "source_file": "Botswana-constitution.pdf" + "text": "", + "page_start": 417, + "page_end": 417, + "source_file": "00-80T-80.pdf" }, { - "text": "Securities registered pursuant to Section 12(g) of the Act: \n**Common Stock, par value $10.00 per share**\n\nIndicate by check mark whether the registrant: (1) has filed all reports required to be filed by Section 13 or \n15(d) of the Securities Exchange Act of 1934 during the preceding 12 months (or for such shorter period that the \nregistrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days. \nYes No \n\nIndicate by check mark if disclosure of delinquent filers pursuant to Item 405 of Regulation S-K is not \ncontained herein, and will not be contained, to the best of registrant’s knowledge, in definitive proxy or information \nstatements incorporated by reference in Part III of this Form 10-K or any amendment to this Form 10-K. \n\nIndicate by check mark whether the registrant is an accelerated filer (as defined in Exchange Act Rule 12b-2). \nYes No \n\nAs of June 30, 2002, the last business day of the registrant’s most recently completed second fiscal quarter, the \naggregate market value of voting stock held by non-affiliates was $458,357,747. ", - "page_start": 27, - "page_end": 27, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 417, + "page_end": 417, + "source_file": "00-80T-80.pdf" }, { - "text": "Indicate by check mark whether the registrant: (1) has Ñled all reports required to be Ñled by Section 13 \nor 15(d) of the Securities Exchange Act of 1934 during the preceding 12 months (or for such shorter period \nthat the registrant was required to Ñle such reports), and (2) has been subject to such Ñling requirements for \nthe past 90 days. Yes ≤ No n \n\nIndicate by check mark if disclosure of delinquent Ñlers pursuant to Item 405 of Regulation S-K is not \ncontained herein, and will not be contained, to the best of registrant's knowledge, in deÑnitive proxy or \ninformation statements incorporated by reference in Part III of this Form 10-K or any amendment to this \nForm 10-K. ≤ \n\nIndicate by check mark whether the registrant is an accelerated Ñler (as deÑned in Rule 12b-2 of the \n\nAct). Yes ≤ No n \n\nAs of June 30, 2004, the aggregate market value of the shares of the Common Stock held by non- \naÇliates of the registrant was approximately $4,395,636,476. ", - "page_start": 7, - "page_end": 7, - "source_file": "NYSE_RSG_2004.pdf" + "text": "", + "page_start": 417, + "page_end": 417, + "source_file": "00-80T-80.pdf" }, { - "text": "Tenure of office of Director of Public Prosecutions \nTenure of office of Auditor-General \nPensions laws and protection of pensions rights \nPower of Commissions in relation to pensions, etc. \n\nCHAPTER VIII \nFinance \n\nConsolidated Fund \nWithdrawals from Consolidated Fund or other public funds \nAuthorization of expenditure \nAuthorization of expenditure in advance of appropriation \nContingencies Fund \nRemuneration of certain officers \nPublic debt \nAuditor-General \n\nCHAPTER IX \nMiscellaneous \n\nResignations \nReappointments and concurrent appointments \nInterpretation \n\nFirst Schedule - Election of Specially Elected Members of the National \nAssembly \nSecond Schedule - Division of Districts into regions for the purpose of \nselecting Members of Ntlo ya Dikgosi \n\nL.N. 83, 1966, \nAct 30, 1969, \nAct 43, 1969, \nAct 25, 1970, \nAct 28, 1972, \nAct 24, 1973, \nAct 28, 1978, \nS.I. 25, 1980, \nAct 32, 1982, \nAct 1, 1983, \nAct 22, 1987, \nS.I. 37, 1991, \nAct 27, 1992, \nS.I. 51, 1993, \nS.I. 119, 1993, \nAct 16, 1997, \nAct 18, 1997, \nAct 1, 1999, \nAct 2, 2002, \nAct 12, 2002, \nAct 9, 2005, \nS.I. 91, 2006. ", - "page_start": 4, - "page_end": 4, - "source_file": "Botswana-constitution.pdf" + "text": "", + "page_start": 417, + "page_end": 417, + "source_file": "00-80T-80.pdf" }, { - "text": "Parliament may make provision under which, if the Appropriation Act in respect \nof any financial year has not come into operation by the beginning of that financial year, \nthe President may authorize the withdrawal of moneys from the Consolidated Fund for \nthe purpose of meeting expenditure necessary to carry on the services of the \nGovernment until the expiration of four months from the beginning of that financial year \nor the coming into operation of the Appropriation Act, whichever is the earlier. \n**121. Contingencies Fund**\n\n(1) Parliament may make provision for the establishment of a Contingencies \n\nFund and for authorizing the President, if satisfied that there has arisen an urgent and \nunforeseen need for expenditure for which no other provision exists, to make advances \nfrom that Fund to meet that need. \n\n(2) Where any advance is made from the Contingencies Fund, a supplementary \nestimate shall be laid before the National Assembly as soon as possible for the purpose \nof replacing the amount so advanced. \n\n(1) There shall be charged on the Consolidated Fund all debt charges for which \n\nBotswana is liable. \n\n(2) For the purposes of this section debt charges include interest, sinking fund \ncharges, the repayment or amortization of debt, and all expenditure in connection with \nthe raising of loans on the security of the revenues or the Consolidated Fund of the \nformer Protectorate of Bechuanaland or Botswana, and the service and redemption of \ndebt thereby created. \n**124. Auditor-General**\n\n(1) There shall be an Auditor-General, whose office shall be a public office. \n(2) The public accounts of Botswana and of all officers, courts and authorities of \n\nthe Government of Botswana shall be audited and reported on by the Auditor-General \nand for that purpose the Auditor-General or any person authorized by him or her in that \nbehalf shall have access to all books, records, reports and other documents relating to \nthose accounts: \n\nProvided that, if it is so provided by Parliament in the case of any body corporate \n\ndirectly established by law, the accounts of that body corporate shall be audited and \nreported on by such person as may be specified by or under that law. \n\n(3) The Auditor-General shall submit his or her reports to the Minister responsible ", - "page_start": 52, - "page_end": 52, - "source_file": "Botswana-constitution.pdf" + "text": "", + "page_start": 417, + "page_end": 417, + "source_file": "00-80T-80.pdf" }, { - "text": "(a) \n\nin the case of benefits for which any person may be eligible in respect of the \nservice in the public service of a person who, immediately before he or she \nceased to be a public officer, was subject to the disciplinary control of the \nJudicial Service Commission or that have been granted in respect of such \nservice, the Judicial Service Commission; \nin any other case, the Public Service Commission. (b) \n\n(5) In this section \"pensions benefits\" means any pensions, compensation, \ngratuities or other like allowances for persons in respect of their service as public officers \n(including service as public officers of the former Protectorate of Bechuanaland) or for \nthe widows, children, dependants or personal representatives of such persons in respect \nof such service. \n\n**CHAPTER VIII**\n**Finance (ss 117-124)**\n\n**117. Consolidated Fund**\n\nAll revenues or other moneys raised or received for the purposes of the \nGovernment of Botswana (not being revenues or other moneys that are payable by or \nunder any law into some other fund established for a specific purpose or that may by or \nunder any law be retained by the department of Government that received them for the \npurposes of defraying the expenses of that department) shall be paid into and form one \nConsolidated Fund. \n**118. Withdrawals from Consolidated Fund or other public funds**", - "page_start": 51, - "page_end": 51, - "source_file": "Botswana-constitution.pdf" + "text": "", + "page_start": 416, + "page_end": 416, + "source_file": "00-80T-80.pdf" } ] }, @@ -161,70 +161,70 @@ "target_page": 1, "target_passage": "the bind- ing energy and scattering resistance of the molecules", "chunk_present": { - "presence": true, - "index": 4 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 24, + "page_end": 24, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes \n\nJ. M. Garc´ıa-Lastra1,2,∗ D. J. Mowbray1,2, K. S. Thygesen2, A. Rubio1,3, and K. W. Jacobsen2 \n1Nano-Bio Spectroscopy group and ETSF Scientific Development Centre, \nDpto. F´ısica de Materiales, Universidad del Pa´ıs Vasco, \nCentro de F´ısica de Materiales CSIC-UPV/EHU- MPC and DIPC, Av. Tolosa 72, E-20018 San Sebasti´an, Spain \n2Center for Atomic-scale Materials Design, Department of Physics, \nTechnical University of Denmark, DK-2800 Kgs. Lyngby, Denmark \n3Fritz-Haber-Institut der Max-Planck-Gesellschaft, Berlin, Germany \n\nWe use computational screening to systematically investigate the use of transition metal doped carbon nan- \notubes for chemical gas sensing. For a set of relevant target molecules (CO, NH3, H2S) and the main components \nof air (N2, O2, H2O), we calculate the binding energy and change in conductance upon adsorption on a metal \natom occupying a vacancy of a (6,6) carbon nanotube. Based on these descriptors, we identify the most promis- \ning dopant candidates for detection of a given target molecule. From the fractional coverage of the metal sites \nin thermal equilibrium with air, we estimate the change in the nanotube resistance per doping site as a function \nof the target molecule concentration assuming charge transport in the diffusive regime. Our analysis points to \nNi-doped nanotubes as candidates for CO sensors working under typical atmospheric conditions. ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2538.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "0 \n1 \n0 \n2 \nPACS numbers: 73.63.–b, 68.43.–h, 73.50.Lw \n\nn \na \nJ \n\nThe ability to detect small concentrations of specific chem- \nical species is fundamental for a variety of industrial and sci- \nentific processes as well as for medical applications and en- \nvironmental monitoring [1]. In general, nanostructured mate- \nrials should be well suited for sensor applications because of \ntheir large surface to volume ratio which makes them sensi- \ntive to molecular adsorption. Specifically, carbon nanotubes \n(CNT) [2] have been shown to work remarkably well as de- \ntectors of small gas molecules. This has been demonstrated \nboth for individual CNTs [3–8] as well as for CNT networks \n[9, 10]. \n\n4 \n1 \n\nWe find that oxidation of the active metal site passivates \nthe sensor in the case of doping by Ti, V, Cr, and Mn un- \nder standard conditions (room temperature and 1 bar of pres- \nsure). Among the remaining metals, we identify Ni as is the \nmost promising candidate for CO detection. For this system \nthe change in resistance per active site is generally significant \n(>1 Ω) for small changes in CO concentration in the relevant \nrange of around 0.1–10 ppm. Our approach is quite general \nand is directly applicable to other nanostructures than CNTs, \nother functionalizations than metal doping, and other back- \ngrounds than atmospheric air. ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2538.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "In this work we consider the possibility of using CNTs \ndoped by 3d transition metal atoms for chemical gas sens- \ning. We use computational screening to systematically iden- \ntify the most promising dopant candidates for detection of \nthree different target molecules (CO, NH3, H2S) under typi- \ncal atmospheric conditions. The screening procedure is based \non the calculation of two microscopic descriptors: the bind- \ning energy and scattering resistance of the molecules when \nadsorbed on a doped CNT. These two quantities give a good \nindication of the gas coverage and impact on the resistance. \nFor the most promising candidates we then employ a simple \nthermodynamic model of the CNT sensor. In this model, the \nbinding energies are used to obtain the fractional coverage of \nthe metallic sites as a function of the target molecule concen- \ntration under ambient conditions. Under the assumption of \ntransport in the diffusive rather than localization regime, the \n\nMetallic doping of a (6,6) CNT has been modeled in a su- \npercell containing six repeated minimal unit cells along the \nCNT axis (dimensions: 15 ˚A×15 ˚A×14.622 ˚A). For this size \nof supercell a Γ-point sampling of the Brillouin zone was \nfound to be sufficient. The formation energy for creating a \nvacancy (VC) occupied by a transition metal atom (M) was \ncalculated using the relation \n\nEform[M@VC] = E[M@VC] + nE[C] − E[M@NT] (1) ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2538.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "[8] S. Brahim, S. Colbern, R. Gump, and L. Grigorian, “Tailoring \nJ. Appl. Phys. \ngas sensing properties of carbon nanotubes”, \n104(2), 024502 (Jul. 2008), doi:10.1063/1.2956395. \n[9] C. Morgan, Z. Alemipour, and M. Baxendale, \n\n“Variable \nrange hopping in oxygen-exposed single-wall carbon nanotube \nnetworks”, Phys. Stat. Solidi A 205(6), 1394 (May 2008), \ndoi:10.1002/pssa.200778113. \n\nTo our knowledge, controlled doping of CNTs with transi- \ntion metal atoms has so far not been achieved. It has, how- \never, been found that metal atoms incorporated into the CNT \nlattice during catalytic growth are afterwards very difficult to \nremove [30]. Furthermore, it has been shown that CNT vacan- \ncies, which are needed for the metallic doping, may be formed \nin a controlled way by irradiation by Ar ions [31]. This sug- \ngests that metallic doping of CNTs should be possible. \n\n[10] D. J. Mowbray, C. Morgan, and K. S. Thygesen, \n\n“In- \nfluence of O2 and N2 on the conductivity of carbon nan- \notube networks”, Phys. Rev. B 79(19), 195431 (May 2009), \ndoi:10.1103/PhysRevB.79.195431. ", - "page_start": 4, - "page_end": 4, - "source_file": "1001.2538.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "where E[M@VC] is the total energy of a transition metal \natom occupying a vacancy in the nanotube, n is the number \nof carbon atoms removed to form the vacancy, E[C] is the en- \nergy per carbon atom in a pristine nanotube, and E[M@NT] ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2538.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "[11] L. Valentini, F. Mercuri, I. Armentano, C. Cantalini, S. Picozzi, \nL. Lozzi, S. Santucci, A. Sgamellotti, and J. M. Kenny, “Role of \ndefects on the gas sensing properties of carbon nanotubes thin \nfilms: experiment and theory”, Chem. Phys. Lett. 387(4-6), 356 \n(Apr. 2004), doi:10.1016/j.cplett.2004.02.038. \n\n[12] Z. Zanolli and J.-C. Charlier, “Defective carbon nanotubes for \nsingle-molecule sensing”, Phys. Rev. B 80(15), 155447 (Oct. \n2009), doi:10.1103/PhysRevB.80.155447. \n\n[13] J. M. Garc´ıa-Lastra, K. S. Thygesen, M. Strange, and \n´Angel Rubio, \n“Conductance of sidewall-functionalized \ncarbon nanotubes: Universal dependence on adsorption \nPhys. Rev. Lett. 101(23), 236806 (Dec. 2008), \nsites”, \ndoi:10.1103/PhysRevLett.101.236806. ", - "page_start": 4, - "page_end": 4, - "source_file": "1001.2538.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "∗ Electronic address: juanmaria.garcia@ehu.es [18] C. S. Yeung, L. V. Liu, and Y. A. Wang, \n\n“Adsorption \nof small gas molecules onto Pt-doped single-walled carbon \nJ. Phys. Chem. C 112(19), 7401 (Apr. 2008), \nnanotubes”, \ndoi:10.1021/jp0753981. \n[1] Gas Sensing Materials, MRS Bull., vol. 24 (1999). \n[2] J. C. Chalier, X. Blase, and S. Roche, “Electronic and transport \nproperties of nanotubes”, Rev. Mod. Phys. 79(2), 677 (May \n2007), doi:10.1103/RevModPhys.79.677. [19] T. Vo, Y.-D. Wu, R. Car, and M. Robert, \n\n“Structures, in- \nteractions, and ferromagnetism of Fe-carbon nanotube sys- \nJ. Phys. Chem. C 112(22), 400 (May 2008), \ntems”, \ndoi:10.1021/jp0761968. ", - "page_start": 4, - "page_end": 4, - "source_file": "1001.2538.pdf" + "text": "", + "page_start": 166, + "page_end": 166, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\nEXHAUST GAS \nTEMPERATURE ", - "page_start": 140, - "page_end": 140, - "source_file": "00-80T-80.pdf" + "text": "", + "page_start": 27, + "page_end": 27, + "source_file": "NYSE_HIG_2001.pdf" } ] }, @@ -235,70 +235,70 @@ "target_page": 3, "target_passage": "At high concentration (about 1 mol l−1), the MSA3 overestimates the free energy", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 27, + "page_end": 27, + "source_file": "ASX_MRM_2000.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 162, + "page_end": 162, + "source_file": "00-80T-80.pdf" }, { - "text": "we have no additional information, we consider only sym- \nmetric dumbbells. Furthermore, since analytic expres- \nsions for the RDF within BIMSA are not known, we ap- \nproximate the dumbbell as a hard sphere when comput- \ning the perturbation term (this is not necessary for the \nreference term, since an expression for the free energy \nis available). Let \nσc be the diameter of the cation (an- \nion) within the dumbbell, the diameter of the hard sphere \ne \nσc[21]. \nrepresenting this dumbbell is taken to be \nthree- \ne \ncomponent MSA3 and BIMSA3, we obtain results in \nmuch better agreement with the MC simulations, as \nshown in Fig. 4. The diameters obtained for species 1, \n2, and 3 are 3.65, 4.79, and 5.76 ˚A for MSA3 and 3.69, \n4.75 and 6.19 ˚A for BIMSA3. The free ion diameters are \nsimilar for MSA2, MSA3, and BIMSA3. The pair diam- \neter is smaller when modeled as a hard sphere (MSA3) \nthan when modeled as a dumbbell (BIMSA3). At high \n1), the MSA3 overestimates \nconcentration (about 1 mol l− \nthe free energy, because the excluded volume repulsion \nbecomes too important for the pairs to be represented as \nhard spheres. The BIMSA3 model is the closest to the \nMC simulation results. It is worth noting that even at \nthe lowest concentration considered, the fraction of pairs \n(shown in the insert of Fig. 4), although less then 5%, \nhas a non-negligible effect on the thermodynamics of the \nsystem. \n\nσ3 = 4√2 \nπ \nthe Using these two reference \nsystems, \ne ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2648.pdf" + "text": "", + "page_start": 318, + "page_end": 318, + "source_file": "00-80T-80.pdf" }, { - "text": "We first used LPT for a two-component system (Na+ \nand Cl− free ions) within the MSA (model MSA2), for \n1. The mini- \nconcentrations ranging from 0.1 to 2.0 mol l− \nmization leads to almost constant diameters on the whole \nrange of concentration: σ1 = 3.67 ˚A and σ2 = 4.78 ˚A. \nAs shown in Fig. 2, these parameters yield osmotic co- \nefficients close to MC calculations only at very low con- \n1 (experimental values are \ncentration, i.e., c ≤ 0.1 mol l− \ngiven for indicative purposes only, since a perfect model \nwill exactly match the MC results). For molar solutions, \nthe LPT results differ considerably from MC calculations. \nThis discrepancy can easily be understood by comparing \nthe diameters found within the MSA2 calculation with \nthe effective potentials given in Fig. 1. The anion/cation \ncontact distance obtained within the MSA2 calculation \nis 4.2 ˚A, which is in the region of the second minimum of \nthe effective potential and corresponds to the situation \nwhere there is a single layer of water molecules between \nthe ions. The first minimum of the potential, which cor- \nresponds to the contact ion pair (CIP) is thus completely \nignored by the MSA2 calculation. If the MSA diameters \nare directly fitted to reproduce the MC osmotic pres- \nsure, much smaller values are obtained. These MSA-fit \nhydrated diameters, which are compared to the MSA2 \ndiameters in the bottom part of Fig. 2, are averages of \nthe CIP and the solvent-separated ion pair. ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2648.pdf" + "text": "", + "page_start": 162, + "page_end": 162, + "source_file": "00-80T-80.pdf" }, { - "text": "1.3 8 \n\n| (a) MC\nMSA2\nDHLL\nExp | |\n|---|---|\n| (a) MC MSA2 DHLL Exp | |\n| (b) σ(MSA-fit) 1 σ(MSA-fit) | |\n| | σ(MSA-fit) 1 σ(MSA-fit) |\n| | 2 σ(MSA2) 1 σ(MSA2) 2 |\n| | |\n\n\n1.2 \n6 MC \ng12 \n(r) \n1.1 \n4 \nΦ MD \ng12 \n(r) \n1 \n2 \n0.9 \n\n5 \n) \nÅ \n4 \n( \nσ \n3 \n\n0 1 0.5 1.5 \n1/2 -1 \n1/2 \n) c (mol.L \n\nFIG. 1: Effective McMillan-Mayer short-range pair potentials \nextracted from explicit solvent simulations using the HNC \nclosure. (a) Cation anion, (b) cation cation, (c) anion anion, \n(d) cation anion RDF obtained from explicit solvent MD and \nimplicit solvent MC simulations. \nFIG. 2: \n(Color online) (a) Osmotic coefficient Φ in the \nMcMillan-Mayer frame of reference. (diamond) MC simula- \ntions, (dot dashed) MSA2, (dot) Debye H¨uckel Limiting law \n(DHLL), (cross) experiments (Ref. [18] with the McMillan- \nMayer to Lewis Randall conversion). (b) Minimization diam- \neters. (dot dashed) MSA2 and (diamond) MSA-fit. ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2648.pdf" + "text": "", + "page_start": 162, + "page_end": 162, + "source_file": "00-80T-80.pdf" }, { - "text": "To conclude, we have combined MD simulations with \nLPT to construct simple models of electrolyte solutions \nwhich account for the molecular nature of the solvent. \nThe final result is fully analytical and it yields the ther- \nmodynamic and structural properties of the solution, in \nagreement with the original molecular description. The \nmethodology can in principle be adapted to any molecu- \nlar description of the system (MD simulations involving \ninteraction potentials accounting for polarization effects \nor Car-Parrinello MD simulations for example) as long \nas the ion-ion RDF are known. It can also be generalized \nto study interfaces. The method appears to be a promis- \ning approach toward the description of the specific effects \nof ions, especially for complex systems whose modeling \nrequires an analytic solution. \n\n8 \n\nFIG. 5: (Color online) RDF obtained from MC simulations \n(diamond), BIMSA3 (solid line), and MSA-fit (dot dashed) \nat two concentrations. \n\nThe RDF obtained within BIMSA3 are compared with \nthe MC and MSA-fit results in Fig. 5. Our BIMSA3 \nmodel accounts for the strong molecular peak of the CIP \nand provides the correct distances of minimal approach; \nwhereas the naive MSA-fit procedure ignores the former \nand gives poor estimates for the latter. At larger sep- \narations, the BIMSA3 results do not reproduce the os- \ncillations observed in the MC simulations, but the cor- \nresponding energy oscillations in the effective potentials \nIn addition, the perturbation term \nare less than kBT . ", - "page_start": 4, - "page_end": 4, - "source_file": "1001.2648.pdf" + "text": "", + "page_start": 162, + "page_end": 162, + "source_file": "00-80T-80.pdf" }, { - "text": "0 0.5 \n1/2 \nc \n\n(Color online) Excess free-energy density βf ex \nv \n\nFIG. 4: \nas \na function of the square root of the concentration √c. (dia- \nmond) MC simulations, (dot dashed) MSA2, (dashed) MSA3, \n(solid) BIMSA3, (dot) DHLL, and (cross) experiments. The \ninset gives the fraction of pairs (MSA3, BIMSA3) as a func- \ntion of √c. ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2648.pdf" + "text": "", + "page_start": 162, + "page_end": 162, + "source_file": "00-80T-80.pdf" }, { - "text": "0 \n1 \n0 \n2 \n\nn \na \nJ \n\n5 \n1 \n\nSince the pioneering works of Debye, H¨uckel, and \nOnsager, electrolyte solutions have been commonly \ndescribed by continuous solvent models, \nfor which \nthe McMillan-Mayer theory [1] provides a rigorous \nstatistical-mechanical foundation. Within that level of \ndescription, simple phenomenological models such as the \nprimitive model (PM), for which the ions are assimi- \nlated to charged hard spheres [2], can lead to explicit \nformulas for the thermodynamic and structural proper- \nties (e.g., with the help of the mean spherical approxima- \ntion (MSA) [3] or the binding MSA (BIMSA) [4]). These \nmodels are the most practical to use [5], since they allow \nfor a direct link between the experimental measurements \nand the microscopic parameters of the system. Never- \ntheless, they ignore the molecular structure of the sol- \nvent. Consequently, they cannot properly account for \nthe complex specific effects of the ions, which appear in \nnumerous biological, chemical, and physical interfacial \nphenomena [6, 7], without further developments. ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2648.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "NYSE_HNI_2003.pdf" }, { - "text": "molecular dynamics (MD) results. Different approxima- \ntions of the PM are employed for the case of NaCl elec- \ntrolyte solutions: a two component model (MSA2), that \nonly takes free ions into account, and two different three \ncomponent models (MSA3 and BIMSA3), which include \na third species (the contact ion pair). As we proceed \nto show, LPT allows us to select the best simple model \nwhich accurately accounts for the thermodynamics and \nthe physical-chemistry of the system. \n\nThe first stage consists in calculating the McMillan- \nMayer effective ion-ion interaction potentials V eff \nij (r), by \ninverting the radial distribution functions (RDF) gij(r) \nobtained by MD. The simulations were carried out on \na box of 2000 water molecules and 48 NaCl pairs us- \ning the same interaction potentials as in reference [16]. \n1. \nThis setup corresponds to a concentration of 0.64 mol l− \nNPT ensemble sampling at standard pressure and tem- \nperature was enforced, with a time step of 1 fs and a \npressure bath coupling constant of 1 ps. An equilibration \nrun of 0.25 ns was followed by a production run of 0.6 ns \nfor five different initial configurations. The averages of \nthe resulting RDF were then used for the potential inver- \nsion via the HNC closure [15]. These effective potentials \nare assumed to be concentration independent and will be \nused for simulations at all concentrations. ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2648.pdf" + "text": "", + "page_start": 318, + "page_end": 318, + "source_file": "00-80T-80.pdf" }, { - "text": "4 \n\nof the BIMSA3 appears to be negligible compared to the \n1. The \nreference term for concentrations less than 1 mol l− \nperturbation can then be omitted to obtain a fully ana- \nlytical theory, determined by the hard sphere diameters \nand the pair fraction given by LPT; with the free energy \nand the RDF given in terms of the BIMSA and MSA so- \nlutions, as described above. While the procedure we have \nfollowed uses two different approximations for the refer- \nence and perturbation terms (MSA vs BIMSA), these are \nknown to be accurate for the systems under consideration \nand do not appear to be inconsistent with each other. ", - "page_start": 4, - "page_end": 4, - "source_file": "1001.2648.pdf" + "text": "", + "page_start": 319, + "page_end": 319, + "source_file": "00-80T-80.pdf" } ] }, @@ -315,64 +315,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 374, + "page_end": 374, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 235, + "page_end": 235, + "source_file": "00-80T-80.pdf" }, { - "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations replace the Health Protection (Coronavirus, International Travel) (England) \nRegulations 2020 (“the International Travel Regulations”), the Health Protection (Coronavirus, \nPublic Health Information for International Passengers) (England) Regulations 2020 and the \nHealth Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England) \n(Amendment) Regulations 2021. \n\nThey impose requirements on certain categories of person to provide information upon arrival in \nEngland, to take coronavirus tests before and after arrival and to self-isolate in order to prevent the \nspread of infection or contamination from coronavirus or coronavirus disease. They also impose \nobligations on operators to ensure that passengers receive information and comply with the \nrequirements. \n\nAn impact assessment has not been produced for this instrument. An explanatory memorandum \nhas been published alongside this instrument at www.legislation.gov.uk. ", - "page_start": 91, - "page_end": 91, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 235, + "page_end": 235, + "source_file": "00-80T-80.pdf" }, { - "text": "(i) these Regulations, or \n(ii) an enactment which, in Scotland, Wales or Northern Ireland, has the effect of \nrequiring the isolation or quarantine of persons who have been outside the common \ntravel area, for any of the purposes described in sub-paragraph (b); \n\n(b) for the purpose of— \n\n(i) preventing danger to public health as a result of the spread of infection or \n\ncontamination with coronavirus or coronavirus disease, \n\n(ii) monitoring the spread of infection or contamination with coronavirus or coronavirus \n\ndisease, or \n\n(iii) giving effect to any international agreement or arrangement relating to the spread of \n\ninfection or contamination with coronavirus or coronavirus disease; or ", - "page_start": 29, - "page_end": 29, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 236, + "page_end": 236, + "source_file": "00-80T-80.pdf" }, { - "text": "**2.**—(1) The Health Protection (Coronavirus, Restrictions) (Self-Isolation) (England) Regulations \n2020(**a**) are amended as follows. \n\n(2) In regulation 2D(1)(c), for “regulation 4 of the Health Protection (Coronavirus, International \nTravel) (England) Regulations 2020” substitute “regulation 9 of the Health Protection \n(Coronavirus, International Travel and Operator Liability) (England) Regulations 2021”. \n\n(3) In regulation 6(1)— \n\n(a) in the definitions of “designated place”, “isolation requirements” and “self-isolating \nworker”, for “regulation 4” substitute “regulation 9”; \n\n(b) in the definition of “International Travel Regulations”, for “the Health Protection \n(Coronavirus, International Travel) (England) Regulations 2020” substitute “the Health \nProtection (Coronavirus, International Travel and Operator Liability) (England) \nRegulations 2021”. ", - "page_start": 89, - "page_end": 89, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 236, + "page_end": 236, + "source_file": "00-80T-80.pdf" }, { - "text": "(2) The coronavirus exception applies where it is not reasonably practicable for the local \nauthority to meet the requirement specified in regulation 11(2)(a) for a reason relating to the \nincidence or transmission of coronavirus.”. \n\n**Amendment of the Special Educational Needs and Disability (Detained Persons) Regulations**\n**2015**\n\n**18.**The Special Educational Needs and Disability (Detained Persons) Regulations 2015(**a**) are \n\namended as follows. \n\n**19.**In regulation 2(1) (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**20.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time periods due to coronavirus exception**", - "page_start": 4, - "page_end": 4, - "source_file": "uksi_20200471_en.pdf" + "text": "", + "page_start": 236, + "page_end": 236, + "source_file": "00-80T-80.pdf" }, { - "text": "**1.**—(1) The Health Protection (Notification) Regulations 2010(**a**) are amended as follows. \n(2) In regulation 4(3D)(b), for “regulation 3B of the Health Protection (Coronavirus, \nInternational Travel) (England) Regulations 2020” substitute “regulation 6 of the Health \nProtection (Coronavirus, International Travel and Operator Liability) (England) Regulations \n2021”. ", - "page_start": 88, - "page_end": 88, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 109, + "page_end": 109, + "source_file": "00-80T-80.pdf" }, { - "text": "**27.**In regulation 30(7)(c) (unopposed appeals), after “10(4)(a)” insert “or (d)”. \n\n**Amendment of the Special Educational Needs and Disability (First-tier Tribunal**\n**Recommendations Power) Regulations 2017**\n\n**28.**The Special Educational Needs and Disability (First-tier Tribunal Recommendations Power) \n\nRegulations 2017(**a**) are amended as follows. \n\n**29.**In regulation 2 (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**30.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time periods due to coronavirus exception**\n\n**2A.**—(1) Where the coronavirus exception applies, any requirement in any of the \nregulations specified in paragraph (3) for action to be taken within a specified period of \ntime or by a certain day is to be read instead as a requirement for such action to be taken as \nsoon as reasonably practicable. \n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person \nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or \ntransmission of coronavirus. \n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)— \n\n(a) regulation 6(3) and (6) (responding to health care recommendations); and \n\n(b) regulation 7(1) and (4) (responding to social care recommendations).”. ", - "page_start": 5, - "page_end": 5, - "source_file": "uksi_20200471_en.pdf" + "text": "", + "page_start": 109, + "page_end": 109, + "source_file": "00-80T-80.pdf" }, { - "text": "You should self-isolate again if: \n\nyou get symptoms of coronavirus (COVID-19) – get an NHS coronavirus (COVID-19) test from \n\nwww.gov.uk/get-coronavirus-test and self-isolate until you get the results \n\nyou’re going into hospital (self-isolating until the date you go in) \n\nsomeone you live with tests positive ", - "page_start": 65, - "page_end": 65, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 109, + "page_end": 109, + "source_file": "00-80T-80.pdf" }, { - "text": "**13.**In regulation 27(3) (amending or replacing an EHC plan following a re-assessment)— \n\n(a) at the end of sub-paragraph (c) omit “or”; and \n(b) at the end of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**14.**In regulation 45 (unopposed appeals), after paragraph (7) insert— \n\n“(8) The local authority need not comply with the time limits specified in paragraph (3A) \nif it is impractical to do so because the circumstances referred to in regulation 10(4)(e) \napply.”. \n\n**Amendment of the Special Educational Needs (Personal Budgets) Regulations 2014**\n\n**15.**The Special Educational Needs (Personal Budgets) Regulations 2014(**a**) are amended as \n\nfollows. \n\n**16.**In regulation 2 (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**17.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time period due to coronavirus exception**", - "page_start": 3, - "page_end": 3, - "source_file": "uksi_20200471_en.pdf" + "text": "", + "page_start": 236, + "page_end": 236, + "source_file": "00-80T-80.pdf" } ] }, @@ -389,64 +389,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 296, + "page_end": 296, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations replace the Health Protection (Coronavirus, International Travel) (England) \nRegulations 2020 (“the International Travel Regulations”), the Health Protection (Coronavirus, \nPublic Health Information for International Passengers) (England) Regulations 2020 and the \nHealth Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England) \n(Amendment) Regulations 2021. \n\nThey impose requirements on certain categories of person to provide information upon arrival in \nEngland, to take coronavirus tests before and after arrival and to self-isolate in order to prevent the \nspread of infection or contamination from coronavirus or coronavirus disease. They also impose \nobligations on operators to ensure that passengers receive information and comply with the \nrequirements. \n\nAn impact assessment has not been produced for this instrument. An explanatory memorandum \nhas been published alongside this instrument at www.legislation.gov.uk. ", - "page_start": 91, - "page_end": 91, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**2.**—(1) The Health Protection (Coronavirus, Restrictions) (Self-Isolation) (England) Regulations \n2020(**a**) are amended as follows. \n\n(2) In regulation 2D(1)(c), for “regulation 4 of the Health Protection (Coronavirus, International \nTravel) (England) Regulations 2020” substitute “regulation 9 of the Health Protection \n(Coronavirus, International Travel and Operator Liability) (England) Regulations 2021”. \n\n(3) In regulation 6(1)— \n\n(a) in the definitions of “designated place”, “isolation requirements” and “self-isolating \nworker”, for “regulation 4” substitute “regulation 9”; \n\n(b) in the definition of “International Travel Regulations”, for “the Health Protection \n(Coronavirus, International Travel) (England) Regulations 2020” substitute “the Health \nProtection (Coronavirus, International Travel and Operator Liability) (England) \nRegulations 2021”. ", - "page_start": 89, - "page_end": 89, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "You should self-isolate again if: \n\nyou get symptoms of coronavirus (COVID-19) – get an NHS coronavirus (COVID-19) test from \n\nwww.gov.uk/get-coronavirus-test and self-isolate until you get the results \n\nyou’re going into hospital (self-isolating until the date you go in) \n\nsomeone you live with tests positive ", - "page_start": 65, - "page_end": 65, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "(2) The coronavirus exception applies where it is not reasonably practicable for the local \nauthority to meet the requirement specified in regulation 11(2)(a) for a reason relating to the \nincidence or transmission of coronavirus.”. \n\n**Amendment of the Special Educational Needs and Disability (Detained Persons) Regulations**\n**2015**\n\n**18.**The Special Educational Needs and Disability (Detained Persons) Regulations 2015(**a**) are \n\namended as follows. \n\n**19.**In regulation 2(1) (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**20.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time periods due to coronavirus exception**", - "page_start": 4, - "page_end": 4, - "source_file": "uksi_20200471_en.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "(i) these Regulations, or \n(ii) an enactment which, in Scotland, Wales or Northern Ireland, has the effect of \nrequiring the isolation or quarantine of persons who have been outside the common \ntravel area, for any of the purposes described in sub-paragraph (b); \n\n(b) for the purpose of— \n\n(i) preventing danger to public health as a result of the spread of infection or \n\ncontamination with coronavirus or coronavirus disease, \n\n(ii) monitoring the spread of infection or contamination with coronavirus or coronavirus \n\ndisease, or \n\n(iii) giving effect to any international agreement or arrangement relating to the spread of \n\ninfection or contamination with coronavirus or coronavirus disease; or ", - "page_start": 29, - "page_end": 29, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "PART 3 \n\nRelevant websites \n\n**1.**The following are “the relevant websites” for the purposes of regulation 14— \n\nhttps://www.gov.uk/government/publications/coronavirus-covid-19-travellers-exempt-from-uk- \nborder-rules/coronavirus-covid-19-travellers-exempt-from-uk-border-rules \n\nhttps://www.gov.uk/guidance/booking-and-staying-in-a-quarantine-hotel-when-you-arrive-in- \nengland \n\nhttps://www.gov.uk/guidance/coronavirus-covid-19-testing-for-people-travelling-to-england \n\nhttp://www.gov.uk/travel-quarantine-and-testing \n\nhttps://www.gov.uk/guidance/red-amber-and-green-list-rules-for-entering-england ", - "page_start": 83, - "page_end": 83, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**27.**In regulation 30(7)(c) (unopposed appeals), after “10(4)(a)” insert “or (d)”. \n\n**Amendment of the Special Educational Needs and Disability (First-tier Tribunal**\n**Recommendations Power) Regulations 2017**\n\n**28.**The Special Educational Needs and Disability (First-tier Tribunal Recommendations Power) \n\nRegulations 2017(**a**) are amended as follows. \n\n**29.**In regulation 2 (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**30.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time periods due to coronavirus exception**\n\n**2A.**—(1) Where the coronavirus exception applies, any requirement in any of the \nregulations specified in paragraph (3) for action to be taken within a specified period of \ntime or by a certain day is to be read instead as a requirement for such action to be taken as \nsoon as reasonably practicable. \n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person \nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or \ntransmission of coronavirus. \n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)— \n\n(a) regulation 6(3) and (6) (responding to health care recommendations); and \n\n(b) regulation 7(1) and (4) (responding to social care recommendations).”. ", - "page_start": 5, - "page_end": 5, - "source_file": "uksi_20200471_en.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**1.**—(1) The Health Protection (Notification) Regulations 2010(**a**) are amended as follows. \n(2) In regulation 4(3D)(b), for “regulation 3B of the Health Protection (Coronavirus, \nInternational Travel) (England) Regulations 2020” substitute “regulation 6 of the Health \nProtection (Coronavirus, International Travel and Operator Liability) (England) Regulations \n2021”. ", - "page_start": 88, - "page_end": 88, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" } ] }, @@ -463,64 +463,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 409, + "page_end": 409, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 268, + "page_end": 268, + "source_file": "00-80T-80.pdf" }, { - "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations replace the Health Protection (Coronavirus, International Travel) (England) \nRegulations 2020 (“the International Travel Regulations”), the Health Protection (Coronavirus, \nPublic Health Information for International Passengers) (England) Regulations 2020 and the \nHealth Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England) \n(Amendment) Regulations 2021. \n\nThey impose requirements on certain categories of person to provide information upon arrival in \nEngland, to take coronavirus tests before and after arrival and to self-isolate in order to prevent the \nspread of infection or contamination from coronavirus or coronavirus disease. They also impose \nobligations on operators to ensure that passengers receive information and comply with the \nrequirements. \n\nAn impact assessment has not been produced for this instrument. An explanatory memorandum \nhas been published alongside this instrument at www.legislation.gov.uk. ", - "page_start": 91, - "page_end": 91, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "(i) these Regulations, or \n(ii) an enactment which, in Scotland, Wales or Northern Ireland, has the effect of \nrequiring the isolation or quarantine of persons who have been outside the common \ntravel area, for any of the purposes described in sub-paragraph (b); \n\n(b) for the purpose of— \n\n(i) preventing danger to public health as a result of the spread of infection or \n\ncontamination with coronavirus or coronavirus disease, \n\n(ii) monitoring the spread of infection or contamination with coronavirus or coronavirus \n\ndisease, or \n\n(iii) giving effect to any international agreement or arrangement relating to the spread of \n\ninfection or contamination with coronavirus or coronavirus disease; or ", - "page_start": 29, - "page_end": 29, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 133, + "page_end": 133, + "source_file": "00-80T-80.pdf" }, { - "text": "(2) The coronavirus exception applies where it is not reasonably practicable for the local \nauthority to meet the requirement specified in regulation 11(2)(a) for a reason relating to the \nincidence or transmission of coronavirus.”. \n\n**Amendment of the Special Educational Needs and Disability (Detained Persons) Regulations**\n**2015**\n\n**18.**The Special Educational Needs and Disability (Detained Persons) Regulations 2015(**a**) are \n\namended as follows. \n\n**19.**In regulation 2(1) (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**20.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time periods due to coronavirus exception**", - "page_start": 4, - "page_end": 4, - "source_file": "uksi_20200471_en.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "**2.**—(1) The Health Protection (Coronavirus, Restrictions) (Self-Isolation) (England) Regulations \n2020(**a**) are amended as follows. \n\n(2) In regulation 2D(1)(c), for “regulation 4 of the Health Protection (Coronavirus, International \nTravel) (England) Regulations 2020” substitute “regulation 9 of the Health Protection \n(Coronavirus, International Travel and Operator Liability) (England) Regulations 2021”. \n\n(3) In regulation 6(1)— \n\n(a) in the definitions of “designated place”, “isolation requirements” and “self-isolating \nworker”, for “regulation 4” substitute “regulation 9”; \n\n(b) in the definition of “International Travel Regulations”, for “the Health Protection \n(Coronavirus, International Travel) (England) Regulations 2020” substitute “the Health \nProtection (Coronavirus, International Travel and Operator Liability) (England) \nRegulations 2021”. ", - "page_start": 89, - "page_end": 89, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 132, + "page_end": 132, + "source_file": "00-80T-80.pdf" }, { - "text": "**1.**—(1) The Health Protection (Notification) Regulations 2010(**a**) are amended as follows. \n(2) In regulation 4(3D)(b), for “regulation 3B of the Health Protection (Coronavirus, \nInternational Travel) (England) Regulations 2020” substitute “regulation 6 of the Health \nProtection (Coronavirus, International Travel and Operator Liability) (England) Regulations \n2021”. ", - "page_start": 88, - "page_end": 88, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "You should self-isolate again if: \n\nyou get symptoms of coronavirus (COVID-19) – get an NHS coronavirus (COVID-19) test from \n\nwww.gov.uk/get-coronavirus-test and self-isolate until you get the results \n\nyou’re going into hospital (self-isolating until the date you go in) \n\nsomeone you live with tests positive ", - "page_start": 65, - "page_end": 65, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 267, + "page_end": 267, + "source_file": "00-80T-80.pdf" }, { - "text": "(3) In regulation 4ZA— \n\n(a) in the heading, for “the Health Protection (Coronavirus, International Travel) (England) \nRegulations 2020” substitute “the Health Protection (Coronavirus, International Travel \nand Operator Liability) (England) Regulations 2021”; \n\n(b) in paragraph (1)(a), for “regulation 3B of the Health Protection (Coronavirus, \nInternational Travel) (England) Regulations 2020 (“the 2020 Regulations”)” substitute \n“regulation 6 of the Health Protection (Coronavirus, International Travel and Operator \nLiability) (England) Regulations 2021 (“the International Travel and Operator Liability \nRegulations”)”; \n\n(c) in paragraph (1)(c), for “paragraph 7(1)(f) of Schedule 2C to the 2020 Regulations” \nsubstitute “paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator \nLiability Regulations”; \n\n(d) in paragraph (3), for “paragraph 7(1)(f) of Schedule 2C to the Health Protection \n(Coronavirus, International Travel) (England) Regulations 2020” substitute “paragraph \n7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations”. ", - "page_start": 89, - "page_end": 89, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 267, + "page_end": 267, + "source_file": "00-80T-80.pdf" }, { - "text": "**27.**In regulation 30(7)(c) (unopposed appeals), after “10(4)(a)” insert “or (d)”. \n\n**Amendment of the Special Educational Needs and Disability (First-tier Tribunal**\n**Recommendations Power) Regulations 2017**\n\n**28.**The Special Educational Needs and Disability (First-tier Tribunal Recommendations Power) \n\nRegulations 2017(**a**) are amended as follows. \n\n**29.**In regulation 2 (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**30.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time periods due to coronavirus exception**\n\n**2A.**—(1) Where the coronavirus exception applies, any requirement in any of the \nregulations specified in paragraph (3) for action to be taken within a specified period of \ntime or by a certain day is to be read instead as a requirement for such action to be taken as \nsoon as reasonably practicable. \n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person \nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or \ntransmission of coronavirus. \n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)— \n\n(a) regulation 6(3) and (6) (responding to health care recommendations); and \n\n(b) regulation 7(1) and (4) (responding to social care recommendations).”. ", - "page_start": 5, - "page_end": 5, - "source_file": "uksi_20200471_en.pdf" + "text": "", + "page_start": 268, + "page_end": 268, + "source_file": "00-80T-80.pdf" } ] }, @@ -531,70 +531,70 @@ "target_page": 1, "target_passage": "The terms \"hard problem\" and \"easy problems\" were coined by the philosopher David Chalmers", "chunk_present": { - "presence": true, - "index": 9 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 60, + "page_end": 60, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 152, + "page_end": 152, + "source_file": "00-80T-80.pdf" }, { - "text": "**Consciousness**\n\nDavid Chalmers identified two problems in understanding the mind, which he named the \"hard\" and \n\"easy\" problems of consciousness.[381] The easy problem is understanding how the brain processes \nsignals, makes plans and controls behavior. The hard problem is explaining how this*feels*or why it \nshould feel like anything at all, assuming we are right in thinking that it truly does feel like something \n(Dennett's consciousness illusionism says this is an illusion). While human information processing is easy \nto explain, human subjective experience is difficult to explain. For example, it is easy to imagine a color- \nblind person who has learned to identify which objects in their field of view are red, but it is not clear \nwhat would be required for the person to*know what red looks like*.[382] ", - "page_start": 26, - "page_end": 26, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "The philosopher Thomas Metzinger likens the hard problem of consciousness to vitalism, a formerly \nwidespread view in biology which was not so much solved as abandoned.[66] Brian Jonathan Garrett has \nalso argued that the hard problem suffers from flaws analogous to those of vitalism.[67] \n\nThe philosopher Peter Hacker argues that the hard problem is misguided in that it asks how consciousness \ncan emerge from matter, whereas in fact sentience emerges from the evolution of living organisms.[68] He \nstates: \"The hard problem isn’t a hard problem at all. The really hard problems are the problems the \nscientists are dealing with. [...] The philosophical problem, like all philosophical problems, is a confusion \nin the conceptual scheme.\"[68] Hacker's critique extends beyond Chalmers and the hard problem, being \ndirected against contemporary philosophy of mind and neuroscience more broadly. Along with the \nneuroscientist Max Bennett, he has argued that most of contemporary neuroscience remains implicitly \ndualistic in its conceptualizations and is predicated on the*mereological fallacy*of ascribing psychological \nconcepts to the brain that can properly be ascribed only to the person as a whole.[69] Hacker further states \nthat \"consciousness studies\", as it exists today, is \"literally a total waste of time\" and that \"the conception \nof consciousness which they have is incoherent\".[68] ", - "page_start": 8, - "page_end": 8, - "source_file": "wikipedia2.pdf" + "text": "", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**How the easy and hard problems are related**\n\nChalmers believes that the hard problem is irreducible to the easy problems: solving the easy problems \nwill not lead to a solution to the hard problems. This is because the easy problems pertain to the causal \nstructure of the world while the hard problem pertains to consciousness, and facts about consciousness \ninclude facts that go beyond mere causal or structural description.[32] \n\nFor example, suppose someone were to stub their foot and yelp. In this scenario, the easy problems are \nmechanistic explanations that involve the activity of the nervous system and brain and its relation to the \nenvironment (such as the propagation of nerve signals from the toe to the brain, the processing of that \ninformation and how it leads to yelping, and so on). The hard problem is the question of why these \nmechanisms are accompanied by*the feeling of pain*, or why these feelings of pain feel the particular way \nthat they do. Chalmers argues that facts about the neural mechanisms of pain, and pain behaviours, do not \nlead to facts about conscious experience. Facts about conscious experience are, instead, further facts, not \nderivable from facts about the brain.[27][32] \n\nAn explanation for all of the relevant physical facts about neural processing would leave unexplained \nfacts about what it is like to feel pain. This is in part because functions and physical structures of any sort \ncould conceivably exist in the absence of experience. Alternatively, they could exist alongside a different \nset of experiences. For example, it is logically possible for a perfect replica of Chalmers to have no \nexperience at all, or for it to have a different set of experiences (such as an inverted visible spectrum, so \nthat the blue-yellow red-green axes of its visual field are flipped).[32] ", + "text": "", "page_start": 3, "page_end": 3, - "source_file": "wikipedia2.pdf" + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "The philosophers Glenn Carruthers and Elizabeth Schier said in 2012 that the main arguments for the \nexistence of a hard problem—philosophical zombies, Mary's room, and Nagel's bats—are only persuasive \nif one already assumes that \"consciousness must be independent of the structure and function of mental \nstates, i.e. that there is a hard problem.\" Hence, the arguments beg the question. The authors suggest that \n\"instead of letting our conclusions on the thought experiments guide our theories of consciousness, we \nshould let our theories of consciousness guide our conclusions from the thought experiments.\"[64] \n\nThe philosopher Massimo Pigliucci argued in 2013 that the hard problem is misguided, resulting from a \n\"category mistake\".[17] He said: \"Of course an explanation isn't the same as an experience, but that's \nbecause the two are completely independent categories, like colors and triangles. It is obvious that I \ncannot experience what it is like to be you, but I can potentially have a complete explanation of how and \nwhy it is possible to be you.\"[17] \n\nIn 2017, the philosopher Marco Stango, in a paper on John Dewey's approach to the problem of \nconsciousness (which preceded Chalmers' formulation of the hard problem by over half a century), noted \nthat Dewey's approach would see the hard problem as the consequence of an unjustified assumption that \nfeelings and functional behaviors are not the same physical process: \"For the Deweyan philosopher, the \n'hard problem' of consciousness is a 'conceptual fact' only in the sense that it is a*philosophical mistake*: \nthe mistake of failing to see that the physical can be had as an episode of immediate sentiency.\"[65] ", - "page_start": 8, - "page_end": 8, - "source_file": "wikipedia2.pdf" + "text": "", + "page_start": 2, + "page_end": 2, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "The philosopher Daniel Dennett is another prominent figure associated with illusionism. After Frankish \npublished a paper in the Journal of Consciousness Studies titled*Illusionism as a Theory of*\n*Consciousness,*[60] Dennett responded with his own paper with the spin-off title*Illusionism as the*\n*Obvious Default Theory of Consciousness.*[61] Dennett has been arguing for the illusory status of \nconsciousness since early on in his career. For example, in 1979 he published a paper titled*On the*\n*Absence of Phenomenology*(where he argues for the nonexistence of phenomenal consciousness).[70] \nSimilar ideas have been explicated in his 1991 book Consciousness Explained.[71] Dennett argues that the \nso-called \"hard problem\" will be solved in the process of solving what Chalmers terms the \"easy \nproblems\".[16] He compares consciousness to stage magic and its capability to create extraordinary \nillusions out of ordinary things.[72] To show how people might be commonly fooled into overstating the \naccuracy of their introspective abilities, he describes a phenomenon called change blindness, a visual \nprocess that involves failure to detect scenery changes in a series of alternating images.[73] He \naccordingly argues that consciousness need not be what it seems to be based on introspection. To address \nthe question of the hard problem, or how and why physical processes give rise to experience, Dennett \nstates that the phenomenon of having experience is nothing more than the performance of functions or the \nproduction of behavior, which can also be referred to as the easy problems of consciousness.[16] Thus, \nDennett argues that the hard problem of experience is included among—not separate from—the easy \nproblems, and therefore they can only be explained together as a cohesive unit.[72] ", - "page_start": 9, - "page_end": 9, - "source_file": "wikipedia2.pdf" + "text": "", + "page_start": 152, + "page_end": 152, + "source_file": "00-80T-80.pdf" }, { - "text": "For his part, Baars writes (along with two colleagues) that there is no hard problem of explaining qualia \nover and above the problem of explaining causal functions, because qualia are entailed by neural activity \nand themselves causal.[21] Dehaene, in his 2014 book*Consciousness and the Brain*, rejected the concept \nof qualia and argued that Chalmers' \"easy problems\" of consciousness are actually the hard problems.[20] \nHe further stated that the \"hard problem\" is based only upon ill-defined intuitions that are continually \nshifting as understanding evolves:[20] ", - "page_start": 17, - "page_end": 17, - "source_file": "wikipedia2.pdf" + "text": "", + "page_start": 1, + "page_end": 1, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**Neural correlates of consciousness**\n\nSince 1990, researchers including the molecular biologist Francis Crick and the neuroscientist Christof \nKoch have made significant progress toward identifying which neurobiological events occur concurrently \nto the experience of subjective consciousness.[131] These postulated events are referred to as*neural*\n*correlates of consciousness*or NCCs. However, this research arguably addresses the question of*which*\nneurobiological mechanisms are linked to consciousness but not the question of*why*they should give rise \nto consciousness at all, the latter being the hard problem of consciousness as Chalmers formulated it. In \n\"On the Search for the Neural Correlate of Consciousness\", Chalmers said he is confident that, granting \nthe principle that something such as what he terms \"global availability\" can be used as an indicator of \nconsciousness, the neural correlates will be discovered \"in a century or two\".[132] Nevertheless, he stated \nregarding their relationship to the hard problem of consciousness: \n\nOne can always ask why these processes of availability should give rise to consciousness in \nthe first place. As yet we cannot explain why they do so, and it may well be that full details \nabout the processes of availability will still fail to answer this question. Certainly, nothing in \nthe standard methodology I have outlined answers the question; that methodology assumes a \nrelation between availability and consciousness, and therefore does nothing to explain it. [...] \nSo the hard problem remains. But who knows: Somewhere along the line we may be led to \nthe relevant insights that show why the link is there, and the hard problem may then be \nsolved.[132] ", - "page_start": 15, - "page_end": 15, - "source_file": "wikipedia2.pdf" + "text": "", + "page_start": 152, + "page_end": 152, + "source_file": "00-80T-80.pdf" }, { - "text": "The terms \"hard problem\" and \"easy problems\" were \ncoined by the philosopher David Chalmers in a 1994 talk \ngiven at The Science of Consciousness conference held in \nTucson, Arizona.[4] The following year, the main talking \npoints of Chalmers' talk were published in*The Journal of*\n*Consciousness*\ngained \nsignificant attention from consciousness researchers and \nbecame the subject of a special volume of the journal,[5][6] \nwhich was later published into a book.[7] In 1996, \nChalmers published*The Conscious Mind*, a book-length \ntreatment of the hard problem, in which he elaborated on \nhis core arguments and responded to counterarguments. His \nuse of the word*easy*is \"tongue-in-cheek\".[8] As the \ncognitive psychologist Steven Pinker puts it, they are about as easy as going to Mars or curing cancer. \n\"That is, scientists more or less know what to look for, and with enough brainpower and funding, they \nwould probably crack it in this century.\"[9] \n\n*Studies*.[1] The publication \n\nChalmers on stage for an Alan Turing Year \nevent at De La Salle University, Manila, 27 \nMarch 2012 ", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia2.pdf" + "text": "", + "page_start": 152, + "page_end": 152, + "source_file": "00-80T-80.pdf" } ] }, @@ -605,70 +605,70 @@ "target_page": 2, "target_passage": "Chalmers uses Thomas Nagel's definition of consciousness: \"the feeling of what it is like to be something.\"", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 308, + "page_end": 308, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 40, + "page_end": 40, + "source_file": "NYSE_AIT_2012.pdf" }, { - "text": "Consciousness is an ambiguous term. It can be used to mean self consciousness, awareness, the state of \nbeing awake, and so on. Chalmers uses Thomas Nagel's definition of consciousness: \"*the feeling of what*\n*it is like to be something.\"*Consciousness, in this sense, is synonymous with*experience.*[31][27] ", - "page_start": 2, - "page_end": 2, - "source_file": "wikipedia2.pdf" + "text": "", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "consciousness, namely the neural correlates of various conscious processes.[22] This more modest goal is \nthe focus of most scientists working on consciousness.[133] Psychologist Susan Blackmore believes, by \ncontrast, that the search for the neural correlates of consciousness is futile and itself predicated on an \nerroneous belief in the hard problem of consciousness.[134] ", - "page_start": 16, - "page_end": 16, - "source_file": "wikipedia2.pdf" + "text": "", + "page_start": 196, + "page_end": 196, + "source_file": "00-80T-80.pdf" }, { - "text": "**Neural correlates of consciousness**\n\nSince 1990, researchers including the molecular biologist Francis Crick and the neuroscientist Christof \nKoch have made significant progress toward identifying which neurobiological events occur concurrently \nto the experience of subjective consciousness.[131] These postulated events are referred to as*neural*\n*correlates of consciousness*or NCCs. However, this research arguably addresses the question of*which*\nneurobiological mechanisms are linked to consciousness but not the question of*why*they should give rise \nto consciousness at all, the latter being the hard problem of consciousness as Chalmers formulated it. In \n\"On the Search for the Neural Correlate of Consciousness\", Chalmers said he is confident that, granting \nthe principle that something such as what he terms \"global availability\" can be used as an indicator of \nconsciousness, the neural correlates will be discovered \"in a century or two\".[132] Nevertheless, he stated \nregarding their relationship to the hard problem of consciousness: \n\nOne can always ask why these processes of availability should give rise to consciousness in \nthe first place. As yet we cannot explain why they do so, and it may well be that full details \nabout the processes of availability will still fail to answer this question. Certainly, nothing in \nthe standard methodology I have outlined answers the question; that methodology assumes a \nrelation between availability and consciousness, and therefore does nothing to explain it. [...] \nSo the hard problem remains. But who knows: Somewhere along the line we may be led to \nthe relevant insights that show why the link is there, and the hard problem may then be \nsolved.[132] ", - "page_start": 15, - "page_end": 15, - "source_file": "wikipedia2.pdf" + "text": "", + "page_start": 196, + "page_end": 196, + "source_file": "00-80T-80.pdf" }, { - "text": "Today there is a strong tendency to simply*equate*consciousness with the qualia. Yet there is \nclearly something not quite right about this. The \"itchiness of itches\" and the \"hurtfulness of \npain\" are qualities we are conscious*of*. So philosophy of mind tends to treat consciousness as \nif it consisted simply of the contents of consciousness (the phenomenal qualities), while it \nreally is precisely*consciousness*of contents, the very givenness of whatever is subjectively \ngiven. And therefore the problem of consciousness does not pertain so much to some alleged \n\"mysterious, nonpublic objects\", i.e. objects that seem to be only \"visible\" to the respective \nsubject, but rather to the nature of \"seeing\" itself (and in today’s philosophy of mind \nastonishingly little is said about the latter).[129] ", - "page_start": 15, - "page_end": 15, - "source_file": "wikipedia2.pdf" + "text": "", + "page_start": 196, + "page_end": 196, + "source_file": "00-80T-80.pdf" }, { - "text": "HADAF-2).*Journal of Consciousness Studies*.**27**(5–6): 258–281. \n\n85. Strawson, G. (2018). \"The Consciousness Deniers\" (https://www.nybooks.com/daily/2018/0 \n\n3/13/the-consciousness-deniers/).*The New York Review of Books*. \n\n86. Koch, Christof (2019).*The Feeling of Life Itself: Why Consciousness is Everywhere But*\n\n*Can't be Computed*. MIT Press. p. 2. \n\n87. Koch, Christof (2019).*The Feeling of Life Itself: Why Consciousness is Everywhere But*\n\n*Can't be Computed*. MIT Press. p. 3. \n\n88. Balmer, A. (2020). \"Soft-Wired Illusionism vs. the Meta-Problem of Consciousness\" (https://p \n\nhilpapers.org/rec/BALSIV).*Journal of Consciousness Studies*.**27**(5–6): 26–37. \n\n89. Chalmers, David (2020). \"Is the Hard Problem of Consciousness Universal?\".*Journal of*\n\n*Consciousness Studies*.**27**(5–6): 227–257. \n\n90. Papineau, D. (2019). \"Response to Chalmers' 'The Meta-Problem of Consciousness' \" (http \ns://philpapers.org/rec/PAPRTC-6).*Journal of Consciousness Studies*.**26**(9–10): 173–181. \n\n91. J. Levine, \"Conceivability, Identity, and the Explanatory Gap\" in Stuart R. Hameroff, Alfred \n\nW. Kaszniak and David Chalmers (eds.),*Towards a Science of Consciousness III: The Third*\n*Tucson Discussions and Debates*, The MIT Press, 1999,. pp 3–12. \n\n92. Gennaro, Rocco J. \"Consciousness\" (https://www.iep.utm.edu/consciou).*Internet*\n\n*Encyclopedia of Philosophy*. \n\n93. Block, Ned; Stalnaker, Robert (1999). \"Conceptual Analysis, Dualism, and the Explanatory \nGap\" (http://www.nyu.edu/gsas/dept/philo/faculty/block/papers/ExplanatoryGap.pdf) (PDF). \n*The Philosophical Review*.**108**(1): 1–46. CiteSeerX 10.1.1.693.2421 (https://citeseerx.ist.ps \nu.edu/viewdoc/summary?doi=10.1.1.693.2421). doi:10.2307/2998259 (https://doi.org/10.230 \n7%2F2998259). JSTOR 2998259 (https://www.jstor.org/stable/2998259). \n\n94. Stoljar, Daniel (2005). \"Physicalism and Phenomenal Concepts\".*Mind & Language*.**20**(5): \n469–494. doi:10.1111/j.0268-1064.2005.00296.x (https://doi.org/10.1111%2Fj.0268-1064.2 \n005.00296.x). \n\n95. Chalmers, David (2006). \"Phenomenal Concepts and the Explanatory Gap\" (http://consc.ne \nt/papers/pceg.pdf) (PDF). In Alter, Torin; Walter, Sven (eds.).*Phenomenal Concepts and*\n*Phenomenal Knowledge: New Essays on Consciousness and Physicalism*. Oxford \nUniversity Press. ISBN 9780195171655. Retrieved 27 March 2019. \n\n96. Wierzbicka, A. (2019). \"From 'Consciousness' to 'I Think, I Feel, I Know': A Commentary on \n\nDavid Chalmers\".*Journal of Consciousness Studies*.**26**(9–10): 257–269. \n\n97. Lau, Hakwan; Michel, Matthias (2019). \"A Socio-Historical Take on the Meta-Problem of ", - "page_start": 24, - "page_end": 24, - "source_file": "wikipedia2.pdf" + "text": "", + "page_start": 72, + "page_end": 72, + "source_file": "00-80T-80.pdf" }, { - "text": "Eliminativists differ on the role they believe intuitive judgement plays in creating the apparent reality of \nconsciousness. The philosopher Jacy Reese Anthis is of the position that this issue is born of an \noverreliance on intuition, calling philosophical discussions on the topic of consciousness a form of \n\"intuition jousting\".[74] But when the issue is tackled with \"formal argumentation\" and \"precise \nsemantics\" then the hard problem will dissolve.[74] The philosopher Elizabeth Irvine, in contrast, can be \nread as having the opposite view, since she argues that phenomenal properties (that is, properties of \nconsciousness) do not exist in our common-sense view of the world. She states that \"the hard problem of \nconsciousness may not be a genuine problem for non-philosophers (despite its overwhelming obviousness \nto philosophers).\"[75] \n\nA complete illusionist theory of consciousness must include the description of a mechanism by which the \nillusion of subjective experience is had and reported by people. Various philosophers and scientists have \nproposed possible theories.[76] For example, in his book*Consciousness and the Social Brain*\nneuroscientist Michael Graziano advocates what he calls attention schema theory, in which our perception ", - "page_start": 9, - "page_end": 9, - "source_file": "wikipedia2.pdf" + "text": "", + "page_start": 196, + "page_end": 196, + "source_file": "00-80T-80.pdf" }, { - "text": "Levine does not think that the explanatory gap means that consciousness is not physical; he is open to the \nidea that the explanatory gap is only an epistemological problem for physicalism.[43] In contrast, \nChalmers thinks that the hard problem of consciousness does show that consciousness is not physical.[27] ", - "page_start": 5, - "page_end": 5, - "source_file": "wikipedia2.pdf" + "text": "", + "page_start": 72, + "page_end": 72, + "source_file": "00-80T-80.pdf" }, { - "text": "physical constituents. For example, water is nothing \nmore than H2O molecules, and understanding everything \nabout H2O molecules is to understand everything there is \nto know about water. But consciousness is not like this. \nKnowing everything there is to know about the brain, or \nany physical system, is not to know everything there is to \nknow about consciousness. Consciousness, then, must \nnot be purely physical.[27] ", - "page_start": 4, - "page_end": 4, - "source_file": "wikipedia2.pdf" + "text": "", + "page_start": 196, + "page_end": 196, + "source_file": "00-80T-80.pdf" } ] }, @@ -685,64 +685,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 316, + "page_end": 316, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 352, + "page_end": 352, + "source_file": "00-80T-80.pdf" }, { - "text": "Blair, J. Anthony; Johnson, Ralph H. (2000). \"Informal Logic: An Overview\" (https://philpaper \ns.org/rec/BLAILA-3).*Informal Logic*.**20**(2): 93–107. doi:10.22329/il.v20i2.2262 (https://doi.o \nrg/10.22329%2Fil.v20i2.2262). Archived (https://web.archive.org/web/20211209195317/http \ns://philpapers.org/rec/BLAILA-3) from the original on 9 December 2021. Retrieved \n29 December 2021. \nBlair, J. Anthony (20 October 2011).*Groundwork in the Theory of Argumentation: Selected*\n*Papers of J. Anthony Blair*. Springer Science & Business Media. p. 47. ISBN 978-94-007- \n2363-4. \nBobzien, Susanne (2020). \"Ancient Logic: 2. Aristotle\" (https://plato.stanford.edu/entries/logi \nc-ancient/#Ari).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, \nStanford University. Archived (https://web.archive.org/web/20180828102117/https://plato.sta \nnford.edu/entries/logic-ancient/#Ari) from the original on 28 August 2018. Retrieved \n3 January 2022. \nBorchert, Donald, ed. (2006a). \"Computability Theory\".*Macmillan Encyclopedia of*\n*Philosophy Volume 2*(https://philpapers.org/rec/BORMEO) (2nd ed.). Macmillan. pp. 372– \n390. ISBN 978-0-02-865782-0. \nBorchert, Donald (2006b). \"Induction\".*Macmillan Encyclopedia of Philosophy Volume 4*(htt \nps://philpapers.org/rec/BORMEO) (2nd ed.). Macmillan. pp. 635–648. ISBN 978-0-02- \n865784-4. Archived (https://web.archive.org/web/20210112065913/https://philpapers.org/re \nc/BORMEO) from the original on 12 January 2021. Retrieved 4 January 2022. \nBorchert, Donald (2006c). \"Logic, Non-Classical\".*Macmillan Encyclopedia of Philosophy*\n*Volume 5*(https://philpapers.org/rec/BORMEO) (2nd ed.). Macmillan. pp. 485–492. \nISBN 978-0-02-865785-1. Archived (https://web.archive.org/web/20210112065913/https://ph \nilpapers.org/rec/BORMEO) from the original on 12 January 2021. Retrieved 4 January 2022. \nBoris, Kulik; Alexander, Fridman (30 November 2017).*N-ary Relations for Logical Analysis*\n*of Data and Knowledge*. IGI Global. p. 74. ISBN 978-1-5225-2783-1. \nBridges, Douglas; Ishihara, Hajime; Rathjen, Michael; Schwichtenberg, Helmut (30 April \n2023).*Handbook of Constructive Mathematics*. Cambridge University Press. pp. 73–4. \nISBN 978-1-316-51086-5. \nBrody, Boruch A. (2006).*Encyclopedia of Philosophy*. Vol. 5. Donald M. Borchert (2nd ed.). \nThomson Gale/Macmillan Reference US. pp. 535–536. ISBN 978-0-02-865780-6. \nOCLC 61151356 (https://search.worldcat.org/oclc/61151356). \"The two most important \ntypes of logical calculi are propositional (or sentential) calculi and functional (or predicate) \ncalculi. A propositional calculus is a system containing propositional variables and \nconnectives (some also contain propositional constants) but not individual or functional \nvariables or constants. In the extended propositional calculus, quantifiers whose operator \nvariables are propositional variables are added.\" \nBunnin, Nicholas; Yu, Jiyuan (27 January 2009).*The Blackwell Dictionary of Western*\n*Philosophy*. John Wiley & Sons. p. 179. ISBN 978-1-4051-9112-8. \nBurgess, John P. (2009). \"1. Classical logic\".*Philosophical Logic*(https://philpapers.org/rec/ \nBURPL-3). Princeton, NJ: Princeton University Press. pp. 1–12. ISBN 978-0-691-15633-0. \nArchived (https://web.archive.org/web/20211216143954/https://philpapers.org/rec/BURPL- \n3) from the original on 16 December 2021. Retrieved 4 January 2022. \nBäck, Allan T. (2016).*Aristotle's Theory of Predication*. Brill. p. 317. ISBN 978-90-04-32109- \n0. \nCalderbank, Robert; Sloane, Neil J. A. (April 2001). \"Claude Shannon (1916–2001)\" (https:// \ndoi.org/10.1038%2F35071223).*Nature*.**410**(6830): 768. doi:10.1038/35071223 (https://doi. \norg/10.1038%2F35071223). ISSN 1476-4687 (https://search.worldcat.org/issn/1476-4687). \nPMID 11298432 (https://pubmed.ncbi.nlm.nih.gov/11298432). S2CID 4402158 (https://api.s \nemanticscholar.org/CorpusID:4402158). \nCarnielli, Walter; Pizzi, Claudio (2008).*Modalities and Multimodalities*. Springer Science & \nBusiness Media. p. 3. ISBN 978-1-4020-8590-1. ", - "page_start": 26, - "page_end": 26, - "source_file": "wikipedia1.pdf" + "text": "", + "page_start": 350, + "page_end": 350, + "source_file": "00-80T-80.pdf" }, { - "text": "Vidyabhusana, Satis Chandra (1988).*A History of Indian Logic: Ancient, Mediaeval and*\n*Modern Schools*. Motilal Banarsidass Publisher. p. 221. ISBN 978-81-208-0565-1. \nVleet, Van Jacob E. (2010). \"Introduction\".*Informal Logical Fallacies: A Brief Guide*(https://p \nhilpapers.org/rec/VLEILF). Upa. pp. ix–x. ISBN 978-0-7618-5432-6. Archived (https://web.ar \nchive.org/web/20220228035654/https://philpapers.org/rec/VLEILF) from the original on 28 \nFebruary 2022. Retrieved 2 January 2022. \nVäänänen, Jouko (2021). \"Second-order and Higher-order Logic\" (https://plato.stanford.edu/ \nentries/logic-higher-order/).*The Stanford Encyclopedia of Philosophy*. Metaphysics \nResearch Lab, Stanford University. Archived (https://web.archive.org/web/20211030222316/ \nhttps://plato.stanford.edu/entries/logic-higher-order/) from the original on 30 October 2021. \nRetrieved 23 November 2021. \nWalton, Douglas N. (1987).*Informal Fallacies: Towards a Theory of Argument Criticisms*(htt \nps://philpapers.org/rec/WALIFT). John Benjamins. ISBN 978-1-55619-010-0. Archived (http \ns://web.archive.org/web/20220302001111/https://philpapers.org/rec/WALIFT) from the \noriginal on 2 March 2022. Retrieved 2 January 2022. \nWarren, Jared (2020).*Shadows of Syntax: Revitalizing Logical and Mathematical*\n*Conventionalism*(https://global.oup.com/academic/product/shadows-of-syntax-9780190086 \n152). Oxford University Press. ISBN 978-0-19-008615-2. \nWashell, Richard F. (1973). \"Logic, Language, and Albert the Great\" (https://philpapers.org/r \nec/WASLLA-3).*Journal of the History of Ideas*.**34**(3): 445–50. doi:10.2307/2708963 (http \ns://doi.org/10.2307%2F2708963). JSTOR 2708963 (https://www.jstor.org/stable/2708963). \nWasilewska, Anita (2018).*Logics for Computer Science: Classical and Non-Classical*. \nSpringer. pp. 145–6. ISBN 978-3-319-92591-2. \nWeber, Zach. \"Paraconsistent Logic\" (https://iep.utm.edu/para-log/).*Internet Encyclopedia*\n*of Philosophy*. Retrieved 12 December 2021. \nWeddle, Perry (2011). \"Chapter 36. Informal logic and the eductive-inductive distinction\". \n*Across the Lines of Disciplines*(https://www.degruyter.com/document/doi/10.1515/97831108 \n67718.383/html). De Gruyter Mouton. pp. 383–388. doi:10.1515/9783110867718.383 (http \ns://doi.org/10.1515%2F9783110867718.383). ISBN 978-3-11-086771-8. Archived (https://w \neb.archive.org/web/20211231172343/https://www.degruyter.com/document/doi/10.1515/978 \n3110867718.383/html) from the original on 31 December 2021. Retrieved 2 January 2022. \nWesterståhl, Dag (1989). \"Aristotelian Syllogisms and Generalized Quantifiers\" (https://philp \napers.org/rec/WESASA).*Studia Logica*.**48**(4): 577–585. doi:10.1007/BF00370209 (https:// \ndoi.org/10.1007%2FBF00370209). S2CID 32089424 (https://api.semanticscholar.org/Corpu \nsID:32089424). Archived (https://web.archive.org/web/20220104182746/https://philpapers.o \nrg/rec/WESASA) from the original on 4 January 2022. Retrieved 4 January 2022. \nWilbanks, Jan J. (1 March 2010). \"Defining Deduction, Induction, and Validity\" (https://link.sp \nringer.com/article/10.1007/s10503-009-9131-5).*Argumentation*.**24**(1): 107–124. \ndoi:10.1007/s10503-009-9131-5 (https://doi.org/10.1007%2Fs10503-009-9131-5). \nISSN 1572-8374 (https://search.worldcat.org/issn/1572-8374). S2CID 144481717 (https://ap \ni.semanticscholar.org/CorpusID:144481717). Archived (https://web.archive.org/web/202201 \n08171721/https://link.springer.com/article/10.1007/s10503-009-9131-5) from the original on \n8 January 2022. Retrieved 8 January 2022. \nWilce, Alexander (2021). \"Quantum Logic and Probability Theory: 2.1 Realist Quantum \nLogic\" (https://plato.stanford.edu/entries/qt-quantlog/#RealQuanLogi).*The Stanford*\n*Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford University. Retrieved \n11 March 2023. \nWile, Bruce; Goss, John; Roesner, Wolfgang (2005).*Comprehensive Functional*\n*Verification: The Complete Industry Cycle*. Elsevier. p. 447. ISBN 978-0-08-047664-3. \nWillman, Marshall D. (2022). \"Logic and Language in Early Chinese Philosophy\" (https://plat \no.stanford.edu/entries/chinese-logic-language/).*The Stanford Encyclopedia of Philosophy*. \nMetaphysics Research Lab, Stanford University. Introduction. Retrieved 11 March 2023. ", - "page_start": 37, - "page_end": 37, - "source_file": "wikipedia1.pdf" + "text": "", + "page_start": 350, + "page_end": 350, + "source_file": "00-80T-80.pdf" }, { - "text": "(3): 298–311. doi:10.1111/rati.12103 (https://doi.org/10.1111%2Frati.12103). \n\n55. Levin, Janet (2008). \"Taking Type-B Materialism Seriously\" (https://philpapers.org/rec/LEVT \nTM).*Mind and Language*.**23**(4): 402–425. doi:10.1111/j.1468-0017.2008.00349.x (https://d \noi.org/10.1111%2Fj.1468-0017.2008.00349.x). \n\n56. Mandik, Pete; Weisberg, Josh (2008). Wrenn, Chase (ed.).*Type-Q Materialism*(https://philp \n\napers.org/rec/MANTM). Peter Lang Publishing Group. \n\n57. Pereira, Roberto Horácio Sá (2016). \"In Defence of Type-A Materialism\" (https://philpapers.o \nrg/rec/PERIDO-3).*Diametros*.**49**(49): 68–83. doi:10.13153/diam.49.2016.921 (https://doi.or \ng/10.13153%2Fdiam.49.2016.921). \n\n58. Yetter-Chappell, Helen (2017). \"Dissolving Type-B Physicalism\" (https://philpapers.org/rec/Y \nETDTP-2).*Philosophical Perspectives*.**31**(1): 469–498. doi:10.1111/phpe.12099 (https://do \ni.org/10.1111%2Fphpe.12099). \n\n59. Ramsey, William (2019). \"Eliminative Materialism\" (https://plato.stanford.edu/entries/material \nism-eliminative/). In Zalta, Edward N. (ed.).*Stanford Encyclopedia of Philosophy*. Retrieved \n1 April 2019. \n\n60. Frankish, K. (2016). \"Illusionism as a theory of consciousness\".*Journal of Consciousness*\n\n*Studies*.**23**(11–12): 11–39. \n\n61. Dennett, Daniel (2016). \"Illusionism as the Obvious Default Theory of Consciousness\" (http \ns://philpapers.org/rec/DENIAT-3).*Journal of Consciousness Studies*.**23**(11–12): 65–72. \n62. Carruthers, Peter (2016). \"Higher-order theories of consciousness\" (http://plato.stanford.ed \n\n79. Scarfone, Matthew (2022). \"Using and Abusing Moorean Arguments\" (https://philpapers.org/ \n\nrec/SCAUAA-2).*Journal of the American Philosophical Association*.**8**(1): 52–71. \ndoi:10.1017/apa.2020.47 (https://doi.org/10.1017%2Fapa.2020.47). S2CID 239672728 (http \ns://api.semanticscholar.org/CorpusID:239672728). \n80. Augustine of Hippo. \"Book 11, Chapter 26\".*City of God*. \n81. Descartes, René (1637). \"4\".*Discourse on the Method*. \n82. Descartes, René (1641). \"Second Meditation\".*Meditations on First Philosophy*. \n83. Chalmers, David (2020). \"Debunking Arguments for Illusionism\" (https://philpapers.org/rec/C \n\nHADAF-2).*Journal of Consciousness Studies*.**27**(5–6): 258–281. \n\n84. Chalmers, David (2002). \"Debunking Arguments for Illusionism\" (https://philpapers.org/rec/C ", - "page_start": 22, - "page_end": 22, - "source_file": "wikipedia2.pdf" + "text": "", + "page_start": 349, + "page_end": 349, + "source_file": "00-80T-80.pdf" }, { - "text": "Haack, Susan (1978). \"1. 'Philosophy of logics' \".*Philosophy of Logics*(https://philpapers.or \ng/rec/HAAPOL-2). London and New York: Cambridge University Press. pp. 1–10. ISBN 978- \n0-521-29329-7. Archived (https://web.archive.org/web/20211207200551/https://philpapers.o \nrg/rec/HAAPOL-2) from the original on 7 December 2021. Retrieved 29 December 2021. \nHaack, Susan (1996).*Deviant Logic, Fuzzy Logic: Beyond the Formalism*. University of \nChicago Press. ISBN 978-0-226-31133-3. \nHaaparanta, Leila (2009). \"1. Introduction\".*The Development of Modern Logic*. Oxford \nUniversity Press. pp. 4–6. ISBN 978-0-19-513731-6. \nHansen, Hans (2020). \"Fallacies\" (https://plato.stanford.edu/entries/fallacies/).*The Stanford*\n*Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford University. Archived (http \ns://web.archive.org/web/20210329182946/https://plato.stanford.edu/entries/fallacies/) from \nthe original on 29 March 2021. Retrieved 18 March 2021. \nHartmann, Stephan; Sprenger, Jan (2010). \"Bayesian Epistemology\".*The Routledge*\n*Companion to Epistemology*(https://philpapers.org/rec/BOVSIO). London: Routledge. \npp. 609–620. ISBN 978-0-415-96219-3. Archived (https://web.archive.org/web/2021051609 \n5047/https://philpapers.org/rec/BOVSIO) from the original on 16 May 2021. Retrieved \n4 January 2022. \nHasse, Dag Nikolaus (2008). \"Influence of Arabic and Islamic Philosophy on the Latin West\" \n(https://plato.stanford.edu/entries/arabic-islamic-influence/).*The Stanford Encyclopedia of*\n*Philosophy*. Metaphysics Research Lab, Stanford University. Retrieved 19 July 2023. \nHawthorne, James (2021). \"Inductive Logic\" (https://plato.stanford.edu/entries/logic-inductiv \ne/).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford \nUniversity. Archived (https://web.archive.org/web/20220121081805/https://plato.stanford.ed \nu/entries/logic-inductive/) from the original on 21 January 2022. Retrieved 6 January 2022. \nHintikka, Jaakko J. (2019). \"Philosophy of logic\" (https://www.britannica.com/topic/philosoph \ny-of-logic).*Encyclopædia Britannica*. Archived (https://web.archive.org/web/2015042810173 \n2/http://www.britannica.com/EBchecked/topic/346240/philosophy-of-logic) from the original \non 28 April 2015. Retrieved 21 November 2021. \nHintikka, Jaakko J. (2023). \"Logical systems\" (https://www.britannica.com/topic/logic/Logical \n-systems).*Encyclopædia Britannica*. Archived (https://web.archive.org/web/2021120718465 \n6/https://www.britannica.com/topic/logic/Logical-systems) from the original on 7 December \n2021. Retrieved 4 December 2021. \nHintikka, Jaakko (1970). \"Information, Deduction, and the A Priori\".*Noûs*.**4**(2): 135–152. \ndoi:10.2307/2214318 (https://doi.org/10.2307%2F2214318). ISSN 0029-4624 (https://searc \nh.worldcat.org/issn/0029-4624). JSTOR 2214318 (https://www.jstor.org/stable/2214318). \nHintikka, Jaakko; Sandu, Gabriel (2006). \"What is Logic?\". In Jacquette, D. (ed.). \n*Philosophy of Logic*(https://philpapers.org/rec/JAAWIL). North Holland. pp. 13–39. \nISBN 978-0-444-51541-4. Archived (https://web.archive.org/web/20211207235525/https://ph \nilpapers.org/rec/JAAWIL) from the original on 7 December 2021. Retrieved 29 December \n2021. \nHintikka, Jaakko J.; Spade, Paul Vincent. \"History of logic\" (https://www.britannica.com/topi \nc/history-of-logic).*Encyclopædia Britannica*. Retrieved 23 September 2022. \nHonderich, Ted (2005).*The Oxford Companion to Philosophy*(https://philpapers.org/rec/HO \nNTOC-2). Oxford University Press. ISBN 978-0-19-926479-7. Archived (https://web.archive. \norg/web/20210129082636/https://philpapers.org/rec/HONTOC-2) from the original on 29 \nJanuary 2021. Retrieved 2 January 2022. \nHurley, Patrick J. (2015). \"4. Categorical Syllogisms\".*Logic: The Essentials*. Wadsworth. \npp. 189–237. ISBN 978-1-305-59041-0. \nIEP Staff. \"Deductive and Inductive Arguments\" (https://iep.utm.edu/ded-ind/). Archived (http \ns://web.archive.org/web/20100528032124/https://iep.utm.edu/ded-ind/) from the original on \n28 May 2010. Retrieved 6 January 2022. ", - "page_start": 30, - "page_end": 30, - "source_file": "wikipedia1.pdf" + "text": "", + "page_start": 349, + "page_end": 349, + "source_file": "00-80T-80.pdf" }, { - "text": "Iqbal, Mohammad (2013). \"The Spirit of Muslim Culture\".*The Reconstruction of Religious*\n*Thought in Islam*(http://www.allamaiqbal.com/works/prose/english/reconstruction/). Stanford \nUniversity Press. pp. 99–115. ISBN 978-0-8047-8686-7. \nIrvine, Andrew David (2022). \"Bertrand Russell\" (https://plato.stanford.edu/entries/russell/). \n*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford University. \nRetrieved 29 September 2022. \nJacquette, Dale (2006). \"Introduction: Philosophy of logic today\".*Philosophy of Logic*(http \ns://philpapers.org/rec/JACPOL). North Holland. pp. 1–12. ISBN 978-0-444-51541-4. \nArchived (https://web.archive.org/web/20211207184932/https://philpapers.org/rec/JACPOL) \nfrom the original on 7 December 2021. Retrieved 29 December 2021. \nJago, Mark (2014).*The Impossible: An Essay on Hyperintensionality*. OUP Oxford. p. 41. \nISBN 978-0-19-101915-9. \nJanssen, Theo M. V.; Zimmermann, Thomas Ede (2021). \"Montague Semantics\" (https://plat \no.stanford.edu/entries/montague-semantics/).*The Stanford Encyclopedia of Philosophy*. \nMetaphysics Research Lab, Stanford University. pp. 3–4. Retrieved 10 March 2023. \nJohnson, Ralph H. (1999). \"The Relation Between Formal and Informal Logic\" (https://philpa \npers.org/rec/JOHTRB-2).*Argumentation*.**13**(3): 265–274. doi:10.1023/A:1007789101256 \n(https://doi.org/10.1023%2FA%3A1007789101256). S2CID 141283158 (https://api.semantic \nscholar.org/CorpusID:141283158). Archived (https://web.archive.org/web/20211207184706/ \nhttps://philpapers.org/rec/JOHTRB-2) from the original on 7 December 2021. Retrieved \n2 January 2022. \nJohnson, Ralph H. (15 July 2014).*The Rise of Informal Logic: Essays on Argumentation,*\n*Critical Thinking, Reasoning and Politics*. University of Windsor. ISBN 978-0-920233-71-9. \nKetland, Jeffrey (2005). \"Second Order Logic\".*Macmillan Encyclopedia of Philosophy*\n*Volume 8*(https://www.encyclopedia.com/humanities/encyclopedias-almanacs-transcripts-a \nnd-maps/second-order-logic). Macmillan Reference USA. pp. 707–708. ISBN 978-0-02- \n865788-2. Archived (https://web.archive.org/web/20211207184921/https://www.encyclopedi \na.com/humanities/encyclopedias-almanacs-transcripts-and-maps/second-order-logic) from \nthe original on 7 December 2021. Retrieved 4 January 2022. \nKing, Jeffrey C. (2 September 2009). \"Formal Semantics\".*The Oxford Handbook of*\n*Philosophy of Language*. pp. 557–8. doi:10.1093/oxfordhb/9780199552238.003.0023 (http \ns://doi.org/10.1093%2Foxfordhb%2F9780199552238.003.0023). ISBN 978-0-19-955223-8. \nKing, Jeffrey C. (2019). \"Structured Propositions\" (https://plato.stanford.edu/entries/propositi \nons-structured/).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, \nStanford University. Archived (https://web.archive.org/web/20211025211706/https://plato.sta \nnford.edu/entries/propositions-structured/) from the original on 25 October 2021. Retrieved \n4 December 2021. \nKlement, Kevin C. (1995b). \"Propositional Logic\" (https://iep.utm.edu/prop-log/).*Internet*\n*Encyclopedia of Philosophy*. ISSN 2161-0002 (https://search.worldcat.org/issn/2161-0002). \nRetrieved 23 September 2022. \nKline, Morris (1972).*Mathematical Thought From Ancient to Modern Times*. Oxford \nUniversity Press. ISBN 978-0-19-506135-2. \nKneale, William; Kneale, Martha (1962).*The Development of Logic*. Clarendon Press. \nISBN 978-0-19-824773-9. \nKnuuttila, Simo (1980).*Reforging the Great Chain of Being: Studies of the History of Modal*\n*Theories*. Springer Science & Business Media. p. 71. ISBN 978-90-277-1125-0. \nKorb, Kevin (2004). \"Bayesian Informal Logic and Fallacy\" (https://philpapers.org/rec/KORBI \nL).*Informal Logic*.**24**(1): 41–70. doi:10.22329/il.v24i1.2132 (https://doi.org/10.22329%2Fil. \nv24i1.2132). Archived (https://web.archive.org/web/20211110075255/https://philpapers.org/r \nec/KORBIL) from the original on 10 November 2021. Retrieved 2 January 2022. ", - "page_start": 31, - "page_end": 31, - "source_file": "wikipedia1.pdf" + "text": "", + "page_start": 349, + "page_end": 349, + "source_file": "00-80T-80.pdf" }, { - "text": "Wolf, Robert G. (1978). \"Are Relevant Logics Deviant?\" (https://philpapers.org/rec/WOLAR \nL).*Philosophia*.**7**(2): 327–340. doi:10.1007/BF02378819 (https://doi.org/10.1007%2FBF02 \n378819). S2CID 143697796 (https://api.semanticscholar.org/CorpusID:143697796). \nArchived (https://web.archive.org/web/20211216143955/https://philpapers.org/rec/WOLAR \nL) from the original on 16 December 2021. Retrieved 4 January 2022. \nZegarelli, Mark (2010).*Logic For Dummies*. John Wiley & Sons. p. 30. ISBN 978-1-118- \n05307-2. ", - "page_start": 38, - "page_end": 38, - "source_file": "wikipedia1.pdf" + "text": "", + "page_start": 349, + "page_end": 349, + "source_file": "00-80T-80.pdf" }, { - "text": "Shermer, Michael (25 October 2022).*Conspiracy: Why the Rational Believe the Irrational*. \nJHU Press. ISBN 978-1-4214-4445-1. \nSider, Theodore (2010).*Logic for Philosophy*. Oxford University Press. ISBN 978-0-19- \n957558-9. \nSiegel, Harvey; Biro, John (1997). \"Epistemic Normativity, Argumentation, and Fallacies\" (htt \nps://philpapers.org/rec/SIEENA).*Argumentation*.**11**(3): 277–292. \ndoi:10.1023/A:1007799325361 (https://doi.org/10.1023%2FA%3A1007799325361). \nS2CID 126269789 (https://api.semanticscholar.org/CorpusID:126269789). Archived (https:// \nweb.archive.org/web/20220228035651/https://philpapers.org/rec/SIEENA) from the original \non 28 February 2022. Retrieved 4 January 2022. \nSimpson, R. L. (2008).*Essentials of Symbolic Logic*(3rd ed.). Broadview Press. p. 14. \nISBN 978-1-77048-495-5. \nSmith, Robin (2022). \"Aristotle's Logic\" (https://plato.stanford.edu/entries/aristotle-logic/). \n*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford University. \nRetrieved 11 March 2023. \nSpade, Paul Vincent; Panaccio, Claude (2019). \"William of Ockham\" (https://plato.stanford.e \ndu/entries/ockham/#SummLogi).*The Stanford Encyclopedia of Philosophy*. Metaphysics \nResearch Lab, Stanford University. \nSpriggs, John (2012).*GSN – The Goal Structuring Notation: A Structured Approach to*\n*Presenting Arguments*. Springer Science & Business Media. pp. 20–22. ISBN 978-1-4471- \n2312-5. \nStairs, Allen (2017).*A Thinker's Guide to the Philosophy of Religion*. Routledge. p. 343. \nISBN 978-1-351-21981-5. \nSternberg, Robert J. \"Thought\" (https://www.britannica.com/topic/thought).*Encyclopædia*\n*Britannica*. Archived (https://web.archive.org/web/20211013145532/https://www.britannica.c \nom/topic/thought) from the original on 13 October 2021. Retrieved 14 October 2021. \nStolyar, Abram Aronovich (1 January 1984).*Introduction to Elementary Mathematical Logic*. \nCourier Corporation. ISBN 978-0-486-64561-2. \nStone, Mark A. (2012). \"Denying the Antecedent: Its Effective Use in Argumentation\" (https:// \nphilpapers.org/rec/STODTA).*Informal Logic*.**32**(3): 327–356. doi:10.22329/il.v32i3.3681 (ht \ntps://doi.org/10.22329%2Fil.v32i3.3681). Archived (https://web.archive.org/web/2022022812 \n3240/https://philpapers.org/rec/STODTA) from the original on 28 February 2022. Retrieved \n8 January 2022. \nStump, David J. \"Fallacy, Logical\" (https://www.encyclopedia.com/history/dictionaries-thesau \nruses-pictures-and-press-releases/fallacy-logical).*encyclopedia.com*. Archived (https://web. \narchive.org/web/20210215112403/https://www.encyclopedia.com/history/dictionaries-thesau \nruses-pictures-and-press-releases/fallacy-logical) from the original on 15 February 2021. \nRetrieved 20 March 2021. \nTalbott, William (2016). \"Bayesian Epistemology\" (https://plato.stanford.edu/entries/epistemo \nlogy-bayesian/).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, \nStanford University. Archived (https://web.archive.org/web/20210401034856/https://plato.sta \nnford.edu/entries/epistemology-bayesian/) from the original on 1 April 2021. Retrieved \n6 March 2021. \nTarski, Alfred (1994).*Introduction to Logic and to the Methodology of the Deductive*\n*Sciences*. Oxford University Press. p. 40. ISBN 978-0-19-802139-1. \nTondl, L. (2012).*Problems of Semantics: A Contribution to the Analysis of the Language*\n*Science*. Springer Science & Business Media. p. 111. ISBN 978-94-009-8364-9. \nVelleman, Daniel J. (2006).*How to Prove It: A Structured Approach*. Cambridge University \nPress. p. 8, 103. ISBN 978-0-521-67599-4. \nVickers, John M. (2022). \"Inductive Reasoning\" (https://www.oxfordbibliographies.com/displ \nay/document/obo-9780195396577/obo-9780195396577-0171.xml).*Oxford Bibliographies*. \nOxford University Press. Retrieved 18 January 2023. ", - "page_start": 36, - "page_end": 36, - "source_file": "wikipedia1.pdf" + "text": "", + "page_start": 349, + "page_end": 349, + "source_file": "00-80T-80.pdf" }, { - "text": "Attitudes towards physicalism also differ among professionals. In the 2009 PhilPapers survey, 56.5% of \nphilosophers surveyed subscribed to physicalism and 27.1% of philosophers surveyed rejected \nphysicalism. 16.4% fell into the \"other\" category.[51] In the 2020 PhilPapers survey, 51.93% of \nphilosophers surveyed indicated that they \"accept or lean towards\" physicalism and 32.08% indicated that \nthey reject physicalism. 6.23% were \"agnostic\" or \"undecided\".[25] \n\nDifferent solutions have been proposed to the hard problem of consciousness. The sections below \ntaxonomizes the various responses to the hard problem. The shape of this taxonomy was first introduced \nby Chalmers in a 2003 literature review on the topic.[52] The labelling convention of this taxonomy has \nbeen incorporated into the technical vocabulary of analytic philosophy, being used by philosophers such \nas Adrian Boutel,[53] Raamy Majeed,[54] Janet Levin,[55] Pete Mandik & Josh Weisberg,[56] Roberto \nPereira,[57] and Helen Yetter-Chappell.[58] ", - "page_start": 7, - "page_end": 7, - "source_file": "wikipedia2.pdf" + "text": "", + "page_start": 349, + "page_end": 349, + "source_file": "00-80T-80.pdf" } ] }, @@ -753,70 +753,70 @@ "target_page": 5, "target_passage": "The observed behaviour in region iii) can be reason- ably attributed to the decreasing relevance of the con- tribution to the total energy of the system coming from the competitive interactions among NNN planes as the film thickness decreases", "chunk_present": { - "presence": true, - "index": 3 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 23, + "page_end": 23, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 199, + "page_end": 199, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n3 ", - "page_start": 24, - "page_end": 24, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 193, + "page_end": 193, + "source_file": "00-80T-80.pdf" }, { - "text": "The observed behaviour in region iii) can be reason- \nably attributed to the decreasing relevance of the con- \ntribution to the total energy of the system coming from \nthe competitive interactions among NNN planes as the \nfilm thickness decreases; moreover, the thinness of the ", - "page_start": 5, - "page_end": 5, - "source_file": "1001.0510.pdf" + "text": "", + "page_start": 193, + "page_end": 193, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n--3- ", - "page_start": 133, - "page_end": 133, + "text": "", + "page_start": 193, + "page_end": 193, "source_file": "00-80T-80.pdf" }, { - "text": "**2002**\n\nEastern Region ÏÏÏÏÏÏÏÏ $ 564.1 \n589.6 \nCentral Region ÏÏÏÏÏÏÏÏ \n643.1 \nSouthern Region ÏÏÏÏÏÏÏ \n311.8 \nSouthwestern Region ÏÏÏ \n690.0 \nWestern Region ÏÏÏÏÏÏÏ \n.2 \nCorporate Entities(a)ÏÏÏ $ (79.7) $ 484.4 \n469.4 \n577.6 \n282.7 \n550.9 \n.1 $ 32.0 \n53.6 \n52.7 \n22.8 \n41.3 \n(2.8) $(4.1) $ 87.0 \n105.3 \n(1.5) \nÌ 118.3 \nÌ \n41.9 \nÌ 145.5 \nÌ (38.5) (120.2) \n(65.5) \n(29.1) \n(139.1) \n(.1) ", - "page_start": 89, - "page_end": 89, - "source_file": "NYSE_RSG_2004.pdf" + "text": "", + "page_start": 193, + "page_end": 193, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n-0.3 - ", - "page_start": 68, - "page_end": 68, + "text": "", + "page_start": 194, + "page_end": 194, "source_file": "00-80T-80.pdf" }, { - "text": "the moving contact line has also been reported [50]. Droplet patterns may as well be created em- \n\nploying solvent-induced dewetting of glassy polymer layers below the glass transition temperature \n\n[51–53]. \n\nNote that the dewetting of pure volatile liquids has also been studied experimentally [54] and \n\ntheoretically [55–58]. In this case, different contact line instabilities have been observed for evap- \n\norating liquid drops [59, 60]. \n\nIn the present article we review and preview the experiments and in particular the various mod- \n\nelling approaches for dewetting suspensions of (nano-)particles in volatile partially wetting sol- \n\nvents. After reviewing the basic experimental results in Section II, we discuss in Section III sev- \n\neral theoretical approaches. In particular, we present a kinetic Monte Carlo model in Section III A, \n\na dynamic density functional theory in Section III B, and a thin film evolution equation in Sec- \n\ntion III C. Finally, we conclude in Section IV by discussing advantages and shortcomings of the \n\nindividual approaches and future challenges to all of them. ", - "page_start": 4, - "page_end": 4, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 194, + "page_end": 194, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\nregion.” ", - "page_start": 423, - "page_end": 423, + "text": "", + "page_start": 194, + "page_end": 194, "source_file": "00-80T-80.pdf" }, { - "text": "**11.1.15 Thin provisioned FlashCopy**\n\nFlashCopy source and target volumes can be thin-provisioned. \n\n**Source or target thin-provisioned**\nThe most common configuration is a fully allocated source and a thin-provisioned target. By \nusing this configuration, the target uses a smaller amount of real storage than the source. ", - "page_start": 483, - "page_end": 483, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 194, + "page_end": 194, + "source_file": "00-80T-80.pdf" } ] }, @@ -833,64 +833,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 292, + "page_end": 292, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 386, + "page_end": 386, + "source_file": "00-80T-80.pdf" }, { - "text": "In a previous study, where the magnetic properties of \nHo thin films were investigated by MC simulations of a \nHeisenberg model with easy-plane single-ion anisotropy \nand six out-of-plane coupling constants (as obtained by \nexperimental neutron scattering measurements16) on a \nHCP lattice14,15, it was found that for thicknesses compa- \nrable with the helical pitch the phase diagram landscape \nis quite different from what we find here. \nIndeed, for \nn = 9 − 16, three different magnetic phases could be sin- ", - "page_start": 6, - "page_end": 6, - "source_file": "1001.0510.pdf" + "text": "", + "page_start": 384, + "page_end": 384, + "source_file": "00-80T-80.pdf" }, { - "text": "] \ni \nc \ns \n- \nl \nr \nt \n\nFerromagnetic (FM) semiconductors offer the prospect \nof combining high-density storage and gate-controlled \nlogic in a single material. The realization of spin-valve \ndevices from FM semiconductors requires the controlled \nswitching of magnetization in adjacent layers between \nantiferromagnetic (AFM) and FM configurations. This \nhas motivated several theoretical investigations of inter- \nlayer coupling in all-semiconductor devices1, and AFM \ncoupling has recently been demonstrated in (Ga,Mn)As \nmultilayers separated by p-type non-magnetic spacers2. \nHowever, the Curie temperature TC of (Ga,Mn)As is \ncurrently limited to 185 K in single layers3, and is \ntypically much lower for layers embedded within a \nheterostructure2, which is an obstacle to the practical \nimplementation of semiconductor spintronics. \n\nm \n\n. \nt \na \nm \n- \nd \nn \no \nc \n[ \n\nHere, we demonstrate an antiferromagnetic coupling \nand exchange bias in Fe/(Ga,Mn)As bilayer films, by \ncombining element-specific XMCD measurements and \nbulk-sensitive superconducting quantum interference de- \nvice (SQUID) magnetometry. As with previous studies \nof FM metal/FM semiconductor bilayers4,5 (and in con- \ntrast to AFM coupled FM metal/FM metal exchange bias \nstructures10,11) the layers are in direct contact without \na non-magnetic spacer in between. We distinguish in- \nterface and bulk (Ga,Mn)As layers that are respectively \nstrongly and weakly antiferromagnetically coupled to the \nFe overlayer. In agreement with Ref.7, the interface layer \nremains polarized at room temperature. \n\n1 \nv \n9 \n4 \n4 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2449.pdf" + "text": "", + "page_start": 384, + "page_end": 384, + "source_file": "00-80T-80.pdf" }, { - "text": "gled out, with the high-temperature, paramagnetic phase \nseparated from the low-temperature, long-range ordered \none, by an intermediate-temperature block phase where \nouter ordered 4-layers blocks coexist with some inner dis- \nordered ones. Moreover, it was observed that the phase \ntransition of such inner layers turns out to have the sig- \nnatures of a Kosterlitz-Thouless one. \n\nThe absence of the block phase in the J1 − J2 model \nhere investigated has to be attributed to the different \nrange of interactions, rather than to the different lattice \nstructure. We came to this conclusion by doing some \nsimulations using the same set of interaction constants \nemployed in Refs. 14,15, but using a BCT lattice: the \nresults we obtained for ∆ϕl with n = 12 are reported in \nFig. 9. The latter is absolutely similar to Fig.7 of Ref. 15 \nand clearly displays the footmarks of the block phase (see \ndown-triangle), with two external blocks of ordered layers \n( l =1. . . 5 and 8. . . 12 ), where ∆ϕl is roughly 10◦, sep- \narated by a block of disordered layers, and with almost ", - "page_start": 6, - "page_end": 6, - "source_file": "1001.0510.pdf" + "text": "", + "page_start": 385, + "page_end": 385, + "source_file": "00-80T-80.pdf" }, { - "text": "derived as well. There have been several proposals to \nopen the fermion gap for the non-Abelian phase without \nspoiling exact solvability4,6. And many generalizations \nto other(even 3D) lattices have been developed in the \nlast few years10–16. All these efforts have significantly \nenriched our knowledge of exactly solvable models and \nquantum phases of matter. \n\nFIG. 2: Left: the physical spin lattice for the model (8). The \ndash circles are honeycomb lattice sites, each of which is ac- \ntually a cluster of four physical spins. The dash straight lines \nare honeycomb lattice bonds, with their type x, y, z labeled. \nThe interaction between clusters connected by x, y, z bonds \nare the Jx,y,z terms in (8) or (9) respectively. Note this is not \nthe 3-12 lattice used in Ref.9,10. Right: enlarged picture of \nthe clusters with the four physical spins labeled as 1, . . . , 4. \nThick solid bonds within one cluster have large antiferromag- \nnetic Heisenberg coupling Jcluster. ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0266.pdf" + "text": "", + "page_start": 385, + "page_end": 385, + "source_file": "00-80T-80.pdf" }, { - "text": "measurements were performed on beamline I06 at the \nDiamond Light Source, and on beamline 4.0.2 at the Ad- \nvanced Light Source. Total-electron yield (TEY) and \nfluorescence yield (FY) were monitored simultaneously \nusing the sample drain current and the photocurrent of a \ndiode mounted at 90◦ to the incident beam, respectively. \nwere \nmagnetometry \nand \ncontrol Fe/GaAs(001) \nfirst \non \nperformed \ngrown under \nthe \nsamples, \n(Ga,Mn)As/GaAs(001) \nsame conditions as the bilayers, \nto determine the \nmagnetic anisotropies of the individual layers and the \nCurie temperature of the (Ga,Mn)As layer. The Fe film \nhas a uniaxial magnetic anisotropy with easy axis along \nthe [110] orientation, similar to previous studies6. For \nthe (Ga,Mn)As control sample, there is a competition \nbetween cubic and uniaxial magnetic anisotropies, with \nthe former dominant at low temperatures and favoring \neasy axes along the in-plane h100i orientations, and the \nlatter dominant close to TC (∼35 K) giving an easy axis \nalong the [1¯10] orientation. Figure 1 shows [110] magne- \ntization versus temperature curves and low temperature \nhysteresis loops for a bilayer film containing a 20 nm \nthick (Ga,Mn)As layer. The total remnant moment of \nthe bilayer film decreases on cooling under zero magnetic \nfield below the TC of the (Ga,Mn)As, indicating that \nthis layer aligns antiparallel to the Fe magnetization \nat zero field. The hysteresis curve shows a two-step \nmagnetization reversal, indicating different behavior of \nthe Fe and (Ga,Mn)As layers, with the smaller loop \nattributed to the dilute moment (Ga,Mn)As film. The \nminor hysteresis loop shown in Fig. 1 clearly shows a \nshift from zero field by a bias field HE, indicating that \nthe Fe layer induces an exchange bias in the magnetic \nsemiconductor. The shape and size of the minor loop \nis in agreement with the hysteresis loop for the control \n(Ga,Mn)As sample, also shown in Fig. 1. This strongly \nindicates that the exchange bias affects the whole of the \n(Ga,Mn)As layer in the bilayer sample. \n\nSQUID ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2449.pdf" + "text": "", + "page_start": 385, + "page_end": 385, + "source_file": "00-80T-80.pdf" }, { - "text": "I. INTRODUCTION \n\nfrustrated magnetic \nsystems1 still raises great interest, both in consequence \nof theoretical aspects, related to their peculiar criti- \ncal properties2, and in view of possible technological \napplications3. Indeed, beside conventional ferromagnetic \nor antiferromagnetic phase transitions, in many new ma- \nterials other nontrivial and unconventional forms of or- \ndering have been observed4,5. A quantity of particular \ninterest in this context is the spin chirality, an order pa- \nrameter which turned out to be extremely relevant in, \ne.g., magnetoelectric materials6, itinerant MnSi7, binary \ncompounds as FeGe8, glass transition of spins9, and XY \nhelimagnets, as Holmium, Terbium or Dysprosium10. In \nthe latter case, a new universality class was predicted be- \ncause a Z2 × SO(2) symmetry is spontaneously broken \nin the ordered phase2: In fact, when dealing with such \nsystems, in addition to the SO(2) symmetry of the spin \ndegrees of freedom ~Si, one has to consider also the Z2 \nsymmetry of the spin chirality κij ∝ \n\nThe study of low dimensional ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0510.pdf" + "text": "", + "page_start": 385, + "page_end": 385, + "source_file": "00-80T-80.pdf" }, { - "text": "L2,3 absorption edges in order to determine the magnetic \nresponse of the individual elements. In L2,3 XMCD, elec- \ntrons are excited from a 2p core level to the unoccupied \n3d valence states of the element of interest by circularly \npolarized x-rays at the resonance energies of the transi- \ntions. The difference in absorption for opposite polariza- \ntions gives a direct and element-specific measurement of \nthe projection of the 3d magnetic moment along the x- \nray polarization vector. The absorption cross-section is \nconventionally obtained by measuring the decay products \n– either fluorescent x-rays or electrons – of the photoex- \ncited core hole. The type of decay product measured \ndetermines the probing depth of the technique. For Mn \nL2,3 absorption, the probing depths for FY and TEY de- \ntection are λF Y ≈ 100 nm and λT EY ≈ 3 nm. \nIn the \ncurrent experiment, the Mn XMCD measured using FY \nand TEY are thus sensitive to the bulk of the (Ga,Mn)As \nfilm and the near-interface layers, respectively. ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2449.pdf" + "text": "", + "page_start": 385, + "page_end": 385, + "source_file": "00-80T-80.pdf" }, { - "text": "The kinetic Monte Carlo model for two-dimensional dewetting nanofluids [33] was first proposed \n\nin Ref. [35] and extended to include next-nearest neighbour interactions in [37]. The two key \n\nassumptions used are: (i) the relevant processes can be mapped on to a two-dimensional lattice \n\ngas model, thereby neglecting continuous changes in the thickness of the evaporating film, and (ii) \n\nall relevant dynamics results from diffusing nanoparticles and evaporating/condensing solvent. \n\nThe model builds on an Ising-type model for the liquid-gas phase transition. The surface is divided \n\nup into a regular array of lattice sites whose size is dictated by the nanoparticles. One then con- \n\nsiders each lattice site to be occupied either by a nanoparticle, liquid or vapour. This effectively \n\nmaps the system onto a two-dimensional two-component lattice gas having two fields n and l. The \n\nresulting three possible states of a cell are: liquid (l = 1, n = 0), nanoparticle (l = 0, n = 1), \n\nand vapour (l = 0, n = 0, i.e., cell empty). The energy of an overall configuration is given by the ", - "page_start": 9, - "page_end": 9, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 163, + "page_end": 163, + "source_file": "sg246915.pdf" } ] }, @@ -901,70 +901,70 @@ "target_page": 1, "target_passage": "For n > 16, n being the number of spin layers in the film, a correct bulk limit is reached", "chunk_present": { - "presence": true, - "index": 4 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 51, + "page_end": 51, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 232, + "page_end": 232, + "source_file": "00-80T-80.pdf" }, { - "text": "The exactly solvable Kitaev honeycomb lattice model is realized as the low energy effect Hamil- \ntonian of a spin-1/2 model with spin rotation and time-reversal symmetry. The mapping to low \nenergy effective Hamiltonian is exact, without truncation errors in traditional perturbation series \nexpansions. This model consists of a honeycomb lattice of clusters of four spin-1/2 moments, and \ncontains short-range interactions up to six-spin(or eight-spin) terms. The spin in the Kitaev model \nis represented not as these spin-1/2 moments, but as pseudo-spin of the two-dimensional spin singlet \nsector of the four antiferromagnetically coupled spin-1/2 moments within each cluster. Spin corre- \nlations in the Kitaev model are mapped to dimer correlations or spin-chirality correlations in this \nmodel. This exact construction is quite general and can be used to make other interesting spin-1/2 \nmodels from spin rotation invariant Hamiltonians. We discuss two possible routes to generate the \nhigh order spin interactions from more natural couplings, which involves perturbative expansions \nthus breaks the exact mapping, although in a controlled manner. ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0266.pdf" + "text": "", + "page_start": 234, + "page_end": 234, + "source_file": "00-80T-80.pdf" }, { - "text": "In this Section we will construct the pseudo-spin-1/2 \nfrom a cluster of four physical spins, and map the phys- \nical spin operators to pseudo-spin operators. The map- \nping constructed here will be used in later Sections to \nconstruct the effective Kitaev model. In this Section we \nwill work entirely within the four-spin cluster, all unspec- \nified physical spin subscripts take values 1, . . . , 4. \n\nSk [or the spin-chirality Sj · (Sk × \n\nConsider a cluster of four spin-1/2 moments(called \nphysical spins hereafter), \nlabeled by S1,...,4, antiferro- \nmagnetically coupled to each other (see the right bot- \ntom part of FIG. 2). The Hamiltonian within the clus- \nter(up to a constant) is simply the Heisenberg antiferro- \nmagnetic(AFM) interactions, \n\nOne major drawback of the model to be presented is \nthat it contains high order spin interactions(involves up \nto six or eight spins), thus is still unnatural. However it \nopens the possibility to realize exotic (exactly solvable) \nmodels from spin-1/2 Hamiltonian with spin rotation in- \nvariant interactions. We will discuss two possible routes \nto reduce this artificialness through controlled perturba- \ntive expansions, by coupling to optical phonons or by \nmagnetic couplings between the elementary units. ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0266.pdf" + "text": "", + "page_start": 234, + "page_end": 234, + "source_file": "00-80T-80.pdf" }, { - "text": "teractions by including six different exchange constants \nalong the c crystallographic axis, and gives a helix pitch \nwave-vector Qz such that Qzc′ ≃ 30◦, where c′ = c/2 is \nthe distance between nearest neighboring spin layers par- \nallel to the ab crystallographic planes, henceforth denoted \nalso as x − y planes, while z will be taken parallel to c. \nFor n > 16, n being the number of spin layers in the film, \na correct bulk limit is reached, while for lower n the film \nproperties are clearly affected by the strong competition \namong the helical pitch and the surface effects, which in- \nvolve the majority of the spin layers. \nIn the thickness \nrange n = 9 − 16, i.e. right for thickness values com- \nparable with the helical pitch, three different magnetic \nphases emerged, with the high-temperature, disordered, \nparamagnetic phase and the low-temperature, long-range \nordered one separated by an intriguing, \nintermediate- \ntemperature block phase, where outer ordered layers co- \nexist with some inner disordered ones, the phase tran- \nsition of the latter eventually displaying the signatures \nof a Kosterlitz-Thouless one. Finally, for n ≤ 7 the film \ncollapses once and for all to a quasi-collinear order. ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0510.pdf" + "text": "", + "page_start": 233, + "page_end": 233, + "source_file": "00-80T-80.pdf" }, { - "text": "We constructed the exactly solvable Kitaev honeycomb \nmodel1 as the exact low energy effective Hamiltonian of \na spin-1/2 model [equations (8) or (9)] with spin-rotation \nand time reversal symmetry. The spin in Kitaev model is \nrepresented as the pseudo-spin in the two-fold degenerate \nspin singlet subspace of a cluster of four antiferromag- \nnetically coupled spin-1/2 moments. The physical spin \nmodel is a honeycomb lattice of such four-spin clusters, \nwith certain inter-cluster interactions. The machinery \nfor the exact mapping to pseudo-spin Hamiltonian was \ndeveloped (see e.g. TABLE I), which is quite general \nand can be used to construct other interesting (exactly \nsolvable) spin-1/2 models from spin rotation invariant \nsystems. \n\nThe generic couplings in (A1) [second term] can be \nconverted to couplings to these orthogonal modes, \n\nwhere Q are generalized coordinates of the corresponding \nmodes, functions f can be read off from TABLE 1.2 of \nRef.35. For the A mode, δrℓm = 2/3QA, so f A is \np \n\nf A = ", - "page_start": 8, - "page_end": 8, - "source_file": "1001.0266.pdf" + "text": "", + "page_start": 233, + "page_end": 233, + "source_file": "00-80T-80.pdf" }, { - "text": "3 \n\nphysical spin \n\npseudo-spin \nτ x \n\nP12, and P34 \nP13, and P24 \nP14, and P23 \nχ234, χ341, (1/2)τ x + (√3/2)τ y \n(√3/2)τ y \n(1/2)τ x \nχ412, and χ123 (√3/4)τ z \n− \n− − \n\n− − \n\nTABLE I: Correspondence between physical spin operators \nand pseudo-spin operators in the physical spin singlet sector of \nthe four antiferromagnetically coupled physical spins. Pjk = \n2Sj \nSℓ) \nare spin-chirality operators. Note that several physical spin \noperators may correspond to the same pseudo-spin operator. \n| ↑↓↓↑i(cid:17) \n(3) \n\nwhere ω = e2πi/3 is the complex cubic root of unity, \nand other states on the right-hand-side(RHS) are \n| ↓↓↑↑i \nbasis states of the four-spin system, in terms of Sz quan- \ntum numbers of physical spins 1, . . . , 4 in sequential or- \nder. This pseudo-spin representation has been used by \nHarris et al. to study magnetic ordering in pyrochlore \nantiferromagnets21. ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0266.pdf" + "text": "", + "page_start": 233, + "page_end": 233, + "source_file": "00-80T-80.pdf" }, { - "text": "SPINS AND PROBLEMS OP SPIN \nRECOVERY \n\nThe motion of an airplane in a spin can \ninvolve many complex aerodynamic and in- \nertia forces and moments. However, there are \ncertain \nregarding \nspins and spin recoveries with which all \nThe spin differs \naviators should be familiar. \nfrom a spiral dive in that \nthe spin always \ninvolves flight at high angle of attack while \nthe spiral dive involves a spiral motion of \nthe airplane at relatively low angle of attack. \nThe stall characteristics and stability of \nlift coefficients are im- \nthe airplane at high \nportant in the initial tendencies of the airplane. \nAs previously mentioned, it \nis desirable to \nhave the wing initiate stall at the root first \nfirst. Such a stall pattern \nrather than \nprevents the undesirable rolling moments at \nlift coeGients, provides suitable stall \nhigh \n\nfundamental relationships ", - "page_start": 325, - "page_end": 325, + "text": "", + "page_start": 398, + "page_end": 398, "source_file": "00-80T-80.pdf" }, { - "text": "However, in the original Kitaev model and its later \ngeneralizations in the form of spin models, spin rotation \nsymmetry is explicitly broken. This makes them harder \nto realize in solid state systems. There are many pro- \nposals to realized the Kitaev model in more controllable \nin cold atom optical lattices17,18, or in \nsituations, e.g. \nsuperconducting circuits19. But it is still desirable for \ntheoretical curiosity and practical purposes to realize the \nKitaev-type models in spin rotation invariant systems. \n\ntion III the Kitaev model will be explicitly constructed \nusing this formalism, and some properties of this con- \nstruction will be discussed. In Section IV we will discuss \ntwo possible ways to generate the high order spin in- \nteractions involved in the construction of Section III by \nperturbative expansions. Conclusions and outlook will \nbe summarized in Section V. \n\nIn this paper we realize the Kitaev honeycomb lattice \nmodel as the low energy Hamiltonian for a spin rotation \ninvariant system. The trick is not to use the physical spin \nas the spin in the Kitaev model, instead the spin-1/2 in \nKitaev model is from some emergent two-fold degener- \nate low energy states in the elementary unit of physical \nsystem. This type of idea has been explored recently by \nJackeli and Khaliullin20, in which the spin-1/2 in the Ki- \ntaev model is the low energy Kramers doublet created by \nstrong spin-orbit coupling of t2g orbitals. In the model \npresented below, the Hilbert space of spin-1/2 in the Ki- \ntaev model is actually the two dimensional spin singlet \nsector of four antiferromagnetically coupled spin-1/2 mo- \nments, and the role of spin-1/2 operators(Pauli matrices) \nin the Kitaev model is replaced by certain combinations \nSℓ)] between the \nof Sj · \nfour spins. \n\nII. FORMULATION OF THE PSEUDO-SPIN-1/2 \nFROM FOUR-SPIN CLUSTER. ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0266.pdf" + "text": "", + "page_start": 24, + "page_end": 24, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": "of the two clusters can generate at lowest order the de- \nsired high order spin interactions. In Subsection IV B we \nwill introduce certain magnetic, e.g. Heisenberg-type, in- \nteractions between physical spins of different clusters, at \nlowest order(second order) of perturbation theory the de- \nsired high order spin interactions can be achieved. These \napproaches involve truncation errors in the perturbation \nseries, thus the mapping to low energy effect Hamilto- \nnian will no longer be exact. However the error intro- \nduced may be controlled by small expansion parameters. \nIn this Section we denote the physical spins on cluster \nj(k) as j1, . . . , j4 (k1, . . . , k4), and denote pseudo-spins \non cluster j(k) as ~τj (~τk). \n\nIt is tempting to call this as an exactly solved spin liq- \nuid with spin gap ( \nJcluster), an extremely short-range \nresonating valence bond(RVB) state, from a model with \nspin rotation and time reversal symmetry. However it \nshould be noted that the unit cell of this model contains \nan even number of spin-1/2 moments (so does the orig- \ninal Kitaev model) which does not satisfy the stringent \ndefinition of spin liquid requiring odd number of elec- \ntrons per unit cell. Several parent Hamiltonians of spin \nliquids have already been constructed. See for example, \nRef.24–27. \n\n∼ ", - "page_start": 5, - "page_end": 5, - "source_file": "1001.0266.pdf" + "text": "", + "page_start": 233, + "page_end": 233, + "source_file": "00-80T-80.pdf" } ] }, @@ -981,64 +981,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, + "text": "", + "page_start": 18, + "page_end": 18, "source_file": "Excel Training Manual 1.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 358, + "page_end": 358, + "source_file": "00-80T-80.pdf" }, { - "text": "Our Nordstrom.com, Nordstromrack.com and HauteLook channels continued to experience outsized growth. Nordstrom.com net sales \nincreased 23% and Nordstromrack.com and HauteLook net sales increased 22%, both driven by expanded merchandise selection and \nongoing technology investments to enhance the customer experience. \n\nNordstrom Rack net sales increased $477, or 17%, compared with 2013, reflecting incremental volume from existing stores and the impact of \n27 new stores since fiscal 2013. Comparable sales increased 3.8% for the year. Shoes and Accessories were the top-performing categories \nfor the year. On a comparable basis, the average selling price of Nordstrom Rack merchandise increased while the number of items sold was \nflat. \n\nNet Sales (2013 vs. 2012) \nNet sales for 2013 increased 3.4% compared with 2012, driven by a comparable sales increase of 2.5%, attributable to growth at \nNordstrom.com and Nordstrom Rack’s accelerated store expansion. During 2013, we opened 22 Nordstrom Rack stores and relocated one \nNordstrom full-line store and two Nordstrom Rack stores. These additions represented 1.6% of our total net sales for 2013 and increased our \nsquare footage by 2.9%. The 53rd week in 2012 contributed approximately $162 in additional net sales. ", - "page_start": 31, - "page_end": 31, - "source_file": "NYSE_JWN_2014.pdf" + "text": "", + "page_start": 356, + "page_end": 356, + "source_file": "00-80T-80.pdf" }, { - "text": "CREDIT SEGMENT \nThe Nordstrom credit and debit card products are designed to strengthen customer relationships and grow retail sales by providing loyalty \nbenefits, valuable services and payment products. We believe our credit business allows us to build deeper relationships with our customers \nby fully integrating the Nordstrom Rewards program with our retail stores and providing better service, which in turn fosters greater customer \nloyalty. Our cardholders tend to visit our stores more frequently and spend more with us than non-cardholders. Our Nordstrom private label \ncredit and debit cards can be used only at our Nordstrom full-line stores in the U.S., Nordstrom Rack stores and online at Nordstrom.com, \nNordstromrack.com and HauteLook (“inside volume”), while our Nordstrom Visa credit cards also may be used for purchases outside of \nNordstrom (“outside volume”). Cardholders participate in the Nordstrom Rewards program through which cardholders accumulate points for \ntheir purchases. Upon reaching a certain points threshold, cardholders receive Nordstrom Notes®, which can be redeemed for goods or \nservices at Nordstrom full-line stores in the U.S. and Canada, Nordstrom Rack stores and at Nordstrom.com. Nordstrom Rewards customers \nreceive reimbursements for alterations, get Personal Triple Points days and have early access to sales events. With increased spending, \nthey can receive additional amounts of these benefits as well as access to exclusive fashion and shopping events. ", - "page_start": 33, - "page_end": 33, - "source_file": "NYSE_JWN_2014.pdf" + "text": "", + "page_start": 357, + "page_end": 357, + "source_file": "00-80T-80.pdf" }, { - "text": "As of March 16, 2015, the**Retail**segment includes our 115 “Nordstrom” branded full-line stores in the U.S. and Nordstrom.com, 167 off-price \nNordstrom Rack stores, two Canada full-line stores, Nordstromrack.com and HauteLook, and other retail channels including five Trunk Club \nshowrooms and TrunkClub.com, our two Jeffrey boutiques and one clearance store that operates under the name “Last Chance.” Through \nthese multiple retail channels, we strive to deliver the best customer experience possible. We offer an extensive selection of high-quality \nbrand-name and private label merchandise focused on apparel, shoes, cosmetics and accessories. Our integrated Nordstrom full-line stores \nand online store allow us to provide our customers with a seamless shopping experience. In-store purchases are primarily fulfilled from that \nstore’s inventory, but when inventory is unavailable at that store it may also be shipped to our customers from our fulfillment center in Cedar \nRapids, Iowa, or from other Nordstrom full-line stores. Online purchases are primarily shipped to our customers from our Cedar Rapids \nfulfillment center, but may also be shipped from our Nordstrom full-line stores. Our customers can also pick up online orders in our Nordstrom \nfull-line stores if inventory is available at one of our locations. These capabilities allow us to better serve customers across various channels \nand improve sales. Nordstrom Rack stores purchase high-quality brand-name merchandise primarily from the same vendors carried in \nNordstrom full-line stores and also serve as outlets for clearance merchandise from our Nordstrom stores and other retail channels. During \nthe year, we launched Nordstromrack.com and the associated mobile app. Nordstromrack.com combines the technology expertise of \nHauteLook with the merchant expertise of Nordstrom Rack. Nordstromrack.com and HauteLook offer limited-time sale events on fashion and \nlifestyle brands as well as a persistent selection of off-price, high-quality brand-name merchandise and are integrated with a single customer \nlog-in, shared shopping cart and streamlined checkout process. Furthermore, we can accommodate returns from these sites by mail or at \nany Nordstrom Rack location. ", - "page_start": 16, - "page_end": 16, - "source_file": "NYSE_JWN_2014.pdf" + "text": "", + "page_start": 357, + "page_end": 357, + "source_file": "00-80T-80.pdf" }, { - "text": "**Nordstrom, Inc.**\n**Notes to Consolidated Financial Statements**\nDollar and share amounts in millions except per share, per option and per unit amounts \n\n**NOTE 1: NATURE OF OPERATIONS AND SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES**\n\n**The Company**\nFounded in 1901 as a shoe store in Seattle, Washington, Nordstrom, Inc. is now a leading fashion specialty retailer that offers customers a \nwell-edited selection of high-quality fashion brands focused on apparel, shoes, cosmetics and accessories for men, women and children. This \nbreadth of merchandise allows us to serve a wide range of customers who appreciate quality fashion and a superior shopping experience. \nWe offer an extensive selection of high-quality brand-name and private label merchandise through multiple retail channels, including 116 \n“Nordstrom” branded full-line stores in the U.S. and at Nordstrom.com (collectively, “Nordstrom”), one Canada full-line store, 167 off-price \nNordstrom Rack stores, Nordstromrack.com and HauteLook, five Trunk Club showrooms and TrunkClub.com, two Jeffrey boutiques and one \nLast Chance clearance store. Our stores are located in 38 states throughout the U.S and in one province in Canada. ", - "page_start": 53, - "page_end": 53, - "source_file": "NYSE_JWN_2014.pdf" + "text": "", + "page_start": 357, + "page_end": 357, + "source_file": "00-80T-80.pdf" }, { - "text": "**PART I**\n\n**Item 1. Business.**\n\n**DESCRIPTION OF BUSINESS**\nFounded in 1901 as a retail shoe business in Seattle, Nordstrom later incorporated in Washington state in 1946 and went on to become one \nof the leading fashion specialty retailers based in the U.S. As of March 16, 2015, we operate 290 U.S. stores located in 38 states as well as a \nrobust ecommerce business through Nordstrom.com, Nordstromrack.com and HauteLook and TrunkClub.com. We also operate two \nNordstrom full-line stores in Canada. The west and east coasts of the U.S. are the areas in which we have the largest presence. We have \ntwo reportable segments: Retail and Credit. ", - "page_start": 16, - "page_end": 16, - "source_file": "NYSE_JWN_2014.pdf" + "text": "", + "page_start": 357, + "page_end": 357, + "source_file": "00-80T-80.pdf" }, { - "text": "CONCLUSION \n\nOur strategy is based on the customer and will \n\n**Peter E. Nordstrom**\nPresident of Merchandising, Nordstrom, Inc. \nremain so. Customers’ expectations of speed, \n\nconvenience, personalization and mobile are \n\nincreasing. As we continue on our journey, we \n\nrecognize it’s imperative for us to invest for the \n\n**Erik B. Nordstrom**\nPresident of Nordstrom.com, Nordstrom, Inc. \nfuture and find ways to make our stores more ", - "page_start": 9, - "page_end": 9, - "source_file": "NYSE_JWN_2014.pdf" + "text": "", + "page_start": 357, + "page_end": 357, + "source_file": "00-80T-80.pdf" }, { - "text": "**RETURN POLICY**\nWe have a fair and liberal approach to returns as part of our objective to provide high-quality customer service. We do not have a formal \nreturn policy at our Nordstrom full-line stores or online at Nordstrom.com. Our goal is to take care of our customers, which includes making \nreturns and exchanges easy, whether in stores or online, where we offer free shipping and free returns. Our Nordstrom Rack stores generally \naccept returns up to 90 days from the date of purchase with the original price tag and sales receipt, and also accept returns of \nNordstromrack.com and HauteLook merchandise. Nordstromrack.com and HauteLook generally accept returns of apparel, footwear and \naccessories within 90 days from the date of shipment. \n\n**SEASONALITY**\nDue to our Anniversary Sale in July and the holidays in December, our sales are typically higher in the second and fourth quarters than in the \nfirst and third quarters of the fiscal year. ", - "page_start": 16, - "page_end": 16, - "source_file": "NYSE_JWN_2014.pdf" + "text": "", + "page_start": 21, + "page_end": 21, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "of 300 stores by 2020. Customers continue \n\nto respond favorably to the treasure-hunt \n\nexperience that defines Nordstrom Rack \n\nstores. As we expand in many markets for the \n\nfirst time, we hope to continue delivering a \n\ngreat experience, as this business represents \n\na terrific opportunity for us to attract new \n\ncustomers. Last year, Nordstrom Rack \n\nbusiness based on a service model that is highly was our biggest source of new customers, \n\ncomplementary to our own. We believe Trunk attracting nearly 4 million. Also, a year ago, \n\nClub is a natural extension of our business, we began accepting returns of HauteLook \n\nand together we will continue to evolve and and Nordstromrack.com merchandise at any \n\nbring together the online and offline worlds Nordstrom Rack store. This drove nearly \n\nto deliver a great shopping experience. 1 million trips to Nordstrom Rack stores in \n\n2014. The Nordstrom Rack customer also \n\ntends to be younger than our full-line customer, \n\nOFF-PRICE: NORDSTROM RACK, \nNORDSTROMRACK.COM AND HAUTELOOK and there is a meaningful opportunity for these ", - "page_start": 7, - "page_end": 7, - "source_file": "NYSE_JWN_2014.pdf" + "text": "", + "page_start": 357, + "page_end": 357, + "source_file": "00-80T-80.pdf" } ] }, @@ -1055,64 +1055,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 404, + "page_end": 404, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 218, + "page_end": 218, + "source_file": "00-80T-80.pdf" }, { - "text": "CREDIT SEGMENT \nThe Nordstrom credit and debit card products are designed to strengthen customer relationships and grow retail sales by providing loyalty \nbenefits, valuable services and payment products. We believe our credit business allows us to build deeper relationships with our customers \nby fully integrating the Nordstrom Rewards program with our retail stores and providing better service, which in turn fosters greater customer \nloyalty. Our cardholders tend to visit our stores more frequently and spend more with us than non-cardholders. Our Nordstrom private label \ncredit and debit cards can be used only at our Nordstrom full-line stores in the U.S., Nordstrom Rack stores and online at Nordstrom.com, \nNordstromrack.com and HauteLook (“inside volume”), while our Nordstrom Visa credit cards also may be used for purchases outside of \nNordstrom (“outside volume”). Cardholders participate in the Nordstrom Rewards program through which cardholders accumulate points for \ntheir purchases. Upon reaching a certain points threshold, cardholders receive Nordstrom Notes®, which can be redeemed for goods or \nservices at Nordstrom full-line stores in the U.S. and Canada, Nordstrom Rack stores and at Nordstrom.com. Nordstrom Rewards customers \nreceive reimbursements for alterations, get Personal Triple Points days and have early access to sales events. With increased spending, \nthey can receive additional amounts of these benefits as well as access to exclusive fashion and shopping events. ", - "page_start": 33, - "page_end": 33, - "source_file": "NYSE_JWN_2014.pdf" + "text": "", + "page_start": 219, + "page_end": 219, + "source_file": "00-80T-80.pdf" }, { - "text": "**Nordstrom, Inc.**\n**Notes to Consolidated Financial Statements**\nDollar and share amounts in millions except per share, per option and per unit amounts \n\n**NOTE 1: NATURE OF OPERATIONS AND SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES**\n\n**The Company**\nFounded in 1901 as a shoe store in Seattle, Washington, Nordstrom, Inc. is now a leading fashion specialty retailer that offers customers a \nwell-edited selection of high-quality fashion brands focused on apparel, shoes, cosmetics and accessories for men, women and children. This \nbreadth of merchandise allows us to serve a wide range of customers who appreciate quality fashion and a superior shopping experience. \nWe offer an extensive selection of high-quality brand-name and private label merchandise through multiple retail channels, including 116 \n“Nordstrom” branded full-line stores in the U.S. and at Nordstrom.com (collectively, “Nordstrom”), one Canada full-line store, 167 off-price \nNordstrom Rack stores, Nordstromrack.com and HauteLook, five Trunk Club showrooms and TrunkClub.com, two Jeffrey boutiques and one \nLast Chance clearance store. Our stores are located in 38 states throughout the U.S and in one province in Canada. ", - "page_start": 53, - "page_end": 53, - "source_file": "NYSE_JWN_2014.pdf" + "text": "", + "page_start": 361, + "page_end": 361, + "source_file": "00-80T-80.pdf" }, { - "text": "CONCLUSION \n\nOur strategy is based on the customer and will \n\n**Peter E. Nordstrom**\nPresident of Merchandising, Nordstrom, Inc. \nremain so. Customers’ expectations of speed, \n\nconvenience, personalization and mobile are \n\nincreasing. As we continue on our journey, we \n\nrecognize it’s imperative for us to invest for the \n\n**Erik B. Nordstrom**\nPresident of Nordstrom.com, Nordstrom, Inc. \nfuture and find ways to make our stores more ", - "page_start": 9, - "page_end": 9, - "source_file": "NYSE_JWN_2014.pdf" + "text": "", + "page_start": 219, + "page_end": 219, + "source_file": "00-80T-80.pdf" }, { - "text": "Our Nordstrom.com, Nordstromrack.com and HauteLook channels continued to experience outsized growth. Nordstrom.com net sales \nincreased 23% and Nordstromrack.com and HauteLook net sales increased 22%, both driven by expanded merchandise selection and \nongoing technology investments to enhance the customer experience. \n\nNordstrom Rack net sales increased $477, or 17%, compared with 2013, reflecting incremental volume from existing stores and the impact of \n27 new stores since fiscal 2013. Comparable sales increased 3.8% for the year. Shoes and Accessories were the top-performing categories \nfor the year. On a comparable basis, the average selling price of Nordstrom Rack merchandise increased while the number of items sold was \nflat. \n\nNet Sales (2013 vs. 2012) \nNet sales for 2013 increased 3.4% compared with 2012, driven by a comparable sales increase of 2.5%, attributable to growth at \nNordstrom.com and Nordstrom Rack’s accelerated store expansion. During 2013, we opened 22 Nordstrom Rack stores and relocated one \nNordstrom full-line store and two Nordstrom Rack stores. These additions represented 1.6% of our total net sales for 2013 and increased our \nsquare footage by 2.9%. The 53rd week in 2012 contributed approximately $162 in additional net sales. ", - "page_start": 31, - "page_end": 31, - "source_file": "NYSE_JWN_2014.pdf" + "text": "", + "page_start": 219, + "page_end": 219, + "source_file": "00-80T-80.pdf" }, { - "text": "As of March 16, 2015, the**Retail**segment includes our 115 “Nordstrom” branded full-line stores in the U.S. and Nordstrom.com, 167 off-price \nNordstrom Rack stores, two Canada full-line stores, Nordstromrack.com and HauteLook, and other retail channels including five Trunk Club \nshowrooms and TrunkClub.com, our two Jeffrey boutiques and one clearance store that operates under the name “Last Chance.” Through \nthese multiple retail channels, we strive to deliver the best customer experience possible. We offer an extensive selection of high-quality \nbrand-name and private label merchandise focused on apparel, shoes, cosmetics and accessories. Our integrated Nordstrom full-line stores \nand online store allow us to provide our customers with a seamless shopping experience. In-store purchases are primarily fulfilled from that \nstore’s inventory, but when inventory is unavailable at that store it may also be shipped to our customers from our fulfillment center in Cedar \nRapids, Iowa, or from other Nordstrom full-line stores. Online purchases are primarily shipped to our customers from our Cedar Rapids \nfulfillment center, but may also be shipped from our Nordstrom full-line stores. Our customers can also pick up online orders in our Nordstrom \nfull-line stores if inventory is available at one of our locations. These capabilities allow us to better serve customers across various channels \nand improve sales. Nordstrom Rack stores purchase high-quality brand-name merchandise primarily from the same vendors carried in \nNordstrom full-line stores and also serve as outlets for clearance merchandise from our Nordstrom stores and other retail channels. During \nthe year, we launched Nordstromrack.com and the associated mobile app. Nordstromrack.com combines the technology expertise of \nHauteLook with the merchant expertise of Nordstrom Rack. Nordstromrack.com and HauteLook offer limited-time sale events on fashion and \nlifestyle brands as well as a persistent selection of off-price, high-quality brand-name merchandise and are integrated with a single customer \nlog-in, shared shopping cart and streamlined checkout process. Furthermore, we can accommodate returns from these sites by mail or at \nany Nordstrom Rack location. ", - "page_start": 16, - "page_end": 16, - "source_file": "NYSE_JWN_2014.pdf" + "text": "", + "page_start": 219, + "page_end": 219, + "source_file": "00-80T-80.pdf" }, { - "text": "At Nordstrom Rack, we offer customers great brands at great prices, with 48 of the top 50 full-line brands represented. We opened 27 \nNordstrom Rack stores in 2014, a record number of openings, contributing to Nordstrom Rack’s total sales growth of 17%. \n\nOur online businesses continue to be our fastest-growing channels. In the spring of 2014, we expanded our capabilities through the launch of \nNordstromrack.com, providing a seamless integration with HauteLook. We more than doubled our merchandise selection, which accelerated \ngrowth in this channel in the second half of 2014. Demonstrating synergies across our businesses, we enabled customers to return \npurchases from HauteLook and Nordstromrack.com to any of our Nordstrom Rack stores, which drove nearly one million incremental trips to \nNordstrom Rack stores. \n\nNordstrom.com finished its fifth consecutive year of approximately 20% or more comparable sales growth, with a key driver being increased \nmerchandise selection. In 2015, we plan to open our third fulfillment center, located in Pennsylvania, which will enhance the customer \nexperience through faster delivery. Furthermore, we have extended our full-price offering with our acquisition of Trunk Club, a high-growth \nbusiness offering a new approach to personalized service. ", - "page_start": 28, - "page_end": 28, - "source_file": "NYSE_JWN_2014.pdf" + "text": "", + "page_start": 219, + "page_end": 219, + "source_file": "00-80T-80.pdf" }, { - "text": "**Nordstrom, Inc.**\n**Notes to Consolidated Financial Statements**\nDollar and share amounts in millions except per share, per option and per unit amounts \n\n**Loyalty Program**\nCustomers who use our Nordstrom private label credit or debit card or our Nordstrom Visa credit cards can participate in the Nordstrom \nRewards program through which customers accumulate points based on their level of spending. Upon reaching a certain points threshold, \ncustomers receive Nordstrom Notes, which can be redeemed for goods or services at Nordstrom full-line stores in the U.S. and Canada, \nNordstrom Rack stores and at Nordstrom.com. Nordstrom Rewards customers receive reimbursements for alterations, get Personal Triple \nPoints days and have early access to sales events. With increased spending, they can receive additional amounts of these benefits as well \nas access to exclusive fashion and shopping events. \n\nWe estimate the net cost of Nordstrom Notes that will be issued and redeemed and record this cost as rewards points are accumulated. \nThese costs, as well as reimbursed alterations, are recorded in cost of sales given that we provide customers with products and services for \nthese rewards. Other costs of the loyalty program, including shopping and fashion events, are recorded in selling, general and administrative \nexpenses. ", - "page_start": 54, - "page_end": 54, - "source_file": "NYSE_JWN_2014.pdf" + "text": "", + "page_start": 219, + "page_end": 219, + "source_file": "00-80T-80.pdf" }, { - "text": "The following table lists our U.S. and Canada retail store count and facility square footage by state/province as of January 31, 2015: \n\n**Nordstrom Full-Line Stores -**\n**U.S.** **Nordstrom Rack and Other1**", - "page_start": 23, - "page_end": 23, - "source_file": "NYSE_JWN_2014.pdf" + "text": "", + "page_start": 218, + "page_end": 218, + "source_file": "00-80T-80.pdf" } ] }, @@ -1129,64 +1129,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, + "text": "", + "page_start": 22, + "page_end": 22, "source_file": "Excel Training Manual 1.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 318, + "page_end": 318, + "source_file": "00-80T-80.pdf" }, { - "text": "As of March 16, 2015, the**Retail**segment includes our 115 “Nordstrom” branded full-line stores in the U.S. and Nordstrom.com, 167 off-price \nNordstrom Rack stores, two Canada full-line stores, Nordstromrack.com and HauteLook, and other retail channels including five Trunk Club \nshowrooms and TrunkClub.com, our two Jeffrey boutiques and one clearance store that operates under the name “Last Chance.” Through \nthese multiple retail channels, we strive to deliver the best customer experience possible. We offer an extensive selection of high-quality \nbrand-name and private label merchandise focused on apparel, shoes, cosmetics and accessories. Our integrated Nordstrom full-line stores \nand online store allow us to provide our customers with a seamless shopping experience. In-store purchases are primarily fulfilled from that \nstore’s inventory, but when inventory is unavailable at that store it may also be shipped to our customers from our fulfillment center in Cedar \nRapids, Iowa, or from other Nordstrom full-line stores. Online purchases are primarily shipped to our customers from our Cedar Rapids \nfulfillment center, but may also be shipped from our Nordstrom full-line stores. Our customers can also pick up online orders in our Nordstrom \nfull-line stores if inventory is available at one of our locations. These capabilities allow us to better serve customers across various channels \nand improve sales. Nordstrom Rack stores purchase high-quality brand-name merchandise primarily from the same vendors carried in \nNordstrom full-line stores and also serve as outlets for clearance merchandise from our Nordstrom stores and other retail channels. During \nthe year, we launched Nordstromrack.com and the associated mobile app. Nordstromrack.com combines the technology expertise of \nHauteLook with the merchant expertise of Nordstrom Rack. Nordstromrack.com and HauteLook offer limited-time sale events on fashion and \nlifestyle brands as well as a persistent selection of off-price, high-quality brand-name merchandise and are integrated with a single customer \nlog-in, shared shopping cart and streamlined checkout process. Furthermore, we can accommodate returns from these sites by mail or at \nany Nordstrom Rack location. ", - "page_start": 16, - "page_end": 16, - "source_file": "NYSE_JWN_2014.pdf" + "text": "", + "page_start": 317, + "page_end": 317, + "source_file": "00-80T-80.pdf" }, { - "text": "We had no store relocations in 2014, compared with one Nordstrom full-line store and two Nordstrom Rack relocations in 2013 and three \nNordstrom Rack relocations in 2012. Our 2014 new store openings increased our square footage by 5.5%. \n\nTo date in 2015, we have opened our second full-line store in Canada. We plan to open 27 Nordstrom Rack stores, three additional \nNordstrom full-line stores in the U.S. and another full-line store in Canada during 2015. Planned net store openings are expected to increase \nour retail square footage by approximately 6.1%. ", - "page_start": 39, - "page_end": 39, - "source_file": "NYSE_JWN_2014.pdf" + "text": "", + "page_start": 317, + "page_end": 317, + "source_file": "00-80T-80.pdf" }, { - "text": "CREDIT SEGMENT \nThe Nordstrom credit and debit card products are designed to strengthen customer relationships and grow retail sales by providing loyalty \nbenefits, valuable services and payment products. We believe our credit business allows us to build deeper relationships with our customers \nby fully integrating the Nordstrom Rewards program with our retail stores and providing better service, which in turn fosters greater customer \nloyalty. Our cardholders tend to visit our stores more frequently and spend more with us than non-cardholders. Our Nordstrom private label \ncredit and debit cards can be used only at our Nordstrom full-line stores in the U.S., Nordstrom Rack stores and online at Nordstrom.com, \nNordstromrack.com and HauteLook (“inside volume”), while our Nordstrom Visa credit cards also may be used for purchases outside of \nNordstrom (“outside volume”). Cardholders participate in the Nordstrom Rewards program through which cardholders accumulate points for \ntheir purchases. Upon reaching a certain points threshold, cardholders receive Nordstrom Notes®, which can be redeemed for goods or \nservices at Nordstrom full-line stores in the U.S. and Canada, Nordstrom Rack stores and at Nordstrom.com. Nordstrom Rewards customers \nreceive reimbursements for alterations, get Personal Triple Points days and have early access to sales events. With increased spending, \nthey can receive additional amounts of these benefits as well as access to exclusive fashion and shopping events. ", - "page_start": 33, - "page_end": 33, - "source_file": "NYSE_JWN_2014.pdf" + "text": "", + "page_start": 318, + "page_end": 318, + "source_file": "00-80T-80.pdf" }, { - "text": "**Nordstrom, Inc.**\n**Notes to Consolidated Financial Statements**\nDollar and share amounts in millions except per share, per option and per unit amounts \n\n**NOTE 1: NATURE OF OPERATIONS AND SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES**\n\n**The Company**\nFounded in 1901 as a shoe store in Seattle, Washington, Nordstrom, Inc. is now a leading fashion specialty retailer that offers customers a \nwell-edited selection of high-quality fashion brands focused on apparel, shoes, cosmetics and accessories for men, women and children. This \nbreadth of merchandise allows us to serve a wide range of customers who appreciate quality fashion and a superior shopping experience. \nWe offer an extensive selection of high-quality brand-name and private label merchandise through multiple retail channels, including 116 \n“Nordstrom” branded full-line stores in the U.S. and at Nordstrom.com (collectively, “Nordstrom”), one Canada full-line store, 167 off-price \nNordstrom Rack stores, Nordstromrack.com and HauteLook, five Trunk Club showrooms and TrunkClub.com, two Jeffrey boutiques and one \nLast Chance clearance store. Our stores are located in 38 states throughout the U.S and in one province in Canada. ", - "page_start": 53, - "page_end": 53, - "source_file": "NYSE_JWN_2014.pdf" + "text": "", + "page_start": 318, + "page_end": 318, + "source_file": "00-80T-80.pdf" }, { - "text": "**Item 7. Management’s Discussion and Analysis of Financial Condition and Results of Operations.**\nDollar, share and square footage amounts in millions except percentages, per share and per square foot amounts \n\n**OVERVIEW**\nNordstrom is a leading fashion specialty retailer offering apparel, shoes, cosmetics and accessories for women, men and children. We offer \nan extensive selection of high-quality brand-name and private label merchandise through our various channels: “Nordstrom” branded full-line \nstores and online store at Nordstrom.com, Nordstrom Rack stores, Nordstromrack.com and HauteLook and other retail channels, including \nTrunk Club showrooms and TrunkClub.com, our Jeffrey boutiques and our clearance store that operates under the name “Last Chance.” As \nof January 31, 2015, our stores are located in 38 states throughout the United States and in one province in Canada. In addition, we offer our \ncustomers a Nordstrom Rewards™ loyalty program along with a variety of payment products and services, including credit and debit cards. \n\nWe continue to see the ongoing evolution of retail, with increasing customer interaction between our stores and ecommerce. We are making \nprogress to meet customer expectations of a personalized experience that merges the richness of stores with the convenience of online. \nBecause the customer views us simply as Nordstrom, we believe there is tremendous value in strengthening our platform for the customer \nexperience that encompasses full-price, off-price, in-store and online. While each channel represents a substantial growth opportunity, there \nare significant synergies across channels to create a unique customer experience to gain market share. ", - "page_start": 28, - "page_end": 28, - "source_file": "NYSE_JWN_2014.pdf" + "text": "", + "page_start": 318, + "page_end": 318, + "source_file": "00-80T-80.pdf" }, { - "text": "Our Nordstrom.com, Nordstromrack.com and HauteLook channels continued to experience outsized growth. Nordstrom.com net sales \nincreased 23% and Nordstromrack.com and HauteLook net sales increased 22%, both driven by expanded merchandise selection and \nongoing technology investments to enhance the customer experience. \n\nNordstrom Rack net sales increased $477, or 17%, compared with 2013, reflecting incremental volume from existing stores and the impact of \n27 new stores since fiscal 2013. Comparable sales increased 3.8% for the year. Shoes and Accessories were the top-performing categories \nfor the year. On a comparable basis, the average selling price of Nordstrom Rack merchandise increased while the number of items sold was \nflat. \n\nNet Sales (2013 vs. 2012) \nNet sales for 2013 increased 3.4% compared with 2012, driven by a comparable sales increase of 2.5%, attributable to growth at \nNordstrom.com and Nordstrom Rack’s accelerated store expansion. During 2013, we opened 22 Nordstrom Rack stores and relocated one \nNordstrom full-line store and two Nordstrom Rack stores. These additions represented 1.6% of our total net sales for 2013 and increased our \nsquare footage by 2.9%. The 53rd week in 2012 contributed approximately $162 in additional net sales. ", - "page_start": 31, - "page_end": 31, - "source_file": "NYSE_JWN_2014.pdf" + "text": "", + "page_start": 318, + "page_end": 318, + "source_file": "00-80T-80.pdf" }, { - "text": "of 300 stores by 2020. Customers continue \n\nto respond favorably to the treasure-hunt \n\nexperience that defines Nordstrom Rack \n\nstores. As we expand in many markets for the \n\nfirst time, we hope to continue delivering a \n\ngreat experience, as this business represents \n\na terrific opportunity for us to attract new \n\ncustomers. Last year, Nordstrom Rack \n\nbusiness based on a service model that is highly was our biggest source of new customers, \n\ncomplementary to our own. We believe Trunk attracting nearly 4 million. Also, a year ago, \n\nClub is a natural extension of our business, we began accepting returns of HauteLook \n\nand together we will continue to evolve and and Nordstromrack.com merchandise at any \n\nbring together the online and offline worlds Nordstrom Rack store. This drove nearly \n\nto deliver a great shopping experience. 1 million trips to Nordstrom Rack stores in \n\n2014. The Nordstrom Rack customer also \n\ntends to be younger than our full-line customer, \n\nOFF-PRICE: NORDSTROM RACK, \nNORDSTROMRACK.COM AND HAUTELOOK and there is a meaningful opportunity for these ", - "page_start": 7, - "page_end": 7, - "source_file": "NYSE_JWN_2014.pdf" + "text": "", + "page_start": 318, + "page_end": 318, + "source_file": "00-80T-80.pdf" }, { - "text": "At Nordstrom Rack, we offer customers great brands at great prices, with 48 of the top 50 full-line brands represented. We opened 27 \nNordstrom Rack stores in 2014, a record number of openings, contributing to Nordstrom Rack’s total sales growth of 17%. \n\nOur online businesses continue to be our fastest-growing channels. In the spring of 2014, we expanded our capabilities through the launch of \nNordstromrack.com, providing a seamless integration with HauteLook. We more than doubled our merchandise selection, which accelerated \ngrowth in this channel in the second half of 2014. Demonstrating synergies across our businesses, we enabled customers to return \npurchases from HauteLook and Nordstromrack.com to any of our Nordstrom Rack stores, which drove nearly one million incremental trips to \nNordstrom Rack stores. \n\nNordstrom.com finished its fifth consecutive year of approximately 20% or more comparable sales growth, with a key driver being increased \nmerchandise selection. In 2015, we plan to open our third fulfillment center, located in Pennsylvania, which will enhance the customer \nexperience through faster delivery. Furthermore, we have extended our full-price offering with our acquisition of Trunk Club, a high-growth \nbusiness offering a new approach to personalized service. ", - "page_start": 28, - "page_end": 28, - "source_file": "NYSE_JWN_2014.pdf" + "text": "", + "page_start": 317, + "page_end": 317, + "source_file": "00-80T-80.pdf" } ] }, @@ -1197,70 +1197,70 @@ "target_page": 1, "target_passage": "carbon nanotubes (CNT) [2] have been shown to work remarkably well as de- tectors of small gas molecules", "chunk_present": { - "presence": true, - "index": 4 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 103, + "page_end": 103, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 10, + "page_end": 10, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "where E[M@VC] is the total energy of a transition metal \natom occupying a vacancy in the nanotube, n is the number \nof carbon atoms removed to form the vacancy, E[C] is the en- \nergy per carbon atom in a pristine nanotube, and E[M@NT] ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2538.pdf" + "text": "", + "page_start": 168, + "page_end": 168, + "source_file": "00-80T-80.pdf" }, { - "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes \n\nJ. M. Garc´ıa-Lastra1,2,∗ D. J. Mowbray1,2, K. S. Thygesen2, A. Rubio1,3, and K. W. Jacobsen2 \n1Nano-Bio Spectroscopy group and ETSF Scientific Development Centre, \nDpto. F´ısica de Materiales, Universidad del Pa´ıs Vasco, \nCentro de F´ısica de Materiales CSIC-UPV/EHU- MPC and DIPC, Av. Tolosa 72, E-20018 San Sebasti´an, Spain \n2Center for Atomic-scale Materials Design, Department of Physics, \nTechnical University of Denmark, DK-2800 Kgs. Lyngby, Denmark \n3Fritz-Haber-Institut der Max-Planck-Gesellschaft, Berlin, Germany \n\nWe use computational screening to systematically investigate the use of transition metal doped carbon nan- \notubes for chemical gas sensing. For a set of relevant target molecules (CO, NH3, H2S) and the main components \nof air (N2, O2, H2O), we calculate the binding energy and change in conductance upon adsorption on a metal \natom occupying a vacancy of a (6,6) carbon nanotube. Based on these descriptors, we identify the most promis- \ning dopant candidates for detection of a given target molecule. From the fractional coverage of the metal sites \nin thermal equilibrium with air, we estimate the change in the nanotube resistance per doping site as a function \nof the target molecule concentration assuming charge transport in the diffusive regime. Our analysis points to \nNi-doped nanotubes as candidates for CO sensors working under typical atmospheric conditions. ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2538.pdf" + "text": "", + "page_start": 86, + "page_end": 86, + "source_file": "00-80T-80.pdf" }, { - "text": "0 \n1 \n0 \n2 \nPACS numbers: 73.63.–b, 68.43.–h, 73.50.Lw \n\nn \na \nJ \n\nThe ability to detect small concentrations of specific chem- \nical species is fundamental for a variety of industrial and sci- \nentific processes as well as for medical applications and en- \nvironmental monitoring [1]. In general, nanostructured mate- \nrials should be well suited for sensor applications because of \ntheir large surface to volume ratio which makes them sensi- \ntive to molecular adsorption. Specifically, carbon nanotubes \n(CNT) [2] have been shown to work remarkably well as de- \ntectors of small gas molecules. This has been demonstrated \nboth for individual CNTs [3–8] as well as for CNT networks \n[9, 10]. \n\n4 \n1 \n\nWe find that oxidation of the active metal site passivates \nthe sensor in the case of doping by Ti, V, Cr, and Mn un- \nder standard conditions (room temperature and 1 bar of pres- \nsure). Among the remaining metals, we identify Ni as is the \nmost promising candidate for CO detection. For this system \nthe change in resistance per active site is generally significant \n(>1 Ω) for small changes in CO concentration in the relevant \nrange of around 0.1–10 ppm. Our approach is quite general \nand is directly applicable to other nanostructures than CNTs, \nother functionalizations than metal doping, and other back- \ngrounds than atmospheric air. ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2538.pdf" + "text": "", + "page_start": 168, + "page_end": 168, + "source_file": "00-80T-80.pdf" }, { - "text": "In summary, we have presented a general model of nanos- \ntructured chemical sensors which takes the adsorption en- \nergies of the relevant chemical species and their individual \nscattering resistances as the only input. On the basis of this \nmodel we have performed a computational screening of tran- \nsition metal doped CNTs, and found that Ni-doped CNTs are \npromising candidates for detecting CO in a background of air. \nThe model may be applied straightforwardly to other nanos- \ntructures than CNTs, other functionalizations than metal dop- \ning and other gas compositions than air. \n\n[14] S. B. Fagan, R. Mota, A. J. R. da Silva, and A. Fazzio, “Ab \ninitio study of an iron atom interacting with single-wall car- \nbon nanotubes”, Phys. Rev. B 67(20), 205414 (May 2003), \ndoi:10.1103/PhysRevB.67.205414. \n\n[15] Y. Yagi, T. M. Briere, M. H. F. Sluiter, V. Kumar, A. A. Farajian, \nand Y. Kawazoe, “Stable geometries and magnetic properties of \nsingle-walled carbon nanotubes doped with 3d transition met- \nals: A first-principles study”, Phys. Rev. B 69(7), 075414 (Feb \n2004), doi:10.1103/PhysRevB.69.075414. ", - "page_start": 4, - "page_end": 4, - "source_file": "1001.2538.pdf" + "text": "", + "page_start": 86, + "page_end": 86, + "source_file": "00-80T-80.pdf" }, { - "text": "[8] S. Brahim, S. Colbern, R. Gump, and L. Grigorian, “Tailoring \nJ. Appl. Phys. \ngas sensing properties of carbon nanotubes”, \n104(2), 024502 (Jul. 2008), doi:10.1063/1.2956395. \n[9] C. Morgan, Z. Alemipour, and M. Baxendale, \n\n“Variable \nrange hopping in oxygen-exposed single-wall carbon nanotube \nnetworks”, Phys. Stat. Solidi A 205(6), 1394 (May 2008), \ndoi:10.1002/pssa.200778113. \n\nTo our knowledge, controlled doping of CNTs with transi- \ntion metal atoms has so far not been achieved. It has, how- \never, been found that metal atoms incorporated into the CNT \nlattice during catalytic growth are afterwards very difficult to \nremove [30]. Furthermore, it has been shown that CNT vacan- \ncies, which are needed for the metallic doping, may be formed \nin a controlled way by irradiation by Ar ions [31]. This sug- \ngests that metallic doping of CNTs should be possible. \n\n[10] D. J. Mowbray, C. Morgan, and K. S. Thygesen, \n\n“In- \nfluence of O2 and N2 on the conductivity of carbon nan- \notube networks”, Phys. Rev. B 79(19), 195431 (May 2009), \ndoi:10.1103/PhysRevB.79.195431. ", - "page_start": 4, - "page_end": 4, - "source_file": "1001.2538.pdf" + "text": "", + "page_start": 86, + "page_end": 86, + "source_file": "00-80T-80.pdf" }, { - "text": "[34] P. Moriarty, M. D. R. Taylor, and M. Brust, “Nanostructured cellular networks,” Phys. Rev. Lett. 89, \n\n248303 (2002). \n\n[35] E. Rabani, D. R. Reichman, P. L. Geissler, and L. E. Brus, “Drying-mediated self-assembly of \n\nnanoparticles,” Nature 426, 271–274 (2003). \n\n[36] L. V. Govor, G. Reiter, J. Parisi, and G. H. Bauer, “Self-assembled nanoparticle deposits formed at \n\nthe contact line of evaporating micrometer-size droplets,” Phys. Rev. E 69, 061609 (2004). \n\n[37] C. P. Martin, M. O. Blunt, and P. Moriarty, “Nanoparticle networks on silicon: Self-organized or \n\ndisorganized?” Nano Lett. 4, 2389–2392 (2004). \n\n[38] C. P. Martin, M. O. Blunt, E. Pauliac-Vaujour, A. Stannard, P. Moriarty, I. Vancea, and U. Thiele, ", - "page_start": 28, - "page_end": 28, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 86, + "page_end": 86, + "source_file": "00-80T-80.pdf" }, { - "text": "The kinetic Monte Carlo model for two-dimensional dewetting nanofluids [33] was first proposed \n\nin Ref. [35] and extended to include next-nearest neighbour interactions in [37]. The two key \n\nassumptions used are: (i) the relevant processes can be mapped on to a two-dimensional lattice \n\ngas model, thereby neglecting continuous changes in the thickness of the evaporating film, and (ii) \n\nall relevant dynamics results from diffusing nanoparticles and evaporating/condensing solvent. \n\nThe model builds on an Ising-type model for the liquid-gas phase transition. The surface is divided \n\nup into a regular array of lattice sites whose size is dictated by the nanoparticles. One then con- \n\nsiders each lattice site to be occupied either by a nanoparticle, liquid or vapour. This effectively \n\nmaps the system onto a two-dimensional two-component lattice gas having two fields n and l. The \n\nresulting three possible states of a cell are: liquid (l = 1, n = 0), nanoparticle (l = 0, n = 1), \n\nand vapour (l = 0, n = 0, i.e., cell empty). The energy of an overall configuration is given by the ", - "page_start": 9, - "page_end": 9, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 86, + "page_end": 86, + "source_file": "00-80T-80.pdf" }, { - "text": "∗ Electronic address: juanmaria.garcia@ehu.es [18] C. S. Yeung, L. V. Liu, and Y. A. Wang, \n\n“Adsorption \nof small gas molecules onto Pt-doped single-walled carbon \nJ. Phys. Chem. C 112(19), 7401 (Apr. 2008), \nnanotubes”, \ndoi:10.1021/jp0753981. \n[1] Gas Sensing Materials, MRS Bull., vol. 24 (1999). \n[2] J. C. Chalier, X. Blase, and S. Roche, “Electronic and transport \nproperties of nanotubes”, Rev. Mod. Phys. 79(2), 677 (May \n2007), doi:10.1103/RevModPhys.79.677. [19] T. Vo, Y.-D. Wu, R. Car, and M. Robert, \n\n“Structures, in- \nteractions, and ferromagnetism of Fe-carbon nanotube sys- \nJ. Phys. Chem. C 112(22), 400 (May 2008), \ntems”, \ndoi:10.1021/jp0761968. ", - "page_start": 4, - "page_end": 4, - "source_file": "1001.2538.pdf" + "text": "", + "page_start": 169, + "page_end": 169, + "source_file": "00-80T-80.pdf" } ] }, @@ -1271,70 +1271,70 @@ "target_page": 4, "target_passage": "Furthermore, it has been shown that CNT vacan- cies, which are needed for the metallic doping, may be formed in a controlled way by irradiation by Ar ion", "chunk_present": { - "presence": true, - "index": 4 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 25, + "page_end": 25, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 160, + "page_end": 160, + "source_file": "00-80T-80.pdf" }, { - "text": "where E[M@VC] is the total energy of a transition metal \natom occupying a vacancy in the nanotube, n is the number \nof carbon atoms removed to form the vacancy, E[C] is the en- \nergy per carbon atom in a pristine nanotube, and E[M@NT] ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2538.pdf" + "text": "", + "page_start": 159, + "page_end": 159, + "source_file": "00-80T-80.pdf" }, { - "text": "0 \n1 \n0 \n2 \nPACS numbers: 73.63.–b, 68.43.–h, 73.50.Lw \n\nn \na \nJ \n\nThe ability to detect small concentrations of specific chem- \nical species is fundamental for a variety of industrial and sci- \nentific processes as well as for medical applications and en- \nvironmental monitoring [1]. In general, nanostructured mate- \nrials should be well suited for sensor applications because of \ntheir large surface to volume ratio which makes them sensi- \ntive to molecular adsorption. Specifically, carbon nanotubes \n(CNT) [2] have been shown to work remarkably well as de- \ntectors of small gas molecules. This has been demonstrated \nboth for individual CNTs [3–8] as well as for CNT networks \n[9, 10]. \n\n4 \n1 \n\nWe find that oxidation of the active metal site passivates \nthe sensor in the case of doping by Ti, V, Cr, and Mn un- \nder standard conditions (room temperature and 1 bar of pres- \nsure). Among the remaining metals, we identify Ni as is the \nmost promising candidate for CO detection. For this system \nthe change in resistance per active site is generally significant \n(>1 Ω) for small changes in CO concentration in the relevant \nrange of around 0.1–10 ppm. Our approach is quite general \nand is directly applicable to other nanostructures than CNTs, \nother functionalizations than metal doping, and other back- \ngrounds than atmospheric air. ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2538.pdf" + "text": "", + "page_start": 159, + "page_end": 159, + "source_file": "00-80T-80.pdf" }, { - "text": "[8] S. Brahim, S. Colbern, R. Gump, and L. Grigorian, “Tailoring \nJ. Appl. Phys. \ngas sensing properties of carbon nanotubes”, \n104(2), 024502 (Jul. 2008), doi:10.1063/1.2956395. \n[9] C. Morgan, Z. Alemipour, and M. Baxendale, \n\n“Variable \nrange hopping in oxygen-exposed single-wall carbon nanotube \nnetworks”, Phys. Stat. Solidi A 205(6), 1394 (May 2008), \ndoi:10.1002/pssa.200778113. \n\nTo our knowledge, controlled doping of CNTs with transi- \ntion metal atoms has so far not been achieved. It has, how- \never, been found that metal atoms incorporated into the CNT \nlattice during catalytic growth are afterwards very difficult to \nremove [30]. Furthermore, it has been shown that CNT vacan- \ncies, which are needed for the metallic doping, may be formed \nin a controlled way by irradiation by Ar ions [31]. This sug- \ngests that metallic doping of CNTs should be possible. \n\n[10] D. J. Mowbray, C. Morgan, and K. S. Thygesen, \n\n“In- \nfluence of O2 and N2 on the conductivity of carbon nan- \notube networks”, Phys. Rev. B 79(19), 195431 (May 2009), \ndoi:10.1103/PhysRevB.79.195431. ", - "page_start": 4, - "page_end": 4, - "source_file": "1001.2538.pdf" + "text": "", + "page_start": 159, + "page_end": 159, + "source_file": "00-80T-80.pdf" }, { - "text": "FIG. 2: Calculated (a) adsorption energy Eads in eV and (b) change in \nconductance ∆G in units of G0 =2e2/h for N2, O2, H2O, CO, NH3, \nand H2S on 3d transition metals occupying a monovacancy (top), \ndivacancy I (middle), and divacancy II (bottom) in a (6,6) carbon \nnanotube. \nFIG. 1: Structural schematics and formation energy for a 3d tran- \nsition metal occupied monovacancy (black), divacancy I (gray), or \ndivacancy II (white) in a (6,6) carbon nanotube. Formation energies \nof the empty vacancies are indicated by dashed lines. ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2538.pdf" + "text": "", + "page_start": 160, + "page_end": 160, + "source_file": "00-80T-80.pdf" }, { - "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes \n\nJ. M. Garc´ıa-Lastra1,2,∗ D. J. Mowbray1,2, K. S. Thygesen2, A. Rubio1,3, and K. W. Jacobsen2 \n1Nano-Bio Spectroscopy group and ETSF Scientific Development Centre, \nDpto. F´ısica de Materiales, Universidad del Pa´ıs Vasco, \nCentro de F´ısica de Materiales CSIC-UPV/EHU- MPC and DIPC, Av. Tolosa 72, E-20018 San Sebasti´an, Spain \n2Center for Atomic-scale Materials Design, Department of Physics, \nTechnical University of Denmark, DK-2800 Kgs. Lyngby, Denmark \n3Fritz-Haber-Institut der Max-Planck-Gesellschaft, Berlin, Germany \n\nWe use computational screening to systematically investigate the use of transition metal doped carbon nan- \notubes for chemical gas sensing. For a set of relevant target molecules (CO, NH3, H2S) and the main components \nof air (N2, O2, H2O), we calculate the binding energy and change in conductance upon adsorption on a metal \natom occupying a vacancy of a (6,6) carbon nanotube. Based on these descriptors, we identify the most promis- \ning dopant candidates for detection of a given target molecule. From the fractional coverage of the metal sites \nin thermal equilibrium with air, we estimate the change in the nanotube resistance per doping site as a function \nof the target molecule concentration assuming charge transport in the diffusive regime. Our analysis points to \nNi-doped nanotubes as candidates for CO sensors working under typical atmospheric conditions. ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2538.pdf" + "text": "", + "page_start": 160, + "page_end": 160, + "source_file": "00-80T-80.pdf" }, { - "text": "The calculated formation energies for the 3d transition met- \nals are shown in Fig. 1. From the horizontal lines we see that \nboth divacancies are more stable than the monovacancy. This \nmay be attributed to the presence of a two-fold coordinated C \natom in the monovacancy, while all C atoms remain three-fold \ncoordinated in the divacancies. When a transition metal atom \noccupies a vacancy, the strongest bonding to the C atoms is \nthrough its d orbitals [26]. For this reason, Cu and Zn, which \nboth have filled d-bands, are rather unstable in the CNT. For \nthe remaining metals, adsorption in the monovacancies leads \nto quite stable structures. This is because the three-fold coor- \ndination of the C atoms and the CNT’s hexagonal structure are \nrecovered when the metal atom is inserted. On the other hand, \nmetal adsorption in divacancies is slightly less stable because \nof the resulting pentagon defects, see upper panel in Fig. 1. A \nsimilar behaviour has been reported by Krasheninnikov et al. \nfor transition metal atoms in graphene [21]. ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2538.pdf" + "text": "", + "page_start": 160, + "page_end": 160, + "source_file": "00-80T-80.pdf" }, { - "text": "In this work we consider the possibility of using CNTs \ndoped by 3d transition metal atoms for chemical gas sens- \ning. We use computational screening to systematically iden- \ntify the most promising dopant candidates for detection of \nthree different target molecules (CO, NH3, H2S) under typi- \ncal atmospheric conditions. The screening procedure is based \non the calculation of two microscopic descriptors: the bind- \ning energy and scattering resistance of the molecules when \nadsorbed on a doped CNT. These two quantities give a good \nindication of the gas coverage and impact on the resistance. \nFor the most promising candidates we then employ a simple \nthermodynamic model of the CNT sensor. In this model, the \nbinding energies are used to obtain the fractional coverage of \nthe metallic sites as a function of the target molecule concen- \ntration under ambient conditions. Under the assumption of \ntransport in the diffusive rather than localization regime, the \n\nMetallic doping of a (6,6) CNT has been modeled in a su- \npercell containing six repeated minimal unit cells along the \nCNT axis (dimensions: 15 ˚A×15 ˚A×14.622 ˚A). For this size \nof supercell a Γ-point sampling of the Brillouin zone was \nfound to be sufficient. The formation energy for creating a \nvacancy (VC) occupied by a transition metal atom (M) was \ncalculated using the relation \n\nEform[M@VC] = E[M@VC] + nE[C] − E[M@NT] (1) ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2538.pdf" + "text": "", + "page_start": 160, + "page_end": 160, + "source_file": "00-80T-80.pdf" }, { - "text": "To estimate the effect of adsorbates on the electrical con- \nductance of doped CNTs, we first consider the change in con- \nductance when a single molecule is adsorbed on a metal site of \nan otherwise pristine CNT. In Fig. 2(b) we show the calculated \nchange in conductance relative to the metal site with no ad- \nsorbate. In contrast to the binding energies, there are no clear \ntrends in the conductances. The sensitivity of the conductance \nis perhaps most clearly demonstrated by the absence of cor- \nrelation between different types of vacancies, i.e. between the \nthree panels in Fig. 2(b). Close to the Fermi level, the conduc- \ntance of a perfect armchair CNT equals 2G0. The presence \nof the metal dopant leads to several dips in the transmission \nfunction known as Fano antiresonances [20]. The position \nand shape of these dips depend on the d-levels of the transi- \ntion metal atom, the character of its bonding to the CNT, and \nis further affected by the presence of the adsorbate molecule. \nThe coupling of all these factors is very complex and makes \nit difficult to estimate or rationalize the value of the conduc- \ntance. For the spin polarized cases, we use the spin-averaged ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2538.pdf" + "text": "", + "page_start": 160, + "page_end": 160, + "source_file": "00-80T-80.pdf" } ] }, @@ -1351,64 +1351,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 27, + "page_end": 27, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "Paoli Inc. is a leading provider of wood case Maxon Furniture Inc. targets small to mid- HON International Inc. is responsible for HON \n\ngoods, modular desking, conference pro- sized businesses seeking “planned” offices fea- INDUSTRIES’ sales and business develop- \n\nducts, and seating through its well-known turing workstations and compatible storage ment outside the United States and Canada. \n\nbrands Paoli® and Whitehall®. Founded in and seating. Maxon’s customers appreciate Our members in local countries market the \n\n1926, it is the newest member of the HON office furniture that efficiently organizes space HON INDUSTRIES’ brands through a global \n\nINDUSTRIES family, acquired in January and creates a positive working environment. distribution network. With an extensive prod- \n\n2004. Outstanding product design at a great uct selection, HON International is able to \n**H I G H L I G H T S / A W A R D S :**\nvalue makes Paoli a highly sought after solu- provide dealers and customers with the widest \n**•**Gave the Empower® product line a com- \ncollection of “compelling value” office furni- ", - "page_start": 29, - "page_end": 29, - "source_file": "NYSE_HNI_2003.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "employees. Pension expense for this plan amounted to $309,000, \nNumber of Weighted-Average \nExercise Price Shares \n$309,000, and $310,000 in 2003, 2002, and 2001, respectively. \n\n918,250 \n266,500 \n(17,500) \n(37,000) $ 21.89 \n 23.39 \n 18.31 \n 21.57 \n**Postretirement Health Care**\n\nIn accordance with the guidelines of revised SFAS No. 132, “Employers’ \n\n1,130,250 \n290,000 \n– \n(17,000) $ 22.32 \n 25.77 \n– \n 21.69 \n\nDisclosures about Pensions and other Postretirement Benefits,” the fol- \n\nlowing table sets forth the funded status of the plan, reconciled to the \n\naccrued postretirement benefits cost recognized in the Company’s bal- \n\n 1,403,250 \n446,500 \n(362,000) \n(18,500) $ 23.03 \n 26.78 \n 23.10 \n 23.57 \n\nance sheet at: \n\n**2003** 2002 2001 *(In thousands)*", - "page_start": 51, - "page_end": 51, - "source_file": "NYSE_HNI_2003.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "**Research and Development**\n\nResearch and development continues to be a vital part of the Company's strategy to extend existing brands and expand into new branded items. The \nexpenditures for research and development for fiscal 2003, 2002 and 2001, respectively, were $13,165,000, $12,097,000 and $11,478,000. There are 42 \nprofessional employees engaged in full time research, 19 in the area of improving existing products and 23 in developing new products. \n\n**Employees**\n\nAs of October 25, 2003, the Company had over 16,000 active employees. ", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_HRL_2004.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "**Abbie J. Smith**\n\nChaired Professor, \n\nThe University of Chicago \n\nGraduate School of Business \n\n**Richard H. Stanley**\n\nVice Chairman, HON INDUSTRIES Inc. \n\nChairman, SC Companies, Inc. \n\nChairman, Stanley Consultants, Inc. ", - "page_start": 62, - "page_end": 62, - "source_file": "NYSE_HNI_2003.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "**Liquidity and Capital Resources** ***O F F I C E F U R N I T U R E***\n\nOffice furniture comprised 74% of consolidated net sales for 2003 and During 2003, cash flow from operations was $141.3 million, which \n\n76% of consolidated net sales for 2002 and 2001. Net sales for office along with funds from stock option exercises under employee stock \n\nfurniture increased 2% in 2003 and decreased 6% in 2002. The plans, provided the funds necessary to meet working capital needs, \n\nincrease in 2003 is due to the increased week from the Company’s invest in capital improvements, repay long-term debt, repurchase com- \n\n52/53-week fiscal year. The office furniture industry has experienced an mon stock, and pay increased dividends. \n\nunprecedented three-year decline in shipments. The Business and Cash, cash equivalents, and short-term investments totaled \n\nInstitutional Furniture Manufacturer’s Association (BIFMA) reported $204.2 million at the end of 2003 compared to $155.5 million at the \n\n2003 shipments down over 5% and 2002 shipments down 19%. The end of 2002 and $78.8 million at the end of 2001. The Company used ", - "page_start": 36, - "page_end": 36, - "source_file": "NYSE_HNI_2003.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "During 2003, the Company expended $4.9 million for the purchase of the Company’s common stock. Included in this amount was $4.1 million in April \n2003 for the completion of a tender offer in which a total of 173,614 shares of common stock were repurchased at a price of $23.00 per share. During \nthe fourth quarter of 2003, the Company repurchased the following shares of the Company’s common stock: \n\nOCTOBER 2003 NOVEMBER 2003 TOTAL \n\nTotal Number of Shares Purchased 8,400 11,800 20,200 \n\nAverage Price Paid Per Share $42.42 $41.02 $41.60 \n\nTotal Number of Shares Purchased \nAs Part of Publicly Announced Plan or Program 8,400 11,800 20,200 \n\nMaximum Number of Shares That May Yet \nBe Purchased Under Plan or Program(a) 105,800 94,000 94,000 \n\n(a) This program was announced in April 2000 and initially provided for 200,000 shares to be repurchased. \n\nThe Company received net proceeds of $2.7 million for the exercise of employee stock options during 2003. ", + "text": "", "page_start": 28, "page_end": 28, - "source_file": "NASDAQ_ATRI_2003.pdf" + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "**In 2005, approximately 80 million women and 101 million men**were employed in the EU. This was \na rate of female workforce of 44.1%; in 2019, this rate went up to 46.1%, with 90 million women and 106 \nmillion men making up a total of 196 million workers. The employment rate of women between 15 and \n64 years stood in 2019 at 67.9% and the employment rate of men at 78.9%.298 \n\nDuring the past 15 years the number of women in the Eurostat category ‘Employed persons’ (Employed \npersons = employees and employers including self-employed) grew by 12.9%. The number of female \nemployees grew by 16.3% and the number of male employees by 7.8%. ", - "page_start": 109, - "page_end": 109, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "10 I N D U S T R Y S E G M E N T A N D G E O G R A P H I C I N F O R M A T I O N \n\nThe Company operates in one reportable industry segment: designing, developing, manufacturing and marketing products for the medical and health care \nindustry and has no foreign operating subsidiaries. The Company’s product lines include pressure relief valves and inflation systems, which are sold primarily \nto the aviation and marine industries. Due to the similarities in product technologies and manufacturing processes, these products are managed as part of \nthe medical products segment. The Company recorded incidental revenues from its oxygen pipeline, which totaled approximately $950,000 in each of the \nyears of 2003, 2002 and 2001. Pipeline net assets totaled $2.6 million at December 31, 2003 and 2002. Company revenues from sales to parties outside the \nUnited States totaled approximately 26, 25 and 33 percent of the Company’s total revenues in 2003, 2002 and 2001, respectively. No Company assets are \nlocated outside the United States. A summary of revenues by geographic territory for the three years 2003, 2002 and 2001 is as follows (in thousands): ", - "page_start": 21, - "page_end": 21, - "source_file": "NASDAQ_ATRI_2003.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_KCN_2013.pdf" } ] }, @@ -1425,64 +1425,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 318, + "page_end": 318, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 63, + "page_end": 63, + "source_file": "00-80T-80.pdf" }, { - "text": "**Discussion**\n\nThe study demonstrated success in generating EM-to-IP handoff notes using both a fine tuned, \n\npretrained LLM and rule-based approaches within an end user–developed note template. It is \n\nimportant to note that (largely due to time constraints within the EM care delivery model) the \n\nperformance of EM-to-IP handoff notes was not the current standard of care in EM. The study site’s \n\nunique electronic handoff process enabled a comparison between physician-written and \n\nLLM-generated handoff notes. Traditional automated evaluations of the model output suggested ", + "text": "", "page_start": 7, "page_end": 7, - "source_file": "pubmed8.pdf" + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "**Abstract**\n\n**IMPORTANCE**An emergency medicine (EM) handoff note generated by a large language model \n\n(LLM) has the potential to reduce physician documentation burden without compromising the safety \n\nof EM-to-inpatient (IP) handoffs. \n\n**OBJECTIVE**To develop LLM-generated EM-to-IP handoff notes and evaluate their accuracy and \n\nsafety compared with physician-written notes. \n\n**DESIGN, SETTING, AND PARTICIPANTS**This cohort study used EM patient medical records with \n\nacute hospital admissions that occurred in 2023 at NewYork-Presbyterian/Weill Cornell Medical \n\nCenter. A customized clinical LLM pipeline was trained, tested, and evaluated to generate templated \n\nEM-to-IP handoff notes. Using both conventional automated methods (ie, recall-oriented \n\nunderstudy for gisting evaluation [ROUGE], bidirectional encoder representations from transformers \n\nscore [BERTScore], and source chunking approach for large-scale inconsistency evaluation [SCALE]) \n\nand a novel patient safety-focused framework, LLM-generated handoff notes vs physician-written \n\nnotes were compared. Data were analyzed from October 2023 to March 2024. \n**Meaning**These findings suggest the \n\nvalue of a manual, patient safety– \n**EXPOSURE**LLM-generated EM handoff notes. \nfocused clinical evaluation of LLM \n\nmodels and the potential of \n\nLLM-generated handoff notes to create \n\na new standard of care in EM. ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed8.pdf" + "text": "", + "page_start": 6, + "page_end": 6, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "**Key Points**\n\n**Question**Can a large language model \n\n(LLM) generate emergency medicine \n\n(EM)-to-inpatient (IP) handoff notes \n\nthat are useful and safe for EM care? \n\n**Findings**In this cohort study of 1600 \n\nEM patient medical records using a \n\nnovel evaluation framework, the \n\nLLM-generated EM-to-IP handoff notes \n\nhad a mean usefulness of 4.04 out of 5 \n\n(compared with 4.36 for \n\nphysician-written) and a mean patient \n\nsafety of 4.06 out of 5 (compared with \n\n4.50 for physician-written) with no \n\ncritical patient safety risks. ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed8.pdf" + "text": "", + "page_start": 179, + "page_end": 179, + "source_file": "00-80T-80.pdf" }, { - "text": "EHR-based handoff workflow via a standardized EM-to-IP handoff note template, designed for real- \n\ntime completion by the EM care team at time of admission. At 3 and 6 months postlaunch, informal \n\nevaluation of new EM-to-IP handoff notes through random medical record review and unstructured \n\nclinician feedback sessions revealed variable completeness, quality, and subsequent usefulness of \n\nthe handoff notes. ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed8.pdf" + "text": "", + "page_start": 179, + "page_end": 179, + "source_file": "00-80T-80.pdf" }, { - "text": "**CONCLUSIONS AND RELEVANCE**In this cohort study of 1600 EM patient medical records, \n\nLLM-generated EM-to-IP handoff notes were determined superior compared with physician-written \n\nsummaries via conventional automated evaluation methods, but marginally inferior in usefulness \n\n(continued) ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed8.pdf" + "text": "", + "page_start": 64, + "page_end": 64, + "source_file": "00-80T-80.pdf" }, { - "text": "**Introduction**\n\nHandoffs, where patient information is exchanged between health professionals during a transfer of \nclinical responsibility, have been identified as a critical source of medical errors.1,2 The Joint \nCommission, the Accreditation Council for Graduate Medical Education, and the Association of \n\nAmerican Medical Colleges have all recommended the development of high-quality and standardized \nhandoff processes to address the substantial patient risk of this ubiquitous event.3,4 Implementing \nhandoff tools has previously demonstrated significant reductions in medical errors.5,6 High-quality \nhandoffs from emergency medicine (EM) to inpatient (IP) services (EM-to-IP) are challenged by \nmedical complexity, diagnostic uncertainty, rapidly evolving care plans, and time constraints.7-10 The \nEM-to-IP handoff structure is not well standardized, frequently communicated verbally, and poorly \n\nadhered to in emergency departments (EDs), including in medical centers with formalized handoff \nsystems.11-14 Prior research has demonstrated that suboptimal EM-to-IP handoff is associated with \nadverse events, EM leaders and front-line clinicians themselves view the EM-to-IP handoff as high \n\nrisk, and an electronic health record (EHR)-based technology is commonly mentioned as the most \ndesired assistive tool in improving ED transitions of care.15-18 Limited work to date has demonstrated \nEM electronic handoff tools as feasible, efficient, and effective.19-21 In April 2023, EM and internal \nmedicine leadership of the study site collaboratively developed and launched a mandatory, ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed8.pdf" + "text": "", + "page_start": 64, + "page_end": 64, + "source_file": "00-80T-80.pdf" }, { - "text": "**JAMA Network Open | Emergency Medicine**\n\nevaluation frameworks may not address the anticipated effect LLM performance limitations could \nhave on patient safety.38-41 \n\nIn this study, we aim to expand on prior work of clinical summarization to rigorously evaluate \n\nthe outcomes of a fine-tuned model developed to generate accurate and safe summaries of the care \n\nrendered during an ED visit, with the long-term goal of integrating automated, structured EM-to-IP \n\nhandoff notes into an EHR-based electronic handoff admission workflow (see eAppendix 1 in \n\nSupplement 1). We fine-tune pretrained LLMs on well curated datasets of structured and \n\nunstructured EHR data from the ED encounter to summarize the patient’s ED care. We improved the \n\ncorrectness of model generations and customized the summaries in a structured format designed \n\nby a team of EM and internal medicine physician leaders for optimal usefulness. We proposed a novel \n\npatient safety-focused LLM evaluation framework to examine the LLM-generated handoff notes’ \n\nquality and accuracy and the downstream patient safety implications of any identified inaccuracies. \n\nTo evaluate noninferiority, we compared the LLM-generated handoff notes with the preexisting \n\nphysician-written EM-to-IP handoff notes as the active control, using both the proposed patient ", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed8.pdf" + "text": "", + "page_start": 179, + "page_end": 179, + "source_file": "00-80T-80.pdf" }, { - "text": "Abbreviations: EM, emergency medicine; IP, inpatient. \n\na Automated EM handoff notes are generated from \n\nthe curation of the data through both rule-based and \nlarge language model–summarization approaches. \n\nDecember 3, 2024 4/12 ", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed8.pdf" + "text": "", + "page_start": 6, + "page_end": 6, + "source_file": "NASDAQ_SHEN_2003.pdf" } ] }, @@ -1493,70 +1493,70 @@ "target_page": 1, "target_passage": "LLM-generated EM-to-IP handoff notes were determined superior compared with physician-written summaries via conventional automated evaluation methods, but marginally inferior in usefulness", "chunk_present": { - "presence": true, - "index": 6 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 185, + "page_end": 185, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**Discussion**\n\nThe study demonstrated success in generating EM-to-IP handoff notes using both a fine tuned, \n\npretrained LLM and rule-based approaches within an end user–developed note template. It is \n\nimportant to note that (largely due to time constraints within the EM care delivery model) the \n\nperformance of EM-to-IP handoff notes was not the current standard of care in EM. The study site’s \n\nunique electronic handoff process enabled a comparison between physician-written and \n\nLLM-generated handoff notes. Traditional automated evaluations of the model output suggested ", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed8.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**Abstract**\n\n**IMPORTANCE**An emergency medicine (EM) handoff note generated by a large language model \n\n(LLM) has the potential to reduce physician documentation burden without compromising the safety \n\nof EM-to-inpatient (IP) handoffs. \n\n**OBJECTIVE**To develop LLM-generated EM-to-IP handoff notes and evaluate their accuracy and \n\nsafety compared with physician-written notes. \n\n**DESIGN, SETTING, AND PARTICIPANTS**This cohort study used EM patient medical records with \n\nacute hospital admissions that occurred in 2023 at NewYork-Presbyterian/Weill Cornell Medical \n\nCenter. A customized clinical LLM pipeline was trained, tested, and evaluated to generate templated \n\nEM-to-IP handoff notes. Using both conventional automated methods (ie, recall-oriented \n\nunderstudy for gisting evaluation [ROUGE], bidirectional encoder representations from transformers \n\nscore [BERTScore], and source chunking approach for large-scale inconsistency evaluation [SCALE]) \n\nand a novel patient safety-focused framework, LLM-generated handoff notes vs physician-written \n\nnotes were compared. Data were analyzed from October 2023 to March 2024. \n**Meaning**These findings suggest the \n\nvalue of a manual, patient safety– \n**EXPOSURE**LLM-generated EM handoff notes. \nfocused clinical evaluation of LLM \n\nmodels and the potential of \n\nLLM-generated handoff notes to create \n\na new standard of care in EM. ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed8.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "EHR-based handoff workflow via a standardized EM-to-IP handoff note template, designed for real- \n\ntime completion by the EM care team at time of admission. At 3 and 6 months postlaunch, informal \n\nevaluation of new EM-to-IP handoff notes through random medical record review and unstructured \n\nclinician feedback sessions revealed variable completeness, quality, and subsequent usefulness of \n\nthe handoff notes. ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed8.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**Key Points**\n\n**Question**Can a large language model \n\n(LLM) generate emergency medicine \n\n(EM)-to-inpatient (IP) handoff notes \n\nthat are useful and safe for EM care? \n\n**Findings**In this cohort study of 1600 \n\nEM patient medical records using a \n\nnovel evaluation framework, the \n\nLLM-generated EM-to-IP handoff notes \n\nhad a mean usefulness of 4.04 out of 5 \n\n(compared with 4.36 for \n\nphysician-written) and a mean patient \n\nsafety of 4.06 out of 5 (compared with \n\n4.50 for physician-written) with no \n\ncritical patient safety risks. ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed8.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**CONCLUSIONS AND RELEVANCE**In this cohort study of 1600 EM patient medical records, \n\nLLM-generated EM-to-IP handoff notes were determined superior compared with physician-written \n\nsummaries via conventional automated evaluation methods, but marginally inferior in usefulness \n\n(continued) ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed8.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**Data Curation for Automated ED Note Generation**\nThe EHR data were bifurcated into 2 datasets linked by the patient encounter number: 1 for the rule- \n\nbased pattern-matching approach and the other for the LLM fine-tuning discussed in further detail \n\nin eAppendix 1 in Supplement 1. The rule-based framework was designed by the 3 board certified EM \n\nphysicians (M.M., A.F., and P.S.). Fine tuning of the pretrained LLM consisted of the notes in**Table 1**: \n\nEM clinician notes, consultation notes, EM progress note entries, and EM procedure notes. The \n\nEM-to-IP handoff notes were used as the labels. As the preexisting labels were of variable quality for \n\nJAMA Network Open. 2024;7(12):e2448723. doi:10.1001/jamanetworkopen.2024.48723 (Reprinted) ", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed8.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**JAMA Network Open | Emergency Medicine**\n\nevaluation frameworks may not address the anticipated effect LLM performance limitations could \nhave on patient safety.38-41 \n\nIn this study, we aim to expand on prior work of clinical summarization to rigorously evaluate \n\nthe outcomes of a fine-tuned model developed to generate accurate and safe summaries of the care \n\nrendered during an ED visit, with the long-term goal of integrating automated, structured EM-to-IP \n\nhandoff notes into an EHR-based electronic handoff admission workflow (see eAppendix 1 in \n\nSupplement 1). We fine-tune pretrained LLMs on well curated datasets of structured and \n\nunstructured EHR data from the ED encounter to summarize the patient’s ED care. We improved the \n\ncorrectness of model generations and customized the summaries in a structured format designed \n\nby a team of EM and internal medicine physician leaders for optimal usefulness. We proposed a novel \n\npatient safety-focused LLM evaluation framework to examine the LLM-generated handoff notes’ \n\nquality and accuracy and the downstream patient safety implications of any identified inaccuracies. \n\nTo evaluate noninferiority, we compared the LLM-generated handoff notes with the preexisting \n\nphysician-written EM-to-IP handoff notes as the active control, using both the proposed patient ", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed8.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**Introduction**\n\nHandoffs, where patient information is exchanged between health professionals during a transfer of \nclinical responsibility, have been identified as a critical source of medical errors.1,2 The Joint \nCommission, the Accreditation Council for Graduate Medical Education, and the Association of \n\nAmerican Medical Colleges have all recommended the development of high-quality and standardized \nhandoff processes to address the substantial patient risk of this ubiquitous event.3,4 Implementing \nhandoff tools has previously demonstrated significant reductions in medical errors.5,6 High-quality \nhandoffs from emergency medicine (EM) to inpatient (IP) services (EM-to-IP) are challenged by \nmedical complexity, diagnostic uncertainty, rapidly evolving care plans, and time constraints.7-10 The \nEM-to-IP handoff structure is not well standardized, frequently communicated verbally, and poorly \n\nadhered to in emergency departments (EDs), including in medical centers with formalized handoff \nsystems.11-14 Prior research has demonstrated that suboptimal EM-to-IP handoff is associated with \nadverse events, EM leaders and front-line clinicians themselves view the EM-to-IP handoff as high \n\nrisk, and an electronic health record (EHR)-based technology is commonly mentioned as the most \ndesired assistive tool in improving ED transitions of care.15-18 Limited work to date has demonstrated \nEM electronic handoff tools as feasible, efficient, and effective.19-21 In April 2023, EM and internal \nmedicine leadership of the study site collaboratively developed and launched a mandatory, ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed8.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" } ] }, @@ -1567,70 +1567,70 @@ "target_page": 2, "target_passage": "NVIDIA released the MegatronLM", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 18, + "page_end": 18, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 60, + "page_end": 60, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" }, { - "text": "Transformer models, on the other hand, have been able to con- \ntinuously benefit from larger architectures and larger quantities of \ndata. Devlin et al. [39] in particular noted that training on a large \ndataset and fine-tuning for specific tasks leads to strictly increasing \nresults on the GLUE tasks [138] for English as the hyperparameters \nof the model were increased. Initially developed as Chinese LMs, the \nERNIE family [130, 131, 145] produced ERNIE-Gen, which was also \ntrained on the original (English) BERT dataset, joining the ranks \nof very large LMs. NVIDIA released the MegatronLM which has \n8.3B parameters and was trained on 174GB of text from the English \nWikipedia, OpenWebText, RealNews and CC-Stories datasets [122]. \nTrained on the same dataset, Microsoft released T-NLG,1 an LM \nwith 17B parameters. OpenAI’s GPT-3 [25] and Google’s GShard \n[73] and Switch-C [43] have increased the definition of large LM by \norders of magnitude in terms of parameters at 175B, 600B, and 1.6T \nparameters, respectively. Table 1 summarizes a selection of these \nLMs in terms of training data size and parameters. As increasingly \nlarge amounts of text are collected from the web in datasets such \nas the Colossal Clean Crawled Corpus [107] and the Pile [51], this \ntrend of increasingly large LMs can be expected to continue as long \nas they correlate with an increase in performance. ", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv5_ccby4license.pdf" + "text": "", + "page_start": 43, + "page_end": 43, + "source_file": "00-80T-80.pdf" }, { - "text": "FIG. 1. \n(color) Main figure: Major (red/black) and minor \n(green) hysteresis loops along the [110] axis at 5 K, for a \nFe (2 nm)/(Ga,Mn)As (20 nm) film, and the hysteresis loop \nfor a control (Ga,Mn)As (20 nm) film along the same axis \n(blue). Left inset: Magnetization versus temperature for the \nFe/(Ga,Mn)As film at remanence (black) and under a 500 Oe \napplied field (red). Right inset: Exchange bias field versus \nthickness d of the (Ga,Mn)As film (points) and fit showing \n1/d dependence (dashed line). ", - "page_start": 4, - "page_end": 4, - "source_file": "1001.2449.pdf" + "text": "", + "page_start": 23, + "page_end": 23, + "source_file": "ASX_STO_2004.pdf" }, { - "text": "6. DRIVE FUTURE GROWTH OPPORTUNITIES \nContinue to develop targeted new growth areas of our business, \ncommunications, mobile \nincluding machine-to-machine \ncommerce and video, business communications services, \nlocal and \ndigital media services, home automation and sports. \n\n(M2M) \n\n3. EXPAND OUR SERVICES REACH \nExpand the reach of our networks and services \nthrough new \nconstruction and targeted acquisitions that complement our existing \nplatforms; by more widely deploying products and services; and by \nexpanding the reach of our key media brands nationally and across our \ndigital platforms. \n\nOUR PROGRESS IN 2013 \nWe made strides in the M2M market this year, demonstrating a single, \nworldwide SIM card with our M2M global alliance partners that will \ncustomers, and \nstrengthen our M2M offering to multinational \nannouncing an M2M agreement with Sprint to bring a comprehensive \nin-car infotainment solution to the Canadian market. We also certified \nthe Suretap wallet, our mobile payment service, for the Android and \nBlackBerry 10 operating smartphone systems. We received a licence to \noperate a bank for the purposes of launching a Rogers’ branded credit \ncard. In addition, we expanded our Rogers Smart Home Monitoring \nfootprint, and launched other initiatives such as Outrank, an online site \nfor marketing and advertising small business, introduced Rogers Alerts \nand other digital opportunities. ", - "page_start": 36, - "page_end": 36, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 22, + "page_end": 22, + "source_file": "ASX_STO_2004.pdf" }, { - "text": "Figure 12-32 Configuration of the primary SKLM server \n\n5. \n\nIf you want to add secondary SKLM servers, click the “**+**” symbol and enter the data for \nsecondary SKLM servers, as shown on Figure 12-33. You can define up to four SKLM \nservers. Click**Next**when you are done. ", - "page_start": 652, - "page_end": 652, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "ASX_STO_2004.pdf" }, { - "text": "Dorsal root ganglia were dissected from MrgDCreERT2;Ai32 and \nCalcaCreERT2;Ai32 mice .1 week after dosing with tamoxifen and \nenzymatically digested at 37˚˚C for 80 minutes in dispase type II \n(4.7 mg/mL) plus collagenase type II (4 mg/mL) (Worthington \nBiochemical), as described previously.63 Mechanically dissoci- \nated cells were plated onto laminin/poly-D-lysine (R&D Systems, \nMinneapolis, MN) treated coverslips in complete Neurobasal Plus \nmedium (Neurobasal Plus media supplemented with 2% (vol/vol) \nB27 Plus, 1% N2, 1% Glutamax, and 1% antibiotic–antimycotic \n[ThermoFisher Scientific, Waltham, MA]). Mouse nerve growth \nfactor (GF) (50 ng/mL; nerve growth factor (NGF), PeproTech, \nCranbury, NJ) and 10 ng/mL glial-derived neurotrophic factor \n(GDNF, PeproTech) were added to the media under some \nconditions. Cytosine b-D-arabinofuranoside (4 mM) was added to \nthe media for 24 hours the day after plating to reduce the \nproliferation of nonneuronal cells. Media was refreshed 3 times \nper week thereafter. Cultures were fixed for 10 minutes at room \ntemperature with 4% paraformaldehyde and subsequently \nprocessed by immunocytochemistry (described earlier). ", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed2.pdf" + "text": "", + "page_start": 43, + "page_end": 43, + "source_file": "00-80T-80.pdf" }, { - "text": "We have certain arrangements to buy additional spectrum, subject to regulatory approvals: \n\n**Type of spectrum** **Transaction** **Who it will support**\n\nAWS spectrum \nAcquired an option to buy Shaw’s AWS spectrum holdings in 2014. \nNot yet exercised and will require regulatory approvals. \n4G LTE subscribers \n\nAWS spectrum \n\nPart of a larger strategic transaction with Videotron, which could \nlead to the acquisition of Videotron’s Toronto AWS spectrum. If a \ntransaction does occur, it will require regulatory approvals. \n\n4G LTE subscribers ", - "page_start": 42, - "page_end": 42, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 19, + "page_end": 19, + "source_file": "ASX_STO_2004.pdf" }, { - "text": "[101] L. V. Govor, G. Reiter, G. H. Bauer, and J. Parisi, “Self-assembled treelike patterns from an evapo- \n\nrating binary solution,” Phys. Rev. E 74, 061603 (2006). \n\n[102] M. Yamamura, T. Nishio, T. Kajiwara, and K. Adachi, “Evaporation-induced pattern formation in \n\npolymer films via secondary phase separation,” Chem. Eng. Sci. 57, 2901–2905 (2002). \n\n[103] P. M¨uller-Buschbaum, E. Bauer, S. Pfister, S. V. Roth, M. Burghammer, C. Riekel, C. David, and \n\nU. Thiele, “Creation of multi-scale stripe-like patterns in thin polymer blend films,” Europhys. Lett. \n\n73, 35–41 (2006). \n\n[104] E. Bormashenko, R. Pogreb, O. Stanevsky, Y. Bormashenko, T. Stein, and O. Gengelman, “Meso- ", - "page_start": 32, - "page_end": 32, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 43, + "page_end": 43, + "source_file": "00-80T-80.pdf" }, { - "text": "measurements were performed on beamline I06 at the \nDiamond Light Source, and on beamline 4.0.2 at the Ad- \nvanced Light Source. Total-electron yield (TEY) and \nfluorescence yield (FY) were monitored simultaneously \nusing the sample drain current and the photocurrent of a \ndiode mounted at 90◦ to the incident beam, respectively. \nwere \nmagnetometry \nand \ncontrol Fe/GaAs(001) \nfirst \non \nperformed \ngrown under \nthe \nsamples, \n(Ga,Mn)As/GaAs(001) \nsame conditions as the bilayers, \nto determine the \nmagnetic anisotropies of the individual layers and the \nCurie temperature of the (Ga,Mn)As layer. The Fe film \nhas a uniaxial magnetic anisotropy with easy axis along \nthe [110] orientation, similar to previous studies6. For \nthe (Ga,Mn)As control sample, there is a competition \nbetween cubic and uniaxial magnetic anisotropies, with \nthe former dominant at low temperatures and favoring \neasy axes along the in-plane h100i orientations, and the \nlatter dominant close to TC (∼35 K) giving an easy axis \nalong the [1¯10] orientation. Figure 1 shows [110] magne- \ntization versus temperature curves and low temperature \nhysteresis loops for a bilayer film containing a 20 nm \nthick (Ga,Mn)As layer. The total remnant moment of \nthe bilayer film decreases on cooling under zero magnetic \nfield below the TC of the (Ga,Mn)As, indicating that \nthis layer aligns antiparallel to the Fe magnetization \nat zero field. The hysteresis curve shows a two-step \nmagnetization reversal, indicating different behavior of \nthe Fe and (Ga,Mn)As layers, with the smaller loop \nattributed to the dilute moment (Ga,Mn)As film. The \nminor hysteresis loop shown in Fig. 1 clearly shows a \nshift from zero field by a bias field HE, indicating that \nthe Fe layer induces an exchange bias in the magnetic \nsemiconductor. The shape and size of the minor loop \nis in agreement with the hysteresis loop for the control \n(Ga,Mn)As sample, also shown in Fig. 1. This strongly \nindicates that the exchange bias affects the whole of the \n(Ga,Mn)As layer in the bilayer sample. \n\nSQUID ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2449.pdf" + "text": "", + "page_start": 16, + "page_end": 16, + "source_file": "ASX_STO_2004.pdf" } ] }, @@ -1641,70 +1641,70 @@ "target_page": 3, "target_passage": "the average human is responsible for an estimated 5t CO2e per year", "chunk_present": { - "presence": true, - "index": 9 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 210, + "page_end": 210, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "but also a result of the different forcings influencing the atmosphere model at the time of passing \neach GWL, and the interaction with the climate sensitivity of HadGEM3. The radiative forcing \nof non-CO2 forcings has previously been highlighted as a potentially important influence on \npatterns of climate change at 1.5°C and 2°C global warming [39]. Furthermore, despite some \ndifferences in regional climate responses between ensemble members, there were also some \nremarkable consistencies especially in the changes that might be considered inconsistent with \na warming climate, such as regions such as northern South America where heavy rainfall \n(Rx5day) decreases rather increasing as might be expected under a warming climate. Again, these \nconsistencies point to some common forcing of all simulations. \n\n**24**\n\nOne key factor is the different times of passing a particular GWL, because the net radiative \nforcing would be different even though the same emissions and concentration scenario was used \nin all simulations. A given GWL was reached at a different time in each ensemble member, so \nthe CO2 and aerosol concentrations vary between ensemble members; in members reaching a \nGWL early, such as that driven by IPSL-CM5A-LR, the CO2 concentration is relatively lower \nthan in other members, and the total aerosol concentration would be relatively higher (CO2 \nconcentrations are projected to increase in RCP8.5, but aerosol concentrations are projected \ndecline). The net radiative forcing is smaller, because in RCP8.5 the increase positive radiative \nforcing from CO2 is greater than the decrease in net negative radiative forcing from aerosols. \nMoreover, the physiological effect of CO2 is also smaller, meaning that the consequent reduction \nin transpiration and associated additional land surface warming influence would also be expected \nto be smaller. ", - "page_start": 24, - "page_end": 24, - "source_file": "pubmed11.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**Table 2.**Hashtags that remained on the top 50 list for the climate change or the global warming \ndiscourse from 2009 to 2018. \n\n**Unique** **Shared**\n\n#climatechange \n#globalwarming china, solar, water, food, economy, coal, sustainability \npollution, earth co2, news, carbon, green, climate, \nus, energy, science, environment ", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "In the past hundred years, the global climate has experienced great changes1–4. According to the sixth assess- \nment report of IPCC, the global average surface temperature increased by 1.09 °C between 1850 and 2020, and \nalmost all regions in the world experienced surface warming5. Due to global warming, the extreme climate events \nbecome more and more frequent, and the ecological environment problems caused by climate change are more \nand more serious, which restrict the sustainable development of human society and health6–10. Global warming \nhas gradually changed from a scientific issue to a major social issue of common concern to governments and \npeople of all countries11–13. In 2016, nearly 200 parties of the United Nations Framework Convention on climate \nchange reached the Paris Agreement at the climate change conference in Paris14. Paris Agreement has indicated \nthat it is urgent to hold the increase in global average temperature well below 2.0 °C above pre-industrial levels \nand pursue efforts to limit the temperature increase to 1.5 °C above pre-industrial levels. ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed9.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**1. Introduction**\n\nThe public’s distinct understanding of the cause and effect of the global climate issue is an obstacle \nto joint mitigation actions. In addition to a diversity of views co-existing in the public discourse [1,2], \nprevious studies noticed that the public had even failed to reach an agreement on whether “climate \nchange” or “global warming” is the most appropriate definition of the global climate concern [3–5]. \nAccording to the definition provided by [6], global warming describes global climate issues as \na continuous increase in the average temperature of Earth’s surface due to anthropogenic emissions \nof greenhouse gases, whereas climate change includes not only temperature rise but also a range of \n\nInt. J. Environ. Res. Public Health**2020**, 17, 1062; doi:10.3390/ijerph17031062 www.mdpi.com/journal/ijerph ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Even when climate change and global warming shared concern about similar topics such as the \ncause of the climate issue, global warming tended to focus on carbon emission phenomena, whereas \nclimate change preferred a more in-depth perspective, highlighting the importance of global action \nto mitigate the climate issue in its second-largest cluster, with energy structure as the contributor to \ncarbon emissions in its third largest cluster. As invisible causes and disbelief in actions have long \nbeen regarded as two key reasons for low climate concern [90], the two terminologies’ differences \nin connotations suggest that introducing these absent sub-topics into global warming discourse or \nhighlighting climate change for its inherent connotations may help communicators raise public concern \nabout climate. \n\n5.1.2. Political Connotations \n\nStudies noted that frame preference between climate change and global warming reflects \nindividuals’ ideological spectrum, where climate change and global warming were favored by \nthe liberals and conservatives, respectively [10]. The cluster analysis of the semantic network in the \ncurrent study demonstrated that global warming triggered far more political responses than climate \nchange. The second largest cluster of global warming was politics-based, where hashtag “tcot”, favored \nby right-leaning users and “p2”, favored by left-leaning users, were both ranked in the list of top nodes \nof the global warming discourse, but neither was included in the list of top nodes of the climate change \ndiscourse. Considering that earlier findings suggested that global warming was more likely to be used \nby conservatives to question the reality of climate issue [11] and climate change is more commonly \nadopted when discussing action against the climate change issue [5], global warming had a stronger \npolitical connotation in public discussion. ", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\nTYPICAL STALLSEQUENCE ", - "page_start": 250, - "page_end": 250, - "source_file": "00-80T-80.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "In the battle against global warming, both \nIn the battle against global warming, both \n\npublic and private sectors are facing mounting \npublic and private sectors are facing mounting \n\npressure to curb carbon dioxide pollution from \npressure to curb carbon dioxide pollution from \n\ntransportation, one of the major sources of \ntransportation, one of the major sources of \n\nemissions. Against this backdrop, the Japan \nemissions. Against this backdrop, the Japan \n\nResearch Institute is supporting environmental \nResearch Institute is supporting environmental \n\nbusinesses that map out pathways and \nbusinesses that map out pathways and \n\ndevelop projects, tailored to the needs of \ndevelop projects, tailored to the needs of \n\npar ticular localities, to bring about a \npar ticular localities, to bring about a \n\nlow-carbon society. Experimental projects are \nlow-carbon society. Experimental projects are \n\ncurrently underway in Kanagawa Prefecture, \ncurrently underway in Kanagawa Prefecture, \n\nSaitama Prefecture, Kyoto and Sapporo. \nSaitama Prefecture, Kyoto and Sapporo. \n\nThese initiatives are aimed at hastening the \nThese initiatives are aimed at hastening the \n\nadoption of electric vehicles and car-sharing \nadoption of electric vehicles and car-sharing ", - "page_start": 13, - "page_end": 13, - "source_file": "NYSE_SMFG_2011.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "3 ENVIRONMENTAL AND FINANCIAL COST \nStrubell et al. recently benchmarked model training and develop- \nment costs in terms of dollars and estimated 𝐶𝑂2 emissions [129]. \nWhile the average human is responsible for an estimated 5t 𝐶𝑂2𝑒 \nper year,2 the authors trained a Transformer (big) model [136] with \nneural architecture search and estimated that the training procedure \nemitted 284t of 𝐶𝑂2. Training a single BERT base model (without \nhyperparameter tuning) on GPUs was estimated to require as much \nenergy as a trans-American flight. \n\nWhile some of this energy comes from renewable sources, or \ncloud compute companies’ use of carbon credit-offset sources, the \nauthors note that the majority of cloud compute providers’ energy is \nnot sourced from renewable sources and many energy sources in the \nworld are not carbon neutral. In addition, renewable energy sources \nare still costly to the environment,3 and data centers with increasing \ncomputation requirements take away from other potential uses of ", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv5_ccby4license.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" } ] }, @@ -1715,70 +1715,70 @@ "target_page": 5, "target_passage": " the Black Lives Matter movement (BLM) influenced Wikipedia article generation and editing such that, as the BLM movement grew, articles covering shootings of Black people in- creased in coverage and were generated with reduced latency", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 210, + "page_end": 210, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 19, + "page_end": 19, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Thus at each step, from initial participation in Internet fora, to \ncontinued presence there, to the collection and finally the filtering \nof training data, current practice privileges the hegemonic view- \npoint. In accepting large amounts of web text as ‘representative’ \nof ‘all’ of humanity we risk perpetuating dominant viewpoints, \nincreasing power imbalances, and further reifying inequality. We \ninstead propose practices that actively seek to include communities \nunderrepresented on the Internet. For instance, one can take inspi- \nration from movements to decolonize education by moving towards \noral histories due to the overrepresentation of colonial views in \ntext [35, 76, 127], and curate training datasets through a thoughtful \nprocess of deciding what to put in, rather than aiming solely for \nscale and trying haphazardly to weed out, post-hoc, flotsam deemed \n‘dangerous’, ‘unintelligible’, or ‘otherwise bad’. \n\n4.2 Static Data/Changing Social Views \nA central aspect of social movement formation involves using lan- \nguage strategically to destabilize dominant narratives and call at- \ntention to underrepresented social perspectives. Social movements \nproduce new norms, language, and ways of communicating. This \nadds challenges to the deployment of LMs, as methodologies re- \nliant on LMs run the risk of ‘value-lock’, where the LM-reliant \ntechnology reifies older, less-inclusive understandings. \n\nFor instance, the Black Lives Matter movement (BLM) influenced \nWikipedia article generation and editing such that, as the BLM \nmovement grew, articles covering shootings of Black people in- \ncreased in coverage and were generated with reduced latency [135]. \nImportantly, articles describing past shootings and incidents of po- \nlice brutality were created and updated as articles for new events \nwere created, reflecting how social movements make connections \nbetween events in time to form cohesive narratives [102]. More \ngenerally, Twyman et al. [135] highlight how social movements \nactively influence framings and reframings of minority narratives ", - "page_start": 5, - "page_end": 5, - "source_file": "arxiv5_ccby4license.pdf" + "text": "", + "page_start": 19, + "page_end": 19, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**The \"hard-wired view\"**\n\nJoseph Levine (who formulated the notion of the explanatory gap) states: \"The explanatory gap argument \ndoesn't demonstrate a gap in nature, but a gap in our understanding of nature.\"[91] He nevertheless \ncontends that full scientific understanding will not close the gap,[43] and that analogous gaps do not exist \nfor other identities in nature, such as that between water and H2O.[92] The philosophers Ned Block and \nRobert Stalnaker agree that facts about what a conscious experience is like to the one experiencing it \ncannot be deduced from knowing all the facts about the underlying physiology, but by contrast argue that \nsuch gaps of knowledge*are*also present in many other cases in nature, such as the distinction between \nwater and H2O.[93][12] \n\nTo explain why these two ways of knowing (i.e. third-person scientific observation and first-person \nintrospection) yield such different understandings of consciousness, weak reductionists often invoke the \n*phenomenal concepts strategy*, which argues the difference stems from our inaccurate phenomenal \nconcepts (i.e., how we think about consciousness), not from the nature of consciousness itself.[94][95] By \nthis view, the hard problem of consciousness stems from a dualism of concepts, not from a dualism of \nproperties or substances.[43] ", - "page_start": 11, - "page_end": 11, - "source_file": "wikipedia2.pdf" + "text": "", + "page_start": 19, + "page_end": 19, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**Integrated information theory**\n\nIntegrated information theory (IIT), developed by the neuroscientist and psychiatrist Giulio Tononi in \n2004 and more recently also advocated by Koch, is one of the most discussed models of consciousness in \nneuroscience and elsewhere.[135][136] The theory proposes an identity between consciousness and \nintegrated information, with the latter item (denoted as Φ) defined mathematically and thus in principle \nmeasurable.[136][137] The hard problem of consciousness, write Tononi and Koch, may indeed be \nintractable when working from matter to consciousness.[15] However, because IIT inverts this relationship \nand works from phenomenological axioms to matter, they say it could be able to solve the hard \nproblem.[15] In this vein, proponents have said the theory goes beyond identifying human neural \ncorrelates and can be extrapolated to all physical systems. Tononi wrote (along with two colleagues): \n\nWhile identifying the \"neural correlates of consciousness\" is undoubtedly important, it is \nhard to see how it could ever lead to a satisfactory explanation of what consciousness is and \nhow it comes about. As will be illustrated below, IIT offers a way to analyze systems of \nmechanisms to determine if they are properly structured to give rise to consciousness, how \nmuch of it, and of which kind.[138] ", - "page_start": 16, - "page_end": 16, - "source_file": "wikipedia2.pdf" + "text": "", + "page_start": 19, + "page_end": 19, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**Type-B Materialism**\n\nType-B Materialism, also known as*Weak Reductionism*or*A Posteriori Physicalism*, is the view that the \nhard problem stems from human psychology, and is therefore not indicative of a genuine ontological gap \nbetween consciousness and the physical world.[43] Like Type-A Materialists, Type-B Materialists are ", - "page_start": 10, - "page_end": 10, - "source_file": "wikipedia2.pdf" + "text": "", + "page_start": 19, + "page_end": 19, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**Type-C Materialism**\nType-C materialists acknowledge a distinction between knowledge and experience[98] without asserting a \nmore complete explanation for the experiential phenomenon. One taking this view would admit that there \nis an explanatory gap for which no answer to date may be satisfactory, but trust that inevitably the gap \nwill be closed.[52] This is described by analogy to progression in other areas of science, such as mass- \nenergy equivalence which would have been unfathomable in ancient times,[52] abiogenesis which was \nonce considered paradoxical from an evolutionary framework,[99][98] or a suspected future theory of \neverything combining relativity and quantum mechanics. Similarly, type-C materialism posits that the \nproblem of consciousness is a consequence of our ignorance[71][100] but just as resolvable as any other \nquestion in neuroscience. \n\nBecause \ntype-C materialism does not \npresuppose[101] the descriptive question, for instance that there is any self-consciousness, wakefulness, or \neven sentience[102] in a rock. Principally, the basis for the argument arises from the apparently high \ncorrelation of consciousness with living brain tissue,[103] thereby rejecting panpsychism[101] without \nexplicitly formulating physical causation. More specifically this position denies the existence of \nphilosophical zombies[64] for which there is an absence of data and no proposed method of \ntesting.[104][105] Whether via the inconceivability or actual nonexistence of zombies, a contradiction is \nexposed nullifying the premise of the consciousness problem's \"hardness\". \n\nthe explanatory question of consciousness is evaded, ", - "page_start": 12, - "page_end": 12, - "source_file": "wikipedia2.pdf" + "text": "", + "page_start": 19, + "page_end": 19, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Get writing suggestions \n\nWith**Editor**, bring out your best writing. Editor helps you bring out your best \nwriting by giving you intelligent writing suggestions. It also calculates an Editor \nScore based on the number and types of suggestions you have yet to address. \nSelect an underlined word or phrase to accept or ignore a suggestion. ", - "page_start": 3, - "page_end": 3, - "source_file": "Word QS.pdf" + "text": "", + "page_start": 19, + "page_end": 19, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**Type-A Materialism**\n\nType-A materialism (also known as*reductive materialism*or*a priori physicalism*) is a view characterized \nby a commitment to physicalism and a full rejection of the hard problem. By this view, the hard problem \neither does not exist or is just another easy problem, because every fact about the mind is a fact about the \nperformance of various functions or behaviours. So, once all the relevant functions and behaviours have \nbeen accounted for, there will not be any facts left over in need of explanation.[52] Thinkers who \nsubscribe to type-A materialism include Paul and Patricia Churchland, Daniel Dennett, Keith Frankish, \nand Thomas Metzinger. \n\nSome type-A materialists believe in the reality of phenomenal consciousness but believe it is nothing \nextra in addition to certain functions or behaviours. This view is sometimes referred to as*strong*\n*reductionism*.[43][52] Other type-A materialists may reject the existence of phenomenal consciousness \nentirely. This view is referred to as eliminative materialism or illusionism.[59][60][61] ", - "page_start": 7, - "page_end": 7, - "source_file": "wikipedia2.pdf" + "text": "", + "page_start": 19, + "page_end": 19, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Eliminative materialism and illusionism have been the subject of criticism within the popular press. One \nhighly cited example comes from the philosopher Galen Strawson who wrote an article in the New York \nReview of Books titled \"The Consciousness Deniers\". In it, Strawson describes illusionism as the \"silliest \nclaim ever made\", next to which \"every known religious belief is only a little less sensible than the belief \nthat the grass is green.\"[85] Another notable example comes from Christof Koch (a neuroscientist and one \nof the leading proponents of Integrated Information Theory) in his popular science book*The Feeling of*\n*Life Itself*. In the early pages of the book, Koch describes eliminativism as the \"metaphysical counterpart \nto Cotard's syndrome, a psychiatric condition in which patients deny being alive.\"[86] Koch takes the \nprevalence of eliminativism as evidence that \"much of twentieth-century analytic philosophy has gone to \nthe dogs\".[87] ", - "page_start": 10, - "page_end": 10, - "source_file": "wikipedia2.pdf" + "text": "", + "page_start": 19, + "page_end": 19, + "source_file": "NYSE_MGM_2004.pdf" } ] }, @@ -1789,70 +1789,70 @@ "target_page": 1, "target_passage": "simple phenomenological models such as the primitive model (PM), for which the ions are assimi- lated to charged hard spheres", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, + "text": "", + "page_start": 24, + "page_end": 24, "source_file": "Excel Training Manual 1.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, + "text": "", + "page_start": 12, + "page_end": 12, "source_file": "Excel Training Manual 1.pdf" }, { - "text": "0 \n1 \n0 \n2 \n\nn \na \nJ \n\n5 \n1 \n\nSince the pioneering works of Debye, H¨uckel, and \nOnsager, electrolyte solutions have been commonly \ndescribed by continuous solvent models, \nfor which \nthe McMillan-Mayer theory [1] provides a rigorous \nstatistical-mechanical foundation. Within that level of \ndescription, simple phenomenological models such as the \nprimitive model (PM), for which the ions are assimi- \nlated to charged hard spheres [2], can lead to explicit \nformulas for the thermodynamic and structural proper- \nties (e.g., with the help of the mean spherical approxima- \ntion (MSA) [3] or the binding MSA (BIMSA) [4]). These \nmodels are the most practical to use [5], since they allow \nfor a direct link between the experimental measurements \nand the microscopic parameters of the system. Never- \ntheless, they ignore the molecular structure of the sol- \nvent. Consequently, they cannot properly account for \nthe complex specific effects of the ions, which appear in \nnumerous biological, chemical, and physical interfacial \nphenomena [6, 7], without further developments. ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2648.pdf" + "text": "", + "page_start": 335, + "page_end": 335, + "source_file": "00-80T-80.pdf" }, { - "text": "molecular dynamics (MD) results. Different approxima- \ntions of the PM are employed for the case of NaCl elec- \ntrolyte solutions: a two component model (MSA2), that \nonly takes free ions into account, and two different three \ncomponent models (MSA3 and BIMSA3), which include \na third species (the contact ion pair). As we proceed \nto show, LPT allows us to select the best simple model \nwhich accurately accounts for the thermodynamics and \nthe physical-chemistry of the system. \n\nThe first stage consists in calculating the McMillan- \nMayer effective ion-ion interaction potentials V eff \nij (r), by \ninverting the radial distribution functions (RDF) gij(r) \nobtained by MD. The simulations were carried out on \na box of 2000 water molecules and 48 NaCl pairs us- \ning the same interaction potentials as in reference [16]. \n1. \nThis setup corresponds to a concentration of 0.64 mol l− \nNPT ensemble sampling at standard pressure and tem- \nperature was enforced, with a time step of 1 fs and a \npressure bath coupling constant of 1 ps. An equilibration \nrun of 0.25 ns was followed by a production run of 0.6 ns \nfor five different initial configurations. The averages of \nthe resulting RDF were then used for the potential inver- \nsion via the HNC closure [15]. These effective potentials \nare assumed to be concentration independent and will be \nused for simulations at all concentrations. ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2648.pdf" + "text": "", + "page_start": 336, + "page_end": 336, + "source_file": "00-80T-80.pdf" }, { - "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl \nsolutions \n\nJohn Jairo Molina1,2,3,∗ Jean-Fran¸cois Dufrˆeche1,2,3,† Mathieu \nSalanne1,2, Olivier Bernard1,2, Marie Jardat1,2, and Pierre Turq1,2 \n1 UPMC-Universit´e Paris 06, UMR 7195, PECSA, F-75005 Paris, France \n2 CNRS, UMR 7195, PECSA, F-75005 Paris, France \n3 Institut de Chimie S´eparative de Marcoule (ICSM), \nUMR 5257 CEA–CNRS–Universit´e Montpellier 2, Site de Marcoule, \nBˆatiment 426, BP 17171, 30207 Bagnols-sur-C`eze Cedex, France \n\nWe present a method to derive implicit solvent models of electrolyte solutions from all-atom \ndescriptions; providing analytical expressions of the thermodynamic and structural properties of \nthe ions consistent with the underlying explicit solvent representation. Effective potentials between \nions in solution are calculated to perform perturbation theory calculations, in order to derive the \nbest possible description in terms of charged hard spheres. Applying this method to NaCl solutions \nyields excellent agreement with the all-atom model, provided ion association is taken into account. ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2648.pdf" + "text": "", + "page_start": 336, + "page_end": 336, + "source_file": "00-80T-80.pdf" }, { - "text": "] \nh \np \n- \nm \ne \nh \nc \n. \ns \nc \ni \ns \ny \nh \np \n[ \n\n1 \nv \n8 \n4 \n6 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nAn alternative procedure consists in carrying out \nmolecular simulations, where both the solvent and solute \nare treated explicitly. After a rigorous averaging over \nthe solvent configurations, a coarse-grained description \nof the ions, which still includes the effect of the solvent \nstructure, can be obtained [8–11]. However, this set of \nmethods is purely numeric; they do not provide any an- \nalytical expression for thermodynamic quantities. They \nare therefore restricted to simple geometries [12, 13] (bulk \nsolutions or planar interfaces). The description of com- \nplex systems, such as porous or electrochemical materi- \nals, is still based on continuous solvent models [14]. \n\nIn this letter we present a method aimed at bridging \nthe gap between analytical and numerical approaches. It \nis based on the application of liquid perturbation theory \n(LPT) [15] to effective ion-ion potentials extracted from ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2648.pdf" + "text": "", + "page_start": 336, + "page_end": 336, + "source_file": "00-80T-80.pdf" }, { - "text": "To overcome this difficulty, we have explicitly intro- \nduced the CIP in our model (species 3). Straightforward \ncalculations, based on a characteristic-function formal- \nism, allow us to define an equivalent model in which \nthe free ions and the CIP are explicitly taken into ac- \ncount [19, 20]. We apply this formalism by defining a \npair as an anion and a cation at a distance less than \n4 ˚A, which corresponds to the position of the effective \npotential maximum. The interaction between free, like \ncharges in this new system remains unchanged, and the \ncation-anion interactions are easily approximated by ex- ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2648.pdf" + "text": "", + "page_start": 336, + "page_end": 336, + "source_file": "00-80T-80.pdf" }, { - "text": "To conclude, we have combined MD simulations with \nLPT to construct simple models of electrolyte solutions \nwhich account for the molecular nature of the solvent. \nThe final result is fully analytical and it yields the ther- \nmodynamic and structural properties of the solution, in \nagreement with the original molecular description. The \nmethodology can in principle be adapted to any molecu- \nlar description of the system (MD simulations involving \ninteraction potentials accounting for polarization effects \nor Car-Parrinello MD simulations for example) as long \nas the ion-ion RDF are known. It can also be generalized \nto study interfaces. The method appears to be a promis- \ning approach toward the description of the specific effects \nof ions, especially for complex systems whose modeling \nrequires an analytic solution. \n\n8 \n\nFIG. 5: (Color online) RDF obtained from MC simulations \n(diamond), BIMSA3 (solid line), and MSA-fit (dot dashed) \nat two concentrations. \n\nThe RDF obtained within BIMSA3 are compared with \nthe MC and MSA-fit results in Fig. 5. Our BIMSA3 \nmodel accounts for the strong molecular peak of the CIP \nand provides the correct distances of minimal approach; \nwhereas the naive MSA-fit procedure ignores the former \nand gives poor estimates for the latter. At larger sep- \narations, the BIMSA3 results do not reproduce the os- \ncillations observed in the MC simulations, but the cor- \nresponding energy oscillations in the effective potentials \nIn addition, the perturbation term \nare less than kBT . ", - "page_start": 4, - "page_end": 4, - "source_file": "1001.2648.pdf" + "text": "", + "page_start": 336, + "page_end": 336, + "source_file": "00-80T-80.pdf" }, { - "text": "ing the temporal dynamics of belief changes in experimental participants. Dynamic belief \ntrajectories can then be related to other (for example, physiological) measures, as is usual \nin model-based neuroscience [65]. This method can also, in principle, be used for fitting \nmodels to other types of experimentally observable systems, like animals, organoids [66], \nand simulated or emergent systems [67]. The package can also be used for agent-based \nmodelling in general, for repeating earlier analyses with sampling based model-fitting \nand for comparing POMDP-based AIF models directly to other types of models. \n\nSince they implement full approximate Bayesian inferences, AIF models are compu- \ntationally more demanding than many approaches traditionally used in cognitive and \nagent-based modelling, in particular when the dimensionality of the generative model is \nlarge. This means that models with highly multidimensional or complex behaviour and \nlarge numbers of agents can be computationally infeasible to implement, especially given \nthe additional computational demands introduced by fitting these models to empirical \ndata. Avenues for addressing this implicit scaling problem were proposed in the context of \nmachine learning applications [68,69], and with the use of simplifying assumptions—the \nuse of which are ubiquitous in computational modelling—AIF has been used to model \nmulti-agent phenomena, such as opinion dynamics [15,70], coordinated foraging [71] and \nfish school movements [12]. It remains to be explored how AIF models can be applied to \nhighly complex natural phenomena, such as a concrete election, which underscores the \nneed for efficient but flexible and accessible software tools in the field. ", - "page_start": 29, - "page_end": 29, - "source_file": "pubmed7_cc4.pdf" + "text": "", + "page_start": 336, + "page_end": 336, + "source_file": "00-80T-80.pdf" }, { - "text": "We first used LPT for a two-component system (Na+ \nand Cl− free ions) within the MSA (model MSA2), for \n1. The mini- \nconcentrations ranging from 0.1 to 2.0 mol l− \nmization leads to almost constant diameters on the whole \nrange of concentration: σ1 = 3.67 ˚A and σ2 = 4.78 ˚A. \nAs shown in Fig. 2, these parameters yield osmotic co- \nefficients close to MC calculations only at very low con- \n1 (experimental values are \ncentration, i.e., c ≤ 0.1 mol l− \ngiven for indicative purposes only, since a perfect model \nwill exactly match the MC results). For molar solutions, \nthe LPT results differ considerably from MC calculations. \nThis discrepancy can easily be understood by comparing \nthe diameters found within the MSA2 calculation with \nthe effective potentials given in Fig. 1. The anion/cation \ncontact distance obtained within the MSA2 calculation \nis 4.2 ˚A, which is in the region of the second minimum of \nthe effective potential and corresponds to the situation \nwhere there is a single layer of water molecules between \nthe ions. The first minimum of the potential, which cor- \nresponds to the contact ion pair (CIP) is thus completely \nignored by the MSA2 calculation. If the MSA diameters \nare directly fitted to reproduce the MC osmotic pres- \nsure, much smaller values are obtained. These MSA-fit \nhydrated diameters, which are compared to the MSA2 \ndiameters in the bottom part of Fig. 2, are averages of \nthe CIP and the solvent-separated ion pair. ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2648.pdf" + "text": "", + "page_start": 336, + "page_end": 336, + "source_file": "00-80T-80.pdf" } ] }, @@ -1863,70 +1863,70 @@ "target_page": 2, "target_passage": "The principle of LPT is to describe the properties of a given system in terms of those of a well known reference system, with the differ- ence between them treated as a perturbation in the ref- erence potential", "chunk_present": { - "presence": true, - "index": 3 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 189, + "page_end": 189, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 261, + "page_end": 261, + "source_file": "00-80T-80.pdf" }, { - "text": "scopic film. We have seen that the KMC model is able to describe the interplay of solute diffusion \n\nwithin the solvent and solvent evaporation/condensation. It also takes the liquid-liquid, liquid- \n\nparticle and particle-particle interactions into account and therefore allows us to distinguish differ- \n\nent regimes of the transverse (fingering) instability of the evaporative dewetting front: a transport \n\nregime where the instability is almost completely independent of the interaction strengths and \n\na demixing regime where particles and liquid demix at the receding front thereby increasing its \n\ntransverse instability. \n\nThe dynamical density functional theory describes the coupled dynamics of the density fields of \n\nthe liquid and the nanoparticles. In the form described above (i.e. based on the two-dimensional \n\nhamiltonian (3)) we obtain a simple theory that allows us to study the time evolution of the evapo- \n\nrating ultrathin film and also to investigate the influence of processes such as surface diffusion by \n\nthe liquid, which are not incorporated in the KMC model. However, it is straightforward to extend \n\nthe theory to consider a fully three-dimensional fluid film, in which one can distinguish between ", - "page_start": 24, - "page_end": 24, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 39, + "page_end": 39, + "source_file": "sg246915.pdf" }, { - "text": "pute all ion thermodynamic properties through implicit \nsolvent MC simulations. \n\nThe second stage of our coarse-graining procedure con- \nsists in applying LPT, in order to deduce the best ana- \nlytical model of electrolyte solutions which reproduces \nthis molecular description. The principle of LPT is to \ndescribe the properties of a given system in terms of \nthose of a well known reference system, with the differ- \nence between them treated as a perturbation in the ref- \nerence potential. Assuming pairwise additive potentials, \nVij = V (0) \nij + ∆Vij , a first-order truncated expression for \nthe free energy density of the system βfv is obtained, \n\n1 \n2 \ndr g(0) \nij (r)∆Vij (r) \n(1) \nXi,j ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2648.pdf" + "text": "", + "page_start": 39, + "page_end": 39, + "source_file": "sg246915.pdf" }, { - "text": "The limitations of the kinetic Monte Carlo model introduced in the previous Section are related \n\nto its character as a two-dimensional lattice gas with only three states: gas, liquid or particle. \n\nThis implies that (i) no liquid can be transported to a site on the surface already filled with liquid, \n\ni.e., diffusion of the liquid can not be incorporated in a sensible way and (ii) one is not able to \n\ndistinguish between the influence of the short- and the long-range parts of the interactions with the \n\nsubstrate, as all such interactions are absorbed into the effective chemical potential. \n\nHowever, using dynamical density functional theory (DDFT) [78–83] one can develop a model \n\nfor the processes in the ultrathin postcursor film without these limitations, although here we limit \n\nourselves to developing the theory at the level of the KMC and solely discuss how to extend it to \n\nincorporate the influence of the liquid diffusion over the surface. Such a DDFT model describes \n\nthe coupled dynamics of the density fields of the liquid ρl and the nanoparticles ρn. The densities \n\nρl and ρn are defined as the probabilities of finding a given lattice site on the surface to be occupied ", - "page_start": 14, - "page_end": 14, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 39, + "page_end": 39, + "source_file": "sg246915.pdf" }, { - "text": "(cid:88) (cid:88) \nE = − \nlilj − µ li \n\ni \n\nwhere (cid:80) \n\n denotes a sum over nearest neighbour pairs and εll, εnn and εnl are the liquid-liquid, \nparticle-particle and liquid-particle interaction energies, respectively. Fixing the three interaction \n\nstrength parameters εll, εnn, εnl and the effective chemical potential µ determines the equilibrium \n\nstate of the system. We choose εll as unit of energy – i.e. we set εll = 1. \n\nThe hamiltonian determines the equilibrium state and the energy landscape of the system. How- \n\never, as the system ‘dries in’ during the course of the solvent evaporation, the final nanoparticle \n\nconfigurations do not necessarily represent equilibrium structures. This implies that the system \n\ndynamics is of paramount importance. It is determined by the possible Monte Carlo moves, their \n\nrelative frequencies, and the probabilities for their acceptance. Two types of moves are allowed: (i) \n\nevaporation/condensation of liquid and (ii) diffusion of nanoparticles within the liquid. A mobility \n\nM corresponds to the ratio of cycles of particle and solvent moves and reflects the physical ratio of ", - "page_start": 9, - "page_end": 9, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 260, + "page_end": 260, + "source_file": "00-80T-80.pdf" }, { - "text": "where γ is the liquid-gas surface tension and f (h) is a local free energy term that describes the \n\nwettability of the surface. Since µ corresponds to a chemical potential, the term µh may either bias \n\nthe system towards the liquid or towards the gas state. The variation of F w.r.t. h gives the pressure. \n\nIt contains the curvature (Laplace) pressure −γ∆h and the disjoining pressure Π(h) = −∂hf (h). \n\nMany different forms for the latter are in use (see, e.g., Refs. [4, 8, 63, 70–73]). \n\nFor the present system a thin film description using Eq. (1) is not appropriate because the nanopar- \n\nticles are not taken into account. However, under certain conditions one can augment equation (1) \n\nfor the evolution of the film thickness by coupling it to an equation for the evolution of the mean \n\nparticle concentration. The resulting model is able to describe the behaviour of an evaporating so- \n\nlution on the meso- and macroscale. Such an approach is briefly discussed below in Section III C. \n\nWe should expect such a model to describe the mesoscopic dewetting front discussed above. How- ", - "page_start": 8, - "page_end": 8, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 260, + "page_end": 260, + "source_file": "00-80T-80.pdf" }, { - "text": "time scales for evaporation and diffusion. A large mobility M indicates fast diffusion as compared \n\nto evaporation. A trial move is accepted with the probability pacc = min[1, exp(−∆E/kT )] where \n\nk is the Boltzmann constant, T the temperature and ∆E is the change in energy resulting from the \n\npotential move. Note that particles are only allowed to move into wet areas of the substrate, i.e., \n\nonto cells with l = 1. This models zero diffusivity of the particles on a dry substrate. The replaced \n\nliquid fills the site left by the nanoparticle. \n\nWithout nanoparticles, the behaviour of the model is well known as it reduces to the classical \n\ntwo-dimensional Ising model [74]. For kT < kTc ≈ 0.567 liquid and vapour coexist when µ = \n\nµcoex = −2. For µ > −2 [µ < −2] eventually the liquid [vapour] dominates. A straight liquid- \n\ngas interface will recede [advance] for µ < −2 [µ > −2], i.e. one finds evaporative dewetting \n\n[wetting] fronts. If one starts, however, with a substrate covered homogeneously by the liquid, ", - "page_start": 10, - "page_end": 10, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 36, + "page_end": 36, + "source_file": "sg246915.pdf" }, { - "text": "over-damped stochastic equations of motion [80–83]. Here, we assume that Mn(ρl) = αΘs(ρl − \n\n0.5), where Θs(x) is a continuous function that switches smoothly from the value 0 to the value \n\n1 at x = 0 (i.e. it is essentially a smooth analogue of the Heaviside function). This ensures that \n\nthe nanoparticles are immobile when the local liquid density is small (dry substrate) and have a \n\nmobility coefficient α when ρl is high (wet substrate). \n\nFor the evolution of the liquid density distribution we assume that the liquid is able to evaporate \n\nfrom the surface into the vapour (reservoir) above the surface (non-conserved dynamics) and may \n\n15 ", - "page_start": 15, - "page_end": 15, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 36, + "page_end": 36, + "source_file": "sg246915.pdf" }, { - "text": "the moving contact line has also been reported [50]. Droplet patterns may as well be created em- \n\nploying solvent-induced dewetting of glassy polymer layers below the glass transition temperature \n\n[51–53]. \n\nNote that the dewetting of pure volatile liquids has also been studied experimentally [54] and \n\ntheoretically [55–58]. In this case, different contact line instabilities have been observed for evap- \n\norating liquid drops [59, 60]. \n\nIn the present article we review and preview the experiments and in particular the various mod- \n\nelling approaches for dewetting suspensions of (nano-)particles in volatile partially wetting sol- \n\nvents. After reviewing the basic experimental results in Section II, we discuss in Section III sev- \n\neral theoretical approaches. In particular, we present a kinetic Monte Carlo model in Section III A, \n\na dynamic density functional theory in Section III B, and a thin film evolution equation in Sec- \n\ntion III C. Finally, we conclude in Section IV by discussing advantages and shortcomings of the \n\nindividual approaches and future challenges to all of them. ", - "page_start": 4, - "page_end": 4, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 260, + "page_end": 260, + "source_file": "00-80T-80.pdf" } ] }, @@ -1937,70 +1937,70 @@ "target_page": 16, "target_passage": "In 2001 the company’s link to AARP’s Web site accounted for much of the $55 million worth of auto business The Hartford generated over the Internet", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 383, + "page_end": 383, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 413, + "page_end": 413, + "source_file": "00-80T-80.pdf" }, { - "text": "most dynamic sources of business growth. In 2001 the \n\ncompany’s link to AARP’s Web site accounted for much \n\nof the $55 million worth of auto business The Hartford \n\ngenerated over the Internet. \n\nBecause The Hartford quotes and issues this busi- \n\nness online (and added online billing in 2001), acquisi- \n\ntion and processing costs are 15 to 20 percent lower \n\nthan those of traditional direct-marketing or face-to- \n\nface sales. Because of this and other factors, the \n\nexpense ratio for AARP business is 30 percent below \n\nthat of the industry in general. And the customer \n\nrenewal rate is 96 percent, versus the industry’s 88 per- \n\ncent, making the AARP program yield some of the most \n\nprofitable auto business The Hartford writes. \n\nThe relationship also has The Hartford thinking \n\nahead toward new business and an even stronger rela- \n\ntionship with AARP members. The Hartford can cross- \n\nmarket auto insurance to homeowner’s customers and \n\nhomeowner’s insurance to auto customers, which \n\npresents a tremendous growth opportunity. In addition, ", - "page_start": 16, - "page_end": 16, - "source_file": "NYSE_HIG_2001.pdf" + "text": "", + "page_start": 414, + "page_end": 414, + "source_file": "00-80T-80.pdf" }, { - "text": "agency writes three times as much business with \n\nThe Hartford, in both personal and commercial lines, as \n\nit writes with any other insurer. \n\nMutually beneficial partnerships with successful \n\nbusinesses of all sizes are the foundation of The \n\nHartford’s business model. \n\nPerhaps no relationship represents shared values \n\nand shared success better than the one with AARP, \n\nwhich signed a new eight-year contract with The \n\nHartford that began Jan. 1, 2002. The AARP insurance \n\nprogram with The Hartford is a model of affinity mar- \n\nketing and distribution savvy. AARP’s membership— \n\nthose age 50 and over—is the fastest-growing segment \n\nof the U.S. population. Computer use among this group \n\nis growing by an estimated 20 percent per year, and the \n\npopulation segment respects established brands and \n\nseeks value, convenience and extraordinary service. \n\nThat right combination of factors helps make \n\nAARP’s World Wide Web site one of The Hartford’s \n\n13 ", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_HIG_2001.pdf" + "text": "", + "page_start": 414, + "page_end": 414, + "source_file": "00-80T-80.pdf" }, { - "text": "The Hartford is committed to providing value to AARP \n\nmembers in many ways. An example: The Hartford and \n\nAARP work with the MIT Age Lab to produce informa- \n\ntion—available in print and on both partners’ Web \n\nsites—advising AARP members about Alzheimer’s dis- \n\nease and other forms of dementia as they affect driving \n\nability. The information guides caregivers struggling \n\nwith difficult decisions about family members’ safety \n\nbehind the wheel. The resource—a customer solution \n\nlike no other—helps enhance the superior value The \n\nHartford provides to AARP members. \n\nAlthough it’s the most comprehensive, the AARP \n\nrelationship isn’t The Hartford’s only affinity program. \n\nThe company also has affinity arrangements with \n\nUSAA and other companies. Regardless of the pro- \n\ngram’s size, the affinity partners share the right quali- \n\nties: strong name-brand recognition, first-class \n\nmarketing and a broad and loyal customer base. \n\nIn other words, they share some of The Hartford’s \n\ncore attributes. ", - "page_start": 16, - "page_end": 16, - "source_file": "NYSE_HIG_2001.pdf" + "text": "", + "page_start": 414, + "page_end": 414, + "source_file": "00-80T-80.pdf" }, { - "text": "In short, the portal allows The Hartford to bring \n\nproducts and functions from a variety of sources into \n\none convenient online environment. \n\nHartford Investor has two strategic objectives: \n\nOne, deepen current intermediaries’ loyalty to The \n\nHartford by extending The Hartford Experience right to \n\ntheir desktops. Two, expand the network of intermedi- \n\naries by giving them the technological support they \n\nneed to grow their businesses. \n\nMore than 153,000 licensed intermediaries—from \n\nsolo advisors to members of large financial institu- \n\ntions—are appointed to sell The Hartford’s products. \n\nYet fewer than 60,000 actively write business for the \n\ncompany. The untapped potential is vast, especially \n\namong independents, the fastest-growing distribution \n\nchannel and the only one in which The Hartford doesn’t \n\nhold the largest market share. \n\nThat’s bound to change. With Hartford Investor \n\navailable on their desktops, intermediaries will have far ", - "page_start": 23, - "page_end": 23, - "source_file": "NYSE_HIG_2001.pdf" + "text": "", + "page_start": 414, + "page_end": 414, + "source_file": "00-80T-80.pdf" }, { - "text": "**N**ew technology tools made The Hartford Experience— \n\ncustomer solutions, ease of doing business and \n\nextraordinary service—more real than ever for our cus- \n\ntomers in 2001. \n\nIt was a year that saw the debut of life operations’ \n\nHartford Investor Web portal, expanded Web portals for \n\ngroup benefits administrators, and enhancements to \n\ntechnology for The Hartford’s property-casualty agents \n\nand customers. \n\nHartford Investor is both a versatile personal \n\nassistant and an aid in wholesaling, especially for the \n\nindependent financial planner channel. Broker-dealers \n\nand financial advisors can use it to research The \n\nHartford’s full complement of individual life and invest- \n\nment products, update their books of business in \n\nseconds, track daily fund performance, run financial- \n\nplanning models, receive online product training, \n\nproduce customized presentations and even submit \n\nbusiness electronically. ", - "page_start": 23, - "page_end": 23, - "source_file": "NYSE_HIG_2001.pdf" + "text": "", + "page_start": 414, + "page_end": 414, + "source_file": "00-80T-80.pdf" }, { - "text": "**Investor Relations**\nThe Hartford Financial \nServices Group, Inc. \nHartford Plaza, HO-1-01 \nHartford, Connecticut 06115 \nAttn: Investor Relations \n860-547-2537 \n\n**Media Inquiries**\nThe Hartford Financial \nServices Group, Inc. \nMedia Relations \nHartford Plaza, T-12-56 \nHartford, CT 06115 \n860-547-5200 \n\n**Common Stock and Dividend Information**\nThe Hartford’s common stock is traded on the New York \nStock Exchange (NYSE) under the trading symbol “HIG.” \nThe following table presents the high and low closing prices \nfor the common stock of The Hartford on the NYSE for \nthe periods indicated, and the quarterly dividends declared \nper share. ", - "page_start": 38, - "page_end": 38, - "source_file": "NYSE_HIG_2001.pdf" + "text": "", + "page_start": 414, + "page_end": 414, + "source_file": "00-80T-80.pdf" }, { - "text": "**Corporate Headquarters**\nThe Hartford Financial \nServices Group, Inc. \n690 Asylum Avenue \nHartford, Connecticut 06115 \n860-547-5000 \n\n**Internet Address**\nhttp://www.thehartford.com \n\n**Annual Meeting**\nShareholders are cordially invited to attend The Hartford’s \nAnnual Meeting of Shareholders, which will be held on \nThursday, April 18, 2002 at 9:00 a.m. in the Wallace Stevens \nTheater at The Hartford Financial Services Group, Inc.’s \nhome office at 690 Asylum Avenue, Hartford, Connecticut. \nShareholders of record as of February 28, 2002 are entitled \nto notice of, and to vote at, the Annual Meeting. \n\n**Form 10-K and Other Information**\nShareholders may receive, without charge, a copy of \nThe Hartford’s Form 10-K (without exhibits) filed with the \nSecurities and Exchange Commission for the year ended \nDecember 31, 2001 by contacting 1-888-FACT-HIG. Forms \n10-Q, press releases, and other shareholder communications \nare also available through this toll-free number. \n\n**Transfer Agent/Shareholder Records**\nFor information or assistance regarding stock records, \ndividend checks or stock certificates, please contact \nThe Hartford’s transfer agent: \n\nThe Bank of New York \nShareholder Relations Department–11E \nP.O. Box 11258 \nChurch Street Station \nNew York, NY 10286 \n800-254-2823 ", - "page_start": 38, - "page_end": 38, - "source_file": "NYSE_HIG_2001.pdf" + "text": "", + "page_start": 414, + "page_end": 414, + "source_file": "00-80T-80.pdf" }, { - "text": "**“P**artnering” is a popular business buzzword that may \n\nvanish as quickly as it appeared. The Hartford’s partner- \n\nships, on the other hand, are built for the long term and \n\nhave played a major role in the company’s growth and \n\nsuccess. \n\nThe company enjoys outstanding partnerships \n\nwith several of the world’s top asset managers. It also \n\nvalues its thousands of relationships with financial \n\nintermediaries such as large broker-dealers, banks and \n\nindependent financial planners—and with affinity part- \n\nners who extend The Hartford’s reach into large, grow- \n\ning markets. \n\n“A lot of people talk about having the right part- \n\nners, but The Hartford views it differently from most,” \n\nsays Gary Trippe, CEO of Fort Myers, Fla., property- \n\ncasualty agency Oswald, Trippe and Company, Inc. \n\n“They look for partners who share their core values, \n\nand the relationship is based on trust and respect. It’s \n\nall about compatibility.” Trippe should know. His ", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_HIG_2001.pdf" + "text": "", + "page_start": 413, + "page_end": 413, + "source_file": "00-80T-80.pdf" } ] }, @@ -2011,70 +2011,70 @@ "target_page": 23, "target_passage": "More than 153,000 licensed intermediaries", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 14, + "page_end": 14, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 274, + "page_end": 274, + "source_file": "00-80T-80.pdf" }, { - "text": "In short, the portal allows The Hartford to bring \n\nproducts and functions from a variety of sources into \n\none convenient online environment. \n\nHartford Investor has two strategic objectives: \n\nOne, deepen current intermediaries’ loyalty to The \n\nHartford by extending The Hartford Experience right to \n\ntheir desktops. Two, expand the network of intermedi- \n\naries by giving them the technological support they \n\nneed to grow their businesses. \n\nMore than 153,000 licensed intermediaries—from \n\nsolo advisors to members of large financial institu- \n\ntions—are appointed to sell The Hartford’s products. \n\nYet fewer than 60,000 actively write business for the \n\ncompany. The untapped potential is vast, especially \n\namong independents, the fastest-growing distribution \n\nchannel and the only one in which The Hartford doesn’t \n\nhold the largest market share. \n\nThat’s bound to change. With Hartford Investor \n\navailable on their desktops, intermediaries will have far ", - "page_start": 23, - "page_end": 23, - "source_file": "NYSE_HIG_2001.pdf" + "text": "", + "page_start": 275, + "page_end": 275, + "source_file": "00-80T-80.pdf" }, { - "text": "**Investor Relations**\nThe Hartford Financial \nServices Group, Inc. \nHartford Plaza, HO-1-01 \nHartford, Connecticut 06115 \nAttn: Investor Relations \n860-547-2537 \n\n**Media Inquiries**\nThe Hartford Financial \nServices Group, Inc. \nMedia Relations \nHartford Plaza, T-12-56 \nHartford, CT 06115 \n860-547-5200 \n\n**Common Stock and Dividend Information**\nThe Hartford’s common stock is traded on the New York \nStock Exchange (NYSE) under the trading symbol “HIG.” \nThe following table presents the high and low closing prices \nfor the common stock of The Hartford on the NYSE for \nthe periods indicated, and the quarterly dividends declared \nper share. ", - "page_start": 38, - "page_end": 38, - "source_file": "NYSE_HIG_2001.pdf" + "text": "", + "page_start": 275, + "page_end": 275, + "source_file": "00-80T-80.pdf" }, { - "text": "**Corporate Headquarters**\nThe Hartford Financial \nServices Group, Inc. \n690 Asylum Avenue \nHartford, Connecticut 06115 \n860-547-5000 \n\n**Internet Address**\nhttp://www.thehartford.com \n\n**Annual Meeting**\nShareholders are cordially invited to attend The Hartford’s \nAnnual Meeting of Shareholders, which will be held on \nThursday, April 18, 2002 at 9:00 a.m. in the Wallace Stevens \nTheater at The Hartford Financial Services Group, Inc.’s \nhome office at 690 Asylum Avenue, Hartford, Connecticut. \nShareholders of record as of February 28, 2002 are entitled \nto notice of, and to vote at, the Annual Meeting. \n\n**Form 10-K and Other Information**\nShareholders may receive, without charge, a copy of \nThe Hartford’s Form 10-K (without exhibits) filed with the \nSecurities and Exchange Commission for the year ended \nDecember 31, 2001 by contacting 1-888-FACT-HIG. Forms \n10-Q, press releases, and other shareholder communications \nare also available through this toll-free number. \n\n**Transfer Agent/Shareholder Records**\nFor information or assistance regarding stock records, \ndividend checks or stock certificates, please contact \nThe Hartford’s transfer agent: \n\nThe Bank of New York \nShareholder Relations Department–11E \nP.O. Box 11258 \nChurch Street Station \nNew York, NY 10286 \n800-254-2823 ", - "page_start": 38, - "page_end": 38, - "source_file": "NYSE_HIG_2001.pdf" + "text": "", + "page_start": 275, + "page_end": 275, + "source_file": "00-80T-80.pdf" }, { - "text": "**N**ew technology tools made The Hartford Experience— \n\ncustomer solutions, ease of doing business and \n\nextraordinary service—more real than ever for our cus- \n\ntomers in 2001. \n\nIt was a year that saw the debut of life operations’ \n\nHartford Investor Web portal, expanded Web portals for \n\ngroup benefits administrators, and enhancements to \n\ntechnology for The Hartford’s property-casualty agents \n\nand customers. \n\nHartford Investor is both a versatile personal \n\nassistant and an aid in wholesaling, especially for the \n\nindependent financial planner channel. Broker-dealers \n\nand financial advisors can use it to research The \n\nHartford’s full complement of individual life and invest- \n\nment products, update their books of business in \n\nseconds, track daily fund performance, run financial- \n\nplanning models, receive online product training, \n\nproduce customized presentations and even submit \n\nbusiness electronically. ", - "page_start": 23, - "page_end": 23, - "source_file": "NYSE_HIG_2001.pdf" + "text": "", + "page_start": 275, + "page_end": 275, + "source_file": "00-80T-80.pdf" }, { - "text": "**H**ow do you secure the future when the present is \n\npuzzling enough? It’s a big challenge, and The Hartford’s \n\nprimary objective. Everything we do is designed to help \n\nour customers deal with the uncertainties that lie ahead. \n\nThe Hartford believes the best way to secure the \n\nfuture is to provide customers with the right products, \n\nand then back those products with outstanding per- \n\nformance and great service. Staying focused on this \n\nobjective was never more important—or more chal- \n\nlenging—than in 2001. \n\nTrue to form, The Hartford’s life operations’ annu- \n\nities and mutual funds delivered high-quality perform- \n\nance in a time of market turmoil. Despite an anemic stock \n\nmarket, 87 percent of the funds in The Hartford’s Director \n\nvariable annuity remained in the first or second quartile \n\nof three-year returns within the Lipper Peer Group in \n\n2001. Sixty-four percent of the funds in the Leaders suite \n\nof annuities and 91 percent of The Hartford’s mutual \n\nfunds remained in the first or second quartile over the \n\nthree-year period. ", - "page_start": 19, - "page_end": 19, - "source_file": "NYSE_HIG_2001.pdf" + "text": "", + "page_start": 275, + "page_end": 275, + "source_file": "00-80T-80.pdf" }, { - "text": "The ability to deliver that kind of performance \n\ncan be traced to our money managers—Wellington \n\nManagement Co., American Funds, Franklin Templeton \n\nInvestments, MFS Investment Management, AIM \n\nFunds Management, Inc., Putnam Investment \n\nManagement and The Hartford’s own Hartford \n\nInvestment Management Co. \n\nAll of The Hartford’s money managers have years \n\nof experience and are among the most respected firms \n\nin the industry. Their experience and expertise were \n\nespecially important during the market volatility we \n\nsaw in 2001. They always stay focused on long-term \n\nperformance, which is the true measuring stick of The \n\nHartford’s value to its customers. \n\nBesides outstanding products and excellent man- \n\nagement, great service is a critical component in deliv- \n\nering the right solutions to our customers. In 2001, \n\nThe Hartford won an unprecedented sixth consecutive \n\nDALBAR Annuity Service Award, as well as the ", - "page_start": 19, - "page_end": 19, - "source_file": "NYSE_HIG_2001.pdf" + "text": "", + "page_start": 275, + "page_end": 275, + "source_file": "00-80T-80.pdf" }, { - "text": "agency writes three times as much business with \n\nThe Hartford, in both personal and commercial lines, as \n\nit writes with any other insurer. \n\nMutually beneficial partnerships with successful \n\nbusinesses of all sizes are the foundation of The \n\nHartford’s business model. \n\nPerhaps no relationship represents shared values \n\nand shared success better than the one with AARP, \n\nwhich signed a new eight-year contract with The \n\nHartford that began Jan. 1, 2002. The AARP insurance \n\nprogram with The Hartford is a model of affinity mar- \n\nketing and distribution savvy. AARP’s membership— \n\nthose age 50 and over—is the fastest-growing segment \n\nof the U.S. population. Computer use among this group \n\nis growing by an estimated 20 percent per year, and the \n\npopulation segment respects established brands and \n\nseeks value, convenience and extraordinary service. \n\nThat right combination of factors helps make \n\nAARP’s World Wide Web site one of The Hartford’s \n\n13 ", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_HIG_2001.pdf" + "text": "", + "page_start": 8, + "page_end": 8, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "Meanwhile, in midtown Manhattan, The \n\nHartford’s negotiations for permanent offices—a \n\nprocess that normally takes 12 to 15 months—were \n\ncomplete. \n\nThe feverish pace was in some ways therapeutic. \n\nIt helped take people’s minds off the tragedy and the \n\nmonumental loss of life, including the lives of many \n\ngood friends and business colleagues at Aon, Marsh & \n\nMcLennan, Bank of America and Morgan Stanley—major \n\npartners of The Hartford with offices in the Twin Towers. \n\nLike many Americans watching the heroism of \n\nfirefighters, police and emergency crews, thousands of \n\nour employees asked, “How can we help?” Fortunately, \n\nthey found ways. Lots of them. Employees crowded \n\ninto bloodmobiles and dropped food and \n\nsupplies into overflowing bins. With the company’s \n\nmatch, employees also donated more than $700,000 to \n\nrelief efforts, and The Hartford provided a special tele- \n\nphone hotline for employees who needed counseling. \n\n“Focused resolve” is how New York-based \n\nRegional Vice President Brandon Hickey characterizes \n\nThe Hartford’s response. “It solidified in my mind how ", - "page_start": 12, - "page_end": 12, - "source_file": "NYSE_HIG_2001.pdf" + "text": "", + "page_start": 8, + "page_end": 8, + "source_file": "NASDAQ_SHEN_2003.pdf" } ] }, @@ -2085,70 +2085,70 @@ "target_page": 38, "target_passage": "Shareholders are cordially invited to attend The Hartford’s Annual Meeting of Shareholders, which will be held on Thursday, April 18, 2002 ", "chunk_present": { - "presence": true, - "index": 3 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 19, + "page_end": 19, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NASDAQ_FFIN_2002.pdf" }, { - "text": "**Investor Relations**\nThe Hartford Financial \nServices Group, Inc. \nHartford Plaza, HO-1-01 \nHartford, Connecticut 06115 \nAttn: Investor Relations \n860-547-2537 \n\n**Media Inquiries**\nThe Hartford Financial \nServices Group, Inc. \nMedia Relations \nHartford Plaza, T-12-56 \nHartford, CT 06115 \n860-547-5200 \n\n**Common Stock and Dividend Information**\nThe Hartford’s common stock is traded on the New York \nStock Exchange (NYSE) under the trading symbol “HIG.” \nThe following table presents the high and low closing prices \nfor the common stock of The Hartford on the NYSE for \nthe periods indicated, and the quarterly dividends declared \nper share. ", - "page_start": 38, - "page_end": 38, - "source_file": "NYSE_HIG_2001.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NASDAQ_FFIN_2002.pdf" }, { - "text": "**Corporate Headquarters**\nThe Hartford Financial \nServices Group, Inc. \n690 Asylum Avenue \nHartford, Connecticut 06115 \n860-547-5000 \n\n**Internet Address**\nhttp://www.thehartford.com \n\n**Annual Meeting**\nShareholders are cordially invited to attend The Hartford’s \nAnnual Meeting of Shareholders, which will be held on \nThursday, April 18, 2002 at 9:00 a.m. in the Wallace Stevens \nTheater at The Hartford Financial Services Group, Inc.’s \nhome office at 690 Asylum Avenue, Hartford, Connecticut. \nShareholders of record as of February 28, 2002 are entitled \nto notice of, and to vote at, the Annual Meeting. \n\n**Form 10-K and Other Information**\nShareholders may receive, without charge, a copy of \nThe Hartford’s Form 10-K (without exhibits) filed with the \nSecurities and Exchange Commission for the year ended \nDecember 31, 2001 by contacting 1-888-FACT-HIG. Forms \n10-Q, press releases, and other shareholder communications \nare also available through this toll-free number. \n\n**Transfer Agent/Shareholder Records**\nFor information or assistance regarding stock records, \ndividend checks or stock certificates, please contact \nThe Hartford’s transfer agent: \n\nThe Bank of New York \nShareholder Relations Department–11E \nP.O. Box 11258 \nChurch Street Station \nNew York, NY 10286 \n800-254-2823 ", - "page_start": 38, - "page_end": 38, - "source_file": "NYSE_HIG_2001.pdf" + "text": "", + "page_start": 11, + "page_end": 11, + "source_file": "NASDAQ_FFIN_2002.pdf" }, { - "text": "In short, the portal allows The Hartford to bring \n\nproducts and functions from a variety of sources into \n\none convenient online environment. \n\nHartford Investor has two strategic objectives: \n\nOne, deepen current intermediaries’ loyalty to The \n\nHartford by extending The Hartford Experience right to \n\ntheir desktops. Two, expand the network of intermedi- \n\naries by giving them the technological support they \n\nneed to grow their businesses. \n\nMore than 153,000 licensed intermediaries—from \n\nsolo advisors to members of large financial institu- \n\ntions—are appointed to sell The Hartford’s products. \n\nYet fewer than 60,000 actively write business for the \n\ncompany. The untapped potential is vast, especially \n\namong independents, the fastest-growing distribution \n\nchannel and the only one in which The Hartford doesn’t \n\nhold the largest market share. \n\nThat’s bound to change. With Hartford Investor \n\navailable on their desktops, intermediaries will have far ", - "page_start": 23, - "page_end": 23, - "source_file": "NYSE_HIG_2001.pdf" + "text": "", + "page_start": 10, + "page_end": 10, + "source_file": "NASDAQ_FFIN_2002.pdf" }, { - "text": "The ability to deliver that kind of performance \n\ncan be traced to our money managers—Wellington \n\nManagement Co., American Funds, Franklin Templeton \n\nInvestments, MFS Investment Management, AIM \n\nFunds Management, Inc., Putnam Investment \n\nManagement and The Hartford’s own Hartford \n\nInvestment Management Co. \n\nAll of The Hartford’s money managers have years \n\nof experience and are among the most respected firms \n\nin the industry. Their experience and expertise were \n\nespecially important during the market volatility we \n\nsaw in 2001. They always stay focused on long-term \n\nperformance, which is the true measuring stick of The \n\nHartford’s value to its customers. \n\nBesides outstanding products and excellent man- \n\nagement, great service is a critical component in deliv- \n\nering the right solutions to our customers. In 2001, \n\nThe Hartford won an unprecedented sixth consecutive \n\nDALBAR Annuity Service Award, as well as the ", - "page_start": 19, - "page_end": 19, - "source_file": "NYSE_HIG_2001.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_FFIN_2002.pdf" }, { - "text": "**H**ow do you secure the future when the present is \n\npuzzling enough? It’s a big challenge, and The Hartford’s \n\nprimary objective. Everything we do is designed to help \n\nour customers deal with the uncertainties that lie ahead. \n\nThe Hartford believes the best way to secure the \n\nfuture is to provide customers with the right products, \n\nand then back those products with outstanding per- \n\nformance and great service. Staying focused on this \n\nobjective was never more important—or more chal- \n\nlenging—than in 2001. \n\nTrue to form, The Hartford’s life operations’ annu- \n\nities and mutual funds delivered high-quality perform- \n\nance in a time of market turmoil. Despite an anemic stock \n\nmarket, 87 percent of the funds in The Hartford’s Director \n\nvariable annuity remained in the first or second quartile \n\nof three-year returns within the Lipper Peer Group in \n\n2001. Sixty-four percent of the funds in the Leaders suite \n\nof annuities and 91 percent of The Hartford’s mutual \n\nfunds remained in the first or second quartile over the \n\nthree-year period. ", - "page_start": 19, - "page_end": 19, - "source_file": "NYSE_HIG_2001.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_FFIN_2002.pdf" }, { - "text": "Future generations will measure the full impact of \n\nSept. 11. But at The Hartford, one thing is known \n\nalready. As they did after disasters such as the New \n\nYork fire of 1835, the Chicago fire of 1871 and the 1906 \n\nSan Francisco earthquake, The Hartford’s people in \n\n2001 ran their business the only way they know how— \n\nthe right way. They put customers first and kept prom- \n\nises. In so doing, they helped lay the foundation for a \n\nmore confident future. ", - "page_start": 13, - "page_end": 13, - "source_file": "NYSE_HIG_2001.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_FFIN_2002.pdf" }, { - "text": "By early November—less than 60 days after the \n\nattack—The Hartford’s New York employees were in \n\ntheir new permanent offices at 2 Park Ave. \n\nNo less impressive—and certainly no less swift— \n\nwas The Hartford’s claims service during Sept. 11’s \n\naftermath. “Catastrophe Team”—CAT—adjusters were \n\non the ground within days, fulfilling obligations to poli- \n\ncyholders who suffered losses. As an example, The \n\nHartford advanced $1 million within 72 hours of the dis- \n\naster to help the Thacher, Proffitt & Wood law firm \n\nestablish temporary midtown Manhattan offices. All \n\nthe firm’s employees had evacuated the World Trade \n\nCenter’s south tower before everything in their offices \n\nwas destroyed. Within a week, Thacher, Proffitt & Wood \n\nwas back in business. \n\nThe Hartford assigned extra resources to expedite \n\nservice requests, and customers received premium \n\npayment extensions as needed. One adjuster wrote a \n\n$250,000 check on the spot to help a lower Manhattan \n\nsoftware-development company begin its recovery. \n\nCAT team members and call center customer service ", - "page_start": 12, - "page_end": 12, - "source_file": "NYSE_HIG_2001.pdf" + "text": "", + "page_start": 8, + "page_end": 8, + "source_file": "NASDAQ_FFIN_2002.pdf" }, { - "text": "Meanwhile, in midtown Manhattan, The \n\nHartford’s negotiations for permanent offices—a \n\nprocess that normally takes 12 to 15 months—were \n\ncomplete. \n\nThe feverish pace was in some ways therapeutic. \n\nIt helped take people’s minds off the tragedy and the \n\nmonumental loss of life, including the lives of many \n\ngood friends and business colleagues at Aon, Marsh & \n\nMcLennan, Bank of America and Morgan Stanley—major \n\npartners of The Hartford with offices in the Twin Towers. \n\nLike many Americans watching the heroism of \n\nfirefighters, police and emergency crews, thousands of \n\nour employees asked, “How can we help?” Fortunately, \n\nthey found ways. Lots of them. Employees crowded \n\ninto bloodmobiles and dropped food and \n\nsupplies into overflowing bins. With the company’s \n\nmatch, employees also donated more than $700,000 to \n\nrelief efforts, and The Hartford provided a special tele- \n\nphone hotline for employees who needed counseling. \n\n“Focused resolve” is how New York-based \n\nRegional Vice President Brandon Hickey characterizes \n\nThe Hartford’s response. “It solidified in my mind how ", - "page_start": 12, - "page_end": 12, - "source_file": "NYSE_HIG_2001.pdf" + "text": "", + "page_start": 185, + "page_end": 185, + "source_file": "00-80T-80.pdf" } ] }, @@ -2165,64 +2165,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 142, + "page_end": 142, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**2. Background**\n\n2.1. Climate Change, Global Warming, and Frames \n\nExisting studies have noted that the subtle difference between climate change and global warming \nevokes different public cognitive responses, where global warming“indicates heat-related impacts, \nhuman causes, increased UV light penetration, ozone depletion, and the greenhouse effect, whereas \nclimate change is more associated with a wide range of influences on climate, including drought and \nagriculture [9]. An N-gram analysis suggested that global warming showed a closer connection with \nice, snow, and sea, whereas climate change was always connected with scientific investigations, such as ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Model Intercomparison Project (CMIP5) ensemble, forced with the RCP8.5 concentration \nscenario. To provide more detailed representations of climate processes and impacts, the \nspatial resolution was N216 (approx. 60 km grid length in mid-latitudes), a higher resolution \nthan the CMIP5 models. We used a set of impacts-relevant indices and a global land surface \nmodel to examine the projected changes in weather extremes and their implications for \nfreshwater availability and vulnerability to food insecurity. Uncertainties in regional climate \nresponses are assessed, examining ranges of outcomes in impacts to inform risk assessments. \nDespite some degree of inconsistency between components of the study due to the need to \ncorrect for systematic biases in some aspects, the outcomes from different ensemble members \ncould be compared for several different indicators. The projections for weather extremes \nindices and biophysical impacts quantities support expectations that the magnitude of change \nis generally larger for 2°C global warming than 1.5°C. Hot extremes become even hotter, with \nincreases being more intense than seen in CMIP5 projections. Precipitation-related extremes \nshow more geographical variation with some increases and some decreases in both heavy \nprecipitation and drought. There are substantial regional uncertainties in hydrological impacts \nat local scales due to different climate models producing different outcomes. Nevertheless, \nhydrological impacts generally point towards wetter conditions on average, with increased \nmean river flows, longer heavy rainfall events, particularly in South and East Asia with the \nmost extreme projections suggesting more than a doubling of flows in the Ganges at 2°C global \nwarming. Some areas are projected to experience shorter meteorological drought events and \nless severe low flows, although longer droughts and/or decreases in low flows are projected \nin many other areas, particularly southern Africa and South America. Flows in the Amazon \nare projected to decline by up to 25%. Increases in either heavy rainfall or drought events \nimply increased vulnerability to food insecurity, but if global warming is limited to 1.5°C, this \nvulnerability is projected to remain smaller than at 2°C global warming in approximately 76% \nof developing countries. At 2°C, four countries are projected to reach unprecedented levels of \nvulnerability to food insecurity. ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed11.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "In the past hundred years, the global climate has experienced great changes1–4. According to the sixth assess- \nment report of IPCC, the global average surface temperature increased by 1.09 °C between 1850 and 2020, and \nalmost all regions in the world experienced surface warming5. Due to global warming, the extreme climate events \nbecome more and more frequent, and the ecological environment problems caused by climate change are more \nand more serious, which restrict the sustainable development of human society and health6–10. Global warming \nhas gradually changed from a scientific issue to a major social issue of common concern to governments and \npeople of all countries11–13. In 2016, nearly 200 parties of the United Nations Framework Convention on climate \nchange reached the Paris Agreement at the climate change conference in Paris14. Paris Agreement has indicated \nthat it is urgent to hold the increase in global average temperature well below 2.0 °C above pre-industrial levels \nand pursue efforts to limit the temperature increase to 1.5 °C above pre-industrial levels. ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed9.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Even when climate change and global warming shared concern about similar topics such as the \ncause of the climate issue, global warming tended to focus on carbon emission phenomena, whereas \nclimate change preferred a more in-depth perspective, highlighting the importance of global action \nto mitigate the climate issue in its second-largest cluster, with energy structure as the contributor to \ncarbon emissions in its third largest cluster. As invisible causes and disbelief in actions have long \nbeen regarded as two key reasons for low climate concern [90], the two terminologies’ differences \nin connotations suggest that introducing these absent sub-topics into global warming discourse or \nhighlighting climate change for its inherent connotations may help communicators raise public concern \nabout climate. \n\n5.1.2. Political Connotations \n\nStudies noted that frame preference between climate change and global warming reflects \nindividuals’ ideological spectrum, where climate change and global warming were favored by \nthe liberals and conservatives, respectively [10]. The cluster analysis of the semantic network in the \ncurrent study demonstrated that global warming triggered far more political responses than climate \nchange. The second largest cluster of global warming was politics-based, where hashtag “tcot”, favored \nby right-leaning users and “p2”, favored by left-leaning users, were both ranked in the list of top nodes \nof the global warming discourse, but neither was included in the list of top nodes of the climate change \ndiscourse. Considering that earlier findings suggested that global warming was more likely to be used \nby conservatives to question the reality of climate issue [11] and climate change is more commonly \nadopted when discussing action against the climate change issue [5], global warming had a stronger \npolitical connotation in public discussion. ", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "The status of the two discourses varied significantly in the more recent years in the study period. \nData from Google in prior study suggested that the search record for global warming was larger \nthan that of climate change in earlier times [13]. The authors found that in the battle to be the most \nrepresentative hashtag for global climate concern, #climatechange showed growing popularity and \nbecame an overwhelming trending topic compared with #globalwarming. Also, #climatechange \nshowed a stronger ability to incorporate diverse hashtags into its discourse in both relative and absolute \ndimensions. Comparatively, the popularity of the global warming discourse among social media \nusers did not increase apparently in terms of tweets volume and hashtag diversity, especially when \nconsidering the yearly increase in Twitter users. The reason for the observed shift in public discourse \ntoward climate change from global warming may be attributed to the high exposure of climate change \nin the media and scientific reports in recent years [13]. Previous studies noted that perceived scientific \nconsensus can increase acceptance of science [101]. Though global warming has been commonly used \nsince the 1980s to describe the world-wide temperature rise, climate change is preferred by scientists to \nrefer a range of complex changes of climate [102]. Pew found science-related accounts draw millions \nof followers on Facebook and volume of posts they released climbed in past years [103]. Climate \nscientists are found to be opinion makers on Twitter [104]. As social media has become an emerging \nplatform for science popularization, scientific community might contribute to the prevalence of climate \nchange discourse by talking about climate change facts and mitigating measures [75]. ", - "page_start": 15, - "page_end": 15, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "There are apparent trends of humidification in most regions under global warming by 1.5 °C and 2.0 °C; but \nthe drought risk also should be taken seriously in the other regions. Under global warming by 1.5 °C the area is \n73.6% of the whole world in which the precipitation would increase, most located in the Northern Hemisphere; \nthe area is 53.7% of the whole world in which the precipitation would increase by less than 50 mm; however, the \narea is 26.4% of whole world in which the rainfall would decrease, mainly located in the Southern Hemisphere \nand the middle regions of Northern Hemisphere. The distribution of precipitation under global warming by \n2.0 °C is similar with the situation under global warming by 1.5 °C. The drought-threatened area would increase \nby 28.5% under global warming by 2.0 °C, especially in the middle and low latitude of the Northern Hemisphere; \nthe area would expand to 26%, in which the precipitation increases more than 50 mm. In other words, the \nextreme rainfall events (such as drought, rainstorm) under global warming by 2.0 °C would be more serious than \nthose under global warming by 1.5 °C, which is what we should be pay more attention to. ", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed9.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**1. Introduction**\n\nThe public’s distinct understanding of the cause and effect of the global climate issue is an obstacle \nto joint mitigation actions. In addition to a diversity of views co-existing in the public discourse [1,2], \nprevious studies noticed that the public had even failed to reach an agreement on whether “climate \nchange” or “global warming” is the most appropriate definition of the global climate concern [3–5]. \nAccording to the definition provided by [6], global warming describes global climate issues as \na continuous increase in the average temperature of Earth’s surface due to anthropogenic emissions \nof greenhouse gases, whereas climate change includes not only temperature rise but also a range of \n\nInt. J. Environ. Res. Public Health**2020**, 17, 1062; doi:10.3390/ijerph17031062 www.mdpi.com/journal/ijerph ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "up to present-day plus model-projected warming thereafter (table 4). While this does lead to \ninconsistent definitions of dates of the GWLs for applications of the climate model output with \nand without bias correction, the focus here is on the level of warming relative to pre-industrial \nrather than the timing of this warming. Therefore, priority is given to an accurate quantification \nof GWLs in all parts of the study, at the expense of inconsistencies in the dates of these warming \nlevels. The inconsistency between the dates of the GWLs ranged from 2 to 9 years depending on \nthe model and warming level. This inconsistency would have consequences if these results were \napplied to time-dependent impacts and adaptation assessments, but that is not the case here so \nthis concern does not apply. However, one issue is that the time-dependent nature of the aerosol \nforcing means that the spatial pattern of regional climate responses varies over time, so this will \nlead to some degree of inconsistency between the analysis of the ClimPACT extremes and the \nHCVI and JULES impacts projections. \n\n3. Results \n\nFor a world at 2°C global warming, we present a range of outcomes to provide insight into the \nlevel of agreement between models for a particular projected change, and hence an indication \nof potential robustness of the projected changes for informing adaptation. We then make a \ncomparison of impacts at global warming 1.5°C to investigate the level of impact that would \nbe avoided by limiting global warming to different levels. Bearing in mind the uncertainty in \nregional climate outcomes, we address this in a number of ways. For individual realizations, we \ncompare the impacts at different warming levels to see if they are systematically smaller at 1.5°C, \neven if the sign of the change is uncertain. We also compare the range of outcomes at different \nGWLs, to see if the regional-scale uncertainty itself increases with global warming. ", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed11.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" } ] }, @@ -2239,64 +2239,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 255, + "page_end": 255, + "source_file": "00-80T-80.pdf" }, { - "text": "To assess implications of climate change for vulnerability to food insecurity, we used an \nadaptation of the Hunger and Climate Vulnerability Index (HCVI) [22]. The HCVI was developed \nby the United Nations World Food Programme to provide a country-level assessment of \nvulnerability to food insecurity as a result of climate-related events. We used a new iteration of the \nHCVI which makes use of gridded climate model projections to understand the impact of climate \nchange on vulnerability to food insecurity, and the benefits that adaptation can bring via scenarios \nof adaptation investment [23]. This iteration of the HCVI only considers in-country production \nof food and does not account for food trade. For this reason, the HCVI is only calculated for \n122 developing and least-developed countries (defined here as countries not in the OECD or EU \nwhich can be resolved by the scale of the climate model; i.e. larger than 500 km2). \n\nThe index provides quantification at the national level across the globe of the scale and \ndirection of impact of climate change on food insecurity. As such, it aims to provide the following: \n(i) information to help policy-makers understand the level of challenge to global food security that \nclimate change presents; (ii) information on the geography of the impacts and help to evaluate the \nrelative benefits of mitigation and adaptation responses. ", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed11.pdf" + "text": "", + "page_start": 252, + "page_end": 252, + "source_file": "00-80T-80.pdf" }, { - "text": "(b) Temperature and precipitation extremes: the ClimPACT indices \n\nTo quantify changes in weather extremes projected in our climate simulations, we calculated \na number of indices designed to be relevant to sector-specific impacts using an established \nmethodology, ClimPACT [21] (table 1) \n\n(c) Food security: the Hunger and Climate Vulnerability Index ", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed11.pdf" + "text": "", + "page_start": 251, + "page_end": 251, + "source_file": "00-80T-80.pdf" }, { - "text": "India is projected to see increased HCVI by all ensemble members, due to a consistent increase \nin length of flood events projected in all members, outweighing the beneficial impact of decreased \nlength of drought which is again projected in all members. \n\nBrazil is projected to see increased HCVI, but for reasons which vary between ensemble \nmembers. Although the location of projected longer flood events varies across the country in \ndifferent members, the aggregation of the HCVI to the country level renders this geographical \nvariability irrelevant for such a large country because only the median value across the country \nis used in the HCVI. Some ensemble members project longer drought for Brazil, which again \ncontributed to increased HCVI. ", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed11.pdf" + "text": "", + "page_start": 14, + "page_end": 14, + "source_file": "NASDAQ_FFIN_2002.pdf" }, { - "text": "UN Food and Agriculture Organization, UN Development Programme and UN Population \nFund [22]. The exposure component comprised proxies for the average length of flood and \ndrought events calculated with daily precipitation data [23] (table 2). These proxies were chosen \nabove other possible metrics as they were required to replace self-reported instances of flood \nand drought events used in the original HCVI, which correlate with undernutrition data at the \ncountry-level [23]. The proxies were therefore masked to only include data where a significant \nproportion of people live and grow crops before aggregating to country level and combining to \ncomprise a measure of exposure [23]; nevertheless, it is recognized that precipitation data alone \nmay not always be adequate for representing flood and drought events, so the current method is \nregarded as preliminary. \n\nThe impacts of projected climate change, therefore, act through changes in these quantities. In \nthe current version of the HCVI, climate-change impacts on other quantities such as crop yield \nare not considered. Socio-economic factors affecting sensitivity and adaptive capacity are fixed at \npresent-day conditions. \n\nThe ensemble-mean baseline HCVI calculated with the high-resolution bias-corrected \nHadGEM3 ensemble is shown in figure 1. The spatial pattern is compatible with HCVI values \ncalculated using reanalysis data at the CMIP5 grid-scale resolution [23]; the most vulnerable \nregions are sub-Saharan Africa and South Asia. This higher-resolution climate data enables \ninclusion of additional countries which were not resolved in the lower-resolution CMIP5 data. ", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed11.pdf" + "text": "", + "page_start": 251, + "page_end": 251, + "source_file": "00-80T-80.pdf" }, { - "text": "As noted above, four countries saw ensemble-mean HCVI values at 2°C above any seen \nin the baseline, and this number increased to seven at 1.5°C. The same four countries with \n‘unprecedented’ HCVI values at 2°C also saw ‘unprecedented’ values at 1.5°C; these were Oman, \nBangladesh, Mauritania and Yemen. These were joined by Myanmar, India and Cambodia as \nhaving ‘unprecedented’ values at 1.5°C. The role of internal climate variability in the HCVI \nresults needs to be assessed, as does the effect of potential nonlinear interactions between the \nflood and drought metric. Until the reasons behind these country-specific results are understood, ", - "page_start": 18, - "page_end": 18, - "source_file": "pubmed11.pdf" + "text": "", + "page_start": 252, + "page_end": 252, + "source_file": "00-80T-80.pdf" }, { - "text": "The index is not intended to be a detailed planning tool, but aims to help planners evaluate the \nnature of the top-level threat to food insecurity that climate change presents, thereby supporting \nprioritization of effort. \n\nThe HCVI consists of three equally weighted components: exposure to climate-related hazards, \nsensitivity of national agricultural production to climate-related hazards, and adaptive capacity— \na measure of a country’s ability to cope with climate-related food shocks. The sensitivity and \nadaptive capacity components are based on data from the World Bank, World Resources Institute, ", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed11.pdf" + "text": "", + "page_start": 252, + "page_end": 252, + "source_file": "00-80T-80.pdf" }, { - "text": "Four countries show ensemble-mean HCVI values at 2°C global warming that are higher \nthan any seen in the baseline climate; these are Oman, Bangladesh, Mauritania and Yemen. \nThe implication of such HCVI values is that climate change at 2°C is projected to cause levels \nof vulnerability to food insecurity that are greater than any seen in the present day. For \nindividual ensemble members, the number of countries with ‘unprecedented’ HCVI values at \n2°C varies from three to seven. Conversely, many countries in the baseline climate have levels \nof vulnerability to food insecurity that are greater than those expected in other countries under \n2°C global warming. This suggests that other factors are already posing greater risk for food \ninsecurity than 2°C climate change is expected to cause in other countries, so the increased risk \nfrom climate change should not overshadow the need to reduce vulnerability to food insecurity \narising from non-climatic factors. There is scope to reduce vulnerability to food insecurity by \naddressing various socio-economic issues in such counties. \n\nincreased run-off over \napproximately half of the land surface (figure 9) and the majority of the major river basins \nassessed (figure 10), but with large regional uncertainties including the possibility of decreased \nflows in many basins. The ensemble-mean change in mean streamflow shows an increase of \nbetween 5 and 25% over most of the Northern Hemisphere land surface, with some regions seeing \nan increase of over 50% at 2°C global warming. Notable exceptions to this are western Europe and \nsouthcentral USA, which see less than a 5% change in run-off, and the already very dry region of \nthe Sahara Desert where the existing very small run-off become even smaller. \n\nThe JULES simulations show a general tendency towards ", + "text": "", "page_start": 14, "page_end": 14, - "source_file": "pubmed11.pdf" + "source_file": "NASDAQ_FFIN_2002.pdf" }, { - "text": "**Figure 7.**Hunger and Climate Vulnerability Index calculated for simulated climate states at 2°C global warming for five \nindividual HadGEM3 simulations driven by SSTs and SICs from different members of the CMIP5 ensemble, and the ensemble \nmean. ", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed11.pdf" + "text": "", + "page_start": 252, + "page_end": 252, + "source_file": "00-80T-80.pdf" + }, + { + "text": "", + "page_start": 252, + "page_end": 252, + "source_file": "00-80T-80.pdf" } ] }, @@ -2307,70 +2307,70 @@ "target_page": 7, "target_passage": "Impacts on freshwater were assessed with a version of the JULES land surface model [24,25], a coupled ecosystem–hydrology–surface exchange model which simulates land-atmosphere fluxes of water, energy and carbon in an internally consistent way", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 16, + "page_end": 16, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 167, + "page_end": 167, + "source_file": "00-80T-80.pdf" }, { - "text": "Impacts on freshwater were assessed with a version of the JULES land surface model [24,25], a \ncoupled ecosystem–hydrology–surface exchange model which simulates land-atmosphere fluxes \nof water, energy and carbon in an internally consistent way, typically applied at global scales. \nVariants of JULES form the land surface scheme of Met Office Hadley Centre Earth System \nModels [26,27] and have been used to assess impacts of climate change on global terrestrial \necosystems and hydrology [28–30] within such models. JULES can also be used outside of the \nEarth System Model (ESM), driven by meteorological outputs of other ESMs to assess impacts of \na wider range of climate projections [6,8]. Here we use a new, higher-resolution configuration of \nJULES on a global grid of 0.5° resolution [31]. \n\nIt has been noted that hydrological impacts models driven by climate-change projections \nfrom climate models tend to give more severe drying than simulated in the climate models \nthemselves [32–34]. This is largely attributed to the inclusion of plant stomatal closure in \nresponse to elevated CO2 in the climate model land surface schemes, which generally reduces \nevapotranspiration relative to climate projections without this process and hence further increases \nrun-off/streamflow or ameliorates decreases [34]. This process is often omitted from standard \nhydrological models. Plant physiological responses to CO2 are included in the JULES model, so \nour projections of changes in run-off here do account for this process. ", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed11.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "We used each HadGEM3 simulation to drive JULES to simulate changes in run-off due to \nthe effects of climate change and CO2 rise on precipitation, evaporation and transpiration. We \nanalysed 30 year periods centred around the year of crossing GWLs of 1.5°C and 2°C relative to \npre-industrial. We examined changes in both mean flows and low flows (defined as the flows for \nthe lowest 10% of time). \n\n(e) Correcting biases in climate model output and implications for defining levels of global \n\nwarming ", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed11.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "We ran the model using only its atmosphere and land components, with time-varying sea- \nsurface temperatures (SSTs) and sea-ice concentrations (SICs) prescribed as input quantities. This \napproach was taken for two reasons: (i) to provide a rapid first analysis of the implications \nof the higher resolution for projections of climate extremes and impacts—an atmosphere- \nonly simulation requires considerably less computing time than a coupled ocean–atmosphere \ngeneral circulation model (GCM); (ii) to allow us to explore, to some degree, uncertainties in \nregional climate changes by using SSTs and SICs from different climate models. To explore these \nuncertainties in the regional impacts of climate change, we carried out six HadGEM3 atmospheric \nsimulations driven by time-varying SSTs and SICs from a subset of projections from the CMIP5 \nwith the RCP8.5 scenario. The assumption here is that SSTs and SICs provide a substantial \ninfluence on regional patterns of climate change over land, so using a range of SST and SIC \npatterns in a single atmosphere model goes some way towards representing the range of regional \nclimate changes that would arise in a set of different coupled ocean–atmosphere GCMs. This \napproach will not capture the full range of uncertainty affecting regional climate changes over \nland, because it still relies on one atmosphere model and one land surface scheme, so responses \nto radiative forcing that depend mainly on atmospheric process or land-atmosphere interactions \nwill still be constrained by the behaviour of that single model. Nevertheless, we consider that \nour experimental design avoids the reliance on one single realization of climate and hence allows \nsome of the uncertainties in regional climate-change impacts to be illustrated and explored. ", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed11.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "**Table 4.**Time of reaching GWLs of 1.5°C and 2°C in each bias-corrected output from the HadGEM3 climate simulations, driven \nby different sets of CMIP5 sea-surface temperatures. The dates are the centre year of a 20 year period for which the climate data \nis applied to the HCVI calculation and JULES simulations. \n\n1.5°C \n2024 2.0°C \n2035 ", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed11.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "**Abstract:**Distinct perceptions of the global climate is one of the factors preventing society from \nachieving consensus or taking collaborative actions on this issue. The public has not even reached \nan agreement on the naming of the global concern, showing preference for either “climate change” \nor “global warming”, and few previous studies have addressed these two competing discourses \nresulting from distinct climate concerns by differently linking numerous climate concepts. Based on \nthe 6,662,478 tweets containing #climatechange or #globalwarming generated between 1 January 2009 \nand 31 December 2018, we constructed the semantic networks of the two discourses and examined \ntheir evolution over the decade. The findings indicate that climate change demonstrated a more \nscientific perspective and showed an attempt to condense climate discussions rather than diffuse the \ntopic by frequently addressing sub-topics simultaneously. Global warming triggered more political \nresponses and showed a greater connection with phenomena. Temporal analysis suggests that \ntraditional political discussions were gradually fading in both discourses but more recently started to \nrevive in the form of discourse alliance in the climate change discourse. The associations between \nglobal warming and weather abnormalitiessuddenly strengthened around 2012. Climate change is \nbecoming more dominant than global warming in public discussions. Although two discourses have \nshown more similarities in the rank order of important climate concepts, apparent disagreements \ncontinue about how these concepts are associated. These findings lay the groundwork for researchers \nand communicators to narrow the discrepancy between diverse climate perceptions. ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "Even when climate change and global warming shared concern about similar topics such as the \ncause of the climate issue, global warming tended to focus on carbon emission phenomena, whereas \nclimate change preferred a more in-depth perspective, highlighting the importance of global action \nto mitigate the climate issue in its second-largest cluster, with energy structure as the contributor to \ncarbon emissions in its third largest cluster. As invisible causes and disbelief in actions have long \nbeen regarded as two key reasons for low climate concern [90], the two terminologies’ differences \nin connotations suggest that introducing these absent sub-topics into global warming discourse or \nhighlighting climate change for its inherent connotations may help communicators raise public concern \nabout climate. \n\n5.1.2. Political Connotations \n\nStudies noted that frame preference between climate change and global warming reflects \nindividuals’ ideological spectrum, where climate change and global warming were favored by \nthe liberals and conservatives, respectively [10]. The cluster analysis of the semantic network in the \ncurrent study demonstrated that global warming triggered far more political responses than climate \nchange. The second largest cluster of global warming was politics-based, where hashtag “tcot”, favored \nby right-leaning users and “p2”, favored by left-leaning users, were both ranked in the list of top nodes \nof the global warming discourse, but neither was included in the list of top nodes of the climate change \ndiscourse. Considering that earlier findings suggested that global warming was more likely to be used \nby conservatives to question the reality of climate issue [11] and climate change is more commonly \nadopted when discussing action against the climate change issue [5], global warming had a stronger \npolitical connotation in public discussion. ", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "A large number of previous studies have assessed potential impacts of future climate change \nusing the 5th Coupled Model Intercomparison Project (CMIP5) ensemble or subsets of this [7], \nand some have framed this in terms of impacts at global warming of 1.5°C and/or 2°C [8,9]. We \nalso base our study on a subset of CMIP5 projections, but use a new, higher-resolution atmosphere \nmodel to provide greater spatial detail and improved representation of atmospheric processes. \n\n2. Methods and models \n(a) Global climate simulations at 1.5°C and 2°C global warming \n\nThere are a number of ways in which 1.5°C or 2°C global warming can be defined—one could \nbe the long-term climate state following a stabilization of warming at that level, another could \nbe the state over a shorter period around the time of first reaching that level. Here we choose the \nsecond definition, which is what is seen first and hence needs to be adapted to. There are also \na number of methods with which such changes can be assessed [10]. We take the opportunity \nof availability of a new set of higher-resolutions transient climate and impacts simulations, and \nuse a time-sampling methodology [10] to assess global-scale impacts at these resolutions for the \nfirst time. ", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed11.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "In the past hundred years, the global climate has experienced great changes1–4. According to the sixth assess- \nment report of IPCC, the global average surface temperature increased by 1.09 °C between 1850 and 2020, and \nalmost all regions in the world experienced surface warming5. Due to global warming, the extreme climate events \nbecome more and more frequent, and the ecological environment problems caused by climate change are more \nand more serious, which restrict the sustainable development of human society and health6–10. Global warming \nhas gradually changed from a scientific issue to a major social issue of common concern to governments and \npeople of all countries11–13. In 2016, nearly 200 parties of the United Nations Framework Convention on climate \nchange reached the Paris Agreement at the climate change conference in Paris14. Paris Agreement has indicated \nthat it is urgent to hold the increase in global average temperature well below 2.0 °C above pre-industrial levels \nand pursue efforts to limit the temperature increase to 1.5 °C above pre-industrial levels. ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed9.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "NYSE_HIG_2001.pdf" } ] }, @@ -2381,70 +2381,70 @@ "target_page": 5, "target_passage": "A total of 6,662,478 tweets were retained, of which 5,774,747 contained #climatechange, and 887,731 contained #globalwarming", "chunk_present": { - "presence": true, - "index": 4 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 281, + "page_end": 281, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 346, + "page_end": 346, + "source_file": "00-80T-80.pdf" }, { - "text": "The association networks of #climatechange and #globalwarming are shown in Figure 2. Nodes \nare labelled with the hashtags and the undirected edges are weighted to reflect the frequency of \nco-occurrence. The modularity analysis identified four clusters in the #climatechange network and \nfive in the #globalwarming network, where clusters are differentiated by color (resolution is 0.75 for \nclimate change and 0.85 for global warming). The theme, top hashtags, and the proportion of each \ncluster are also summarized and represented in the network depicted in Figure 2. \n\nThe largest cluster (green nodes) of both #climatechange and #globalwarming network refer \nto general facts about global climate issues, sharing words about the causes or effects concerning \nsustainability. The difference is that the largest cluster of #globalwarming (46% of the network) includes \nmore slogan words, such as “world”, “planet”, “global”, and “climatechangeisreal”, whereas the \nlargest cluster of #climatechange (40% of the network) tends to discuss some specific problems, such as \nagriculture, biodiversity, education, and politics. ", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "**Table 2.**Hashtags that remained on the top 50 list for the climate change or the global warming \ndiscourse from 2009 to 2018. \n\n**Unique** **Shared**\n\n#climatechange \n#globalwarming china, solar, water, food, economy, coal, sustainability \npollution, earth co2, news, carbon, green, climate, \nus, energy, science, environment ", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "Given our goal of exploring the difference between the two discourses, the 615,816 tweets \ncontaining both hashtags simultaneously were excluded to differentiate between the two datasets \nfollowing [67,80]. A total of 6,662,478 tweets were retained, of which 5,774,747 contained #climatechange, \nand 887,731 contained “#globalwarming”. The number of qualified tweets containing #climatechange \nand #globalwarming in each year is displayed in Figure 1a. ", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "**Figure 1.**The number of tweets containing #climatechange or #globalwarming, and their ratio from \n2009 to 2018 (**a**). The number of hashtags contained in the “climate change” or “global warming” \ndatasets, and their ratio from 2009 to 2018 (**b**). ", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 346, + "page_end": 346, + "source_file": "00-80T-80.pdf" }, { - "text": "Association networks surrounding #climatechange and #globalwarming showed different \nproperties. The climate change discourse included 38,821 hashtags, whereas the global warming \ndiscourse only contained 8788 hashtags. Table 1 displays the 50 most significant hashtags in the \ntwo discourses based on centrality. As some hashtags were used in the form of an abbreviation or \nphrase, explanations are provided in the table. Two networks shared 32 out of the 50 most significant \nwords. Hashtags “canada”, “cdnpoli”, “sdgs”, “biodiversity”, “education”, “environmental”, “cop24”, \n“sustainable”, “auspol”, “food”, “agriculture”, “cleanenergy”, “renewableenergy”, “renewables”, \n“emissions”, “coal”, “fossilfuels”, and “cop21” only showed up on the top 50 list of the “climate change” \nnetwork. Hashtags “tcot”, “california”, “p2”, “nyc”, “snow”, “agw”, “summer”, ��global”, “winter”, \n“india”, “planet”, “heatwave”, “hoax”, “nasa”, “algore”, “world”, “oil”, and “eco” were unique on the \ntop 50 list of the global warming network. The two lists only shared three out of the top five hashtags. \nIn the #climatechange network, “climateaction” was ranked third place and “sustainability” was \nranked fourth place, whereas they were ranked significantly lower, 17th and 22nd, respectxively, in the \n#globalwarming network. In the #globalwarming network, “earth” and “weather” were among the \ntop five nodes, whereas they were ranked 14th and 24th in the #climatechange network, respectively. ", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "**Abstract:**Distinct perceptions of the global climate is one of the factors preventing society from \nachieving consensus or taking collaborative actions on this issue. The public has not even reached \nan agreement on the naming of the global concern, showing preference for either “climate change” \nor “global warming”, and few previous studies have addressed these two competing discourses \nresulting from distinct climate concerns by differently linking numerous climate concepts. Based on \nthe 6,662,478 tweets containing #climatechange or #globalwarming generated between 1 January 2009 \nand 31 December 2018, we constructed the semantic networks of the two discourses and examined \ntheir evolution over the decade. The findings indicate that climate change demonstrated a more \nscientific perspective and showed an attempt to condense climate discussions rather than diffuse the \ntopic by frequently addressing sub-topics simultaneously. Global warming triggered more political \nresponses and showed a greater connection with phenomena. Temporal analysis suggests that \ntraditional political discussions were gradually fading in both discourses but more recently started to \nrevive in the form of discourse alliance in the climate change discourse. The associations between \nglobal warming and weather abnormalitiessuddenly strengthened around 2012. Climate change is \nbecoming more dominant than global warming in public discussions. Although two discourses have \nshown more similarities in the rank order of important climate concepts, apparent disagreements \ncontinue about how these concepts are associated. These findings lay the groundwork for researchers \nand communicators to narrow the discrepancy between diverse climate perceptions. ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "The status of the two discourses varied significantly in the more recent years in the study period. \nData from Google in prior study suggested that the search record for global warming was larger \nthan that of climate change in earlier times [13]. The authors found that in the battle to be the most \nrepresentative hashtag for global climate concern, #climatechange showed growing popularity and \nbecame an overwhelming trending topic compared with #globalwarming. Also, #climatechange \nshowed a stronger ability to incorporate diverse hashtags into its discourse in both relative and absolute \ndimensions. Comparatively, the popularity of the global warming discourse among social media \nusers did not increase apparently in terms of tweets volume and hashtag diversity, especially when \nconsidering the yearly increase in Twitter users. The reason for the observed shift in public discourse \ntoward climate change from global warming may be attributed to the high exposure of climate change \nin the media and scientific reports in recent years [13]. Previous studies noted that perceived scientific \nconsensus can increase acceptance of science [101]. Though global warming has been commonly used \nsince the 1980s to describe the world-wide temperature rise, climate change is preferred by scientists to \nrefer a range of complex changes of climate [102]. Pew found science-related accounts draw millions \nof followers on Facebook and volume of posts they released climbed in past years [103]. Climate \nscientists are found to be opinion makers on Twitter [104]. As social media has become an emerging \nplatform for science popularization, scientific community might contribute to the prevalence of climate \nchange discourse by talking about climate change facts and mitigating measures [75]. ", - "page_start": 15, - "page_end": 15, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "As the climate change and global warming discourses evolved over the past years, their relative \nstatuses in public discourse also changed. Although from 2009 to 2018, increasing numbers of people \nstarted to use Twitter, resulting in an overall rise in the number of tweets and hashtags, the ratio of \n#climatechange frequency and #globalwarming frequency still indicated the public’s change in frame \npreference. Figure 1a displays that in 2009, the number of tweets with #climatechange was 2.69 times \nthat of the tweets with #globalwarming, whereas the ratio significantly since 2013 and reached 13.02 \nin 2018. The climate change network showed a stronger ability to incorporate diverse hashtags into \ndiscussions, according to Figure 1b. In 2009, the hashtags that co-occurred with #climatechange were \n2.44 times those that co-occurred with #globalwarming, and the ratio climbed to 6.36 in 2018. \n\nThe rank–order correlation coefficient of nodes between the two networks maintained a stable \nlevel and showed a slight climbing trend starting 2009, as shown in Figure 6a, except for 2010 and \n2011, when the p-values were larger than 0.05 and no significant correlations were identified. The QAP \nanalysis showed that the associations between the two discourses were correlated in the 10-year period \n(the p-value for 2015 was 0.011; p-values for all the other years were less than 0.001). Figure 6b reveals \nthat the similarity of associations between the top 50 nodes in the two discourses fluctuated and did \nnot show a rising trend with the correlation of nodes’ rank order. ", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_SMFG_2011.pdf" } ] }, @@ -2455,70 +2455,70 @@ "target_page": 7, "target_passage": "In the #climatechange network, “climateaction” was ranked third place and “sustainability” was ranked fourth place, whereas they were ranked significantly lower, 17th and 22nd, respectxively, in the #globalwarming network", "chunk_present": { - "presence": true, - "index": 3 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 252, + "page_end": 252, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 23, + "page_end": 23, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": "The association networks of #climatechange and #globalwarming are shown in Figure 2. Nodes \nare labelled with the hashtags and the undirected edges are weighted to reflect the frequency of \nco-occurrence. The modularity analysis identified four clusters in the #climatechange network and \nfive in the #globalwarming network, where clusters are differentiated by color (resolution is 0.75 for \nclimate change and 0.85 for global warming). The theme, top hashtags, and the proportion of each \ncluster are also summarized and represented in the network depicted in Figure 2. \n\nThe largest cluster (green nodes) of both #climatechange and #globalwarming network refer \nto general facts about global climate issues, sharing words about the causes or effects concerning \nsustainability. The difference is that the largest cluster of #globalwarming (46% of the network) includes \nmore slogan words, such as “world”, “planet”, “global”, and “climatechangeisreal”, whereas the \nlargest cluster of #climatechange (40% of the network) tends to discuss some specific problems, such as \nagriculture, biodiversity, education, and politics. ", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 303, + "page_end": 303, + "source_file": "00-80T-80.pdf" }, { - "text": "Association networks surrounding #climatechange and #globalwarming showed different \nproperties. The climate change discourse included 38,821 hashtags, whereas the global warming \ndiscourse only contained 8788 hashtags. Table 1 displays the 50 most significant hashtags in the \ntwo discourses based on centrality. As some hashtags were used in the form of an abbreviation or \nphrase, explanations are provided in the table. Two networks shared 32 out of the 50 most significant \nwords. Hashtags “canada”, “cdnpoli”, “sdgs”, “biodiversity”, “education”, “environmental”, “cop24”, \n“sustainable”, “auspol”, “food”, “agriculture”, “cleanenergy”, “renewableenergy”, “renewables”, \n“emissions”, “coal”, “fossilfuels”, and “cop21” only showed up on the top 50 list of the “climate change” \nnetwork. Hashtags “tcot”, “california”, “p2”, “nyc”, “snow”, “agw”, “summer”, “global”, “winter”, \n“india”, “planet”, “heatwave”, “hoax”, “nasa”, “algore”, “world”, “oil”, and “eco” were unique on the \ntop 50 list of the global warming network. The two lists only shared three out of the top five hashtags. \nIn the #climatechange network, “climateaction” was ranked third place and “sustainability” was \nranked fourth place, whereas they were ranked significantly lower, 17th and 22nd, respectxively, in the \n#globalwarming network. In the #globalwarming network, “earth” and “weather” were among the \ntop five nodes, whereas they were ranked 14th and 24th in the #climatechange network, respectively. ", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 303, + "page_end": 303, + "source_file": "00-80T-80.pdf" }, { - "text": "The status of the two discourses varied significantly in the more recent years in the study period. \nData from Google in prior study suggested that the search record for global warming was larger \nthan that of climate change in earlier times [13]. The authors found that in the battle to be the most \nrepresentative hashtag for global climate concern, #climatechange showed growing popularity and \nbecame an overwhelming trending topic compared with #globalwarming. Also, #climatechange \nshowed a stronger ability to incorporate diverse hashtags into its discourse in both relative and absolute \ndimensions. Comparatively, the popularity of the global warming discourse among social media \nusers did not increase apparently in terms of tweets volume and hashtag diversity, especially when \nconsidering the yearly increase in Twitter users. The reason for the observed shift in public discourse \ntoward climate change from global warming may be attributed to the high exposure of climate change \nin the media and scientific reports in recent years [13]. Previous studies noted that perceived scientific \nconsensus can increase acceptance of science [101]. Though global warming has been commonly used \nsince the 1980s to describe the world-wide temperature rise, climate change is preferred by scientists to \nrefer a range of complex changes of climate [102]. Pew found science-related accounts draw millions \nof followers on Facebook and volume of posts they released climbed in past years [103]. Climate \nscientists are found to be opinion makers on Twitter [104]. As social media has become an emerging \nplatform for science popularization, scientific community might contribute to the prevalence of climate \nchange discourse by talking about climate change facts and mitigating measures [75]. ", - "page_start": 15, - "page_end": 15, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 303, + "page_end": 303, + "source_file": "00-80T-80.pdf" }, { - "text": "**Figure 1.**The number of tweets containing #climatechange or #globalwarming, and their ratio from \n2009 to 2018 (**a**). The number of hashtags contained in the “climate change” or “global warming” \ndatasets, and their ratio from 2009 to 2018 (**b**). ", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 23, + "page_end": 23, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": "**Table 2.**Hashtags that remained on the top 50 list for the climate change or the global warming \ndiscourse from 2009 to 2018. \n\n**Unique** **Shared**\n\n#climatechange \n#globalwarming china, solar, water, food, economy, coal, sustainability \npollution, earth co2, news, carbon, green, climate, \nus, energy, science, environment ", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 23, + "page_end": 23, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": "Even when climate change and global warming shared concern about similar topics such as the \ncause of the climate issue, global warming tended to focus on carbon emission phenomena, whereas \nclimate change preferred a more in-depth perspective, highlighting the importance of global action \nto mitigate the climate issue in its second-largest cluster, with energy structure as the contributor to \ncarbon emissions in its third largest cluster. As invisible causes and disbelief in actions have long \nbeen regarded as two key reasons for low climate concern [90], the two terminologies’ differences \nin connotations suggest that introducing these absent sub-topics into global warming discourse or \nhighlighting climate change for its inherent connotations may help communicators raise public concern \nabout climate. \n\n5.1.2. Political Connotations \n\nStudies noted that frame preference between climate change and global warming reflects \nindividuals’ ideological spectrum, where climate change and global warming were favored by \nthe liberals and conservatives, respectively [10]. The cluster analysis of the semantic network in the \ncurrent study demonstrated that global warming triggered far more political responses than climate \nchange. The second largest cluster of global warming was politics-based, where hashtag “tcot”, favored \nby right-leaning users and “p2”, favored by left-leaning users, were both ranked in the list of top nodes \nof the global warming discourse, but neither was included in the list of top nodes of the climate change \ndiscourse. Considering that earlier findings suggested that global warming was more likely to be used \nby conservatives to question the reality of climate issue [11] and climate change is more commonly \nadopted when discussing action against the climate change issue [5], global warming had a stronger \npolitical connotation in public discussion. ", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 23, + "page_end": 23, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": "**Abstract:**Distinct perceptions of the global climate is one of the factors preventing society from \nachieving consensus or taking collaborative actions on this issue. The public has not even reached \nan agreement on the naming of the global concern, showing preference for either “climate change” \nor “global warming”, and few previous studies have addressed these two competing discourses \nresulting from distinct climate concerns by differently linking numerous climate concepts. Based on \nthe 6,662,478 tweets containing #climatechange or #globalwarming generated between 1 January 2009 \nand 31 December 2018, we constructed the semantic networks of the two discourses and examined \ntheir evolution over the decade. The findings indicate that climate change demonstrated a more \nscientific perspective and showed an attempt to condense climate discussions rather than diffuse the \ntopic by frequently addressing sub-topics simultaneously. Global warming triggered more political \nresponses and showed a greater connection with phenomena. Temporal analysis suggests that \ntraditional political discussions were gradually fading in both discourses but more recently started to \nrevive in the form of discourse alliance in the climate change discourse. The associations between \nglobal warming and weather abnormalitiessuddenly strengthened around 2012. Climate change is \nbecoming more dominant than global warming in public discussions. Although two discourses have \nshown more similarities in the rank order of important climate concepts, apparent disagreements \ncontinue about how these concepts are associated. These findings lay the groundwork for researchers \nand communicators to narrow the discrepancy between diverse climate perceptions. ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 23, + "page_end": 23, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": "Given our goal of exploring the difference between the two discourses, the 615,816 tweets \ncontaining both hashtags simultaneously were excluded to differentiate between the two datasets \nfollowing [67,80]. A total of 6,662,478 tweets were retained, of which 5,774,747 contained #climatechange, \nand 887,731 contained “#globalwarming”. The number of qualified tweets containing #climatechange \nand #globalwarming in each year is displayed in Figure 1a. ", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 23, + "page_end": 23, + "source_file": "NYSE_RCI_2013.pdf" } ] }, @@ -2529,70 +2529,70 @@ "target_page": 13, "target_passage": "As invisible causes and disbelief in actions have long been regarded as two key reasons for low climate concern", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 106, + "page_end": 106, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 16, + "page_end": 16, + "source_file": "00-80T-80.pdf" + }, + { + "text": "", + "page_start": 16, + "page_end": 16, + "source_file": "00-80T-80.pdf" }, { - "text": "Even when climate change and global warming shared concern about similar topics such as the \ncause of the climate issue, global warming tended to focus on carbon emission phenomena, whereas \nclimate change preferred a more in-depth perspective, highlighting the importance of global action \nto mitigate the climate issue in its second-largest cluster, with energy structure as the contributor to \ncarbon emissions in its third largest cluster. As invisible causes and disbelief in actions have long \nbeen regarded as two key reasons for low climate concern [90], the two terminologies’ differences \nin connotations suggest that introducing these absent sub-topics into global warming discourse or \nhighlighting climate change for its inherent connotations may help communicators raise public concern \nabout climate. \n\n5.1.2. Political Connotations \n\nStudies noted that frame preference between climate change and global warming reflects \nindividuals’ ideological spectrum, where climate change and global warming were favored by \nthe liberals and conservatives, respectively [10]. The cluster analysis of the semantic network in the \ncurrent study demonstrated that global warming triggered far more political responses than climate \nchange. The second largest cluster of global warming was politics-based, where hashtag “tcot”, favored \nby right-leaning users and “p2”, favored by left-leaning users, were both ranked in the list of top nodes \nof the global warming discourse, but neither was included in the list of top nodes of the climate change \ndiscourse. Considering that earlier findings suggested that global warming was more likely to be used \nby conservatives to question the reality of climate issue [11] and climate change is more commonly \nadopted when discussing action against the climate change issue [5], global warming had a stronger \npolitical connotation in public discussion. ", + "text": "", "page_start": 13, "page_end": 13, - "source_file": "pubmed10.pdf" + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "\nlow ", - "page_start": 193, - "page_end": 193, + "text": "", + "page_start": 16, + "page_end": 16, "source_file": "00-80T-80.pdf" }, { - "text": "\nlow ", - "page_start": 129, - "page_end": 129, + "text": "", + "page_start": 16, + "page_end": 16, "source_file": "00-80T-80.pdf" }, { - "text": "complex changes in the state of the climate [7], which may be caused by natural process, external forces, \nor human interventions [8]. By randomly assigning respondents to climate change or global warming \nquestionnaires, scholars confirmed that the different connotations contained in the two definitions are \nlikely to evoke distinct interpretations of the causes and impacts of the global climate issue [9], which \nmay inhibit collaboration and joint efforts to mitigate the global challenge. \n\nPublic preference between climate change and global warming is even more apparent when \nconsidering the ideology spectrum [10]. Some scholars concluded that conservatives, who are \nless concerned with environmental issues, tended to use global warming as a narrative strategy \nbecause global warming has a more direct connection with temperature rise, making it easier to find \ncontradictory cues such as freezing weather or heavy snowstorms to deny global climate change \nfacts [11]. The associations between global warming and human activities may contribute to more \ncontroversies as well [12], connecting global warming more with the “hoax” frame [5] and evoking \ngreater negative sentiment [13]. \n\nAlthough these existing studies have often attempted to identify the differences between these two \nterminologies, only a particular few perspectives, such as sentiment, ideological preference, or cause \nand effect, were examined in each study [3,9,13]. However, the associate network model introduced by \npsychologists suggests that human recognition and memory have a network-shaped architecture [14], \nwhere individual understanding of particular objects is connected with numerous other objects in \nthe mind. According to the associate network model, individual understanding of the global climate \nconcern is a network composed of numerous inter-connected concepts, in which climate change and \nglobal warming. As the two terminologies concern the primary mechanism of the global climate issue, \nthe preference between the two understandings may represent two distinct climate discourses by \ndifferently organizing numerous climate concepts. Examining the differences between two discourses \nwith an associative perspective may provide communicators with unique insights into narrowing the \ncognitive discrepancy. The temporal dimension was lacking in existing studies, necessitating the study \nof how concepts associated with each other have evolved with time. ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed10.pdf" - }, - { - "text": "In the past hundred years, the global climate has experienced great changes1–4. According to the sixth assess- \nment report of IPCC, the global average surface temperature increased by 1.09 °C between 1850 and 2020, and \nalmost all regions in the world experienced surface warming5. Due to global warming, the extreme climate events \nbecome more and more frequent, and the ecological environment problems caused by climate change are more \nand more serious, which restrict the sustainable development of human society and health6–10. Global warming \nhas gradually changed from a scientific issue to a major social issue of common concern to governments and \npeople of all countries11–13. In 2016, nearly 200 parties of the United Nations Framework Convention on climate \nchange reached the Paris Agreement at the climate change conference in Paris14. Paris Agreement has indicated \nthat it is urgent to hold the increase in global average temperature well below 2.0 °C above pre-industrial levels \nand pursue efforts to limit the temperature increase to 1.5 °C above pre-industrial levels. ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed9.pdf" + "text": "", + "page_start": 16, + "page_end": 16, + "source_file": "00-80T-80.pdf" }, { - "text": "**Abstract:**Distinct perceptions of the global climate is one of the factors preventing society from \nachieving consensus or taking collaborative actions on this issue. The public has not even reached \nan agreement on the naming of the global concern, showing preference for either “climate change” \nor “global warming”, and few previous studies have addressed these two competing discourses \nresulting from distinct climate concerns by differently linking numerous climate concepts. Based on \nthe 6,662,478 tweets containing #climatechange or #globalwarming generated between 1 January 2009 \nand 31 December 2018, we constructed the semantic networks of the two discourses and examined \ntheir evolution over the decade. The findings indicate that climate change demonstrated a more \nscientific perspective and showed an attempt to condense climate discussions rather than diffuse the \ntopic by frequently addressing sub-topics simultaneously. Global warming triggered more political \nresponses and showed a greater connection with phenomena. Temporal analysis suggests that \ntraditional political discussions were gradually fading in both discourses but more recently started to \nrevive in the form of discourse alliance in the climate change discourse. The associations between \nglobal warming and weather abnormalitiessuddenly strengthened around 2012. Climate change is \nbecoming more dominant than global warming in public discussions. Although two discourses have \nshown more similarities in the rank order of important climate concepts, apparent disagreements \ncontinue about how these concepts are associated. These findings lay the groundwork for researchers \nand communicators to narrow the discrepancy between diverse climate perceptions. ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 13, + "page_end": 13, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "Different frames concerning the global climate concern are popular among the public, politicians, \nenvironmentalists, and the media [1,28,29]. Big data analyses have indicated that when interpreting \nclimate events, individuals’ preference for frameworks was influenced by demographics [5] and \nsocial-political background [2]. Different choices of frameworks can evoke different psychological \nprocesses [30], promote or inhibit engagement intentions [31], or gain approval on various levels [32]. \nStudies have noted that the frameworks of climate change and global warming may result from \ndifferent political indications. The American Republican-leaning states show more preference for \nglobal warming than climate change compared with Democratic-leaning states, and global warming is \nmore connected with “hoax” in questioning the reality of the global climate issue [5]. Conservatives \nare more likely to link heat-related phenomena to global warming, whereas liberals associate these \nfacts equally with both frames [27]. An earlier survey conducted by [4] argued that wording choice \nmight not influence the whole population similarly. For the whole sample and politically independent \nindividuals, the two terminologies were equally serious, but climate change seemed more serious \ncompared with global warming among the Republicans, and the Democrats held the opposite opinion. ", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 13, + "page_end": 13, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "1. Introduction \n\nThe majority of climate-change impacts assessments have tended to be framed in terms of future \ntime horizons, e.g. impacts by the middle or end of the twenty-first century [1,2]. However, \nwith international climate policy now largely focused on limiting warming to specific levels of \nglobal mean temperature such as 2°C [3] or 1.5°C [4], policy-relevant climate impacts assessments \nincreasingly need to be framed in terms of such warming levels. \nThere are two major research questions concerning the impacts of climate change at 1.5°C and \n2°C global warming, which are relevant to both mitigation and adaptation policy areas. \n\n(i) How much larger are the impacts at 2°C compared to 1.5°C? This is the primary question \narising from the Paris Agreement [4] and is relevant to mitigation policy, informing \njudgements and actions on holding the global temperature rise to ‘well below 2°C’ and \n‘pursuing efforts to limit the temperature increase to 1.5°C’. \n\n(ii) What regional climate conditions and related hydrological and ecological conditions \ncould occur at a particular level of global warming, such as 2°C? This is relevant to \nadaptation policy and planning—exploring the possible outcomes for these levels of \nwarming will help facilitate adaptation and improved resilience to account for a 1.5°C or \n2°C world. It is recognized that many adaptation decisions require information on timing \nof specific impacts or risks, but nevertheless, framing regional impacts assessments in \nterms of associated global warming levels (GWLs) may help provide context of the levels \nof climate change that may be avoidable or unavoidable (and hence require adaptation). ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed11.pdf" + "text": "", + "page_start": 13, + "page_end": 13, + "source_file": "ASX_KCN_2013.pdf" } ] }, @@ -2609,64 +2609,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 298, + "page_end": 298, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 367, + "page_end": 367, + "source_file": "00-80T-80.pdf" }, { - "text": "The authors and the publisher have made every effort to obtain permission for and \n\nto acknowledge the use of copyright material. Should any infringement of copyright \n\nhave occurred, please contact the publisher, and every effort will be made to rectify \n\nomissions or errors in the event of a reprint or new edition. ", - "page_start": 2, - "page_end": 2, - "source_file": "basic-english-language-skills.PDF" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "sg246915.pdf" }, { - "text": "3.1.1 Syntec (Retrieval) \n\nThe Syntec French collective bargaining agree- \nment3 comprises around 90 articles. Despite its \ntopic, the language used does not feature the speci- \nficity of the legal vocabulary, making the data \nsuitable for benchmarking general-purpose mod- \nels. The articles have been scraped for use as doc- \numents. Four annotators were divided into two \ngroups. Each group was given half of the articles \nand asked to choose an article and write a question \nabout it. Each annotator wrote 25 questions. Thus, \na hundred questions have been manually created \nand paired with the articles containing the answer4. \nExamples of the dataset are available in the ap- \npendix Figure 5. This dataset could also be used \nfor text classification, clustering or topic modeling. \nRegarding quality checks, every article’s integrity \nhas been reviewed while manually creating ques- \ntions. We also manually checked that the questions \ncould only be answered using the annotated article. \n\n3 MTEB for French \n\nIn this section, we describe the datasets and the \nmodels that we propose for the French extension \nof MTEB. We also list the research questions we \nwant to discuss with the results. ", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv4.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "sg246915.pdf" }, { - "text": "Acknowledgments \ninstitutional requirements. The participants provided their written \ninformed consent to participate in this study. \n\nThe authors would like to thank the participants in this study \nand the user representatives from Nordland MS Association for \ntheir valuable contributions. The authors also acknowledge \nphilosopher of \nthe mind and cognitive sciences Hanne De \nJaegher for the valuable comments on the interpretations and \ndiscussions of the results. \n\nAuthor contributions \n\ncuration, Formal Analysis, \nInvestigation, Methodology, Project administration, Resources, \nVisualization, Writing – original draft, Writing – review & \nediting. EA: Conceptualization, Formal Analysis, Methodology, \nSupervision, Writing – review & editing. BN: Conceptualization, \nFormal Analysis, Funding acquisition, Methodology, Project \nadministration, Resources, Supervision, Writing – review & editing. \n\nSD: Conceptualization, Data \n\nConflict of interest \n\nThe authors declare that the research was conducted in the \nabsence of any commercial or financial relationships that could \nbe construed as a potential conflict of interest. \n\nFunding \n\nPublisher’s note \n\nThe author(s) declare that financial support was received for \n\nthe research, authorship, and/or publication of this article. \n\nAll claims expressed in this article are solely those of the authors \nand do not necessarily represent those of their affiliated organizations, \nor those of the publisher, the editors and the reviewers. Any product \nthat may be evaluated in this article, or claim that may be made by its \nmanufacturer, is not guaranteed or endorsed by the publisher. The development of the CoreDISTparticipation and the RCT is \nfunded by the Northern Norway Health Authority (Helse Nord \nRHF). This interview study was funded by Nord University \n(PhD salary). ", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed13.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "sg246915.pdf" }, { - "text": "Syntec \n100 queries \n90 documents \n\nSummEvalFr \n100 texts \n1100 human summaries \n1600 machine summaries \nTranslation from English \nto French with Deepl of \nthe SummEval dataset. \n\nScraping of Syntec col- \nlective bargaining agree- \nment with articles as doc- \numents. Writing queries \ncorresponding to articles. \n\nScraping of HAL arti- \ncles with id, title and do- \nmain. Further cleaning \nwith deduplication, \nlan- \nguage filtering and class \nsubsampling. \nAnnotations provided by \nauthors when submitting \ntheir paper. They choose \nthe domain between exist- \ning academic fields. \n\n4 annotators divided into \n2 groups. Each group was \ngiven half of the articles \nand asked to choose an ar- \nticle and ask a question \nabout it. Each annotator \nwrote 25 questions. \nHuman verification of an- \nnotations. \n\nDetailed annotation pro- \ncess provided in Fabbri \net al. (2021). \n\nBaseline models for clas- \nsification and topic model- \ning. \n\nbetween \nCorrelation \nROUGE \nBLEU and \nscores of \nthe French \nand the original English \ndatasets. LLM as-a-judge \ntranslation \nand \nrating \nhuman verification. ", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv4.pdf" + "text": "", + "page_start": 367, + "page_end": 367, + "source_file": "00-80T-80.pdf" }, { - "text": "For example (unaudited): \n\n• Wikipedia and the other projects operated by the Foundation receive more than 19.4 billion pageviews \n\nper month, making them one of the most popular Web properties worldwide. Wikipedia is available in \nmore than 332 languages and contains more than 63 million articles contributed by a global volunteer \ncommunity. \n\n• For the year ended June 30, 2024, the educational content of the Foundation’s largest project, \nWikipedia, grew by approximately 1.9 million articles to approximately 63.4 million articles. \n\n• For the year ended June 30, 2024, volunteers added approximately 12.2 million images, movies, and \nsound files to the Foundation’s multimedia repository, making the total 106.7 million files. \n\n• Volunteers also contribute in several ways to the Foundation’s wiki software: volunteer software \n\ndevelopers add new functionality to the code base, and volunteer language specialists add to the code \nbase by translating the wiki interface into different languages. During the year ended June 30, 2024, \nthere were 47,773 commits merged, through the efforts of approximately 511 authors/contributors, of \nwhich 8,161 commits were through the efforts of approximately 244 volunteers. ", - "page_start": 18, - "page_end": 18, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + "text": "", + "page_start": 367, + "page_end": 367, + "source_file": "00-80T-80.pdf" }, { - "text": "•**Quality:**The qualities of the training data impact the outputs a tool can produce. \nConsider an LLM trained on gibberish; it can learn the patterns of that gibberish and, \nin turn, produce related gibberish, but will not be very useful for writing an argument \nor a story, for instance. In contrast, training an LLM on books with well-constructed \narguments or crafted stories could serve those purposes. While “well-constructed” \nand “crafted” are necessarily subjective, the traditional role of editors and the \npublishing process can provide a useful indicator for the quality of writing inside of \nbooks. What’s more, metadata for books — information such as the title, author and \nyear of publication — is often more comprehensive than metadata for information ", - "page_start": 6, - "page_end": 6, - "source_file": "creative_common_ai.pdf" + "text": "", + "page_start": 367, + "page_end": 367, + "source_file": "00-80T-80.pdf" }, { - "text": "Barfield, Woodrow; Pagallo, Ugo (2018).*Research handbook on the law of artificial intelligence*. \nCheltenham, UK: Edward Elgar Publishing. ISBN 978-1-7864-3904-8. OCLC 1039480085 \n(https://search.worldcat.org/oclc/1039480085). \n\nBeal, J.; Winston, Patrick (2009), \"The New Frontier of Human-Level Artificial Intelligence\", \n\n*IEEE Intelligent Systems*, vol. 24, pp. 21–24, doi:10.1109/MIS.2009.75 (https://doi.org/10.11 \n09%2FMIS.2009.75), hdl:1721.1/52357 (https://hdl.handle.net/1721.1%2F52357), \nS2CID 32437713 (https://api.semanticscholar.org/CorpusID:32437713) \n\nBerdahl, Carl Thomas; Baker, Lawrence; Mann, Sean; Osoba, Osonde; Girosi, Federico (7 \n\nFebruary 2023). \"Strategies to Improve the Impact of Artificial Intelligence on Health Equity: \nScoping Review\" (https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11041459).*JMIR AI*.**2**: \ne42936. doi:10.2196/42936 (https://doi.org/10.2196%2F42936). ISSN 2817-1705 (https://se \narch.worldcat.org/issn/2817-1705). PMC 11041459 (https://www.ncbi.nlm.nih.gov/pmc/articl \nes/PMC11041459). PMID 38875587 (https://pubmed.ncbi.nlm.nih.gov/38875587). \nS2CID 256681439 (https://api.semanticscholar.org/CorpusID:256681439). ", - "page_start": 53, - "page_end": 53, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 368, + "page_end": 368, + "source_file": "00-80T-80.pdf" }, { - "text": " See e.g. Heald, Paul J. “How Copyright Makes Books and Music Disappear (and How Secondary \n16 \nLiability Rules Help Resurrect Old Songs).” Illinois Program in Law, Behavior and Social Science Paper \nNo. LBSS14-07 Illinois Public Law Research Paper No. 13-54 https://doi.org/10.2139/ssrn.2290181. \nAccessed 4 Jan. 2020, at https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2290181; Rosen, \nRebecca J. “Why Are so Few Books from the 20th Century Available as Ebooks?”*The Atlantic*, 18 Mar. \n2014, www.theatlantic.com/business/archive/2014/03/why-are-so-few-books-from-the-20th-century- \navailable-as-ebooks/284486/. See also “Google Book Search Settlement and Access to Out of Print \nBooks.”*Google Public Policy Blog*, publicpolicy.googleblog.com/2009/06/google-book-search- \nsettlement-and.html. Accessed 20 Mar. 2024 (discussing this issue in the context of the failed class- \naction settlement between Google, the Authors Guild, and the Association of American Publishers). \nGoogle’s final brief in the settlement proceedings notes the “prohibitive transaction costs of identifying \nand locating individual Rightsholders of these largely older, out-of-print books” — see this brief at https:// \nweb.archive.org/web/20130112060651/http://thepublicindex.org/docs/amended_settlement/ \ngoogle_final_approval_support.pdf. The Authors Guild and Association of American Publishers also \njustified the settlement’s terms in light of the fact that “the transaction costs involved in finding \ncopyright owners and clearing the rights are too high”; while they argued that most works are not truly \n“orphans,” they note that total transaction costs as a whole (including, for example, determining whether \nthe author or publisher holds the rights and then negotiating rates) are so high as to block uses of out- \nof-print works anyway — see this brief at https://web.archive.org/web/20130112060213/http:// \nthepublicindex.org/docs/amended_settlement/Supplemental_memorandum_of_law.pdf. ", - "page_start": 10, - "page_end": 10, - "source_file": "creative_common_ai.pdf" + "text": "", + "page_start": 368, + "page_end": 368, + "source_file": "00-80T-80.pdf" } ] }, @@ -2683,64 +2683,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 305, + "page_end": 305, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 324, + "page_end": 324, + "source_file": "00-80T-80.pdf" }, { - "text": "As with any file you work on it is a good idea to save your work at regular intervals so that if \nsomething goes wrong you don’t lose your work. At certain points in the tutorial where saving \nis especially important the tutorial will prompt you to do so but it is a good idea to save your \nwork often, not just when prompted. ", - "page_start": 11, - "page_end": 11, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "The need for better information and data is well known, as the**EU Strategy 2007 to 2012**underlined: \n*‘to better identify and assess potential risks by doing more research, exchanging knowledge and*\n*applying results in practice; - to develop monitoring tools to track progress; ….*432 The**EU Strategic**\n**Framework on Health and Safety at Work 2014-2020**defined seven key objectives, where key \nobjective 6 requests better data:*‘Improving statistical data collection to have better evidence and*\n*developing monitoring tools’.*433 \n\nThe most recent**EU Strategic Framework on Health and Safety at Work 2021-2027**puts the focus \non changes, with the title*‘Occupational safety and health in a changing world of work’*.434 It emphasises \nthe value of science-based evidence by stating:*‘Research and data collection, both at EU and national*\n*level, are a pre-condition for the prevention of work-related diseases and accidents. Scientific advice*\n*and the latest technological developments feed into OSH legislation and policy.’*\n\nThese objectives show that good — and often more and better — evidence and monitoring tools are \nneeded to understand all aspects of safety and health at work — as a pre-condition for priority setting \nand effective preventive actions. Consequently, in their national OSH strategies, a good number of \nMember States have agreed on provision of better data as a major target. 435 ", - "page_start": 131, - "page_end": 131, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "“They are friendly, helpful \nand creative. \nThose are all \ngood things.” \n\n", - "page_start": 8, - "page_end": 8, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "Something of a paradox, too; highly competi- \n\ntive but approachable; stylish but never a slave \n\nto fashion. I have a true talent for leadership. \n\nI’m stable, steady, reliable, and efficient. At \n\nthe same time, I’m good-looking, good-natured, \n\nand good-humored. Seek successful business \n\nperson driven by values, with a “whatever it \n\ntakes” attitude — just like me, practical and \n\nprofessional. ", - "page_start": 8, - "page_end": 8, - "source_file": "NYSE_HNI_2003.pdf" + "text": "", + "page_start": 324, + "page_end": 324, + "source_file": "00-80T-80.pdf" }, { - "text": "4.2 Using a Reasoner \nYou may notice that one or more of your classes is highlighted in red as in Figure 4.5. This is because we \nhaven’t run the reasoner yet so Protégé has not been able to verify that our new classes have no \ninconsistencies. When just creating classes and subclasses in a new ontology there is little chance of an \ninconsistency. However, it is a good idea to run the reasoner often. When there is an inconsistency the \nsooner it is discovered the easier it is to fix. One common mistake that new users make is to do a lot of \ndevelopment and then run the reasoner only to find that there are multiple inconsistencies which can make \ndebugging significantly more difficult. So let’s get into the good habit of running the reasoner often. \nProtégé comes with some reasoners bundled in and others available as plugins. Since we are going to \nwrite some SWRL rules later in the tutorial, we want to use the Pellet reasoner. It has the best support for \nSWRL at the time this tutorial is being written. \n\n**Exercise 5: Install and Run the Pellet Reasoner**\n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___", - "page_start": 16, - "page_end": 16, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 324, + "page_end": 324, + "source_file": "00-80T-80.pdf" }, { - "text": "measures that help us find personal evaluations of \n\nperceived quality or design. Our job is to evaluate these \n\nresearch companies and their output, and to develop the \n\nbest methodology for our issues. We are always refining \n\nthe tools we have and looking for new ones that will boost \n\nour accuracy. Our strong ties with outside experts are a \n\nsource of competitive advantage for Nissan. \n\nAgain, it all goes back to being customer-oriented. \n\nConfirming that customer-oriented stance will create value \n\nfor Nissan. Market Intelligence must be a dedicated \n\nevangelist for this change.” ", - "page_start": 42, - "page_end": 42, - "source_file": "OTC_NSANY_2004.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "Some important questions remain at the end of such a report: \n\n• The**quality of statistics and surveys fades the more irregular are the working**conditions \nbeing studied. Which research methods are adequate for a clearer and more reliable evidence \nbase on these working conditions? It might require research methods different from those used \ntoday, for example, more investigative case studies; it might also be helpful to evaluate the \n**existing national working conditions surveys or statistics**under this aspect. \n\n•**Fading employer–employee relations.**There are special research efforts necessary to study \nthe application of OSH regulations of work with weak or no employer–employee relations, for \nexample, for the self-employed and new forms of employment. \n\n•**Surveys usually suffer a participation bias, for example, for the migrant workforce.**The \nlow participation rate of migrants can contribute to a particular underestimation regarding their \noften unfavourable working conditions. \n\n•**Workers in manual occupations**report**better health than administrative workers**but**less**\n**expectations to do the job until being 60 years old**. What are the reasons behind this? Is it \nthe healthy worker effect, strong occupation-related differences regarding the perception of \nhealth and the expression of health problems? 502,503 ", - "page_start": 140, - "page_end": 140, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "**Now you can become a published author, too!**\n\nHere’s an opportunity to spotlight your skills, grow your career, and become a published \nauthor—all at the same time! Join an IBM Redbooks residency project and help write a book \nin your area of expertise, while honing your experience using leading-edge technologies. Your \nefforts will help to increase product acceptance and customer satisfaction, as you expand \nyour network of technical contacts and relationships. Residencies run from two to six weeks \nin length, and you can participate either in person or as a remote resident working from your \nhome base. ", - "page_start": 14, - "page_end": 14, - "source_file": "sg248459.pdf" + "text": "", + "page_start": 324, + "page_end": 324, + "source_file": "00-80T-80.pdf" } ] }, @@ -2757,64 +2757,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 21, + "page_end": 21, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 172, + "page_end": 172, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\nF”&%iD ", - "page_start": 340, - "page_end": 340, - "source_file": "00-80T-80.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Prominent Authors Sue OpenAI\" (https://www.nytimes.com/2023/09/20/books/authors-open \nai-lawsuit-chatgpt-copyright.html?campaign_id=2&emc=edit_th_20230921&instance_id=103 \n259&nl=todaysheadlines®i_id=62816440&segment_id=145288&user_id=ad24f3545dae \n0ec44284a38bb4a88f1d),*The New York Times*, archived (https://web.archive.org/web/2024 \n0914155020/https://www.nytimes.com/2023/09/20/books/authors-openai-lawsuit-chatgpt-co \npyright.html?campaign_id=2&emc=edit_th_20230921&instance_id=103259&nl=todaysheadl \nines®i_id=62816440&segment_id=145288&user_id=ad24f3545dae0ec44284a38bb4a88 \nf1d) from the original on 14 September 2024, retrieved 5 October 2024 \nAltman, Sam; Brockman, Greg; Sutskever, Ilya (22 May 2023). \"Governance of ", - "page_start": 53, - "page_end": 53, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "IBM_Storwize:ITSO:superuser>lsvdisk 2 \nid 2 \nname vdisk0 \nIO_group_id 0 \nIO_group_name io_grp0 \nstatus online \nmdisk_grp_id 0 \nmdisk_grp_name Pool0 \ncapacity 10.00GB \ntype striped \nformatted yes \nformatting no \nmdisk_id \nmdisk_name \nFC_id \nFC_name \nRC_id \nRC_name \nvdisk_UID 6005076400F580049800000000000004 \npreferred_node_id 2 \nfast_write_state empty \ncache readonly \nudid \nfc_map_count 0 \nsync_rate 50 \ncopy_count 1 \nse_copy_count 0 \nFile system \nmirror_write_priority latency \nRC_change no \ncompressed_copy_count 0 \naccess_IO_group_count 1 \nlast_access_time \nparent_mdisk_grp_id 0 \nparent_mdisk_grp_name Pool0 \nowner_type none \nowner_id \nowner_name \nencrypt yes \nvolume_id 2 \nvolume_name vdisk0 \nfunction \nthrottle_id \nthrottle_name \nIOPs_limit \nbandwidth_limit_MB \nvolume_group_id \nvolume_group_name \ncloud_backup_enabled no \ncloud_account_id \ncloud_account_name \nbackup_status off \nlast_backup_time \nrestore_status none \nbackup_grain_size ", - "page_start": 316, - "page_end": 316, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "*Figure 14-6 Adding a recipient list*\n\n**14.2.3 Adding a report ID**\n\nThe next step is to define the reports to ODF. The report ID identifies the application group \nand application to which the report belongs. Figure 14-7 shows the window where you add \nthe report ID. ", - "page_start": 346, - "page_end": 346, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Figure 8-30 Modify Host Volume Mappings: Assign SCSI ID \n\nIf you select a SCSI ID that is in use for the host, you cannot proceed. As shown in \nFigure 8-29 on page 347, we selected SCSI ID 0. However, you can see in the right \ncolumn SCSI ID 0 is allocated. By changing to SCSI ID 1, we can click**Next**. ", - "page_start": 370, - "page_end": 370, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "To verify the results, use the**lsvdisk**command providing the volume ID as the command \nparameter, as shown in Example 7-3. \n\nExample 7-3 The lsvdisk command \n\nIBM_Storwize:ITSO:superuser>lsvdisk 8 \nid 8 \nname Tiger \nIO_group_id 0 \nIO_group_name io_grp0 \nstatus online \nmdisk_grp_id 0 \nmdisk_grp_name Pool0 \ncapacity 10.00GB \ntype striped \nformatted no \nformatting yes \nmdisk_id \nmdisk_name \nFC_id \nFC_name \nRC_id \nRC_name \nvdisk_UID 6005076400F580049800000000000010 \npreferred_node_id 2 \nfast_write_state not_empty \ncache readwrite \nudid \nfc_map_count 0 \nsync_rate 50 \ncopy_count 1 \nse_copy_count 0 \nFile system \nmirror_write_priority latency \nRC_change no \ncompressed_copy_count 0 \naccess_IO_group_count 1 \nlast_access_time \nparent_mdisk_grp_id 0 \nparent_mdisk_grp_name Pool0 \nowner_type none \nowner_id \nowner_name \nencrypt yes \nvolume_id 8 \nvolume_name Tiger \nfunction \nthrottle_id \nthrottle_name \nIOPs_limit ", - "page_start": 312, - "page_end": 312, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Serverless \n\n| | | |\n|---|---|---|\n| | | |\n| | arn:partition:service:region:account-id:resource-id arn:partition:service:region:account-id:resource-type/resource-id arn:partition:service:region:account-id:resource-type:resource-id | |\n| | | |\n\n\n• arn: literally, the string \"arn\" \n\n• partition is one of the three partitions: AWS Regions, AWS China Regions, or AWS GovCloud \n\n(US) Regions \n\n• service is the specific service such as Amazon EC2 or DynamoDB \n\n• region is the AWS region like us-east-1 (North Virginia) \n\n• account-id is the AWS account ID \n\n• resource-id is the unique resource ID. Other forms for resource IDs like resource-type/ \n\nresource-id, are used by services like IAM where IAM users have resource-type of user and \nresource-id a username like MyUsername, ", - "page_start": 19, - "page_end": 19, - "source_file": "serverless-core.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**14.1.1 What documents are needed**\n\nIn our example, we identified our documents as the customer statements. How do you identify \nthe customer report that you need from the hundreds of thousands of documents that are \nstored in Content Manager OnDemand? Certain customers might receive multiple monthly \nstatements. \n\nIn general, you identify the documents by creating an SQL query that uses index fields and \nvalues that uniquely identify the documents that you want to retrieve when they are loaded. \nYou can then define the distribution to include multiple report bundles with different SQL \nqueries for each bundle. If the SQL must retrieve the document that is the same except for a \nvalue that identifies the recipient, a single distribution can be used with a recipient list. In this \ncase, the SQL specifies a wildcard value. When processing, ODF fills in the recipient ID in the \nSQL statement. For example, a recipient list contains recipients 100001, 100002, and 100003 \nand an SQL statement of “Where branch_id = '$ODF_RECIPIENT'”. When this recipient list is \nprocessed, ODF creates a distribution for recipient 100001 with all reports where branch_id = \n'100001', recipient 100002 will receive a distribution that contains all reports where branch_id \n= '100002', and so on. ", - "page_start": 342, - "page_end": 342, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_MGM_2004.pdf" } ] }, @@ -2825,69 +2825,69 @@ "target_page": 3, "target_passage": " The rims may further decay into lines of small drops due to a Rayleigh-type instability", "chunk_present": { - "presence": true, - "index": 3 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 13, + "page_end": 13, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_HNI_2003.pdf" }, { - "text": "ence of the phase behaviour on the drying of droplets of a suspension of hard-sphere colloidal \n\nparticles and non-adsorbing polymer [99], of the instabilities and the formation of drops in evap- \n\norating thin films of binary solutions [100] that may lead to treelike patterns [101], of effects of \n\na secondary phase separation on evaporation-induced pattern formation in polymer films [102], \n\nand of the influence of an imposed flow on decomposition and deposition processes in a sliding \n\nridge of evaporating solution of a binary polymer mixture [103] and of the influence of rather ", - "page_start": 24, - "page_end": 24, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 302, + "page_end": 302, + "source_file": "00-80T-80.pdf" }, { - "text": "The patterns formed in dewetting processes have attracted strong interest since Reiter analysed the \n\nprocess quantitatively in the early nineties. In these experiments, that proved to be a paradigm in \n\nour understanding of dewetting, a uniform thin film of polystyrene (tens of nanometers thick) is \n\ndeposited on a flat silicon oxide substrate is brought above the glass transition temperature. The \n\nfilm ruptures in several places, forming holes which subsequently grow, competing for space. As a \n\nresult, a random polygonal network of liquid rims emerges. The rims may further decay into lines \n\nof small drops due to a Rayleigh-type instability [1–3]. The related problems of retracting contact \n\nlines on partially wetting substrates and the opening of single holes in rather thick films have also \n\nbeen studied [4, 5]. \n\nSubsequent work has mainly focused on many different aspects of the dewetting process for simple \n\nnon-volatile liquids and polymers (for reviews see Refs. [6–8]). All stages of the dewetting of a \n\nfilm are studied: the initial film rupture via nucleation or a surface instability (called spinodal \n\ndewetting) [1, 9–13], the growth process of individual holes [14–16], the evolution of the resulting ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 302, + "page_end": 302, + "source_file": "00-80T-80.pdf" }, { - "text": "[1] G. Reiter, “Dewetting of thin polymer films,” Phys. Rev. Lett. 68, 75–78 (1992). \n\n[2] G. Reiter, “Mobility of polymers in films thinner than their unperturbed size,” Europhys. Lett. 23, \n\n579–584 (1993). \n\n[3] A. Sharma and G. Reiter, “Instability of thin polymer films on coated substrates: Rupture, dewetting \n\nand drop formation,” J. Colloid Interface Sci. 178, 383–399 (1996). \n\n[4] P.-G. de Gennes, “Wetting: Statics and dynamics,” Rev. Mod. Phys. 57, 827–863 (1985). ", - "page_start": 25, - "page_end": 25, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 302, + "page_end": 302, + "source_file": "00-80T-80.pdf" }, { - "text": "[5] F. Brochard-Wyart and J. Daillant, “Drying of solids wetted by thin liquid films,” Can. J. Phys. 68, \n\n1084–1088 (1989). \n\n[6] P. M¨uller-Buschbaum, “Dewetting and pattern formation in thin polymer films as investigated in real \n\nand reciprocal space,” J. Phys.-Condes. Matter 15, R1549–R1582 (2003). \n\n[7] R. Seemann, S. Herminghaus, C. Neto, S. Schlagowski, D. Podzimek, R. Konrad, H. Mantz, and \n\nK. Jacobs, “Dynamics and structure formation in thin polymer melt films,” J. Phys.-Condes. Matter \n\n17, S267–S290 (2005). \n\n[8] U. Thiele, “Structure formation in thin liquid films,” in S. Kalliadasis and U. Thiele, editors, “Thin \n\nfilms of Soft Matter,” pages 25–93, Springer, Wien (2007). \n\n[9] R. Xie, A. Karim, J. F. Douglas, C. C. Han, and R. A. Weiss, “Spinodal dewetting of thin polymer ", - "page_start": 26, - "page_end": 26, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 302, + "page_end": 302, + "source_file": "00-80T-80.pdf" }, { - "text": "8828–8834 (2003). \n\n[60] Y. Gotkis, I. Ivanov, N. Murisic, and L. Kondic, “Dynamic structure formation at the fronts of volatile \n\nliquid drops,” Phys. Rev. Lett. 97, 186101 (2006). \n\n[61] E. Pauliac-Vaujour and P. Moriarty, “Meniscus-mediated organization of colloidal nanoparticles,” J. \n\nPhys. Chem. C 111, 16255–16260 (2007). \n\n[62] C. Gigault, K. Dalnoki-Veress, and J. R. Dutcher, “Changes in the morphology of self-assembled \n\npolystyrene microsphere monolayers produced by annealing,” J. Colloid Interface Sci. 243, 143–155 \n\n(2001). \n\n[63] A. Oron, S. H. Davis, and S. G. Bankoff, “Long-scale evolution of thin liquid films,” Rev. Mod. Phys. \n\n69, 931–980 (1997). \n\n[64] U. Thiele, “Thin film evolution equations from (evaporating) dewetting liquid layers to epitaxial ", - "page_start": 29, - "page_end": 29, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 302, + "page_end": 302, + "source_file": "00-80T-80.pdf" }, { - "text": "polymers which only result in fingers without side-branches [75] or fields of droplets left behind \n\n[18]. \n\nA quantitative analysis shows that the mean number of fingers depends only very weakly on the av- \n\nerage concentration of the nanoparticles ρav \nn ; only the mean finger width increases with increasing \n\nconcentration. However, decreasing the mobility (i.e., decreasing the diffusivity of the particles) \n\nleads to a much denser finger pattern and also causes the front instability to appear at an earlier \n\nstage, i.e., when the front instability is in its initial linear regime, it has a higher growth rate and a \n\nsmaller characteristic wavelength (cf. Fig. 2(c) and (d)). Decreasing the effective chemical poten- \n\ntial (increasing its absolute value) has a similar but less strong effect. For details see [41]. These \n\nfindings lead to the conclusion that the determining factor for the front instability is the ratio of \n\nthe time-scales of the different transport processes. In particular, the front becomes more unstable \n\nwhen the velocity of the dewetting front increases as compared to the mean diffusion velocity of ", - "page_start": 12, - "page_end": 12, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 158, + "page_end": 158, + "source_file": "00-80T-80.pdf" }, { - "text": "[86] M. A. Spaid and G. M. Homsy, “Stability of Newtonian and viscoelastic dynamic contact lines,” \n\nPhys. Fluids 8, 460–478 (1996). \n\n[87] U. Thiele and E. Knobloch, “Front and back instability of a liquid film on a slightly inclined plate,” \n\nPhys. Fluids 15, 892–907 (2003). \n\n[88] M. R. E. Warner, R. V. Craster, and O. K. Matar, “Surface patterning via evaporation of ultrathin \n\nfilms containing nanoparticles,” J. Colloid Interface Sci. 267, 92–110 (2003). \n\n[89] O. K. Matar, R. V. Craster, and K. Sefiane, “Dynamic spreading of droplets containing nanoparticles,” \n\nPhys. Rev. E 76, 056315 (2007). \n\n[90] J. J. Zhou, B. Dupuy, A. L. Bertozzi, and A. E. Hosoi, “Theory for shock dynamics in particle-laden \n\nthin films,” Phys. Rev. Lett. 94, 117803 (2005). ", - "page_start": 31, - "page_end": 31, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 302, + "page_end": 302, + "source_file": "00-80T-80.pdf" }, { - "text": "immediately past the incipient \nskidding condition the coefficient of friction \ndecreases with \nincreased slip speed, especially \nfor the wet or icy runway conditions. Thus, \nonce skid begins, a reduction in friction force \ntorque must be met with a reduc- \nand rolling \ntion in braking torque, otherwise the wheel \nwill decelerate and lock. This is an important \nfactor to consider in braking technique because \nthe skidding tire surface on the locked wheel \nproduces considerably less retarding force than \nwhen at the incipient skid condition which \nIf the \ncauses the peak coeflicient of friction. \nwheel locks from excessive braking, the sliding \ntire surface produces less than the maximum \nretarding force and the tires become relatively \nincapable of developing any significant side \nforce. Stop distance will \nincrease and it may \nbe difficult-if \nnot impossible-to control the \nairplane when full slip is developed. In addi- \ntion, at high rolling vel,ocities on the dry sur- \nface runway, the immediate problem of a skid- \nding tire is not necessarily the loss of retard- \ning force but the imminence of tire failure. The \npilot must insure that the application of brakes \ndoes not produce some excessive braking torque \nis greater than the maximum rolling \nwhich \ntorque and particular care must be taken when \nthe runway conditions produce low values of \nfriction coefficient and when the normal force \non the braking surfaces is small. When it is \ndifficult to perceive or distinguish a skidding \ncondition, \nthe value of an antiskid or auto- \nmatic braking system will be appreciated. ", - "page_start": 406, - "page_end": 406, + "text": "", + "page_start": 302, + "page_end": 302, "source_file": "00-80T-80.pdf" } ] @@ -2905,64 +2905,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 155, + "page_end": 155, + "source_file": "00-80T-80.pdf" }, { - "text": "hole pattern [3, 13], and the stability of the individual dewetting fronts [17–19]. We note in \n\npassing, that descriptions of dewetting patterns may also be found in historic papers, particularly \n\nfor the dewetting of a liquid film on a liquid substrate. Tomlinson [20, footnote 18 on p. 40] \n\nconsidered turpentine on water and Marangoni [21, p. 352f] oil on water. \n\nMore recently, interest has turned to the dewetting processes of solutions and suspensions. How- \n\never, these systems have not yet been investigated in any great depth. Such systems are compli- \n\ncated because their behaviour is determined by the interplay between the various solute (or colloid) \n\nand solvent transport processes. Furthermore, the solvents that are used often evaporate, i.e., one \n\nhas to distinguish between ‘normal’ convective dewetting and evaporative dewetting. A number \n\nof experiments have been performed employing (colloidal) solutions of polymers [22–25], macro- \n\nmolecules like collagen and DNA [26–31] and nanoparticles [32–40]. The latter are sometimes \n\nreferred to as ‘nanofluids’. The initial focus of much of the research in the field has been on ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 154, + "page_end": 154, + "source_file": "00-80T-80.pdf" }, { - "text": "This theory allows us to study the time evolution of the evaporating film of nanoparticle suspension \n\nwithout some of the restrictions of the kinetic Monte Carlo model. Here, however, we illustrate its \n\napplication in similar parameter regimes as used above for the KMC. We focus on two examples: \n\n(i) the spinodal dewetting of a initially flat film of nanoparticle suspension characterised by con- \n\nstant ρl and ρn (Fig. 4); and (ii) the retraction of a dewetting front that is unstable with respect to \n\na fingering instability (Fig. 5). \n\nFig. 4 presents two pairs of snapshots from a purely evaporative dewetting process deep inside the \n\nparameter region of the phase diagram where spinodal dewetting occurs. For small times the film \n\nbecomes unstable showing a typical spinodal labyrinthine pattern with a typical wavelength. The \n\nnanoparticles concentrate where the remaining liquid is situated. However, they are ‘slow’ in their \n\nreaction: when ρl already takes values in the range 0.08 – 0.83, the nanoparticle concentration \n\nhas only deviated by about 25% from its initial value. The film thins strongly forming many ", - "page_start": 17, - "page_end": 17, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 36, + "page_end": 36, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "for µ < −2 the film will dewet via a nucleation or spinodal-like process. If the nanoparticles are \n\npresent, they form dried-in structures when all the liquid evaporates. The final structures do not \n\nnormally change any further – at least on short time scales. However, if the liquid wets the particles \n\n(i.e. is attracted to the particles), over long times there might be a coarsening of the structures, \n\nfacilitated by the adsorbed liquid. The dried-in patterns depend on the particular pathway taken by \n\nthe evaporative dewetting process. They range from labyrinthine to polygonal network structures \n\nor holes in a dense particle layer. Some typical patterns are displayed in Fig. 2, for cases when \n\nthe average surface coverage of the nanoparticles ρav \n\nn = 0.2. Panels (a) and (b) result from a \nspinodal-like and nucleation and growth process, respectively. At first sight they look very similar \n\nto the patterns seen for the pure solvent and one might argue that the particles solely act as passive \n\ntracers and preserve the transient volatile dewetting structures of the solvent. This was suggested \n\nin Refs. [26–28] for dewetting collagen solutions. However, panels (c) and (d) indicate that the ", - "page_start": 10, - "page_end": 10, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 154, + "page_end": 154, + "source_file": "00-80T-80.pdf" }, { - "text": "The patterns formed in dewetting processes have attracted strong interest since Reiter analysed the \n\nprocess quantitatively in the early nineties. In these experiments, that proved to be a paradigm in \n\nour understanding of dewetting, a uniform thin film of polystyrene (tens of nanometers thick) is \n\ndeposited on a flat silicon oxide substrate is brought above the glass transition temperature. The \n\nfilm ruptures in several places, forming holes which subsequently grow, competing for space. As a \n\nresult, a random polygonal network of liquid rims emerges. The rims may further decay into lines \n\nof small drops due to a Rayleigh-type instability [1–3]. The related problems of retracting contact \n\nlines on partially wetting substrates and the opening of single holes in rather thick films have also \n\nbeen studied [4, 5]. \n\nSubsequent work has mainly focused on many different aspects of the dewetting process for simple \n\nnon-volatile liquids and polymers (for reviews see Refs. [6–8]). All stages of the dewetting of a \n\nfilm are studied: the initial film rupture via nucleation or a surface instability (called spinodal \n\ndewetting) [1, 9–13], the growth process of individual holes [14–16], the evolution of the resulting ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 154, + "page_end": 154, + "source_file": "00-80T-80.pdf" }, { - "text": "only results in the small heap of material visible at the left hand side of Fig. 6(a). The decrease \n\nin hp on the right side of Fig. 6(a) arises due to the diffusion of particles to the right of the initial \n\nfront position; (ii) for very low evaporation rates, the film dynamics is dominated by convective \n\ndewetting as this process acts on a much shorter time scale than evaporation. As a result, all the \n\nliquid is collected into a drop before evaporation slowly removes the remaining solvent. Under \n\nthese conditions most of the nanoparticles are deposited in a single heap (see Fig. 6(c)). Depending \n\non the diffusivity, the heap might be highest at the centre or show a depression there; (iii) at \n\nintermediate evaporation rates, one may observe the deposition of a nanoparticle ring around a \n\nregion with a nanoparticle film of much lower height. At the centre deposition might increase \n\nagain (see Fig. 6(b)). \n\nThe most intriguing feature is the ring formation that has been observed experimentally for sus- \n\npensions of very different particle sizes ranging from nanometers [32, 36, 46, 47] to hundreds of ", - "page_start": 21, - "page_end": 21, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 154, + "page_end": 154, + "source_file": "00-80T-80.pdf" }, { - "text": "investigating the structures that are formed which are similar to the ones observed in the ‘classi- \n\ncal’ dewetting of non-volatile liquids. Labyrinthine structures and polygonal networks result from \n\nspinodal dewetting and heterogeneous nucleation and growth, respectively. They are ‘decorated’ \n\nwith the solute and therefore conserve the transient dewetting pattern as a dried-in structure when \n\nall the solvent has evaporated [28, 34]. The picture is, however, not complete. The solute may ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 154, + "page_end": 154, + "source_file": "00-80T-80.pdf" }, { - "text": "We note also that the fingering process may be viewed as self-optimising the front motion – i.e. \n\nthe front keeps its average velocity constant by expelling particles into the fingers. A similar effect \n\nexists for dewetting polymer films [18], where liquid is expelled from the growing moving rim \n\nwhich collects the dewetted polymer. There, the surplus liquid is left on the surface as a droplet \n\npattern. \n\nThe kinetic Monte Carlo model is a very useful tool that helps one to understand the pattern \n\nformation in drying nanoparticle suspensions. One has, however, to keep in mind the restrictions ", - "page_start": 13, - "page_end": 13, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 154, + "page_end": 154, + "source_file": "00-80T-80.pdf" }, { - "text": "is similar to the size of the nanoparticles. At a certain distance from the macroscopic front, the \n\nultrathin film starts to evolve a locally isotropic pattern of holes. The holes themselves grow in an \n\nunstable manner resulting in an array of isotropically branched structures as shown, e.g., above in \n\nFig. 1. This indicates that at least some of the patterns described in the literature may have arisen \n\nfrom processes in similar ultrathin ‘postcursor’ films. \n\nThe existence of the ultrathin ‘postcursor’ film is an experimental finding that can be drawn on \n\nwhen choosing a theoretical approach to account for the pattern formation (see below). Note how- \n\never, that at the moment there exists no explanation for its existence. A possible hypothesis is \n\nthat the substrate strongly attracts the nanoparticles. As a result they form a dense suspension \n\nlayer having a thickness roughly equal to the diameter of the nanoparticles. The observed meso- \n\nscopic dewetting front then actually correspond to an autophobic dewetting of a low concentration \n\nsuspension from the higher concentration suspension on the surface of the substrate. ", - "page_start": 7, - "page_end": 7, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 155, + "page_end": 155, + "source_file": "00-80T-80.pdf" } ] }, @@ -2973,70 +2973,70 @@ "target_page": 18, "target_passage": "lthough both the kinetic Monte Carlo model and the dynamical density functional theory are able to describe well the processes in the ultrathin film, they can not be employed to describe mesoscale hydrodynamics", "chunk_present": { - "presence": true, - "index": 3 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 279, + "page_end": 279, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, + "text": "", + "page_start": 36, + "page_end": 36, "source_file": "Excel Training Manual 1.pdf" }, { - "text": "We have discussed recent work on pattern formation processes in films and drops of evaporating \n\nsuspensions/solutions of polymers and particles. After reviewing experiments on suspensions of \n\nthiol-coated gold nanoparticles in toluene we have focused on the modelling of the transport and \n\nphase change processes involved. A theoretical approach to the modelling of the hydrodynamics \n\non the mesoscale has been described as well as more microscopic models for the dynamics in the \n\nobserved nanoscopic ‘postcursor’ film. In particular, we have introduced (i) a microscopic kinetic \n\nMonte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film \n\nmodel. \n\nThe kinetic Monte Carlo model and the dynamical density functional theory can both be used to \n\ninvestigate and understand the formation of polygonal networks, spinodal and branched structures \n\nresulting from the dewetting of an ultrathin ‘postcursor’ film that remains behind the mesoscopic \n\ndewetting front. They are, however, not capable of describing the dynamical processes in a meso- ", - "page_start": 23, - "page_end": 23, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 36, + "page_end": 36, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "The previous two sections focused on two approaches to describe the experimentally observed \n\npatterning dynamics in the ultrathin postcursor film left behind by a mesoscopic receding dewet- \n\nting front. Although both the kinetic Monte Carlo model and the dynamical density functional \n\ntheory are able to describe well the processes in the ultrathin film, they can not be employed to \n\ndescribe mesoscale hydrodynamics. A relatively simple model for the latter can be derived in the \n\nframework of a long-wave or lubrication equation [8, 63]. We will illustrate here the approach \n\nby considering an isothermal situation where the nanoparticles are not surface active, i.e., they do \n\nnot act as surfactants. For a model incorporating the effects of latent heat generation and surface- \n\nactive particles resulting in thermal and solutal Marangoni stresses, see Ref. [88]. A description of \n\nspreading particle solutions incorporating a structural disjoining pressure has also been considered \n\n[89]. For related work on particle-laden film flow on an incline see Refs. [90, 91]. \n\nOne starts from the Stokes equations, together with continuity, no-slip boundary conditions at the ", - "page_start": 18, - "page_end": 18, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 36, + "page_end": 36, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "and may explain why one has such good agreement between the experimentally observed patterns \n\nand the patterns obtained from a purely two-dimensional (single layer) kinetic Monte Carlo model \n\n[35]. We introduce the KMC model below in Section III A. \n\nIn several respects, however, the kinetic Monte Carlo model is rather simplistic, limiting its po- \n\ntential applications. For instance, the thermodynamic chemical potential as well as any wetting \n\ninteraction of the solvent with the substrate are collected in a single parameter – an effective chem- \n\nical potential. This implies that any influence of a disjoining pressure is ‘smeared out’ over the \n\nwhole system and that no distinction between the short- and the long-range parts of the disjoining \n\npressure is possible. It is furthermore based on the assumption that evaporation/condensation is ", - "page_start": 8, - "page_end": 8, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 134, + "page_end": 134, + "source_file": "00-80T-80.pdf" }, { - "text": "Abstract \n\nWe review recent experiments on dewetting thin films of evaporating colloidal nanoparticle suspensions \n\n(nanofluids) and discuss several theoretical approaches to describe the ongoing processes including coupled \n\ntransport and phase changes. These approaches range from microscopic discrete stochastic theories to \n\nmesoscopic continuous deterministic descriptions. In particular, we focus on (i) a microscopic kinetic \n\nMonte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film model. \n\nModels (i) and (ii) are employed to discuss the formation of polygonal networks, spinodal and branched \n\nstructures resulting from the dewetting of an ultrathin ‘postcursor film’ that remains behind a mesoscopic \n\ndewetting front. We highlight, in particular, the presence of a transverse instability in the evaporative \n\ndewetting front which results in highly branched fingering structures. The subtle interplay of decomposition \n\nin the film and contact line motion is discussed. \n\nFinally, we discuss a simple thin film model (iii) of the hydrodynamics on the mesoscale. We employ \n\ncoupled evolution equations for the film thickness profile and mean particle concentration. The model is ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 36, + "page_end": 36, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "ever, the theory is less suited to a description of the dewetting dynamics of the ultrathin postcursor \n\nfilm. \n\nThe dewetting of the ultrathin film of highly concentrated suspension may be described by a dis- \n\ncrete stochastic model such as, for instance, a kinetic Monte Carlo (KMC) model based solely on \n\nevaporation/condensation dynamics of the solvent and diffusion of the solute [35, 39, 41]. The va- \n\nlidity of this strong assumption regarding the relevant transport processes can be confirmed from \n\nan estimate based on Eq. (1): The pressure p = δF/δh drives convection and evaporation. The \n\nconvective mobility is proportional to h3, i.e., it is large for thick films but decreases strongly with \n\nreduced film thickness. The evaporative mobility, however, is a constant, implying that evapora- \n\ntion will dominate below a certain (cross-over) thickness. For the parameter values of Ref. [57] \n\nand a small contact angle (≈ 0.01), the cross-over thickness is in the range of 1-5 nanometers. \n\nThis estimate justifies the neglect of convective transport in a description of the postcursor film ", - "page_start": 8, - "page_end": 8, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 134, + "page_end": 134, + "source_file": "00-80T-80.pdf" }, { - "text": "is similar to the size of the nanoparticles. At a certain distance from the macroscopic front, the \n\nultrathin film starts to evolve a locally isotropic pattern of holes. The holes themselves grow in an \n\nunstable manner resulting in an array of isotropically branched structures as shown, e.g., above in \n\nFig. 1. This indicates that at least some of the patterns described in the literature may have arisen \n\nfrom processes in similar ultrathin ‘postcursor’ films. \n\nThe existence of the ultrathin ‘postcursor’ film is an experimental finding that can be drawn on \n\nwhen choosing a theoretical approach to account for the pattern formation (see below). Note how- \n\never, that at the moment there exists no explanation for its existence. A possible hypothesis is \n\nthat the substrate strongly attracts the nanoparticles. As a result they form a dense suspension \n\nlayer having a thickness roughly equal to the diameter of the nanoparticles. The observed meso- \n\nscopic dewetting front then actually correspond to an autophobic dewetting of a low concentration \n\nsuspension from the higher concentration suspension on the surface of the substrate. ", - "page_start": 7, - "page_end": 7, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 134, + "page_end": 134, + "source_file": "00-80T-80.pdf" }, { - "text": "The limitations of the kinetic Monte Carlo model introduced in the previous Section are related \n\nto its character as a two-dimensional lattice gas with only three states: gas, liquid or particle. \n\nThis implies that (i) no liquid can be transported to a site on the surface already filled with liquid, \n\ni.e., diffusion of the liquid can not be incorporated in a sensible way and (ii) one is not able to \n\ndistinguish between the influence of the short- and the long-range parts of the interactions with the \n\nsubstrate, as all such interactions are absorbed into the effective chemical potential. \n\nHowever, using dynamical density functional theory (DDFT) [78–83] one can develop a model \n\nfor the processes in the ultrathin postcursor film without these limitations, although here we limit \n\nourselves to developing the theory at the level of the KMC and solely discuss how to extend it to \n\nincorporate the influence of the liquid diffusion over the surface. Such a DDFT model describes \n\nthe coupled dynamics of the density fields of the liquid ρl and the nanoparticles ρn. The densities \n\nρl and ρn are defined as the probabilities of finding a given lattice site on the surface to be occupied ", - "page_start": 14, - "page_end": 14, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 134, + "page_end": 134, + "source_file": "00-80T-80.pdf" }, { - "text": "scopic film. We have seen that the KMC model is able to describe the interplay of solute diffusion \n\nwithin the solvent and solvent evaporation/condensation. It also takes the liquid-liquid, liquid- \n\nparticle and particle-particle interactions into account and therefore allows us to distinguish differ- \n\nent regimes of the transverse (fingering) instability of the evaporative dewetting front: a transport \n\nregime where the instability is almost completely independent of the interaction strengths and \n\na demixing regime where particles and liquid demix at the receding front thereby increasing its \n\ntransverse instability. \n\nThe dynamical density functional theory describes the coupled dynamics of the density fields of \n\nthe liquid and the nanoparticles. In the form described above (i.e. based on the two-dimensional \n\nhamiltonian (3)) we obtain a simple theory that allows us to study the time evolution of the evapo- \n\nrating ultrathin film and also to investigate the influence of processes such as surface diffusion by \n\nthe liquid, which are not incorporated in the KMC model. However, it is straightforward to extend \n\nthe theory to consider a fully three-dimensional fluid film, in which one can distinguish between ", - "page_start": 24, - "page_end": 24, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 135, + "page_end": 135, + "source_file": "00-80T-80.pdf" } ] }, @@ -3047,70 +3047,70 @@ "target_page": 2, "target_passage": " historical daily weather data (1986–2005) are from the AgMERRA dataset. AgMERRA is a post-processing of the NASA Modern-Era Retrospective Analysis for Research and Applications (MERRA) data. The dataset is proved to be suitable for agricultural modelling and features consistent, daily time-series data", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 372, + "page_end": 372, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 278, + "page_end": 278, + "source_file": "00-80T-80.pdf" }, { - "text": "**Materials and methods**\n**Data processing.**\nIn this study, historical daily weather data (1986–2005) are from the AgMERRA dataset. \nAgMERRA is a post-processing of the NASA Modern-Era Retrospective Analysis for Research and Applications \n(MERRA) data. The dataset is proved to be suitable for agricultural modelling and features consistent, daily \ntime-series data45. \n\nFor future (2020–2099), the original climate scenario data (Table 1) were extracted from output archives of \nfive ESMs (including GFDL-ESM2M, HadGEM2-ES, IPSL-CM5A-LR, MIROC-ESM-CHEM and NorESM1-M) \nunder four RCPs (RCP2.6, RCP4.5, RCP6.0, RCP8.5) retrieved from the CMIP website. The climate scenario data \nwas interpolated into 0.5° × 0.5° horizontal resolution and bias-corrected with respect to historical observations \nto remove systematic errors46. The data of maize-planting regions are from the gridded global dataset in 2000 \nby combining two data products47,48. ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed9.pdf" + "text": "", + "page_start": 13, + "page_end": 13, + "source_file": "NASDAQ_EEFT_2000.pdf" }, { - "text": "premises within the complex. The agreement is subject to the implementation of \nproposed gaming law reforms and a tax structure acceptable to the Company, and \nobtaining required planning and other approvals. \n\n**Macau.**In connection with the Company’s pending joint venture in Macau (see \nNote 1), the Company has committed to invest up to $280 million in the entity \nin the form of capital contributions and shareholder loans. \n\n**New York Racing Association.**The Company has an understanding with the New \nYork Racing Association (“NYRA”) to manage video lottery terminals (“VLTs”) at \nNYRA’s Aqueduct horseracing facility in metropolitan New York. The Company \nwould assist in the development of the facility, including providing project \nfinancing, and would manage the facility for a fee. Work was halted on the VLT \nfacility in August 2003 pending the outcome of an investigation of certain aspects \nof NYRA’s operations by Federal prosecutors. In December 2003, NYRA reached \nagreement with the Justice Department whereby NYRA was indicted with \nprosecution deferred. NYRA agreed to pay a fine and the indictment will be \ndismissed with prejudice upon NYRA implementing certain reforms and otherwise \ncomplying with the terms of the agreement. The Company’s participation is subject \nto a definitive agreement, regulatory approvals and certain legislative changes by the \nState of New York. ", - "page_start": 72, - "page_end": 72, - "source_file": "NYSE_MGM_2004.pdf" + "text": "", + "page_start": 279, + "page_end": 279, + "source_file": "00-80T-80.pdf" }, { - "text": "**New York Racing Association.**We have an understanding with the New York \nRacing Association (“NYRA”) to manage VLTs at NYRA’s Aqueduct horseracing \nfacility in metropolitan New York. We would assist in the development of the \nfacility, including providing project financing, and would manage the facility for a \nfee. Work was halted on the VLT facility in August 2003 pending the outcome of ", - "page_start": 40, - "page_end": 40, - "source_file": "NYSE_MGM_2004.pdf" + "text": "", + "page_start": 279, + "page_end": 279, + "source_file": "00-80T-80.pdf" }, { - "text": "an investigation of certain aspects of NYRA’s operations by Federal prosecutors. In \nDecember 2003, NYRA reached agreement with the Justice Department whereby \nNYRA was indicted with prosecution deferred. NYRA agreed to pay a fine and the \nindictment will be dismissed with prejudice upon NYRA implementing certain \nreforms and otherwise complying with the terms of the agreement. Our \nparticipation is subject to a definitive agreement, regulatory approvals and \ncertain legislative changes by the State of New York. \n\n**Off Balance Sheet Arrangements**\nOur off balance sheet arrangements consist primarily of investments in \nunconsolidated affiliates, which currently consist primarily of our investments in \nMonte Carlo and Borgata. We have not entered into any transactions with special \npurpose entities, nor have we engaged in any derivative transactions other than \nstraightforward interest rate swaps. Our joint venture and unconsolidated affiliate \ninvestments allow us to realize the benefits of owning a full-scale resort in a manner \nthat minimizes our initial investment. We provided a guaranty for up to 50% of the \ninterest and principal payment obligations on the construction financing for The \nResidences at MGM Grand. Otherwise, we have not guaranteed financing obtained \nby our investees, nor are there any other provisions of the venture agreements which \nare unusual or subject us to risks to which we would not be subjected if we had full \nownership of the resort. ", - "page_start": 41, - "page_end": 41, - "source_file": "NYSE_MGM_2004.pdf" + "text": "", + "page_start": 279, + "page_end": 279, + "source_file": "00-80T-80.pdf" }, { - "text": "4.2 Using a Reasoner \nYou may notice that one or more of your classes is highlighted in red as in Figure 4.5. This is because we \nhaven’t run the reasoner yet so Protégé has not been able to verify that our new classes have no \ninconsistencies. When just creating classes and subclasses in a new ontology there is little chance of an \ninconsistency. However, it is a good idea to run the reasoner often. When there is an inconsistency the \nsooner it is discovered the easier it is to fix. One common mistake that new users make is to do a lot of \ndevelopment and then run the reasoner only to find that there are multiple inconsistencies which can make \ndebugging significantly more difficult. So let’s get into the good habit of running the reasoner often. \nProtégé comes with some reasoners bundled in and others available as plugins. Since we are going to \nwrite some SWRL rules later in the tutorial, we want to use the Pellet reasoner. It has the best support for \nSWRL at the time this tutorial is being written. \n\n**Exercise 5: Install and Run the Pellet Reasoner**\n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___", - "page_start": 16, - "page_end": 16, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 145, + "page_end": 145, + "source_file": "00-80T-80.pdf" }, { - "text": "Dear Shareholder \n\nI am pleased to present our Remuneration Report for 2013. \n\nAs you would be aware, at last year’s Annual General Meeting (“AGM”) 30% of the votes cast in respect of the resolution to adopt \nthe 2012 Remuneration Report voted ‘against’ the resolution. As this was greater than the 25% threshold under the executive \nremuneration legislation, we received what is referred to as a ‘first strike.’ Our formal response to issues raised by shareholders at \nthe AGM with respect to the 2012 Remuneration Report is set out on page 50 of this Report. \n\nVoting at AGMs is not compulsory and results of the 2012 AGM reflected this with only 59% of issued shares that were eligible to \nvote on the resolution to adopt the Remuneration Report doing so, meaning the ‘against’ vote represented 18% of eligible issued \nshares. \n\nWhile we believe our remuneration practices are sound and demonstrate a clear link between executive and shareholder returns, \nwe have taken the first strike seriously and have undertaken an extensive review of the remuneration principles for Key \nManagement Personnel. \n\nThe changes that the Board have implemented as a result of this review include: \n〉〉 A structural review of the Company resulting in the appointment in December 2012 of a senior human resources specialist as ", - "page_start": 50, - "page_end": 50, - "source_file": "ASX_KCN_2013.pdf" + "text": "", + "page_start": 279, + "page_end": 279, + "source_file": "00-80T-80.pdf" }, { - "text": "| LPAR\n1 | LPAR\n2 | | LPAR\nn |\n|---|---|---|---|\n| LPAR 1 | LPAR 2 | | LPAR n |\n\n\n**Syste m B**", - "page_start": 315, - "page_end": 315, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 145, + "page_end": 145, + "source_file": "00-80T-80.pdf" }, { - "text": "**ITEM 9. CHANGES IN AND DISAGREEMENTS WITH ACCOUNTANTS ON ACCOUNTING**\n**AND FINANCIAL DISCLOSURE**\n\nNone. \n\n**ITEM 9A. CONTROLS AND PROCEDURES**\n\n**Disclosure Controls and Procedures**\n\nWe carried out an evaluation, under the supervision and with the participation of our management, \nincluding our Chief Executive OÇcer and Chief Financial OÇcer, of the eÅectiveness of our disclosure \ncontrols and procedures as of the end of the period covered by this Annual Report. Based upon that evaluation, \nour Chief Executive OÇcer and Chief Financial OÇcer concluded that our disclosure controls and procedures \nwere eÅective as of the end of the period covered by this Annual Report in accumulating and communicating \nto our management, including our Chief Executive OÇcer and Chief Financial OÇcer, material information \nrequired to be included in the reports we Ñle or submit under the Securities Exchange Act of 1934 as \nappropriate to allow timely decisions regarding required disclosure. ", - "page_start": 95, - "page_end": 95, - "source_file": "NYSE_RSG_2004.pdf" + "text": "", + "page_start": 146, + "page_end": 146, + "source_file": "00-80T-80.pdf" } ] }, @@ -3127,64 +3127,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**Yield change of maize under global warming by 1.5 °C and 2.0 °C.**Maize production is affected \nby climate change apparently. According to the simulation results of CERES-maize, the yield of maize would \ndecrease in the worldwide relative to 1986–2005 under global warming by 2.0 °C; it would increase little under \nglobal warming by 1.5 °C. The distributions of maize yield loss under the two scenarios are similar to each other, \nmostly located in the middle and low latitude, which are the main regions for maize planting in the world. The \nloss risk of maize under global warming by 2.0 °C is much more serious than that under global warming of \n1.5 °C. However, there are increasing potentials of maize yield in many regions, nearly half of the whole maize \nplanting area in the world, in which the climate situation would become more proper for maize under global ", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed9.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**Figure 5.**(continued) \n\nby 1.5 °C. According to the simulation results, comparing to 1986–2005, the maize yield in the United States, \nChina and Brazil would decrease under global warming by 2.0 °C; the yield loss rate would reach more than 24% \nin Brazil; the United States would decrease by 13.3%; China would decrease by 11.5%. However, there would \nbe increasing trends in Argentina and Mexico; the maize yield would increase by 16.8% in Argentina; the yield \nincreasing rate would exceed 40% in Mexico. Overall, the gross maize yield in the top 5 countries would decrease \nby 11.4% under global warming by 2.0 °C. By comparing the maize production in different countries, it can be \nfound that the reduction trend of total maize production in the top five countries is more obvious, especially \nunder the scenario of global warming by 2.0 °C, the global food trade and food security may face greater risks. \nFrom the view of continents, there are different trends of maize yield changes in the 6 continents (except Ant- \narctica) under global warming by 1.5 °C and 2.0 °C (Fig. 6). From the results of simulated by CRESE-maize under \nglobal warming by 1.5 °C, the maize yield in 3 continents would decline apparently, including South America, \nEurope and Oceania; the average yield loss rates are respectively − 15.6%, − 12.4%, − 36.4%; in the other 3 con- \ntinents the average maize yield would go up, especially in Africa more than 30%; the increasing trends are slight \nin Asia and North America, in which the yield increasing rates are separately 0.7% and 0.4%. However, the yield \nchange trends simulated by IPSL-CM5A-LR and GFDL-ESM2M models are different in 2 continents, including \nAsia and North America. From the results of simulated by CRESE-maize under global warming by 2.0 °C, the \nmaize yield in 5 continents would decline apparently, except Africa; the average yield loss rates are respectively \n− 7.9% (Asia), − 14.1% (North America), − 9.3% (South America), − 22.5% (Europe), − 25.5% (Oceania); only in \nAfrica the average maize yield would go up also more than 30%; meanwhile the yield change trends simulated by \nIPSL-CM5A-LR and GFDL-ESM2M models are the same in each continent. Comparing the two global warming \nscenarios, there would be apparent variations in maize yield in Asia and North America, in which the annual \nmaize yield accounts for a great proportion of the whole world, leading to a much more serious yield loss under \nglobal warming by 2.0 °C than that under global warming by 1.5 °C. There would be an obvious crisis of food \nsupply under global warming by 2.0 °C with the increasing population in the future. So, it is important to make \nfull preparation for adaptation to climate change in the whole world. ", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed9.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "From the results simulated by IPSL-CM5A-LR model under RCP 2.6 scenario, the gross yield of maize in \nthe world between 2020 and 2039 would decrease by 6.8% relative to 1986–2005. The area is 37.7% of the whole \nmaize planting regions in the world, in which the yield loss would be less than 50%, mainly located in the low \nand middle latitude of South America and Asia, and the middle latitude of Africa and North America. The area \nis 16.4% of the whole maize planting regions, in which the yield loss would be more than 50%, mainly located \nin the low latitude of South America and the middle latitude of Asia and Europe. The area is 45.8% of the whole \nmaize planting regions, in which the yield would increase, mainly located in the low latitude of Africa, Asia and \nNorth America, the high latitude of Europe. From the results simulated by the GFDL-ESM2M model under \nRCP 4.5 scenario, the gross yield of maize in the world between 2041 and 2060 would increase by 7.2% relative \nto 1986–2005. There are opposite trends of maize yield under global warming by 1.5 °C, which are simulated \nby different global climate models. However, the spatial distributions of maize yield change are similar to each \nother. The difference is that the regions of high yield loss rate are decreasing, and the regions of yield increasing \nare going up. In a comprehensive perspective, under global warming by 1.5 °C, maize yield in the whole world \nwould increase 0.18% relative to 1986–2005 (Fig. 3). According to Paris Agreement, all countries should do their \nbest to limit the global warming by 1.5 °C until the end of 21 century. If that objective could be accomplished, \ngross maize production of the whole world would not be influenced so much by climate change, but the food ", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed9.pdf" + "text": "", + "page_start": 370, + "page_end": 370, + "source_file": "00-80T-80.pdf" }, { - "text": "According to statistics in 2018, the gross maize yield in the top 5 countries is almost 80% of the total maize \nyield of the whole world. The United States accounts for more than 32%; China accounts for about 24%; Brazil, \nArgentina and Mexico account for about 23%. The fluctuation of maize production in these five top countries will \nhave a significant impact on the global maize trade. Based on the simulation results, comparing to 1986–2005, \nthe maize yield in China, Brazil and Argentina would decrease under global warming by 1.5 °C; the yield loss \nrate would reach more than 20% in Brazil; Argentina would decrease by 14.7%; China would decrease by 3.7%. \nHowever, there would be increasing trends in the United States and Mexico; the change in the United States \nwould not be significant and the maize yield would increase by 0.5%; the yield increasing rate would exceed 50% \nin Mexico. Overall, the gross maize yield in the top 5 countries would decrease by 2% under global warming \n\nhttps://doi.org/10.1038/s41598-022-22228-7 8 ", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed9.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**Conclusion.**According to the simulation results, the yield of maize under global warming by 2.0 °C would \ndecrease between 3.0 and 18.7% in the worldwide relative to 1986–2005; the maize yield would fluctuate between \n− 6.8 and 7.2% under global warming by 1.5 °C. From the spatial distribution, the gross maize yield in the top 5 \nhigh-yield countries (including the United States, China, Brazil, Argentina and Mexico) would decrease by 2% \nunder global warming by 1.5 °C and 11.4% under global warming by 2.0 °C. At the global level, the market price \nfor maize would increase by 0.7% and 3.4% under 1.5 °C scenario and 2.0 °C scenario, respectively, which would \nvary quite largely among different countries and regions. So, it is urgent for all countries to pay enough attention \nto the loss risk of maize yield and take actions of mitigation and adaptation to climate change. The time left for \nchanging our minds and actions is becoming less and less. ", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed9.pdf" + "text": "", + "page_start": 370, + "page_end": 370, + "source_file": "00-80T-80.pdf" }, { - "text": "**Yield change of maize in main countries.**There are huge differences in impacts on maize yield under \nclimate change, which would influence the food crisis in different regions. There are 159 countries in the whole \nworld which plant maize. The gross yield of maize the top 20 countries accounts for more than 90% of the total \nyield in the 159 countries. So, the changes in the top 20 countries under future scenarios would influence the \nfood security of the whole world (Fig. 5). From the results of simulated by CRESE-maize under global warming \nby 1.5 °C, there would be 75 countries facing with yield loss of maize; the mean yield loss rate would become \n33.5%. There would be 84 countries experiencing yield increases. Overall, the global maize yield would slightly \nincrease. Under global warming by 2.0 °C, there would be 82 countries facing with yield loss of maize, for which \nthe mean yield loss rate is approximate to that under global warming by 1.5 °C. There would be 77 countries \nexperiencing yield increase; however, the mean yield increase is apparently smaller than that under global warm- \ning by 1.5 °C. Generally, the global maize yield would decrease. The results show that the adverse effect of warm- \ning up 2.0 °C on global maize production is far greater than warming up 1.5 °C. It is important to take actions to \ndevelop forward-looking adaptation measures to cope with future climate change. ", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed9.pdf" + "text": "", + "page_start": 68, + "page_end": 68, + "source_file": "00-80T-80.pdf" }, { - "text": "security of the whole world would still be attacked violently. There are huge differences among the continents; \nSouth America, Asia and the Middle East are threatened seriously by yield loss seriously under global warming \nby 1.5 °C. The changes in maize yield in different regions would influence the maize price and food trades. So, \nit should be cautious to cope with the maize changes under global warming by 1.5 °C. ", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed9.pdf" + "text": "", + "page_start": 370, + "page_end": 370, + "source_file": "00-80T-80.pdf" }, { - "text": "Second, our sectoral aggregation scheme for GTAP ensures that all the competing and complimenting sectors \nfor maize are present in the most disaggregated form. For example, for maize, other crops compete for inputs of \nproduction and both livestock and households are major users of maize. For regional aggregation, we kept the \ndetails for all the main producing, consuming, and trading regions, for maize. ", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed9.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" } ] }, @@ -3201,64 +3201,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 8, + "page_end": 8, + "source_file": "NYSE_GLW_2002.pdf" }, { - "text": "**Yield change of maize under global warming by 1.5 °C and 2.0 °C.**Maize production is affected \nby climate change apparently. According to the simulation results of CERES-maize, the yield of maize would \ndecrease in the worldwide relative to 1986–2005 under global warming by 2.0 °C; it would increase little under \nglobal warming by 1.5 °C. The distributions of maize yield loss under the two scenarios are similar to each other, \nmostly located in the middle and low latitude, which are the main regions for maize planting in the world. The \nloss risk of maize under global warming by 2.0 °C is much more serious than that under global warming of \n1.5 °C. However, there are increasing potentials of maize yield in many regions, nearly half of the whole maize \nplanting area in the world, in which the climate situation would become more proper for maize under global ", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed9.pdf" + "text": "", + "page_start": 173, + "page_end": 173, + "source_file": "00-80T-80.pdf" }, { - "text": "**Conclusion.**According to the simulation results, the yield of maize under global warming by 2.0 °C would \ndecrease between 3.0 and 18.7% in the worldwide relative to 1986–2005; the maize yield would fluctuate between \n− 6.8 and 7.2% under global warming by 1.5 °C. From the spatial distribution, the gross maize yield in the top 5 \nhigh-yield countries (including the United States, China, Brazil, Argentina and Mexico) would decrease by 2% \nunder global warming by 1.5 °C and 11.4% under global warming by 2.0 °C. At the global level, the market price \nfor maize would increase by 0.7% and 3.4% under 1.5 °C scenario and 2.0 °C scenario, respectively, which would \nvary quite largely among different countries and regions. So, it is urgent for all countries to pay enough attention \nto the loss risk of maize yield and take actions of mitigation and adaptation to climate change. The time left for \nchanging our minds and actions is becoming less and less. ", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed9.pdf" + "text": "", + "page_start": 173, + "page_end": 173, + "source_file": "00-80T-80.pdf" }, { - "text": "At 1.5°C global warming, although the increases in TXx are smaller than at 2°C, these increases \nshow similar geographical patterns as for 2°C in all ensemble members, with larger changes in \ncontinental interiors especially in the mid-latitudes (not shown). \n\nThe percentage of days exceeding the 90th percentile of daily temperature (Tx90p) also \nincreases less at 1.5°C global warming than at 2°C (figure 15). The largest reductions are in the \ntropics, where the largest increase was seen at 2°C; whereas at 2°C global warming, 50% or more ", - "page_start": 16, - "page_end": 16, - "source_file": "pubmed11.pdf" + "text": "", + "page_start": 173, + "page_end": 173, + "source_file": "00-80T-80.pdf" }, { - "text": "security of the whole world would still be attacked violently. There are huge differences among the continents; \nSouth America, Asia and the Middle East are threatened seriously by yield loss seriously under global warming \nby 1.5 °C. The changes in maize yield in different regions would influence the maize price and food trades. So, \nit should be cautious to cope with the maize changes under global warming by 1.5 °C. ", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed9.pdf" + "text": "", + "page_start": 16, + "page_end": 16, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "meantime, the huge differences in yield changes in different regions provide a small chance for the world, espe- \ncially under global warming by 1.5 °C. In the near future, if the global temperature can be effectively controlled \nunder 1.5 °C warming scenario, there would be an increase in the potential for maize yield in the worldwide. \nAll regions and countries should take actions to reduce the yield loss risk. For the yield-increasing regions, the \npotentials of climate resources should be fully utilized to guarantee maize yield under future scenarios; for the \nyield-reducing regions, the targeted adaptation actions should be taken in advance under global warming by \n1.5 °C and 2.0 °C. \n\nMeanwhile, the risk of price fluctuations caused by global corn trade due to future climate change should be \npaid more attention to, especially for developing and undeveloped countries. In the view of supply and demand, \nthe population would go up quickly in the next 30 years; the demand for maize would increase hugely; however, \nthe supply of maize would go down in the future, especially under global warming by 2.0 °C; it would intensify \nthe contradiction between supply and demand, which would threaten the food security and sustainable develop- \nment in the whole world. ", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed9.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "Although, so far there are plenty of research on the impacts of global warming by 1.5 °C temperature, includ- \ning the impacts comparison of global warming by 1.5 °C versus 2.0 °C44. It is necessary to do more quantitative \nimpacts assessments of global warming by 1.5 °C and 2.0 °C on crops yield and market price to address research \ngaps and support the requirement of the scientific community and governments. In this paper, the future climate \nsituations were selected and analyzed which are the approximate scenarios with global warming by 1.5 °C and \n2.0 °C, based on the simulation results from 5 climate models recommended by ISI-MIP under 4 RCP scenarios. \nThen the per unit yield changes of maize all over the world under global warming by 1.5 °C and 2.0 °C were \nanalyzed and the spatial distributions of changes in maize yield were revealed relative to the baseline from \n1985 to 2006, applying crop model DSSAT (Decision Support System for Agrotechnology Transfer). Next, we \nexamine the effects of the resulting maize production shocks in different countries; the market price of maize is \nsimulated using GTAP to reveal the impacts of climate change on global crop trade. Finally, the future trend of \nmaize yield and market price in the main breadbasket is assessed and the adaptation suggestions are put forward \nfor maize cultivation. ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed9.pdf" + "text": "", + "page_start": 174, + "page_end": 174, + "source_file": "00-80T-80.pdf" }, { - "text": "**Discussion and conclusion**\n**Discussion.**Our analysis highlights the effects of climate change on global- and regional-specific maize \nyields and the associated economic consequences in 1.5 °C and 2.0 °C -warming scenarios. We find that the \nreduction risk of maize yield under global warming by 2.0 °C is much more serious than that under global warm- \ning by 1.5 °C. On the one hand, the larger the temperature rise, the greater the evapotranspiration would be. \nAlthough the precipitation is also increasing, the evapotranspiration would become more intense. The limitation \nof water supply for maize growth leads to the decline of yield. On the other hand, relative to global warming by \n1.5 °C, maize production would be faced with more serious and frequent extreme climate events, such as drought \nand heat waves, which would increase the risk of corn yield reduction under global warming by 2.0 °C. In the ", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed9.pdf" + "text": "", + "page_start": 14, + "page_end": 14, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "(a) Climate-change impacts at 2°C global warming \n\nFor 2°C global warming, the ensemble-mean increase in annual daily maximum temperature was \nabove 2°C for most of the land surface, with the exception of the Indian subcontinent, most of \nAustralia and Antarctica (figure 2). The increase was higher still in many regions; most of North \nAmerica, much of China and north Asia, northwestern South America and all of Europe. In the \nnorthern and eastern USA and much of northern and western Europe, the annual daily maximum \ntemperature increased by over 4°C for 2°C global warming. The global mean TXx increased by \nmore than 2°C in all ensemble members (table 5), so the maximum temperature warming more \nthan the global annual mean is a consistent result across all projections here, as found in previous \nstudies with other models [9] (table 5). \n\nThe different ensemble members give somewhat different results at regional scales, although \nthere is a strong consensus on the temperature extremes examined here becoming warmer. In \nthe simulations driven by SSTs and SICs from the two IPSL CMIP5 models, most of the global ", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed11.pdf" + "text": "", + "page_start": 174, + "page_end": 174, + "source_file": "00-80T-80.pdf" } ] }, @@ -3269,70 +3269,70 @@ "target_page": 8, "target_passage": "For formal fallacies, the source of the error is found in the form of the argument", "chunk_present": { - "presence": true, - "index": 3 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 296, + "page_end": 296, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "Another characterization identifies informal logic with the study of non-deductive arguments. In this way, \nit contrasts with deductive reasoning examined by formal logic.[35] Non-deductive arguments make their \nconclusion probable but do not ensure that it is true. An example is the inductive argument from the \nempirical observation that \"all ravens I have seen so far are black\" to the conclusion \"all ravens are \nblack\".[36] \n\nA further approach is to define informal logic as the study of informal fallacies.[37] Informal fallacies are \nincorrect arguments in which errors are present in the content and the context of the argument.[38] A false \ndilemma, for example, involves an error of content by excluding viable options. This is the case in the \nfallacy \"you are either with us or against us; you are not with us; therefore, you are against us\".[39] Some \ntheorists state that formal logic studies the general form of arguments while informal logic studies \nparticular instances of arguments. Another approach is to hold that formal logic only considers the role of ", - "page_start": 3, - "page_end": 3, - "source_file": "wikipedia1.pdf" - }, + "text": "", + "page_start": 72, + "page_end": 72, + "source_file": "00-80T-80.pdf" + }, { - "text": "Fallacies are usually divided into formal and \ninformal fallacies.[38] For formal fallacies, the \nsource of the error is found in the*form*of the \nargument. For example, denying the antecedent \nis one type of formal fallacy, as in \"if Othello is a \nbachelor, then he is male; Othello is not a \nbachelor; therefore Othello is not male\".[88] But \nmost fallacies fall into the category of informal \nfallacies, of which a great variety is discussed in \nthe academic literature. The source of their error \nis usually found in the*content*or the*context*of \nthe \nare \nsometimes categorized as fallacies of ambiguity, \nfallacies of presumption, or \nfallacies of \nthe \nrelevance. For \nambiguity and vagueness of natural language are \nresponsible for their flaw, as in \"feathers are light; what is light cannot be dark; therefore feathers cannot \nbe dark\".[90] Fallacies of presumption have a wrong or unjustified premise but may be valid otherwise.[91] \nIn the case of fallacies of relevance, the premises do not support the conclusion because they are not \nrelevant to it.[92] \n\nargument.[89] Informal fallacies ", - "page_start": 8, - "page_end": 8, - "source_file": "wikipedia1.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "**Fallacies**\n\nNot all arguments live up to the standards of correct reasoning. When they do not, they are usually \nreferred to as fallacies. Their central aspect is not that their conclusion is false but that there is some flaw \nwith the reasoning leading to this conclusion.[84] So the argument \"it is sunny today; therefore spiders \nhave eight legs\" is fallacious even though the conclusion is true. Some theorists, like John Stuart Mill, \ngive a more restrictive definition of fallacies by additionally requiring that they appear to be correct.[85] \nThis way, genuine fallacies can be distinguished from mere mistakes of reasoning due to carelessness. \nThis explains why people tend to commit fallacies: because they have an alluring element that seduces \npeople into committing and accepting them.[86] However, this reference to appearances is controversial \nbecause it belongs to the field of psychology, not logic, and because appearances may be different for \ndifferent people.[87] ", - "page_start": 8, - "page_end": 8, - "source_file": "wikipedia1.pdf" + "text": "", + "page_start": 72, + "page_end": 72, + "source_file": "00-80T-80.pdf" }, { - "text": "**Informal**\n\nInformal logic is usually carried out in a less systematic way. It often focuses on more specific issues, like \ninvestigating a particular type of fallacy or studying a certain aspect of argumentation. Nonetheless, some \nframeworks of informal logic have also been presented that try to provide a systematic characterization of \nthe correctness of arguments.[141] ", - "page_start": 13, - "page_end": 13, - "source_file": "wikipedia1.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "Formal logic needs to translate natural language \narguments into a formal language, like first-order logic, to \nassess whether they are valid. In this example, the letter \n\"c\" represents Carmen while the letters \"M\" and \"T\" stand \nfor \"Mexican\" and \"teacher\". The symbol \"∧\" has the \nmeaning of \"and\". \n**Informal logic**\n\nWhen understood in a wide sense, logic \nencompasses both formal and informal logic.[24] Informal logic uses non-formal criteria and standards to \nanalyze and assess the correctness of arguments. Its main focus is on everyday discourse.[25] Its \ndevelopment was prompted by difficulties in applying the insights of formal logic to natural language \narguments.[26] In this regard, it considers problems that formal logic on its own is unable to address.[27] \nBoth provide criteria for assessing the correctness of arguments and distinguishing them from \nfallacies.[28] \n\nMany characterizations of informal logic have been suggested but there is no general agreement on its \nprecise definition.[29] The most literal approach sees the terms \"formal\" and \"informal\" as applying to the \nlanguage used to express arguments. On this view, informal logic studies arguments that are in informal \nor natural language.[30] Formal logic can only examine them indirectly by translating them first into a \nformal language while informal logic investigates them in their original form.[31] On this view, the \nargument \"Birds fly. Tweety is a bird. Therefore, Tweety flies.\" belongs to natural language and is \n; (2) \nexamined by informal logic. But the formal translation \"(1) \n\" is studied by formal logic.[32] The study of natural language \narguments comes with various difficulties. For example, natural language expressions are often \nambiguous, vague, and context-dependent.[33] Another approach defines informal logic in a wide sense as \nthe normative study of the standards, criteria, and procedures of argumentation. In this sense, it includes \nquestions about the role of rationality, critical thinking, and the psychology of argumentation.[34] \n\n; (3) ", - "page_start": 3, - "page_end": 3, - "source_file": "wikipedia1.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "**Arguments and inferences**\nLogic is commonly defined in terms of arguments or inferences as the study of their correctness.[59] An \n*argument*is a set of premises together with a conclusion.[60] An*inference*is the process of reasoning \nfrom these premises to the conclusion.[43] But these terms are often used interchangeably in logic. \nArguments are correct or incorrect depending on whether their premises support their conclusion. \nPremises and conclusions, on the other hand, are true or false depending on whether they are in accord \nwith reality. In formal logic, a sound argument is an argument that is both correct and has only true \npremises.[61] Sometimes a distinction is made between simple and complex arguments. A complex ", - "page_start": 5, - "page_end": 5, - "source_file": "wikipedia1.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "**Definition**\n\nThe word \"logic\" originates from the Greek word*logos*, which has a variety of translations, such as \nreason, discourse, or language.[4] Logic is traditionally defined as the study of the laws of thought or \ncorrect reasoning,[5] and is usually understood in terms of inferences or arguments. Reasoning is the \nactivity of drawing inferences. Arguments are the outward expression of inferences.[6] An argument is a \nset of premises together with a conclusion. Logic is interested in whether arguments are correct, i.e. \nwhether their premises support the conclusion.[7] These general characterizations apply to logic in the \nwidest sense, i.e., to both formal and informal logic since they are both concerned with assessing the \ncorrectness of arguments.[8] Formal logic is the traditionally dominant field, and some logicians restrict \nlogic to formal logic.[9] ", - "page_start": 2, - "page_end": 2, - "source_file": "wikipedia1.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "**Logic**\n\n**Logic**is the study of correct reasoning. It includes both formal and \ninformal logic. Formal logic is the study of deductively valid \ninferences or logical truths. It examines how conclusions follow \nfrom premises based on the structure of arguments alone, \nindependent of their topic and content. Informal logic is associated \nwith informal fallacies, critical thinking, and argumentation \ntheory. Informal logic examines arguments expressed in natural \nlanguage whereas formal logic uses formal language. When used \nas a countable noun, the term \"a logic\" refers to a specific logical \nformal system that articulates a proof system. Logic plays a \ncentral role in many fields, such as philosophy, mathematics, \ncomputer science, and linguistics. \n\nLogic studies valid forms of \ninference like*modus ponens*. \n\nLogic studies arguments, which consist of a set of premises that leads to a conclusion. An example is the \nargument from the premises \"it's Sunday\" and \"if it's Sunday then I don't have to work\" leading to the \nconclusion \"I don't have to work\".[1] Premises and conclusions express propositions or claims that can be \ntrue or false. An important feature of propositions is their internal structure. For example, complex \npropositions are made up of simpler propositions linked by logical vocabulary like \n(if...then). Simple propositions also have parts, like \"Sunday\" or \"work\" in the example. The truth of a \nproposition usually depends on the meanings of all of its parts. However, this is not the case for logically \ntrue propositions. They are true only because of their logical structure independent of the specific \nmeanings of the individual parts. \n\n (and) or ", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia1.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" } ] }, @@ -3343,70 +3343,70 @@ "target_page": 18, "target_passage": "In Chinese philosophy, the School of Names and Mohism were particularly influential", "chunk_present": { - "presence": true, - "index": 5 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, + "text": "", + "page_start": 18, + "page_end": 18, "source_file": "Excel Training Manual 1.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 128, + "page_end": 128, + "source_file": "00-80T-80.pdf" }, { - "text": "**Philosophy of logic and philosophical logic**\n*Philosophy of logic*is the philosophical discipline studying the scope and nature of logic.[59] It examines \nmany presuppositions implicit in logic, like how to define its basic concepts or the metaphysical \nassumptions associated with them.[158] It is also concerned with how to classify logical systems and \nconsiders the ontological commitments they incur.[159]*Philosophical logic*is one of the areas within the \nphilosophy of logic. It studies the application of logical methods to philosophical problems in fields like \nmetaphysics, ethics, and epistemology.[160] This application usually happens in the form of extended or \ndeviant logical systems.[161] ", - "page_start": 14, - "page_end": 14, - "source_file": "wikipedia1.pdf" + "text": "", + "page_start": 128, + "page_end": 128, + "source_file": "00-80T-80.pdf" }, { - "text": "Ibn Sina (Avicenna) was the founder of Avicennian logic, which replaced Aristotelian logic as the \ndominant system of logic in the Islamic world.[189] It influenced Western medieval writers such as \nAlbertus Magnus and William of Ockham.[190] Ibn Sina wrote on the hypothetical syllogism[191] and on \nthe propositional calculus.[192] He developed an original \"temporally modalized\" syllogistic theory, \ninvolving temporal logic and modal logic.[193] He also made use of inductive logic, such as his methods \nof agreement, difference, and concomitant variation, which are critical to the scientific method.[191] Fakhr \nal-Din al-Razi was another influential Muslim logician. He criticized Aristotelian syllogistics and \nformulated an early system of inductive logic, foreshadowing the system of inductive logic developed by \nJohn Stuart Mill.[194] \n\nDuring the Middle Ages, many translations and interpretations of Aristotelian logic were made. The \nworks of Boethius were particularly influential. Besides translating Aristotle's work into Latin, he also \nproduced textbooks on logic.[195] Later, the works of Islamic philosophers such as Ibn Sina and Ibn \nRushd (Averroes) were drawn on. This expanded the range of ancient works available to medieval \nChristian scholars since more Greek work was available to Muslim scholars that had been preserved in \nLatin commentaries. In 1323, William of Ockham's influential*Summa Logicae*was released. It is a \ncomprehensive treatise on logic that discusses many basic concepts of logic and provides a systematic \nexposition of types of propositions and their truth conditions.[196] ", - "page_start": 17, - "page_end": 17, - "source_file": "wikipedia1.pdf" + "text": "", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "The syllogistic logic developed by Aristotle predominated in the West until the mid-19th century, when \ninterest in the foundations of mathematics stimulated the development of modern symbolic logic.[202] \nMany see Gottlob Frege's*Begriffsschrift*as the birthplace of modern logic. Gottfried Wilhelm Leibniz's \nidea of a universal formal language is often considered a forerunner. Other pioneers were George Boole, \nwho invented Boolean algebra as a mathematical system of logic, and Charles Peirce, who developed the \nlogic of relatives. Alfred North Whitehead and Bertrand Russell, in turn, condensed many of these \ninsights in their work*Principia Mathematica*. Modern logic introduced novel concepts, such as functions, \nquantifiers, and relational predicates. A hallmark of modern symbolic logic is its use of formal language \nto precisely codify its insights. In this regard, it departs from earlier logicians, who relied mainly on \nnatural language.[203] Of particular influence was the development of first-order logic, which is usually \ntreated as the standard system of modern logic.[204] Its analytical generality allowed the formalization of \nmathematics and drove the investigation of set theory. It also made Alfred Tarski's approach to model \ntheory possible and provided the foundation of modern mathematical logic.[205] ", - "page_start": 18, - "page_end": 18, - "source_file": "wikipedia1.pdf" + "text": "", + "page_start": 128, + "page_end": 128, + "source_file": "00-80T-80.pdf" }, { - "text": "In Chinese philosophy, the School of Names and Mohism were particularly influential. The School of \nNames focused on the use of language and on paradoxes. For example, Gongsun Long proposed the \nwhite horse paradox, which defends the thesis that a white horse is not a horse. The school of Mohism \nalso acknowledged the importance of language for logic and tried to relate the ideas in these fields to the \nrealm of ethics.[197] \n\nIn India, the study of logic was primarily pursued by the schools of Nyaya, Buddhism, and Jainism. It \nwas not treated as a separate academic discipline and discussions of its topics usually happened in the \ncontext of epistemology and theories of dialogue or argumentation.[198] In Nyaya, inference is understood \nas a source of knowledge (pramāṇa). It follows the perception of an object and tries to arrive at \nconclusions, for example, about the cause of this object.[199] A similar emphasis on the relation to \nepistemology is also found in Buddhist and Jainist schools of logic, where inference is used to expand the \nknowledge gained through other sources.[200] Some of the later theories of Nyaya, belonging to the \nNavya-Nyāya school, resemble modern forms of logic, such as Gottlob Frege's distinction between sense \nand reference and his definition of number.[201] ", - "page_start": 18, - "page_end": 18, - "source_file": "wikipedia1.pdf" + "text": "", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "**Classical**\n\nClassical logic is distinct from traditional or Aristotelian logic. It encompasses propositional logic and \nfirst-order logic. It is \"classical\" in the sense that it is based on basic logical intuitions shared by most \nlogicians.[117] These intuitions include the law of excluded middle, the double negation elimination, the \nprinciple of explosion, and the bivalence of truth.[118] It was originally developed to analyze \nmathematical arguments and was only later applied to other fields as well. Because of this focus on ", - "page_start": 10, - "page_end": 10, - "source_file": "wikipedia1.pdf" + "text": "", + "page_start": 5, + "page_end": 5, + "source_file": "ASX_SEA_2014.pdf" }, { - "text": "Conjunction (AND) is one of the \nbasic operations of Boolean logic. It \ncan be electronically implemented in \nseveral ways, for example, by using \ntwo transistors. \n\nThe epistemology of logic studies how one knows that an \nargument is valid or that a proposition is logically true.[174] This \nincludes questions like how to justify that modus ponens is a valid \nrule of inference or that contradictions are false.[175] The \ntraditionally dominant view \nlogical \nis \nunderstanding belongs to knowledge a priori.[176] In this regard, it \nis often argued that the mind has a special faculty to examine relations between pure ideas and that this \nfaculty is also responsible for apprehending logical truths.[177] A similar approach understands the rules \nof logic in terms of linguistic conventions. On this view, the laws of logic are trivial since they are true by \ndefinition: they just express the meanings of the logical vocabulary.[178] \n\nthat this form of \n\nSome theorists, like Hilary Putnam and Penelope Maddy, object to the view that logic is knowable a \npriori. They hold instead that logical truths depend on the empirical world. This is usually combined with \nthe claim that the laws of logic express universal regularities found in the structural features of the world. \nAccording to this view, they may be explored by studying general patterns of the fundamental sciences. \nFor example, it has been argued that certain insights of quantum mechanics refute the principle of \n is equivalent to \ndistributivity in classical logic, which states that the formula \n. This claim can be used as an empirical argument for the thesis that quantum logic \n\nis the correct logical system and should replace classical logic.[179] ", - "page_start": 16, - "page_end": 16, - "source_file": "wikipedia1.pdf" + "text": "", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "propositions into account, like predicates and quantifiers. Extended logics accept the basic intuitions \nbehind classical logic and apply it to other fields, such as metaphysics, ethics, and epistemology. Deviant \nlogics, on the other hand, reject certain classical intuitions and provide alternative explanations of the \nbasic laws of logic. ", - "page_start": 2, - "page_end": 2, - "source_file": "wikipedia1.pdf" + "text": "", + "page_start": 128, + "page_end": 128, + "source_file": "00-80T-80.pdf" }, { - "text": "Arguments can be either correct or incorrect. An argument is correct if its premises support its \nconclusion. Deductive arguments have the strongest form of support: if their premises are true then their \nconclusion must also be true. This is not the case for ampliative arguments, which arrive at genuinely new \ninformation not found in the premises. Many arguments in everyday discourse and the sciences are \nampliative arguments. They are divided into inductive and abductive arguments. Inductive arguments are \nstatistical generalization—such as inferring that all ravens are black, based on many individual \nobservations of black ravens.[2] Abductive arguments are inferences to the best explanation—for \nexample, when a doctor concludes that a patient has a certain disease, as the best explanation for the \nsymptoms that they are observed to suffer.[3] Arguments that fall short of the standards of correct \nreasoning often embody fallacies. Systems of logic are theoretical frameworks for assessing the \ncorrectness of arguments. \n\nLogic has been studied since antiquity. Early approaches include Aristotelian logic, Stoic logic, Nyaya, \nand Mohism. Aristotelian logic focuses on reasoning in the form of syllogisms. It was considered the \nmain system of logic in the Western world until it was replaced by modern formal logic, which has its \nroots in the work of late 19th-century mathematicians such as Gottlob Frege. Today, the most commonly \nused system is classical logic. It consists of propositional logic and first-order logic. Propositional logic \nonly considers logical relations between full propositions. First-order logic also takes the internal parts of ", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia1.pdf" + "text": "", + "page_start": 16, + "page_end": 16, + "source_file": "sg247938.pdf" } ] }, @@ -3417,70 +3417,70 @@ "target_page": 6, "target_passage": "A deductively valid argument is one whose premises guarantee the truth of its conclusion", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "argument is made up of a chain of simple arguments. This means that the conclusion of one argument acts \nas a premise of later arguments. For a complex argument to be successful, each link of the chain has to be \nsuccessful.[43] \n\nArguments and inferences are either \ncorrect or incorrect. If they are correct \ntheir \ntheir premises support \nthen \nconclusion. In the incorrect case, this \nsupport \ntake \ndifferent forms corresponding to the \ndifferent types of reasoning.[62] The \nstrongest form of support corresponds \nto deductive reasoning. But even \narguments that are not deductively \nvalid may still be good arguments \ntheir premises offer non- \nbecause \ndeductive support to their conclusions. \nFor such cases, the term*ampliative*or \nused.[63] \n*inductive*\nDeductive arguments are associated \nwith formal logic in contrast to the \nrelation between ampliative arguments and informal logic.[64] \n\nis missing. It can \n\nArgument terminology used in logic ", - "page_start": 6, - "page_end": 6, - "source_file": "wikipedia1.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "Arguments can be either correct or incorrect. An argument is correct if its premises support its \nconclusion. Deductive arguments have the strongest form of support: if their premises are true then their \nconclusion must also be true. This is not the case for ampliative arguments, which arrive at genuinely new \ninformation not found in the premises. Many arguments in everyday discourse and the sciences are \nampliative arguments. They are divided into inductive and abductive arguments. Inductive arguments are \nstatistical generalization—such as inferring that all ravens are black, based on many individual \nobservations of black ravens.[2] Abductive arguments are inferences to the best explanation—for \nexample, when a doctor concludes that a patient has a certain disease, as the best explanation for the \nsymptoms that they are observed to suffer.[3] Arguments that fall short of the standards of correct \nreasoning often embody fallacies. Systems of logic are theoretical frameworks for assessing the \ncorrectness of arguments. \n\nLogic has been studied since antiquity. Early approaches include Aristotelian logic, Stoic logic, Nyaya, \nand Mohism. Aristotelian logic focuses on reasoning in the form of syllogisms. It was considered the \nmain system of logic in the Western world until it was replaced by modern formal logic, which has its \nroots in the work of late 19th-century mathematicians such as Gottlob Frege. Today, the most commonly \nused system is classical logic. It consists of propositional logic and first-order logic. Propositional logic \nonly considers logical relations between full propositions. First-order logic also takes the internal parts of ", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia1.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "**Logic**\n\n**Logic**is the study of correct reasoning. It includes both formal and \ninformal logic. Formal logic is the study of deductively valid \ninferences or logical truths. It examines how conclusions follow \nfrom premises based on the structure of arguments alone, \nindependent of their topic and content. Informal logic is associated \nwith informal fallacies, critical thinking, and argumentation \ntheory. Informal logic examines arguments expressed in natural \nlanguage whereas formal logic uses formal language. When used \nas a countable noun, the term \"a logic\" refers to a specific logical \nformal system that articulates a proof system. Logic plays a \ncentral role in many fields, such as philosophy, mathematics, \ncomputer science, and linguistics. \n\nLogic studies valid forms of \ninference like*modus ponens*. \n\nLogic studies arguments, which consist of a set of premises that leads to a conclusion. An example is the \nargument from the premises \"it's Sunday\" and \"if it's Sunday then I don't have to work\" leading to the \nconclusion \"I don't have to work\".[1] Premises and conclusions express propositions or claims that can be \ntrue or false. An important feature of propositions is their internal structure. For example, complex \npropositions are made up of simpler propositions linked by logical vocabulary like \n(if...then). Simple propositions also have parts, like \"Sunday\" or \"work\" in the example. The truth of a \nproposition usually depends on the meanings of all of its parts. However, this is not the case for logically \ntrue propositions. They are true only because of their logical structure independent of the specific \nmeanings of the individual parts. \n\n (and) or ", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia1.pdf" + "text": "", + "page_start": 141, + "page_end": 141, + "source_file": "00-80T-80.pdf" }, { - "text": "Another characterization identifies informal logic with the study of non-deductive arguments. In this way, \nit contrasts with deductive reasoning examined by formal logic.[35] Non-deductive arguments make their \nconclusion probable but do not ensure that it is true. An example is the inductive argument from the \nempirical observation that \"all ravens I have seen so far are black\" to the conclusion \"all ravens are \nblack\".[36] \n\nA further approach is to define informal logic as the study of informal fallacies.[37] Informal fallacies are \nincorrect arguments in which errors are present in the content and the context of the argument.[38] A false \ndilemma, for example, involves an error of content by excluding viable options. This is the case in the \nfallacy \"you are either with us or against us; you are not with us; therefore, you are against us\".[39] Some \ntheorists state that formal logic studies the general form of arguments while informal logic studies \nparticular instances of arguments. Another approach is to hold that formal logic only considers the role of ", - "page_start": 3, - "page_end": 3, - "source_file": "wikipedia1.pdf" + "text": "", + "page_start": 141, + "page_end": 141, + "source_file": "00-80T-80.pdf" }, { - "text": "**Definition**\n\nThe word \"logic\" originates from the Greek word*logos*, which has a variety of translations, such as \nreason, discourse, or language.[4] Logic is traditionally defined as the study of the laws of thought or \ncorrect reasoning,[5] and is usually understood in terms of inferences or arguments. Reasoning is the \nactivity of drawing inferences. Arguments are the outward expression of inferences.[6] An argument is a \nset of premises together with a conclusion. Logic is interested in whether arguments are correct, i.e. \nwhether their premises support the conclusion.[7] These general characterizations apply to logic in the \nwidest sense, i.e., to both formal and informal logic since they are both concerned with assessing the \ncorrectness of arguments.[8] Formal logic is the traditionally dominant field, and some logicians restrict \nlogic to formal logic.[9] ", - "page_start": 2, - "page_end": 2, - "source_file": "wikipedia1.pdf" + "text": "", + "page_start": 141, + "page_end": 141, + "source_file": "00-80T-80.pdf" }, { - "text": "Formal logic is interested in deductively valid arguments, for which the truth of their premises ensures \nthe truth of their conclusion. This means that it is impossible for the premises to be true and the \nconclusion to be false.[11] For valid arguments, the logical structure of the premises and the conclusion \nfollows a pattern called a rule of inference.[12] For example, modus ponens is a rule of inference \naccording to which all arguments of the form \"(1)*p*, (2) if*p*then*q*, (3) therefore*q*\" are valid, independent \nof what the terms*p*and*q*stand for.[13] In this sense, formal logic can be defined as the science of valid \ninferences. An alternative definition sees logic as the study of logical truths.[14] A proposition is logically \ntrue if its truth depends only on the logical vocabulary used in it. This means that it is true in all possible \nworlds and under all interpretations of its non-logical terms, like the claim \"either it is raining, or it is \nnot\".[15] These two definitions of formal logic are not identical, but they are closely related. For example, \nif the inference from*p*to*q*is deductively valid then the claim \"if*p*then*q*\" is a logical truth.[16] ", - "page_start": 2, - "page_end": 2, - "source_file": "wikipedia1.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "Conjunction (AND) is one of the \nbasic operations of Boolean logic. It \ncan be electronically implemented in \nseveral ways, for example, by using \ntwo transistors. \n\nThe epistemology of logic studies how one knows that an \nargument is valid or that a proposition is logically true.[174] This \nincludes questions like how to justify that modus ponens is a valid \nrule of inference or that contradictions are false.[175] The \ntraditionally dominant view \nlogical \nis \nunderstanding belongs to knowledge a priori.[176] In this regard, it \nis often argued that the mind has a special faculty to examine relations between pure ideas and that this \nfaculty is also responsible for apprehending logical truths.[177] A similar approach understands the rules \nof logic in terms of linguistic conventions. On this view, the laws of logic are trivial since they are true by \ndefinition: they just express the meanings of the logical vocabulary.[178] \n\nthat this form of \n\nSome theorists, like Hilary Putnam and Penelope Maddy, object to the view that logic is knowable a \npriori. They hold instead that logical truths depend on the empirical world. This is usually combined with \nthe claim that the laws of logic express universal regularities found in the structural features of the world. \nAccording to this view, they may be explored by studying general patterns of the fundamental sciences. \nFor example, it has been argued that certain insights of quantum mechanics refute the principle of \n is equivalent to \ndistributivity in classical logic, which states that the formula \n. This claim can be used as an empirical argument for the thesis that quantum logic \n\nis the correct logical system and should replace classical logic.[179] ", - "page_start": 16, - "page_end": 16, - "source_file": "wikipedia1.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "**Arguments and inferences**\nLogic is commonly defined in terms of arguments or inferences as the study of their correctness.[59] An \n*argument*is a set of premises together with a conclusion.[60] An*inference*is the process of reasoning \nfrom these premises to the conclusion.[43] But these terms are often used interchangeably in logic. \nArguments are correct or incorrect depending on whether their premises support their conclusion. \nPremises and conclusions, on the other hand, are true or false depending on whether they are in accord \nwith reality. In formal logic, a sound argument is an argument that is both correct and has only true \npremises.[61] Sometimes a distinction is made between simple and complex arguments. A complex ", - "page_start": 5, - "page_end": 5, - "source_file": "wikipedia1.pdf" + "text": "", + "page_start": 141, + "page_end": 141, + "source_file": "00-80T-80.pdf" } ] }, @@ -3497,64 +3497,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 204, + "page_end": 204, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**MAIN OUTCOMES AND MEASURES**LLM-generated handoff notes were evaluated for (1) lexical \n\nsimilarity with respect to physician-written notes using ROUGE and BERTScore; (2) fidelity with \n\nrespect to source notes using SCALE; and (3) readability, completeness, curation, correctness, \n\nusefulness, and implications for patient safety using a novel framework. \n\n**RESULTS**In this study of 1600 EM patient records (832 [52%] female and mean [SD] age of 59.9 \n\n[18.9] years), LLM-generated handoff notes, compared with physician-written ones, had higher \n\nROUGE (0.322 vs 0.088), BERTScore (0.859 vs 0.796), and SCALE scores (0.691 vs 0.456), \n\nindicating the LLM-generated summaries exhibited greater similarity and more detail. As reviewed by \n\n3 board-certified EM physicians, a subsample of 50 LLM-generated summaries had a mean (SD) \n\nusefulness score of 4.04 (0.86) out of 5 (compared with 4.36 [0.71] for physician-written) and mean \n\n(SD) patient safety scores of 4.06 (0.86) out of 5 (compared with 4.50 [0.56] for physician-written). \n\nNone of the LLM-generated summaries were classified as a critical patient safety risk. ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed8.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**Abstract**\n\n**IMPORTANCE**An emergency medicine (EM) handoff note generated by a large language model \n\n(LLM) has the potential to reduce physician documentation burden without compromising the safety \n\nof EM-to-inpatient (IP) handoffs. \n\n**OBJECTIVE**To develop LLM-generated EM-to-IP handoff notes and evaluate their accuracy and \n\nsafety compared with physician-written notes. \n\n**DESIGN, SETTING, AND PARTICIPANTS**This cohort study used EM patient medical records with \n\nacute hospital admissions that occurred in 2023 at NewYork-Presbyterian/Weill Cornell Medical \n\nCenter. A customized clinical LLM pipeline was trained, tested, and evaluated to generate templated \n\nEM-to-IP handoff notes. Using both conventional automated methods (ie, recall-oriented \n\nunderstudy for gisting evaluation [ROUGE], bidirectional encoder representations from transformers \n\nscore [BERTScore], and source chunking approach for large-scale inconsistency evaluation [SCALE]) \n\nand a novel patient safety-focused framework, LLM-generated handoff notes vs physician-written \n\nnotes were compared. Data were analyzed from October 2023 to March 2024. \n**Meaning**These findings suggest the \n\nvalue of a manual, patient safety– \n**EXPOSURE**LLM-generated EM handoff notes. \nfocused clinical evaluation of LLM \n\nmodels and the potential of \n\nLLM-generated handoff notes to create \n\na new standard of care in EM. ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed8.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**Discussion**\n\nThe study demonstrated success in generating EM-to-IP handoff notes using both a fine tuned, \n\npretrained LLM and rule-based approaches within an end user–developed note template. It is \n\nimportant to note that (largely due to time constraints within the EM care delivery model) the \n\nperformance of EM-to-IP handoff notes was not the current standard of care in EM. The study site’s \n\nunique electronic handoff process enabled a comparison between physician-written and \n\nLLM-generated handoff notes. Traditional automated evaluations of the model output suggested ", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed8.pdf" + "text": "", + "page_start": 239, + "page_end": 239, + "source_file": "00-80T-80.pdf" }, { - "text": "**JAMA Network Open | Emergency Medicine**\n\nevaluation frameworks may not address the anticipated effect LLM performance limitations could \nhave on patient safety.38-41 \n\nIn this study, we aim to expand on prior work of clinical summarization to rigorously evaluate \n\nthe outcomes of a fine-tuned model developed to generate accurate and safe summaries of the care \n\nrendered during an ED visit, with the long-term goal of integrating automated, structured EM-to-IP \n\nhandoff notes into an EHR-based electronic handoff admission workflow (see eAppendix 1 in \n\nSupplement 1). We fine-tune pretrained LLMs on well curated datasets of structured and \n\nunstructured EHR data from the ED encounter to summarize the patient’s ED care. We improved the \n\ncorrectness of model generations and customized the summaries in a structured format designed \n\nby a team of EM and internal medicine physician leaders for optimal usefulness. We proposed a novel \n\npatient safety-focused LLM evaluation framework to examine the LLM-generated handoff notes’ \n\nquality and accuracy and the downstream patient safety implications of any identified inaccuracies. \n\nTo evaluate noninferiority, we compared the LLM-generated handoff notes with the preexisting \n\nphysician-written EM-to-IP handoff notes as the active control, using both the proposed patient ", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed8.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "and 5 and a mean (SD) score of 4.96 (0.14), which is defined as the hallucinations posing mild to no \n\npatient safety risk. LLM-generated notes demonstrated a higher rate of incorrectness (9.6%) \n\ncompared with the physician-written notes (2.0%), although very few hallucinations. \n\nICC were 0.79 for completeness, 0.70 for curation, 0.59 for readability, 0.76 for correctness, \n\nand 0.74 for usefulness. These numbers suggest good reliability of agreement for completeness, \n\ncuration, correctness, and usefulness and suggest fair reliability for readability among the 3 raters. ", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed8.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "EHR-based handoff workflow via a standardized EM-to-IP handoff note template, designed for real- \n\ntime completion by the EM care team at time of admission. At 3 and 6 months postlaunch, informal \n\nevaluation of new EM-to-IP handoff notes through random medical record review and unstructured \n\nclinician feedback sessions revealed variable completeness, quality, and subsequent usefulness of \n\nthe handoff notes. ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed8.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**JAMA Network Open | Emergency Medicine**\n\nsubsequently evaluated 2 ED-to-inpatient handoff notes for each patient: (1) the physician-written \n\nnote and (2) the LLM-generated note. \n\nOn a Likert scale of 1 to 5, where 1 is unacceptable and 5 is excellent, the 3 physicians rated the \n\ncompleteness, curation, readability, and correctness of the summary as shown in eTable 1 in \n\nSupplement 1. Physicians rated the usefulness of the summary, defined as the capability of the \n\nsummary being incorporated into a workflow where a physician would make edits before final \n\ncompletion, mitigating potential future self-referential learning loops and the downstream adverse \nconsequences.51 Likewise, the raters assessed potential patient safety implications of unmitigated \nmodel errors using a scale from 1 to 5, where 1 denotes life-threatening risks and 5 denotes no \n\nidentified patient safety risk for completeness, curation, readability, and the 4 subcategories within \n\ncorrectness (hallucination, faulty logic, knowledge gap, and bias), as well as the overall patient safety \nrisk.45 Evaluators arrived at prestudy consensus that a usefulness Likert score of at least a 3 out of 5 \nindicated that the LLM-generated summary likely demonstrated baseline acceptability for such a ", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed8.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**Key Points**\n\n**Question**Can a large language model \n\n(LLM) generate emergency medicine \n\n(EM)-to-inpatient (IP) handoff notes \n\nthat are useful and safe for EM care? \n\n**Findings**In this cohort study of 1600 \n\nEM patient medical records using a \n\nnovel evaluation framework, the \n\nLLM-generated EM-to-IP handoff notes \n\nhad a mean usefulness of 4.04 out of 5 \n\n(compared with 4.36 for \n\nphysician-written) and a mean patient \n\nsafety of 4.06 out of 5 (compared with \n\n4.50 for physician-written) with no \n\ncritical patient safety risks. ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed8.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" } ] }, @@ -3565,70 +3565,70 @@ "target_page": 1, "target_passage": "mprovements include better representation of the past climate, the inclusion of more cloud and aerosol processes and the ability to model important climate phenomena ", "chunk_present": { - "presence": true, - "index": 3 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 393, + "page_end": 393, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 265, + "page_end": 265, + "source_file": "00-80T-80.pdf" }, { - "text": "The high-resolution simulations were performed using the HadGEM3A Global Atmosphere \n(GA) 3.0 model [12–14] at a resolution of N216 (0.556° of latitude by 0.833° of longitude with \ngridboxes of approx. 60 km length in mid-latitudes). This is the atmospheric component of \nthe HadGEM3-GC2 coupled climate model [15,16], which is part of the HadGEM3 family of \nclimate models [12]. This represents the third generation of HadGEM configurations, leading \non from the HadGEM2 family of climate model configurations [13] which was used for CMIP5. \nKey improvements over the previous model, HadGEM2, include increased vertical levels in the \natmosphere (85 compared to 38) and substantial changes to the model dynamics (ENDGame) [17]. \nThis version of the HadGEM3 model lies in the transition from CMIP5 to CMIP6 versions. The Met \nOffice is currently operationally running the coupled HadGEM3-GC2 model at N216 resolution \nfor seasonal and decadal forecasting and clear benefits are emerging from this use at higher \nresolution [18,19]. ", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed11.pdf" + "text": "", + "page_start": 260, + "page_end": 260, + "source_file": "00-80T-80.pdf" }, { - "text": "What improvements \ndoes UKCP18 deliver? \n\nUKCP18 will benefit from a range of developments \nsince the release of UKCP09, including: \n• Greater understanding of user needs as a result \nof the adaptation community’s use of UKCP09 \nprojections and the subsequent feedback – user \nworkshops indicated that users supported the \ncontinued use of probabilistic projections and the \nimportance of spatially coherent information4. \n• Advances in climate models in recent years, such \nas the Met Office Hadley Centre HadGEM35 model \nand the CMIP56 set of models. Improvements \ninclude better representation of the past \nclimate, the inclusion of more cloud and aerosol \nprocesses and the ability to model important \nclimate phenomena such as the El-Niño Southern \nOscillation (ENSO). \n• Groundbreaking Met Office research on \nmodelling of extreme events in high resolution \nregional climate models7. \n• The increased quantity and range of observations \navailable since 2009. \n• Use of the new Met Office supercomputer, \nenabling a credible range of climate projections to \nbe generated in greater spatial detail. ", - "page_start": 1, - "page_end": 1, - "source_file": "legal1_opengouvernementlicense.pdf" + "text": "", + "page_start": 259, + "page_end": 259, + "source_file": "00-80T-80.pdf" }, { - "text": "What is UKCP18 \nand why do we need it? \n\nFollowing the historic Paris Agreement on Climate \nChange in December 2015, the Department of \nEnvironment, Food and Rural Affairs announced a \nmajor upgrade to the UK Climate Projections. \n\nThe UKCP18 project will build upon the current set \nof projections (UKCP09) to provide the most up-to- \ndate assessment of how the climate of the UK may \nchange over the 21st century. This information \nwill be essential to future Climate Change Risk \nAssessments1 and to equip the UK with information \nto help adapt to the challenges and opportunities of \nclimate change in line with the National Adaptation \nProgramme2. \n\nOrganisations and individual users will use UKCP18 \nto inform risk assessments and adaptation plans \nto ensure they are resilient to extreme weather \nand climate change. Some organisations will use \nUKCP18 in responding to the Adaptation Reporting \nPower3 for example. ", - "page_start": 1, - "page_end": 1, - "source_file": "legal1_opengouvernementlicense.pdf" + "text": "", + "page_start": 104, + "page_end": 104, + "source_file": "00-80T-80.pdf" }, { - "text": "The SSTs and SICs were taken from a subset of the CMIP5 transient projections performed with \nthe RCP8.5 scenario from 1979 to 2100—the CMIP5 members were selected as representative of a \nrange of outcomes for future climate change, including high and low climate sensitivity, different \nbiases in baseline precipitation climatology, and different global patterns of precipitation change. \nSpecific levels of global warming such as 1.5°C or 2°C were defined on the basis of the global \nmean temperature in the original CMIP5 projections. The time of reaching a specific level of global \nwarming, therefore, varied between ensemble members. The CMIP5 SSTs were not bias-corrected, \nwhich means that the results here may be sensitive to systematic errors arising from biases in the \npresent-day SST patterns. \n\nAtmospheric greenhouse gas concentrations were prescribed from the standard RCP8.5 \nconcentration scenario. Aerosol concentrations were calculated within the model, with aerosol \nemissions prescribed again from the standard RCP8.5 scenario. This means that the greenhouse \ngas and aerosol concentrations, and hence radiative forcing, were the same in all ensemble ", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed11.pdf" + "text": "", + "page_start": 259, + "page_end": 259, + "source_file": "00-80T-80.pdf" }, { - "text": "1 The 2008 Climate Change Act allows UK government to mandate or invite certain organisations to produce reports to assess the impacts of \nclimate change on their operations and present proposals for adaptation.**https://www.gov.uk/government/collections/climate-change-**\n**adaptationreporting-second-round-reports**\n2 Expected in 2018, the National Adaptation Programme will be supported by the Evidence Report of the Adaptation Sub-Committee of the \nCommittee on Climate Change (ASC):**https://www.theccc.org.uk/uk-climate-change-risk-assessment-2017/introduction-to-the-ccra/**\n3 Under the 2008 Climate Change Act, organisations are invited to produce Adaptation Reporting Power reports to assess the impacts of climate \nchange on their operations and present proposals for adaptation:**https://www.gov.uk/government/collections/climate-change-adaptation-**\n**reporting-second-round-reports**\n4 Spatial coherence means that climate projections can be compared between locations and aggregated over larger areas, enabling climate \nchange to be assessed consistently over larger study areas. \n5**http://www.metoffice.gov.uk/research/modelling-systems/unified-model/climate-models/hadgem3**\n6 Coupled model intercomparison project phase 5, see**http://cmip-pcmdi.llnl.gov/cmip5/**\n7 Kendon, E. J., Roberts, N. M., Senior, C. A. & Roberts, M. J. Realism of rainfall in a very high resolution regional climate model. J. Clim. 25, \n5791–5806 (2012)**http://journals.ametsoc.org/doi/abs/10.1175/JCLI-D-11-00562.1**", - "page_start": 1, - "page_end": 1, - "source_file": "legal1_opengouvernementlicense.pdf" + "text": "", + "page_start": 259, + "page_end": 259, + "source_file": "00-80T-80.pdf" }, { - "text": "The largest regional differences between 2°C and 1.5°C global warming tend to be in the \nregions where the local impact is largest relative to the baseline. For TXx this is generally the mid- \nlatitudes, whereas for TX90p it is generally the tropics. So, broadly, the impacts at 1.5°C global \nwarming could be estimated by scaling-back the impacts at 2°C. \n\nThese results show some similarities with those from the CMIP5 models [9,38], but also some \nnotable differences. The CMIP5 models were at lower spatial resolution than the models used \nhere. Although the general patterns of change in TXx are broadly similar in our study and \nCMIP5, with greater warming in many continental interiors, is notable that our results show more \nmarked geographical variation than those from CMIP5 projections ([9], among others), with the \ncontinental interior warming being more intense in our projections. In particular, our results with \nHadGEM3 show more intense increases in maximum temperature in North America and Europe. \nOur projections of changes in consecutive dry days (CDD) broadly consistent with those found \nin a subset of the CMIP5 ensemble [9], although there are some differences. Our ensemble mean \nsuggests shorter dry spells in the central Amazon, whereas ISIMIP-indicated longer dry spells. \nAlso, as with the temperature indices, our results show greater geographical differentiation in the \nintensity of changes. ", - "page_start": 23, - "page_end": 23, - "source_file": "pubmed11.pdf" + "text": "", + "page_start": 259, + "page_end": 259, + "source_file": "00-80T-80.pdf" }, { - "text": "What can users expect from UKCP18? \n\nThere are three components to UKCP18: observations of historic climate, marine projections and projections over land. \nThese components are described below and summarised in Table 1. UKCP18 will provide each of these components at \na higher spatial and temporal resolution than UKCP09 and with more information on different types of uncertainty. ", - "page_start": 2, - "page_end": 2, - "source_file": "legal1_opengouvernementlicense.pdf" + "text": "", + "page_start": 259, + "page_end": 259, + "source_file": "00-80T-80.pdf" }, { - "text": "**Figure 6.**Simulated changes in the average length of flood events (number of days in which the cumulative daily rainfall excess \nis positive, compared with the 95th percentile in 1981–2010, at 2°C global warming, for individual HadGEM3 simulations driven \nby SSTs and SICs from different members of the CMIP5 ensemble, and the ensemble mean. The labels above each panel identify \nthe driving CMIP5 model (or ensemble mean). ", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed11.pdf" + "text": "", + "page_start": 259, + "page_end": 259, + "source_file": "00-80T-80.pdf" } ] }, @@ -3639,70 +3639,70 @@ "target_page": 2, "target_passage": "Sea-level rise projections will extend to 2100 and will include contributions from glaciers, ice sheets, freshwater reservoirs, groundwater and thermal expansion", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 217, + "page_end": 217, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**MARINE PROJECTIONS**\n**Sea level rise. Storm surge. Past event case studies.**\n\nSea-level rise projections will extend to 2100 and will include contributions from glaciers, \nice sheets, freshwater reservoirs, groundwater and thermal expansion. Outputs will include \nan estimate of the year-to-year changes in sea level rise and a “plausible but highly unlikely” \nscenario known as H++. A new feature of UKCP18 will be assessing the credibility of making \nsea level rise projections to 2300. The projections will use the latest information from the \nCMIP5 models and application of the methods used in the Intergovernmental Panel on \nClimate Change’s (IPCC) Fifth Assessment Report10. \n\nThe UKCP09 storm surge projections will be updated to provide new estimates of the change \nin high water levels over the 21st Century. These estimates will be based on a combination of \nprojected mean sea level change and projections of change in the extremes due to changes in \natmospheric storminess. These “storminess” projections will use the same surge model used \nin operational weather forecasting, using the wind and pressure from the CMIP5 ensemble to \ndrive the surge. New understanding of the modification of large-scale sea level change signals \nas they pass from the open ocean onto the shelf sea around the UK will be incorporated into \nthe UKCP18 marine projections. UKCP18 will also include storm surge historical case studies \nderived from applying plausible future sea level change to historical extreme events. ", - "page_start": 2, - "page_end": 2, - "source_file": "legal1_opengouvernementlicense.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\nSEA \nLEVEL’ \n0 ", - "page_start": 138, - "page_end": 138, - "source_file": "00-80T-80.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\nSEA.LEVEL ", - "page_start": 189, - "page_end": 189, - "source_file": "00-80T-80.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "What can users expect from UKCP18? \n\nThere are three components to UKCP18: observations of historic climate, marine projections and projections over land. \nThese components are described below and summarised in Table 1. UKCP18 will provide each of these components at \na higher spatial and temporal resolution than UKCP09 and with more information on different types of uncertainty. ", - "page_start": 2, - "page_end": 2, - "source_file": "legal1_opengouvernementlicense.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "What is UKCP18 \nand why do we need it? \n\nFollowing the historic Paris Agreement on Climate \nChange in December 2015, the Department of \nEnvironment, Food and Rural Affairs announced a \nmajor upgrade to the UK Climate Projections. \n\nThe UKCP18 project will build upon the current set \nof projections (UKCP09) to provide the most up-to- \ndate assessment of how the climate of the UK may \nchange over the 21st century. This information \nwill be essential to future Climate Change Risk \nAssessments1 and to equip the UK with information \nto help adapt to the challenges and opportunities of \nclimate change in line with the National Adaptation \nProgramme2. \n\nOrganisations and individual users will use UKCP18 \nto inform risk assessments and adaptation plans \nto ensure they are resilient to extreme weather \nand climate change. Some organisations will use \nUKCP18 in responding to the Adaptation Reporting \nPower3 for example. ", - "page_start": 1, - "page_end": 1, - "source_file": "legal1_opengouvernementlicense.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\nSTAGNATION \nTEMPERATURE \nAT \nSEA LEVEL ", - "page_start": 259, - "page_end": 259, - "source_file": "00-80T-80.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\nthe temperature rise of ", - "page_start": 260, - "page_end": 260, - "source_file": "00-80T-80.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\nPRESSURE RISE \nLIMITED BY ", - "page_start": 144, - "page_end": 144, - "source_file": "00-80T-80.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" } ] }, @@ -3719,64 +3719,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 144, + "page_end": 144, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "What can users expect from UKCP18? \n\nThere are three components to UKCP18: observations of historic climate, marine projections and projections over land. \nThese components are described below and summarised in Table 1. UKCP18 will provide each of these components at \na higher spatial and temporal resolution than UKCP09 and with more information on different types of uncertainty. ", - "page_start": 2, - "page_end": 2, - "source_file": "legal1_opengouvernementlicense.pdf" + "text": "", + "page_start": 8, + "page_end": 8, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "What improvements \ndoes UKCP18 deliver? \n\nUKCP18 will benefit from a range of developments \nsince the release of UKCP09, including: \n• Greater understanding of user needs as a result \nof the adaptation community’s use of UKCP09 \nprojections and the subsequent feedback – user \nworkshops indicated that users supported the \ncontinued use of probabilistic projections and the \nimportance of spatially coherent information4. \n• Advances in climate models in recent years, such \nas the Met Office Hadley Centre HadGEM35 model \nand the CMIP56 set of models. Improvements \ninclude better representation of the past \nclimate, the inclusion of more cloud and aerosol \nprocesses and the ability to model important \nclimate phenomena such as the El-Niño Southern \nOscillation (ENSO). \n• Groundbreaking Met Office research on \nmodelling of extreme events in high resolution \nregional climate models7. \n• The increased quantity and range of observations \navailable since 2009. \n• Use of the new Met Office supercomputer, \nenabling a credible range of climate projections to \nbe generated in greater spatial detail. ", - "page_start": 1, - "page_end": 1, - "source_file": "legal1_opengouvernementlicense.pdf" + "text": "", + "page_start": 8, + "page_end": 8, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "Depending on the data that you are working with, consider these options: \n\n(cid:2) For Line Data: \n\n– The line data applet supports annotations. It can work with large object (LOB) reports if \nthe large object functionality is employed at load time. \n\n– The Ajax viewer and direct rendering capabilities of Content Navigator work only on \n\nshorter reports. Additionally, the viewing of annotations and large object documents is \nnot supported. \n\n(cid:2) For AFP data: \n\n– The AFP plug-in is the best choice, because it is almost identical to the client. However, \nit does not support annotations. \n\nThe only viewers that use this functionality are the line data applet, the AFP plug-in \nviewer, and the Content Manager OnDemand Windows client. \n\n– AFP to PDF is a choice that does not require a plug-in rollout at the users’ computers if \n\nthe Acrobat plug-in is installed on their workstations. Font mappings must be \nconfigured at a central location. The additional workload on a rendering system and \nadditional license costs must be considered. Large reports might not be able to be \nrendered or viewed. \n\n**Note:**The AFP viewer plug-in, which is available with ODWEK and Content \nManager OnDemand, is a version of the AFP viewer plug-in from the InfoPrint \nSolutions Company. Although the standard InfoPrint viewer can be used for viewing \nAFP, the ODWEK version uses direct communication with the Content Manager \nOnDemand server, enabling segmented document transfer for LOB documents. ", - "page_start": 213, - "page_end": 213, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 176, + "page_end": 176, + "source_file": "00-80T-80.pdf" }, { - "text": "What is UKCP18 \nand why do we need it? \n\nFollowing the historic Paris Agreement on Climate \nChange in December 2015, the Department of \nEnvironment, Food and Rural Affairs announced a \nmajor upgrade to the UK Climate Projections. \n\nThe UKCP18 project will build upon the current set \nof projections (UKCP09) to provide the most up-to- \ndate assessment of how the climate of the UK may \nchange over the 21st century. This information \nwill be essential to future Climate Change Risk \nAssessments1 and to equip the UK with information \nto help adapt to the challenges and opportunities of \nclimate change in line with the National Adaptation \nProgramme2. \n\nOrganisations and individual users will use UKCP18 \nto inform risk assessments and adaptation plans \nto ensure they are resilient to extreme weather \nand climate change. Some organisations will use \nUKCP18 in responding to the Adaptation Reporting \nPower3 for example. ", - "page_start": 1, - "page_end": 1, - "source_file": "legal1_opengouvernementlicense.pdf" + "text": "", + "page_start": 8, + "page_end": 8, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "**DOWNSCALED HIGH RESOLUTION PROJECTIONS**\n**Downscaled versions of the global model for the UK. For the most spatially**\n**detailed downscaling this includes hourly data. Simultaneous impacts captured**\n**at multiple UK locations.**\n\nThe high resolution projections will provide information on types of weather of relevance \nto adaptation at two different resolutions. The 12 km model provides a downscaled \nproduct that is similar to UKCP09’s 25 km simulations but driven by an improved global \nmodel and at a higher resolution. This may be especially useful for those interested in \nwater availability and some aspects of agriculture. A key reason for providing this data is \nthat users will be able to compare it directly with EURO-CORDEX13. \nThe global projections will also be downscaled to 2.2 km using a process of nesting \nmodels at finer resolution that maintains the integrity of the representation of evolving \natmospheric processes. Key benefits of simulations at this resolution will be the \ninformation provided on high impact events such as localised heavy rainfall in summer and \npotential improvements in the diurnal cycle. \nThe output will be available at a time resolution of 3-hourly, possibly higher for some \noutput, for a high emission scenario. Spatial coherence will be maintained. Specific time \nslices (e.g. 2061-2080) will be made available with the exact nature of these still to be \nconfirmed. ", - "page_start": 3, - "page_end": 3, - "source_file": "legal1_opengouvernementlicense.pdf" + "text": "", + "page_start": 8, + "page_end": 8, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "**60KM GLOBAL PROJECTIONS**\n**20 plausible climate futures. Latest Hadley Centre climate model. Simulations**\n**of extreme weather. Simultaneous impacts captured at multiple locations.**\n\nThis resolution will enable more realistic simulations of climate for the UK and capture the \ndrivers of extreme weather, a significant advance on the 300 km-resolution simulations of \nUKCP09. A set of 20 plausible global projections of 21st century climate will be generated \nusing an ensemble of the Met Office Hadley Centre HadGEM3 climate model. These \nprojections will be selected to represent a wide range of possible future climate states \nto reflect key uncertainties, informing a risk-based approach to planning. They will be \ngenerated to provide spatially coherent daily data at a horizontal resolution of 60 km for \ntwo greenhouse gas concentration scenarios. These will be compared with an ensemble of \nCMIP5 models to provide additional information on uncertainties in the projections relative \nto other climate models. \n\n**25KM PROBABILISTIC PROJECTIONS**\n**Captures natural variability and climate change . Updated models and**\n**observations. Provides seasonal scale projections.**\n\nBased on the established, peer-reviewed, ground-breaking method of UKCP09 for \nestimating uncertainty for use in risk-based analysis. Probabilistic projections will be \nupdated using an up-to-date collection of Met Office climate simulations and the latest \nIPCC-assessed simulations to estimate the model uncertainties, incorporate the latest \nobservations and estimate carbon cycle feedbacks. Projections will be on a 25 km grid for \nthe UK at monthly intervals for several emission scenarios, including one used in UKCP0911. \nThe new probabilistic projections will indicate the range of uncertainty in our knowledge \nof the climate system and natural variability through the 21st century, using probability \ndensity functions to provide information on how climate varies from month to month. This \ncontrasts with UKCP09 for which only 30-year means were provided12. ", - "page_start": 3, - "page_end": 3, - "source_file": "legal1_opengouvernementlicense.pdf" + "text": "", + "page_start": 8, + "page_end": 8, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "Before Content Manager OnDemand version 9.5, PDF documents can be viewed by the \nWindows client in two ways: \n\n(cid:2) If they are configured in the application as data type “PDF”, the rich feature set of the AFP \nand Line Data viewer applies, but Adobe Acrobat Professional is required. \n\n(cid:2) If the data type is configured as “User Defined” and “.pdf” as the extension, the \n\ndocuments are started externally. Therefore, you can view the documents with the \nno-charge Adobe Acrobat viewer or any other installed PDF viewer. \n\nAny data type can be specified as “User Defined”, for example, Word documents (.docx). \nUser-defined data is viewed by invoking its associated application. \n\n**Web-based viewing options**\nThe web-based viewing options for Content Manager OnDemand are provided primarily by \nODWEK. ODWEK includes different viewers that are dedicated to Content Manager \nOnDemand documents that can use Content Manager OnDemand functions, such as the \nsegment-wise retrieval of large objects or annotations. These viewers are used in web \napplications, such as Content Navigator or any other custom-developed web client: \n\n(cid:2) Line Data applet \n(cid:2) Browser plug-in for image viewing \n(cid:2) AFP browser plug-in \n(cid:2) AFP Transforms \n(cid:2) Generic Transforms ", - "page_start": 211, - "page_end": 211, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 177, + "page_end": 177, + "source_file": "00-80T-80.pdf" }, { - "text": "UN Food and Agriculture Organization, UN Development Programme and UN Population \nFund [22]. The exposure component comprised proxies for the average length of flood and \ndrought events calculated with daily precipitation data [23] (table 2). These proxies were chosen \nabove other possible metrics as they were required to replace self-reported instances of flood \nand drought events used in the original HCVI, which correlate with undernutrition data at the \ncountry-level [23]. The proxies were therefore masked to only include data where a significant \nproportion of people live and grow crops before aggregating to country level and combining to \ncomprise a measure of exposure [23]; nevertheless, it is recognized that precipitation data alone \nmay not always be adequate for representing flood and drought events, so the current method is \nregarded as preliminary. \n\nThe impacts of projected climate change, therefore, act through changes in these quantities. In \nthe current version of the HCVI, climate-change impacts on other quantities such as crop yield \nare not considered. Socio-economic factors affecting sensitivity and adaptive capacity are fixed at \npresent-day conditions. \n\nThe ensemble-mean baseline HCVI calculated with the high-resolution bias-corrected \nHadGEM3 ensemble is shown in figure 1. The spatial pattern is compatible with HCVI values \ncalculated using reanalysis data at the CMIP5 grid-scale resolution [23]; the most vulnerable \nregions are sub-Saharan Africa and South Asia. This higher-resolution climate data enables \ninclusion of additional countries which were not resolved in the lower-resolution CMIP5 data. ", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed11.pdf" + "text": "", + "page_start": 177, + "page_end": 177, + "source_file": "00-80T-80.pdf" } ] }, @@ -3787,70 +3787,70 @@ "target_page": 2, "target_passage": "The Syntec French collective bargaining agree- ment comprises around 90 articles", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 345, + "page_end": 345, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 330, + "page_end": 330, + "source_file": "00-80T-80.pdf" }, { - "text": "3.1.1 Syntec (Retrieval) \n\nThe Syntec French collective bargaining agree- \nment3 comprises around 90 articles. Despite its \ntopic, the language used does not feature the speci- \nficity of the legal vocabulary, making the data \nsuitable for benchmarking general-purpose mod- \nels. The articles have been scraped for use as doc- \numents. Four annotators were divided into two \ngroups. Each group was given half of the articles \nand asked to choose an article and write a question \nabout it. Each annotator wrote 25 questions. Thus, \na hundred questions have been manually created \nand paired with the articles containing the answer4. \nExamples of the dataset are available in the ap- \npendix Figure 5. This dataset could also be used \nfor text classification, clustering or topic modeling. \nRegarding quality checks, every article’s integrity \nhas been reviewed while manually creating ques- \ntions. We also manually checked that the questions \ncould only be answered using the annotated article. \n\n3 MTEB for French \n\nIn this section, we describe the datasets and the \nmodels that we propose for the French extension \nof MTEB. We also list the research questions we \nwant to discuss with the results. ", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv4.pdf" + "text": "", + "page_start": 331, + "page_end": 331, + "source_file": "00-80T-80.pdf" }, { - "text": "Syntec \n100 queries \n90 documents \n\nSummEvalFr \n100 texts \n1100 human summaries \n1600 machine summaries \nTranslation from English \nto French with Deepl of \nthe SummEval dataset. \n\nScraping of Syntec col- \nlective bargaining agree- \nment with articles as doc- \numents. Writing queries \ncorresponding to articles. \n\nScraping of HAL arti- \ncles with id, title and do- \nmain. Further cleaning \nwith deduplication, \nlan- \nguage filtering and class \nsubsampling. \nAnnotations provided by \nauthors when submitting \ntheir paper. They choose \nthe domain between exist- \ning academic fields. \n\n4 annotators divided into \n2 groups. Each group was \ngiven half of the articles \nand asked to choose an ar- \nticle and ask a question \nabout it. Each annotator \nwrote 25 questions. \nHuman verification of an- \nnotations. \n\nDetailed annotation pro- \ncess provided in Fabbri \net al. (2021). \n\nBaseline models for clas- \nsification and topic model- \ning. \n\nbetween \nCorrelation \nROUGE \nBLEU and \nscores of \nthe French \nand the original English \ndatasets. LLM as-a-judge \ntranslation \nand \nrating \nhuman verification. ", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv4.pdf" + "text": "", + "page_start": 331, + "page_end": 331, + "source_file": "00-80T-80.pdf" }, { - "text": "• Duplicates are eliminated, retaining unique \n\npublications for each field. \n\n• Irrelevant titles (due to API indexing mistakes) \nor titles in languages other than French have \nbeen manually removed. \n(Adelani et al., 2023) \n\n3https://www.syntec.fr/convention-collective/ \n4https://huggingface.co/datasets/lyon-nlp/ \nmteb-fr-retrieval-syntec-s2p \n5https://huggingface.co/datasets/lyon-nlp/ \n2Models on the HuggingFace hub: sentence-camebert, \nsentence_croissant_alpha_v0.3, Solon-embeddings-large-0.1. \nclustering-hal-s2s \n\n2 ", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv4.pdf" + "text": "", + "page_start": 331, + "page_end": 331, + "source_file": "00-80T-80.pdf" }, { - "text": "Contents \n\nConsolidated Five-Year Summary 70 \n\nBusiness and Other Risks 71 \n\nConsolidated Balance Sheets 72 \n\nConsolidated Statements of Income 74 \n\nConsolidated Statements of Shareholders’ Equity 75 \n\nConsolidated Statements of Cash Flows 76 \n\nNotes to Consolidated Financial Statements 77 \n\nReport of Independent Auditors 104 \n\nNon-consolidated Five-Year Summary 105 ", - "page_start": 71, - "page_end": 71, - "source_file": "OTC_NSANY_2004.pdf" + "text": "", + "page_start": 331, + "page_end": 331, + "source_file": "00-80T-80.pdf" }, { - "text": "| | Document |\n|---|---|\n| id | article-14 |\n| url | https://www.syntec.fr/convention- collective/resiliation-du-contrat- de-travail/#article-14 |\n| title | Article 14 : Préavis pendant la péri- ode d’essai |\n| section | Résiliation du contrat de travail |\n| content | Modification Avenant n° 7 du 5/07/1991 Au cours de cette péri- ode, les deux parties peuvent se sé- parer avec un préavis d’une journée de travail pendant le premier mois. Après le premier mois, le temps de préavis réciproque sera d’une semaine par mois complet passé dans l’entreprise. Après le pre- mier mois, le temps de préavis ré- ciproque sera d’une semaine par mois passé dans l’entreprise. Le préavis donne droit au salarié de s’absenter pour la recherche d’un emploi dans les conditions fixées à l’article 16. Le salarié sera payé au prorata du temps passé pendant la période d’essai. |\n\n\n| | Query |\n|---|---|\n| article | article-14 |\n| question | Quel est le préavis en période d’essai ? |\n", - "page_start": 15, - "page_end": 15, - "source_file": "arxiv4.pdf" + "text": "", + "page_start": 331, + "page_end": 331, + "source_file": "00-80T-80.pdf" }, { - "text": "• Economic developments, particularly the dominance of neoliberalist policies and enhanced \ncompetition between workers, companies and states; reduction of state influence and \nprivatisation.41 \n\n• Pressure due to substantial organisational changes, for example, introduction of short-term \neconomic objectives in enterprise policies, 42 expansion into new markets or new countries, \nacquiring other enterprises or merging, being acquired, restructuring of management or of basic \nstaff working conditions (contracts, working time, flexibility).43 \n\n• Decrease of trade union influence or worker participation regarding labour relations. \n• Liberalisation of labour legislation, creation of ‘new forms of work’ and new contract types, \nbeyond the permanent full-time employment.44 \n\n• New forms of management, application of management concepts like just-in-time production or \nlean management, higher flexibility of production and higher customer orientation, 45 \n\nEuropean Agency for Safety and Health at Work – EU-OSHA \n36 ", - "page_start": 36, - "page_end": 36, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 330, + "page_end": 330, + "source_file": "00-80T-80.pdf" }, { - "text": "5.1.3. Discourse Structure \n\nIn the discourse surrounding #climatechange, “environment”, “energy”, and “global action” \nrepresented the themes of the three largest clusters in the network. However, three popularly recurring \nhashtags, “#environment”, “#energy”, and “#climateaction”, did not belong to any of the three clusters \nabove, but formed another small tight cluster together, sitting in the most central part of the semantic \nnetwork, as shown in Figure 2b. As each of the three hashtags can almost represent one sub-theme of \nthe climate change topic and these three hashtags were tightly bundled might indicate an attempt by \n#climatechange users to address all three communities together [91], consolidating climate change as \na topic rather than a loosely organized topic. Previous communication studies also confirmed hashtags’ \nfunction of serving as a hybrid forum [68], where heterogeneous individuals coordinate to solve ", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 330, + "page_end": 330, + "source_file": "00-80T-80.pdf" }, { - "text": "The datasets correlation w.r.t model ranking are \npresented in appendix Figure 12. Except for \ntwo datasets (MasakhaNEWSClusteringP2P, Sum- \nmEvalFr), the correlations, on average, are high. \nThere is still enough diversity to make each dataset \ninteresting for the French MTEB benchmark. Two \ngroups (SyntecReranking/ SyntecRetrieval, Mas- \nsiveScenarioClassification/ MTOPDomainClassi- \nfication/ MassiveIntentClassification) exhibit no- \ntably high correlations (∼0.97). It is interesting \nto point out some sub-diagonal correlation blocks. \nThe datasets being arranged by task indicate that \nmodels behave slightly more similarly within the \nsame task than between two different tasks. This \nunderscores the importance of having multiple \ntasks in the benchmark to select general-purpose \nmodels. For readers interested in specific tasks, \nit is more relevant to examine task-specific rank- \nings rather than the overall one. The complemen- \ntary results of model correlations w.r.t to strengths \nand weaknesses on datasets are displayed in ap- \npendix Figure 11. Strong correlations in behavior \nemerge among the variants of the same models \n(e.g. DistilBERT, sentence-croissant, sentence-t5, \ne5, etc.). Correlations are also generally observed \namong numerous models trained using the sentence \ntransformers framework (Reimers and Gurevych, \n2019), as well as proprietary models, e.g. from \nCohere and OpenAI. Conversely, these models fine- \ntuned for sentence similarity, show minimal cor- \nrelation with pre-trained models for which token- \nembedding pooling techniques are employed. ", - "page_start": 8, - "page_end": 8, - "source_file": "arxiv4.pdf" + "text": "", + "page_start": 330, + "page_end": 330, + "source_file": "00-80T-80.pdf" } ] }, @@ -3861,70 +3861,70 @@ "target_page": 3, "target_passage": "Hyper Articles en Ligne (HAL) is a French open archive of scholarly documents from all academic fields.", "chunk_present": { - "presence": true, - "index": 8 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 289, + "page_end": 289, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 385, + "page_end": 385, + "source_file": "00-80T-80.pdf" }, { - "text": "**Market Intelligence**\n\nA S A K O H O S H I N O \nVice President \n\n“Why does a company conduct market research on \n\nconsumers? It is not just about asking the customer \n\nif they prefer A or B, which is often what managers \n\nwant to know. Accumulating knowledge on consumer \n\nbehavior and emerging trends is how you come up \n\nwith ideas that are truly focused on the customer. \n\nOur aim is to gain the deepest understanding of the \n\ncustomer possible, and use that insight to identify \n\nfuture trends. \n\nThe Market Intelligence department is relatively \n\nnew, formed by combining the research functions \n\nonce carried out separately by various divisions. \n\nThe merger and our independent status have brought \n\nseveral practical benefits. We now have uniform \n\nprocedures for conducting research, better research \n\nmethodologies, and greater objectivity in the \n\ninterpretation of the data. Today, we’re a team of \n\nexperts in this field, not simply coordinators between \n\nresearch organizations and the decision makers. \n\nWe are often benchmarked by other industries. ", - "page_start": 42, - "page_end": 42, - "source_file": "OTC_NSANY_2004.pdf" + "text": "", + "page_start": 331, + "page_end": 331, + "source_file": "sg246915.pdf" }, { - "text": "The uses most relevant to this paper are those enabled by what HathiTrust refers to today as \nthe Research Center. The Center grew in part out of a research discipline called “digital \nhumanities,” which, among other things, seeks to use computational resources or other \ndigital technologies to analyze information and contribute to the study of literature, media, \nhistory, and other areas. For instance, imagine you want to understand how a given term \n(e.g., “war on drugs”) became used; one might seek to analyze when the term was first used \nand how often it was used over time by analyzing a vast quantity of sources, searching out \nthe term’s use. The insight here is that there is much to be learned not just from reading or \notherwise consuming specific material, but also from “non-consumptive research,” or \n\"research in which computational analysis is performed on one or more volumes (textual or \nimage objects)\" to derive other sorts of insights. AI training is a type of non-consumptive use. \n\nToday, the Center “[s]upports large-scale computational analysis of the works in the \nHathiTrust Digital Library to facilitate non-profit and educational research.” It includes over 18 \nmillion books in over 400 languages from the HathiTrust Digital Library collection. Roughly \n58% of the corpus is in copyright. HathiTrust notes that, while this corpus is large, it has \nlimitations in terms of its representation across subject matter, language, geography, and \nother dimensions. In terms of subject matter, the corpus is skewed towards humanities \n(64.9%) and social sciences (14.3%). In terms of language, 51% of the books are in English, ", - "page_start": 15, - "page_end": 15, - "source_file": "creative_common_ai.pdf" + "text": "", + "page_start": 331, + "page_end": 331, + "source_file": "sg246915.pdf" }, { - "text": "inference time. \nLearning what happens at \nMost BERT analysis papers focus on different \nprobes of the model, with the goal to find what \nthe language model \"knows\". However, probing \nstudies have limitations (subsection 3.4), and to this \npoint, far fewer papers have focused on discovering \nwhat knowledge actually gets used. Several promis- \ning directions are the \"amnesic probing\" (Elazar \net al., 2020), identifying features important for pre- \ndiction for a given task (Arkhangelskaia and Dutta, \n2019), and pruning the model to remove the non- \nimportant components (Voita et al., 2019b; Michel \net al., 2019; Prasanna et al., 2020). \n\n7 Directions for further research \n\nBERTology has clearly come a long way, but it \nis fair to say we still have more questions than \nanswers about how BERT works. In this section, \nwe list what we believe to be the most promising \ndirections for further research. \n\nBenchmarks that require verbal reasoning. \nWhile BERT enabled breakthroughs on many NLP \nbenchmarks, a growing list of analysis papers are \nshowing that its language skills are not as impres- \nsive as it seems. In particular, it was shown to rely \non shallow heuristics in natural language inference \n(McCoy et al., 2019b; Zellers et al., 2019; Jin et al., \n2020), reading comprehension (Si et al., 2019a; \nRogers et al., 2020; Sugawara et al., 2020; Si et al., \n2019b; Yogatama et al., 2019), argument reason- \ning comprehension (Niven and Kao, 2019), and \ntext classification (Jin et al., 2020). Such heuristics \ncan even be used to reconstruct a non-publicly- \navailable model (Krishna et al., 2020). As with \nany optimization method, if there is a shortcut in \n\n8 Conclusion ", - "page_start": 12, - "page_end": 12, - "source_file": "arxiv2_taclccby4_license.pdf" + "text": "", + "page_start": 331, + "page_end": 331, + "source_file": "sg246915.pdf" }, { - "text": "Acknowledgments \ninstitutional requirements. The participants provided their written \ninformed consent to participate in this study. \n\nThe authors would like to thank the participants in this study \nand the user representatives from Nordland MS Association for \ntheir valuable contributions. The authors also acknowledge \nphilosopher of \nthe mind and cognitive sciences Hanne De \nJaegher for the valuable comments on the interpretations and \ndiscussions of the results. \n\nAuthor contributions \n\ncuration, Formal Analysis, \nInvestigation, Methodology, Project administration, Resources, \nVisualization, Writing – original draft, Writing – review & \nediting. EA: Conceptualization, Formal Analysis, Methodology, \nSupervision, Writing – review & editing. BN: Conceptualization, \nFormal Analysis, Funding acquisition, Methodology, Project \nadministration, Resources, Supervision, Writing – review & editing. \n\nSD: Conceptualization, Data \n\nConflict of interest \n\nThe authors declare that the research was conducted in the \nabsence of any commercial or financial relationships that could \nbe construed as a potential conflict of interest. \n\nFunding \n\nPublisher’s note \n\nThe author(s) declare that financial support was received for \n\nthe research, authorship, and/or publication of this article. \n\nAll claims expressed in this article are solely those of the authors \nand do not necessarily represent those of their affiliated organizations, \nor those of the publisher, the editors and the reviewers. Any product \nthat may be evaluated in this article, or claim that may be made by its \nmanufacturer, is not guaranteed or endorsed by the publisher. The development of the CoreDISTparticipation and the RCT is \nfunded by the Northern Norway Health Authority (Helse Nord \nRHF). This interview study was funded by Nord University \n(PhD salary). ", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed13.pdf" + "text": "", + "page_start": 384, + "page_end": 384, + "source_file": "00-80T-80.pdf" }, { - "text": "***Acknowledgements***\n\nAuthored by Alek Tarkowski and Paul Keller (Open Future), Derek Slater and Betsy Masiello \n(Proteus Strategies) in collaboration with Creative Commons. \n\nWe are grateful to participants in the workshops, including Luis Villa, Tidelift and openml.fyi; \nJonathan Band; Peter Brantley, UC Davis; Aaron Gokaslan, Cornell; Lila Bailey, Internet \nArchive; Jennifer Vinopal, HathiTrust Digital Library; Jennie Rose Halperin, Library Futures/ \nNYU Engelberg Center, Nicholas P. Garcia, Public Knowledge; Sayeed Choudhury; Erik \nStallman, UC Berkeley School of Law. The paper represents the views of the authors, \nhowever, and should not be attributed to the workshop as a whole. All mistakes or errors are \nthe authors’. \n\nThis report is published under the terms of the Creative Commons Attribution \nLicense. ", - "page_start": 22, - "page_end": 22, - "source_file": "creative_common_ai.pdf" + "text": "", + "page_start": 384, + "page_end": 384, + "source_file": "00-80T-80.pdf" }, { - "text": "Abstract \n\nTransformer-based models have pushed state \nof the art in many areas of NLP, but our un- \nderstanding of what is behind their success \nis still limited. This paper is the first sur- \nvey of over 150 studies of the popular BERT \nmodel. We review the current state of knowl- \nedge about how BERT works, what kind \nof information it learns and how it is repre- \nsented, common modifications to its training \nobjectives and architecture, the overparame- \nterization issue and approaches to compres- \nsion. We then outline directions for future \nresearch. ", - "page_start": 1, - "page_end": 1, - "source_file": "arxiv2_taclccby4_license.pdf" + "text": "", + "page_start": 384, + "page_end": 384, + "source_file": "00-80T-80.pdf" }, { - "text": "3.1.2 HAL (Clustering) \n\nHyper Articles en Ligne (HAL) is a French open \narchive of scholarly documents from all academic \nfields. Scrapping this resource, we fetched 85,000 \npublications in French5. We extracted IDs, titles \nand the author’s choice among domain labels. The \nlast 2 are provided by authors when submitting \ntheir papers to HAL. Since domain annotations are \nprovided, the dataset can be used for many tasks, \nsuch as topic modeling or text classification. To en- \nsure the dataset quality is suitable for a benchmark, \nfurther data cleaning has been performed: \n\n3.1 New Datasets \n\nWe identified 7 datasets relevant to French in the ex- \nisting MTEB, which we assume are of good quality. \nWe complemented these with 8 external relevant \ndatasets proposed in the literature, such as BSARD \n(Louis and Spanakis, 2022) and Alloprof (Lefebvre- \nBrossard et al., 2023), which are proven to be good \nquality. We created 3 new ones presented in Table 1 \nand assessed their quality with various procedures \nand metrics. In addition to all performed checks, \nwe run multiple models on these datasets and pro- \nvide results to show that they are neither trivial nor \nimpossible to solve (see Tables 10, 11, 12 and 13). \nTherefore, as of today, our French MTEB \nruns on 18 datasets. Some datasets are framed \ndifferently according to the task category they \nare used with. For example, MasakhaNEWS \ndataset \nis used for \nboth Classification (MasakhaNEWSClassification) \nand Clustering (MasakhaNEWSClusteringS2S and ", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv4.pdf" + "text": "", + "page_start": 384, + "page_end": 384, + "source_file": "00-80T-80.pdf" }, { - "text": "Haack, Susan (1978). \"1. 'Philosophy of logics' \".*Philosophy of Logics*(https://philpapers.or \ng/rec/HAAPOL-2). London and New York: Cambridge University Press. pp. 1–10. ISBN 978- \n0-521-29329-7. Archived (https://web.archive.org/web/20211207200551/https://philpapers.o \nrg/rec/HAAPOL-2) from the original on 7 December 2021. Retrieved 29 December 2021. \nHaack, Susan (1996).*Deviant Logic, Fuzzy Logic: Beyond the Formalism*. University of \nChicago Press. ISBN 978-0-226-31133-3. \nHaaparanta, Leila (2009). \"1. Introduction\".*The Development of Modern Logic*. Oxford \nUniversity Press. pp. 4–6. ISBN 978-0-19-513731-6. \nHansen, Hans (2020). \"Fallacies\" (https://plato.stanford.edu/entries/fallacies/).*The Stanford*\n*Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford University. Archived (http \ns://web.archive.org/web/20210329182946/https://plato.stanford.edu/entries/fallacies/) from \nthe original on 29 March 2021. Retrieved 18 March 2021. \nHartmann, Stephan; Sprenger, Jan (2010). \"Bayesian Epistemology\".*The Routledge*\n*Companion to Epistemology*(https://philpapers.org/rec/BOVSIO). London: Routledge. \npp. 609–620. ISBN 978-0-415-96219-3. Archived (https://web.archive.org/web/2021051609 \n5047/https://philpapers.org/rec/BOVSIO) from the original on 16 May 2021. Retrieved \n4 January 2022. \nHasse, Dag Nikolaus (2008). \"Influence of Arabic and Islamic Philosophy on the Latin West\" \n(https://plato.stanford.edu/entries/arabic-islamic-influence/).*The Stanford Encyclopedia of*\n*Philosophy*. Metaphysics Research Lab, Stanford University. Retrieved 19 July 2023. \nHawthorne, James (2021). \"Inductive Logic\" (https://plato.stanford.edu/entries/logic-inductiv \ne/).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford \nUniversity. Archived (https://web.archive.org/web/20220121081805/https://plato.stanford.ed \nu/entries/logic-inductive/) from the original on 21 January 2022. Retrieved 6 January 2022. \nHintikka, Jaakko J. (2019). \"Philosophy of logic\" (https://www.britannica.com/topic/philosoph \ny-of-logic).*Encyclopædia Britannica*. Archived (https://web.archive.org/web/2015042810173 \n2/http://www.britannica.com/EBchecked/topic/346240/philosophy-of-logic) from the original \non 28 April 2015. Retrieved 21 November 2021. \nHintikka, Jaakko J. (2023). \"Logical systems\" (https://www.britannica.com/topic/logic/Logical \n-systems).*Encyclopædia Britannica*. Archived (https://web.archive.org/web/2021120718465 \n6/https://www.britannica.com/topic/logic/Logical-systems) from the original on 7 December \n2021. Retrieved 4 December 2021. \nHintikka, Jaakko (1970). \"Information, Deduction, and the A Priori\".*Noûs*.**4**(2): 135–152. \ndoi:10.2307/2214318 (https://doi.org/10.2307%2F2214318). ISSN 0029-4624 (https://searc \nh.worldcat.org/issn/0029-4624). JSTOR 2214318 (https://www.jstor.org/stable/2214318). \nHintikka, Jaakko; Sandu, Gabriel (2006). \"What is Logic?\". In Jacquette, D. (ed.). \n*Philosophy of Logic*(https://philpapers.org/rec/JAAWIL). North Holland. pp. 13–39. \nISBN 978-0-444-51541-4. Archived (https://web.archive.org/web/20211207235525/https://ph \nilpapers.org/rec/JAAWIL) from the original on 7 December 2021. Retrieved 29 December \n2021. \nHintikka, Jaakko J.; Spade, Paul Vincent. \"History of logic\" (https://www.britannica.com/topi \nc/history-of-logic).*Encyclopædia Britannica*. Retrieved 23 September 2022. \nHonderich, Ted (2005).*The Oxford Companion to Philosophy*(https://philpapers.org/rec/HO \nNTOC-2). Oxford University Press. ISBN 978-0-19-926479-7. Archived (https://web.archive. \norg/web/20210129082636/https://philpapers.org/rec/HONTOC-2) from the original on 29 \nJanuary 2021. Retrieved 2 January 2022. \nHurley, Patrick J. (2015). \"4. Categorical Syllogisms\".*Logic: The Essentials*. Wadsworth. \npp. 189–237. ISBN 978-1-305-59041-0. \nIEP Staff. \"Deductive and Inductive Arguments\" (https://iep.utm.edu/ded-ind/). Archived (http \ns://web.archive.org/web/20100528032124/https://iep.utm.edu/ded-ind/) from the original on \n28 May 2010. Retrieved 6 January 2022. ", - "page_start": 30, - "page_end": 30, - "source_file": "wikipedia1.pdf" + "text": "", + "page_start": 384, + "page_end": 384, + "source_file": "00-80T-80.pdf" } ] }, @@ -3935,70 +3935,70 @@ "target_page": 6, "target_passage": "we observe a performance correla- tion with the embedding dimension and the model’s number of parameters, which are often correlated themselves", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 123, + "page_end": 123, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Figure 1 shows a global model comparison \nacross all datasets. The models are arranged hori- \nzontally according to their performance, with the \nbest models on the left. The black bars repre- \nsent the statistical equivalence between the mod- \nels’ performances. The statistically equivalent \ntop performers for this benchmark are OpenAI’s \nmodels text-embedding-3-large, text-embedding-3- \nsmall and text-embedding-ada-002. Interestingly, \nmany models do not show a significant perfor- \nmance gap between their base and large flavours. \nSome French models stand out among the multi- \nlingual models, such as Solon-embeddings-large- \n0.1, sentence_croissant_alpha_v0.3 and sentence- \ncamembert-large. \nFurthermore, we observe a performance correla- \ntion with the embedding dimension and the model’s \nnumber of parameters, which are often correlated \nthemselves. This appears very clearly on the rela- \ntive ranking of E5 and T5 models (see Figure 1). \nHowever, some small models perform very well \non the benchmark, such as the standard version \nof the multilingual universal sentence encoder or \nSolon-embeddings-base-1.0. Notably, the maxi- \nmum sequence length, while an important criterion \nfor generative tasks with LLMs, is less correlated \nwith performance than the other dimensions. This \ncan be explained by many datasets containing rel- \natively small texts (see appendix Table 3 showing \nthat 14 datasets have less than 50 tokens). ", - "page_start": 6, - "page_end": 6, - "source_file": "arxiv4.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "4 Localizing linguistic knowledge \n\n4.1 BERT embeddings \n\nIn studies of BERT, the term \"embedding\" refers \nto the output of a Transformer layer (typically, the \nfinal one). Both conventional static embeddings \n(Mikolov et al., 2013) and BERT-style embeddings \ncan be viewed in terms of mutual information max- \nimization (Kong et al., 2019), but the latter are \ncontextualized. Every token is represented by a \nvector dependent on the particular context of occur- \nrence, and contains at least some information about \nthat context (Miaschi and Dell’Orletta, 2020). ", - "page_start": 4, - "page_end": 4, - "source_file": "arxiv2_taclccby4_license.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "French to enable the research community and indus- \ntry to select the most relevant embedding methods \nbased on one’s specific needs, such as being open- \nsource, versatile or targeted toward a particular task, \nhaving a small embedding dimension, the ability to \nprocess long texts or their performance. To achieve \nthis goal, we undertake significant efforts in col- \nlecting datasets to conduct a broad comparison of \nmodels. We ensure that the datasets cover various \ntasks within a common, easy-to-use framework, \nand we create three new quality-checked datasets \nto enhance this collection. We select a diverse \nrange of models, including prominent French and \nmultilingual models deemed most efficient. The re- \nsults of our study already enable the community to \nmake informed model selections, whether for gen- \neral purposes or specific tasks. Additionally, our \nimplementation is open to the community and fea- \ntures a public leaderboard, allowing the results to \nevolve with new models or datasets. With this first \nlarge-scale comparison, we perform an in-depth \nanalysis of the results, confirming well-known find- \nings such as the correlation between performance \nand model/embedding dimensions and uncovering \ninteresting nuances. \n\nEmbeddings are dense vector representations that \ncapture the semantics of an input. The first emblem- \natic example is Word2Vec, introduced by Mikolov \net al. (2013). It consists of neural architectures \ntrained to learn high-quality word representations \nfrom contextual relationships in vast amounts of \ntext. Other models were proposed since then, lever- \naging the transformer architecture (Vaswani et al., \n2017) to produce both generic and contextualized \nword embeddings using self-attention. Many mod- \nels now exist with various architectures, mono- \nlingual or multilingual, pre-trained or fine-tuned \n(Naseem et al., 2021; Ding et al., 2023). ", - "page_start": 1, - "page_end": 1, - "source_file": "arxiv4.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "But this is not to say that there is no room for \nimprovement. Ethayarajh (2019) measure how \nsimilar the embeddings for identical words are in \nevery layer, reporting that later BERT layers pro- \nduce more context-specific representations3. They \nalso find that BERT embeddings occupy a narrow \ncone in the vector space, and this effect increases \nfrom the earlier to later layers. That is, two ran- \ndom words will on average have a much higher \ncosine similarity than expected if embeddings \nwere directionally uniform (isotropic). Since \nisotropy was shown to be beneficial for static word \nembeddings (Mu and Viswanath, 2018), this might \nbe a fruitful direction to explore for BERT. \n\nAnother direction is information-theoretic prob- \ning. Pimentel et al. (2020) operationalize prob- \ning as estimating mutual information between the \nlearned representation and a given linguistic prop- \nerty, which highlights that the focus should be not \non the amount of information contained in a rep- \nresentation, but rather on how easily it can be ex- \ntracted from it. Voita and Titov (2020) quantify \nthe amount of effort needed to extract information \nfrom a given representation as minimum descrip- \ntion length needed to communicate both the probe \nsize and the amount of data required for it to do \nwell on a task. ", - "page_start": 4, - "page_end": 4, - "source_file": "arxiv2_taclccby4_license.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "puts x and y correspond to masked regions of a video, we \napply the video masks by simply dropping a subset of the \ntokens. We apply masking at the input of the x-encoder, \nand at the output of the y-encoder to construct contex- \ntualized targets (Baevski et al., 2022b). The encoder is \nparameterized using standard ViT networks, while the \npredictor is a narrow transformer implemented using \n12 blocks with an embedding dimension of 384. Taking \ninspiration from masked autoencoders (He et al., 2021), \nour predictor takes as input the sequence of embeddings \nproduced by the x-encoder as well as a sequence of learn- \nable mask tokens with positional embeddings indicating \nthe spatio-temporal positions of the y tokens. The out- \nput of the predictor is an embedding vector for each \nmask token; see Figure 3 and refer to Appendix B for \nmore details. \n\n3.2 Prediction Task: Predicting y from x \nThe feature prediction task is based on a masked mod- \neling formulation (He et al., 2021; Tong et al., 2022); \ni.e., regions x and y from the video are sampled using \nmasking. To sample y from a video, we sample several \n(possibly overlapping) spatially continuous blocks with \nvarious aspect ratios and repeat the spatial blocks across \nthe entire temporal dimension of the video; x is taken to \nbe the complement. Masking a large continuous block \nthat covers the full temporal dimension limits informa- \ntion leakage due to the spatial and temporal redundancy \nof videos, and results in a harder prediction task (Tong \net al., 2022). ", - "page_start": 4, - "page_end": 4, - "source_file": "arxiv3.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Q1: Is there a model that outstands on all \ntasks? \n\nModels performances for each task are presented \nin appendix Tables 9, 10, 11, 12 and 13. Figure \n1 shows the critical difference diagram of average \nscore ranks. \n\nAs in MTEB (Muennighoff et al., 2022), no \nmodel claims state-of-the-art in all tasks even if \nthe text-embedding-3-large model is in first place \nIt ranks \non average on all tasks (see Table 9). \nfirst for the classification and reranking tasks. For \nthe clustering task, text-embedding-ada-002 is the \nbest model. The models voyage-code-2, \ntext- \nembedding-3-small and mistral-embed share the \ntop positions in the retrieval task ranking. For the \npair classification task, laser2 is ahead of its com- \npetitors. Finally, sentence-camembert-large leads \non the STS task and multilingual-e5-small has the \nbest results for summarization. \nAs expected, the score most strongly correlates \nwith whether the evaluated models were trained on \na sentence similarity task. Of course, this criterion \nis connected to the more general Finetuned one. \nThe only top-performing models solely pre-trained \nare from the E5 family, where the pre-training is, \nin fact, contrastive and optimized for similarity. \nConversely, models pre-trained on token-level tasks \nand generating embeddings via pooling appear less \nwell-suited for the benchmark tasks. ", - "page_start": 6, - "page_end": 6, - "source_file": "arxiv4.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Figure 3 V-JEPA. Training operates on a video clip of T frames with spatial resolution H × W , flattened into a sequence \nof L tokens. (Left to right): We first obtain the input of the x-encoder by dropping tokens from the video clip. The \nx-encoder then processes the masked video sequence, and outputs an embedding vector for each input token. Next, the \noutputs of the x-encoder are concatenated with a set of learnable mask tokens containing positional embeddings of the masked \nspatio-temporal patches. The predictor network processes the combined token sequence, and outputs an embedding vector for \neach mask token. The outputs of the predictor are then regressed to the prediction targets using an L1 loss. The prediction \ntargets correspond to the output of the y-encoder. ", - "page_start": 4, - "page_end": 4, - "source_file": "arxiv3.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Theoretical motivation. A theoretical motivation for \nthe effectiveness of this collapse prevention strategy was \nproposed in Grill et al. (2020) for the BYOL method. We \nprovide a simple adaptation of their analysis for our ℓ1 \nloss. For ease of exposition, we will disregard the effect of \nthe conditioning variable z and consider one dimensional \nrepresentations. Denote the representation Eθ(y) by \na random variable Y . The optimal predictor under \nequation (1) is thus given by the following functional \nexpression, \n\nFigure 2 Joint-Embedding Predictive Architectures are \ntrained to predict the representation of an input y from \nthe representation of another input x. The additional vari- \nable z provides the predictor with information about the \ntransformation that computes y from x. \n\nOur goal is to explore the effectiveness of feature pre- \ndiction as a stand-alone objective for learning visual \nrepresentations from video. To that end, we use a \njoint-embedding predictive architecture (JEPA) (LeCun, \n2022); see Figure 2. The main idea behind a JEPA is \nto learn by predicting the representation of an input y \nfrom the representation of another input x. The basic \narchitecture is made up of an encoder, Eθ( \n), which com- \n· \nputes the representation of the inputs, and a predictor, \n), which predicts the representation of y from the \nPϕ( \n· \nrepresentation of x, conditioned on a variable z indicat- \ning the transformation (or corruption) between x and \ny. Conditioning on z enables the generation of distinct \npredictions for various transformations of x. ", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv3.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" } ] }, @@ -4009,70 +4009,70 @@ "target_page": 6, "target_passage": "The maximum amount covering all purchases under this FWC, including all renewals and reimbursement of expenses is EUR 1 000 000 (one million)", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 408, + "page_end": 408, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 210, + "page_end": 210, + "source_file": "00-80T-80.pdf" }, { - "text": "Within a maximum of 5 working days of a specific contract or order form being sent by the \nAgency to the contractor, the Agency shall receive it back, duly signed and dated. The \nperiod allowed for the execution of the tasks shall start to run on the date of signature of \nthe specific contract or order form by both parties. \n\n**I.5. Prices**\n\n**I.5.1. Maximum amount of the FWC and maximum prices**\n\nThe maximum amount covering all purchases under this FWC, including all renewals and \nreimbursement of expenses is**EUR 1 000 000**(one million). However, this does not bind \nthe contracting authority to purchase for the maximum amount. \n\nThe maximum unit prices of the services are: \n\nSenior experts: \nExperts: [ ] EUR per man-day \n[ ] EUR per man-day \n\n**I.5.2. Price revision index**\n\nPrice revision is determined by the formula set out in Article II.20 and using the trend in \nthe harmonised indices of consumer prices (HICP) ‘Euro area (19 countries)’ published at \nhttp://ec.europa.eu/eurostat/web/hicp/data/database under HICP (2015 = 100) - monthly \ndata (index) (prc_hicp_midx).] ", - "page_start": 6, - "page_end": 6, - "source_file": "EN-Draft FWC for services 0142.pdf" + "text": "", + "page_start": 204, + "page_end": 204, + "source_file": "00-80T-80.pdf" }, { - "text": "Annex IV – Daily subsistence allowances and accommodation flat rates for Finland \n\nAnnex V - (a) Declaration on list of pre-exisiting rights \n\n(b) Statement of the contractor concerning rights to delivered results and \n(c) Statement of creator (or right holder) \n\nwhich form an integral part of this framework contract (‘the FWC’). \n\nThis FWC sets out: \n\n1. the procedure by which the contracting authority may order services from the \ncontractor; \n\n2. the provisions that apply to any specific contract which the contracting authority \nand the contractor may conclude under this FWC; and \n\n3. the obligations of the parties during and after the duration of this FWC. \n\nAll documents issued by the contractor (end-user agreements, general terms and \nconditions, etc.) except its tender are held inapplicable, unless explicitly mentioned in the \nspecial conditions of this FWC. In all circumstances, in the event of contradiction between \nthis FWC and documents issued by the contractor, this FWC prevails, regardless of any \nprovision to the contrary in the contractor’s documents. ", - "page_start": 2, - "page_end": 2, - "source_file": "EN-Draft FWC for services 0142.pdf" + "text": "", + "page_start": 341, + "page_end": 341, + "source_file": "00-80T-80.pdf" }, { - "text": "**I.3.1**The FWC enters into force on the date on which the last party signs it. \n\n**I.3.2**The*implementation of the FWC*cannot start before its entry into force. \n\n**I.3.3**The FWC is concluded for a period of 24 months with effect from the date of its \n\nentry into force. \n\n**I.3.4**The parties must sign any specific contract before the FWC expires. \n\nThe FWC continues to apply to such specific contracts after its expiry. The services \nrelating to such specific contracts must be performed no later than six months after \nthe expiry of the FWC. \n\n**I.3.5**Renewal of the FWC \n\nThe FWC is renewed automatically 2 times for 12 months each, unless one of the parties \nreceives*formal notification*to the contrary at least three months before the end of the \nongoing duration. Renewal does not change or postpone any existing obligations. \n\n**I.4. Appointment of the contractor and implementation of the FWC**\n\nI.4.1. Appointment of the contractor \n\nThe contracting authority appoints the contractor for a multiple FWC in cascade in \n[*complete*] position. ", - "page_start": 5, - "page_end": 5, - "source_file": "EN-Draft FWC for services 0142.pdf" + "text": "", + "page_start": 204, + "page_end": 204, + "source_file": "00-80T-80.pdf" }, { - "text": "(a) if provision of the services under an on-going specific contract has not actually \nstarted within 15 days of the scheduled date and the contracting authority considers \nthat the new date proposed, if any, is unacceptable, taking into account \nArticle II.11.2; \n\n(b) if the contractor is unable, through its own fault, to obtain any permit or licence \n\nrequired for*implementation of the FWC*; \n\n(c) if the contractor does not implement the FWC or perform the specific contract in \naccordance with the tender specifications or*request for service*or is in breach of \nanother substantial contractual obligation or repeatedly refuses to sign specific \ncontracts. Termination of three or more specific contracts in these circumstances \nalso constitutes grounds for termination of the FWC; \n\n(d) if the contractor or any person that assumes unlimited liability for the debts of the \ncontractor is in one of the situations provided for in points (a) and (b) of Article \n136(1) of the Financial Regulation6; \n\n(e) if the contractor or any*related person*is in one of the situations provided for in \npoints (c) to (h) of Article 136(1) or to Article 136(2) of the Financial Regulation; \n(f) if the procedure for awarding the FWC or the*implementation of the FWC*prove to ", - "page_start": 30, - "page_end": 30, - "source_file": "EN-Draft FWC for services 0142.pdf" + "text": "", + "page_start": 205, + "page_end": 205, + "source_file": "00-80T-80.pdf" }, { - "text": "**The European Agency for Safety and Health**\n**at Work (EU-OSHA)**contributes to making \nEurope a safer, healthier and more productive \nplace to work. The Agency researches, develops \nand distributes reliable, balanced and impartial \nsafety and health information and organises pan- \nEuropean awareness-raising campaigns. Set up by \nthe European Union in 1994 and based in Bilbao, \nSpain, the Agency brings together representatives \nfrom the European Commission, Member State \ngovernments and employers’ and workers’ \norganisations, as well as leading experts in each \nof the EU Member States and beyond. ", - "page_start": 164, - "page_end": 164, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 341, + "page_end": 341, + "source_file": "00-80T-80.pdf" }, { - "text": "According to the detailed register data of the Swedish Chemicals Agency, 10 million tonnes of synthetic \nchemicals were used in Sweden in 2019 that were classified as hazardous to health and the environment \n(not counting petrol). That equals approximately 1 ton per citizen of such chemicals. 294 \n\nThe ESENER 2019 survey provides information about**sectors that reported a particularly high**\n**prevalence of dangerous substances**. The percentage of enterprises reporting handling or exposure \nto chemicals are: 50% in ‘Manufacturing’, 49% in ‘Construction, waste management, and water and \nelectricity supply’, and 47% in ‘Human health and social work activities’. 295 \n\nThe prevention of risks from the use of chemicals at workplaces is done according to extensive \nregulatory frameworks. The most relevant pieces of legislation at the EU level are the OSH Framework \nDirective, the Chemical Agents Directive, and the Carcinogens and Mutagens Directive. Legislation in \nother policy areas contributes to the reduction of risks from dangerous substances in workplaces, such \nas EU legislation on chemical substances and mixtures (CLP, the regulation on classification, labelling \nand packaging of chemicals, its predecessor directive was already issued in 1967; REACH the \nregulation on Registration, Evaluation, Authorisation and Restriction of Chemicals from 2007; and also \nspecific EU and international legislation on specific aspects such as chemicals in waste, storage and \ntransport, in specific products like batteries and cars, in specific sectors like agriculture, in natural \nenvironments like in water and soil, and in consumer products like food, detergents and cosmetics). ", - "page_start": 107, - "page_end": 107, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 39, + "page_end": 39, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "429 https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A31994R2062 \n430 Communication from the Commission - Adapting to change in work and society: a new Community strategy on \nhealth and safety at work 2002-2006 /COM/2002/0118 final \n431 European Commission Brussels, 31.5.2013 SWD (2013) 202 final COMMISSION STAFF WORKING \nDOCUMENT Evaluation of the European Strategy 2007-2012 on health and safety at work \n432 Communication from the Commission to the European Parliament, the Council, the European Economic and \nSocial Committee and the Committee of the Regions: Improving quality and productivity at work: Community \nstrategy 2007-2012 on health and safety at work {SEC(2007) 214} {SEC(2007) 215} {SEC(2007) 216} \n433 Communication from the Commission to the European Parliament, the Council, the European Economic and \nSocial Committee and the Committee of the Regions on an EU Strategic Framework on Health and Safety at \nWork 2014-2020, Brussels, 6.6.2014 COM (2014) 332 final \n434 Communication from the Commission to the European Parliament, the Council, the European Economic and \nSocial Committee and the Committee of the Regions: EU strategic framework on health and safety at work 2021- \n2027: Occupational safety and health in a changing world of work, {SWD(2021) 148 final} - {SWD(2021) 149 final, \nBrussels, 28.6.2021 \n435 European Agency for Safety and Health at Work, 2019: National Strategies in the field of Occupational Safety \nand Health in the EU, 2019, https://osha.europa.eu/en/safety-and-health-legislation/osh-strategies \n436 See as overview: https://osha.europa.eu/en/emerging-risks, examples e.g. EU-OSHA, 2014: Current and \nemerging issues in the healthcare sector, including home and community care, European Risk Observatory \nreport, European Risk Observatory Report; \nEU-OSHA, 2014: Green jobs, new risks? New and emerging risks to occupational safety and health in the \nelectricity sectors, Workshop for European Sectoral Social Dialogue Committee Electricity'; EU OSHA 2019: A \nReview on the Future of Work: Performance Enhancing Drugs \n437 Eurostat: Accident at work statistics \n438 OSH related LFS Ad hoc modules were: 1999 - Accidents at work and occupational diseases; 2007 - Work \nrelated accidents, health problems and hazardous exposure; 2013 Accidents at work and other work-related \nhealth problems; 2020 - Accidents at work- and work-related health problems. \n439 Eurofound Website: https://www.eurofound.europa.eu/about-eurofound \n440Eurofound, European Working Conditions Survey \n441 Eurofound, First European Survey on the Work Environment 1991-1992 \nhttps://www.eurofound.europa.eu/sites/default/files/ef_publication/field_ef_document/ef9211en.pdf \n442 European Agency for Safety and Health at Work, ESENER, https://visualisation.osha.europa.eu/esener#!/en \n443 Europeans and Health and Safety at Work, June 1992, https://europa.eu/eurobarometer/surveys/detail/113 ; \nEuropeans and Health and Safety at Work, August 1996 https://europa.eu/eurobarometer/surveys/detail/158 \n444 Eurobarometer: Working Conditions in Europe, June 1997, https://europa.eu/eurobarometer/surveys/detail/151 \nEurobarometer: Working Conditions, April 2014, https://europa.eu/eurobarometer/surveys/detail/2044 \n445 Eurobarometer: Work-Life Balance, October 2018, https://europa.eu/eurobarometer/surveys/detail/2185 \n446 Eurobarometer: Undeclared work in the European Union, February 2020 \nhttps://europa.eu/eurobarometer/surveys/detail/2250 \n447 The Horizon-project INGRID2 offers links to searchable databases on surveys related to working conditions. \nhttps://www.ingridportal.eu/en Supporting expertise in inclusive growth, e-portal ‘Dataset on Working conditions’, \n448 e.g.: International Benchmarking on Occupational Safety and Health (OSH) Regulation, revised version 2018, \nhttp://www.iali-aiit.org/ , \n449 The Horizon-project INGRID2 also provides an overview on these types of databases \n(https://www.ingridportal.eu/en ) \n450 European Centre for the Development of Vocational Training CEDEFOP (https://www.cedefop.europa.eu/) \nSkills Panorama: https://skillspanorama.cedefop.europa.eu/en \n451 European Institute for Gender Equality EIGE (https://eige.europa.eu/ ) Gender Statistics Database, Work and \nLabour market, https://eige.europa.eu/gender-statistics/dgs, Gender Equality Index, e.g. index of digitalisation in \nthe world of work (2020) \n452 European Chemical Agency ECHA (https://echa.europa.eu/home) Exposure scenario examples ", - "page_start": 158, - "page_end": 158, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 205, + "page_end": 205, + "source_file": "00-80T-80.pdf" }, { - "text": "*453 European Centre for Disease Prevention and Control, https://www.ecdc.europa.eu/en*\n454 European Maritime Safety Agency EMSA (http://www.emsa.europa.eu/ ), Section on Safety and Security \nhttp://www.emsa.europa.eu/we-do/safety.html \n455 Fundamental Rights Agency FRA, https://fra.europa.eu/en, Section on ‘Trafficking and labour exploitation, e.g \nthe report from June 2021 titled: Protecting migrants in an irregular situation from labour exploitation – Role of the \nEmployers Sanctions Directive \n456 European Monitoring Centre for Drugs and Drug Addiction EMCDDA (https://www.emcdda.europa.eu/), \nSection ‘Best practice’, Policy and practice briefings: Work places, https://www.emcdda.europa.eu/best- \npractice/briefings/workplace_en \nQuite unknown and difficult to estimate: between one and nine percent of the employees take so-called neuro \n\nEuropean Agency for Safety and Health at Work – EU-OSHA \n158 ", - "page_start": 158, - "page_end": 158, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 205, + "page_end": 205, + "source_file": "00-80T-80.pdf" } ] }, @@ -4089,64 +4089,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 352, + "page_end": 352, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 159, + "page_end": 159, + "source_file": "sg246915.pdf" }, { - "text": "quality or continuity of the services. The parties may agree to draw up a transition plan \ndetailing the contractor’s assistance unless such plan is already detailed in other \ncontractual documents or in the tender specifications. The contractor must provide such \nassistance at no additional cost, except if it can demonstrate that it requires substantial \nadditional resources or means, in which case it must provide an estimate of the costs \ninvolved and the parties will negotiate an arrangement in good faith. \n\n**II.18.4. Effects of termination**\n\nThe contractor is liable for damage incurred by the contracting authority as a result of the \ntermination of the FWC or a specific contract, including the additional cost of appointing \nand contracting another contractor to provide or complete the services, except if the \ndamage is a result of a termination in accordance with Article II.18.1(j), (k) or (l) or Article \nII.18.2. The contracting authority may claim compensation for such damage. \n\nThe contractor is not entitled to compensation for any loss resulting from the termination \nof the FWC or a specific contract, including loss of anticipated profits, unless the loss was \ncaused by the situation specified in Article II.18.2. \n\nThe contractor must take all appropriate measures to minimise costs, prevent damage and \ncancel or reduce its commitments. ", - "page_start": 32, - "page_end": 32, - "source_file": "EN-Draft FWC for services 0142.pdf" + "text": "", + "page_start": 159, + "page_end": 159, + "source_file": "sg246915.pdf" }, { - "text": "**Duties on employers**\n\n**4.**—(1) An employer with more than 50 employees who is the employer of any person who is \nrequired to undertake workforce tests or has responsibility for any agency worker who is required \nto undertake workforce tests, must take reasonable steps to facilitate the taking of those tests by \nthat person or agency worker in accordance with these Regulations. \n\n(2) In the discharge of the duty under sub-paragraph (1), an employer must have regard to any \n\nguidance issued by the Secretary of State for the purposes of this paragraph. \n\n(3) In sub-paragraph (1) an employer has responsibility for an agency worker if— \n\n(a) the agency worker is supplied or to be supplied by a person (an “agent”) to the employer \nunder a contract or other arrangements made between the agent and the employer; and \n\n(b) the agency worker is not— \n\n(i) a worker because of the absence of a worker’s contract between the agency worker \nand the agent or the employer, or \n\n(ii) a party to a contract under which the agency worker undertakes to do the work for \nanother party to a contract whose status is, by virtue of the contract, that of a client or \ncustomer of any profession or business undertaking carried on by the agency worker. ", - "page_start": 68, - "page_end": 68, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 159, + "page_end": 159, + "source_file": "sg246915.pdf" }, { - "text": "**II.13.9. Copyright notice for pre-existing rights**\n\nWhen the contractor retains*pre-existing rights*on parts of the*results*, reference must be \ninserted to that effect when the*result*is used as set out in Article I.10.1, with the following \ndisclaimer: ‘© — year — European Union. All rights reserved. Certain parts are licensed \nunder conditions to the EU’, or with any other equivalent disclaimer as the contracting \nauthority may consider best appropriate, or as the parties may agree on a case-by-case \nbasis. This does not apply where inserting such reference would be impossible, notably for \npractical reasons. \n\n**II.13.10. Visibility of ECHA funding and disclaimer**\n\nWhen making use of the*results*, the contractor must declare that they have been produced \nunder a contract with the contracting authority and that the opinions expressed are those \nof the contractor only and do not represent the contracting authority’s official position. The \ncontracting authority may waive this obligation in writing or provide the text of the \ndisclaimer. \n\n**II.14. Force majeure**\n\n**II.14.1**If a party is affected by*force majeure*, it must immediately*notify*the other party, \nstating the nature of the circumstances, their likely duration and foreseeable \neffects. ", - "page_start": 27, - "page_end": 27, - "source_file": "EN-Draft FWC for services 0142.pdf" + "text": "", + "page_start": 159, + "page_end": 159, + "source_file": "sg246915.pdf" }, { - "text": "(g) if the contractor does not comply with applicable obligations under environmental, \nsocial and labour law established by Union law, national law, collective agreements \nor by the international environmental, social and labour law provisions listed in \nAnnex X to Directive 2014/24/EU; \n\n(h) if the contractor is in a situation that could constitute a*conflict of interest*or a \n\n*professional conflicting interest*as referred to in Article II.7; \n\n(i) if a change to the contractor’s legal, financial, technical, organisational or ownership \nsituation is likely to substantially affect the*implementation of the FWC*or \nsubstantially modify the conditions under which the FWC was initially awarded; \n(j) in the event of*force majeure*, where either resuming implementation is impossible \nor the necessary ensuing amendments to the FWC or a specific contract would mean \nthat the tender specifications are no longer fulfilled or result in unequal treatment \nof tenderers or contractors; \n\n(k) if the needs of the contracting authority change and it no longer requires new \nservices under the FWC; in such cases ongoing specific contracts remain unaffected; \n(l) if the termination of the FWC with one or more of the contractors means that the \nmultiple FWC with reopening of competition no longer has the minimum required \nlevel of competition; \n\n(m) if the contractor is in breach of the data protection obligations resulting from \n\nArticle II.9.2; \n\n(n) if the contractor does not comply with the applicable data protection obligations \nresulting from Regulation (EU) 2016/679. \n\n**II.18.2. Grounds for termination by the contractor**\n\nThe contractor may terminate the FWC or any on-going specific contract if the contracting \nauthority fails to comply with its obligations, in particular the obligation to provide the \ninformation needed for the contractor to implement the FWC or to perform a specific \ncontract as provided for in the tender specifications. \n\n**II.18.3. Procedure for termination**\n\nA party must*formally notify*the other party of its intention to terminate the FWC or a \nspecific contract and the grounds for termination. \n\nThe other party has 30 days following the date of receipt to submit observations, including \nthe measures it has taken or will take to continue fulfilling its contractual obligations. \nFailing that, the decision to terminate becomes enforceable the day after the time limit for \nsubmitting observations has elapsed. \n\nIf the other party submits observations, the party intending to terminate must*formally*\n*notify*it either of the withdrawal of its intention to terminate or of its final decision to \nterminate. ", - "page_start": 31, - "page_end": 31, - "source_file": "EN-Draft FWC for services 0142.pdf" + "text": "", + "page_start": 159, + "page_end": 159, + "source_file": "sg246915.pdf" }, { - "text": "(a) of the withdrawal of its intention to reduce payment; or \n\n(b) of its final decision to reduce payment and the corresponding amount,. \n\n**II.16.3. Claims and liability**\n\nAny reduction in price does not affect the contractor’s actual or potential liability or the \ncontracting authority’s rights under Article II.18. \n\n**II.17. Suspension of the implementation of the FWC**\n\n**II.17.1. Suspension by the contractor**\n\nIf the contractor is affected by*force majeure*, it may suspend the provision of the services \nunder a specific contract. \n\nThe contractor must immediately*notify*the contracting authority of the suspension. The \n*notification*must include a description of the*force majeure*and state when the contractor \nexpects to resume the provision of services. \n\nThe contractor must*notify*the contracting authority as soon as it is able to resume \n*performance of the specific contract*, unless the contracting authority has already \nterminated the FWC or the specific contract. \n\n**II.17.2. Suspension by the contracting authority**\n\nThe contracting authority may suspend the*implementation of the FWC*or*performance of*", - "page_start": 29, - "page_end": 29, - "source_file": "EN-Draft FWC for services 0142.pdf" + "text": "", + "page_start": 336, + "page_end": 336, + "source_file": "00-80T-80.pdf" }, { - "text": "If the contractor submits observations, the contracting authority, taking into account the \nrelevant observations, must*notify*the contractor: \n\n(a) of the withdrawal of its intention to apply liquidated damages; or \n\n(b) of its final decision to apply liquidated damages and the corresponding amount. \n\n**II.15.3. Nature of liquidated damages**\n\nThe parties expressly acknowledge and agree that any amount payable under this Article \nis not a penalty and represents a reasonable estimate of fair compensation for the damage \nincurred due to failure to provide the services within the applicable time limits set out in \nthis FWC. \n\n**II.15.4. Claims and liability**\n\nAny claim for liquidated damages does not affect the contractor’s actual or potential liability \nor the contracting authority’s rights under Article II.18. ", - "page_start": 28, - "page_end": 28, - "source_file": "EN-Draft FWC for services 0142.pdf" + "text": "", + "page_start": 159, + "page_end": 159, + "source_file": "sg246915.pdf" }, { - "text": "(g) other adaptations which the parties may later agree; in such case, the following rules \napply: the contracting authority must consult the contractor. If necessary, the contractor \nmust in turn seek the agreement of any*creator*or other right holder and must reply to the \ncontracting authority within one month by providing its agreement, including any \nsuggestions of modifications, free of charge. The contractor may refuse the intended \nmodification only if a*creator*can demonstrate that the intended modification may harm \nhis/her honour or reputation, thereby violating his/her moral rights. \n\nThe modes of exploitation may be defined in more details in the specific contract. \n\nThe list above is in addition to whatever rights already accrue to the contracting authority \non the basis of existing exceptions in the applicable legislation, such as the copyright \nexception to ensure the proper performance or reporting of administrative proceedings, in \ncases where such exceptions apply. \n\n**I.10.2. Licence or transfer of pre-existing rights**\n\nAll*pre-existing rights*incorporated in the*results*, if any, are licensed to the Agency as set \nout in Article II.13.2. ", - "page_start": 10, - "page_end": 10, - "source_file": "EN-Draft FWC for services 0142.pdf" + "text": "", + "page_start": 336, + "page_end": 336, + "source_file": "00-80T-80.pdf" }, { - "text": "**I.6.3. Payment of the balance**\n\n1. The contractor (or leader in the case of a joint tender) may claim the payment of the \nbalance in accordance with Article II.21.6. \n\nThe contractor (or leader in the case of a joint tender) must send an invoice in paper format \nor via*e-PRIOR*for payment of the balance due under a specific contract, as provided for \nin the tender specifications and accompanied by the following: \n\n a list of all*pre-existing rights*to the*results*or parts of the*results*or a declaration stating \n\nthat there are no such*pre-existing rights*, as provided for in Article II.13.4; \n\n document of acceptance by ECHA of the deliverables as defined in the*tender*\n\n*specifications or specific contract*\n\n statements of reimbursable expenses in accordance with Article II.22. \n\n2. The contracting authority must approve the submitted documents and pay within 30 \ndays from receipt of the invoice. \n\n3. The contracting authority may suspend the time limit for payment specified in point 2 \nin accordance with Article II.21.7. Once the suspension is lifted, the contracting authority \nshall give its approval and pay within the remainder of the time-limit indicated in point 2 \nunless it rejects partially or fully the submitted documents. \n\n**I.6.4. Performance guarantee**\n\nPerformance guarantee is not applicable to this FWC. \n\n**I.6.5. Retention money guarantee**\n\nRetention money guarantee is not applicable to this FWC. \n\n**I.7. Bank account**\n\nPayments must be made to the contractor’s (or leader’s in the case of a joint tender) bank \naccount denominated in euro, identified as follows: \n\nName of bank: \n\nFull address of branch: \n\nExact denomination of account holder: \n\nFull account number including bank codes: \n\n[IBAN1 code:] \n\n**I.8. Communication details**\n\nFor the purpose of this FWC, communications must be sent to the following addresses: \n\nContracting authority: \n\nEuropean Chemicals Agency \nDirectorate and Unit D3, Risk Management I \nTelakkakatu 6 \n00150 Helsinki \nFinland \nE-mail: [insert functional mailbox] ", - "page_start": 7, - "page_end": 7, - "source_file": "EN-Draft FWC for services 0142.pdf" + "text": "", + "page_start": 336, + "page_end": 336, + "source_file": "00-80T-80.pdf" } ] }, @@ -4163,64 +4163,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 328, + "page_end": 328, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 360, + "page_end": 360, + "source_file": "00-80T-80.pdf" }, { - "text": "According to the detailed register data of the Swedish Chemicals Agency, 10 million tonnes of synthetic \nchemicals were used in Sweden in 2019 that were classified as hazardous to health and the environment \n(not counting petrol). That equals approximately 1 ton per citizen of such chemicals. 294 \n\nThe ESENER 2019 survey provides information about**sectors that reported a particularly high**\n**prevalence of dangerous substances**. The percentage of enterprises reporting handling or exposure \nto chemicals are: 50% in ‘Manufacturing’, 49% in ‘Construction, waste management, and water and \nelectricity supply’, and 47% in ‘Human health and social work activities’. 295 \n\nThe prevention of risks from the use of chemicals at workplaces is done according to extensive \nregulatory frameworks. The most relevant pieces of legislation at the EU level are the OSH Framework \nDirective, the Chemical Agents Directive, and the Carcinogens and Mutagens Directive. Legislation in \nother policy areas contributes to the reduction of risks from dangerous substances in workplaces, such \nas EU legislation on chemical substances and mixtures (CLP, the regulation on classification, labelling \nand packaging of chemicals, its predecessor directive was already issued in 1967; REACH the \nregulation on Registration, Evaluation, Authorisation and Restriction of Chemicals from 2007; and also \nspecific EU and international legislation on specific aspects such as chemicals in waste, storage and \ntransport, in specific products like batteries and cars, in specific sectors like agriculture, in natural \nenvironments like in water and soil, and in consumer products like food, detergents and cosmetics). ", - "page_start": 107, - "page_end": 107, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 360, + "page_end": 360, + "source_file": "00-80T-80.pdf" }, { - "text": "**Duties on employers**\n\n**4.**—(1) An employer with more than 50 employees who is the employer of any person who is \nrequired to undertake workforce tests or has responsibility for any agency worker who is required \nto undertake workforce tests, must take reasonable steps to facilitate the taking of those tests by \nthat person or agency worker in accordance with these Regulations. \n\n(2) In the discharge of the duty under sub-paragraph (1), an employer must have regard to any \n\nguidance issued by the Secretary of State for the purposes of this paragraph. \n\n(3) In sub-paragraph (1) an employer has responsibility for an agency worker if— \n\n(a) the agency worker is supplied or to be supplied by a person (an “agent”) to the employer \nunder a contract or other arrangements made between the agent and the employer; and \n\n(b) the agency worker is not— \n\n(i) a worker because of the absence of a worker’s contract between the agency worker \nand the agent or the employer, or \n\n(ii) a party to a contract under which the agency worker undertakes to do the work for \nanother party to a contract whose status is, by virtue of the contract, that of a client or \ncustomer of any profession or business undertaking carried on by the agency worker. ", - "page_start": 68, - "page_end": 68, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 360, + "page_end": 360, + "source_file": "00-80T-80.pdf" }, { - "text": "Union budget, ii) the non-disclosure of information in violation of a specific obligation, with \nthe same effect or iii) the misapplication of such funds or assets for purposes other than \nthose for which they were originally granted, which damages the Union's financial interests; \n\n**'Grave professional misconduct':**a violation of applicable laws or regulations or ethical \nstandards of the profession to which a contractor or a related person belongs, including \nany conduct leading to sexual or other exploitation or abuse, or any wrongful conduct of \nthe contractor or a related person which has an impact on its professional credibility where \nsuch conduct denotes wrongful intent or gross negligence. \n\n**‘Implementation of the FWC’**: the purchase of services envisaged in the FWC through \nthe signature and*performance of specific contracts*; \n\n**‘Interface control document’**: the guideline document which lays down the technical \nspecifications, message standards, security standards, checks of syntax and semantics, \netc. to facilitate machine-to-machine connection. This document is updated on a regular \nbasis; \n\n**‘Irregularity’**: any infringement of a provision of Union law resulting from an act or \nomission by an economic operator, which has, or would have, the effect of prejudicing the \nUnion’s budget. ", - "page_start": 14, - "page_end": 14, - "source_file": "EN-Draft FWC for services 0142.pdf" + "text": "", + "page_start": 360, + "page_end": 360, + "source_file": "00-80T-80.pdf" }, { - "text": "47 Adăscăliței et al., 2021: The intensification of work in Europe: A multilevel analysis \n\n48 EU-OSHA, 2002: Report - New forms of contractual relationships and the implications for occupational safety \nand health (p. 7). \n\n49 Eurofound, 2011: Impact of subcontracting on working conditions ", - "page_start": 143, - "page_end": 143, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 360, + "page_end": 360, + "source_file": "00-80T-80.pdf" }, { - "text": "On the basis of the final audit findings, the contracting authority may recover all \nor part of the payments made in accordance with Article II.23 and may take any \nother measures which it considers necessary. \n\n**II.24.5**In accordance with Council Regulation (Euratom, EC) No 2185/96 of \n11 November 1996 concerning on-the-spot checks and inspection carried out by \nthe Commission in order to protect the European Communities’ financial interests \nagainst*fraud*and other*irregularities*and Regulation (EU, Euratom) No 883/2013 \nof the European Parliament and of the Council of 11 September 2013 concerning \ninvestigations conducted by the European Anti-Fraud Office, the European Anti- \nFraud Office may carry out investigations, including on the spot checks and \ninspections, to establish whether there has been*fraud*, corruption or any other \nillegal activity under the contract affecting the financial interests of the Union. \nFindings arising from an investigation may lead to criminal prosecution under \nnational law. \n\nThe investigations may be carried out at any moment during the provision of the \nservices and up to five years starting from the payment of the balance of the last \nspecific contract issued under this FWC. ", - "page_start": 38, - "page_end": 38, - "source_file": "EN-Draft FWC for services 0142.pdf" + "text": "", + "page_start": 360, + "page_end": 360, + "source_file": "00-80T-80.pdf" }, { - "text": "**The European Agency for Safety and Health**\n**at Work (EU-OSHA)**contributes to making \nEurope a safer, healthier and more productive \nplace to work. The Agency researches, develops \nand distributes reliable, balanced and impartial \nsafety and health information and organises pan- \nEuropean awareness-raising campaigns. Set up by \nthe European Union in 1994 and based in Bilbao, \nSpain, the Agency brings together representatives \nfrom the European Commission, Member State \ngovernments and employers’ and workers’ \norganisations, as well as leading experts in each \nof the EU Member States and beyond. ", - "page_start": 164, - "page_end": 164, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 360, + "page_end": 360, + "source_file": "00-80T-80.pdf" }, { - "text": "These**types of less formalised work**have gained more and more importance in social reality and \nresearch. There are some prominent examples of EU-wide overviews. The ‘European Platform for \n\nEuropean Agency for Safety and Health at Work – EU-OSHA \n133 ", - "page_start": 133, - "page_end": 133, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 360, + "page_end": 360, + "source_file": "00-80T-80.pdf" }, { - "text": "353 Ibid., p. 67. \n354 Ibid., p. 94. \n355 Graveling, 2018: Transposition, implementation and enforcement of EU OSH legislation - Thematic Discussion \nPaper \n356 EU-OSHA, 2021: Summary - Improving compliance with occupational safety and health regulations: an \noverarching review (p. 4). \n357 The authors explain the difference between ‘substantive and rule compliance as follows:*‘... “substantive*\n*compliance”, which requires compliance with the collective goals underpinning the regulatory scheme (better OSH*\n*practice); and “rule compliance”, which envisages compliance with the content of legal standards only*’ (p. 11). \n*358*EU-OSHA, 2021: Improving compliance with occupational safety and health regulations: an overarching review \n(p. 43). \n359 Fundamental Rights Agency (FRA), here, section on Trafficking and labour exploitation \n\n360 Special Eurobarometer 498: Undeclared Work in the European Union \n\n361 European Commission, Directorate-General for Employment, Social Affairs and Inclusion et al., 2018: An \nevaluation of the scale of undeclared work in the European Union and its structural determinants : estimates using \nthe labour input method, here ", - "page_start": 154, - "page_end": 154, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 360, + "page_end": 360, + "source_file": "00-80T-80.pdf" } ] }, @@ -4237,64 +4237,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 379, + "page_end": 379, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 178, + "page_end": 178, + "source_file": "00-80T-80.pdf" }, { - "text": "2002 \nWORLDWIDE REVENUES \n\n| | | 48% CORNING TECHNOLOGIES |\n|---|---|---|\n| | | 48% CORNING TECHNOLOGIES |\n| | | 52% CORNING TELECOMMUNICATIONS |\n| | | |\n", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_GLW_2002.pdf" + "text": "", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_HNI_2003.pdf" }, { - "text": "2001 \nWORLDWIDE REVENUES \n\n| CORNING TECHNOLOGIES 26% | | |\n|---|---|---|\n| CORNING TECHNOLOGIES 26% | | |\n| CORNING TELECOMMUNICATIONS 74% | | |\n| | | |\n\n\n**W H A T W E D I D**\n\nDuring 2002, we relied on our Values to set the context in \nwhich we operated. From there, we focused relentlessly on a \nvery clear plan with three priorities: ", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_GLW_2002.pdf" + "text": "", + "page_start": 21, + "page_end": 21, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "| B A L A N C E | | | | Corning Annual Report 20 02 |\n|---|---|---|---|---|\n| B A L A N C E | | | | Corning Annual Report 20 02 |\n| | B A L A N C E | | | Corning Annual Report 20 02 |\n| | | | | |\n| | | | | |\n", - "page_start": 1, - "page_end": 1, - "source_file": "NYSE_GLW_2002.pdf" + "text": "", + "page_start": 176, + "page_end": 176, + "source_file": "00-80T-80.pdf" }, { - "text": "We know that our shareholders are most eager to see a \n\ngreater return on their investment with Corning, and of \n\ncourse our return to profitability will be key to building back \n\nWall Street’s confidence. We are 100 percent committed \n\nto reaching that goal of profitability in 2003 — and doing \n\nso within the rigorous compliance rules by which we \n\nhave always been guided. Integrity characterizes all our \n\nrelationships, both inside and outside of Corning, and we \n\nwill never compromise that foundation of our reputation. ", - "page_start": 10, - "page_end": 10, - "source_file": "NYSE_GLW_2002.pdf" + "text": "", + "page_start": 21, + "page_end": 21, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "I N V E S T O R I N F O R M AT I O N \nInvestment analysts who need additional information may \ncontact Mr. Kenneth C. Sofio, Manager of Investor Relations, \nCorning Incorporated, HQ-E2-25, Corning, NY 14831; \nTelephone 607.974.9000 \n\nfuture or pending tax legislation, \n— adequacy and availability of insurance, \n— capital resource and cash flow activities, \n— capital spending, \n— equity company activities, \n— interest costs, \n— acquisition and divestiture activity, \n— the rate of technology change, \n— the ability to enforce patents, \n— product performance issues, \n— stock price fluctuations, and \n— other risks detailed in Corning’s SEC filings. \n\nTRANSFER AGENT AND REGISTRAR \nComputershare Investor Services LLC \nP.O. Box A-3504 \nChicago, IL 60690-3504 \nTelephone: 800.255.0461 \nWebsite: www.computershare.com \nNeither this report nor any statement contained herein is \nfurnished in connection with any offering of securities or for \nthe purpose of promoting or influencing the sale of securities. \n\nCHANGE OF ADDRESS \nReport change of address to Computershare \nInvestor Services at the above address. \nCorning is an equal opportunity employer. \nPrinted in USA \n\n© Corning Incorporated 2003 \n\nI N D E P E N D E N T A C C O U N T A N T S \nPricewaterhouseCoopers LLP \n1301 Avenue of the Americas \nNew York, NY 10019 ", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_GLW_2002.pdf" + "text": "", + "page_start": 176, + "page_end": 176, + "source_file": "00-80T-80.pdf" }, { - "text": "— global economic and political conditions, \n— currency fluctuations, \n— product demand and industry capacity, \n— competitive products and pricing, \n�� sufficiency of manufacturing capacity and efficiencies, \n— cost reductions, \n— availability and costs of critical materials, \n— new product development and commercialization, \n— attracting and retaining key personnel, \n— order activity and demand from major customers, \n— fluctuations in capital spending by customers \nin the telecommunications industry and other \nbusiness segments, \nA D D I T I O N A L I N F O R M AT I O N \nA copy of Corning’s 2002 Annual Report on Form 10-K filed \nwith the Securities and Exchange Commission is available \nupon written request to Ms. Denise A. Hauselt, Secretary and \nAssistant General Counsel, Corning Incorporated, HQ-E2-10, \nCorning, NY 14831. The Annual Report on Form 10-K can \nalso be accessed electronically through the Investor Relations \ncategory of the home page on the Internet at: \nwww.corning.com \n\n— financial condition of customers, \n— changes in the mix of sales between premium \nand non-premium products, \n\n— facility expansions and new plant start-up costs, \n— adverse litigation or regulatory developments, including ", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_GLW_2002.pdf" + "text": "", + "page_start": 176, + "page_end": 176, + "source_file": "00-80T-80.pdf" }, { - "text": "C O M M O N S T O C K \nCorning Incorporated common stock is listed on the \nNew York Stock Exchange and the SWX Swiss Exchange. \nIn addition, it is traded on the Boston, Midwest, Pacific \nand Philadelphia stock exchanges. Common stock options \nare traded on the Chicago Board Options Exchange. The \nabbreviated ticker symbol for Corning Incorporated is “GLW.” ", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_GLW_2002.pdf" + "text": "", + "page_start": 176, + "page_end": 176, + "source_file": "00-80T-80.pdf" }, { - "text": "\nCORPORATE GOVERNANCE ", - "page_start": 22, - "page_end": 22, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 176, + "page_end": 176, + "source_file": "00-80T-80.pdf" } ] }, @@ -4305,70 +4305,70 @@ "target_page": 11, "target_passage": "A summary report of the proceedings at the annual meeting will be available without charge upon written request to Ms. Denise A. Hauselt, Secretary and Assistant General Counsel, Corning Incorporated, HQ-E2-10, Corning, NY 14831", "chunk_present": { - "presence": true, - "index": 6 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 344, + "page_end": 344, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 146, + "page_end": 146, + "source_file": "00-80T-80.pdf" }, { - "text": "I N V E S T O R I N F O R M AT I O N \nInvestment analysts who need additional information may \ncontact Mr. Kenneth C. Sofio, Manager of Investor Relations, \nCorning Incorporated, HQ-E2-25, Corning, NY 14831; \nTelephone 607.974.9000 \n\nfuture or pending tax legislation, \n— adequacy and availability of insurance, \n— capital resource and cash flow activities, \n— capital spending, \n— equity company activities, \n— interest costs, \n— acquisition and divestiture activity, \n— the rate of technology change, \n— the ability to enforce patents, \n— product performance issues, \n— stock price fluctuations, and \n— other risks detailed in Corning’s SEC filings. \n\nTRANSFER AGENT AND REGISTRAR \nComputershare Investor Services LLC \nP.O. Box A-3504 \nChicago, IL 60690-3504 \nTelephone: 800.255.0461 \nWebsite: www.computershare.com \nNeither this report nor any statement contained herein is \nfurnished in connection with any offering of securities or for \nthe purpose of promoting or influencing the sale of securities. \n\nCHANGE OF ADDRESS \nReport change of address to Computershare \nInvestor Services at the above address. \nCorning is an equal opportunity employer. \nPrinted in USA \n\n© Corning Incorporated 2003 \n\nI N D E P E N D E N T A C C O U N T A N T S \nPricewaterhouseCoopers LLP \n1301 Avenue of the Americas \nNew York, NY 10019 ", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_GLW_2002.pdf" + "text": "", + "page_start": 55, + "page_end": 55, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "Annual General Meeting \n\nAll shareholders are encouraged to attend and \nparticipate in the Company’s Annual General \nMeeting. Shareholders may attend in person or \nsend a proxy as their representative. \n\nThe Company’s external auditor is routinely \ninvited to and attends the Annual General \nMeeting in order to respond to questions raised \nby shareholders relating to the content and \nconduct of the audit and accounting policies \nadopted by the Company in relation to the \npreparation of the financial statements. \n\nDirectors and senior management may buy or \nsell Company securities in the four week period \nfollowing significant announcements by the \nCompany, including the release of the quarterly \nreport, half-yearly results, the preliminary annual \nresults and the lodgement of the Company’s \nAnnual Report (subject to the prohibition of \ndealing in the Company’s securities if they \npossess unpublished price sensitive information). \n\nThe Company considers that it will benefit from \nits ongoing commitment to promote a diverse \nworkforce with treatment of employees and \nfuture employees on the basis of merit, abilities \nand potential, regardless of gender, colour, \nethnic or national origin, race, disability, age, \nsexual orientation, gender reassignment, socio- \neconomic background, religious or political \nbelief, non / trade union membership, family \ncircumstances or other irrelevant distinction. \nDirectors and senior management must also \nreceive approval from the Chairman before \nbuying or selling Company securities. \n\nThe Company’s Share Trading Policy is available \nin the ‘Corporate Governance’ section of the \nCompany’s website. \nThe Company has set various criteria and proce- \ndures in order to support equality and diversity \nin the workforce and applies these principles to: ", - "page_start": 38, - "page_end": 38, - "source_file": "ASX_KCN_2013.pdf" + "text": "", + "page_start": 147, + "page_end": 147, + "source_file": "00-80T-80.pdf" }, { - "text": "The Audit and Risk Management Committee’s charter and information on the selection and appointment of the Company’s \nexternal auditor is available in the corporate governance section on the Company’s website. Information regarding qualifications \nand meeting attendance can be found in the Directors’ Report of this Annual Report. \n\n**Principle 5: Make Timely and Balanced Disclosure**\n\nThe Company has adopted a Market Disclosure Policy to ensure compliance with its continuous disclosure obligations whereby \nrelevant information that could cause a reasonable person to expect a material effect on, or lead to a substantial movement in, \nthe value of Sundance’s share price, is immediately made available to shareholders and the public as a release to the ASX. D \nConnor, as Company Secretary, has been nominated as the person primarily responsible for communications with the ASX. All \nmaterial information concerning the Company, including its financial situation, performance, ownership and governance is \nposted on the Company’s web site to ensure all investors have equal and timely access. The Market Disclosure Policy is available \nin the corporate governance section on Sundance’s website. \n\n**Principle 6: Respect the Rights of Shareholders**\n\nThe Board fully recognises its responsibility to ensure that its shareholders are informed of all major developments affecting the \nCompany. All shareholders, who have elected to do so, receive a copy of the Company’s Annual Report and the Annual, Half \nYearly and Quarterly Reports are prepared and posted on the Company’s website in accordance with the ASX Listing Rules. \nRegular updates on operations are made via ASX releases. All information disclosed to the ASX is posted on Sundance’s website \nas soon as possible after it is disclosed to the ASX. When analysts are briefed on aspects of the Company’s operation, the material \nused in the presentation is immediately released to the ASX and posted on the Company’s website. Sundance encourages its \nshareholders to attend its annual meetings and to discuss and question its Board and management. The Company’s external \nauditor is requested to attend the annual general meeting and be available to answer shareholder questions about the conduct \nof the audit and the preparation and content of the audit report. The Shareholder Communications Policy is published on the \nCompany’s website under the corporate governance section. ", - "page_start": 54, - "page_end": 54, - "source_file": "ASX_SEA_2014.pdf" + "text": "", + "page_start": 147, + "page_end": 147, + "source_file": "00-80T-80.pdf" }, { - "text": "2002 \nWORLDWIDE REVENUES \n\n| | | 48% CORNING TECHNOLOGIES |\n|---|---|---|\n| | | 48% CORNING TECHNOLOGIES |\n| | | 52% CORNING TELECOMMUNICATIONS |\n| | | |\n", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_GLW_2002.pdf" + "text": "", + "page_start": 55, + "page_end": 55, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "A N N U A L M E E T I N G \nThe annual meeting of shareholders will be held on \nThursday, April 24, 2003, in Corning, NY. A formal notice \nof the meeting together with a proxy statement will be mailed \nto shareholders on or about March 12, 2003. The proxy state- \nment can also be accessed electronically through the Investor \nRelations category of the Corning home page on the Internet \nat www.corning.com. A summary report of the proceedings \nat the annual meeting will be available without charge upon \nwritten request to Ms. Denise A. Hauselt, Secretary and \nAssistant General Counsel, Corning Incorporated, HQ-E2-10, \nCorning, NY 14831. \n\n“ S a f e H a r b o r ” S t a t e m e n t u n d e r t h e P r i v a t e \nS e c u r i t i e s L i t i g a t i o n R e f o r m A c t o f 1 9 9 5 \nThe statements in this annual report that are not historical \nfacts or information are forward-looking statements. These \nforward-looking statements involve risks and uncertainties \nthat may cause the outcome to be materially different. Such \nrisks and uncertainties include, but are not limited to: ", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_GLW_2002.pdf" + "text": "", + "page_start": 55, + "page_end": 55, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "to each exchange where its \nshares are listed: ASX, NASDAQ \nand NZX. The Company Secretary \nis responsible for communications \nwith the exchanges. All material \ninformation disclosed to the ASX \nis posted on the Company’s \nwebsite at www.santos.com. This \nincludes ASX announcements, \nannual reports (including \ntherefore this Corporate \nGovernance Statement), notices \nof meeting, CEO briefings, media \nreleases, and materials presented \nat investor, media and analyst \nbriefings. An email “alert” \nfacility is also offered to \nshareholders. Web-casting of \nmaterial presentations, including \nannual and half-yearly results \npresentations, is provided for \nthe benefit of shareholders, \nregardless of their location. \n\nAdditionally, the Company’s \nexternal auditor attends annual \ngeneral meetings to be available \nto answer shareholder questions \nrelevant to the conduct of \nthe audit. ", - "page_start": 36, - "page_end": 36, - "source_file": "ASX_STO_2004.pdf" + "text": "", + "page_start": 55, + "page_end": 55, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "The second agreement was with Clough Engineering Limited, pursuant to which it agreed to take \n\na placement of 3,225,000 Shares by 29 September 2000, followed by, if approved of by shareholders \n\nat the Company’s annual general meeting, 6,775,000 shares, within 7 days of that meeting. ", - "page_start": 34, - "page_end": 34, - "source_file": "ASX_MRM_2000.pdf" + "text": "", + "page_start": 55, + "page_end": 55, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "In May 1997, the Company registered 400,000 shares of its common instead of the common stock of the Company. The Company has reserved \n\nstock under its 1997 Equity Plan for Non-Employee Directors. This preferred shares necessary for issuance should the rights be exercised. \n\nplan permits the Company to issue to its non-employee directors The Company has entered into change in control employ- \n\noptions to purchase shares of Company common stock, restricted ment agreements with corporate officers and certain other key \n\nstock of the Company, and awards of Company stock. The plan also employees. According to the agreements, a change in control occurs \n\npermits non-employee directors to elect to receive all or a portion of when a third person or entity becomes the beneficial owner of 20% or \n\ntheir annual retainers and other compensation in the form of shares of more of the Company’s common stock or when more than one-third of \n\nCompany common stock. During 2003, 2002, and 2001, 10,922; the Company’s Board of Directors is composed of persons not recom- \n\n11,958; and 8,662 shares of Company common stock were issued mended by at least three-fourths of the incumbent Board of Directors. ", - "page_start": 50, - "page_end": 50, - "source_file": "NYSE_HNI_2003.pdf" + "text": "", + "page_start": 55, + "page_end": 55, + "source_file": "Excel Training Manual 1.pdf" } ] }, @@ -4385,64 +4385,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 380, + "page_end": 380, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 189, + "page_end": 189, + "source_file": "00-80T-80.pdf" }, { - "text": "2002 \nWORLDWIDE REVENUES \n\n| | | 48% CORNING TECHNOLOGIES |\n|---|---|---|\n| | | 48% CORNING TECHNOLOGIES |\n| | | 52% CORNING TELECOMMUNICATIONS |\n| | | |\n", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_GLW_2002.pdf" + "text": "", + "page_start": 190, + "page_end": 190, + "source_file": "00-80T-80.pdf" }, { - "text": "2001 \nWORLDWIDE REVENUES \n\n| CORNING TECHNOLOGIES 26% | | |\n|---|---|---|\n| CORNING TECHNOLOGIES 26% | | |\n| CORNING TELECOMMUNICATIONS 74% | | |\n| | | |\n\n\n**W H A T W E D I D**\n\nDuring 2002, we relied on our Values to set the context in \nwhich we operated. From there, we focused relentlessly on a \nvery clear plan with three priorities: ", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_GLW_2002.pdf" + "text": "", + "page_start": 190, + "page_end": 190, + "source_file": "00-80T-80.pdf" }, { - "text": "I N V E S T O R I N F O R M AT I O N \nInvestment analysts who need additional information may \ncontact Mr. Kenneth C. Sofio, Manager of Investor Relations, \nCorning Incorporated, HQ-E2-25, Corning, NY 14831; \nTelephone 607.974.9000 \n\nfuture or pending tax legislation, \n— adequacy and availability of insurance, \n— capital resource and cash flow activities, \n— capital spending, \n— equity company activities, \n— interest costs, \n— acquisition and divestiture activity, \n— the rate of technology change, \n— the ability to enforce patents, \n— product performance issues, \n— stock price fluctuations, and \n— other risks detailed in Corning’s SEC filings. \n\nTRANSFER AGENT AND REGISTRAR \nComputershare Investor Services LLC \nP.O. Box A-3504 \nChicago, IL 60690-3504 \nTelephone: 800.255.0461 \nWebsite: www.computershare.com \nNeither this report nor any statement contained herein is \nfurnished in connection with any offering of securities or for \nthe purpose of promoting or influencing the sale of securities. \n\nCHANGE OF ADDRESS \nReport change of address to Computershare \nInvestor Services at the above address. \nCorning is an equal opportunity employer. \nPrinted in USA \n\n© Corning Incorporated 2003 \n\nI N D E P E N D E N T A C C O U N T A N T S \nPricewaterhouseCoopers LLP \n1301 Avenue of the Americas \nNew York, NY 10019 ", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_GLW_2002.pdf" + "text": "", + "page_start": 190, + "page_end": 190, + "source_file": "00-80T-80.pdf" }, { - "text": "— global economic and political conditions, \n— currency fluctuations, \n— product demand and industry capacity, \n— competitive products and pricing, \n— sufficiency of manufacturing capacity and efficiencies, \n— cost reductions, \n— availability and costs of critical materials, \n— new product development and commercialization, \n— attracting and retaining key personnel, \n— order activity and demand from major customers, \n— fluctuations in capital spending by customers \nin the telecommunications industry and other \nbusiness segments, \nA D D I T I O N A L I N F O R M AT I O N \nA copy of Corning’s 2002 Annual Report on Form 10-K filed \nwith the Securities and Exchange Commission is available \nupon written request to Ms. Denise A. Hauselt, Secretary and \nAssistant General Counsel, Corning Incorporated, HQ-E2-10, \nCorning, NY 14831. The Annual Report on Form 10-K can \nalso be accessed electronically through the Investor Relations \ncategory of the home page on the Internet at: \nwww.corning.com \n\n— financial condition of customers, \n— changes in the mix of sales between premium \nand non-premium products, \n\n— facility expansions and new plant start-up costs, \n— adverse litigation or regulatory developments, including ", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_GLW_2002.pdf" + "text": "", + "page_start": 190, + "page_end": 190, + "source_file": "00-80T-80.pdf" }, { - "text": "**Research and Development**\n\nResearch and development continues to be a vital part of the Company's strategy to extend existing brands and expand into new branded items. The \nexpenditures for research and development for fiscal 2003, 2002 and 2001, respectively, were $13,165,000, $12,097,000 and $11,478,000. There are 42 \nprofessional employees engaged in full time research, 19 in the area of improving existing products and 23 in developing new products. \n\n**Employees**\n\nAs of October 25, 2003, the Company had over 16,000 active employees. ", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_HRL_2004.pdf" + "text": "", + "page_start": 190, + "page_end": 190, + "source_file": "00-80T-80.pdf" }, { - "text": "The wireless industry in the late 1990’s became increasingly competitive and the Company was not immune to these \nindustry issues. The Clear PaySM program, introduced by Sprint as a no-deposit offering in 2001, attracted high credit \nrisk customers in the Company’s markets. As the results began to materialize, the Company implemented deposits on \nthis program (mid-April 2002), and experienced high levels of customer turnover (churn) and uncollectable accounts. \nThe write-offs of uncollectable accounts peaked in the third quarter of 2002. During the fourth quarter of 2002 there \nwas some evidence that the strengthened credit policy was having a favorable impact. Nonetheless, the 2002 net loss \nin the PCS operation was $5.4 million, as compared to $5.5 million in 2001. Despite the disappointing financial results \nfor 2002, the PCS customer base grew by over 40%. While the PCS operation was adding customers, the cellular \noperation continued to lose its local customer base. \n\nThe growing belief that national branding was critical to our wireless operations, the expectation that roaming revenues \nfrom our analog cellular operation would not continue to grow, and the increase in the number of wireless competitors \nin our markets, prompted the Company to exit the cellular business in order to focus on our PCS operations. The \nCompany entered into an agreement on November 21, 2002, to sell its 66% ownership interest in the Virginia 10 RSA \ncellular operation which was classified as a discontinued operation. The closing occurred February 28, 2003. The \nCompany received $37.0 million in proceeds, including $5.0 million in escrow for two years and $1.7 million for \nworking capital. ", + "text": "", "page_start": 42, "page_end": 42, - "source_file": "NASDAQ_SHEN_2003.pdf" + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "| B A L A N C E | | | | Corning Annual Report 20 02 |\n|---|---|---|---|---|\n| B A L A N C E | | | | Corning Annual Report 20 02 |\n| | B A L A N C E | | | Corning Annual Report 20 02 |\n| | | | | |\n| | | | | |\n", - "page_start": 1, - "page_end": 1, - "source_file": "NYSE_GLW_2002.pdf" + "text": "", + "page_start": 42, + "page_end": 42, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "production. Also, the Company terminated a restaurant lease and closed two \nmarketing offices, resulting in $4 million of contract termination charges. Other \nseverance of $1 million in 2003 related primarily to restructuring of table games \nstaffing at several resorts. \n\nThe Company recorded $3 million of restructuring charges in December 2002 \nrelated to contract termination costs for a restaurant and the EFX! show at MGM \nGrand Las Vegas. In December 2002, the Company recorded a restructuring credit \nof $10 million related to a lease contract termination accrual originally recorded in \nJune 2000. In December 2002 management determined that payment under this \nobligation was not probable. In 2001, management responded to a decline in busi- \nness volumes caused by the September 11 attacks by implementing cost contain- \nment strategies which included a significant reduction in payroll and a refocusing of \nseveral of the Company’s marketing programs. This resulted in a $22 million charge \nagainst earnings. As a result of improving business levels and the Company’s success \nat re-hiring a substantial number of previously laid off or terminated employees, \nmanagement determined in 2002 that a portion of the remaining accrual would \nnow not be necessary. This resulted in a restructuring credit of $10 million. ", - "page_start": 74, - "page_end": 74, - "source_file": "NYSE_MGM_2004.pdf" + "text": "", + "page_start": 42, + "page_end": 42, + "source_file": "Excel Training Manual 1.pdf" } ] }, @@ -4459,64 +4459,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 164, + "page_end": 164, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 199, + "page_end": 199, + "source_file": "00-80T-80.pdf" }, { - "text": "**1.1 Shortcut function:**\n\n1) Swipe to the left till you find the \"+\" icon, click the icon to add part of the functions in the \nshortcut. \n2) Scroll down the screen when the watch is in the dial interface, you can find Bluetooth \nconnection status, time, power, brightness adjustment and other functions. ", - "page_start": 2, - "page_end": 2, - "source_file": "6126797.pdf" + "text": "", + "page_start": 199, + "page_end": 199, + "source_file": "00-80T-80.pdf" }, { - "text": " Log in as NFP or PM \n Hover the cursor on the “Users Management” tab and click on the “Users Administration” button. (see figure 21); \nthis opens the Disable/Enable User screen (figure 22). \n\n***Figure 21. Users Administration***\n\n***3.3.2.1 Enable User***\nOn the Disable/Enable screen, search for the user whose account should be activated and \nun-tick the ‘Disabled’ box. (figure 22a). ", - "page_start": 15, - "page_end": 15, - "source_file": "maiis-user-manual.pdf" + "text": "", + "page_start": 29, + "page_end": 29, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "Pro tip: If you selected whole words for this exercise, did you notice that Word popped up a \nlittle toolbar, with the font formatting options? \n\nBetween that and keyboard shortcuts like Ctrl+B \nand Ctrl+I, you save time by not having to go up to \nthe Home tab all the time. ", - "page_start": 4, - "page_end": 4, - "source_file": "welcome_to_word_template.pdf" + "text": "", + "page_start": 199, + "page_end": 199, + "source_file": "00-80T-80.pdf" }, { - "text": "Figure 5-20 Opening the Overview pane \n\nNext, we describe the structure of the pane and how to navigate to various system \ncomponents to manage them more efficiently and quickly. \n\n**5.3.1 Content-based organization**\n\nThe following sections describe several view options within the GUI in which you can filter (to \nminimize the amount of data that is shown on the window), sort, and reorganize the content of \nthe window. ", - "page_start": 165, - "page_end": 165, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 398, + "page_end": 398, + "source_file": "00-80T-80.pdf" }, { - "text": "**12.**Paragraph 10 does not require P to remain in self-isolation from a person (“V”) when V is at \n\nthe place where P is self-isolating in exceptional circumstances such as— \n\n(a) to provide emergency assistance; \n(b) to provide care or assistance, including relevant personal care within the meaning of \nparagraph 1(1B) or 7(3B) of Schedule 4 to the Safeguarding Vulnerable Groups Act \n2006(**a**); \n\n(c) to provide medical assistance to P or to any other person who is staying in the place \nwhere P is self-isolating where this is required urgently or on the advice of a registered \nmedical practitioner; \n\n(d) to provide veterinary services where this is required urgently or on the advice of a \n\nveterinary surgeon; \n\n(e) to provide critical public services including social services or services provided to victims \n(such as victims of crime). \n\n**Permitted reasons to leave or be outside place of self-isolation**\n\n**13.**—(1) During the period of their self-isolation P may not leave or be outside of the place \n\nwhere P is self-isolating except— \n\n(a) to travel directly to a port to leave the common travel area; \n(b) to fulfil a legal obligation, including attending court or satisfying bail conditions or to \n\nparticipate in legal proceedings; \n\n(c) to take exercise; ", - "page_start": 77, - "page_end": 77, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 199, + "page_end": 199, + "source_file": "00-80T-80.pdf" }, { - "text": "**Try This Yourself:**\n\n", - "page_start": 18, - "page_end": 18, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 199, + "page_end": 199, + "source_file": "00-80T-80.pdf" }, { - "text": "**Try This Yourself:**\n\n", - "page_start": 58, - "page_end": 58, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 199, + "page_end": 199, + "source_file": "00-80T-80.pdf" }, { - "text": "**Handy to Know…**\n Once an object is selected, be it a chart, a \n\nlegend on the chart, or the like, you can right- \nclick on the object to see a shortcut menu \nspecific to the selected object. ", - "page_start": 48, - "page_end": 48, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 199, + "page_end": 199, + "source_file": "00-80T-80.pdf" } ] }, @@ -4533,64 +4533,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 16, + "page_end": 16, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 118, + "page_end": 118, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n-I ", - "page_start": 334, - "page_end": 334, + "text": "", + "page_start": 117, + "page_end": 117, "source_file": "00-80T-80.pdf" }, { - "text": "\n-I ", - "page_start": 270, - "page_end": 270, + "text": "", + "page_start": 422, + "page_end": 422, "source_file": "00-80T-80.pdf" }, { - "text": "\ni ", - "page_start": 388, - "page_end": 388, + "text": "", + "page_start": 422, + "page_end": 422, "source_file": "00-80T-80.pdf" }, { - "text": " I ", - "page_start": 108, - "page_end": 108, + "text": "", + "page_start": 422, + "page_end": 422, "source_file": "00-80T-80.pdf" }, { - "text": " I ", - "page_start": 169, - "page_end": 169, + "text": "", + "page_start": 117, + "page_end": 117, "source_file": "00-80T-80.pdf" }, { - "text": "1.6 \n\nÌ \n\nÌ \nÌ \nÌ \nÌ \n\nÌ \n\n(.1) \n\nÌ \n\n(.1) \nÌ \nÌ \nÌ \n\nÌ \n\nÌ \n\nÌ \n\n.1 \n\nÌ ", - "page_start": 63, - "page_end": 63, - "source_file": "NYSE_RSG_2004.pdf" + "text": "", + "page_start": 118, + "page_end": 118, + "source_file": "00-80T-80.pdf" }, { - "text": "\n-I- ", - "page_start": 187, - "page_end": 187, + "text": "", + "page_start": 118, + "page_end": 118, "source_file": "00-80T-80.pdf" }, { - "text": "Ì \n\nÌ \n\n880.7 \n177.6 \n(19.0) \nÌ (300.1) \nÌ \nÌ \nÌ \n\nÌ (184.2) \n\nÌ Ì \n\nÌ Ì \n\n1,039.3 \n237.9 \n(54.6) \nÌ (484.3) \nÌ \nÌ \nÌ \n\nÌ Ì \n\nÌ Ì \n\nÌ (266.1) \n\nÌ Ì \n\nÌ Ì ", - "page_start": 63, - "page_end": 63, - "source_file": "NYSE_RSG_2004.pdf" + "text": "", + "page_start": 118, + "page_end": 118, + "source_file": "00-80T-80.pdf" } ] }, @@ -4607,64 +4607,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 339, + "page_end": 339, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 185, + "page_end": 185, + "source_file": "00-80T-80.pdf" }, { - "text": "From this window, you can view and configure a syslog server to receive log messages from \nvarious systems and store them in a central repository by entering the following information: \n\n(cid:2) IP Address \n\nThe IP address for the syslog server. \n\n(cid:2) Facility \n\nThe facility determines the format for the syslog messages. The facility can be used to \ndetermine the source of the message. \n\n(cid:2) Message Format \n\nThe message format depends on the facility. The system can transmit syslog messages in \nthe following formats: \n\n– The concise message format provides standard detail about the event. \n– The expanded format provides more details about the event. \n\n(cid:2) Event Notifications \n\nConsider the following points about event notifications: \n\n– Select**Error**if you want the user to receive messages about problems, such as \nhardware failures, that must be resolved immediately. \n\n**Important:**Browse to**Recommended Actions**to run the fix procedures on these \nnotifications. \n\n– Select**Warning**if you want the user to receive messages about problems and \n\nunexpected conditions. Investigate the cause immediately to determine whether any \ncorrective action is necessary. \n\n**Important:**Browse to**Recommended Actions**to run the fix procedures on these \nnotifications. ", - "page_start": 187, - "page_end": 187, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "Figure 13-63 Add SNMP Server \n\n**13.7.4 Syslog notifications**\n\nThe syslog protocol is a standard protocol for forwarding log messages from a sender to a \nreceiver on an IP network. The IP network can be IPv4 or IPv6. The system can send syslog \nmessages that notify personnel about an event. \n\nYou can configure a syslog server to receive log messages from various systems and store \nthem in a central repository by entering the following information (see Figure 13-64 on \npage 725): \n\n(cid:2) IP Address \n\nThe IP address for the syslog server. \n\n(cid:2) Facility \n\nThe facility determines the format for the syslog messages. The facility can be used to \ndetermine the source of the message. \n\n(cid:2) Message Format \n\nThe message format depends on the facility. The system can transmit syslog messages in \nthe following formats: \n\n– The concise message format provides standard detail about the event. ", - "page_start": 746, - "page_end": 746, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 184, + "page_end": 184, + "source_file": "00-80T-80.pdf" }, { - "text": "By default, your chats will be arranged along the left-hand side of the chat \npanel, with the most recent messages at the top. You can right-click on any \nchat and select \"Pin,\" which will keep it at the top of your list for quick access. ", - "page_start": 4, - "page_end": 4, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + "text": "", + "page_start": 184, + "page_end": 184, + "source_file": "00-80T-80.pdf" }, { - "text": "\nA MESSAGE FROM THE CHAIRMAN ", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 184, + "page_end": 184, + "source_file": "00-80T-80.pdf" }, { - "text": "| | AN\nTeams\nGeneral A team is a broad group of people that work together to get something\ndone. You can choose who is part of the team, and people can only access\nMarketing\nshared content by invitation. All teams are created with an associated\nShared Channel\nGeneral channel that includes all team members by default.\nChannels\nA channel is a central hub for a specific topic, within the larger team, where\npeople can hold focused conversations and organize a library of files.\nChannels can be:\n• Standard (visible to everyone on the team)\n• Private (only visible to select team members)\n• Shared (visible to invited team members and external members of your\norganization who are not on the team)\nCreate a team for your organization with channels for your leadership team,\nTip\neach department, and one just for fun! | AN | | |\n|---|---|---|---|---|\n| | AN Teams General A team is a broad group of people that work together to get something done. You can choose who is part of the team, and people can only access Marketing shared content by invitation. All teams are created with an associated Shared Channel General channel that includes all team members by default. Channels A channel is a central hub for a specific topic, within the larger team, where people can hold focused conversations and organize a library of files. Channels can be: • Standard (visible to everyone on the team) • Private (only visible to select team members) • Shared (visible to invited team members and external members of your organization who are not on the team) Create a team for your organization with channels for your leadership team, Tip each department, and one just for fun! | AN | | |\n| | | | | |\n| | | | General Marketing Shared Channel | |\n| 1:1 Chat Daichi, Eva, +2 11:00 AM Group Chat Yes, that should work for us Marketing Sync 10:45 AM Meeting Chat Sharing notes after the meeting To share a file select “Attach” under the box where you type messages, select the file location and then the file you want. Depending on the location of the file, you’ll get options for uploading a copy, sharing a link, or other ways to share. When you create group chats you can edit the name of the group by selecting the pen symbol Tip next to the group icon in the chat. This will help you give it context and make it easier to find. | | | | |\n", - "page_start": 4, - "page_end": 4, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + "text": "", + "page_start": 10, + "page_end": 10, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "Enable the SMS notification in the app. When one or more SMS messages are received on the \nmobile phone, the watch will receive one or more SMS reminders at the same time. \n1.5.3. Other application message notifications: \nTurn on the corresponding application message notification in the app, such as WeChat, QQ, \nOutlook, Facebook and other applications. When the mobile phone receives one/multiple \napplication message notifications, the watch will receive one/multiple corresponding message \nreminders at the same time. \n\n**1.6 Frequently used contacts**\n\nThe watch binds to the app, and you allow the watch to access to the phone book of your mobile \nphone, then you can synchronize you contacts of your mobile phone to the smartwatch. \n\n**1.7 Fitness data**\n\nFitness data is turned on by default. When you enter the fitness data interface, scroll up the \nscreen, the smartwatch will display the current data of steps, distance, and calories. The data will \nbe wiped out at 00:00 every day in the morning. \n\n**1.8 Sports modes**(walking, running, cycling, rope skipping, badminton, \n\nbasketball, football) \n\n1.8.1 Select the corresponding exercise mode, click the “Start” button on the screen to start the \nexercise; click the “Start” button again to pause the recording of the exercise; click the “End” \nbutton to end the recording, and save to the data. \n1.8.2 The data can only be saved when the recording of the exercise is more than 1 minute; If the \nrecording time is less than 1 minute, the smartwatch will remind you that the data is too little to be \nsaved. ", - "page_start": 4, - "page_end": 4, - "source_file": "6126797.pdf" + "text": "", + "page_start": 184, + "page_end": 184, + "source_file": "00-80T-80.pdf" }, { - "text": "**Tips:**For more information about the codes for each message type that is logged in the \nsystem log, see Chapter 2, “Common Server Messages”, in*IBM Content Manager*\n*OnDemand - Messages and Codes*, SC27-1379. For example, message number 87 is \nlisted as ARS0087I. ", - "page_start": 277, - "page_end": 277, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 184, + "page_end": 184, + "source_file": "00-80T-80.pdf" }, { - "text": "**Syslog notifications**\nThe syslog protocol is a standard protocol for forwarding log messages from a sender to a \nreceiver on an IP network. The IP network can be IPv4 or IPv6. The system can send syslog \nmessages that notify personnel about an event. You can use the Syslog pane to view the \nSyslog messages that are sent by the IBM Storwize V7000. To view the Syslog configuration, \nuse the System pane and point to**Settings**and click**Notification**→**Syslog**(see \nFigure 5-55). ", - "page_start": 186, - "page_end": 186, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_CHK_2010.pdf" } ] }, @@ -4681,64 +4681,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 154, + "page_end": 154, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 415, + "page_end": 415, + "source_file": "00-80T-80.pdf" }, { - "text": "qualified unless, he or she- \n\n(a) \n(b) \n(c) is a citizen of Botswana by birth or descent; \nhas attained the age of 30 years; and \nis qualified to be elected as a Member of the National Assembly. \n\n(2) Notwithstanding any other law to the contrary, for the purposes of this section \n\nand section 39- \n\n(a) \n\nthe term \"citizen by birth\" shall be understood to include only those persons \nwho became citizens of Botswana prior to the amendment of the law relating to \ncitizenship by the Citizenship Act; \nany person who, although his or her father was a citizen of Botswana at the \ntime of that person's birth, had, by virtue of his or her having been born outside \nBotswana, to be registered as a citizen of Botswana, under the law relating to \n\n(b) ", - "page_start": 18, - "page_end": 18, - "source_file": "Botswana-constitution.pdf" + "text": "", + "page_start": 39, + "page_end": 39, + "source_file": "sg246915.pdf" }, { - "text": "(10) Where a tribunal appointed under subsection (9) advises the President that \n\nthe Secretary ought to be removed for inability to perform the functions of his or her \noffice or for misbehaviour, the President shall remove him or her from office. \n\n(11) If the question of removing the Secretary from office has been referred to a \ntribunal under subsection (9) of this section, the President may suspend him or her from \nperforming the functions of his or her office, and any such suspension may at any time \nbe revoked by the President and shall cease to have effect if the tribunal advises the \nPresident that the Secretary ought not to be removed from office. \n**67. The franchise**\n\n(1) A person who- \n\n(a) \n\nis a citizen of Botswana or of any other country to which this section is applied \nby Parliament; \nhas attained the age of 18 years; and \nhas either resided in Botswana for a continuous period of at least 12 months \nimmediately preceding the date on which he or she applies for registration as a \nvoter or was born in Botswana and is domiciled in Botswana on the date on \nwhich he or she applies for registration as a voter, \n\n(b) \n(c) \n\nshall, unless he or she is disqualified for registration as a voter under any law, be \nentitled, upon his or her making application in that behalf at such time and in such \nmanner as may be prescribed by any law, to be registered as a voter for the purposes of \nelections of Elected Members of the National Assembly, and no other person may be so \nregistered. ", - "page_start": 32, - "page_end": 32, - "source_file": "Botswana-constitution.pdf" + "text": "", + "page_start": 39, + "page_end": 39, + "source_file": "sg246915.pdf" }, { - "text": "her lawful detention shall not be held to be inconsistent with or in contravention of this \nsection. \n\n(3) Nothing contained in or done under the authority of any law shall be held to \n\nbe inconsistent with or in contravention of this section to the extent that the law in \nquestion makes provision- \n\n(a) \n\nfor the imposition of restrictions that are reasonably required in the interests of \ndefence, public safety, public order, public morality or public health or the \nimposition of restrictions on the acquisition or use by any person of land or \nother property in Botswana and except so far as that provision or, as the case \nmay be, the thing done under the authority thereof, is shown not to be \nreasonably justifiable in a democratic society; \nfor the imposition of restrictions on the freedom of movement of any person who \nis not a citizen of Botswana; \nfor the imposition of restrictions on the entry into or residence within defined \nareas of Botswana of persons who are not Bushmen to the extent that such \nrestrictions are reasonably required for the protection or well-being of Bushmen; \nfor the imposition of restrictions upon the movement or residence within \nBotswana of public officers; or \n....... \n\n(d) \n\n(e) \n\n(4) If any person whose freedom of movement has been restricted by order ", - "page_start": 13, - "page_end": 13, - "source_file": "Botswana-constitution.pdf" + "text": "", + "page_start": 39, + "page_end": 39, + "source_file": "sg246915.pdf" }, { - "text": "and except so far as that provision or, as the case may be, the thing done under the \nauthority thereof is shown not to be reasonably justifiable in a democratic society. \n**14. Protection of freedom of movement**\n\n(1) No person shall be deprived of his or her freedom of movement, and for the \n\npurposes of this section the said freedom means the right to move freely throughout \nBotswana, the right to reside in any part of Botswana, the right to enter Botswana and \nimmunity from expulsion from Botswana. \n\n(2) Any restriction on a person's freedom of movement that is involved in his or ", - "page_start": 12, - "page_end": 12, - "source_file": "Botswana-constitution.pdf" + "text": "", + "page_start": 39, + "page_end": 39, + "source_file": "sg246915.pdf" }, { - "text": "(2) A person who has not continuously resided in Botswana for the period \n\nmentioned in paragraph (c) of subsection (1) of this section but has during the whole \nperiod retained his or her residence (or if he or she has more than one residence, his or \nher principal residence) in Botswana and has been absent therefrom for some temporary \npurpose only shall be deemed for the purposes of the said paragraph (c) to have been \nresident in Botswana during such absence. \n\n(3) A person shall be entitled to be registered as a voter- \n\n(a) in the constituency in which he or she has his or her residence, or if he or she ", - "page_start": 32, - "page_end": 32, - "source_file": "Botswana-constitution.pdf" + "text": "", + "page_start": 93, + "page_end": 93, + "source_file": "00-80T-80.pdf" }, { - "text": "for his or her education or welfare during any period ending not later than the \ndate when he or she attains the age of 18 years; \nfor the purpose of preventing the spread of an infectious or contagious disease; \nin the case of a person who is, or is reasonably suspected to be, of unsound \nmind, addicted to drugs or alcohol, or a vagrant, for the purpose of his or her \ncare or treatment or the protection of the community; \nfor the purpose of preventing the unlawful entry of that person into Botswana, or \nfor the purpose of effecting the expulsion, extradition or other lawful removal of \nthat person from Botswana, or for the purpose of restricting that person while he \nor she is being conveyed through Botswana in the course of his or her \nextradition or removal as a convicted prisoner from one country to another; \nto such extent as may be necessary in the execution of a lawful order requiring \nthat person to remain within a specified area within Botswana or prohibiting him \nor her from being within such an area, or to such extent as may be reasonably \njustifiable for the taking of proceedings against that person relating to the \nmaking of any such order, or to such extent as may be reasonably justifiable for \nrestraining that person during any visit that he or she is permitted to make to \nany part of Botswana in which, in consequence of any such order, his or her \npresence would otherwise be unlawful; or \nfor the purpose of ensuring the safety of aircraft in flight. ", - "page_start": 6, - "page_end": 6, - "source_file": "Botswana-constitution.pdf" + "text": "", + "page_start": 415, + "page_end": 415, + "source_file": "00-80T-80.pdf" }, { - "text": "**PART III**\n**Executive Functions (ss 47-56)**\n\n**47. Functions of President**\n\n(1) The executive power of Botswana shall vest in the President and, subject to \n\nthe provisions of this Constitution, shall be exercised by him or her either directly or \nthrough officers subordinate to him or her. \n\n(2) In the exercise of any function conferred upon him or her by this Constitution \nor any other law the President shall, unless it is otherwise provided, act in his or her own \ndeliberate judgment and shall not be obliged to follow the advice tendered by any other \n\n(1) The Cabinet shall be responsible for advising the President with respect to \n\nthe policy of the Government and with respect to such other matters as may be referred \nto it by the President and shall, subject to the provisions of this Constitution, be \nresponsible to the National Assembly for all things done by or under the authority of the \nPresident, Vice-President or any Minister in the execution of his or her office. \n\n(2) The President shall, so far as practicable and subject to the provisions of this \n\nConstitution, consult the Cabinet on matters of policy and the exercise of his or her \nfunctions. \n\n(3) The obligation of the President to consult his or her Cabinet and for the \nCabinet to accept responsibility under this section shall not apply to the exercise by the \nPresident of his or her powers in relation to the appointment or removal of the Vice- \nPresident, Ministers and Assistant Ministers, the dissolution of Parliament, the \nPrerogative of Mercy, the assignment of responsibility to the Vice-President or any \nMinister and the specification of the functions of an Assistant Minister. \n\n(4) A Minister shall be responsible, under the direction of the President, for such \n\nbusiness of the government of Botswana (including the administration of any department \nof Government) as the President may assign to him or her. ", - "page_start": 23, - "page_end": 23, - "source_file": "Botswana-constitution.pdf" + "text": "", + "page_start": 93, + "page_end": 93, + "source_file": "00-80T-80.pdf" }, { - "text": "Assembly who- \n\n(a) \n\nis, by virtue of his or her own act, under any acknowledgement of allegiance, \nobedience or adherence to a foreign power or state; \nhas been declared insolvent or adjudged or otherwise declared bankrupt under \nany law for the time being in force in Botswana and has not been discharged, or \nhas made a composition with his or her creditors and has not paid his or her \ndebts in full; \nis certified to be insane or otherwise adjudged or declared to be of unsound \nmind under any law for the time being in force in Botswana; \nis a Member of the Ntlo ya Dikgosi; \nsubject to such exceptions as may be prescribed by Parliament, holds any \npublic office, or is acting in any public office by virtue of a contract of service \nexpressed to continue for a period exceeding six months; \nis under sentence of death imposed on him or her by a court in any part of the \nCommonwealth, or is under a sentence of imprisonment (by whatever name \ncalled) exceeding six months imposed on him or her by such a court or \nsubstituted by competent authority for some other sentence imposed on him or \nher by such a court; \nholds, or is acting in, any office the functions of which involve any responsibility \nfor, or in connection with, the conduct of any elections to the Assembly or the \ncompilation or revision of any electoral register for the purposes of such \nelections. \n\n(b) ", - "page_start": 28, - "page_end": 28, - "source_file": "Botswana-constitution.pdf" + "text": "", + "page_start": 415, + "page_end": 415, + "source_file": "00-80T-80.pdf" } ] }, @@ -4755,64 +4755,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 140, + "page_end": 140, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 189, + "page_end": 189, + "source_file": "00-80T-80.pdf" }, { - "text": "and except so far as that provision or, as the case may be, the thing done under the \nauthority thereof is shown not to be reasonably justifiable in a democratic society. \n**14. Protection of freedom of movement**\n\n(1) No person shall be deprived of his or her freedom of movement, and for the \n\npurposes of this section the said freedom means the right to move freely throughout \nBotswana, the right to reside in any part of Botswana, the right to enter Botswana and \nimmunity from expulsion from Botswana. \n\n(2) Any restriction on a person's freedom of movement that is involved in his or ", - "page_start": 12, - "page_end": 12, - "source_file": "Botswana-constitution.pdf" + "text": "", + "page_start": 187, + "page_end": 187, + "source_file": "00-80T-80.pdf" }, { - "text": "her lawful detention shall not be held to be inconsistent with or in contravention of this \nsection. \n\n(3) Nothing contained in or done under the authority of any law shall be held to \n\nbe inconsistent with or in contravention of this section to the extent that the law in \nquestion makes provision- \n\n(a) \n\nfor the imposition of restrictions that are reasonably required in the interests of \ndefence, public safety, public order, public morality or public health or the \nimposition of restrictions on the acquisition or use by any person of land or \nother property in Botswana and except so far as that provision or, as the case \nmay be, the thing done under the authority thereof, is shown not to be \nreasonably justifiable in a democratic society; \nfor the imposition of restrictions on the freedom of movement of any person who \nis not a citizen of Botswana; \nfor the imposition of restrictions on the entry into or residence within defined \nareas of Botswana of persons who are not Bushmen to the extent that such \nrestrictions are reasonably required for the protection or well-being of Bushmen; \nfor the imposition of restrictions upon the movement or residence within \nBotswana of public officers; or \n....... \n\n(d) \n\n(e) \n\n(4) If any person whose freedom of movement has been restricted by order ", - "page_start": 13, - "page_end": 13, - "source_file": "Botswana-constitution.pdf" + "text": "", + "page_start": 187, + "page_end": 187, + "source_file": "00-80T-80.pdf" }, { - "text": "qualified unless, he or she- \n\n(a) \n(b) \n(c) is a citizen of Botswana by birth or descent; \nhas attained the age of 30 years; and \nis qualified to be elected as a Member of the National Assembly. \n\n(2) Notwithstanding any other law to the contrary, for the purposes of this section \n\nand section 39- \n\n(a) \n\nthe term \"citizen by birth\" shall be understood to include only those persons \nwho became citizens of Botswana prior to the amendment of the law relating to \ncitizenship by the Citizenship Act; \nany person who, although his or her father was a citizen of Botswana at the \ntime of that person's birth, had, by virtue of his or her having been born outside \nBotswana, to be registered as a citizen of Botswana, under the law relating to \n\n(b) ", - "page_start": 18, - "page_end": 18, - "source_file": "Botswana-constitution.pdf" + "text": "", + "page_start": 187, + "page_end": 187, + "source_file": "00-80T-80.pdf" }, { - "text": "for his or her education or welfare during any period ending not later than the \ndate when he or she attains the age of 18 years; \nfor the purpose of preventing the spread of an infectious or contagious disease; \nin the case of a person who is, or is reasonably suspected to be, of unsound \nmind, addicted to drugs or alcohol, or a vagrant, for the purpose of his or her \ncare or treatment or the protection of the community; \nfor the purpose of preventing the unlawful entry of that person into Botswana, or \nfor the purpose of effecting the expulsion, extradition or other lawful removal of \nthat person from Botswana, or for the purpose of restricting that person while he \nor she is being conveyed through Botswana in the course of his or her \nextradition or removal as a convicted prisoner from one country to another; \nto such extent as may be necessary in the execution of a lawful order requiring \nthat person to remain within a specified area within Botswana or prohibiting him \nor her from being within such an area, or to such extent as may be reasonably \njustifiable for the taking of proceedings against that person relating to the \nmaking of any such order, or to such extent as may be reasonably justifiable for \nrestraining that person during any visit that he or she is permitted to make to \nany part of Botswana in which, in consequence of any such order, his or her \npresence would otherwise be unlawful; or \nfor the purpose of ensuring the safety of aircraft in flight. ", - "page_start": 6, - "page_end": 6, - "source_file": "Botswana-constitution.pdf" + "text": "", + "page_start": 187, + "page_end": 187, + "source_file": "00-80T-80.pdf" }, { - "text": "(10) Where a tribunal appointed under subsection (9) advises the President that \n\nthe Secretary ought to be removed for inability to perform the functions of his or her \noffice or for misbehaviour, the President shall remove him or her from office. \n\n(11) If the question of removing the Secretary from office has been referred to a \ntribunal under subsection (9) of this section, the President may suspend him or her from \nperforming the functions of his or her office, and any such suspension may at any time \nbe revoked by the President and shall cease to have effect if the tribunal advises the \nPresident that the Secretary ought not to be removed from office. \n**67. The franchise**\n\n(1) A person who- \n\n(a) \n\nis a citizen of Botswana or of any other country to which this section is applied \nby Parliament; \nhas attained the age of 18 years; and \nhas either resided in Botswana for a continuous period of at least 12 months \nimmediately preceding the date on which he or she applies for registration as a \nvoter or was born in Botswana and is domiciled in Botswana on the date on \nwhich he or she applies for registration as a voter, \n\n(b) \n(c) \n\nshall, unless he or she is disqualified for registration as a voter under any law, be \nentitled, upon his or her making application in that behalf at such time and in such \nmanner as may be prescribed by any law, to be registered as a voter for the purposes of \nelections of Elected Members of the National Assembly, and no other person may be so \nregistered. ", - "page_start": 32, - "page_end": 32, - "source_file": "Botswana-constitution.pdf" + "text": "", + "page_start": 13, + "page_end": 13, + "source_file": "NASDAQ_EEFT_2000.pdf" }, { - "text": "(2) A person who has not continuously resided in Botswana for the period \n\nmentioned in paragraph (c) of subsection (1) of this section but has during the whole \nperiod retained his or her residence (or if he or she has more than one residence, his or \nher principal residence) in Botswana and has been absent therefrom for some temporary \npurpose only shall be deemed for the purposes of the said paragraph (c) to have been \nresident in Botswana during such absence. \n\n(3) A person shall be entitled to be registered as a voter- \n\n(a) in the constituency in which he or she has his or her residence, or if he or she ", - "page_start": 32, - "page_end": 32, - "source_file": "Botswana-constitution.pdf" + "text": "", + "page_start": 187, + "page_end": 187, + "source_file": "00-80T-80.pdf" }, { - "text": "Assembly who- \n\n(a) \n\nis, by virtue of his or her own act, under any acknowledgement of allegiance, \nobedience or adherence to a foreign power or state; \nhas been declared insolvent or adjudged or otherwise declared bankrupt under \nany law for the time being in force in Botswana and has not been discharged, or \nhas made a composition with his or her creditors and has not paid his or her \ndebts in full; \nis certified to be insane or otherwise adjudged or declared to be of unsound \nmind under any law for the time being in force in Botswana; \nis a Member of the Ntlo ya Dikgosi; \nsubject to such exceptions as may be prescribed by Parliament, holds any \npublic office, or is acting in any public office by virtue of a contract of service \nexpressed to continue for a period exceeding six months; \nis under sentence of death imposed on him or her by a court in any part of the \nCommonwealth, or is under a sentence of imprisonment (by whatever name \ncalled) exceeding six months imposed on him or her by such a court or \nsubstituted by competent authority for some other sentence imposed on him or \nher by such a court; \nholds, or is acting in, any office the functions of which involve any responsibility \nfor, or in connection with, the conduct of any elections to the Assembly or the \ncompilation or revision of any electoral register for the purposes of such \nelections. \n\n(b) ", - "page_start": 28, - "page_end": 28, - "source_file": "Botswana-constitution.pdf" + "text": "", + "page_start": 187, + "page_end": 187, + "source_file": "00-80T-80.pdf" }, { - "text": "Parliament may make provision under which, if the Appropriation Act in respect \nof any financial year has not come into operation by the beginning of that financial year, \nthe President may authorize the withdrawal of moneys from the Consolidated Fund for \nthe purpose of meeting expenditure necessary to carry on the services of the \nGovernment until the expiration of four months from the beginning of that financial year \nor the coming into operation of the Appropriation Act, whichever is the earlier. \n**121. Contingencies Fund**\n\n(1) Parliament may make provision for the establishment of a Contingencies \n\nFund and for authorizing the President, if satisfied that there has arisen an urgent and \nunforeseen need for expenditure for which no other provision exists, to make advances \nfrom that Fund to meet that need. \n\n(2) Where any advance is made from the Contingencies Fund, a supplementary \nestimate shall be laid before the National Assembly as soon as possible for the purpose \nof replacing the amount so advanced. \n\n(1) There shall be charged on the Consolidated Fund all debt charges for which \n\nBotswana is liable. \n\n(2) For the purposes of this section debt charges include interest, sinking fund \ncharges, the repayment or amortization of debt, and all expenditure in connection with \nthe raising of loans on the security of the revenues or the Consolidated Fund of the \nformer Protectorate of Bechuanaland or Botswana, and the service and redemption of \ndebt thereby created. \n**124. Auditor-General**\n\n(1) There shall be an Auditor-General, whose office shall be a public office. \n(2) The public accounts of Botswana and of all officers, courts and authorities of \n\nthe Government of Botswana shall be audited and reported on by the Auditor-General \nand for that purpose the Auditor-General or any person authorized by him or her in that \nbehalf shall have access to all books, records, reports and other documents relating to \nthose accounts: \n\nProvided that, if it is so provided by Parliament in the case of any body corporate \n\ndirectly established by law, the accounts of that body corporate shall be audited and \nreported on by such person as may be specified by or under that law. \n\n(3) The Auditor-General shall submit his or her reports to the Minister responsible ", - "page_start": 52, - "page_end": 52, - "source_file": "Botswana-constitution.pdf" + "text": "", + "page_start": 341, + "page_end": 341, + "source_file": "00-80T-80.pdf" } ] }, @@ -4829,64 +4829,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**\"disciplinary law\"**means a law regulating the discipline of any disciplined force; \n**\"disciplined force\"**means- \na naval, military or air force; \na police force; or \na prison service; (a) \n(b) \n(c) \n\n**\"legal representative\"**means a person entitled to practise in Botswana as an \n\nadvocate or attorney; \n\n**\"member\"**, in relation to a disciplined force, includes any person who, under the \n\nlaw regulating the discipline of that force, is subject to that discipline. \n\n(2) In relation to any person who is a member of a disciplined force raised under \nan Act of Parliament, nothing contained in or done under the authority of the disciplinary \nlaw of that force shall be held to be inconsistent with or in contravention of any of the \nprovisions of this Chapter other than sections 4, 6 and 7. \n\n(3) In relation to any person who is a member of a disciplined force raised \n\notherwise than as aforesaid and lawfully present in Botswana, nothing contained in or \ndone under the authority of the disciplinary law of that force shall be held to be \ninconsistent with or in contravention of any of the provisions of this Chapter. ", - "page_start": 16, - "page_end": 16, - "source_file": "Botswana-constitution.pdf" + "text": "", + "page_start": 196, + "page_end": 196, + "source_file": "00-80T-80.pdf" }, { - "text": "qualified unless, he or she- \n\n(a) \n(b) \n(c) is a citizen of Botswana by birth or descent; \nhas attained the age of 30 years; and \nis qualified to be elected as a Member of the National Assembly. \n\n(2) Notwithstanding any other law to the contrary, for the purposes of this section \n\nand section 39- \n\n(a) \n\nthe term \"citizen by birth\" shall be understood to include only those persons \nwho became citizens of Botswana prior to the amendment of the law relating to \ncitizenship by the Citizenship Act; \nany person who, although his or her father was a citizen of Botswana at the \ntime of that person's birth, had, by virtue of his or her having been born outside \nBotswana, to be registered as a citizen of Botswana, under the law relating to \n\n(b) ", - "page_start": 18, - "page_end": 18, - "source_file": "Botswana-constitution.pdf" + "text": "", + "page_start": 196, + "page_end": 196, + "source_file": "00-80T-80.pdf" }, { - "text": "and except so far as that provision or, as the case may be, the thing done under the \nauthority thereof is shown not to be reasonably justifiable in a democratic society. \n**14. Protection of freedom of movement**\n\n(1) No person shall be deprived of his or her freedom of movement, and for the \n\npurposes of this section the said freedom means the right to move freely throughout \nBotswana, the right to reside in any part of Botswana, the right to enter Botswana and \nimmunity from expulsion from Botswana. \n\n(2) Any restriction on a person's freedom of movement that is involved in his or ", - "page_start": 12, - "page_end": 12, - "source_file": "Botswana-constitution.pdf" + "text": "", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_HNI_2003.pdf" }, { - "text": "her lawful detention shall not be held to be inconsistent with or in contravention of this \nsection. \n\n(3) Nothing contained in or done under the authority of any law shall be held to \n\nbe inconsistent with or in contravention of this section to the extent that the law in \nquestion makes provision- \n\n(a) \n\nfor the imposition of restrictions that are reasonably required in the interests of \ndefence, public safety, public order, public morality or public health or the \nimposition of restrictions on the acquisition or use by any person of land or \nother property in Botswana and except so far as that provision or, as the case \nmay be, the thing done under the authority thereof, is shown not to be \nreasonably justifiable in a democratic society; \nfor the imposition of restrictions on the freedom of movement of any person who \nis not a citizen of Botswana; \nfor the imposition of restrictions on the entry into or residence within defined \nareas of Botswana of persons who are not Bushmen to the extent that such \nrestrictions are reasonably required for the protection or well-being of Bushmen; \nfor the imposition of restrictions upon the movement or residence within \nBotswana of public officers; or \n....... \n\n(d) \n\n(e) \n\n(4) If any person whose freedom of movement has been restricted by order ", - "page_start": 13, - "page_end": 13, - "source_file": "Botswana-constitution.pdf" + "text": "", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_HNI_2003.pdf" }, { - "text": "Assembly who- \n\n(a) \n\nis, by virtue of his or her own act, under any acknowledgement of allegiance, \nobedience or adherence to a foreign power or state; \nhas been declared insolvent or adjudged or otherwise declared bankrupt under \nany law for the time being in force in Botswana and has not been discharged, or \nhas made a composition with his or her creditors and has not paid his or her \ndebts in full; \nis certified to be insane or otherwise adjudged or declared to be of unsound \nmind under any law for the time being in force in Botswana; \nis a Member of the Ntlo ya Dikgosi; \nsubject to such exceptions as may be prescribed by Parliament, holds any \npublic office, or is acting in any public office by virtue of a contract of service \nexpressed to continue for a period exceeding six months; \nis under sentence of death imposed on him or her by a court in any part of the \nCommonwealth, or is under a sentence of imprisonment (by whatever name \ncalled) exceeding six months imposed on him or her by such a court or \nsubstituted by competent authority for some other sentence imposed on him or \nher by such a court; \nholds, or is acting in, any office the functions of which involve any responsibility \nfor, or in connection with, the conduct of any elections to the Assembly or the \ncompilation or revision of any electoral register for the purposes of such \nelections. \n\n(b) ", - "page_start": 28, - "page_end": 28, - "source_file": "Botswana-constitution.pdf" + "text": "", + "page_start": 196, + "page_end": 196, + "source_file": "00-80T-80.pdf" }, { - "text": "(2) A person who has not continuously resided in Botswana for the period \n\nmentioned in paragraph (c) of subsection (1) of this section but has during the whole \nperiod retained his or her residence (or if he or she has more than one residence, his or \nher principal residence) in Botswana and has been absent therefrom for some temporary \npurpose only shall be deemed for the purposes of the said paragraph (c) to have been \nresident in Botswana during such absence. \n\n(3) A person shall be entitled to be registered as a voter- \n\n(a) in the constituency in which he or she has his or her residence, or if he or she ", - "page_start": 32, - "page_end": 32, - "source_file": "Botswana-constitution.pdf" + "text": "", + "page_start": 196, + "page_end": 196, + "source_file": "00-80T-80.pdf" }, { - "text": "for his or her education or welfare during any period ending not later than the \ndate when he or she attains the age of 18 years; \nfor the purpose of preventing the spread of an infectious or contagious disease; \nin the case of a person who is, or is reasonably suspected to be, of unsound \nmind, addicted to drugs or alcohol, or a vagrant, for the purpose of his or her \ncare or treatment or the protection of the community; \nfor the purpose of preventing the unlawful entry of that person into Botswana, or \nfor the purpose of effecting the expulsion, extradition or other lawful removal of \nthat person from Botswana, or for the purpose of restricting that person while he \nor she is being conveyed through Botswana in the course of his or her \nextradition or removal as a convicted prisoner from one country to another; \nto such extent as may be necessary in the execution of a lawful order requiring \nthat person to remain within a specified area within Botswana or prohibiting him \nor her from being within such an area, or to such extent as may be reasonably \njustifiable for the taking of proceedings against that person relating to the \nmaking of any such order, or to such extent as may be reasonably justifiable for \nrestraining that person during any visit that he or she is permitted to make to \nany part of Botswana in which, in consequence of any such order, his or her \npresence would otherwise be unlawful; or \nfor the purpose of ensuring the safety of aircraft in flight. ", - "page_start": 6, - "page_end": 6, - "source_file": "Botswana-constitution.pdf" + "text": "", + "page_start": 196, + "page_end": 196, + "source_file": "00-80T-80.pdf" }, { - "text": "(10) Where a tribunal appointed under subsection (9) advises the President that \n\nthe Secretary ought to be removed for inability to perform the functions of his or her \noffice or for misbehaviour, the President shall remove him or her from office. \n\n(11) If the question of removing the Secretary from office has been referred to a \ntribunal under subsection (9) of this section, the President may suspend him or her from \nperforming the functions of his or her office, and any such suspension may at any time \nbe revoked by the President and shall cease to have effect if the tribunal advises the \nPresident that the Secretary ought not to be removed from office. \n**67. The franchise**\n\n(1) A person who- \n\n(a) \n\nis a citizen of Botswana or of any other country to which this section is applied \nby Parliament; \nhas attained the age of 18 years; and \nhas either resided in Botswana for a continuous period of at least 12 months \nimmediately preceding the date on which he or she applies for registration as a \nvoter or was born in Botswana and is domiciled in Botswana on the date on \nwhich he or she applies for registration as a voter, \n\n(b) \n(c) \n\nshall, unless he or she is disqualified for registration as a voter under any law, be \nentitled, upon his or her making application in that behalf at such time and in such \nmanner as may be prescribed by any law, to be registered as a voter for the purposes of \nelections of Elected Members of the National Assembly, and no other person may be so \nregistered. ", - "page_start": 32, - "page_end": 32, - "source_file": "Botswana-constitution.pdf" + "text": "", + "page_start": 196, + "page_end": 196, + "source_file": "00-80T-80.pdf" + }, + { + "text": "", + "page_start": 196, + "page_end": 196, + "source_file": "00-80T-80.pdf" } ] }, @@ -4903,64 +4903,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 362, + "page_end": 362, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 305, + "page_end": 305, + "source_file": "00-80T-80.pdf" }, { - "text": "Unlike traditional servers, Lambda functions do not run constantly. When a function is triggered by \n\nan event, this is called an*invocation*. Lambda functions are limited to 15 minutes in duration, but \n\non average, across all AWS customers, most invocations last for less than a second. ", - "page_start": 56, - "page_end": 56, - "source_file": "serverless-core.pdf" + "text": "", + "page_start": 95, + "page_end": 95, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "Within the Lambda service, your function code is stored in a code package, deployed as a .zip or a \n\ncontainer image. All interaction with the code occurs through the Lambda API. There is no direct \ninvocation of functions from outside of the Lambda service. ", - "page_start": 52, - "page_end": 52, - "source_file": "serverless-core.pdf" + "text": "", + "page_start": 173, + "page_end": 173, + "source_file": "00-80T-80.pdf" }, { - "text": "Serverless \n\ninitialization duration, and other details. If your function throws an error, the runtime returns that \n\nerror to the invoker. \n\nTo help simplify troubleshooting, the AWS Serverless Application Model CLI (AWS SAM CLI) has \n\na command called sam logs which will show you CloudWatch Logs generated by your Lambda \n\nfunction. \n\nFor example, the following terminal command would show the live tail of logs generated by the \n\n*YourLambdaFunctionName*Lambda function: \n\n| | | |\n|---|---|---|\n| | | |\n| | sam logs -n YourLambdaFunctionName --tail | |\n| | | |\n\n\nLogging and debugging go hand in hand. Traces of events are available with Amazon X-Ray for \n\ndebugging. \n\n**Securing functions**\n\nAWS Identity and Access Management (IAM) is the service used to manage access to AWS services. \n\nLambda is fully integrated with IAM, allowing you to control precisely what each Lambda function \n\ncan do within the AWS Cloud. There are two important things that define the scope of permissions \n\nin Lambda functions: \n\n•*resource policy*: Defines which events are authorized to invoke the function. \n\n•*execution role policy*: Limits what the Lambda function is authorized to do. ", - "page_start": 60, - "page_end": 60, - "source_file": "serverless-core.pdf" + "text": "", + "page_start": 95, + "page_end": 95, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "**Use services instead of custom code**\n\nServerless applications usually comprise several AWS services, integrated with custom code run \n\nin Lambda functions. While Lambda can be integrated with most AWS services, the services most \n\ncommonly used in serverless applications are: \n\n**Commonly used AWS services in serverless applications**\n\n| Category | AWS service |\n|---|---|\n| Category | AWS service |\n| Compute | Lambda |\n| Data storage | Amazon S3, DynamoDB, Amazon RDS |\n| API | API Gateway |\n| Application integration | EventBridge, Amazon SNS, Amazon SQS |\n| Orchestration | Step Functions |\n| Streaming data and analytics | Amazon Data Firehose |\n", - "page_start": 23, - "page_end": 23, - "source_file": "serverless-core.pdf" + "text": "", + "page_start": 172, + "page_end": 172, + "source_file": "00-80T-80.pdf" }, { - "text": "**Programming Model**\n\nThe Lambda service provides the same event-based programming model for all languages. The \n\nLambda runtime passes an*invocation event*and*context*to your Lambda function*handler*which \n\ndoes some work and produces a resulting event: ", - "page_start": 55, - "page_end": 55, - "source_file": "serverless-core.pdf" + "text": "", + "page_start": 172, + "page_end": 172, + "source_file": "00-80T-80.pdf" }, { - "text": "Serverless \n\n**Deploy with containers**\n\nIf you need a custom runtime that is not provided by AWS, you can create and deploy a custom \n\ncontainer image. AWS provides base images preloaded with a language runtime and other \n\ncomponents that are required to run the image on Lambda. AWS provides a Dockerfile for each of \n\nthe base images to help with building your container image. \n\nCustom containers are one way you might experiment with lift and shift of existing code to \n\nLambda runtimes. If you do this, consider the architectural differences between always running \n\ncontainers, versus on demand nature of Lambda functions. \n\nRelated resource: \n\n• Deploy container images ", - "page_start": 62, - "page_end": 62, - "source_file": "serverless-core.pdf" + "text": "", + "page_start": 95, + "page_end": 95, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "Resources from the serverless community: \n\n• Simplifying serverless permissions with AWSAWS SAM Connectors - AWS Compute blog post \n\nby Kurt Tometich, Senior Solutions Architect, AWS, from Oct 2022 that introduces a AWS SAM \n\nabstraction that creates minimally scoped IAM policies \n\n• Building AWS Lambda governance and guardrails - AWS Compute blog post by Julian Wood, \n\nSenior Solutions Architect, AWS, from Aug 2022 that highlights how Lambda, as a serverless \n\nservice, simplifies cloud security and compliance so you can concentrate on your business logic. ", - "page_start": 50, - "page_end": 50, - "source_file": "serverless-core.pdf" + "text": "", + "page_start": 41, + "page_end": 41, + "source_file": "basic-english-language-skills.PDF" }, { - "text": "**Event source mapping**\n\nSome services can trigger Lambda functions directly, for example, when an image is added to an \n\nS3 bucket, a Lambda can be triggered to resize it. Some services cannot invoke Lambda directly; \n\nbut you can instead use an*event source mapping*which is a polling mechanism that reads from an \n\nevent source and invokes a Lambda function. ", - "page_start": 61, - "page_end": 61, - "source_file": "serverless-core.pdf" + "text": "", + "page_start": 95, + "page_end": 95, + "source_file": "NYSE_JWN_2014.pdf" } ] }, @@ -4971,70 +4971,70 @@ "target_page": 60, "target_passage": "resource policy: Defines which events are authorized to invoke the function.", "chunk_present": { - "presence": true, - "index": 3 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, + "text": "", + "page_start": 12, + "page_end": 12, "source_file": "Excel Training Manual 1.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 315, + "page_end": 315, + "source_file": "00-80T-80.pdf" }, { - "text": "Using IAM roles to describe a Lambda function’s permissions, decouples security configuration \n\nfrom the code. This helps reduce the complexity of a lambda function, making it easier to maintain. \n\nA Lambda function’s resource and execution policy should be granted the minimum required \n\npermissions for the function to perform it’s task effectively. This is sometimes referred to as the \n\nrule of least privilege. As you develop a Lambda function, you expand the scope of this policy to \n\nallow access to other resources as required. ", - "page_start": 60, - "page_end": 60, - "source_file": "serverless-core.pdf" + "text": "", + "page_start": 315, + "page_end": 315, + "source_file": "00-80T-80.pdf" }, { - "text": "Serverless \n\ninitialization duration, and other details. If your function throws an error, the runtime returns that \n\nerror to the invoker. \n\nTo help simplify troubleshooting, the AWS Serverless Application Model CLI (AWS SAM CLI) has \n\na command called sam logs which will show you CloudWatch Logs generated by your Lambda \n\nfunction. \n\nFor example, the following terminal command would show the live tail of logs generated by the \n\n*YourLambdaFunctionName*Lambda function: \n\n| | | |\n|---|---|---|\n| | | |\n| | sam logs -n YourLambdaFunctionName --tail | |\n| | | |\n\n\nLogging and debugging go hand in hand. Traces of events are available with Amazon X-Ray for \n\ndebugging. \n\n**Securing functions**\n\nAWS Identity and Access Management (IAM) is the service used to manage access to AWS services. \n\nLambda is fully integrated with IAM, allowing you to control precisely what each Lambda function \n\ncan do within the AWS Cloud. There are two important things that define the scope of permissions \n\nin Lambda functions: \n\n•*resource policy*: Defines which events are authorized to invoke the function. \n\n•*execution role policy*: Limits what the Lambda function is authorized to do. ", - "page_start": 60, - "page_end": 60, - "source_file": "serverless-core.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "What you will learn on your journey to building applications with Lambda: \n\n• How the event-driven programming model invokes Lambda functions \n\n• How to create, invoke, test, update, package, and secure functions \n\n• How the execution and runtime environment runs your functions \n\n• How to view logs and monitor your functions \n\n• Where to find hands-on opportunities to learn how to invoke functions ", - "page_start": 52, - "page_end": 52, - "source_file": "serverless-core.pdf" + "text": "", + "page_start": 315, + "page_end": 315, + "source_file": "00-80T-80.pdf" }, { - "text": "Within the Lambda service, your function code is stored in a code package, deployed as a .zip or a \n\ncontainer image. All interaction with the code occurs through the Lambda API. There is no direct \ninvocation of functions from outside of the Lambda service. ", - "page_start": 52, - "page_end": 52, - "source_file": "serverless-core.pdf" + "text": "", + "page_start": 314, + "page_end": 314, + "source_file": "00-80T-80.pdf" }, { - "text": "Unlike traditional servers, Lambda functions do not run constantly. When a function is triggered by \n\nan event, this is called an*invocation*. Lambda functions are limited to 15 minutes in duration, but \n\non average, across all AWS customers, most invocations last for less than a second. ", - "page_start": 56, - "page_end": 56, - "source_file": "serverless-core.pdf" + "text": "", + "page_start": 314, + "page_end": 314, + "source_file": "00-80T-80.pdf" }, { - "text": "**How Lambda invokes your function (runtime environment)**\n\nLambda invokes your function in an*execution environment*, which contains a secure and isolated \n\n*runtime environment*. \n\n• A*runtime*provides a language-specific environment which relays invocation events, context \n\ninformation, and responses between the Lambda and your functions. \n\n• An*execution environment*manages the processes and resources that are required to run the \n\nfunction. ", - "page_start": 56, - "page_end": 56, - "source_file": "serverless-core.pdf" + "text": "", + "page_start": 314, + "page_end": 314, + "source_file": "00-80T-80.pdf" }, { - "text": "**Event source mapping**\n\nSome services can trigger Lambda functions directly, for example, when an image is added to an \n\nS3 bucket, a Lambda can be triggered to resize it. Some services cannot invoke Lambda directly; \n\nbut you can instead use an*event source mapping*which is a polling mechanism that reads from an \n\nevent source and invokes a Lambda function. ", - "page_start": 61, - "page_end": 61, - "source_file": "serverless-core.pdf" + "text": "", + "page_start": 314, + "page_end": 314, + "source_file": "00-80T-80.pdf" }, { - "text": "**Programming Model**\n\nThe Lambda service provides the same event-based programming model for all languages. The \n\nLambda runtime passes an*invocation event*and*context*to your Lambda function*handler*which \n\ndoes some work and produces a resulting event: ", - "page_start": 55, - "page_end": 55, - "source_file": "serverless-core.pdf" + "text": "", + "page_start": 314, + "page_end": 314, + "source_file": "00-80T-80.pdf" } ] }, @@ -5051,64 +5051,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 19, + "page_end": 19, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**Launch functions faster with SnapStart**\n\nLambda SnapStart for Java can improve startup performance by up to 10x at no extra cost, \n\ntypically with no changes to your function code. The largest contributor to startup latency (often \n\nreferred to as cold start time) is the time that Lambda spends initializing the function, which \n\nincludes loading the function's code, starting the runtime, and initializing the function code. ", - "page_start": 63, - "page_end": 63, - "source_file": "serverless-core.pdf" + "text": "", + "page_start": 19, + "page_end": 19, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Related resources: \n\n• Accelerate Your Lambda Functions with Lambda SnapStart - an AWS Compute blog article by \n\nJeff Barr from Nov 2022 that shows the configuration change and vast difference from roughly \n\nsix seconds init time to 142 milliseconds of restore time with SnapStart ", - "page_start": 63, - "page_end": 63, - "source_file": "serverless-core.pdf" + "text": "", + "page_start": 19, + "page_end": 19, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "As you progress on your journey, you should explore the following more advanced topics. \n\n• Connect services with event source mapping \n\n• Deploy code in containers \n\n• Add additional code with layers \n\n• Augment functions with extensions \n\n• Launch functions faster with SnapStart \n\n• Connect to functions with Function URLs ", - "page_start": 61, - "page_end": 61, - "source_file": "serverless-core.pdf" + "text": "", + "page_start": 19, + "page_end": 19, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\nREDUCED t-- ", - "page_start": 398, - "page_end": 398, - "source_file": "00-80T-80.pdf" + "text": "", + "page_start": 19, + "page_end": 19, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\nt- ", - "page_start": 187, - "page_end": 187, - "source_file": "00-80T-80.pdf" + "text": "", + "page_start": 19, + "page_end": 19, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\nt ", - "page_start": 189, - "page_end": 189, - "source_file": "00-80T-80.pdf" + "text": "", + "page_start": 19, + "page_end": 19, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\nt ", - "page_start": 199, - "page_end": 199, - "source_file": "00-80T-80.pdf" + "text": "", + "page_start": 19, + "page_end": 19, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "With SnapStart, Lambda initializes your function when you publish a function version. Lambda \n\ntakes a Firecracker microVM snapshot of the memory and disk state of the initialized execution \n\nenvironment, encrypts the snapshot, and caches it for low-latency access. ", - "page_start": 63, - "page_end": 63, - "source_file": "serverless-core.pdf" + "text": "", + "page_start": 19, + "page_end": 19, + "source_file": "NYSE_MGM_2004.pdf" } ] }, @@ -5125,64 +5125,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 14, + "page_end": 14, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 270, + "page_end": 270, + "source_file": "00-80T-80.pdf" }, { - "text": "**SHENTEL SERVICE AREAS**\n\n", - "page_start": 2, - "page_end": 2, - "source_file": "NASDAQ_SHEN_2003.pdf" + "text": "", + "page_start": 269, + "page_end": 269, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\nPENSION ", - "page_start": 22, - "page_end": 22, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 269, + "page_end": 269, + "source_file": "00-80T-80.pdf" }, { - "text": "In December 2003, Shentel mailed out 120,000 ShentelPages \ndirectories to every home and business in Shenandoah, \nRockingham, Frederick, Page, Clarke and Warren counties. \nShentelPages now has a potential audience that exceeds 300,000 \nreaders. The 2004 directory continues to be an important local \nresource. In addition to telephone listings, it contains both \ngeneral and county-specific information - from ZIP codes to area \ncodes, and from international dialing instructions to the listing of \nregional interstate exits. \n\nThrough ShentelPages, businesses have a new way of \nreaching thousands more potential customers within the six- \ncounty area to sell their products and services. ShentelPages is \nbundled with our electronic version, ShentelPages.com. This \nservice allows area residents to use their computer and the \nInternet to let their fingers do the walking. \n\nJust like our first book in 1906, the 2004 ShentelPages provides area residents with a quick and easy way \n\nto stay in touch. \n\nSHENANDOAH TELECOMMUNICATIONS COMPANY ■ 8 ", - "page_start": 10, - "page_end": 10, - "source_file": "NASDAQ_SHEN_2003.pdf" + "text": "", + "page_start": 269, + "page_end": 269, + "source_file": "00-80T-80.pdf" }, { - "text": "NOTE 22: PENSIONS \n\nWe have contributory and non-contributory defined benefit pension \nplans that are made available to most of our employees. The plans \nprovide pensions based on years of service, years of contributions and \nearnings. We do not provide any non-pension post-retirement benefits. \nWe also provide unfunded supplemental pension benefits to certain \nexecutives. \n\nDeficiency of plan assets over accrued benefit obligations \nEffect of asset ceiling limit \n\nThe assets of the defined benefit pension plans are held in segregated \naccounts isolated from our assets. We administer the defined benefit \npension plans pursuant to applicable regulations, the Statement of \nInvestment Policies and Procedures and to the mandate of the Pension \nCommittee of the Board of Directors. The Pension Committee of the \nBoard of Directors oversees our administration of the defined benefits \npension plans, which includes the following principal areas: \n(cid:129) overseeing the \n\nNet deferred pension liability **$ (181)**$ (334) \n\nConsists of: \n\nDeferred pension asset \nDeferred pension liability \n**$**\n**8**\n**(189)**\n$ \n9 \n(343) \n\nNet deferred pension liability **$ (181)**$ (334) \nfunding, administration, ", - "page_start": 122, - "page_end": 122, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 269, + "page_end": 269, + "source_file": "00-80T-80.pdf" }, { - "text": "2003 was the 10th anniversary of Shentel’s decision to enter the PCS \n\nbusiness and the 8th year operating as a Sprint PCS Affiliate. This year was a \nsignificant milestone for Shentel’s PCS business, as we posted our first \nprofitable quarter and recorded net income for the year of $0.3 million versus a \nnet loss of $5.4 million in 2002. ", - "page_start": 11, - "page_end": 11, - "source_file": "NASDAQ_SHEN_2003.pdf" + "text": "", + "page_start": 270, + "page_end": 270, + "source_file": "00-80T-80.pdf" }, { - "text": "12. PENSION AND PROFIT SHARING PLANS: \n\nThe Company has a defined benefit pension plan covering substantially all of its employees. The benefits are based \non years of service and a percentage of the employee’s qualifying compensation during the final years of \nemployment. The Company’s funding policy is to contribute annually the amount necessary to satisfy the Internal \nRevenue Service’s funding standards. Contributions are intended to provide not only for benefits attributed to \nservice to date but also for those expected to be earned in the future. ", - "page_start": 85, - "page_end": 85, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 270, + "page_end": 270, + "source_file": "00-80T-80.pdf" }, { - "text": "**Pension Obligations**\nOur retiree pension plans had a funding deficit of approximately $172 \nmillion at December 31, 2013. We have been making special minimum \nmonthly payments in addition to our regular contributions to eliminate \nthe pension liability. During 2013, our funding deficit was reduced by \n$162 million. \n\naccrued obligations in the future. See*Critical accounting estimates*for \nmore information. \n\n*Purchase of Annuities*\nFrom time to time we have made additional lump-sum contributions to \nour pension plans, and the pension plans have purchased annuities \nfrom insurance companies to fund the pension benefit obligations for \ncertain groups of \nretired employees in the plans. Purchasing the \nannuities relieves us of our primary responsibility for that portion of \nthe accrued benefit obligations for the retired employees and eliminates \nthe significant risk associated with the obligations. \nThe special payments, including contributions associated with benefits \npaid from the plans, were approximately $7 million in 2013. We expect \nour total estimated funding requirements to be $96 million in 2014 and \nto be adjusted annually thereafter, based on various market factors \nsuch as interest rates and expected returns and staffing assumptions. \n\nWe did not make any additional lump-sum contributions to our pension \nplans in 2013 or 2012, and the pension plans did not purchase \nadditional annuities. \nChanges in factors such as the discount rate, increase in compensation \nand the expected return on plan assets can affect the accrued benefit \nobligation, pension expense and the deficiency of plan assets over ", - "page_start": 66, - "page_end": 66, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 413, + "page_end": 413, + "source_file": "00-80T-80.pdf" }, { - "text": "(i) Retirement benefits \nAccrued retirement benefits for employees have been provided \nmainly at an amount calculated based on the retirement benefit \nobligation and the fair value of the pension plan assets as of balance \nsheet date, as adjusted for unrecognized net retirement benefit \nobligation at transition, unrecognized actuarial gain or loss, and \nunrecognized prior service cost. The retirement benefit obligation is \nattributed to each period by the straight-line method over the \nestimated years of service of the eligible employees. The net \nis being amortized \nretirement benefit obligation at \nprincipally over a period of 15 years by the straight-line method. \ntransition ", - "page_start": 79, - "page_end": 79, - "source_file": "OTC_NSANY_2004.pdf" + "text": "", + "page_start": 267, + "page_end": 267, + "source_file": "00-80T-80.pdf" } ] }, @@ -5199,64 +5199,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 0, + "page_end": 0, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 260, + "page_end": 260, + "source_file": "00-80T-80.pdf" }, { - "text": "**We must serve well to prosper – We must prosper to serve well**\n\nShenTel Service Company • Shenandoah Long Distance Company • Shenandoah Mobile Company \nShenandoah Network Company • Shenandoah Telephone Company • Shenandoah Valley Leasing Company \nShenandoah Cable Television Company • ShenTel Communications Company \nShenandoah Personal Communications Company \n\nPO Box 459 \nEdinburg, VA 22824-0459 \nPhone 540-984-4141 • Fax 540-984-8192 \nwww.shentel.com ", - "page_start": 60, - "page_end": 60, - "source_file": "NASDAQ_SHEN_2003.pdf" + "text": "", + "page_start": 269, + "page_end": 269, + "source_file": "00-80T-80.pdf" }, { - "text": "**Note 14. Segment Reporting**\n\nThe Company, as a holding company with various operating subsidiaries, has identified ten reporting segments based on \nthe products and services each provides. Each segment is managed and evaluated separately because of differing \ntechnologies and marketing strategies. \n\nThe reporting segments and the nature of their activities are as follows: \n\nShenandoah Telecommunications Company (Holding) \nHolding company, which invests in both affiliated \nand non-affiliated companies. \n\nShenandoah Telephone Company (Telephone) \n\nProvides both regulated and unregulated telephone \nservices and leases fiber optic facilities primarily \nthroughout the Northern Shenandoah Valley. \n\nShenandoah Cable Television Company (CATV) \nProvides cable television service in Shenandoah \nCounty. \n\nShenTel Service Company (ShenTel) \n\nProvides Internet access to a multi-state region \nsurrounding the Northern Shenandoah Valley, hosts \nTravel 511 for Virginia, and sells and services \ntelecommunication equipment. ", - "page_start": 37, - "page_end": 37, - "source_file": "NASDAQ_SHEN_2003.pdf" + "text": "", + "page_start": 269, + "page_end": 269, + "source_file": "00-80T-80.pdf" }, { - "text": "**SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES**\n**CONSOLIDATED BALANCE SHEETS**\n\n", - "page_start": 15, - "page_end": 15, - "source_file": "NASDAQ_SHEN_2003.pdf" + "text": "", + "page_start": 269, + "page_end": 269, + "source_file": "00-80T-80.pdf" }, { - "text": "**SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES**\n**CONSOLIDATED BALANCE SHEETS**\n\n", - "page_start": 14, - "page_end": 14, - "source_file": "NASDAQ_SHEN_2003.pdf" + "text": "", + "page_start": 268, + "page_end": 268, + "source_file": "00-80T-80.pdf" }, { - "text": "**SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES**\n**CONSOLIDATED STATEMENTS OF INCOME**\n\n", - "page_start": 16, - "page_end": 16, - "source_file": "NASDAQ_SHEN_2003.pdf" + "text": "", + "page_start": 268, + "page_end": 268, + "source_file": "00-80T-80.pdf" }, { - "text": "**SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES**\n**CONSOLIDATED STATEMENTS OF CASH FLOWS**\n\n", - "page_start": 18, - "page_end": 18, - "source_file": "NASDAQ_SHEN_2003.pdf" + "text": "", + "page_start": 268, + "page_end": 268, + "source_file": "00-80T-80.pdf" }, { - "text": "**SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES**\n**CONSOLIDATED STATEMENTS OF CASH FLOWS**\n\n", - "page_start": 19, - "page_end": 19, - "source_file": "NASDAQ_SHEN_2003.pdf" + "text": "", + "page_start": 268, + "page_end": 268, + "source_file": "00-80T-80.pdf" }, { - "text": "**Significant Transactions**\n\nThe Company had several significant transactions during 2003. The largest was the sale of its 66% interest in the \nVirginia 10 RSA cellular operation, as described above. The Company originally entered into the agreement with \nVerizon Wireless in November 2002. The Company was the general partner of the limited partnership which operated \nan analog cellular network in the six-county area of Northwestern Virginia, including Clarke, Frederick, Page, \nRappahannock, Shenandoah, and Warren counties, and the city of Winchester. The sales price was $37.0 million plus \nthe Company’s 66% share of the partnership’s working capital, which was approximately $1.7 million. The Company \nwas required to do a working capital true up following the closing, from which the Company recorded a charge for $23 \nthousand after taxes. In the fourth quarter the Company recorded an additional charge for taxes of $0.2 million to \nreflect the consolidated effective tax rate based on the final operating results for the year. \n\nThe sale of this business is reflected in the discontinued operations section of the income statement along with the \nresults of operations for the two months of 2003 that the operation remained a part of the Company. ", - "page_start": 42, - "page_end": 42, - "source_file": "NASDAQ_SHEN_2003.pdf" + "text": "", + "page_start": 268, + "page_end": 268, + "source_file": "00-80T-80.pdf" } ] }, @@ -5273,64 +5273,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 51, + "page_end": 51, + "source_file": "basic-english-language-skills.PDF" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 319, + "page_end": 319, + "source_file": "00-80T-80.pdf" }, { - "text": "**We must serve well to prosper – We must prosper to serve well**\n\nShenTel Service Company • Shenandoah Long Distance Company • Shenandoah Mobile Company \nShenandoah Network Company • Shenandoah Telephone Company • Shenandoah Valley Leasing Company \nShenandoah Cable Television Company • ShenTel Communications Company \nShenandoah Personal Communications Company \n\nPO Box 459 \nEdinburg, VA 22824-0459 \nPhone 540-984-4141 • Fax 540-984-8192 \nwww.shentel.com ", - "page_start": 60, - "page_end": 60, - "source_file": "NASDAQ_SHEN_2003.pdf" + "text": "", + "page_start": 413, + "page_end": 413, + "source_file": "00-80T-80.pdf" }, { - "text": "**OUR BUSINESS**\n\nShenandoah Telecommunications Company is a diversified telecommunications holding company which provides \nvarious telecommunications services through its operating subsidiaries. These services include: wireline telephone \nservice, primarily in Shenandoah County and small service areas in Rockingham, Frederick, and Warren counties, all in \nVirginia; cable television service in Shenandoah County; unregulated telecommunications equipment sales and services; \nonline information and Internet access provided to the multi-state region surrounding the Northern Shenandoah Valley of \nVirginia; financing of purchases of telecommunications facilities and equipment; paging services in the Northern \nShenandoah Valley; resale of long distance services; operation and maintenance of an interstate fiber optic network; \nwireless personal communications services (PCS) and a tower network in the four-state region from Harrisonburg, \nVirginia to the Harrisburg, York and Altoona, Pennsylvania markets. \n\n**ANNUAL MEETING**\n\nThe Board of Directors extends an invitation to all shareholders to attend the Annual Meeting of Shareholders. The \nmeeting will be held at 11:00 AM (EST) on April 20, 2004 in the Auditorium of the Company’s offices at the Shentel \nCenter, 500 Mill Road, Edinburg, Virginia. ", - "page_start": 59, - "page_end": 59, - "source_file": "NASDAQ_SHEN_2003.pdf" + "text": "", + "page_start": 18, + "page_end": 18, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "**Note 14. Segment Reporting**\n\nThe Company, as a holding company with various operating subsidiaries, has identified ten reporting segments based on \nthe products and services each provides. Each segment is managed and evaluated separately because of differing \ntechnologies and marketing strategies. \n\nThe reporting segments and the nature of their activities are as follows: \n\nShenandoah Telecommunications Company (Holding) \nHolding company, which invests in both affiliated \nand non-affiliated companies. \n\nShenandoah Telephone Company (Telephone) \n\nProvides both regulated and unregulated telephone \nservices and leases fiber optic facilities primarily \nthroughout the Northern Shenandoah Valley. \n\nShenandoah Cable Television Company (CATV) \nProvides cable television service in Shenandoah \nCounty. \n\nShenTel Service Company (ShenTel) \n\nProvides Internet access to a multi-state region \nsurrounding the Northern Shenandoah Valley, hosts \nTravel 511 for Virginia, and sells and services \ntelecommunication equipment. ", - "page_start": 37, - "page_end": 37, - "source_file": "NASDAQ_SHEN_2003.pdf" + "text": "", + "page_start": 413, + "page_end": 413, + "source_file": "00-80T-80.pdf" }, { - "text": "**NEW TELEPHONE DIRECTORY FOR THE NORTHERN SHENANDOAH VALLEY**\n\n", - "page_start": 10, - "page_end": 10, - "source_file": "NASDAQ_SHEN_2003.pdf" + "text": "", + "page_start": 197, + "page_end": 197, + "source_file": "00-80T-80.pdf" }, { - "text": "In 2003, we focused on improving our distribution channels. We \n\nexpanded and relocated our stores in Harrisonburg and Winchester, \nVirginia to handle our growing customer base. At our Edinburg, \nVirginia store, we expanded both our hours and office space. We \ncontinue to increase our direct sales force to expand our base of \nbusiness customers. To make it convenient for our potential \ncustomers, we also grew the number of local third-party sales \npartners. \n\nA much publicized development in our industry was the introduction of Wireless Local Number Portability \n(WLNP) on November 24th, 2003. Starting on that day, customers in the 100 largest population centers in the \nUnited States were able to change wireless carriers while keeping their existing phone number. WLNP will be \navailable in the entire country on May 24, 2004. To date, this change has had only a minor impact on Shentel’s \ncustomer base. \n\nWe continue to work to make PCS a growth vehicle of revenue and net income for Shenandoah \n\nTelecommunications Company. ", - "page_start": 11, - "page_end": 11, - "source_file": "NASDAQ_SHEN_2003.pdf" + "text": "", + "page_start": 16, + "page_end": 16, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "**Significant Transactions**\n\nThe Company had several significant transactions during 2003. The largest was the sale of its 66% interest in the \nVirginia 10 RSA cellular operation, as described above. The Company originally entered into the agreement with \nVerizon Wireless in November 2002. The Company was the general partner of the limited partnership which operated \nan analog cellular network in the six-county area of Northwestern Virginia, including Clarke, Frederick, Page, \nRappahannock, Shenandoah, and Warren counties, and the city of Winchester. The sales price was $37.0 million plus \nthe Company’s 66% share of the partnership’s working capital, which was approximately $1.7 million. The Company \nwas required to do a working capital true up following the closing, from which the Company recorded a charge for $23 \nthousand after taxes. In the fourth quarter the Company recorded an additional charge for taxes of $0.2 million to \nreflect the consolidated effective tax rate based on the final operating results for the year. \n\nThe sale of this business is reflected in the discontinued operations section of the income statement along with the \nresults of operations for the two months of 2003 that the operation remained a part of the Company. ", - "page_start": 42, - "page_end": 42, - "source_file": "NASDAQ_SHEN_2003.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "Shenandoah Long Distance Company (Long Distance) Provides long distance services. \n\nShenandoah Network Company (Network) Leases interstate fiber optic facilities. \n\nShenTel Communications Company (Shen Comm) Provides DSL services as a CLEC operation. \n\nShenandoah Personal Communications Company (PCS) \n\nAs a PCS Affiliate of Sprint, provides digital wireless \nservice to a portion of a four-state area covering the \nregion from Harrisburg, York and Altoona, \nPennsylvania, to Harrisonburg, Virginia. \n\nThe accounting policies of the segments are the same as those described in the summary of significant accounting \npolicies. Each segment accounts for inter-segment sales and transfers as if the sales or transfers were to outside parties. \n\nIncome (loss) recognized from equity method nonaffiliated investees by segment is as follows: \n\nConsolidated \nTotals Year \n\nTelephone \n*(in thousands)*\n**$ 65**\n$ 45 \n$104 **2003**\n2002 \n2001 **$ (441)**\n$ (822) \n$ (1,218) **$ (376)**\n$ (777) \n$ (1,114) ", - "page_start": 37, - "page_end": 37, - "source_file": "NASDAQ_SHEN_2003.pdf" + "text": "", + "page_start": 197, + "page_end": 197, + "source_file": "00-80T-80.pdf" }, { - "text": "**SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES**\n**CONSOLIDATED STATEMENTS OF CASH FLOWS**\n\n", - "page_start": 19, - "page_end": 19, - "source_file": "NASDAQ_SHEN_2003.pdf" + "text": "", + "page_start": 197, + "page_end": 197, + "source_file": "00-80T-80.pdf" } ] }, @@ -5347,64 +5347,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 201, + "page_end": 201, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 19, + "page_end": 19, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "5. Click the appropriate Inventory year on “Work on Inventories” under “Submission” (figure 56, a). \n6. Press the “Start Inventory” button to start the inventory (figure 56, b). Once pressed, the status changes to \n“started” (figure 57). \n\n***Once the “Start Inventory” button has been pressed by the NFP or PM, a notification email will be sent to all \nSE’s with the information that a new inventory was created. SE’s and PM’s can start entering their data into the \nNAIIS software. More details on how to do the data entry please see section 4.1 above. ", - "page_start": 36, - "page_end": 36, - "source_file": "maiis-user-manual.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Press the ‘Enter key’ and the non-Annex I Greenhouse Gas Inventories web page appears. \n\nTo access the NAIIS application, click on the image NAIIS Web Application, the right hand side of the screen. (figure \n3, number 1) and the log-in page will be displayed. (figure 4) ", - "page_start": 7, - "page_end": 7, - "source_file": "maiis-user-manual.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**10 Submission management**\n\n**10.1 Workflow**\n\nCreating and preparing an inventory, generating tables for checking by the NFP and approving and/or rejecting \nsubmission, follows a number of steps known collectively as a workflow. This chapter describes the workflow relating \nto the submission of the GHG inventory/(ies), which users should follow to create, prepare, and send GHG \ninventories for internal checking, and approval/rejection of the submission by the NFP, within the NAIIS web \napplication (figure 52). ", - "page_start": 35, - "page_end": 35, - "source_file": "maiis-user-manual.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**3.2.2 Create, Start, Add new and View GHG inventory year**\n\nThese functions allow the NFP and PM to create or edit a GHG inventory within the NAIIS software. \n\n***3.2.2.1 Create a new GHG inventory or Start a GHG inventory year***\n\n3.2.2.1.1 Create a new GHG inventory \n\n**Note**: This step can ONLY be undertaken by the NFP or PM ! \n\nIn order to create one or several GHG inventories, the following steps can be done by the NFP or PM: \n\n Log in as NFP or PM \n Hover the cursor on “Submission Management” menu and click on the “View Inventories Progress” button. (see \nFigure 5). Left click on the “+” sign will create a new GHG inventory. (see Figure 6) \n\nThe new GHG Inventory name will be automatically generated by the NAIIS system, as follows: \n___Inventory \n\nFor example: Paraguay_2013_1_Inventory or Bhutan_2014_2_Inventory \n\n***Figure 5. Create new GHG inventory screen***", - "page_start": 8, - "page_end": 8, - "source_file": "maiis-user-manual.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**10.5.2 Rejection of an inventory**\n\n1. Log in as NFP. \n2. Click on “View Inventories Progress” under sub menu “Submission Management”. \n3. The “View Inventories Progress” screen appears. \n4. Select the appropriate inventory by clicking the Inventory name under column “Name” (figure 66). \n5. Press the “Send for Rejection” button (figure 66, b). \n\nOnce the “Send for Rejection” button was pressed, the status of the selected inventory changes to \n“awaiting_rejection” (figure 67, a). \n\n***Note: A notification email will be sent to the PM that the inventory has been rejected. Therefore, the PM \nwill be able to reject the submission. Proceed to section 10.4.2. ", - "page_start": 41, - "page_end": 41, - "source_file": "maiis-user-manual.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**10.2 Start of inventory/submission (NFP or PM)**\n\nThis procedure allows the NFP or PM to start a new (created) inventory. The existing data for the inventory year \nidentified will be made available in the new inventory/submission. \n\nThese are the steps to start a new inventory: \n\n1. Click on “View Inventories Progress” under sub menu “Submission Management” (figure 53). ", - "page_start": 35, - "page_end": 35, - "source_file": "maiis-user-manual.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**10.5 Approval or Rejection of an inventory (NFP)**\n\nThis section describes how the NFP approves or rejects an inventory after being sent for approval by the PM \n(See section 10.4). \n\n**10.5.1 Approval of an inventory**\n\n1. Log in as NFP. \n2. Click on “View Inventories Progress” under sub menu “Submission Management”. \n3. The “View Inventories Progress” screen appears. \n4. Select the appropriate inventory by clicking the Inventory name under column “Name” (figure 64). \n5. Press the “Approve” button (figure 64, b). \n\nOnce the “Approve” button was pressed, the status of the selected inventory changes to “approved” (figure \n65, b). \n\n***Note: A notification email will be sent to the PM that the inventory has been approved. Therefore, the PM \nmay proceed to selecting the tables for preparing the official submission (See section 10.6). ", - "page_start": 40, - "page_end": 40, - "source_file": "maiis-user-manual.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "***Figure 4. Log-in page of the NAIIS Web Application***\n\n", - "page_start": 7, - "page_end": 7, - "source_file": "maiis-user-manual.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" } ] }, @@ -5415,70 +5415,70 @@ "target_page": 48, "target_passage": "7,400", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 299, + "page_end": 299, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_FFIN_2002.pdf" }, { - "text": "**Annex 3: Global Warming Potentials (GWPs)**\n\n| Greenhouse gas | Chemical formula | 1995 IPCC GWP |\n|---|---|---|\n| Greenhouse gas | Chemical formula | 1995 IPCC GWP |\n| Carbon dioxide | CO 2 | 1 |\n| Methane | CH 4 | 21 |\n| Nitrous oxide | N O 2 | 310 |\n| HFC-23 | CHF 3 | 11,700 |\n| HFC-32 | CH F 2 2 | 650 |\n| HFC-41 | CH F 3 | 150 |\n| HFC-43-10mee | C H F 5 2 10 | 1,300 |\n| HFC-125 | C HF 2 5 | 2,800 |\n| HFC-134 | C H F 2 2 4 | 1,000 |\n| HFC-134a | CH FCF 2 3 | 1,300 |\n| HFC-152a | C H F 2 4 2 | 140 |\n| HFC-143 | C H F 2 3 3 | 300 |\n| HFC-143a | CF CH 3 3 | 3,800 |\n| HFC-227ea | C HF 3 7 | 2,900 |\n| HFC-236fa | C H F 3 2 6 | 6,300 |\n| HFC-254ca | C H F 3 3 5 | 560 |\n| Perfluoromethane | CF 4 | 6,500 |\n| Perfluroethane | C F 2 6 | 9,200 |\n| Perfluoropropape | C F 3 8 | 7,000 |\n| Perfluorobutane | C F 2 10 | 7,000 |\n| Perfluorocyclobutane | c-c F 4 8 | 8,700 |\n| Perfluoropentane | C F 5 12 | 7,500 |\n| Perfluorohexane | C F 6 14 | 7,400 |\n| Sulphur hexafluoride | SF 6 | 23,900 |\n", - "page_start": 48, - "page_end": 48, - "source_file": "maiis-user-manual.pdf" + "text": "", + "page_start": 221, + "page_end": 221, + "source_file": "00-80T-80.pdf" }, { - "text": "**2. Background**\n\n2.1. Climate Change, Global Warming, and Frames \n\nExisting studies have noted that the subtle difference between climate change and global warming \nevokes different public cognitive responses, where global warming“indicates heat-related impacts, \nhuman causes, increased UV light penetration, ozone depletion, and the greenhouse effect, whereas \nclimate change is more associated with a wide range of influences on climate, including drought and \nagriculture [9]. An N-gram analysis suggested that global warming showed a closer connection with \nice, snow, and sea, whereas climate change was always connected with scientific investigations, such as ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 221, + "page_end": 221, + "source_file": "00-80T-80.pdf" }, { - "text": "There are apparent trends of humidification in most regions under global warming by 1.5 °C and 2.0 °C; but \nthe drought risk also should be taken seriously in the other regions. Under global warming by 1.5 °C the area is \n73.6% of the whole world in which the precipitation would increase, most located in the Northern Hemisphere; \nthe area is 53.7% of the whole world in which the precipitation would increase by less than 50 mm; however, the \narea is 26.4% of whole world in which the rainfall would decrease, mainly located in the Southern Hemisphere \nand the middle regions of Northern Hemisphere. The distribution of precipitation under global warming by \n2.0 °C is similar with the situation under global warming by 1.5 °C. The drought-threatened area would increase \nby 28.5% under global warming by 2.0 °C, especially in the middle and low latitude of the Northern Hemisphere; \nthe area would expand to 26%, in which the precipitation increases more than 50 mm. In other words, the \nextreme rainfall events (such as drought, rainstorm) under global warming by 2.0 °C would be more serious than \nthose under global warming by 1.5 °C, which is what we should be pay more attention to. ", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed9.pdf" + "text": "", + "page_start": 8, + "page_end": 8, + "source_file": "NASDAQ_FFIN_2002.pdf" }, { - "text": "Different frames concerning the global climate concern are popular among the public, politicians, \nenvironmentalists, and the media [1,28,29]. Big data analyses have indicated that when interpreting \nclimate events, individuals’ preference for frameworks was influenced by demographics [5] and \nsocial-political background [2]. Different choices of frameworks can evoke different psychological \nprocesses [30], promote or inhibit engagement intentions [31], or gain approval on various levels [32]. \nStudies have noted that the frameworks of climate change and global warming may result from \ndifferent political indications. The American Republican-leaning states show more preference for \nglobal warming than climate change compared with Democratic-leaning states, and global warming is \nmore connected with “hoax” in questioning the reality of the global climate issue [5]. Conservatives \nare more likely to link heat-related phenomena to global warming, whereas liberals associate these \nfacts equally with both frames [27]. An earlier survey conducted by [4] argued that wording choice \nmight not influence the whole population similarly. For the whole sample and politically independent \nindividuals, the two terminologies were equally serious, but climate change seemed more serious \ncompared with global warming among the Republicans, and the Democrats held the opposite opinion. ", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_FFIN_2002.pdf" }, { - "text": "In the past hundred years, the global climate has experienced great changes1–4. According to the sixth assess- \nment report of IPCC, the global average surface temperature increased by 1.09 °C between 1850 and 2020, and \nalmost all regions in the world experienced surface warming5. Due to global warming, the extreme climate events \nbecome more and more frequent, and the ecological environment problems caused by climate change are more \nand more serious, which restrict the sustainable development of human society and health6–10. Global warming \nhas gradually changed from a scientific issue to a major social issue of common concern to governments and \npeople of all countries11–13. In 2016, nearly 200 parties of the United Nations Framework Convention on climate \nchange reached the Paris Agreement at the climate change conference in Paris14. Paris Agreement has indicated \nthat it is urgent to hold the increase in global average temperature well below 2.0 °C above pre-industrial levels \nand pursue efforts to limit the temperature increase to 1.5 °C above pre-industrial levels. ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed9.pdf" + "text": "", + "page_start": 86, + "page_end": 86, + "source_file": "00-80T-80.pdf" }, { - "text": "complex changes in the state of the climate [7], which may be caused by natural process, external forces, \nor human interventions [8]. By randomly assigning respondents to climate change or global warming \nquestionnaires, scholars confirmed that the different connotations contained in the two definitions are \nlikely to evoke distinct interpretations of the causes and impacts of the global climate issue [9], which \nmay inhibit collaboration and joint efforts to mitigate the global challenge. \n\nPublic preference between climate change and global warming is even more apparent when \nconsidering the ideology spectrum [10]. Some scholars concluded that conservatives, who are \nless concerned with environmental issues, tended to use global warming as a narrative strategy \nbecause global warming has a more direct connection with temperature rise, making it easier to find \ncontradictory cues such as freezing weather or heavy snowstorms to deny global climate change \nfacts [11]. The associations between global warming and human activities may contribute to more \ncontroversies as well [12], connecting global warming more with the “hoax” frame [5] and evoking \ngreater negative sentiment [13]. \n\nAlthough these existing studies have often attempted to identify the differences between these two \nterminologies, only a particular few perspectives, such as sentiment, ideological preference, or cause \nand effect, were examined in each study [3,9,13]. However, the associate network model introduced by \npsychologists suggests that human recognition and memory have a network-shaped architecture [14], \nwhere individual understanding of particular objects is connected with numerous other objects in \nthe mind. According to the associate network model, individual understanding of the global climate \nconcern is a network composed of numerous inter-connected concepts, in which climate change and \nglobal warming. As the two terminologies concern the primary mechanism of the global climate issue, \nthe preference between the two understandings may represent two distinct climate discourses by \ndifferently organizing numerous climate concepts. Examining the differences between two discourses \nwith an associative perspective may provide communicators with unique insights into narrowing the \ncognitive discrepancy. The temporal dimension was lacking in existing studies, necessitating the study \nof how concepts associated with each other have evolved with time. ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_FFIN_2002.pdf" }, { - "text": "There are also several uncertainties and limitations. Firstly, there is no unified understanding of how to cal- \nculate the temperature rise of 1.5 °C and 2.0 °C relative to pre-industrial levels in the worldwide. At present the \nresearch on climate prediction and impact assessment under global warming 1.5 °C and 2.0 °C usually adopts \nmulti-mode ensemble average methods61,62, which could obtain the warming response under the condition of \ninstantaneous change, rather than the warming process under the stable state expected by the long-term goal. If \nwe expect to obtain the accurate results, the model prediction test should be estimated to form proprietary sce- \nnarios for global warming by 1.5 °C and 2.0 °C63,64, which could support for the impacts assessment on different \nsectors. Some institutions are carrying out climate change predictions under the lower emission scenarios (global \nwarming 1.5 °C or 2.0 °C). At the same time, in order to achieve the goal of controlling temperature by 1.5 °C at \nthe end of the twenty-first century, it is urgent to take actions to reduce emissions and develop along the track \nof low energy consumption65,66; but it is a great challenge for human society to achieve this goal. ", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed9.pdf" + "text": "", + "page_start": 221, + "page_end": 221, + "source_file": "00-80T-80.pdf" }, { - "text": "Even when climate change and global warming shared concern about similar topics such as the \ncause of the climate issue, global warming tended to focus on carbon emission phenomena, whereas \nclimate change preferred a more in-depth perspective, highlighting the importance of global action \nto mitigate the climate issue in its second-largest cluster, with energy structure as the contributor to \ncarbon emissions in its third largest cluster. As invisible causes and disbelief in actions have long \nbeen regarded as two key reasons for low climate concern [90], the two terminologies’ differences \nin connotations suggest that introducing these absent sub-topics into global warming discourse or \nhighlighting climate change for its inherent connotations may help communicators raise public concern \nabout climate. \n\n5.1.2. Political Connotations \n\nStudies noted that frame preference between climate change and global warming reflects \nindividuals’ ideological spectrum, where climate change and global warming were favored by \nthe liberals and conservatives, respectively [10]. The cluster analysis of the semantic network in the \ncurrent study demonstrated that global warming triggered far more political responses than climate \nchange. The second largest cluster of global warming was politics-based, where hashtag “tcot”, favored \nby right-leaning users and “p2”, favored by left-leaning users, were both ranked in the list of top nodes \nof the global warming discourse, but neither was included in the list of top nodes of the climate change \ndiscourse. Considering that earlier findings suggested that global warming was more likely to be used \nby conservatives to question the reality of climate issue [11] and climate change is more commonly \nadopted when discussing action against the climate change issue [5], global warming had a stronger \npolitical connotation in public discussion. ", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 4, + "page_end": 4, + "source_file": "NASDAQ_EMMS_2004.pdf" } ] }, @@ -5489,70 +5489,70 @@ "target_page": 5, "target_passage": "Requests for access to, inquiries on the use of the software, and comments on the design and functionalities of the application should be sent to the dedicated e-mail address naiisapp@unfccc.int.", "chunk_present": { - "presence": true, - "index": 7 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 266, + "page_end": 266, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 268, + "page_end": 268, + "source_file": "00-80T-80.pdf" }, { - "text": "Press the ‘Enter key’ and the non-Annex I Greenhouse Gas Inventories web page appears. \n\nTo access the NAIIS application, click on the image NAIIS Web Application, the right hand side of the screen. (figure \n3, number 1) and the log-in page will be displayed. (figure 4) ", - "page_start": 7, - "page_end": 7, - "source_file": "maiis-user-manual.pdf" + "text": "", + "page_start": 270, + "page_end": 270, + "source_file": "00-80T-80.pdf" }, { - "text": "***Figure 4. Log-in page of the NAIIS Web Application***\n\n", - "page_start": 7, - "page_end": 7, - "source_file": "maiis-user-manual.pdf" + "text": "", + "page_start": 270, + "page_end": 270, + "source_file": "00-80T-80.pdf" }, { - "text": "**3.2 How to access/ log out / create a GHG inventory**\n\n**3.2.1 How to access the NAIIS application**\n\nOpen any internet browser (i.e. Internet Explorer, Firefox, etc.) and type in the following URL http://unfccc.int/7627 on \nthe browser’s address bar. (figure 1 and figure 2) ", - "page_start": 6, - "page_end": 6, - "source_file": "maiis-user-manual.pdf" + "text": "", + "page_start": 270, + "page_end": 270, + "source_file": "00-80T-80.pdf" }, { - "text": "**3 Getting started**\n\n**3.1 User Access, Roles and Privileges**\n\nThe users of the application are the members of the national team(s) of non-Annex I Parties involved in the \npreparation of their national GHG inventories, and each user is assigned a role. \n\nThe table below explains the different levels of the access rights and corresponding explanation for each role. It is \nimportant to note that the roles are not necessarily identical to a person’s title (e.g. National Focal Point) and that a \nperson can take on several roles (which may be necessary for some countries). \n\nThere are three types of access rights (roles) to the NAIIS application: ", - "page_start": 6, - "page_end": 6, - "source_file": "maiis-user-manual.pdf" + "text": "", + "page_start": 270, + "page_end": 270, + "source_file": "00-80T-80.pdf" }, { - "text": "Once the “Generate Official Submission” button has been pressed the “Submit Inventory” initial screen for selecting \nthe tables appears (figure 70). \n\n8. Select or deselect by clicking the appropriate year(s) under “Inventory Years” box (figure 70, c) or the sector \ngrids under the “Table” box (figure 70, d) to generate the official submission. \n9. Press the “Submit” button (figure 70, e). An official submission will be generated in the NAIIS system. \n\n***Figure 70. Submit – select tables and grids for the general submission***\n\n*NAIIS-User-Manual.Docx* Page 43 10/02/2013 ", - "page_start": 43, - "page_end": 43, - "source_file": "maiis-user-manual.pdf" + "text": "", + "page_start": 269, + "page_end": 269, + "source_file": "00-80T-80.pdf" }, { - "text": "**2.3 Contact**\n\nRequests for access to, inquiries on the use of the software, and comments on the design and functionalities of the \napplication should be sent to the dedicated e-mail address**naiisapp@unfccc.int**. ", - "page_start": 5, - "page_end": 5, - "source_file": "maiis-user-manual.pdf" + "text": "", + "page_start": 269, + "page_end": 269, + "source_file": "00-80T-80.pdf" }, { - "text": "**2 General information**\n\nThe NAIIS is a web-based application designed to enable non-Annex I Parties estimate their national GHG \ninventories according to the UNFCCC guidelines and using the IPCC methodologies, and to report the results in their \nnational communications and biennial update reports. \n\n**2.1** **System overview**\n\nThe NAIIS web application has the following functionalities: \n\n1. User management (only for the user roles NFP and PM) \n2. Submission management \n3. Data entry \n4. Key category analysis \n5. Reporting tables \n6. Data Export/Import \n7. Completeness \n8. Consistency \n\nThe NAIIS web application allows input of data through three different channels: \n\n1. Manual input into the entry grids \n2. Partial or full import of data from Excel \n3. Bulk import of data from XML \n\nThe GHG emissions totals, by gas and by sector, are automatically calculated and saved based on the values \nentered for activity data (AD), emission factors and other relevant parameters. In addition, the software facilitates the \nreporting of other category specific information, for example, the choice of the method for activity data and emission \nfactors. ", - "page_start": 4, - "page_end": 4, - "source_file": "maiis-user-manual.pdf" + "text": "", + "page_start": 269, + "page_end": 269, + "source_file": "00-80T-80.pdf" }, { - "text": "Since its release in 2005, most non-Annex I Parties have been using that software for the development of their \nnational GHG inventories. In December 2011, Parties requested the secretariat to upgrade the software and make it \navailable to non-Annex I Parties by June 2013. Pursuant to that request, the secretariat converted the current Excel- \nbased version of the software (v.1.3.2)2 into a web-based application (NAIIS) which provides greater flexibility and \nsecurity for maintaining data. ", - "page_start": 4, - "page_end": 4, - "source_file": "maiis-user-manual.pdf" + "text": "", + "page_start": 269, + "page_end": 269, + "source_file": "00-80T-80.pdf" } ] }, @@ -5563,70 +5563,70 @@ "target_page": 2, "target_passage": "The Books3 dataset contains text from over 170,000 books,2 which are a mix of in-copyright and out-of-copyright works. It is believed to have been originally sourced from a website that was not authorized to distribute all of the works", "chunk_present": { - "presence": true, - "index": 8 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 4, + "page_end": 4, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 225, + "page_end": 225, + "source_file": "00-80T-80.pdf" }, { - "text": "**3.4.1 How to visualize graphical data from a dataset resource**\n\nAs a result of a dataset search, the system displays on the “Dataset” tab all distributions \n(resource/data files) that are part of the selected dataset. Each XLS or CSV distribution of the dataset \ncan be further explored by clicking on “Open Visualization” under the “Options” button – if available. ", - "page_start": 43, - "page_end": 43, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + "text": "", + "page_start": 224, + "page_end": 224, + "source_file": "00-80T-80.pdf" }, { - "text": "3.1.5 Similarity analysis \nWe investigate the proximity between the datasets’ \ntopics to give insights about the benchmark con- \ntents. The methodology introduced by Muen- \nnighoff et al. (2022), i.e. computing an average \nembedding of samples from each dataset, is used to \nbuild a dataset-similarity matrix (displayed in ap- \npendix Figure 3). The distances between averaged \nembedding vectors of each dataset (which range \nfrom 0.89 to 1 in Figure 3) remain hard to interpret \ninto a dataset semantic proximity. Thus, we com- \nplement this by observing the dataset’s clouds of \nembedding in a 2D plane using PCA in Figure 4. \nFigures 4 and 3 seem to correlate, showing high \nsimilarity between two datasets when the same \nunderlying data is used in different tasks. Dataset \ntopics are pretty close, with some exceptions, such \nas the Syntec dataset. As more datasets are added \nto the benchmark, this analysis will help select new \ndata that do not produce redundant results. It may \nalso help to understand the link between the results \nand the datasets’ topics. \n\n2023) where given the original human summary \nin English and its translation in French, the model \nrates the quality of the translation from 0 to 10, \nwith 0 being of very bad quality and 10 being ex- \ncellent. The prompt is available in Figure 8. Ad- \nditionally, we manually check random translations \nwith ratings between 9 and 10 to ensure the rating \nis relevant. We do the same for all translations with \na score less than 9 and correct them7 (see the rating \ndistribution in Table 6). \n\n3.1.4 Data for the Reranking task ", - "page_start": 4, - "page_end": 4, - "source_file": "arxiv4.pdf" + "text": "", + "page_start": 224, + "page_end": 224, + "source_file": "00-80T-80.pdf" }, { - "text": "*What dataset management practices are necessary?*\n\nNo matter how a books data commons gets built, it will be important to consider broader \naspects of data governance. For example: \n\n•**Dataset documentation and transparency:**Transparent documentation is important \nfor any dataset used for AI training. A datasheet is a standardized form of \ndocumentation that includes information about provenance and composition of data, \nand includes information on management practices, recommended uses or collection \nprocess. \n\n•**Quality assurance:**Above, we note the many features that make books useful for AI \ntraining, as compared with web data, for example. That said, the institution managing \na books commons dataset may still want to collect and curate the collection to meet \nthe particular purposes of its users. For instance, it may want to take steps to \nmitigate biases inherent in the dataset, by ensuring books are representative of a \nvariety of languages and geographies. \n\n•**Understanding uses:**The institution managing a books commons dataset could \nmeasure and study how the dataset is used, to inform future improvements. Such \nmonitoring may also enable accountability measures with respect to uses of the \ndataset. Introducing community norms for disclosing datasets used in AI training and \nother forms of AI research would facilitate such monitoring. ", - "page_start": 20, - "page_end": 20, - "source_file": "creative_common_ai.pdf" + "text": "", + "page_start": 224, + "page_end": 224, + "source_file": "00-80T-80.pdf" }, { - "text": "A.1 All datasets \n\nTable 3 displays the size of each dataset along with \nthe average number of tokens per sample and their \nreferences. The dataset’s content was tokenized \nusing cl100k_base encoding. For Retrieval, the \ntwo numbers refer to the queries and the docu- \nments. For Reranking, the three numbers refer to \nthe queries, the pairs of queries with relevant docu- \nments and the pairs of queries with irrelevant ones, \nrespectively. The pairs of queries and documents \nare obtained from the 90 documents extracted. For \nSummEvalFr, the three numbers refer to the texts, \nhuman and machine summaries, respectively. \nSummEvalFr Extracts of humans and machine \nsummaries translated in French from SummEvalFr \nand the original ones in English from SummEval \n(Fabbri et al., 2021) are shown in Figure 9. As ex- \nplained in section 3.1.3, we use a LLM to evaluate \nthe quality of translations for human summaries, \nwe provide the prompt used with GPT-4 for this \nevaluation in Figure 8. \n\nFigure 3 represents the semantic similarity be- \ntween each dataset. The methodology was as fol- \nlows: 90 random samples per dataset are embedded \nusing the multilingual-e5-large model. The embed- \ndings of each dataset’s samples are averaged. The \nsimilarity between each dataset is then calculated \nusing cosine similarity as in (Muennighoff et al., \n2022). ", - "page_start": 12, - "page_end": 12, - "source_file": "arxiv4.pdf" + "text": "", + "page_start": 429, + "page_end": 429, + "source_file": "00-80T-80.pdf" }, { - "text": "• Samples belonging to domain classes with \nless than 500 samples were removed, which \nleads us to keep only 10 classes. \n\n• Subsampling was performed on 2 classes con- \ntaining more than 10k samples each to lower \nthe number of samples and mitigate the unbal- \nance of the dataset. \n\nMore details about this process are provided in the \nappendix A.2 along with some extracts in Figure \n6. We make the dataset publicly available in both \ntheir raw and clean versions. We use this dataset in \na clustering setup to cluster publications by their \ntitle and use the domain as ground truth. To ensure \nthe quality of this dataset, we run 3 baseline mod- \nels for classification: TF-IDF + SVM, a fine-tuned \nCamembert (Martin et al., 2019) and GPT-4 lever- \naging In-Context Learning (ICL). Furthermore, we \nrun one baseline model for topic modeling: Latent \nDirichlet Allocation (LDA) (Blei et al., 2003) and \nreport scores in the appendix A.2. \n\n3.1.3 SummEvalFr (Summarization) \nThe original SummEval dataset (Fabbri et al., 2021) \nconsists of 100 news articles from the CNN/Dai- ", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv4.pdf" + "text": "", + "page_start": 429, + "page_end": 429, + "source_file": "00-80T-80.pdf" }, { - "text": "**3.2.2 How to filter datasets by using “Faceted Search”**\n\nThe user can find suitable datasets by performing a “Faceted Search”. This means the user \nsystematically adds properties, which the desired dataset should fulfill, e.g. a dataset should be part \nof a specific catalogue or category. The following properties are available: \n\n• Countries, \n• Catalogues, \n• Categories, \n• Tags, \n• Formats, \n• Licences. \n\nThose facets are presented on the left side of the main dataset page. The available options for each \nfacet always reflect the availability of it in the current set of results. The numbers in brackets indicate \nhow many datasets in total have that property e.g. there are 117,610 datasets with a distribution in \nCSV format. ", - "page_start": 27, - "page_end": 27, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + "text": "", + "page_start": 429, + "page_end": 429, + "source_file": "00-80T-80.pdf" }, { - "text": "***1. Introduction***1 \n\nWhile the field of artificial intelligence research and technology has a long history, broad \npublic attention grew over the last year in light of the wide availability of new generative AI \nsystems, including large language models (LLMs) like GPT-4, Claude, and LLaMA-2. These \ntools are developed using machine learning and other techniques that analyze large datasets \nof written text, and they are capable of generating text in response to a user’s prompts. \n\nWhile many large language models rely on website text for training, books have also played \nan important role in developing and improving AI systems. Despite the widespread use of e- \nbooks and growth of sales in that market, books remain difficult for researchers and \nentrepreneurs to access at scale in digital form for the purposes of training AI. \n\nIn 2023, multiple news publications reported on the availability and use of a dataset of books \n The Books3 dataset contains text from over 170,000 books, \ncalled “Books3” to train LLMs. \nwhich are a mix of in-copyright and out-of-copyright works. It is believed to have been \noriginally sourced from a website that was not authorized to distribute all of the works \ncontained in the dataset. In lawsuits brought against OpenAI, Microsoft, Meta, and \nBloomberg related to their LLMs, the use of Books3 as training data was specifically cited. 3 \n\n2 ", - "page_start": 2, - "page_end": 2, - "source_file": "creative_common_ai.pdf" + "text": "", + "page_start": 429, + "page_end": 429, + "source_file": "00-80T-80.pdf" }, { - "text": "**3.2 Datasets (Data Platform)**\n\nThe**datasets section is the main access point for browsing, filtering and searching the datasets**. It \noffers a faceted search, a full text search and a geographical search. The dataset view provides access \nand information to the distributions of the dataset. \n\nThe home page of this section appears like this: ", - "page_start": 26, - "page_end": 26, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + "text": "", + "page_start": 429, + "page_end": 429, + "source_file": "00-80T-80.pdf" } ] }, @@ -5637,70 +5637,70 @@ "target_page": 9, "target_passage": "In the United States, all books published or released before 1929 are in the public domain. While use of these books provides maximal certainty for the AI developer to train on", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 239, + "page_end": 239, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 300, + "page_end": 300, + "source_file": "00-80T-80.pdf" }, { - "text": "***4. Copyright, Licensing, & Access to Books for***\n***Training***\n\nEven if books can be acquired, digitized, and made technically useful for AI training, the \ndevelopment of a books data commons would necessarily need to navigate and comply with \ncopyright law. \n\n**Out-of-Copyright Books:**A minority of books are old enough to be in the public domain and \nout of copyright, and an AI developer could use them in training without securing any \ncopyright permission. In the United States, all books published or released before 1929 are in \nthe public domain. While use of these books provides maximal certainty for the AI developer \nto train on, it is worth noting that the status of whether a book is in the public domain can be \ndifficult to determine. \n For instance, books released between 1929 and 1963 in the U.S. are \nout of copyright if they were not subject to a copyright renewal; however, data on copyright \nrenewals is not easily accessible. \n\n14 \n\nWhat’s more, copyright definitions and term lengths vary among countries. Even if a work is \nin the public domain in the US, it may not be in other countries. \n Countries generally use the \nlife of the last living author + “x” years to determine the term of copyright protection. For \nmost countries, “x” is either 50 years (the minimum required by the Berne Convention) or 70 \nyears (this is the case for all member states of the European Union and for all works \npublished in the U.S. after 1978). This approach makes it difficult to determine copyright \nterms with certainty because it requires information about the date of death of each author, \nwhich is often not readily available. \n\n15 ", - "page_start": 9, - "page_end": 9, - "source_file": "creative_common_ai.pdf" + "text": "", + "page_start": 300, + "page_end": 300, + "source_file": "00-80T-80.pdf" }, { - "text": "What this means for our purposes is that even if one acquires a digital book from, for \nexample, Amazon, and it is lawful under copyright law to use that book in AI training, it can \nstill generally be unlawful to circumvent the DRM to do so, outside narrow exceptions. \n 25 \nThus, the ability to use in-copyright books encumbered by DRM — that is, most all books sold \nby major publishers — is generally limited. 26 \n\nPractically, using in-copyright books to build a books commons for AI training — while relying \non copyright’s limitations and exceptions — requires turning a physical book into digital form, \nor otherwise engaging in the laborious process of manually re-creating a book’s text (i.e., re- \ntyping the full text of the book) without circumventing the technical restrictions themselves. ", - "page_start": 12, - "page_end": 12, - "source_file": "creative_common_ai.pdf" + "text": "", + "page_start": 300, + "page_end": 300, + "source_file": "00-80T-80.pdf" }, { - "text": "The authors and the publisher have made every effort to obtain permission for and \n\nto acknowledge the use of copyright material. Should any infringement of copyright \n\nhave occurred, please contact the publisher, and every effort will be made to rectify \n\nomissions or errors in the event of a reprint or new edition. ", - "page_start": 2, - "page_end": 2, - "source_file": "basic-english-language-skills.PDF" + "text": "", + "page_start": 300, + "page_end": 300, + "source_file": "00-80T-80.pdf" }, { - "text": "**In-Copyright Books:**The vast majority of books are in copyright, and, insofar as the training \nprocess requires making a copy of the book, the use in AI training may implicate copyright \nlaw. Our workshop covered three possible paths for incorporating such works. \n\n**Direct licensing**\n\nOne could directly license books from rightsholders. There may be some publishers who are \nwilling to license their works for this purpose, but it is hard to determine the scale of such \naccess, and, in any event, there are significant limits on this approach. Along with the \nchallenge (and expense) of reaching agreements with relevant rightsholders, there is also the \npractical difficulty of simply identifying and finding the rightsholder that one must negotiate ", - "page_start": 9, - "page_end": 9, - "source_file": "creative_common_ai.pdf" + "text": "", + "page_start": 300, + "page_end": 300, + "source_file": "00-80T-80.pdf" }, { - "text": " For a sense of the complexity, see e.g. Melissa Levine, Richard C. Adler.*Finding the Public Domain:*\n\n14 \n*Copyright Review Management System Toolkit*. 2016, quod.lib.umich.edu/c/crmstoolkit/ \n14616082.0001.001. Accessed 20 Mar. 2024.; Kopel, Matthew. “LibGuides: Copyright at Cornell Libraries: \nCopyright Term and the Public Domain.” guides.library.cornell.edu/copyright/publicdomain; \nMannapperuma, Menesha, et al.*Is It in the Public Domain? A HANDBOOK for EVALUATING the*\n*COPYRIGHT STATUS of a WORK CREATED in the UNITED STATES*. 1923. \n\n See e.g. Moody, Glyn. “Project Gutenberg Blocks Access in Germany to All Its Public Domain Books \n\n15 \nbecause of Local Copyright Claim on 18 of Them.”*Techdirt*, 7 Mar. 2018, www.techdirt.com/ \n2018/03/07/project-gutenberg-blocks-access-germany-to-all-public-domain-books-because-local- \ncopyright-claim-18-them/. Accessed 20 Mar. 2024. ", - "page_start": 9, - "page_end": 9, - "source_file": "creative_common_ai.pdf" + "text": "", + "page_start": 23, + "page_end": 23, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": "It is also an example predicated on copyright’s limitations and exceptions — in this case, on \nU.S. fair use. While the Authors Guild filed a copyright infringement suit against HathiTrust, \nfederal courts in 2012 and 2014 ruled that HathiTrust’s use of books was fair use. 32 \n\nA nonprofit founded in 2008, HathiTrust grew out of a partnership among major US university \nlibraries and today is “an international community of research libraries committed to the \nlong-term curation and availability of the cultural record.” \n It started in what it calls the “early \ndays of mass digitization” — that is, at a time when it started to become economical to take \nexisting physical artifacts in libraries and turn them into digital files at a large scale. \n\n33 \n\nThe founding members of HathiTrust were among the initial partners for Google’s Book \nSearch product, which allows people to search across and view small snippets of text from \nin-copyright books and read full copies of public domain books scanned from libraries’ \ncollections. The libraries provided Google with books from their collections, Google would \nthen scan the books for use in Book Search, and return to the libraries a digital copy for their \nown uses. These uses included setting up HathiTrust not only to ensure long-term \npreservation of the digital books and their metadata, but also to facilitate other uses, \nincluding full text search of books and accessibility for people with print disabilities. In \nseparate court cases, both Google and HathiTrust’s uses of the books were deemed \nconsistent with copyright law. \n\n34 ", - "page_start": 15, - "page_end": 15, - "source_file": "creative_common_ai.pdf" + "text": "", + "page_start": 23, + "page_end": 23, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": "Public domain works are valuable because anyone \ncan freely build upon, enhance, and reuse them for \nany purposes without restriction under copyright \nor database law. \n\nThat’s why it’s important for creators to have a clear and \nlegally robust way to place their works in the public domain as \ncompletely as possible, and it’s also important for publishers \nand archives to have a standardized way to identify works that \nare already in the public domain. \n\nCreative Commons supports two distinct public domain tools, \nthe CC0 Public Domain Dedication and the Public Domain \nMark. Creative Commons copyright licenses help authors \nmanage their copyright on terms they choose. Conversely, CC0 \nenables authors and copyright owners who want to dedicate \ntheir works to the worldwide public domain to do so, and PDM \nfacilitates the labeling and discovery of works that are already \nfree of known copyright restrictions. \n\nWhere public domain tools fit in the copyright spectrum \n\nCC0 \nPublic \ndomain \nSome rights \nreserved All rights \nreserved \n\nPDM \nNo known \ncopyright ", - "page_start": 1, - "page_end": 1, - "source_file": "Publicdomain.pdf" + "text": "", + "page_start": 300, + "page_end": 300, + "source_file": "00-80T-80.pdf" }, { - "text": "**Implications of the The Overall Approach**\n\nStepping back from The Pile v2 specifically, or any particular existing collection of books or \ndataset built on their basis, we want to understand the implications of relying on public \ndomain works and expressly licensed works in building a books commons. \n\nThe benefits are relatively straightforward. Both categories, by definition come with express \npermission to use the books in AI training. The cost of acquiring the books for this use may \nbe effectively zero or close to it, when considering public domain and “openly” licensed \nbooks that allow redistribution and that have already been digitized. \n\nBut this approach comes with some clear limitations. First, as noted above, for many books \nin the public domain, their status as such is not always clear. And with respect to \npermissively licensed books, it is not always clear whether and how to comply with the \nlicense obligations in this context. \n\nSetting aside those challenges, the simple fact is that relying on public domain and existing \npermissively licensed books would limit the quantity and diversity of data available for \ntraining, impacting performance along different dimensions. Only a small fraction of books \never published fall into this category, and the corpus of books in this category is likely to be \nskewed heavily towards older public domain books. This skew would, in turn, impact the \n For instance, relying on books from before 1929 would not \ncontent available for AI training. \nonly incorporate outdated language patterns, but also a range of biases and misconceptions \nabout race and gender, among other things. Efforts could be made to get people to \npermissively license more material — a book drive for permissive licensing, so to speak; this \napproach would still not encompass most books, at least when it comes to past works. \n\n30 \n\n 31 ", - "page_start": 14, - "page_end": 14, - "source_file": "creative_common_ai.pdf" + "text": "", + "page_start": 300, + "page_end": 300, + "source_file": "00-80T-80.pdf" } ] }, @@ -5711,70 +5711,70 @@ "target_page": 13, "target_passage": "Among other things, v2 would “have many more books than the original Pile had, for example, and more diverse representation of non-academic non-fiction domains.” At the same time, it would only seek to include public domain books and permissively licensed content", "chunk_present": { - "presence": true, - "index": 5 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 17, + "page_end": 17, + "source_file": "NASDAQ_FFIN_2002.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 285, + "page_end": 285, + "source_file": "00-80T-80.pdf" }, { - "text": "**3.4.1 How to visualize graphical data from a dataset resource**\n\nAs a result of a dataset search, the system displays on the “Dataset” tab all distributions \n(resource/data files) that are part of the selected dataset. Each XLS or CSV distribution of the dataset \ncan be further explored by clicking on “Open Visualization” under the “Options” button – if available. ", - "page_start": 43, - "page_end": 43, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + "text": "", + "page_start": 285, + "page_end": 285, + "source_file": "00-80T-80.pdf" }, { - "text": "3.1.5 Similarity analysis \nWe investigate the proximity between the datasets’ \ntopics to give insights about the benchmark con- \ntents. The methodology introduced by Muen- \nnighoff et al. (2022), i.e. computing an average \nembedding of samples from each dataset, is used to \nbuild a dataset-similarity matrix (displayed in ap- \npendix Figure 3). The distances between averaged \nembedding vectors of each dataset (which range \nfrom 0.89 to 1 in Figure 3) remain hard to interpret \ninto a dataset semantic proximity. Thus, we com- \nplement this by observing the dataset’s clouds of \nembedding in a 2D plane using PCA in Figure 4. \nFigures 4 and 3 seem to correlate, showing high \nsimilarity between two datasets when the same \nunderlying data is used in different tasks. Dataset \ntopics are pretty close, with some exceptions, such \nas the Syntec dataset. As more datasets are added \nto the benchmark, this analysis will help select new \ndata that do not produce redundant results. It may \nalso help to understand the link between the results \nand the datasets’ topics. \n\n2023) where given the original human summary \nin English and its translation in French, the model \nrates the quality of the translation from 0 to 10, \nwith 0 being of very bad quality and 10 being ex- \ncellent. The prompt is available in Figure 8. Ad- \nditionally, we manually check random translations \nwith ratings between 9 and 10 to ensure the rating \nis relevant. We do the same for all translations with \na score less than 9 and correct them7 (see the rating \ndistribution in Table 6). \n\n3.1.4 Data for the Reranking task ", - "page_start": 4, - "page_end": 4, - "source_file": "arxiv4.pdf" + "text": "", + "page_start": 285, + "page_end": 285, + "source_file": "00-80T-80.pdf" }, { - "text": "**3.2.2 How to filter datasets by using “Faceted Search”**\n\nThe user can find suitable datasets by performing a “Faceted Search”. This means the user \nsystematically adds properties, which the desired dataset should fulfill, e.g. a dataset should be part \nof a specific catalogue or category. The following properties are available: \n\n• Countries, \n• Catalogues, \n• Categories, \n• Tags, \n• Formats, \n• Licences. \n\nThose facets are presented on the left side of the main dataset page. The available options for each \nfacet always reflect the availability of it in the current set of results. The numbers in brackets indicate \nhow many datasets in total have that property e.g. there are 117,610 datasets with a distribution in \nCSV format. ", - "page_start": 27, - "page_end": 27, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + "text": "", + "page_start": 285, + "page_end": 285, + "source_file": "00-80T-80.pdf" }, { - "text": "As the awareness about The Pile dataset grew, certain rightsholders began sending copyright \nnotices to have the dataset taken down from various websites. \n\nDespite the takedown requests, the importance of books to EleutherAI and the broader \ncommunity’s AI research remained. In hoping to forge a path forward EleutherAI announced \n 29 \nin 2024 that they would create a new version of the dataset, which they will call The Pile v2. \nAmong other things, v2 would “have many more books than the original Pile had, for \nexample, and more diverse representation of non-academic non-fiction domains.” At the \nsame time, it would only seek to include public domain books and permissively licensed \ncontent. As before, this corpus focuses on English language books. ", - "page_start": 13, - "page_end": 13, - "source_file": "creative_common_ai.pdf" + "text": "", + "page_start": 285, + "page_end": 285, + "source_file": "00-80T-80.pdf" }, { - "text": "• Samples belonging to domain classes with \nless than 500 samples were removed, which \nleads us to keep only 10 classes. \n\n• Subsampling was performed on 2 classes con- \ntaining more than 10k samples each to lower \nthe number of samples and mitigate the unbal- \nance of the dataset. \n\nMore details about this process are provided in the \nappendix A.2 along with some extracts in Figure \n6. We make the dataset publicly available in both \ntheir raw and clean versions. We use this dataset in \na clustering setup to cluster publications by their \ntitle and use the domain as ground truth. To ensure \nthe quality of this dataset, we run 3 baseline mod- \nels for classification: TF-IDF + SVM, a fine-tuned \nCamembert (Martin et al., 2019) and GPT-4 lever- \naging In-Context Learning (ICL). Furthermore, we \nrun one baseline model for topic modeling: Latent \nDirichlet Allocation (LDA) (Blei et al., 2003) and \nreport scores in the appendix A.2. \n\n3.1.3 SummEvalFr (Summarization) \nThe original SummEval dataset (Fabbri et al., 2021) \nconsists of 100 news articles from the CNN/Dai- ", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv4.pdf" + "text": "", + "page_start": 285, + "page_end": 285, + "source_file": "00-80T-80.pdf" }, { - "text": "has been critical for enabling the surge of advancements \nin other modalities, such as text and images (Kaplan \net al., 2020; Cherti et al., 2023). We investigate whether \na similar trend holds for video data. To control for the \npossible confounding variable of compute budget, we \npretrain all models in Table 2 for 90K iterations using \na batch-size of 3072. We report downstream results on \nK400, SSv2, and IN1K using a frozen backbone with an \nattentive probe, and report top-1 accuracy using a single \ncenter view. \n\n| multi-block | 72.9 | 67.4 | 72.8 |\n|---|---|---|---|\n| multi-block | 72.9 | 67.4 | 72.8 |\n\n\nwith a single GeLU activation, followed by a LayerNorm, \nand finally a linear classifier. \n\nIn Table 3 we see that using adaptive pooling with \na learnable cross-attention layer leads to a significant \nimprovement of +17 points on K400 and +16.1 points \non SSv2. Using an attentive-probe is also beneficial for \nother baseline models as reported in Appendix E. \n\nTable 2 shows that average performance across tasks \nmonotonically increases as we increase the size of the \npretraining dataset, but the best task-specific perfor- \nmance is obtained by independently selecting the pre- \ntraining data for each specific downstream task. For \ninstance, the L/16 obtains its best SSv2 performance \nwhen pretrained on K710+SSv2, its best K400 perfor- \nmance when pretrained only on K710, and its best IN1K \nperformance when pretrained only on K710+HT. The \nbest average performance across all tasks is achieved by \npretraining VideoMix2M, which combines all the data \nsources. Similarly, the H/16 pretrained on K710+SSv2 \nachieves a greater K400 score than the H/16 pretrained \non VideoMix2M, however, the top performing H/16 on \naverage is pretrained on VideoMix2M. ", - "page_start": 6, - "page_end": 6, - "source_file": "arxiv3.pdf" + "text": "", + "page_start": 285, + "page_end": 285, + "source_file": "00-80T-80.pdf" }, { - "text": "A.1 All datasets \n\nTable 3 displays the size of each dataset along with \nthe average number of tokens per sample and their \nreferences. The dataset’s content was tokenized \nusing cl100k_base encoding. For Retrieval, the \ntwo numbers refer to the queries and the docu- \nments. For Reranking, the three numbers refer to \nthe queries, the pairs of queries with relevant docu- \nments and the pairs of queries with irrelevant ones, \nrespectively. The pairs of queries and documents \nare obtained from the 90 documents extracted. For \nSummEvalFr, the three numbers refer to the texts, \nhuman and machine summaries, respectively. \nSummEvalFr Extracts of humans and machine \nsummaries translated in French from SummEvalFr \nand the original ones in English from SummEval \n(Fabbri et al., 2021) are shown in Figure 9. As ex- \nplained in section 3.1.3, we use a LLM to evaluate \nthe quality of translations for human summaries, \nwe provide the prompt used with GPT-4 for this \nevaluation in Figure 8. \n\nFigure 3 represents the semantic similarity be- \ntween each dataset. The methodology was as fol- \nlows: 90 random samples per dataset are embedded \nusing the multilingual-e5-large model. The embed- \ndings of each dataset’s samples are averaged. The \nsimilarity between each dataset is then calculated \nusing cosine similarity as in (Muennighoff et al., \n2022). ", - "page_start": 12, - "page_end": 12, - "source_file": "arxiv4.pdf" + "text": "", + "page_start": 285, + "page_end": 285, + "source_file": "00-80T-80.pdf" }, { - "text": "In Table 15, we evaluate V-JEPA using finetuning (separately) on K400 and SSv2. We compare V-JEPA with \nVideoMAEv2 (Wang et al., 2023a), VideoMAE (Tong et al., 2022) and MVD (Wang et al., 2023b) using a ViT-L/16 \nor a ViT-H/16 architecture. V-JEPA obtains competitive performance using a finetuning protocol. With a ViTiH/16 \narchitecture, V-JEPA outperforms by 1.2% VideoMAE and +0.3% VideoMAEv2 on the SSv2 dataset, while obtaining \ncomparable performance on K400. V-JEPA also obtains performance similar to MVD on the SSv2 dataset. The \nMVD model achieves the best performance across models on the K400 dataset, and is trained using the image \ndataset ImageNet1K, in contrast to the other methods in the table, which only use video data. Additionally MVD \nrequires the processing of significantly more samples during pretraining due to the cost of training the teacher \nencoder networks in a pre-pre-training step. ", - "page_start": 21, - "page_end": 21, - "source_file": "arxiv3.pdf" + "text": "", + "page_start": 284, + "page_end": 284, + "source_file": "00-80T-80.pdf" } ] }, @@ -5785,70 +5785,70 @@ "target_page": 1, "target_passage": "The AI + Energy Summit, scheduled for September 26, 2024, in Washington, D.C.", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 300, + "page_end": 300, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 347, + "page_end": 347, + "source_file": "00-80T-80.pdf" }, { - "text": "ARTS AND ENTERTAINMENT \n\nNew Artificial Intelligence Summit Series Begins With \nEnergy \n\n07/31/2024 \n\n (AI) continues to transform the United States and the world. To promote and inform rapid advancements in AI and maintain \n\nAmerica’s global competitiveness, the Special Competitive Studies Project (SCSP), a nonprofit and nonpartisan initiative \n\nwith a goal of making recommendations to strengthen America's long-term competitiveness in AI, announces the AI+ Summit \n\nSeries. \n\nThe series kicks off with the topic of energy. The AI + Energy Summit, scheduled for September 26, 2024, in Washington, \n\nD.C., will bring together policy makers, energy industry leaders, top government and academic energy researchers, and \n\ntechnologists to address the challenges of AI’s energy consumption and develop solutions for a resilient and abundant \n\nenergy future. The event also aims to address the implications of AI and energy for national security and promote \n\npartnerships between AI and energy stakeholders. \n\nAI and other emerging technologies can help the United States take the lead in energy areas including maximizing energy \n\nefficiencies, discovering new materials, and enabling new forms of power generation. AI also has a role to play in \n\novercoming energy challenges. The Department of Energy (DOE) already uses AI in several areas including advanced \n\ncomputing, emergency response, environmental modeling, climate forecasting, and materials research. ", - "page_start": 1, - "page_end": 1, - "source_file": "news1.pdf" + "text": "", + "page_start": 349, + "page_end": 349, + "source_file": "00-80T-80.pdf" }, { - "text": "Declaration\" (https://www.gov.uk/government/news/countries-agree-to-safe-and-responsible \n-development-of-frontier-ai-in-landmark-bletchley-declaration).*GOV.UK*(Press release). \nArchived (https://web.archive.org/web/20231101115016/https://www.gov.uk/government/ne \nws/countries-agree-to-safe-and-responsible-development-of-frontier-ai-in-landmark-bletchle \ny-declaration) from the original on 1 November 2023. Retrieved 1 November 2023. \n\n317. \"Second global AI summit secures safety commitments from companies\" (https://www.reuter \ns.com/technology/global-ai-summit-seoul-aims-forge-new-regulatory-agreements-2024-05-2 \n1). Reuters. 21 May 2024. Retrieved 23 May 2024. \n\n318. \"Frontier AI Safety Commitments, AI Seoul Summit 2024\" (https://web.archive.org/web/2024 \n0523201611/https://www.gov.uk/government/publications/frontier-ai-safety-commitments-ai- \nseoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-2024). gov.uk. 21 May \n2024. Archived from the original (https://www.gov.uk/government/publications/frontier-ai-safe \nty-commitments-ai-seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-202 \n4) on 23 May 2024. Retrieved 23 May 2024. \n\n319. Russell & Norvig 2021, p. 9. \n320. Copeland, J., ed. (2004).*The Essential Turing: the ideas that gave birth to the computer*\n\n*age*. Oxford, England: Clarendon Press. ISBN 0-1982-5079-7. \n\n321. \"Google books ngram\" (https://books.google.com/ngrams/graph?content=electronic+brain& \nyear_start=1930&year_end=2019&corpus=en-2019&smoothing=3). Archived (https://web.ar \nchive.org/web/20241005170209/https://books.google.com/ngrams/graph?content=electronic \n+brain&year_start=1930&year_end=2019&corpus=en-2019&smoothing=3) from the original \non 5 October 2024. Retrieved 5 October 2024. \n\n322. AI's immediate precursors: McCorduck (2004, pp. 51–107), Crevier (1993, pp. 27–32), \n\nRussell & Norvig (2021, pp. 8–17), Moravec (1988, p. 3) ", - "page_start": 48, - "page_end": 48, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 349, + "page_end": 349, + "source_file": "00-80T-80.pdf" }, { - "text": "In November 2023, the first global AI Safety Summit was held in Bletchley Park in the UK to discuss the \nnear and far term risks of AI and the possibility of mandatory and voluntary regulatory frameworks.[314] \n28 countries including the United States, China, and the European Union issued a declaration at the start \nof the summit, calling for international co-operation to manage the challenges and risks of artificial \nintelligence.[315][316] In May 2024 at the AI Seoul Summit, 16 global AI tech companies agreed to safety \ncommitments on the development of AI.[317][318] ", - "page_start": 22, - "page_end": 22, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 349, + "page_end": 349, + "source_file": "00-80T-80.pdf" }, { - "text": "SCSP’s recent “Action Plan for U.S. Leadership in Next-Generation Energy,” raises many issues related to AI and energy, \n\nincluding recommendations for the government to bring America forward. The AI+ Energy Summit will highlight these and \n\nother issues, and promote collaboration to solve problems. The stakes are high; if the U.S. falls short on energy, American \n\nadversaries could gain the upper hand in AI leadership, according to SCSP experts. \n\nVisit scsp.ai to learn more about the AI+Energy Summit and the SCSP’s Next-Generation Energy Action Plan. \n\nArticle Link \n\nhttps://about.newsusa.com/new-artificial-intelligence-summit-series-begins-with… ", - "page_start": 1, - "page_end": 1, - "source_file": "news1.pdf" + "text": "", + "page_start": 349, + "page_end": 349, + "source_file": "00-80T-80.pdf" }, { - "text": "ww.nytimes.com/2023/07/05/business/artificial-intelligence-power-data-centers.html).*The*\n*New York Times*. Archived (https://web.archive.org/web/20240708214644/https://www.nytim \nes.com/2023/07/05/business/artificial-intelligence-power-data-centers.html) from the original \non 8 July 2024. Retrieved 5 October 2024. \n\n203. \"Electricity 2024 – Analysis\" (https://www.iea.org/reports/electricity-2024).*IEA*. 24 January \n\n2024. Retrieved 13 July 2024. \n\n204. Calvert, Brian (28 March 2024). \"AI already uses as much energy as a small country. It's \n\nonly the beginning\" (https://www.vox.com/climate/2024/3/28/24111721/ai-uses-a-lot-of-ener \ngy-experts-expect-it-to-double-in-just-a-few-years).*Vox*. New York, New York. Archived (http \ns://web.archive.org/web/20240703080555/https://www.vox.com/climate/2024/3/28/2411172 \n1/ai-uses-a-lot-of-energy-experts-expect-it-to-double-in-just-a-few-years) from the original \non 3 July 2024. Retrieved 5 October 2024. ", - "page_start": 42, - "page_end": 42, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 350, + "page_end": 350, + "source_file": "00-80T-80.pdf" }, { - "text": "Reasoning Performance, and the Reasoning Gap\". arXiv:2402.19450 (https://arxiv.org/abs/2 \n402.19450) [cs.AI (https://arxiv.org/archive/cs.AI)]. \n\n157. Roberts, Siobhan (25 July 2024). \"AI achieves silver-medal standard solving International \n\nMathematical Olympiad problems\" (https://www.nytimes.com/2024/07/25/science/ai-math-al \nphaproof-deepmind.html).*The New York Times*. Archived (https://web.archive.org/web/2024 \n0926131402/https://www.nytimes.com/2024/07/25/science/ai-math-alphaproof-deepmind.ht \nml) from the original on 26 September 2024. Retrieved 7 August 2024. \n158.*LLEMMA*. (https://blog.eleuther.ai/llemma/) eleuther.ai. Retrieved 2024-08-07. \n159. AI Math. (https://julius.ai/home/ai-math) Archived (https://web.archive.org/web/20241005165 \n\n649/https://julius.ai/home/ai-math) 5 October 2024 at the Wayback Machine Caesars Labs, \n2024. Retrieved 2024-08-07. ", - "page_start": 38, - "page_end": 38, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 350, + "page_end": 350, + "source_file": "00-80T-80.pdf" }, { - "text": "160. Alex McFarland:*7 Best AI for Math Tools.*(https://www.unite.ai/best-ai-for-math-tools/) \n\nArchived (https://web.archive.org/web/20240911125615/https://www.unite.ai/best-ai-for-mat \nh-tools/) 11 September 2024 at the Wayback Machine unite.ai. Retrieved 2024-08-07 \n161. Matthew Finio & Amanda Downie: IBM Think 2024 Primer, \"What is Artificial Intelligence (AI) \n\nin Finance?\" 8 Dec. 2023 \n\n162. M. Nicolas, J. Firzli: Pensions Age/European Pensions magazine, \"Artificial Intelligence: Ask \n\nthe Industry\" May June 2024 https://videovoice.org/ai-in-finance-innovation- \nentrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-act-wont-work-as- \nintended/ Archived (https://web.archive.org/web/20240911125502/https://videovoice.org/ai-i \nn-finance-innovation-entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence- \nact-wont-work-as-intended/) 11 September 2024 at the Wayback Machine. ", - "page_start": 39, - "page_end": 39, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 350, + "page_end": 350, + "source_file": "00-80T-80.pdf" }, { - "text": "**Power needs and environmental impacts**\n\nIn January 2024, the International Energy Agency (IEA) released*Electricity 2024, Analysis and Forecast*\n*to 2026*, forecasting electric power use.[203] This is the first IEA report to make projections for data \ncenters and power consumption for artificial intelligence and cryptocurrency. The report states that power \ndemand for these uses might double by 2026, with additional electric power usage equal to electricity \nused by the whole Japanese nation.[204] \n\nProdigious power consumption by AI is responsible for the growth of fossil fuels use, and might delay \nclosings of obsolete, carbon-emitting coal energy facilities. There is a feverish rise in the construction of \ndata centers throughout the US, making large technology firms (e.g., Microsoft, Meta, Google, Amazon) \ninto voracious consumers of electric power. Projected electric consumption is so immense that there is \nconcern that it will be fulfilled no matter the source. A ChatGPT search involves the use of 10 times the \nelectrical energy as a Google search. The large firms are in haste to find power sources – from nuclear \nenergy to geothermal to fusion. The tech firms argue that – in the long view – AI will be eventually \nkinder to the environment, but they need the energy now. AI makes the power grid more efficient and \n\"intelligent\", will assist in the growth of nuclear power, and track overall carbon emissions, according to \ntechnology firms.[205] ", - "page_start": 14, - "page_end": 14, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 350, + "page_end": 350, + "source_file": "00-80T-80.pdf" } ] }, @@ -5865,63 +5865,63 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 418, + "page_end": 418, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 0, + "page_end": 0, + "source_file": "NASDAQ_EMMS_2004.pdf" }, { - "text": "SCSP’s recent “Action Plan for U.S. Leadership in Next-Generation Energy,” raises many issues related to AI and energy, \n\nincluding recommendations for the government to bring America forward. The AI+ Energy Summit will highlight these and \n\nother issues, and promote collaboration to solve problems. The stakes are high; if the U.S. falls short on energy, American \n\nadversaries could gain the upper hand in AI leadership, according to SCSP experts. \n\nVisit scsp.ai to learn more about the AI+Energy Summit and the SCSP’s Next-Generation Energy Action Plan. \n\nArticle Link \n\nhttps://about.newsusa.com/new-artificial-intelligence-summit-series-begins-with… ", - "page_start": 1, - "page_end": 1, - "source_file": "news1.pdf" + "text": "", + "page_start": 157, + "page_end": 157, + "source_file": "00-80T-80.pdf" }, { - "text": "\nUSA ", - "page_start": 9, - "page_end": 9, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 157, + "page_end": 157, + "source_file": "00-80T-80.pdf" }, { - "text": "\nUSA ", - "page_start": 8, - "page_end": 8, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 0, + "page_end": 0, + "source_file": "NASDAQ_EMMS_2004.pdf" }, { - "text": "**2.5.2 Creating an instance on z/OS**\n\nIn this section, we explain how to create an instance on the z/OS system. To do so, complete \nthe following steps: \n\n1. Copy the control files. \n2. Verify the ARS.INI file. \n3. Verify the ARS.CFG file. \n4. Modify the ARS.CACHE file. \n5. Verify the CLI.INI file. \n6. Modify the**ARSSOCKD**procedure. \n7. Modify the**ARSLOAD**procedure. \n\nYou can mount the Content Manager OnDemand installation directory at any mount point \nother than /usr/lpp/ars/V9R5M0. You can run at different service levels with this flexibility. For \nexample, a symmetric multiprocessor (SMP) might be used to install into \nSERVICE/usr/lpp/ars/V9R5M0. SERVICE/usr/lpp/ars/V9R5M0 might be copied into \n/usr/lpp/ars/V9R5M0/maint for testing. When testing is complete, \n/usr/lpp/ars/V9R5M0/maint might be copied into /usr/lpp/ars/V9R5M0 for production. ", - "page_start": 62, - "page_end": 62, + "text": "", + "page_start": 335, + "page_end": 335, "source_file": "sg246915.pdf" }, { - "text": "5. Ensure that the primary host attach WWPNs (virtual WWPNs) now allow host traffic, as \nshown in**bold**in Example 8-7. \n\nExample 8-7 Host attach WWPNs (virtual WWPNs) permitting host traffic ", - "page_start": 347, - "page_end": 347, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 0, + "page_end": 0, + "source_file": "NASDAQ_EMMS_2004.pdf" }, { - "text": "//ARS95037 PROC PARML= \n//*\n//*Library: USER.PRIVATE.PROCLIB(ARS95037) \n//*\n//ARS95037 EXEC PGM=ARSSOCKD,REGION=0M,TIME=NOLIMIT, \n// PARM=('/VERBOSE ARC95037') \n//STEPLIB DD DISP=SHR,DSN=ARS.ARSV950.SARSLOAD \n// DD DISP=SHR,DSN=DSN.DB2V910.SDSNEXIT \n// DD DISP=SHR,DSN=DSN.DB2V910.SDSNLOAD \n// DD DISP=SHR,DSN=DSN.DB2V910.SDSNLOD2 \n//ARSBIN DD PATH='/usr/lpp/ars/V9R5M0/bin' \n//DSNAOINI DD PATH='/etc/ars/cli937.ini' \n//SYSPRINT DD SYSOUT=*\n//SYSOUT DD SYSOUT=*\n\n*Figure 2-11 Sample Content Manager OnDemand procedure*\n\nAfter this procedure is started, log on to the new instance by using the different port number \nand create users, application groups, applications, and storage sets with the normal \nprocedures. ", - "page_start": 67, - "page_end": 67, + "text": "", + "page_start": 334, + "page_end": 334, "source_file": "sg246915.pdf" }, { - "text": "**8.3.3 Enabling NPIV on an existing system**\n\nWhen IBM Spectrum Virtualize systems that are running code earlier than V7.7.1 are \nupgraded to V7.7.1 or later, the NPIV feature is not turned on by default because it might \nrequire changes to host-side zoning. \n\nEnabling NPIV on a system requires that you complete the following steps after you meet the \nprerequisites: \n\n1. Audit your SAN fabric layout and zoning rules because NPIV has stricter requirements. \nEnsure that equivalent ports are on the same fabric and in the same zone. \n\n2. Check the path count between your hosts and the IBM Spectrum Virtualize system to \nensure that the number of paths is half of the usual supported maximum. \n\nFor more information, see IBM Knowledge Center. \n\n3. Run the**lstargetportfc**command to discover the primary host attach WWPNs (virtual \nWWPNs), as shown in**bold**in Example 8-5. \n\nExample 8-5 Using the lstargetportfc command to get primary host WWPNs (virtual WWPNs) ", - "page_start": 345, - "page_end": 345, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 157, + "page_end": 157, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n-lop \n_- - - ", - "page_start": 421, - "page_end": 421, + "text": "", + "page_start": 157, + "page_end": 157, "source_file": "00-80T-80.pdf" } ] @@ -5933,70 +5933,70 @@ "target_page": 1, "target_passage": "The Department of Energy (DOE) already uses AI in several areas including advanced computing, emergency response, environmental modeling, climate forecasting, and materials research", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 1, + "page_end": 1, + "source_file": "NASDAQ_EMMS_2004.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 201, + "page_end": 201, + "source_file": "00-80T-80.pdf" }, { - "text": "ARTS AND ENTERTAINMENT \n\nNew Artificial Intelligence Summit Series Begins With \nEnergy \n\n07/31/2024 \n\n (AI) continues to transform the United States and the world. To promote and inform rapid advancements in AI and maintain \n\nAmerica’s global competitiveness, the Special Competitive Studies Project (SCSP), a nonprofit and nonpartisan initiative \n\nwith a goal of making recommendations to strengthen America's long-term competitiveness in AI, announces the AI+ Summit \n\nSeries. \n\nThe series kicks off with the topic of energy. The AI + Energy Summit, scheduled for September 26, 2024, in Washington, \n\nD.C., will bring together policy makers, energy industry leaders, top government and academic energy researchers, and \n\ntechnologists to address the challenges of AI’s energy consumption and develop solutions for a resilient and abundant \n\nenergy future. The event also aims to address the implications of AI and energy for national security and promote \n\npartnerships between AI and energy stakeholders. \n\nAI and other emerging technologies can help the United States take the lead in energy areas including maximizing energy \n\nefficiencies, discovering new materials, and enabling new forms of power generation. AI also has a role to play in \n\novercoming energy challenges. The Department of Energy (DOE) already uses AI in several areas including advanced \n\ncomputing, emergency response, environmental modeling, climate forecasting, and materials research. ", - "page_start": 1, - "page_end": 1, - "source_file": "news1.pdf" + "text": "", + "page_start": 201, + "page_end": 201, + "source_file": "00-80T-80.pdf" }, { - "text": "Some authors have suggested in practice, that the definition of AI is vague and difficult to define, with \ncontention as to whether classical algorithms should be categorised as AI,[367] with many companies \nduring the early 2020s AI boom using the term as a marketing buzzword, often even if they did \"not \nactually use AI in a material way\".[368] ", - "page_start": 25, - "page_end": 25, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 201, + "page_end": 201, + "source_file": "00-80T-80.pdf" }, { - "text": "**AI welfare and rights**\n\nIt is difficult or impossible to reliably evaluate whether an advanced AI is sentient (has the ability to feel), \nand if so, to what degree.[388] But if there is a significant chance that a given machine can feel and suffer, \nthen it may be entitled to certain rights or welfare protection measures, similarly to animals.[389][390] \nSapience (a set of capacities related to high intelligence, such as discernment or self-awareness) may \nprovide another moral basis for AI rights.[389] Robot rights are also sometimes proposed as a practical \nway to integrate autonomous agents into society.[391] \n\nIn 2017, the European Union considered granting \"electronic personhood\" to some of the most capable AI \nsystems. Similarly to the legal status of companies, it would have conferred rights but also \nresponsibilities.[392] Critics argued in 2018 that granting rights to AI systems would downplay the \nimportance of human rights, and that legislation should focus on user needs rather than speculative \nfuturistic scenarios. They also noted that robots lacked the autonomy to take part to society on their \nown.[393][394] \n\nProgress in AI increased interest in the topic. Proponents of AI welfare and rights often argue that AI \nsentience, if it emerges, would be particularly easy to deny. They warn that this may be a moral blind spot \nanalogous to slavery or factory farming, which could lead to large-scale suffering if sentient AI is created \nand carelessly exploited.[390][389] ", - "page_start": 27, - "page_end": 27, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "SCSP’s recent “Action Plan for U.S. Leadership in Next-Generation Energy,” raises many issues related to AI and energy, \n\nincluding recommendations for the government to bring America forward. The AI+ Energy Summit will highlight these and \n\nother issues, and promote collaboration to solve problems. The stakes are high; if the U.S. falls short on energy, American \n\nadversaries could gain the upper hand in AI leadership, according to SCSP experts. \n\nVisit scsp.ai to learn more about the AI+Energy Summit and the SCSP’s Next-Generation Energy Action Plan. \n\nArticle Link \n\nhttps://about.newsusa.com/new-artificial-intelligence-summit-series-begins-with… ", - "page_start": 1, - "page_end": 1, - "source_file": "news1.pdf" + "text": "", + "page_start": 201, + "page_end": 201, + "source_file": "00-80T-80.pdf" }, { - "text": "**Regulation**\n\nThe regulation of artificial intelligence is the development \nof public sector policies and laws for promoting and \nregulating AI; it is therefore related to the broader regulation \nof algorithms.[302] The regulatory and policy landscape for \nAI is an emerging issue in jurisdictions globally.[303] \nAccording to AI Index at Stanford, the annual number of \nAI-related laws passed in the 127 survey countries jumped \nfrom one passed \nin 2022 \nalone.[304][305] Between 2016 and 2020, more than 30 \ncountries adopted dedicated strategies for AI.[306] Most EU \nmember states had released national AI strategies, as had \nCanada, China, India, Japan, Mauritius, \nthe Russian \nFederation, Saudi Arabia, United Arab Emirates, U.S., and \nVietnam. Others were in the process of elaborating their own AI strategy, including Bangladesh, Malaysia \nand Tunisia.[306] The Global Partnership on Artificial Intelligence was launched in June 2020, stating a \nneed for AI to be developed in accordance with human rights and democratic values, to ensure public \nconfidence and trust in the technology.[306] Henry Kissinger, Eric Schmidt, and Daniel Huttenlocher \npublished a joint statement in November 2021 calling for a government commission to regulate AI.[307] \nIn 2023, OpenAI leaders published recommendations for the governance of superintelligence, which they \nbelieve may happen in less than 10 years.[308] In 2023, the United Nations also launched an advisory \nbody to provide recommendations on AI governance; the body comprises technology company \nexecutives, governments officials and academics.[309] In 2024, the Council of Europe created the first \ninternational legally binding treaty on AI, called the \"Framework Convention on Artificial Intelligence \nand Human Rights, Democracy and the Rule of Law\". It was adopted by the European Union, the United \nStates, the United Kingdom, and other signatories.[310] \n\nin 2016 to 37 passed ", - "page_start": 21, - "page_end": 21, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 201, + "page_end": 201, + "source_file": "00-80T-80.pdf" }, { - "text": "**Artificial intelligence**\n\n**Artificial intelligence**(**AI**), in its broadest sense, is intelligence exhibited by machines, particularly \ncomputer systems. It is a field of research in computer science that develops and studies methods and \nsoftware that enable machines to perceive their environment and use learning and intelligence to take \nactions that maximize their chances of achieving defined goals.[1] Such machines may be called AIs. \n\nHigh-profile applications of AI include advanced web search engines (e.g., Google Search); \nrecommendation systems (used by YouTube, Amazon, and Netflix); virtual assistants (e.g., Google \nAssistant, Siri, and Alexa); autonomous vehicles (e.g., Waymo); generative and creative tools (e.g., \nChatGPT and AI art); and superhuman play and analysis in strategy games (e.g., chess and Go). However, \nmany AI applications are not perceived as AI: \"A lot of cutting edge AI has filtered into general \napplications, often without being called AI because once something becomes useful enough and common \nenough it's not labeled AI anymore.\"[2][3] \n\nVarious subfields of AI research are centered around particular goals and the use of particular tools. The \ntraditional goals of AI research include reasoning, knowledge representation, planning, learning, natural \nlanguage processing, perception, and support for robotics.[a] General intelligence—the ability to complete \nany task performed by a human on an at least equal level—is among the field's long-term goals.[4] To \nreach these goals, AI researchers have adapted and integrated a wide range of techniques, including \nsearch and mathematical optimization, formal logic, artificial neural networks, and methods based on \nstatistics, operations research, and economics.[b] AI also draws upon psychology, linguistics, philosophy, \nneuroscience, and other fields.[5] ", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 201, + "page_end": 201, + "source_file": "00-80T-80.pdf" }, { - "text": "**Power needs and environmental impacts**\n\nIn January 2024, the International Energy Agency (IEA) released*Electricity 2024, Analysis and Forecast*\n*to 2026*, forecasting electric power use.[203] This is the first IEA report to make projections for data \ncenters and power consumption for artificial intelligence and cryptocurrency. The report states that power \ndemand for these uses might double by 2026, with additional electric power usage equal to electricity \nused by the whole Japanese nation.[204] \n\nProdigious power consumption by AI is responsible for the growth of fossil fuels use, and might delay \nclosings of obsolete, carbon-emitting coal energy facilities. There is a feverish rise in the construction of \ndata centers throughout the US, making large technology firms (e.g., Microsoft, Meta, Google, Amazon) \ninto voracious consumers of electric power. Projected electric consumption is so immense that there is \nconcern that it will be fulfilled no matter the source. A ChatGPT search involves the use of 10 times the \nelectrical energy as a Google search. The large firms are in haste to find power sources – from nuclear \nenergy to geothermal to fusion. The tech firms argue that – in the long view – AI will be eventually \nkinder to the environment, but they need the energy now. AI makes the power grid more efficient and \n\"intelligent\", will assist in the growth of nuclear power, and track overall carbon emissions, according to \ntechnology firms.[205] ", - "page_start": 14, - "page_end": 14, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 200, + "page_end": 200, + "source_file": "00-80T-80.pdf" }, { - "text": "Second, Yuval Noah Harari argues that AI does not require a robot body or physical control to pose an \nexistential risk. The essential parts of civilization are not physical. Things like ideologies, law, \ngovernment, money and the economy are built on language; they exist because there are stories that \nbillions of people believe. The current prevalence of misinformation suggests that an AI could use \nlanguage to convince people to believe anything, even to take actions that are destructive.[270] \n\nThe opinions amongst experts and industry insiders are mixed, with sizable fractions both concerned and \nunconcerned by risk from eventual superintelligent AI.[271] Personalities such as Stephen Hawking, Bill \nGates, and Elon Musk,[272] as well as AI pioneers such as Yoshua Bengio, Stuart Russell, Demis \nHassabis, and Sam Altman, have expressed concerns about existential risk from AI. \n\nIn May 2023, Geoffrey Hinton announced his resignation from Google in order to be able to \"freely speak \nout about the risks of AI\" without \"considering how this impacts Google.\"[273] He notably mentioned \nrisks of an AI takeover,[274] and stressed that in order to avoid the worst outcomes, establishing safety \nguidelines will require cooperation among those competing in use of AI.[275] ", - "page_start": 19, - "page_end": 19, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" } ] }, @@ -6013,64 +6013,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 415, + "page_end": 415, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 297, + "page_end": 297, + "source_file": "00-80T-80.pdf" }, { - "text": "Joel Forwood \nBsc (Hons) FFin \n\nGeneral Manager Corporate and Markets \nJoel Forwood joined Kingsgate in November \n2010 and has over 27 years experience in the \nresource and investment industries covering \ninvestor relations, funds management and \nexploration. For over 12 years, he has been \nleading investor relations at a number of listed \ncompanies, most recently for Lihir Gold Limited. \nPrior to this he was a fund manager with \nQueensland Investment Corporation (QIC) \nfollowing his early career in mineral exploration \nwith BHP and corporate development with RGC. ", - "page_start": 40, - "page_end": 40, - "source_file": "ASX_KCN_2013.pdf" + "text": "", + "page_start": 169, + "page_end": 169, + "source_file": "00-80T-80.pdf" }, { - "text": "Paoli Inc. is a leading provider of wood case Maxon Furniture Inc. targets small to mid- HON International Inc. is responsible for HON \n\ngoods, modular desking, conference pro- sized businesses seeking “planned” offices fea- INDUSTRIES’ sales and business develop- \n\nducts, and seating through its well-known turing workstations and compatible storage ment outside the United States and Canada. \n\nbrands Paoli® and Whitehall®. Founded in and seating. Maxon’s customers appreciate Our members in local countries market the \n\n1926, it is the newest member of the HON office furniture that efficiently organizes space HON INDUSTRIES’ brands through a global \n\nINDUSTRIES family, acquired in January and creates a positive working environment. distribution network. With an extensive prod- \n\n2004. Outstanding product design at a great uct selection, HON International is able to \n**H I G H L I G H T S / A W A R D S :**\nvalue makes Paoli a highly sought after solu- provide dealers and customers with the widest \n**•**Gave the Empower® product line a com- \ncollection of “compelling value” office furni- ", - "page_start": 29, - "page_end": 29, - "source_file": "NYSE_HNI_2003.pdf" + "text": "", + "page_start": 22, + "page_end": 22, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "I N V E S T O R I N F O R M AT I O N \nInvestment analysts who need additional information may \ncontact Mr. Kenneth C. Sofio, Manager of Investor Relations, \nCorning Incorporated, HQ-E2-25, Corning, NY 14831; \nTelephone 607.974.9000 \n\nfuture or pending tax legislation, \n— adequacy and availability of insurance, \n— capital resource and cash flow activities, \n— capital spending, \n— equity company activities, \n— interest costs, \n— acquisition and divestiture activity, \n— the rate of technology change, \n— the ability to enforce patents, \n— product performance issues, \n— stock price fluctuations, and \n— other risks detailed in Corning’s SEC filings. \n\nTRANSFER AGENT AND REGISTRAR \nComputershare Investor Services LLC \nP.O. Box A-3504 \nChicago, IL 60690-3504 \nTelephone: 800.255.0461 \nWebsite: www.computershare.com \nNeither this report nor any statement contained herein is \nfurnished in connection with any offering of securities or for \nthe purpose of promoting or influencing the sale of securities. \n\nCHANGE OF ADDRESS \nReport change of address to Computershare \nInvestor Services at the above address. \nCorning is an equal opportunity employer. \nPrinted in USA \n\n© Corning Incorporated 2003 \n\nI N D E P E N D E N T A C C O U N T A N T S \nPricewaterhouseCoopers LLP \n1301 Avenue of the Americas \nNew York, NY 10019 ", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_GLW_2002.pdf" + "text": "", + "page_start": 169, + "page_end": 169, + "source_file": "00-80T-80.pdf" }, { - "text": "**CORPORATE OFFICES**\nRogers Communications Inc. \n333 Bloor Street East, 10th Floor \nToronto, ON M4W 1G9 \n416-935-7777 \n\n**CUSTOMER SERVICE AND**\n**PRODUCT INFORMATION**\n888-764-3771 or rogers.com \n\n**SHAREHOLDER SERVICES**\nIf you are a registered shareholder and \nhave inquiries regarding your account, wish \nto change your name or address, or have \nquestions about lost stock certificates, share \ntransfers, estate settlements or dividends, \nplease contact our transfer agent and registrar: \n\nCST Trust Company \nP.O. Box 700, Postal Station B \nMontreal, QC H3B 3K3, Canada \n416-682-3860 or 800-387-0825 \ninquiries@canstockta.com \n\n**Duplicate Mailings**\nIf you receive duplicate shareholder mailings \nfrom Rogers Communications, please \ncontact CST Trust Company as detailed above \nto consolidate your accounts. \n\n**INVESTOR RELATIONS**\nInstitutional investors, securities analysts \nand others requiring additional financial \ninformation can visit rogers.com/investors \nor contact us at: \n\n1-855-300-7922 or \n416-935-3551*(outside North America)*or \ninvestor.relations@rci.rogers.com ", - "page_start": 130, - "page_end": 130, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 169, + "page_end": 169, + "source_file": "00-80T-80.pdf" }, { - "text": "The Company participates in emerging technologies by investing in entities that invest in start-up companies. This \nincludes indirect participation through capital venture funds of South Atlantic Venture Fund III, South Atlantic Private \nEquity IV, Dolphin Communications Parallel Fund, Dolphin Communications Fund II and the Burton Partnership. The \nCompany also participates by direct investment in privately held companies. Currently the Company’s only direct \ninvestment is in NTC Communications, a provider of voice, video and data connections to off campus housing \nproperties at universities and colleges. For those companies that eventually make public offerings of their securities, it \n\n51 ■ 2003 ANNUAL REPORT ", - "page_start": 53, - "page_end": 53, - "source_file": "NASDAQ_SHEN_2003.pdf" + "text": "", + "page_start": 21, + "page_end": 21, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "This view provides the following useful information about email notification and Call Home \ninformation (among others(, as shown in Figure 5-77: \n\n– IP of the email server (SMTP Server) and Port \n– Call Home email address \n– Email of one or more users set to receive one or more email notifications \n– Contact information of the person in the organization responsible for the system ", - "page_start": 202, - "page_end": 202, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 21, + "page_end": 21, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "The Company’s investment in CoBank increased $195 thousand in 2003 and $358 thousand in 2002, due to the \nongoing patronage earned from the outstanding investment and loan balances the Company has with CoBank. For \n2003 and 2002, the Company’s allocated portions of losses, recorded on the investment in NTC were $118 thousand \nand $171 thousand, respectfully. \n\nIn 2003, the Company received distributions from its equity investments totaling $0.5 million in cash and invested $0.7 \nmillion in two equity investments, Dolphin Communications Parallel Fund, LP and Dolphin Communications Fund II, \nLP. These two investments recorded losses of approximately $0.4 million for the 2003 year. The Company recorded a \nloss from the Virginia Independent Telephone Alliance investment of $19 thousand, for 2003. The Company recorded \na gain from the ValleyNet partnership of $84 thousand and received distributions of $84 thousand. Other equity \ninvestments lost an additional $0.4 million for 2003. \n\nThe Company was committed to invest an additional $1.8 million at December 31, 2003 in various equity method \ninvestees pursuant to capital calls from the fund managers. It is not practical to estimate the fair value of the other \ninvestments due to their limited market and restrictive nature of their transferability. ", - "page_start": 27, - "page_end": 27, - "source_file": "NASDAQ_SHEN_2003.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "Development Program of the Year, Deal of the Year, Energy Producer \nof the Year and the Industry Leadership Award. Chesapeake was one \nof only two companies selected as a finalist in five or more categories. \nThe company was also honored in 2010 with a Certificate of Recognition \nfor our military reserve recruiting efforts, named a 2010 Best Diversity \nCompany by Engineering & Information Technology Magazine and rec- \nognized for Best Investor Relations in Energy Sector and Best Investor \nRelations Website at the 2010 IR Magazine U.S. Awards. \n\nas the best employees in the industry. From our beginning 22 years ago \nwith 10 employees in Oklahoma City to employing more than 10,000 \npeople across 15 states today, Chesapeake has always focused on build- \ning first-class human resources within a distinctive corporate culture. Talk \nto Chesapeake employees and you will note genuine pride and great \nenthusiasm about the company and the critical role that we play in deliv- \nering increasing quantities of clean and affordable American natural gas \nand valuable and reliable liquids to energy consumers across the country. \nChesapeake employees are distinctive in other ways as well. They \nare much younger than the industry average, with half of our almost \n4,000 Oklahoma City-based headquarters employees 33 years old \nor younger. Their enthusiasm and willingness to learn create an ", - "page_start": 14, - "page_end": 14, - "source_file": "NYSE_CHK_2010.pdf" + "text": "", + "page_start": 169, + "page_end": 169, + "source_file": "00-80T-80.pdf" } ] }, @@ -6087,64 +6087,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 427, + "page_end": 427, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "The Company’s policy requires measurement of the allowance for an impaired collateral dependent loan based \non the fair value of the collateral. Other loan impairments are measured based on the present value of expected \nfuture cash flows or the loan’s observable market price. \n\n**Results of Operations**\n\n*Performance Summary*. Net earnings for 2002 were $34.0 million, an increase of $4.6 million, or 15.7%, over \nnet earnings for 2001 of $29.4 million. Net earnings for 2000 were $28.3 million. The increase in net earnings for \n2002 over 2001 was primarily attributable to an increase in net interest income resulting primarily from growth in \naverage earning assets and an improved net interest margin. The increase in net earnings for 2001 over 2000 was \nprimarily attributable to an increase in net interest income resulting primarily from the growth in average earning \nassets and an increase in noninterest income resulting primarily from increases in service fees on deposit accounts \nand real estate mortgage fees. \n\nOn a basic net earnings per share basis, net earnings were $2.75 for 2002 as compared to $2.38 for 2001 and \n$2.28 for 2000. Return on average assets was 1.78% for 2002 as compared to 1.62% for 2001 and 1.67% for 2000. \nReturn on average equity was 15.13% for 2002 as compared to 14.35% for 2001 and 15.39% for 2000. ", - "page_start": 44, - "page_end": 44, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "Currency translation decreased fiscal year sales by approximately \n\n$1.8 million or 0.1%. In local currency, net sales from our \n\nCanadian operations were up 12.2% from fiscal 2011, including \n\n2.8% from acquisitions. In local currency, net sales from our \n\nMexican operations were up 25.9%. The number of selling days in \n\nfiscal 2012 was the same as in fiscal 2011. \n\nNet sales of our Service Center Based Distribution segment increased \n\n$133.8 million, or 7.6%, compared to fiscal year 2011 led by \n\nimprovements in the industrial economy as well as a continued focus on \n\nprofitable sales growth, with acquisitions adding $16.6 million or 0.9%. \n\nNet sales of our Fluid Power Businesses segment increased $28.8 million \n\nor 6.5%, also driven by improvements in the industrial economy as well \n\nas a continued focus on profitable sales growth. \n\nThe sales product mix for fiscal 2012 was 70.8% industrial products \n\nand 29.2% fluid power products compared to 70.5% industrial and \n\n29.5% fluid power in the prior year. \n\nAt June 30, 2012, we had a total of 476 operating facilities in the U.S., ", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_AIT_2012.pdf" + "text": "", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "Net income increased 7% in 2003 and 23% in 2002, respectively. Net \nsheet at its carrying value of $2.1 million. The Milan, Tennessee, facility \nincome in 2003 was favorably impacted by increased interest income due \nis a leased facility that is no longer being used in the production of \nto increased investments and decreased interest expense due to reduc- \ngoods. The restructuring expense for 2003 included $1.4 million of \ntion in debt. Net income in 2002 was favorably impacted by a decrease in \ncosts that will continue to be incurred under the lease contract reduced \ninterest expense and a decrease in the effective tax rate to 35% in 2002 \nby estimated sublease rentals that could be reasonably obtained. \nfrom 36% in 2001 mainly due to tax benefits associated with various \nDuring 2002, the Company recorded a pretax charge of \nfederal and state tax credits. The Company anticipates that its tax rate \napproximately $5.4 million due to the shutdown of an office furniture \nwill increase to 36% in 2004 due to increased state taxes and a reduced \nfacility in Jackson, Tennessee. A total of 125 members were terminated ", - "page_start": 35, - "page_end": 35, - "source_file": "NYSE_HNI_2003.pdf" + "text": "", + "page_start": 263, + "page_end": 263, + "source_file": "00-80T-80.pdf" }, { - "text": "**Liquidity and Capital Resources** ***O F F I C E F U R N I T U R E***\n\nOffice furniture comprised 74% of consolidated net sales for 2003 and During 2003, cash flow from operations was $141.3 million, which \n\n76% of consolidated net sales for 2002 and 2001. Net sales for office along with funds from stock option exercises under employee stock \n\nfurniture increased 2% in 2003 and decreased 6% in 2002. The plans, provided the funds necessary to meet working capital needs, \n\nincrease in 2003 is due to the increased week from the Company’s invest in capital improvements, repay long-term debt, repurchase com- \n\n52/53-week fiscal year. The office furniture industry has experienced an mon stock, and pay increased dividends. \n\nunprecedented three-year decline in shipments. The Business and Cash, cash equivalents, and short-term investments totaled \n\nInstitutional Furniture Manufacturer’s Association (BIFMA) reported $204.2 million at the end of 2003 compared to $155.5 million at the \n\n2003 shipments down over 5% and 2002 shipments down 19%. The end of 2002 and $78.8 million at the end of 2001. The Company used ", - "page_start": 36, - "page_end": 36, - "source_file": "NYSE_HNI_2003.pdf" + "text": "", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "$1.8 million or 0.1%. In local currency, net sales from our \n\nCanadian operations were up 12.2% from fiscal 2011, including \n\n2.8% from acquisitions. In local currency, net sales from our \n\nMexican operations were up 25.9%. The number of selling days in \n\nfiscal 2012 was the same as in fiscal 2011. \n\nNet sales of our Service Center Based Distribution segment increased \n\n$133.8 million, or 7.6%, compared to fiscal year 2011 led by \n\nimprovements in the industrial economy as well as a continued focus on \n\nprofitable sales growth, with acquisitions adding $16.6 million or 0.9%. \n\nNet sales of our Fluid Power Businesses segment increased $28.8 million \n\nor 6.5%, also driven by improvements in the industrial economy as well \n\nas a continued focus on profitable sales growth. \n\nThe sales product mix for fiscal 2012 was 70.8% industrial products \n\nand 29.2% fluid power products compared to 70.5% industrial and \n\n29.5% fluid power in the prior year. \n\nAt June 30, 2012, we had a total of 476 operating facilities in the U.S., ", - "page_start": 7, - "page_end": 7, - "source_file": "NYSE_AIT_2012.pdf" + "text": "", + "page_start": 263, + "page_end": 263, + "source_file": "00-80T-80.pdf" }, { - "text": "CASH FLOWS FROM OPERATING ACTIVITIES: \n\nNet earnings \nAdjustments to reconcile net earnings to net cash \n\nprovided by operating activities: \nDepreciation and amortization \nProvision for loan losses \nPremium amortization, net of discount accretion \nLoss (gain) on sale of assets \nDeferred federal income tax expense (benefit) \n(Increase) decrease in other assets \nIncrease (decrease) in other liabilities \n\nTotal adjustments \n\nNet cash provided by operating activities \n\nCASH FLOWS FROM INVESTING ACTIVITIES: \nNet increase in interest-bearing deposits in banks \nPayment for stock of City Bancshares, Inc., net of cash acquired \nActivity in available-for-sale securities: \n\nSales \nMaturities \nPurchases \nActivity in held-to-maturity securities: \n\nMaturities \nPurchases \n\nNet increase in loans \nPurchases of bank premises and equipment \nProceeds from sale of other assets \n\nNet cash used in investing activities \n\nCASH FLOWS FROM FINANCING ACTIVITIES: \n\nNet increase (decrease) in noninterest-bearing deposits \nNet (decrease) increase in interest-bearing deposits \nNet increase (decrease) in securities sold under agreements to repurchase \nCommon stock transactions: \n\nAcquisition of treasury stock \nProceeds of stock issuances \nDividends paid ", - "page_start": 72, - "page_end": 72, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 262, + "page_end": 262, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\nto decrease the ", - "page_start": 104, - "page_end": 104, + "text": "", + "page_start": 262, + "page_end": 262, "source_file": "00-80T-80.pdf" }, { - "text": "$0 \n03 04 05 06 07 08 09 10 11 12 \n\n*The goodwill impairment charge in fiscal 2009 *The goodwill impairment charge in fiscal 2009 \nreduced net income by $23.0 million. reduced net income per share by $0.54. \n\n42 Applied Industrial Technologies, Inc. and Subsidiaries ", - "page_start": 44, - "page_end": 44, - "source_file": "NYSE_AIT_2012.pdf" + "text": "", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_JWN_2014.pdf" } ] }, @@ -6161,64 +6161,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 208, + "page_end": 208, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, + "text": "", + "page_start": 19, + "page_end": 19, "source_file": "Excel Training Manual 1.pdf" }, { - "text": "S U M M A R Y O F S I G N I F I C A N T A C C O U N T I N G P O L I C I E S 1 \n\nAtrion Corporation designs, develops, manufactures and markets products primarily for the medical and health care industry. The Company markets its \nproducts throughout the United States and internationally. The Company’s customers include hospitals, distributors, and other manufacturers. As of \nDecember 31, 2003, the principal subsidiaries of the Company through which it conducted its operations were Atrion Medical Products, Inc. (“Atrion \nMedical Products”), Halkey-Roberts Corporation (“Halkey-Roberts”) and Quest Medical, Inc. (“Quest Medical”). \n\n**P R I N C I P L E S O F C O N S O L I D A T I O N**\nThe consolidated financial statements include the accounts of Atrion Corporation and its subsidiaries (the “Company”). All significant intercompany \ntransactions and balances have been eliminated in consolidation. \n\n**F A I R V A L U E**\nThe carrying amounts of cash and cash equivalents, accounts receivable and accounts payable approximate fair value due to the short-term nature of these \nitems. The carrying amount of debt approximates fair value as the interest rate is tied to market rates. ", - "page_start": 14, - "page_end": 14, - "source_file": "NASDAQ_ATRI_2003.pdf" + "text": "", + "page_start": 218, + "page_end": 218, + "source_file": "00-80T-80.pdf" }, { - "text": "In our opinion, the financial statements referred to above present fairly, in all material respects, the financial position of Atrion Corporation and subsidiaries \nas of December 31, 2001 and 2000 and the results of their operations and their cash flows for each of the three years in the period ended December 31, \n2001 in conformity with accounting principles generally accepted in the United States. ", - "page_start": 25, - "page_end": 25, - "source_file": "NASDAQ_ATRI_2003.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "The results of the Golden Nugget Subsidiaries, Online and MGM Grand Australia \nare classified as discontinued operations in the accompanying consolidated \nstatements of income for all periods presented. Net revenues of discontinued \noperations were $45 million, $231 million and $222 million, respectively, for the \nyears ended December 31, 2004, 2003 and 2002. Included in income from \ndiscontinued operations is an allocation of interest expense based on the ratio of the \nnet assets of the discontinued operations to the total consolidated net assets and \ndebt of the Company. Interest allocated to discontinued operations was $2 million, \n$9 million and $9 million for the years ended December 31, 2004, 2003 and 2002, \nrespectively. Included in discontinued operations for the year ended December 31, \n2003 is a loss on disposal of Online of $7 million relating primarily to \nunrecoverable costs of computer hardware and software. Included in the tax benefit \nfrom discontinued operations for the year ended December 31, 2003 is $2 million \nof previously unrecognized tax benefits relating to prior year operating losses of \nOnline. Included in discontinued operations for the year ended December 31, \n2004 is a gain on the sale of the Golden Nugget Subsidiaries of $8 million and a \ngain on sale of the MGM Grand Australia Subsidiaries of $74 million. ", - "page_start": 63, - "page_end": 63, - "source_file": "NYSE_MGM_2004.pdf" + "text": "", + "page_start": 218, + "page_end": 218, + "source_file": "00-80T-80.pdf" }, { - "text": "**C o r p o r a t e O f f i c e :**\nAtrion Corporation \nOne Allentown Parkway \nAllen, Texas 75002 \n(972) 390-9800 \nwww.atrioncorp.com \n\n**R e g i s t r a r a n d T r a n s f e r A g e n t**\nAmerican Stock Transfer and Trust Company \n59 Maiden Lane \nNew York, New York 10007 \n\n**F o r m 1 0 - K**\nA copy of the Company’s 2003 Annual Report on Form 10-K, as filed with the Securities and Exchange \nCommission, may be obtained by any stockholder without charge by written request to: \n\n*Corporate Secretary*\n*Atrion Corporation*\n*One Allentown Parkway*\n*Allen, Texas 75002*", - "page_start": 31, - "page_end": 31, - "source_file": "NASDAQ_ATRI_2003.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "In our opinion, the financial statements referred to above present fairly, in all material respects, the consolidated financial position of Atrion Corporation \nand Subsidiaries as of December 31, 2003 and 2002, and the consolidated results of their operations and their consolidated cash flows for the years then \nended in conformity with accounting principles generally accepted in the United States of America. ", - "page_start": 25, - "page_end": 25, - "source_file": "NASDAQ_ATRI_2003.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "Our financial performance earned recognition from*Investors Business Daily*, which ranked Atrion sixth \n\non its list of Market-Leading Medical Stocks in November 2003. During the year, our stock price more than \n\ndoubled, ending the year at $45.44, up from $22.50 at year-end 2002. Over the last five years, our stock price \n\nhas increased by 468 percent. \n\n**We make products that meet the specific needs of niche markets.**\n\n2003 Revenues \nby Product Line ", - "page_start": 6, - "page_end": 6, - "source_file": "NASDAQ_ATRI_2003.pdf" + "text": "", + "page_start": 218, + "page_end": 218, + "source_file": "00-80T-80.pdf" }, { - "text": "**D I S C O N T I N U E D O P E R A T I O N S**\nDuring 1997, the Company sold all of its natural gas operations. The financial statements presented herein reflect the Company’s natural gas operations as \ndiscontinued operations for all periods presented. The financial statements also reflect an after-tax gain on disposal of these discontinued operations of \n$ .2 million, or $ .10 per basic and $ .09 per diluted share, in both 2003 and 2002, and $5.5 million, or $2.70 per basic and $2.42 per diluted share, in 2001. \n\nIn addition to the initial consideration received in 1997 upon the sale of the natural gas operations, certain annual contingent deferred payments of up to \n$250,000 per year were to be paid to the Company over an eight-year period which began in 1999, with the amount paid each year to be dependent upon \nrevenues received by the purchaser from certain gas transportation contracts. The Company received deferred payments of $250,000 each, before tax, from \nthe purchaser in April 2003, 2002 and 2001 which are reflected in each year as a gain from discontinued operations of $165,000, net of tax. The 2001 \ngain also includes a $5,327,000 non-cash gain from reversal of a reserve established when the Company disposed of its natural gas operations in 1997. \nThis reversal in the third quarter of 2001 followed the resolution of an outstanding contingency related to the sale of those assets. ", - "page_start": 27, - "page_end": 27, - "source_file": "NASDAQ_ATRI_2003.pdf" + "text": "", + "page_start": 217, + "page_end": 217, + "source_file": "00-80T-80.pdf" }, { - "text": "**Discontinued operations**\nIn November 2004, the Emerging Issues Task Force (“EITF”) of the FASB reached a \nconsensus on Issue No. 03-13, “Applying the Conditions in Paragraph 42 of FASB \nStatement No. 144,*Accounting for the Impairment or Disposal of Long-Lived Assets*, in \nDetermining Whether to Report Discontinued Operations,” (“EITF 03-13”). EITF \n03-13 requires us to analyze whether the cash flows of a disposed component have \nbeen eliminated from our ongoing operations and whether we retain a continuing \ninvolvement in the operations of the disposed component. If significant migration of \ncustomers occurs to our other operations, we would be precluded from classifying a \nsold or disposed operation as a “discontinued” operation. EITF 03-13 is effective for \ncomponents disposed of or classified as held for sale in periods beginning after ", - "page_start": 46, - "page_end": 46, - "source_file": "NYSE_MGM_2004.pdf" + "text": "", + "page_start": 217, + "page_end": 217, + "source_file": "00-80T-80.pdf" } ] }, @@ -6235,64 +6235,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 245, + "page_end": 245, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, + "text": "", + "page_start": 7, + "page_end": 7, "source_file": "Excel Training Manual 1.pdf" }, { - "text": "Our financial performance earned recognition from*Investors Business Daily*, which ranked Atrion sixth \n\non its list of Market-Leading Medical Stocks in November 2003. During the year, our stock price more than \n\ndoubled, ending the year at $45.44, up from $22.50 at year-end 2002. Over the last five years, our stock price \n\nhas increased by 468 percent. \n\n**We make products that meet the specific needs of niche markets.**\n\n2003 Revenues \nby Product Line ", - "page_start": 6, - "page_end": 6, - "source_file": "NASDAQ_ATRI_2003.pdf" + "text": "", + "page_start": 7, + "page_end": 7, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "Gross profit was $22.2 million in 2003, compared with $20.3 million in 2002 and $21.8 million in 2001. The Company’s gross profit in 2003 was 35 \npercent of revenues compared with 34 percent of revenues in 2002 and 38 percent of revenues in 2001. The increase in gross profit percentage in 2003 ", - "page_start": 26, - "page_end": 26, - "source_file": "NASDAQ_ATRI_2003.pdf" + "text": "", + "page_start": 318, + "page_end": 318, + "source_file": "sg246915.pdf" }, { - "text": "Facility lease revenue contributed $5.5 million to wireline revenues, a decrease of $0.2 million or 3.5%. The decrease \nwas primarily the result of the prolonged decline of lease rates associated with competitive pricing pressures and the \neconomic downturn in the telecommunications industry. During 2002 the Company completed a second, diverse fiber \nroute to its existing interconnection point in the Dulles airport area of Northern Virginia. This fiber route provides \nincreased reliability for customers in the event of fiber cuts or breaks, and extends the availability of the Company’s \nfiber network to additional market locations but to date has not added additional revenue to the Company’s operation. \n\nBilling and collection services and other revenues contributed $0.4 million to wireline revenues, which was the same as \n2002 results. Revenues from this service had declined in recent years, with interexchange carriers now issuing a \ngreater proportion of their bills directly to their customers. \n\nWireline revenues from cable television services were $4.4 million, an increase of $0.1 million or 1.7%. The number \nof subscribers and service plan prices remained relatively constant during 2003. \n\nOther revenues, primarily consisting of Internet and 511Virginia service revenues were $5.8 million in 2003, an \nincrease of $0.7 million or 13.5%. The Company had 17,420 dial-up Internet subscribers at December 31, 2003, \ncompared to 18,050 at the end of the previous year. During 2003, the Company’s DSL high-speed Internet access \nsubscriber count increased to 1,298 from 646. Total Internet service revenue was $4.5 million, an increase of $0.3 \nmillion or 10.7%. The 511Virginia contract with the Virginia Department of Transportation contributed $1.3 million to \nother revenues, an increase of $0.4 million or 41.3%. Telecommunications equipment sales, services and lease \nrevenues were $1.1 million, which reflects a $0.1 million decrease from 2002 results. ", - "page_start": 49, - "page_end": 49, - "source_file": "NASDAQ_SHEN_2003.pdf" + "text": "", + "page_start": 318, + "page_end": 318, + "source_file": "sg246915.pdf" }, { - "text": "**Results of Continuing Operations**\n\n**2003 compared to 2002**\n\nTotal revenue was $105.9 million in 2003, an increase of $12.9 million or 13.9%. Total revenues included $70.0 \nmillion of wireless revenues, an increase of $12.0 million or 20.7%; wireline revenues of $29.0 million, an increase of \n$0.3 million or 0.9%; and other revenues of $7.0 million, an increase of $0.6 million or 9.7%. \n\nWithin wireless revenues, the PCS operation contributed $69.8 million, an increase of $11.6 million, or 20.8%. PCS \nservice revenues were $44.4 million, an increase of $10.9 million or 32.4%. Service revenue growth was driven by the \nincrease in subscribers, totaling 85,139 at December 31, 2003, an increase of 17,297 or 25.5%, compared to 67,842 \nsubscribers at year-end 2002. The company had churn of 2.1% in 2003 compared to 2.8% in 2002. The decline in the \nchurn rate is the result of tightening the credit screening for new subscribers as well as continued efforts to improve the \nafter sales support. Competition in the wireless industry continues to have a significant impact on the results of the \nCompany’s PCS operation. ", - "page_start": 47, - "page_end": 47, - "source_file": "NASDAQ_SHEN_2003.pdf" + "text": "", + "page_start": 318, + "page_end": 318, + "source_file": "sg246915.pdf" }, { - "text": "Operating revenues were $62.8 million in 2003, compared with $59.5 million in 2002 and $57.6 million in 2001. These revenue increases are generally \nattributable to higher sales volumes. The 5 percent revenue increase in 2003 over the prior year is primarily attributable to an 8 percent increase in the \nrevenues of the Company’s ophthalmic products, an 8 percent increase in the revenues of the Company’s cardiovascular products, a 3 percent increase in \nthe Company’s fluid delivery products and a 2 percent increase in the Company’s other medical and non-medical products and services. The 3 percent \nrevenue increase in 2002 over the prior year is primarily attributable to an 8 percent increase in the revenues of the Company’s cardiovascular products, \na 4 percent increase in the Company’s fluid delivery products and a 4 percent increase in the Company’s other medical and non-medical products and \nservices. \n\nThe Company’s cost of goods sold was $40.6 million in 2003, compared with $39.2 million in 2002 and $35.8 million in 2001. The increase in cost of \ngoods sold for 2003 over 2002 was primarily related to the increase in revenues discussed above and increased insurance costs partially offset by an \nimprovement in manufacturing variances resulting from increased production volumes. The increase in cost of goods sold for 2002 over 2001 was \nprimarily related to a shift in product mix, which resulted in lower gross margins, and the increase in revenues discussed above. ", - "page_start": 26, - "page_end": 26, - "source_file": "NASDAQ_ATRI_2003.pdf" + "text": "", + "page_start": 7, + "page_end": 7, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "as compared to $91.4 million or $1.55 per diluted share in 2002. 2001, contained 52 weeks. A 53-week year occurs approximately every \n\nThe Company generated $141.3 million in cash flow from sixth year. \n\noperating activities and increased its cash position, including short- \n***Revenue recognition***– Revenue is normally recognized upon \nterm investments, by $48.6 million to $204.2 million. The Company \nshipment of goods to customers. In certain circumstances revenue is \npaid dividends of $30.3 million and repurchased $21.5 million of its \nnot recognized until the goods are received by the customer or upon \ncommon stock, while investing $35.7 million in net capital expendi- \ninstallation and customer acceptance based on the terms of the sale \ntures and repaying $20.2 million of debt. \nagreement. Revenue includes freight charged to customers; related ", - "page_start": 32, - "page_end": 32, - "source_file": "NYSE_HNI_2003.pdf" + "text": "", + "page_start": 318, + "page_end": 318, + "source_file": "sg246915.pdf" }, { - "text": "**Geographic Information**\nThe operations of the Group are located in only one geographic location, North America. All revenue is generated \nfrom sales to customers located in North America. \n\nRevenue from one major customer exceeded 10 percent of Group consolidated revenue for the year ended 31 \nDecember 2014 and accounted for 65 percent (2013: four major customers accounted for 47 percent, 15 percent, \n10 percent and 10 percent) of our consolidated oil, natural gas and NGL revenues. ", - "page_start": 95, - "page_end": 95, - "source_file": "ASX_SEA_2014.pdf" + "text": "", + "page_start": 7, + "page_end": 7, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "Total income tax expense for continuing operations differs from the amount that would be provided by applying the statutory federal income tax rate to \npretax earnings as illustrated below (in thousands): \n\nYEAR ENDED DECEMBER 31, \n\n| 2003 | | |\n|---|---|---|\n| 2003 | | |\n| $ 2,298 34 — (100) (250) (103) | $ 1,858 80 — (164) (244) (127) | $ 2,062 220 (68) (52) (352) (7) |\n| $ 1,879 | $ 1,403 | $ 1,803 |\n| | | |\n\n\nIncome tax expense at the statutory federal income tax rate \n\nIncrease (decrease) resulting from: \n\nState income taxes \n\nDecrease in valuation allowance \n\nR&D credit \n\nForeign sales benefit \n\nOther, net \n\nTotal income tax expense \n\nS T O C K H O L D E R S ’ E Q U I T Y 6 \n\nThe Board of Directors of the Company has at various times authorized repurchases of Company stock in open-market or negotiated transactions at such \ntimes and at such prices as management may from time to time decide. The Company has effected a number of open-market or negotiated transactions to \npurchase its stock during the past three years. These repurchases totaled 20,200, 26,000 and 10,300 shares during the years 2003, 2002 and 2001, \nrespectively, at per share prices ranging from $14.02 to $42.42. As of December 31, 2003, authorization for the repurchase of 94,000 additional shares \nremained. The Company purchased 173,614 shares of its common stock at $23.00 per share in April 2003 pursuant to a tender offer. The Company \npurchased 502,229 shares of its common stock at $34.50 per share in December 2001 pursuant to a tender offer. All shares purchased in the tender offers \nand in the open-market or negotiated transactions became treasury shares upon repurchase by the Company. ", - "page_start": 19, - "page_end": 19, - "source_file": "NASDAQ_ATRI_2003.pdf" + "text": "", + "page_start": 268, + "page_end": 268, + "source_file": "00-80T-80.pdf" } ] }, @@ -6309,64 +6309,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 29, + "page_end": 29, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 118, + "page_end": 118, + "source_file": "00-80T-80.pdf" }, { - "text": "Gross profit was $22.2 million in 2003, compared with $20.3 million in 2002 and $21.8 million in 2001. The Company’s gross profit in 2003 was 35 \npercent of revenues compared with 34 percent of revenues in 2002 and 38 percent of revenues in 2001. The increase in gross profit percentage in 2003 ", - "page_start": 26, - "page_end": 26, - "source_file": "NASDAQ_ATRI_2003.pdf" + "text": "", + "page_start": 54, + "page_end": 54, + "source_file": "00-80T-80.pdf" }, { - "text": "There were no gross realized gains on available-for-sale securities included in income in 2003 or 2002, while there \nwere $17.7 million for 2001. Gross realized losses included in income in 2003, 2002 and 2001 were $3 thousand, $9.0 \nmillion and $3.0 million, respectively. \n\nChanges in the unrealized gains (losses) on available-for-sale securities during the years ended December 31, 2003, \n2002 and 2001 reported as a separate component of shareholders' equity are as follows: ", - "page_start": 26, - "page_end": 26, - "source_file": "NASDAQ_SHEN_2003.pdf" + "text": "", + "page_start": 54, + "page_end": 54, + "source_file": "00-80T-80.pdf" }, { - "text": "Cost of Revenues and Gross Margin \n\nThree Months Ended \nSeptember 30, \n\n2024 2023 (Dollars in millions) \n\nCost of revenues \n\nAutomotive sales $ 15,656 $ $ 15,743 \n\n(54) 247 301 Automotive leasing \n\nTotal automotive cost of \nrevenues 15,990 15,957 33 \n\n507 2,544 2,037 Services and other \n\nTotal automotive & services and \nother segment cost of revenues 18,534 17,994 540 \n\nEnergy generation and storage \n1,178 473 1,651 segment \n\n$ 20,185 $ 19,172 $ 1,013 \nTotal cost of revenues \n\nGross profit total automotive $ 4,026 $ 3,668 \n\nGross margin total automotive 20.1 % 18.7 % \n\nGross profit total automotive & \nservices and other segment $ 4,272 $ 3,797 \n\nGross margin total automotive & \nservices and other segment 18.7 % 17.4 % \n\nGross profit energy generation and \nstorage segment $ 725 $ 381 \n\nGross margin energy generation and \nstorage segment 30.5 % 24.4 % ", - "page_start": 38, - "page_end": 38, - "source_file": "tesla_form_10q.pdf" + "text": "", + "page_start": 117, + "page_end": 117, + "source_file": "00-80T-80.pdf" }, { - "text": "Our financial performance earned recognition from*Investors Business Daily*, which ranked Atrion sixth \n\non its list of Market-Leading Medical Stocks in November 2003. During the year, our stock price more than \n\ndoubled, ending the year at $45.44, up from $22.50 at year-end 2002. Over the last five years, our stock price \n\nhas increased by 468 percent. \n\n**We make products that meet the specific needs of niche markets.**\n\n2003 Revenues \nby Product Line ", - "page_start": 6, - "page_end": 6, - "source_file": "NASDAQ_ATRI_2003.pdf" + "text": "", + "page_start": 117, + "page_end": 117, + "source_file": "00-80T-80.pdf" }, { - "text": "S U M M A R Y O F S I G N I F I C A N T A C C O U N T I N G P O L I C I E S 1 \n\nAtrion Corporation designs, develops, manufactures and markets products primarily for the medical and health care industry. The Company markets its \nproducts throughout the United States and internationally. The Company’s customers include hospitals, distributors, and other manufacturers. As of \nDecember 31, 2003, the principal subsidiaries of the Company through which it conducted its operations were Atrion Medical Products, Inc. (“Atrion \nMedical Products”), Halkey-Roberts Corporation (“Halkey-Roberts”) and Quest Medical, Inc. (“Quest Medical”). \n\n**P R I N C I P L E S O F C O N S O L I D A T I O N**\nThe consolidated financial statements include the accounts of Atrion Corporation and its subsidiaries (the “Company”). All significant intercompany \ntransactions and balances have been eliminated in consolidation. \n\n**F A I R V A L U E**\nThe carrying amounts of cash and cash equivalents, accounts receivable and accounts payable approximate fair value due to the short-term nature of these \nitems. The carrying amount of debt approximates fair value as the interest rate is tied to market rates. ", - "page_start": 14, - "page_end": 14, - "source_file": "NASDAQ_ATRI_2003.pdf" + "text": "", + "page_start": 117, + "page_end": 117, + "source_file": "00-80T-80.pdf" }, { - "text": "Note 12 – Segment Reporting and Information about Geographic Areas \n\nWe have two operating and reportable segments: (i) automotive and (ii) energy generation and storage. The following \ntable presents revenues and gross profit by reportable segment (in millions): \n\nThree Months Ended September 30, Nine Months Ended September 30, \n\n2024 2023 2024 2023 \n\nAutomotive segment \n\nRevenues $ \n\nGross profit $ \n\nEnergy generation and storage segment \n\nRevenues $ 2,376 $ 1,559 $ 7,025 $ 4,597 \n\nGross profit $ 725 $ 381 $ 1,868 $ 827 ", - "page_start": 31, - "page_end": 31, - "source_file": "tesla_form_10q.pdf" + "text": "", + "page_start": 117, + "page_end": 117, + "source_file": "00-80T-80.pdf" }, { - "text": "on gross profit margin in fiscal 2011 versus fiscal 2010. LIFO \n\nbenefits recorded during fiscal year 2011 totaled $5.3 million \n\nwhich provided an overall benefit in our gross profit percent of \n\n0.2%. This compares to a LIFO benefit of $23.5 million in fiscal \n\n2010 which added 1.2% to gross profit. Our focused efforts on ", - "page_start": 9, - "page_end": 9, - "source_file": "NYSE_AIT_2012.pdf" + "text": "", + "page_start": 54, + "page_end": 54, + "source_file": "00-80T-80.pdf" }, { - "text": "on gross profit margin in fiscal 2011 versus fiscal 2010. LIFO \n\nbenefits recorded during fiscal year 2011 totaled $5.3 million \n\nwhich provided an overall benefit in our gross profit percent of \n\n0.2%. This compares to a LIFO benefit of $23.5 million in fiscal \n\n2010 which added 1.2% to gross profit. Our focused efforts on ", - "page_start": 8, - "page_end": 8, - "source_file": "NYSE_AIT_2012.pdf" + "text": "", + "page_start": 117, + "page_end": 117, + "source_file": "00-80T-80.pdf" } ] }, @@ -6377,70 +6377,70 @@ "target_page": 16, "target_passage": "he Chain Bridge was the first bridge over the Danube", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 237, + "page_end": 237, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 228, + "page_end": 228, + "source_file": "00-80T-80.pdf" }, { - "text": "**CHAIN BRIDGE, Budapest**\n\nThe Chain Bridge, built from 1839 to 1849, was the \n\nfirst bridge over the Danube, linking the cities \n\nBuda and Pest. Measuring 380 meters long and \n\n15.7 meters wide, it is supported by pillars \n\nshaped like antique triumphal arches. ", - "page_start": 16, - "page_end": 16, - "source_file": "NASDAQ_EEFT_2000.pdf" + "text": "", + "page_start": 60, + "page_end": 60, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "**CHARLES BRIDGE, Prague**\n\nDating back to the 14th century, the Charles \n\nBridge is one of the jewels of Gothic architecture. \n\nThis stone bridge, built by Charles IV, the Czech \n\nKing and Holy Roman Emperor, created a reliable \n\nconnection between the Lesser and the Old Town \n\nand gave way to the merging of life of both banks. ", - "page_start": 25, - "page_end": 25, - "source_file": "NASDAQ_EEFT_2000.pdf" + "text": "", + "page_start": 60, + "page_end": 60, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "**B R O O K LYN BRIDGE, New Yo r k**\n\nThe Brooklyn Bridge, proudly standing over the East River and \n\nconnecting the boroughs of Brooklyn and Manhattan, endures as \n\none of the most famous bridges in America. When completed in \n\nMay 1883, the 5989-foot-long Brooklyn Bridge was the largest \n\nsuspension bridge in the world. ", - "page_start": 29, - "page_end": 29, - "source_file": "NASDAQ_EEFT_2000.pdf" + "text": "", + "page_start": 60, + "page_end": 60, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "**RIVER TYNE BRIDGES, Newcastle**\n\nSix bridges dominate the Tyne between Newcastle \n\nand Gateshead, enabling innovative railway and \n\nroadway advances over the past two centuries. At \n\nthe time of its completion in 1929, the Tyne Bridge \n\nwas the world’s longest single span bridge. ", - "page_start": 28, - "page_end": 28, - "source_file": "NASDAQ_EEFT_2000.pdf" + "text": "", + "page_start": 405, + "page_end": 405, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\nCHANGE IN LIFT \nDUE TO UPGUST \nCHANGE IN LIFT \nDUE TO UPGUST ", - "page_start": 69, - "page_end": 69, - "source_file": "00-80T-80.pdf" + "text": "", + "page_start": 59, + "page_end": 59, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "struct DocExComment_ExternalHyperlink \n{ \n DWORD ident {}; \n DWORD iComment {}; \n union \n { \n RECT rcdvRegion; \n struct \n { \n float xLeft; \n float yTop; \n float dxWidth; \n float dyHeight; \n } rctfvRegion; \n }; \n WCHAR wzLink[MAX_PATH]; \n}; ", - "page_start": 16, - "page_end": 16, - "source_file": "office-pdf.pdf" + "text": "", + "page_start": 59, + "page_end": 59, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "**Note:**You can use more than four fabric ports per node to improve peak load I/O \nperformance. However, if a node receives more than 16 logins from another node, it \ncauses node error 860. To avoid this error, you must use zoning, port masking, or \ncombination of the two. For more information, see 3.6.7, “Port designation \nrecommendations” on page 58, 3.6.8, “Port masking” on page 59, and the IBM Storwize \nV7000 documentation. ", - "page_start": 75, - "page_end": 75, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 59, + "page_end": 59, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "Our strategy is to go into growing markets, whether \ngeographic (like Greece, Poland or Egypt) or new \nproduct-entry markets (like mobile banking in the US). \nWe have built the infrastructure and now we can enter \nthese markets without having to make major financial \n\nAt Euronet, we’ve always emphasized the theme of \n“Building Bridges.” I think that idea pretty well sums \nup Euronet’s vision: to create digital \nbridges that connect people and their \nfinancial institutions electronically in a \nworld that’s increasingly on-line and \non the move. We help people control \ntheir finances any time, any place— \nright from the palm of their hands. \n\ninvestments. \n\n**Transaction Growth**\n**52.7**\n\nWe have also established network \nprocessing centers within geographic \nregions and will leverage those \ncenters’ capabilities and our software \ndevelopment to generate more trans- \nactions. We currently have processing \ncenters in the US, Europe and Asia. \nThe Network Services business gen- \nerated $37 million in revenue last \nyear – an increase of 39% over 1999 \n– and turned the corner to become EBITDA positive for \nthe year 2000. We expect to continue to experience sig- \nnificant transaction growth in our ATM and POS \n\n**32.8**\n\n**15.1**\n\n**How will you maintain your**\n**growth rate on your transactions**\n**and revenue?**", - "page_start": 5, - "page_end": 5, - "source_file": "NASDAQ_EEFT_2000.pdf" + "text": "", + "page_start": 228, + "page_end": 228, + "source_file": "00-80T-80.pdf" } ] }, @@ -6451,70 +6451,70 @@ "target_page": 17, "target_passage": "Total operating expenses increased to $88.1 million for the year ended December 31, 2000", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, + "text": "", + "page_start": 15, + "page_end": 15, "source_file": "Excel Training Manual 1.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 416, + "page_end": 416, + "source_file": "00-80T-80.pdf" }, { - "text": "**Operating Expenses**Total operating expenses increased to $88.1 million for the year ended \nDecember 31, 2000 from $68.3 million for the year ended December 31, 1999 and from $34.5 \nmillion for the year ended December 31, 1998. The increase from 1999 to 2000 can be broken down \nby segment as follows: (1) a $3.5 million increase in Network Services Segment operating costs due to growth in the size of the network \noperations; (2) a $15.2 million increase in Software Services Segment due to write down of intangibles of $11.2 million and investment in \npersonnel and re s o u rces; and (3) a $1.1 million increase in Corporate Services Segment operating costs due to the expended operations. The \ni n c rease from 1998 to 1999 can be broken down by segment as follows: (1) a $13.0 million increase in Network Services Segment operating costs, \n(2) the addition of $19.6 million of Software Solutions Segment operating costs, and (3) a $1.2 million increase in Corporate Services Segment \noperating costs. Operating expenses for the years ended December 31, 2000 and 1999 are discussed more fully in the Segment Results of \nOperations sections below. \n\n**1995 1996 1997 1998 1999 2000**", - "page_start": 17, - "page_end": 17, - "source_file": "NASDAQ_EEFT_2000.pdf" + "text": "", + "page_start": 392, + "page_end": 392, + "source_file": "00-80T-80.pdf" }, { - "text": "**Q1 Q2 Q3 Q4**\n\nThe operating expenses for the We s t e rn European Sub-segment totaled $18.9 million for the year \nended December 31, 2000 as compared to $16.5 million for the year ended December 31, 1999, an increase of 15%. The increase in operating \nexpenses is largely the result of an increase in the number of ATMs operated by the Company from 621 at December 31, 1999 to 787 at \nDecember 31, 2000, and increased transaction volumes. \n\nThe operating expenses for the Other ATM Operations Sub-segment were $2.4 million for the year ended December 31, 2000 as compared to \n$2.2 million for the year ended December 31, 1999, an increase of 9%. The operating expenses from this segment are the result of the acquisition \nof the Dash network located in the United States in August 1999 and the unallocated costs associated with the Company's processing facilities. ", - "page_start": 19, - "page_end": 19, - "source_file": "NASDAQ_EEFT_2000.pdf" + "text": "", + "page_start": 417, + "page_end": 417, + "source_file": "00-80T-80.pdf" }, { - "text": "**Net Income** **Operating Income** **Revenues**\n\nin millions in millions in billions \n\n$1,000 $15 $1,200 \n\n800 12 960 \n\n600 9 720 \n\n400 6 480 \n\n200 3 240 \n\n2001 2000 1999 2001 2000 1999 2001 2000 1999 \n\nOperating income excluding \nSeptember 11 and HLI \ntax benefit Net income excluding \nSeptember 11 and HLI \ntax benefit ", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_HIG_2001.pdf" + "text": "", + "page_start": 416, + "page_end": 416, + "source_file": "00-80T-80.pdf" }, { - "text": "**Current Liabilities**C u rrent liabilities decreased to $20.5 million at December 31, 2000 from $26.9 million at December 31, 1999. This decre a s e \nis due primarily to decreases in accrued expenses, billings in excess of costs and estimated earnings on software installation costs and settlement of \nthe forw a rd foreign exchange contracts. \n\n**Capital Lease**Total capital lease obligations including current installments increased to $11.5 million at December 31, 2000 from $10.6 million \nat December 31, 1999. This increase is due primarily to additional capital leases resulting from the Company's purchase of Budapest Bank’s AT M \nnetwork, consisting of 147 ATMs on May 1, 2000. \n\n**Notes Payable**Notes payable increased to $77.2 million at December 31, 2000 from $72.8 million at December 31, 1999. This is the result of \nseveral transactions as follows: \n\n*(in millions)*\n7 2 . 8. \n(4.4) \n8 . 8. Balance at December 31, 1999 \nU n realized foreign exchange gain (DEM vs. US$) \nA c c retion of bond intere s t \n\n$ \n\nBalance at December 31, 2000 $ 7 7 . 2. ", - "page_start": 23, - "page_end": 23, - "source_file": "NASDAQ_EEFT_2000.pdf" + "text": "", + "page_start": 416, + "page_end": 416, + "source_file": "00-80T-80.pdf" }, { - "text": "Taken together, our transaction growth and expanding number of consumer touchpoints \n\ntranslated into an accelerating and recurring revenue stream, which greatly improved our \n\nbottom line. Our 2000 revenue of $52.7 million represented a 27% increase over the \n\ncompany’s 1999 revenue of $41.5 million. Euronet’s 2000 EBITDA also improved \n\n$2.4 million, or 14.5%, over 1999. ", - "page_start": 3, - "page_end": 3, - "source_file": "NASDAQ_EEFT_2000.pdf" + "text": "", + "page_start": 21, + "page_end": 21, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "**(21) Reconciliation of Net Loss to Net Cash Used in Operating Activities**\n\nThe reconciliation of net loss to net cash used in operating activities for the years ended December 31, 2000, 1999, and 1998 follows. ", - "page_start": 45, - "page_end": 45, - "source_file": "NASDAQ_EEFT_2000.pdf" + "text": "", + "page_start": 21, + "page_end": 21, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "D i rect operating costs in the Network Services Segment consist primarily of: ATM installation costs; ATM site rentals; and costs associated with \nmaintaining ATMs, ATM telecommunications, interest on network cash and cash delivery and security services to ATMs. Such costs increased to \n$24.4 million for the year ended December 31, 2000 from $21.9 million for the year ended December 31, 1999. The increase in direct operating \ncosts is primarily attributable to costs associated with operating the increased number of ATMs in the network during the periods. Also, \ni n t e rcompany allocations were made to charge the ATM operations with transaction switching and bank connection fees associated with the \noperations central processing center in Budapest. These allocations totalled $3.5 million and $2.9 million for the years ended December 31, 2000 \nand 1999, re s p e c t i v e l y. Direct operating costs for 2000 include a one-time gain of $1.2 million due to a change in Hungarian law that eliminates a \nmajor portion of the Company’s liability for import taxes on ATM hard w a re. Direct operating costs also include a $657,000 gain realized in 1999 \nf rom the sale of the Croatian network assets. The components of direct operating costs for the years ended December 31, 2000 and 1999 were: ", - "page_start": 19, - "page_end": 19, - "source_file": "NASDAQ_EEFT_2000.pdf" + "text": "", + "page_start": 21, + "page_end": 21, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "The Company’s re s e a rch and development costs incurred for computer products to be sold, leased or otherwise marketed totaled $6.7 \nmillion, $3.2 million and $153,000 for the years ended December 31, 2000, 1999 and 1998, re s p e c t i v e l y. In 2000, $1.0 million was \ncapitalized and appears on the Company’s balance sheet in prepaid expenses and other assets, net of accumulated amortization of $137,000. \nIn 1999, $322,000 was capitalized, net of accumulated amortization of $70,000. ", - "page_start": 46, - "page_end": 46, - "source_file": "NASDAQ_EEFT_2000.pdf" + "text": "", + "page_start": 276, + "page_end": 276, + "source_file": "00-80T-80.pdf" } ] }, @@ -6525,70 +6525,70 @@ "target_page": 24, "target_passage": "In 2000, 30% of the Company’s revenues were generated in Poland and Hungary", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 320, + "page_end": 320, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 2, + "page_end": 2, + "source_file": "NASDAQ_EMMS_2004.pdf" }, { - "text": "**Foreign Exchange Exposure**\n\nIn 2000, 30% of the Company’s revenues were generated in Poland and Hungary, as compared to 27% in 1999 and 73% in 1998. The 2000 \nf i g u re has increased due to the increase in revenues for the Polish operations. In Hungary the majority of revenues received are denominated in \nHungarian Forint and in Poland, the majority of revenues are denominated in Polish Zloty. However the majority of these foreign curre n c y \ndenominated contracts are linked either to inflation or the retail price index. While it remains the case that a significant portion of the Company’s \ne x p e n d i t u res are made in or are denominated in U.S. Dollars the Company is also striving to achieve more of its expenses in local currencies to \nmatch its revenues. \n\nThe Company estimates that a further 10% depreciation in foreign exchange rates of the Deutsche Mark, Hungarian Forint, Polish Zloty and the \nBritish Pound Sterling against the U.S. dollar, would have the combined effect of a $7.1 million decrease in the re p o rted net loss. This was \nestimated using 10% of the Company’s net losses after adjusting for unusual impairment and other items including U.S. dollar denominated or \nindexed expenses. The Company believes that this quantitative measure has inherent limitations. It does not take into account any govern m e n t a l \nactions or changes in either customer purchasing patterns or the Company’s financing or operating strategies. ", - "page_start": 24, - "page_end": 24, - "source_file": "NASDAQ_EEFT_2000.pdf" + "text": "", + "page_start": 0, + "page_end": 0, + "source_file": "NASDAQ_EMMS_2004.pdf" }, { - "text": "| | The Promise of\nEmerging Markets\nExpanding Poland’s\nPayment\nInfrastructure\nAlthough still under-\ndeveloped compared to western economies,\nPoland is one of the most dynamic and\npromising markets in all of Europe.\nSince entering Poland in 1995, Euronet\nWorldwide has become one of the largest\ntransaction processing service providers in\nthe country, establishing a network of over\n600 ATMs and providing software to eight\nmajor banks. Our agreement for electronic\nairtime distribution with all three mobile\nphone operators in the country – ERA GSM,\nPlus GSM and IDEA Centertel – further\nconfirms that Euronet is embedded in the\nfinancial payments fabric in Poland. |\n|---|---|\n| | The Promise of Emerging Markets Expanding Poland’s Payment Infrastructure Although still under- developed compared to western economies, Poland is one of the most dynamic and promising markets in all of Europe. Since entering Poland in 1995, Euronet Worldwide has become one of the largest transaction processing service providers in the country, establishing a network of over 600 ATMs and providing software to eight major banks. Our agreement for electronic airtime distribution with all three mobile phone operators in the country – ERA GSM, Plus GSM and IDEA Centertel – further confirms that Euronet is embedded in the financial payments fabric in Poland. |\n", - "page_start": 12, - "page_end": 12, - "source_file": "NASDAQ_EEFT_2000.pdf" + "text": "", + "page_start": 327, + "page_end": 327, + "source_file": "00-80T-80.pdf" }, { - "text": "Poland_Middle_Ages(I) \nPoland_Middle_Ages(II) \nPoland_Wielbark(I) \nPoland_Wielbark(II) \nPoland_Wielbark(III) \nPolandUkraine_MLBA(I) \nPolandUkraine_MLBA(II) \nPortugal.lronRoman \nRussia_Sarmatian \nSaami ", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed3.pdf" + "text": "", + "page_start": 327, + "page_end": 327, + "source_file": "00-80T-80.pdf" }, { - "text": "As the Network Services Segment continued to grow throughout 1999, the Company’s management began to divide the internal org a n i z a t i o n \nof the segment into Sub-segments. Accord i n g l y, beginning in January 2000, the Company divided the Network Services Segment into thre e \nSub-segments: “Central European Sub-segment” (including Hungary, Poland, the Czech Republic, Croatia, Greece and Romania), “We s t e rn \nE u ropean Sub-segment” (including Germ a n y, France, and the United Kingdom) and “Other Operations Sub-segment” (including the United \nStates and unallocated processing center costs). Where practical, certain amounts have been reclassified to reflect the change in intern a l \nre p o rting. The Company is unable to present Network Services Segment assets by Sub-segment as of December 31, 1999. Prior to January 1, \n2000, certain assets that were used to provide support services to the Company as a whole were included in the assets in the balance sheet of \nthe Company’s wholly owned Hungarian subsidiary, Bank Tech. In order to segregate corporate assets from those of the Hungarian \noperations, these assets were transferred as of December 31, 1999, from Bank Tech to an existing Hungarian shell company, Administrative \nS e rvices. Those assets are now shown under the Other Operations Sub-segment. ", - "page_start": 43, - "page_end": 43, - "source_file": "NASDAQ_EEFT_2000.pdf" + "text": "", + "page_start": 327, + "page_end": 327, + "source_file": "00-80T-80.pdf" }, { - "text": "The figure below illustrates country differences, based on data from the EWCS 2015: the values of \nIreland (green), the EU28 level (blue) with numbers, and the values of Poland (orange). Poland had a \nrelatively high share of employment in industry of 24%, for which Ireland has a share of 12%. The impact \non working conditions can be seen in the share of workers reporting exposures to vibrations (Poland \n27%, Ireland 16%) and loud noise (Poland 35%, Ireland 25%). ", - "page_start": 42, - "page_end": 42, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 1, + "page_end": 1, + "source_file": "NASDAQ_EMMS_2004.pdf" }, { - "text": "**(21) Reconciliation of Net Loss to Net Cash Used in Operating Activities**\n\nThe reconciliation of net loss to net cash used in operating activities for the years ended December 31, 2000, 1999, and 1998 follows. ", - "page_start": 45, - "page_end": 45, - "source_file": "NASDAQ_EEFT_2000.pdf" + "text": "", + "page_start": 327, + "page_end": 327, + "source_file": "00-80T-80.pdf" }, { - "text": "Per Share Data \n\nNet earnings per share (“EPS”) are computed by dividing net earnings by the weighted average number of shares of \ncommon stock outstanding during the period. The Company calculates dilutive EPS assuming all outstanding \noptions to purchase common stock have been exercised at the beginning of the year (or the time of issuance, if later.) \nThe dilutive effect of the outstanding options is reflected by application of the treasury stock method, whereby the \nproceeds from the exercised options are assumed to be used to purchase common stock at the average market price \nduring the period. The following table reconciles the computation of basic EPS to dilutive EPS: \n\nWeighted \nAverage \n Shares Net \n Earnings Per Share \n Amount \n\nFor the year ended December 31, 2002: \nNet earnings per share, basic \nEffect of stock options \nNet earnings per share, assuming dilution $33,952,550 \n - \n$33,952,550 12,359,966 \n 47,523 \n12,409,489 $ 2.74 \n\nFor the year ended December 31, 2001: \nNet earnings per share, basic \nEffect of stock options \nNet earnings per share, assuming dilution $29,354,505 \n - \n$29,354,505 12,318,346 \n 45,323 \n12,363,669 \n\n$ 2.38 \n\n$ 2.37 ", - "page_start": 76, - "page_end": 76, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 327, + "page_end": 327, + "source_file": "00-80T-80.pdf" }, { - "text": "satisfaction, for example, Austria, Cyprus, Germany, Greece, Ireland, Hungary, the Netherlands, \nPortugal and Slovakia. The one negative item might also be work-related health problems, for example, \nfor Sweden and Finland. \n\nMost countries show more extreme contradictions, that is, being in some aspects better and in others \nworse than average, like Estonia, Lithuania, Poland, Bulgaria, Portugal, Slovenia and Spain. Many of \nthese countries have very low figures for work-related health problems. Contradictory but mostly \nnegative responses (two or three fields with values under average) we find for Austria, Belgium, Croatia, \nFrance, Latvia, Lithuania, Malta, Romania, Poland, Spain and Slovenia. ", - "page_start": 99, - "page_end": 99, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 327, + "page_end": 327, + "source_file": "00-80T-80.pdf" } ] }, @@ -6605,64 +6605,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "sg246915.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "\nis applied. ", - "page_start": 331, - "page_end": 331, - "source_file": "00-80T-80.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "Louis began his personal reign with administrative and fiscal reforms. In 1661, the treasury verged on \nbankruptcy. To rectify the situation, Louis chose Jean-Baptiste Colbert as Controller-General of Finances in \n1665. However, Louis first had to neutralize Nicolas Fouquet, the powerful Superintendent of Finances. \nAlthough Fouquet's financial indiscretions were not very different from Mazarin's before him or Colbert's \nafter him, his ambition worried Louis. He lavishly entertained the king at the opulent château of Vaux-le- \nVicomte, flaunting a wealth which could hardly have accumulated except through embezzlement of government funds. \n\nRoyal \nMonogram \n\nFouquet appeared eager to succeed Mazarin and Richelieu in power, and he indiscreetly purchased and privately fortified the \nremote island of Belle Île. These acts sealed his doom. Fouquet was charged with embezzlement; the*Parlement*found him guilty \nand sentenced him to exile; and finally Louis altered the sentence to life imprisonment. ", - "page_start": 5, - "page_end": 5, - "source_file": "wikipedia5.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "claims. The Company currently has a claim for approximately $7.6 mil- consolidations and its rapid continuous improvement program to con- \n\nlion pending against it arising out of the bankruptcy of a customer filed tinue to build brands, product solutions, and selling models. \n\nin 2001. The Company was named a critical vendor by the bankruptcy Because of the following factors, as well as other variables \n\ncourt and, accordingly, was paid in full for all outstanding receivables. affecting the Company’s operating results, past financial performance \n\nThe claim alleges that the Company received preferential payments may not be a reliable indicator of future performance, and historical \n\nfrom the customer during the ninety days before the customer filed for trends should not be used to anticipate results or trends in future \n\nbankruptcy protection. The claim was brought in February 2003. The periods: \n\nCompany has recorded an accrual with respect to this contingency, in **•**competition within the office furniture and fireplace industries, \n\nan amount substantially less than the full amount of the claim, which including competition from imported products and competitive \n\nrepresents the best estimate within the range of likely exposure and pricing; \n\nintends to vigorously defend against the claim. Given the nature of this ", - "page_start": 38, - "page_end": 38, - "source_file": "NYSE_HNI_2003.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "**S H I P P I N G A N D H A N D L I N G P O L I C Y**\nShipping and handling fees charged to customers are reported as revenue and all shipping and handling costs incurred related to products sold are \nreported as cost of goods sold. \n\n**R E S E A R C H A N D D E V E L O P M E N T C O S T S**\nResearch and development costs relating to the development of new products and improvements of existing products are expensed as incurred. \n\n**S T O C K - B A S E D C O M P E N S A T I O N**\nAt December 31, 2003, the Company had three stock-based employee compensation plans, which are described more fully in Note 8. The Company \naccounts for those plans under the recognition and measurement principles of Accounting Principles Board (“APB”) Opinion No. 25, “Accounting for \nStock Issued to Employees,” and related interpretations. No stock-based employee compensation cost is reflected in net income, as all options granted \nunder those plans had an exercise price equal to the market value of the underlying common stock on the date of grant. The following table illustrates the \neffect on net income and income per share if the Company had applied the fair value recognition provisions of SFAS No. 123, “Accounting for Stock-Based \nCompensation,” to stock-based employee compensation: ", - "page_start": 15, - "page_end": 15, - "source_file": "NASDAQ_ATRI_2003.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "relate to allowance for doubtful accounts, inventory reserves, market- \nmeasure compensation cost for employee stock options using the \ning program accruals, warranty accruals, accruals for self-insured \nintrinsic value-based method described in APB No. 25. \nmedical claims, workers’ compensation, legal contingencies, general \nThe following table illustrates the effect on net income \nliability and auto insurance claims, and useful lives for depreciation \nand earnings per share if the Company had applied the fair value \nand amortization. Actual results could differ from those estimates. \nrecognition provisions of SFAS No. 123, “Accounting for Stock-Based \n\nCompensation,” as amended by SFAS No. 148 “Accounting for Stock- ***S E L F - I N S U R A N C E***\n\nBased Compensation — Transition and Disclosure,” to stock-based The Company is partially self-insured for general and product liability, \n\nemployee compensation. workers’ compensation, and certain employee health benefits. The gen- \n\neral, product, and workers’ compensation liabilities are managed using \n**2003** 2002 2001 *(In thousands)*\na wholly owned insurance captive; the related liabilities are included in **$ 98.1** $ 91.4 $ 74.4 ", - "page_start": 45, - "page_end": 45, - "source_file": "NYSE_HNI_2003.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "\nfh ", - "page_start": 334, - "page_end": 334, + "text": "", + "page_start": 316, + "page_end": 316, "source_file": "00-80T-80.pdf" }, { - "text": "(p) Stock-based compensation \n\nThe Company accounts for stock-based compensation using the intrinsic value method prescribed in Accounting Principles Board \nOpinion No. 25, “Accounting for Stock Issued to Employees” and related Interpretations. Accord i n g l y, compensation cost for stock \noptions is measured as the excess, if any, of the fair market value of the Company’s shares at the date of the grant over the exercise price. \nSuch compensation cost is charged to expense on a straight-line basis over the vesting period of the respective options. If vesting is \naccelerated as a result of certain milestones, the unrecognized compensation would be re c o rded as expense on the date such milestones \nhave or have been deemed to have been achieved. The Company has adopted the disclosure-only provisions of SFAS No. 123 \n(see Note 18). \n\n(q) Reclassifications \n\nC e rtain amounts have been reclassified in the prior year consolidated financial statements to conform to the 2000 consolidated financial \nstatement presentation. ", - "page_start": 33, - "page_end": 33, - "source_file": "NASDAQ_EEFT_2000.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "Overall participants were asked to describe situations to exemplify their answers, \nand follow-up questions were used to capture in-depth reflections, for example, \nWhat was positive/negative?, How did it feel?, What do you think of that?, What \ndoes it mean to you?, Can you elaborate on that?. ", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed13.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_KCN_2013.pdf" } ] }, @@ -6679,64 +6679,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 381, + "page_end": 381, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 302, + "page_end": 302, + "source_file": "00-80T-80.pdf" }, { - "text": "12. PENSION AND PROFIT SHARING PLANS: \n\nThe Company has a defined benefit pension plan covering substantially all of its employees. The benefits are based \non years of service and a percentage of the employee’s qualifying compensation during the final years of \nemployment. The Company’s funding policy is to contribute annually the amount necessary to satisfy the Internal \nRevenue Service’s funding standards. Contributions are intended to provide not only for benefits attributed to \nservice to date but also for those expected to be earned in the future. ", - "page_start": 85, - "page_end": 85, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 303, + "page_end": 303, + "source_file": "00-80T-80.pdf" }, { - "text": "**Pension Obligations**\nOur retiree pension plans had a funding deficit of approximately $172 \nmillion at December 31, 2013. We have been making special minimum \nmonthly payments in addition to our regular contributions to eliminate \nthe pension liability. During 2013, our funding deficit was reduced by \n$162 million. \n\naccrued obligations in the future. See*Critical accounting estimates*for \nmore information. \n\n*Purchase of Annuities*\nFrom time to time we have made additional lump-sum contributions to \nour pension plans, and the pension plans have purchased annuities \nfrom insurance companies to fund the pension benefit obligations for \ncertain groups of \nretired employees in the plans. Purchasing the \nannuities relieves us of our primary responsibility for that portion of \nthe accrued benefit obligations for the retired employees and eliminates \nthe significant risk associated with the obligations. \nThe special payments, including contributions associated with benefits \npaid from the plans, were approximately $7 million in 2013. We expect \nour total estimated funding requirements to be $96 million in 2014 and \nto be adjusted annually thereafter, based on various market factors \nsuch as interest rates and expected returns and staffing assumptions. \n\nWe did not make any additional lump-sum contributions to our pension \nplans in 2013 or 2012, and the pension plans did not purchase \nadditional annuities. \nChanges in factors such as the discount rate, increase in compensation \nand the expected return on plan assets can affect the accrued benefit \nobligation, pension expense and the deficiency of plan assets over ", - "page_start": 66, - "page_end": 66, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 303, + "page_end": 303, + "source_file": "00-80T-80.pdf" }, { - "text": "NOTES TO CONSOLIDATED FINANCIAL STATEMENTS (Continued) \n(In thousands, except per share amounts) \n\nSalary Continuation Benefits \n\nThe Company has agreements with certain retirees of acquired companies to pay monthly retirement benefits through fiscal 2020. \n\nRetiree Health Care Benefits \n\nThe Company provides health care benefits to eligible retired associates who pay the Company a specified monthly premium. \nPremium payments are based upon current insurance rates for the type of coverage provided and are adjusted annually. \nCertain monthly health care premium payments are partially subsidized by the Company. Additionally, in conjunction with a \nfiscal 1998 acquisition, the Company assumed the obligation for a postretirement medical benefit plan which provides health \ncare benefits to eligible retired associates at no cost to the individual. \n\nThe Company uses a June 30 measurement date for all plans. \n\nThe following table sets forth the changes in benefit obligations and plan assets during the year and the funded status for the \npostemployment plans at June 30: \n\nPension Benefits Retiree Health Care Benefits \n\n2011. \n\n**Change in benefit obligation:**\n\nBenefit obligation at beginning of the year \n\n4,593 \n39 \n235 \n37 \n(227 ) \n— \n(10 ) \n— \n4,667 \n\nService cost \n\nInterest cost \nPlan participants’ contributions \n\nBenefits paid \n\nAmendments \nActuarial loss (gain) during year \n\nCurtailment \n\nBenefit obligation at end of year \n\n**Change in plan assets:**\n\n— \n— \n190 \n37 \n(227 ) \n— \n(4,667 ) \n\nFair value of plan assets at beginning of year \n\nActual (loss) gain on plan assets \n\nEmployer contributions \nPlan participants’ contributions \n\nBenefits paid \n\nFair value of plan assets at end of year \n\n**Funded status at end of year**", - "page_start": 34, - "page_end": 34, - "source_file": "NYSE_AIT_2012.pdf" + "text": "", + "page_start": 303, + "page_end": 303, + "source_file": "00-80T-80.pdf" }, { - "text": "The Company has established an investment policy and regularly monitors the performance of the assets of the trust maintained in \nconjunction with the Qualified Defined Benefit Retirement Plan. The strategy implemented by the trustee of the Qualified Defined \nBenefit Retirement Plan is to achieve long-term objectives and invest the pension assets in accordance with ERISA and fiduciary \nstandards. The long-term primary objectives are to provide for a reasonable amount of long-term capital, without undue exposure \nto risk; to protect the Qualified Defined Benefit Retirement Plan assets from erosion of purchasing power; and to provide investment \nresults that meet or exceed the actuarially assumed long-term rate of return. The expected long-term rate of return on assets \nassumption was developed by considering the historical returns and the future expectations for returns of each asset class as well as \nthe target asset allocation of the pension portfolio. \n\nCash Flows \n\nEmployer Contributions \n\nThe Company expects to contribute $6,000 to its pension benefit plans and $240 to its retiree health care benefit plans in \n2013. Contributions do not equal estimated future payments as certain payments are made from plan assets. \n\nEstimated Future Benefit Payments \n\nThe following benefit payments, which reflect expected future service, as applicable, are expected to be paid in each of the next ", - "page_start": 37, - "page_end": 37, - "source_file": "NYSE_AIT_2012.pdf" + "text": "", + "page_start": 303, + "page_end": 303, + "source_file": "00-80T-80.pdf" }, { - "text": "NOTE 22: PENSIONS \n\nWe have contributory and non-contributory defined benefit pension \nplans that are made available to most of our employees. The plans \nprovide pensions based on years of service, years of contributions and \nearnings. We do not provide any non-pension post-retirement benefits. \nWe also provide unfunded supplemental pension benefits to certain \nexecutives. \n\nDeficiency of plan assets over accrued benefit obligations \nEffect of asset ceiling limit \n\nThe assets of the defined benefit pension plans are held in segregated \naccounts isolated from our assets. We administer the defined benefit \npension plans pursuant to applicable regulations, the Statement of \nInvestment Policies and Procedures and to the mandate of the Pension \nCommittee of the Board of Directors. The Pension Committee of the \nBoard of Directors oversees our administration of the defined benefits \npension plans, which includes the following principal areas: \n(cid:129) overseeing the \n\nNet deferred pension liability **$ (181)**$ (334) \n\nConsists of: \n\nDeferred pension asset \nDeferred pension liability \n**$**\n**8**\n**(189)**\n$ \n9 \n(343) \n\nNet deferred pension liability **$ (181)**$ (334) \nfunding, administration, ", - "page_start": 122, - "page_end": 122, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 303, + "page_end": 303, + "source_file": "00-80T-80.pdf" }, { - "text": "The Company has established an investment policy and regularly monitors the performance of the assets of the trust maintained in \nconjunction with the Qualified Defined Benefit Retirement Plan. The strategy implemented by the trustee of the Qualified Defined \nBenefit Retirement Plan is to achieve long-term objectives and invest the pension assets in accordance with ERISA and fiduciary \nstandards. The long-term primary objectives are to provide for a reasonable amount of long-term capital, without undue exposure \nto risk; to protect the Qualified Defined Benefit Retirement Plan assets from erosion of purchasing power; and to provide investment \nresults that meet or exceed the actuarially assumed long-term rate of return. The expected long-term rate of return on assets \nassumption was developed by considering the historical returns and the future expectations for returns of each asset class as well as \nthe target asset allocation of the pension portfolio. \n\nCash Flows \n\nEmployer Contributions \n\nThe Company expects to contribute $6,000 to its pension benefit plans and $240 to its retiree health care benefit plans in \n2013. Contributions do not equal estimated future payments as certain payments are made from plan assets. \n\nEstimated Future Benefit Payments \n\nThe following benefit payments, which reflect expected future service, as applicable, are expected to be paid in each of the next \nfive years and in the aggregate for the subsequent five years: ", - "page_start": 36, - "page_end": 36, - "source_file": "NYSE_AIT_2012.pdf" + "text": "", + "page_start": 303, + "page_end": 303, + "source_file": "00-80T-80.pdf" }, { - "text": "**NOTE 6: 401(k) PLAN**\nWe provide a 401(k) plan for our employees that allows for employee elective contributions and discretionary company contributions. \nEmployee elective contributions are funded through voluntary payroll deductions. Our discretionary company contribution is funded in an \namount determined by our Board of Directors each year. Our expense related to company contributions totaled $77, $77 and $83 in 2014, \n2013 and 2012. \n\n**NOTE 7: POSTRETIREMENT BENEFITS**\nWe have an unfunded defined benefit Supplemental Executive Retirement Plan (“SERP”), which provides retirement benefits to certain \nofficers and select employees. The SERP has different benefit levels depending on the participant’s role in the company. At the end of 2014, \nwe had 59 participants in the plan, including 27 officers and select employees eligible for SERP benefits, 31 retirees and 1 beneficiary. This \nplan is non-qualified and does not have a minimum funding requirement. ", - "page_start": 62, - "page_end": 62, - "source_file": "NYSE_JWN_2014.pdf" + "text": "", + "page_start": 303, + "page_end": 303, + "source_file": "00-80T-80.pdf" }, { - "text": "mutual funds and Company common stock. \n\nPostemployment Benefit Plans \n\nThe Company provides the following postemployment benefits which, except for the Qualified Defined Benefit Retirement Plan, \nare unfunded: \n\nSupplemental Executive Retirement Benefits Plan \n\nThe Company has a non-qualified pension plan to provide supplemental retirement benefits to certain officers. Benefits are \npayable beginning at retirement and determinable at retirement based upon a percentage of the participant’s historical \ncompensation. On December 19, 2011, the Executive Organization and Compensation Committee of the Board of Directors \nfroze participant benefits (credited service and final average earnings) and entry into the Supplemental Executive Retirement \nBenefits Plan (SERP) effective December 31, 2011. This action constituted a plan curtailment. The plan liability was remeasured \nin conjunction with the curtailment using a 3.5% discount rate and participant final average earnings through the curtailment \ndate. The remeasurement in conjunction with the curtailment resulted in an actuarial loss (recorded in other comprehensive \nincome (loss)) of $302 ($492 loss, net of income tax of $190). \n\nThe curtailment is reflected in the Company's consolidated balance sheets as: 1) a reduction to the overall SERP liability ", - "page_start": 32, - "page_end": 32, - "source_file": "NYSE_AIT_2012.pdf" + "text": "", + "page_start": 303, + "page_end": 303, + "source_file": "00-80T-80.pdf" } ] }, @@ -6753,64 +6753,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 332, + "page_end": 332, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 370, + "page_end": 370, + "source_file": "00-80T-80.pdf" }, { - "text": "(3) Legal risk \nThe Group is exposed to the risk of entering into a financial \nagreement which may contain inappropriate terms and conditions as \nwell as the risk that an existing contract may be affected by revisions \nto \nlaws and regulations. The Company’s Legal \nDepartment and Finance Department make every effort to minimize \nlegal risk by reviewing any new agreements of significance and by \nreviewing the related documents in a centralized way. \n\nthe relevant ", - "page_start": 91, - "page_end": 91, - "source_file": "OTC_NSANY_2004.pdf" + "text": "", + "page_start": 370, + "page_end": 370, + "source_file": "00-80T-80.pdf" }, { - "text": "If**a risk assessment is conducted just for compliance purposes**, and not used appropriately for the \nsuccessful management of OSH and reduction of accidents and occupational diseases, the risk \nassessment may lose its dynamic nature, and findings may be neither implemented nor communicated \nappropriately to employees. \n\nThe**types of risks included in risk assessments**are related to the risk profiles of different sectors, \nfor example, it is likely that risk assessments in heavy industries and manual occupations focus more \non safety risks. However, while sectoral risk profiles will naturally bias the identification of risks, smaller \nestablishments seem to have**less of a focus on MSDs or psychosocial risk factors**, which would \nsuggest that they are less well recognised or understood, in particular for MSEs.415 Establishments also \nreport that psychosocial risk factors are more difficult to manage than other OSH risks, while as business \nsize grows, so does the proportion of respondents who perceive psychosocial risks as more difficult to \nmanage than other OSH risks.416 \n\nESENER 2019 shows that a**reluctance to talk openly**about these issues seems to be the main \ndifficulty for addressing psychosocial risks (60% of establishments in the EU27). This, as with all the \nother difficulties considered (lack of awareness among staff/management and lack of expertise or \nspecialist support), is reported in all enterprise sizes but more frequently as establishment size grows. ", - "page_start": 128, - "page_end": 128, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 370, + "page_end": 370, + "source_file": "00-80T-80.pdf" }, { - "text": "And there are also**emerging and new risks**where health data will**not be available until a certain**\n**number of workers are exposed for quite a while**. Some prominent examples are nanotechnologies, \nthe significant increase of new chemically based technologies, vision impairment due to long hours of \nwork under artificial light at the same distance with small digital equipment, 183 more exposure to ‘global’ \nbiological agents due to more interactional tasks, and travel and transport between countries and \ncontinents. On that note, the Covid-19 pandemic could also be used as an example. In 2022, the \nCommission proposed an update of the Recommendation on the ESOD to recognise Covid-19 as an \noccupational disease for workers particularly concerned: health and social care, home help or where \nthere is a proven risk of infection (during a pandemic) in other sectors 184. \n\nIt adds to these difficulties that workers are often not only exposed to one disease causing exposure but \nto**several exposures**at the same time (exposure is understood here in a broad sense: ranging from \nlong working hours over postures and movements to harassment and violence and to noise and \nchemical and biological substances, etc.).**In theory, a single risk**— if below the threshold limit values \nand in line with legislation and standards —**will not cause harm — given that it is the only exposure**. \nThe impact of this single exposure is not strong enough to generate a disease on the level of severity \nof a recognised occupational disease. A**combination of several risks**might add several exposures, \nworsen the impact and cause serious harm. ", - "page_start": 76, - "page_end": 76, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 370, + "page_end": 370, + "source_file": "00-80T-80.pdf" }, { - "text": "Consistent with the findings in 2014, a total of 75% of establishments interviewed in the EU27 in \nESENER 2019 indicate that they**carry out risk assessments regularly**. As expected, there is a \npositive correlation with establishment size. Several national studies show much fewer enterprises \ncarrying out risk assessments, for example, only 50% in Germany, and SMEs even less.412 Moreover, \nonly a small percentage of companies carry out workplace risk assessments that will not only meet the \nessential procedural requirements but also take into consideration new and emerging risks in a \ncomprehensive manner.413 \n\nParticularly difficult is the assessment of the**quality of risk assessments**. A complete quality \nassessment would require specific knowledge of several aspects: of the specific topic, of the — real — \nsituation at the workplaces in an enterprise, and of the expected reduction of these risks by the proposed \nor recommended risk mitigation measures. This has rarely been done. Moreover, even inside one \nenterprise the**quality of a risk assessment might differ depending on the topic**, for example, \nbetween ‘easier’ topics as ‘correct provision of warning signals’ or ‘adequate temperatures’, and more \ncomplex topics like psychosocial, musculoskeletal, or chemical and biological risks.414 ", - "page_start": 127, - "page_end": 127, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 370, + "page_end": 370, + "source_file": "00-80T-80.pdf" }, { - "text": "**PART VIII**\n\n**Risk Management**\nKillam faces a variety of risks, the majority of which are common to real estate entities. Real estate investments are generally subject to varying \ndegrees of risk, depending on the nature of the property. These risks include (i) changes in general economic conditions, (ii) changes in local \nconditions (such as an oversupply of space or a reduction in demand for real estate in the area), (iii) changes to government regulations (such as \nnew or revised residential tenant legislations), (iv) competition from others with available space, and (v) the ability of the landlord or owner to \nprovide adequate maintenance economically. \n\nReal estate is relatively illiquid. Such illiquidity will tend to limit Killam’s ability to rebalance its portfolio promptly in response to changing \neconomic or investment conditions. In addition, financial difficulties of other property owners, resulting in distress sales, may depress real estate \nvalues in the markets in which the company operates. \n\nKillam’s exposure to general risks associated with real estate investments is mitigated with both its geographic diversification, and investments in \nboth apartments and mHcs. \n\nKillam is exposed to other risks, as outlined below: \n\n**Interest Rate Risk**\nInterest risk is the risk that the Company would experience lower returns as the result of its exposure to a higher interest rate environment. The \nCompany is exposed to interest rate risk as a result of its mortgages and loans payable, however this risk is mitigated through the Company’s \nstrategy to have the majority of its mortgages payable in fixed‑term arrangements. The Company also structures its financings so as to stagger \nthe maturities of its debt, minimizing the Company’s exposure to interest rates in any one year. ", - "page_start": 59, - "page_end": 59, - "source_file": "TSX_KMP_2013.pdf" + "text": "", + "page_start": 370, + "page_end": 370, + "source_file": "00-80T-80.pdf" }, { - "text": "**Development Risk**\nDevelopment risk is the risk that costs of developments will exceed original estimates, unforeseen delays occur and/or units will not be leased in \nthe timeframe and/or at rents anticipated. Killam minimizes its exposure to development risk my limiting the amount of development underway \nat any one time. To reduce the Company’s exposure to price increases, Killam enters into fixed‑rate contracts when possible. To reduce the \nlease‑up risk, Killam does extensive market research in advance of each development to support expected rental rates, and pre‑markets its \nproperties early on in the process, to increase demand for the new developments. ", - "page_start": 59, - "page_end": 59, - "source_file": "TSX_KMP_2013.pdf" + "text": "", + "page_start": 370, + "page_end": 370, + "source_file": "00-80T-80.pdf" }, { - "text": "We are committed to continually strengthening our risk management \ncapabilities to protect and enhance shareholder value. The purpose of \nrisk management is not to eliminate risk but to optimize trade-offs \nbetween risk and return to maximize value to the organization. \n\n**Enterprise Risk Management**\nOur Enterprise Risk Management program seeks to ensure we identify, \nassess, manage, monitor and communicate risk consistently throughout \nthe company and that we manage risk in a way that supports our \nstrategic and business goals. This program supports \nthe Audit \nCommittee and the Board’s responsibility for risk by facilitating a formal \nstrategic risk assessment process. \n\n**Risk Governance**\nThe Board has overall responsibility for risk governance and oversees \nmanagement in identifying the principal risks we face in our business \nand implementing appropriate risk assessment processes to manage \nthese risks. It delegates certain duties to the Audit Committee. \n\nWe carry out an annual strategic risk assessment to identify our \nprincipal risks and their potential impact on our ability to achieve our \nstrategic plans. This assessment includes reviewing risk reports, audit \nreports and industry benchmarks, and interviewing key risk owners. We \nalso conduct a formal survey every two years to get management \nfeedback on the key risks facing the organization and identify emerging \nrisks. Then we prioritize the risks using standard risk assessment criteria. \nEnterprise Risk Management reports the results of the strategic risk \nassessment to the Executive Leadership Team and the Audit Committee. ", - "page_start": 76, - "page_end": 76, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 371, + "page_end": 371, + "source_file": "00-80T-80.pdf" }, { - "text": "•**Compliance**with and impact of legislation. Currently, there are data on the percentage of \nenterprises with a risk assessment but very limited information about the**quality of these risk**\n**assessments and of implemented risk management and reduction measures**. Previous \nstudies indicate that in many cases the risk assessment is conducted by an enterprise just to \ncomply with legal obligations (paper compliance). A possible approach could be an**anonymous**\n**evaluation of the quality of a representative share**of risk assessments. ", - "page_start": 140, - "page_end": 140, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 371, + "page_end": 371, + "source_file": "00-80T-80.pdf" } ] }, @@ -6821,70 +6821,70 @@ "target_page": 7, "target_passage": "OWL ontologies are an implementation of Description Logic (DL) which is a decidable subset of First Order Logic", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 298, + "page_end": 298, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 400, + "page_end": 400, + "source_file": "00-80T-80.pdf" }, { - "text": "Ontologies are used to capture knowledge about some domain of interest. An ontology describes the \nconcepts in the domain and also the relationships that hold between those concepts. Different ontology \nlanguages provide different facilities. The most recent development in standard ontology languages is \nOWL from the World Wide Web Consortium (W3C). A good primer on the basic concepts of OWL can \nbe found at: https://www.w3.org/TR/owl2-primer/ \n\nOWL makes it possible to describe concepts in an unambiguous manner based on set theory and logic. \nComplex concepts can be built up out of simpler concepts. The logical model allows the use of a reasoner \nwhich can check whether all of the statements and definitions in the ontology are mutually consistent and \ncan also recognize which concepts fit under which definitions. The reasoner can therefore help to \nmaintain the hierarchy correctly. This is particularly useful when dealing with cases where classes can \nhave more than one parent. The reasoner can also infer additional information. For example, if two \nproperties are inverses only one value needs to be asserted by the user and the inverse value will be \nautomatically inferred by the reasoner. \n\n3.1 Components of OWL Ontologies \nAn OWL ontology consists of Classes, Properties, and Individuals. OWL ontologies are an \nimplementation of Description Logic (DL) which is a decidable subset of First Order Logic. A class in \nOWL is a set, a property is a binary relation, and an individual is an element of a set. Other concepts from \nset theory are also implemented in OWL such as Disjoint sets, the Empty set (owl:Nothing), inverse ", - "page_start": 7, - "page_end": 7, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 400, + "page_end": 400, + "source_file": "00-80T-80.pdf" }, { - "text": "4.1 Named Classes \nThe main building blocks of an OWL ontology are classes. In Protégé 5, editing of classes can be done in \nthe Entities tab. The Entities tab has a number of sub-tabs. When you select it, the default should be the \nClass hierarchy view as shown in Figure 4.5.4 All empty ontologies contains one class called owl:Thing. \nOWL classes are sets of individuals. The class owl:Thing is the class that represents the set containing \nall individuals. Because of this all classes are subclasses of owl:Thing. ", - "page_start": 14, - "page_end": 14, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 400, + "page_end": 400, + "source_file": "00-80T-80.pdf" }, { - "text": "**Systems of logic**\n\nSystems of logic are theoretical frameworks for assessing the correctness of reasoning and arguments. \nFor over two thousand years, Aristotelian logic was treated as the canon of logic in the Western \nworld,[104] but modern developments in this field have led to a vast proliferation of logical systems.[105] \nOne prominent categorization divides modern formal logical systems into classical logic, extended logics, \nand deviant logics.[106] ", - "page_start": 9, - "page_end": 9, - "source_file": "wikipedia1.pdf" + "text": "", + "page_start": 400, + "page_end": 400, + "source_file": "00-80T-80.pdf" }, { - "text": "**History**\n\nLogic was developed independently in several cultures during antiquity. One major early contributor was \nAristotle, who developed*term logic*in his*Organon*and*Prior Analytics*.[183] He was responsible for the \nintroduction of the hypothetical syllogism[184] and temporal modal logic.[185] Further innovations include \ninductive logic[186] as well as the discussion of new logical concepts such as terms, predicables, \nsyllogisms, and propositions. Aristotelian logic was highly regarded in classical and medieval times, both \nin Europe and the Middle East. It remained in wide use in the West until the early 19th century.[187] It has \nnow been superseded by later work, though many of its key insights are still present in modern systems of \nlogic.[188] ", - "page_start": 16, - "page_end": 16, - "source_file": "wikipedia1.pdf" + "text": "", + "page_start": 400, + "page_end": 400, + "source_file": "00-80T-80.pdf" }, { - "text": "The restrictions for a class are displayed and edited using the Class Description View shown in Figure \n4.17. The Class Description View holds most of the information used to describe a class. The Class \nDescription View is a powerful way of describing and defining classes. It is one of the most important \ndifferences between describing classes in OWL and in other models such as most object-oriented \nprogramming languages. In other models there is no formal definition that describes why one class is a \nsubclass of another, in OWL there is. Indeed, the OWL classifier can actually redefine the class hierarchy \nbased on the logical restrictions defined by the user. We will see an example of this later in the tutorial. \n\nRestrictions are also called axioms in OWL. This has the same meaning as in logic. An axiom is a \nlogical formula defined by the user rather than deduced by the reasoner. As described above, \nin Protégé all axioms are shown in normal font whereas all inferences inferred by the reasoner \nare highlighted in yellow. ", - "page_start": 32, - "page_end": 32, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 400, + "page_end": 400, + "source_file": "00-80T-80.pdf" }, { - "text": "**Philosophy of logic and philosophical logic**\n*Philosophy of logic*is the philosophical discipline studying the scope and nature of logic.[59] It examines \nmany presuppositions implicit in logic, like how to define its basic concepts or the metaphysical \nassumptions associated with them.[158] It is also concerned with how to classify logical systems and \nconsiders the ontological commitments they incur.[159]*Philosophical logic*is one of the areas within the \nphilosophy of logic. It studies the application of logical methods to philosophical problems in fields like \nmetaphysics, ethics, and epistemology.[160] This application usually happens in the form of extended or \ndeviant logical systems.[161] ", - "page_start": 14, - "page_end": 14, - "source_file": "wikipedia1.pdf" + "text": "", + "page_start": 400, + "page_end": 400, + "source_file": "00-80T-80.pdf" }, { - "text": "next section. Which option you choose for your ontology will depend on the specific requirements you \nhave as well as the standards established by your organization or organizations that you work with. \n\nFinally, another name related concept you should be aware of is the concept of a namespace. If you have \nworked with most modern programming languages such as Python or Java, you are already familiar with \nthe concept of a namespace. The concept is identical in OWL. A namespace is used to avoid naming \nconflicts between different ontologies. For example, you may have a class called Network in an ontology \nabout telecommunications. You might also have a class called Network in an ontology about graph \ntheory. The two concepts are related but are different. Just as with programming languages you use \nnamespace prefixes to determine what specific namespace a name refers to. E.g., in this example you \nmight have the prefix tc for the Telecom ontology and gt for the Graph Theory ontology. Thus, when \nyou referred to the Network class for the Telecom ontology you would use tc:Network and \ngt:Network for the graph theory class. \n\nNote that you already have some experience with other namespaces. The OWL namespace prefix is owl \nand is used to refer to classes such as owl:Thing and owl:Nothing. The Resource Description \nFramework Schema (RDFS) is a model that OWL is built on top of and thus some properties that \nontologies use such as rdfs:label leverage this namespace. ", - "page_start": 62, - "page_end": 62, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 400, + "page_end": 400, + "source_file": "00-80T-80.pdf" }, { - "text": "To understand what is going on you first need to understand that each SPARQL query consists of two \nparts. The first part at the beginning consists of several namespace prefixes. These statements consist of \nthe prefix used for a particular namespace as well as the IRI associated with this namespace. Recall that \nthese concepts were described in chapter 7. You may be wondering where all these prefixes came from \nsince you didn’t add them to your ontology. The answer is that every OWL ontology comes with a set of \nnamespaces and prefixes that are required to define the ontology. \n\nAlso, to understand SPARQL you need to “peak under the hood” of OWL. So far, we have been \ndiscussing concepts in purely logical and set theoretic terms, i.e., at the semantic level. However, like any \nlanguage or database there is a lower level that describes how the concepts are mapped to actual data. In a \nrelational database the fundamental construct to represent data is a table. In OWL the fundamental \nconstruct is a triple. OWL is actually built on top of RDFS which is a language built on top of RDF. RDF \n(Resource Description Framework) is a language to describe graphs (in the mathematical sense of the \nterm). I.e., to describe nodes and links. ", - "page_start": 69, - "page_end": 69, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 401, + "page_end": 401, + "source_file": "00-80T-80.pdf" } ] }, @@ -6895,70 +6895,70 @@ "target_page": 30, "target_passage": "They are created by the reasoner when you use class expressions. For example, if you define the range of a property to be PizzaTopping or PizzaBase then the reasoner will create an anonymous class representing the intersection of those two classes", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 300, + "page_end": 300, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 419, + "page_end": 419, + "source_file": "00-80T-80.pdf" }, { - "text": "1. Primitive classes. These are classes that are defined by conditions that are*necessary*(but not \nsufficient) to hold for any individuals that are instances of that class or its subclasses. The \ncondition may be as simple as:*Class A is a subclass of class B*. To start with we will define \nprimitive classes first and then defined classes. When the reasoner encounters an individual that is \nan instance of a primitive class it infers that all the conditions defined for that class must hold for \nthat individual. \n\n2. Defined classes. These are classes that are defined by both*necessary*and*sufficient*conditions. \nWhen the reasoner encounters an individual that satisfies all the conditions for a defined class it \nwill make the inference that the individual is an instance of that class. The reasoner can also use \nthe conditions defined on classes to change the class hierarchy, e.g., to infer that*Class A is a*\n*subclass of Class B*. We will see examples of this later in the tutorial. \n\n3. Anonymous classes. These are classes that you won’t encounter much and that won’t be \n\ndiscussed much in this tutorial, but it is good to know about them. They are created by the \nreasoner when you use class expressions. For example, if you define the range of a property to be \nPizzaTopping or PizzaBase then the reasoner will create an anonymous class representing \nthe intersection of those two classes. ", - "page_start": 30, - "page_end": 30, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 419, + "page_end": 419, + "source_file": "00-80T-80.pdf" }, { - "text": "The restrictions for a class are displayed and edited using the Class Description View shown in Figure \n4.17. The Class Description View holds most of the information used to describe a class. The Class \nDescription View is a powerful way of describing and defining classes. It is one of the most important \ndifferences between describing classes in OWL and in other models such as most object-oriented \nprogramming languages. In other models there is no formal definition that describes why one class is a \nsubclass of another, in OWL there is. Indeed, the OWL classifier can actually redefine the class hierarchy \nbased on the logical restrictions defined by the user. We will see an example of this later in the tutorial. \n\nRestrictions are also called axioms in OWL. This has the same meaning as in logic. An axiom is a \nlogical formula defined by the user rather than deduced by the reasoner. As described above, \nin Protégé all axioms are shown in normal font whereas all inferences inferred by the reasoner \nare highlighted in yellow. ", - "page_start": 32, - "page_end": 32, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 419, + "page_end": 419, + "source_file": "00-80T-80.pdf" }, { - "text": "The following are some examples of classes of individuals that we might want to define via property \nrestrictions: \n\n• The class of individuals with at least one hasChild relation. \n• The class of individuals with 2 or more hasChild relations. \n• The class of individuals that have at least one hasTopping relationship to individuals that are \nmembers of MozzarellaTopping – i.e. the class of things that have at least a mozzarella \ntopping. \n\n• The class of individuals that are Pizzas and only have hasTopping relations to instances of the \n\nclass VegetableTopping (i.e., VegetarianPizza). \n\nIn OWL we can describe all of the above classes using restrictions. OWL restrictions fall into three main \ncategories: \n\n1. Quantifier restrictions. These describe that a property must have some or all values that are of a \n\nparticular class. \n\n2. Cardinality restrictions. These describe the number of individuals that must be related to a class \n\nby a specific property. \n\n3. hasValue restrictions. These describe specific values that a property must have. \n\nWe will initially use quantifier restrictions. Quantifier restrictions can be further categorized as*existential*\nrestrictions and*universal*restrictions6. Both types of restrictions will be illustrated with examples in this \ntutorial. ", - "page_start": 31, - "page_end": 31, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 419, + "page_end": 419, + "source_file": "00-80T-80.pdf" }, { - "text": "The foundation for RDF graphs are triples consisting of a subject, predicate, and object. This results in \nwhat is called an undirected or network graph because objects can be subjects and vice versa. Whenever \nyou define a property in OWL you are defining a predicate. An individual can be a subject or an object \n(or both). E.g., in our ontology Customer1 purchasedPizza AmericanaHotPizza1. In this example \nCustomer1 is the subject, purchasedPizza is the predicate and AmericanaHotPizza1 is the object. \n\nHowever, classes and properties themselves are also represented as triples. So for example, when you \ncreate the class Pizza what Protégé does for you is to add the triple: Pizza rdf:type owl:Class to \nthe ontology. I.e., the Pizza entity is of type (is an instance of) owl:Class. Similarly when you add \nNamedPizza as a subclass of Pizza, Protégé adds the triple: NamedPizza rdfs:**s**ubClassOf \nPizza. \n\nHopefully, now you can make some sense of this initial query. The query is looking for all the entities \nthat are the subjects of triples where the predicate is rdfs:**s**ubClassOf and the object is any other \nentity. The*?*before a name indicates that the name is a wildcard that can match anything that fits with the \nrest of the pattern. This is part of the power of SPARQL, one can match a Subject, an Object, a Predicate \nor even all three. Making all 3 parts of the pattern wildcards would return every triple in the graph (in this \ncase our entire Pizza ontology) being searched. You may notice that in some cases the object is simply the \nname of a class while in others it is a class expression with an orange circle in front of it. This is because \nwhen defining classes using DL axioms Protégé creates anonymous classes that correspond to various DL \naxioms. ", - "page_start": 69, - "page_end": 69, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 418, + "page_end": 418, + "source_file": "00-80T-80.pdf" }, { - "text": "4.1 Named Classes \nThe main building blocks of an OWL ontology are classes. In Protégé 5, editing of classes can be done in \nthe Entities tab. The Entities tab has a number of sub-tabs. When you select it, the default should be the \nClass hierarchy view as shown in Figure 4.5.4 All empty ontologies contains one class called owl:Thing. \nOWL classes are sets of individuals. The class owl:Thing is the class that represents the set containing \nall individuals. Because of this all classes are subclasses of owl:Thing. ", - "page_start": 14, - "page_end": 14, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 418, + "page_end": 418, + "source_file": "00-80T-80.pdf" }, { - "text": "Ontologies are used to capture knowledge about some domain of interest. An ontology describes the \nconcepts in the domain and also the relationships that hold between those concepts. Different ontology \nlanguages provide different facilities. The most recent development in standard ontology languages is \nOWL from the World Wide Web Consortium (W3C). A good primer on the basic concepts of OWL can \nbe found at: https://www.w3.org/TR/owl2-primer/ \n\nOWL makes it possible to describe concepts in an unambiguous manner based on set theory and logic. \nComplex concepts can be built up out of simpler concepts. The logical model allows the use of a reasoner \nwhich can check whether all of the statements and definitions in the ontology are mutually consistent and \ncan also recognize which concepts fit under which definitions. The reasoner can therefore help to \nmaintain the hierarchy correctly. This is particularly useful when dealing with cases where classes can \nhave more than one parent. The reasoner can also infer additional information. For example, if two \nproperties are inverses only one value needs to be asserted by the user and the inverse value will be \nautomatically inferred by the reasoner. \n\n3.1 Components of OWL Ontologies \nAn OWL ontology consists of Classes, Properties, and Individuals. OWL ontologies are an \nimplementation of Description Logic (DL) which is a decidable subset of First Order Logic. A class in \nOWL is a set, a property is a binary relation, and an individual is an element of a set. Other concepts from \nset theory are also implemented in OWL such as Disjoint sets, the Empty set (owl:Nothing), inverse ", - "page_start": 7, - "page_end": 7, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 418, + "page_end": 418, + "source_file": "00-80T-80.pdf" }, { - "text": "provide a language that is called Description Logic or DL for short. One of the key features of DL is that \nthese superclass-subclass relationships (aka subsumption relationships) can be computed automatically by \na reasoner – more on this later. Figure 3.3 shows a representation of some classes containing individuals – \nclasses are represented as ovals, like sets in Venn diagrams. \n\nIn OWL classes can be built up of descriptions that specify the conditions that must be satisfied by an \nindividual for it to be a member of the class. How to formulate these descriptions will be explained as the \ntutorial progresses. ", - "page_start": 10, - "page_end": 10, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 418, + "page_end": 418, + "source_file": "00-80T-80.pdf" }, { - "text": "Let’s take a closer look at an example of an existential restriction. The restriction hasTopping some \nMozzarellaTopping is an existential restriction (as indicated by the some keyword), which restricts the \nhasTopping property, and has a filler MozzarellaTopping. This restriction describes the class of \nindividuals that have at least one hasTopping relationship to an individual that is a member of the class \nMozzarellaTopping. \n\nA restriction always describes a class. Sometimes (as we will soon see) it can be a defined class. \nOther times it may be an anonymous class. In all cases the class contains all of the individuals \nthat satisfy the restriction, i.e., all of the individuals that have the relationships required to be a \nmember of the class. In section 9.2 one of our SPARQL queries will return several anonymous \nclasses. ", - "page_start": 31, - "page_end": 31, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 418, + "page_end": 418, + "source_file": "00-80T-80.pdf" } ] }, @@ -6969,70 +6969,70 @@ "target_page": 46, "target_passage": "When a property has only a few possible values it can be useful to create a class to represent those values and to explicitly define the class by listing each possible value", "chunk_present": { - "presence": true, - "index": 7 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 300, + "page_end": 300, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 381, + "page_end": 381, + "source_file": "00-80T-80.pdf" }, { - "text": "4.1 Named Classes \nThe main building blocks of an OWL ontology are classes. In Protégé 5, editing of classes can be done in \nthe Entities tab. The Entities tab has a number of sub-tabs. When you select it, the default should be the \nClass hierarchy view as shown in Figure 4.5.4 All empty ontologies contains one class called owl:Thing. \nOWL classes are sets of individuals. The class owl:Thing is the class that represents the set containing \nall individuals. Because of this all classes are subclasses of owl:Thing. ", - "page_start": 14, - "page_end": 14, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 379, + "page_end": 379, + "source_file": "00-80T-80.pdf" }, { - "text": "Ontologies are used to capture knowledge about some domain of interest. An ontology describes the \nconcepts in the domain and also the relationships that hold between those concepts. Different ontology \nlanguages provide different facilities. The most recent development in standard ontology languages is \nOWL from the World Wide Web Consortium (W3C). A good primer on the basic concepts of OWL can \nbe found at: https://www.w3.org/TR/owl2-primer/ \n\nOWL makes it possible to describe concepts in an unambiguous manner based on set theory and logic. \nComplex concepts can be built up out of simpler concepts. The logical model allows the use of a reasoner \nwhich can check whether all of the statements and definitions in the ontology are mutually consistent and \ncan also recognize which concepts fit under which definitions. The reasoner can therefore help to \nmaintain the hierarchy correctly. This is particularly useful when dealing with cases where classes can \nhave more than one parent. The reasoner can also infer additional information. For example, if two \nproperties are inverses only one value needs to be asserted by the user and the inverse value will be \nautomatically inferred by the reasoner. \n\n3.1 Components of OWL Ontologies \nAn OWL ontology consists of Classes, Properties, and Individuals. OWL ontologies are an \nimplementation of Description Logic (DL) which is a decidable subset of First Order Logic. A class in \nOWL is a set, a property is a binary relation, and an individual is an element of a set. Other concepts from \nset theory are also implemented in OWL such as Disjoint sets, the Empty set (owl:Nothing), inverse ", - "page_start": 7, - "page_end": 7, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 379, + "page_end": 379, + "source_file": "00-80T-80.pdf" }, { - "text": "The restrictions for a class are displayed and edited using the Class Description View shown in Figure \n4.17. The Class Description View holds most of the information used to describe a class. The Class \nDescription View is a powerful way of describing and defining classes. It is one of the most important \ndifferences between describing classes in OWL and in other models such as most object-oriented \nprogramming languages. In other models there is no formal definition that describes why one class is a \nsubclass of another, in OWL there is. Indeed, the OWL classifier can actually redefine the class hierarchy \nbased on the logical restrictions defined by the user. We will see an example of this later in the tutorial. \n\nRestrictions are also called axioms in OWL. This has the same meaning as in logic. An axiom is a \nlogical formula defined by the user rather than deduced by the reasoner. As described above, \nin Protégé all axioms are shown in normal font whereas all inferences inferred by the reasoner \nare highlighted in yellow. ", - "page_start": 32, - "page_end": 32, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 379, + "page_end": 379, + "source_file": "00-80T-80.pdf" }, { - "text": "next section. Which option you choose for your ontology will depend on the specific requirements you \nhave as well as the standards established by your organization or organizations that you work with. \n\nFinally, another name related concept you should be aware of is the concept of a namespace. If you have \nworked with most modern programming languages such as Python or Java, you are already familiar with \nthe concept of a namespace. The concept is identical in OWL. A namespace is used to avoid naming \nconflicts between different ontologies. For example, you may have a class called Network in an ontology \nabout telecommunications. You might also have a class called Network in an ontology about graph \ntheory. The two concepts are related but are different. Just as with programming languages you use \nnamespace prefixes to determine what specific namespace a name refers to. E.g., in this example you \nmight have the prefix tc for the Telecom ontology and gt for the Graph Theory ontology. Thus, when \nyou referred to the Network class for the Telecom ontology you would use tc:Network and \ngt:Network for the graph theory class. \n\nNote that you already have some experience with other namespaces. The OWL namespace prefix is owl \nand is used to refer to classes such as owl:Thing and owl:Nothing. The Resource Description \nFramework Schema (RDFS) is a model that OWL is built on top of and thus some properties that \nontologies use such as rdfs:label leverage this namespace. ", - "page_start": 62, - "page_end": 62, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 379, + "page_end": 379, + "source_file": "00-80T-80.pdf" }, { - "text": "4.10.1 Property restrictions \nIn OWL properties define binary relations with the same semantics and characteristics as binary relations \nin First Order Logic. There are two types of OWL properties for describing a domain: Object properties \nand Data properties. Object properties have classes as their domain and range. Data properties have \nclasses as their domain and simple datatypes such as xsd:string or xsd:dateTime as their range. In \nfigure 3.3 the individual Michael is related to the individual USA by the property livesIn. Consider all \nthe individuals who are an instance of Person and also have the same relation, that each livesIn the \nUSA. This group is a set or OWL class such as USAResidents. In OWL a class can be defined by \ndescribing the various properties and values that hold for all individuals in the class. Such definitions are \ncalled*restrictions*in OWL. ", - "page_start": 30, - "page_end": 30, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 378, + "page_end": 378, + "source_file": "00-80T-80.pdf" }, { - "text": "Figure 4.23 The Reasoner Inferred that Margherita and Soho Pizzas are subclasses of VegetarianPizza \n\n4.14 Defining an Enumerated Class \nA powerful tool in the object-oriented programming (OOP) community is the concept of design patterns. \nThe idea of a design pattern is to capture a reusable model that is at a higher level of abstraction than a \nspecific code library. One of the first and most common design patterns was the Model-View-Controller \npattern first used in Smalltalk and now almost the default standard for good user interface design. Since \nthere are significant differences between OWL and standard OOP the many excellent books on OOP \ndesign patterns don’t directly translate into OWL design patterns. Also, since the use of OWL is more \nrecent than OOP there does not yet exist the excellent documentation of OWL patterns that the OOP \ncommunity has. However, there are already many design patterns that have been documented for OWL \nand that can provide users with ways to save time and to standardize their designs according to best \npractices. \n\nOne of the most common OWL design patterns is an enumerated class. When a property has only a few \npossible values it can be useful to create a class to represent those values and to explicitly define the class \nby listing each possible value. We will show an example of such an enumerated class by creating a new ", - "page_start": 45, - "page_end": 45, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 378, + "page_end": 378, + "source_file": "00-80T-80.pdf" }, { - "text": "This introduces Protégé 5 for creating OWL ontologies as well as various plugins. If you have questions \nspecific to this tutorial, please feel free to email me directly: mdebellissf@gmail.com However, if you \nhave general questions about Protégé, OWL, or plugins you should subscribe to and send an email to the \nUser Support for Protégé and Web Protégé email list. This list has many people (including me) who \nmonitor it and can contribute their knowledge to help you understand how to get the most out of this \ntechnology. To subscribe to the list, go to: https://protege.stanford.edu/support.php and click on the first \norange Subscribe button. That will enable you to subscribe to the list and give you the email to send \nquestions to. \n\nThis chapter covers licensing and describes conventions used in the tutorial. Chapter 2 covers the \nrequirements for the tutorial and describes the Protégé user interface. Chapter 3 gives a brief overview of \nthe OWL ontology language. Chapter 4 focuses on building an OWL ontology with classes and object \nproperties. Chapter 4 also describes using a Description Logic Reasoner to check the consistency of the \nontology and automatically compute the ontology class hierarchy. ", - "page_start": 5, - "page_end": 5, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 378, + "page_end": 378, + "source_file": "00-80T-80.pdf" }, { - "text": "To understand what is going on you first need to understand that each SPARQL query consists of two \nparts. The first part at the beginning consists of several namespace prefixes. These statements consist of \nthe prefix used for a particular namespace as well as the IRI associated with this namespace. Recall that \nthese concepts were described in chapter 7. You may be wondering where all these prefixes came from \nsince you didn’t add them to your ontology. The answer is that every OWL ontology comes with a set of \nnamespaces and prefixes that are required to define the ontology. \n\nAlso, to understand SPARQL you need to “peak under the hood” of OWL. So far, we have been \ndiscussing concepts in purely logical and set theoretic terms, i.e., at the semantic level. However, like any \nlanguage or database there is a lower level that describes how the concepts are mapped to actual data. In a \nrelational database the fundamental construct to represent data is a table. In OWL the fundamental \nconstruct is a triple. OWL is actually built on top of RDFS which is a language built on top of RDF. RDF \n(Resource Description Framework) is a language to describe graphs (in the mathematical sense of the \nterm). I.e., to describe nodes and links. ", - "page_start": 69, - "page_end": 69, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 378, + "page_end": 378, + "source_file": "00-80T-80.pdf" } ] }, @@ -7049,64 +7049,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 159, + "page_end": 159, + "source_file": "sg246915.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 260, + "page_end": 260, + "source_file": "00-80T-80.pdf" }, { - "text": "**15.4.1 Base configuration in Content Manager OnDemand**\n\nTo enable FTS in Content Manager OnDemand, FTS must be enabled for each of your \nContent Manager OnDemand instances. In Windows, you enable FTS for each of your \nContent Manager OnDemand instances in the Content Manager OnDemand Configurator by \nselecting the**Enable Full Text Index and Search**check box on the Server (Advanced \nOptions) window. \n\nOn all other platforms, the ars.cfg file of your Content Manager OnDemand instance must be \nedited. You must add the following line: \n\nARS_SUPPORT_FULL_TEXT_INDEX=1 ", - "page_start": 366, - "page_end": 366, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 259, + "page_end": 259, + "source_file": "00-80T-80.pdf" }, { - "text": "The FTS Exporter communicates with the Content Manager OnDemand server to retrieve the \ndocuments that are sent to the FTS Server. It uses a JDBC connection to the Content \nManager OnDemand database to read the arsftiwork table. \n\nThe FTS Exporter can be run on the Content Manager OnDemand server system or from any \nother system that is connected by TCP/IP. The FTS Exporter does not require the existence \nof the Content Manager OnDemand database on the same system. The FTS Exporter \nobtains the instance configuration from the Content Manager OnDemand server. \n\nFor more information, see 15.4.2, “Configuration of the Full Text Search Exporter” on \npage 344. \n\n**Note:**Ensure that you apply the latest Content Manager OnDemand version and fix pack \nto the Content Manager OnDemand server and the FTS Server component before you use \nFTS. ", - "page_start": 363, - "page_end": 363, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 259, + "page_end": 259, + "source_file": "00-80T-80.pdf" }, { - "text": "If you change the**SRVR_FLAGS_SECURITY_EXIT**value, review the Content Manager \nOnDemand System Parameters values (defined by the Content Manager OnDemand \nAdministrator Client) for the instance that you changed. For more information, see \n“OnDemand userid relationship to IBM i user profiles” in the*IBM Content Manager*\n*OnDemand for i - Common Server Administration Guide*, SC19-2792. ", - "page_start": 56, - "page_end": 56, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 259, + "page_end": 259, + "source_file": "00-80T-80.pdf" }, { - "text": "**6.8 Summary**\n\nContent Manager OnDemand provides a secure environment. Security features within \nContent Manager OnDemand allow access control to the data and the APIs that access the \ndata. The data itself is controlled at rest and in motion (SSL). Additional exits that are external \nto Content Manager OnDemand can be created that allow the creation of customized \nextensions to the Content Manager OnDemand internal security. ", - "page_start": 181, - "page_end": 181, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 259, + "page_end": 259, + "source_file": "00-80T-80.pdf" }, { - "text": "If you want to configure Content Manager OnDemand so that DSM is not required in the \nfuture, see the section “Eliminating the need to run Disk Storage Manager (DSM)” in the latest \n*Content Manager OnDemand for i Common Server Administration Guide*, SC19-2792. ", - "page_start": 263, - "page_end": 263, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 259, + "page_end": 259, + "source_file": "00-80T-80.pdf" }, { - "text": "**5.2.3 Content Manager OnDemand storage management**\n\nThe storage management criteria that you specify for the Content Manager OnDemand \nlibrary server determines where and when Content Manager OnDemand stores reports and \nhow those reports are maintained. \n\nFigure 5-4 illustrates Content Manager OnDemand storage object relationships. When a \nreport is loaded into Content Manager OnDemand, it is assigned to an application group. The \napplication group is associated with a storage set. The storage set contains one or more \nstorage nodes that can be used by several application groups that have the same archive \nstorage requirements. ", - "page_start": 119, - "page_end": 119, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 259, + "page_end": 259, + "source_file": "00-80T-80.pdf" }, { - "text": "OnDemand \nLibrary Server Full Text Search \nServer \n\n*Figure 1-1 Content Manager OnDemand system overview*\n\nContent Manager OnDemand Client programs provide authorized users with high-speed \naccess to the archived data that runs on the user devices (workstations) that are attached to \nthe network and communicate with the Content Manager OnDemand servers. \n\nA Content Manager OnDemand server consists of multiple components that can be installed \non a single system or multiple systems. In all cases, the installation appears to the users as a \nsingle server. The installation and is administered by the Content Manager OnDemand \nadministrator as a single system. \n\nThe Content Manager OnDemand server includes the following components: \n\n(cid:2) A single library server: The library server manages a database that contains the \n\ninformation about the users of the system, and the reports and data that are stored on the \nsystem. \n\n(cid:2) One or more object servers: The object servers manage the data on disk or tape storage \ndevices. \n\n(cid:2) One or more archive servers: The archive server stores the archived data objects. \n\nDepending on the operating system, the archive servers might be IBM Tivoli® Storage \nManager, object access method (OAM), or Archive Storage Manager (ASM). ", - "page_start": 29, - "page_end": 29, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 259, + "page_end": 259, + "source_file": "00-80T-80.pdf" }, { - "text": "(cid:2) Builds the Content Manager OnDemand system tables and indexes. \n(cid:2) Binds the database to Content Manager OnDemand. \n\nSign on to the user account that you assigned as the owner of the Content Manager \nOnDemand instance (in the ARS.INI file). Run**arsdb**with the following options: \n\n/opt/IBM/ondemand/V9.5/bin/arsdb -I ondmd950 -cv \n\nIn our scenario, -I ondmd950 is the Content Manager OnDemand instance. \n\nAfter this command completes, you can log in to DB2 and connect to the new instance. List all \nof the tables by running the following command: \n\ndb2 list tables for all \n\n**Initializing the system log and system load facility**\nAfter you create the database, you can initialize the system log by running the following \ncommand: \n\n/opt/IBM/ondemand/V9.5/bin/arssyscr -I ondmd950 -l \n\n-I ondmd950 is the new Content Manager OnDemand instance. \n\nContent Manager OnDemand can track loading activity with the system load logging facility. \nContent Manager OnDemand stores these load messages in the system load log. You can \ninitialize the system load log by running the following command: \n\n/opt/IBM/ondemand/V9.5/bin/arssyscr -I ondmd950 -a ", - "page_start": 52, - "page_end": 52, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 259, + "page_end": 259, + "source_file": "00-80T-80.pdf" } ] }, @@ -7123,64 +7123,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 285, + "page_end": 285, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 361, + "page_end": 361, + "source_file": "00-80T-80.pdf" }, { - "text": "**15.4.1 Base configuration in Content Manager OnDemand**\n\nTo enable FTS in Content Manager OnDemand, FTS must be enabled for each of your \nContent Manager OnDemand instances. In Windows, you enable FTS for each of your \nContent Manager OnDemand instances in the Content Manager OnDemand Configurator by \nselecting the**Enable Full Text Index and Search**check box on the Server (Advanced \nOptions) window. \n\nOn all other platforms, the ars.cfg file of your Content Manager OnDemand instance must be \nedited. You must add the following line: \n\nARS_SUPPORT_FULL_TEXT_INDEX=1 ", - "page_start": 366, - "page_end": 366, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 361, + "page_end": 361, + "source_file": "00-80T-80.pdf" }, { - "text": "**6.8 Summary**\n\nContent Manager OnDemand provides a secure environment. Security features within \nContent Manager OnDemand allow access control to the data and the APIs that access the \ndata. The data itself is controlled at rest and in motion (SSL). Additional exits that are external \nto Content Manager OnDemand can be created that allow the creation of customized \nextensions to the Content Manager OnDemand internal security. ", - "page_start": 181, - "page_end": 181, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "In XML, the definition and syntax of the markup language are defined in a*schema file*. For the \nContent Manager OnDemand XML batch program, the schema file is called ondemand.xsd. It \ncontains the definitions for the Content Manager OnDemand objects: users, groups, \napplications, application groups, storage sets, folders, printers, and others. Each Content \nManager OnDemand object definition contains one or more child objects. For example, a user \nobject has a child object for permissions, and a group object has a child object for users in the \ngroup. The schema file (ondemand.xsd) must not be changed in any way by the user. \n\nThe*input XML file*for the XML batch program is parsed to ensure that it is valid according to \nthe schema file. Each object within the file is examined to ensure that the attributes are valid \naccording to the object type. The XML batch program generates XML when Content Manager \nOnDemand objects are exported. The XML that is generated can be used as an input for the \nsubsequent**arsxml**command. \n\nExample 3-1 shows a sample of the file exportusers.xml from the XML samples directory. \nYou can change the names of the users to the users that you want to export. ", - "page_start": 97, - "page_end": 97, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 361, + "page_end": 361, + "source_file": "00-80T-80.pdf" }, { - "text": "**Preface**\n\nThis IBM® Redbooks® publication provides a practical guide to the design, installation, \nconfiguration, and maintenance of IBM Content Manager OnDemand Version 9.5. \n\nContent Manager OnDemand manages the high-volume storage and retrieval of electronic \nstatements and provides efficient enterprise report management. Content Manager \nOnDemand transforms formatted computer output and printed reports, such as statements \nand invoices, into electronic information for easy report management. Content Manager \nOnDemand helps eliminate costly, high-volume print output by capturing, indexing, archiving, \nand presenting electronic information for improved customer service. \n\nThis publication covers the key areas of Content Manager OnDemand, some of which might \nnot be known to the Content Manager OnDemand community or are misunderstood. The \nbook covers various topics, including basic information in administration, database structure, \nstorage management, and security. In addition, the book covers data indexing, loading, \nconversion, and expiration. Other topics include user exits, performance, retention \nmanagement, records management, and many more. \n\nBecause many other resources are available that address subjects on different platforms, this \npublication is not intended as a comprehensive guide for Content Manager OnDemand. \nRather, it is intended to complement the existing Content Manager OnDemand \ndocumentation and provide insight into the issues that might be encountered in the setup and \nuse of Content Manager OnDemand. This book is intended for individuals who need to \ndesign, install, configure, and maintain Content Manager OnDemand. ", - "page_start": 17, - "page_end": 17, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 6, + "page_end": 6, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "The FTS feature supports full text indexing of both new and existing data. For new data, the \nFTS Server is configured to index the newly loaded reports by using the Administrator Client. \nFor existing data, indexing is invoked by using the Content Manager OnDemand \ncommand-line utilities or the Content Manager OnDemand Web Enablement Kit (ODWEK) \nJava application programming interface (API). \n\nFTS is enabled through the Content Manager OnDemand folder and allows all clients to take \nadvantage of full text queries after the server configuration is complete. Several new Content \nManager OnDemand folder field types are defined in support of FTS. Search score, highlight, \nand summary are returned, aiding the user in determining whether the document is a good \nmatch. \n\n**Note:**Before the release of the FTS option in Content Manager OnDemand, a document \ncontent-based search was possible by using the server-based text search functionality. \nHowever, this functionality is limited to AFP, Line, SCS, and PDF documents. It does not \nuse an index, but instead the server retrieves the documents and then scans those \ndocuments for the index values. This method limits the capabilities of the functions to exact \nmatches of a query string and might cause workload problems on the Content Manager \nOnDemand server. FTS eliminates these issues and limitations by introducing new \nprocessing components. ", - "page_start": 360, - "page_end": 360, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "**3.1 Report administration**\n\nReport design and definition are key to a successful implementation of a Content Manager \nOnDemand system. Knowledge of the data that will be indexed, loaded, and retrieved, with \nknowledge of Content Manager OnDemand preferred practices, results in the most efficient \nand easy-to-use system possible. In this section, we consider the processes that are followed \nwhen you define a Content Manager OnDemand report. We present hints and tips to help in \nthe design and implementation process. \n\nThe system components that are required for creating, retrieving, and viewing a Content \nManager OnDemand report are a storage set, an application group, an application, and a \nfolder. Optionally, cabinets might be used to organize and simplify folder access. These \nelements, in combination, allow the Content Manager OnDemand administrator to define and \ncreate a report definition that can then be used to index and load data into Content Manager \nOnDemand. Figure 3-1 illustrates the relationship of these elements in a typical Content \nManager OnDemand system. ", - "page_start": 70, - "page_end": 70, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "**18.2 Information collection**\n\nIf the guidance in 18.1, “Troubleshooting common problems” on page 378 does not help you \ndetermine and resolve your problem, speak to IBM Support. In this section, we explain the \ninformation to gather for IBM Support so that they can help you more efficiently. \n\nWhen you report a problem to IBM Support, you must provide the version of the software that \nyou are using. For Content Manager OnDemand, this version might include the numbers of \nthe operating system, DB2, Oracle, IBM Tivoli Storage Manager, Content Manager \nOnDemand, and ODWEK. This information helps IBM Support determine whether the \nsoftware version is still supported and whether known issues exist with that software version. \n\nWe also advise that you apply the latest maintenance level to Content Manager OnDemand \nbefore you contact IBM Support to ensure that you are not experiencing a problem that is \nresolved. \n\nTable 18-2 shows commands that are used to determine the version of Content Manager \nOnDemand on various operating systems. \n\n*Table 18-2 Determine the version of Content Manager OnDemand*\n\n| Operating system | Example of the command to determine the version |\n|---|---|\n| Operating system | Example of the command to determine the version |\n| IBM AIX | lslpp -l | grep ars (OnDemand server and ODWEK) |\n| Sun Solaris | pkginfo -l ondemand |\n| HP-UX | swlist -l product | grep (OnDemand server and ODWEK) |\n| Linux | Look for the highest version for the package name in the list: rpm –qa | grep ondemand (Take highest version that is listed.) |\n| Windows | From the Content Manager OnDemand configurator, click Help → About. |\n| Windows client | From the Windows client, click Help → About OnDemand. |\n| ODWEK | Check the logon message. |\n| Content Manager OnDemand commands | Starting in Content Manager OnDemand 8.5, the response to all Content Manager OnDemand commands includes the release and fix pack level. |\n", - "page_start": 413, - "page_end": 413, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "**Chapter 1. Overview and concepts**\n\nIn this chapter, we provide an overview of the IBM Content Manager OnDemand (Content \nManager OnDemand) system. We describe how Content Manager OnDemand manages \nreports and index data. We also provide information to help you better understand how \nContent Manager OnDemand works. \n\nIn this chapter, we cover the following topics: \n\n(cid:2) Overview of Content Manager OnDemand \n(cid:2) Content Manager OnDemand concepts \n(cid:2) Content Manager OnDemand server and its components ", - "page_start": 27, - "page_end": 27, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_SMFG_2011.pdf" } ] }, @@ -7191,70 +7191,70 @@ "target_page": 232, "target_passage": "If a requirement exists to present AFP documents in the Portable Document Format (PDF) format over the web, from a storage perspective, it is more efficient to store the documents in their native format and then convert them to PDF at retrieval tim", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 53, + "page_end": 53, + "source_file": "basic-english-language-skills.PDF" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "**9.1.2 When to convert data streams**\n\nThe decision of*when*to convert data streams relies mainly on the use of the system. \nTypically, converting data at load time requires more time to process the print stream file, and \nconverting data at retrieval time causes the user retrieval to be a little slower. The decision \nmight depend on how many documents are retrieved, compared to how many documents are \nloaded daily. It might also depend on legal requirements about the format of stored data. \n\n**AFP to PDF**\nIf a requirement exists to present AFP documents in the Portable Document Format (PDF) \nformat over the web, from a storage perspective, it is more efficient to store the documents in \ntheir native format and then convert them to PDF at retrieval time. AFP documents are stored \nmore efficiently than PDF documents. \n\nThe PDF print stream, when it is divided into separate customer statements, is larger than \nAFP because each statement contains its own set of structures that are required by the PDF \narchitecture to define a document. \n\nElapsed time and processor time are also essential factors in the decision-making process. \nThe amount of time (elapsed and CPU) that is needed to convert the document depends on \nhow large the document is and how many resources or fonts are associated with the \ndocument. ", - "page_start": 232, - "page_end": 232, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 381, + "page_end": 381, + "source_file": "00-80T-80.pdf" }, { - "text": "**7.2 Getting started with PDF indexing**\n\nPDF is a standard that is specified by Adobe Systems, Incorporated, for the electronic \ndistribution of documents. PDF files are compact. They can be distributed globally through \nemail, the web, intranets, or CD-ROM, and viewed with Adobe Reader. \n\nPDF is a data type or file format that is platform (hardware, operating system)-independent. A \nPDF file contains a complete PDF document that is composed of text, graphics, and the \nresources that are referenced by that document. \n\nTwo PDF file layouts are possible: \n\n(cid:2) Non-Linear (not “optimized”) \n\nThis file layout is optimized for space savings. Storing a PDF file by using a Non-Linear \nlayout consumes less disk space than storing the same PDF file linearly. It is slower to \naccess or display this type of layout because portions of the data that is required to \nassemble pages of the document are scattered throughout the PDF file, so the whole PDF \nfile must be downloaded and accessed before the file can be displayed. \n\n(cid:2) Linear (“optimized” or “web optimized”) \n\nIn this file format, the PDF file is created in a linear (in page order) fashion. This file format \nallows the PDF viewer to start displaying the PDF document pages when they are \ndownloading without waiting for the whole PDF file to be downloaded. ", - "page_start": 189, - "page_end": 189, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 381, + "page_end": 381, + "source_file": "00-80T-80.pdf" }, { - "text": "(cid:2) Content Manager OnDemand tunable components \n\n(cid:2) Storage management tunable components: UNIX System Services, z/OS file system \n(zFS), hierarchical file system (HFS), OAM, Tivoli Storage Manager, and ASM \n\n(cid:2) Data components: \n\n– Report file size, document file size (or in the case of large objects, report segment \nsize), and number of documents per report. \n\n– Number and distribution of triggers, fields, and indexes per document. \n\n– Data type and required data conversion (if any). \n\n– Resource collection for AFP and Portable Document Format (PDF). \n\n– Document compressibility, which is a function of document data complexity and data \n\ntype. Text (such as Line Data or SCS) is typically more compressible than AFP, which is \ntypically more compressible than PDF. \n\n– Storage object size (10 MB default): Contains 100 KB compressed object, which \ncontains a compressed document. \n\n– Exit routines/programs. ", - "page_start": 326, - "page_end": 326, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 381, + "page_end": 381, + "source_file": "00-80T-80.pdf" }, { - "text": "The path to see the fonts might differ, depending on your viewer version. \n\n**7.3.2 Reducing output file size with PDF documents**\n\nWhen you index PDF data, you might be surprised by the size of the output file that the PDF \nIndexer creates after it indexes the data. In certain cases, the PDF file that is loaded into \nContent Manager OnDemand is many times larger than the source PDF file. \n\nWhen the input file is indexed, it is split into multiple PDF documents. Each PDF document \ncontains its own set of PDF structures that are required by the PDF architecture. For this \nreason, the multiple PDF documents that are created by the indexing can be larger in total \nthan the original PDF document. \n\nOne way to reduce the size of the output file is using the base 14 fonts. ", - "page_start": 191, - "page_end": 191, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 381, + "page_end": 381, + "source_file": "00-80T-80.pdf" }, { - "text": "**13.4.1 PDF data**\n\nPortable Document Format (PDF) data is an increasingly common data type that can be \narchived within Content Manager OnDemand. The following key advantages are available by \nusing this data type as a document format: \n\n(cid:2) It is a read-only format that does not require any external resources, such as images or \nfonts. It is self-contained. \n\n(cid:2) The viewer for PDF can be downloaded at no charge from the Adobe website and the \nbrowser plug-ins for PDF are also available at no charge. \n\nDuring PDF document creation, resources, such as images and custom fonts, are placed in \nthe data stream once and then referenced many times from within the PDF file. If a large \nreport is produced from many small documents, that report requires only one copy of the \nresources. \n\nHowever, when the PDF is indexed, the PDF Indexer creates many PDF documents from the \ninput file. Each of these documents requires a certain number of PDF structures, which define \na document. These documents are concatenated together in the .out file, and then loaded \ninto Content Manager OnDemand as separate documents. Because the resources are \nextracted and placed into a separate resource file, they are not included in each document. \nFor an illustration of the process, see Figure 13-3. ", - "page_start": 332, - "page_end": 332, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 381, + "page_end": 381, + "source_file": "00-80T-80.pdf" }, { - "text": "| Document\nResources\nConverted to\nOne PDF file\nwith\ndocuments\nand resources\nMany\nseparate PDF\ndocuments\nwith resources\nremoved in\nthe .out file | | |\n|---|---|---|\n| Document Resources Converted to One PDF file with documents and resources Many separate PDF documents with resources removed in the .out file | | |\n| | | |\n| Figure 13-3 PDF indexing | | |\n\n\nIf no resources are collected, the size of the .out file, which contains all of the individual \ndocuments, might be larger than the original file. For tips about how to reduce the size of the \noutput file, see 7.3.5, “PDF indexing: Using internal indexes (Page Piece Dictionary)” on \npage 173. ", - "page_start": 332, - "page_end": 332, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 244, + "page_end": 244, + "source_file": "00-80T-80.pdf" }, { - "text": "**10.5.3 Removing documents from the Tivoli Storage Manager archive**\n\nRemoving a document from archive storage means that the backup (if the primary document \ncopy is in cache) or long-term copy (if the primary document copy is in archive) of the \ndocument is deleted from the system. You remove documents from archive storage when you \nno longer have a business or legal requirement to keep them. \n\nA*management class*contains an archive copy group that specifies the criteria that makes a \ndocument eligible for deletion. Documents become eligible for deletion under the following \nconditions: \n\n(cid:2) Administrators delete documents from client nodes \n(cid:2) An archived document exceeds the time criteria in the archive copy group (how long \narchived copies are kept) \n\nASM does not delete information about expired documents from its database until expiration \nprocessing runs. You can run expiration processing either automatically or manually by \ncommand. Ensure that expiration processing runs periodically to allow ASM to reuse storage \npool space that is occupied by expired documents. \n\nWhen expiration processing runs, ASM deletes documents from its database. The storage \nspace that these documents used to occupy then becomes reclaimable. For more \ninformation, see “Reclaiming space in storage pools” on page 233. ", - "page_start": 256, - "page_end": 256, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 381, + "page_end": 381, + "source_file": "00-80T-80.pdf" }, { - "text": "(cid:2) Document: With this expiration type, a document at a time is deleted from the application \ngroup. Data that is stored in archive storage is deleted by the storage manager based on \nthe archive expiration date. Storing documents with an expiration type of Document \ncauses the expiration process to search through every document in the segment to \ndetermine whether the expiration date was reached, which results in long processing \ntimes. \n\nWhen the**arsmaint**expiration process is run, data is deleted only from the application group if \nthe upper threshold for the size of the cache storage is reached. By default, the cache \nthreshold is 80%. A lower threshold can be forced by the expiration command parameters. \nUnless a reason exists to clear cache, leaving data in cache improves retrieval performance. \n\n**5.2.6 Advanced application group storage management**\n\nBy using the advanced storage management settings (Figure 5-11), you can adjust the size of \nthe load object and determine when report data, indexes, and resources are migrated to \narchive storage. ", - "page_start": 127, - "page_end": 127, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_HIG_2001.pdf" } ] }, @@ -7265,70 +7265,70 @@ "target_page": 3, "target_passage": "A Tax Information and Impact Note covering the International Tax Compliance Regulations 2015 was published on 18th March 2015 and is available on the HMRC website at https://www.gov.uk/government/publications/tax-administration-regulations-to-implement-the- uks-automatic-exchange-of-information-agreements", "chunk_present": { - "presence": true, - "index": 3 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 160, + "page_end": 160, + "source_file": "sg246915.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 338, + "page_end": 338, + "source_file": "00-80T-80.pdf" }, { - "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThe Regulations amend the International Tax Compliance Regulations 2015 (“the principal \nRegulations”) which give effect to agreements and arrangements reached between the United \nKingdom and other jurisdictions to improve international tax compliance. \n\nRegulation 2(2) extends the application of the principal Regulations to arrangements entered into \nby the United Kingdom for the exchange of financial account information with other jurisdictions \nup to 19th April 2020, the date before the Regulations are made. \n\nRegulation 2(5) omits various accounts from the category of excluded accounts. Regulation \n2(4)(b) amends the definitions of “new account” and “pre-existing account” in relation to those ", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20200438_en.pdf" + "text": "", + "page_start": 339, + "page_end": 339, + "source_file": "00-80T-80.pdf" }, { - "text": "accounts so that these terms are defined by reference to the date that those accounts ceased to be \nexcluded accounts. Regulation 2(3) and (4)(a) make consequential amendments. \n\nRegulation 3 makes a transitional provision for the calendar year 2020 in relation to accounts \nwhich were previously excluded accounts. \n\nA Tax Information and Impact Note covering the International Tax Compliance Regulations 2015 \nwas published on 18th March 2015 and \nthe HMRC website at \nhttps://www.gov.uk/government/publications/tax-administration-regulations-to-implement-the- \nuks-automatic-exchange-of-information-agreements. It remains an accurate summary of the \nimpacts that apply to this instrument. \n\nis available on ", - "page_start": 3, - "page_end": 3, - "source_file": "uksi_20200438_en.pdf" + "text": "", + "page_start": 340, + "page_end": 340, + "source_file": "00-80T-80.pdf" }, { - "text": "Regulations 15 to 17 amend the Special Educational Needs (Personal Budgets) Regulations 2014 \n(‘the Personal Budgets Regulations 2014’). \n\nRegulation 17 inserts a similar glossing provision into the Personal Budgets Regulations 2014 as \nregulation 5 does in respect of the SEND Regulations 2014. \n\nRegulations 18 to 27 amend the Special Educational Needs and Disability (Detained Persons) \nRegulations 2015 (‘the Detained Persons Regulations 2015’). \n\nRegulation 20 inserts a glossing provision into the Detained Persons Regulations 2015 similar to \nthe ones in regulations 5 and 17 in relation to the SEND Regulations 2014 and the Personal \nBudgets Regulations 2014 respectively. \n\nRegulations 21 to 27 make textual amendments to the Detained Persons Regulations 2015 to relax \ntime limits. \n\nRegulations 28 to 30 amend the Special Educational Needs and Disability (First-tier Tribunal \nRecommendations Power) Regulations 2017 (‘the First-tier Tribunal Regulations 2017’). \n\nRegulation 30 inserts a glossing provision into the First-tier Tribunal Regulations 2017 similar to \nthose in regulations 5, 17 and 20. ", - "page_start": 6, - "page_end": 6, - "source_file": "uksi_20200471_en.pdf" + "text": "", + "page_start": 340, + "page_end": 340, + "source_file": "00-80T-80.pdf" }, { - "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations make amendments to secondary legislation relating to special educational \nneeds and disability in order to provide exceptions to time limits set out in that legislation where \nthey cannot be met because of a reason relating to the incidence or transmission of coronavirus. \n\nRegulation 2 contains review and expiry provisions. The Secretary of State is required to review \nthe effectiveness of the Regulations during the period in which they have effect. The Regulations \ncease to have effect on 25th September 2020. \n\nRegulations 3 to 14 amend the Special Educational Needs and Disability Regulations 2014 (‘the \nSEND Regulations 2014’). \n\nRegulation 5 inserts a glossing provision into the SEND Regulations 2014 which relaxes certain \nrequirements in those Regulations for actions to be taken within specified time limits where it is \nnot reasonably practicable for a person to meet those requirements for a reason relating to the \nincidence or transmission of coronavirus. Instead, any such requirement is to be read as a \nrequirement for such action to be taken as soon as reasonably practicable. \n\nRegulations 6 to 14 make textual amendments to the SEND Regulations 2014 to relax time limits. ", - "page_start": 6, - "page_end": 6, - "source_file": "uksi_20200471_en.pdf" + "text": "", + "page_start": 340, + "page_end": 340, + "source_file": "00-80T-80.pdf" }, { - "text": "353 Ibid., p. 67. \n354 Ibid., p. 94. \n355 Graveling, 2018: Transposition, implementation and enforcement of EU OSH legislation - Thematic Discussion \nPaper \n356 EU-OSHA, 2021: Summary - Improving compliance with occupational safety and health regulations: an \noverarching review (p. 4). \n357 The authors explain the difference between ‘substantive and rule compliance as follows:*‘... “substantive*\n*compliance”, which requires compliance with the collective goals underpinning the regulatory scheme (better OSH*\n*practice); and “rule compliance”, which envisages compliance with the content of legal standards only*’ (p. 11). \n*358*EU-OSHA, 2021: Improving compliance with occupational safety and health regulations: an overarching review \n(p. 43). \n359 Fundamental Rights Agency (FRA), here, section on Trafficking and labour exploitation \n\n360 Special Eurobarometer 498: Undeclared Work in the European Union \n\n361 European Commission, Directorate-General for Employment, Social Affairs and Inclusion et al., 2018: An \nevaluation of the scale of undeclared work in the European Union and its structural determinants : estimates using \nthe labour input method, here ", - "page_start": 154, - "page_end": 154, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 340, + "page_end": 340, + "source_file": "00-80T-80.pdf" }, { - "text": "(3) In regulation 4ZA— \n\n(a) in the heading, for “the Health Protection (Coronavirus, International Travel) (England) \nRegulations 2020” substitute “the Health Protection (Coronavirus, International Travel \nand Operator Liability) (England) Regulations 2021”; \n\n(b) in paragraph (1)(a), for “regulation 3B of the Health Protection (Coronavirus, \nInternational Travel) (England) Regulations 2020 (“the 2020 Regulations”)” substitute \n“regulation 6 of the Health Protection (Coronavirus, International Travel and Operator \nLiability) (England) Regulations 2021 (“the International Travel and Operator Liability \nRegulations”)”; \n\n(c) in paragraph (1)(c), for “paragraph 7(1)(f) of Schedule 2C to the 2020 Regulations” \nsubstitute “paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator \nLiability Regulations”; \n\n(d) in paragraph (3), for “paragraph 7(1)(f) of Schedule 2C to the Health Protection \n(Coronavirus, International Travel) (England) Regulations 2020” substitute “paragraph \n7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations”. ", - "page_start": 89, - "page_end": 89, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 340, + "page_end": 340, + "source_file": "00-80T-80.pdf" }, { - "text": "service and experience in stores and online, \n\n• the effectiveness of planned advertising, marketing and promotional campaigns in the highly competitive retail industry, \n• weather conditions, natural disasters, health hazards, national security or other market disruptions, or the prospects of these events \nand the resulting impact on consumer spending patterns, \n• our compliance with applicable banking-related laws and regulations impacting our ability to extend credit to our customers, \n\nemployment laws and regulations, certain international laws and regulations, other laws and regulations applicable to us, including \nthe outcome of claims and litigation and resolution of tax matters, and ethical standards, \n• impact of the current regulatory environment and financial system and health care reforms, \n\nNordstrom, Inc. and subsidiaries 5 ", - "page_start": 17, - "page_end": 17, - "source_file": "NYSE_JWN_2014.pdf" + "text": "", + "page_start": 340, + "page_end": 340, + "source_file": "00-80T-80.pdf" }, { - "text": "Regulation 4 imposes requirements relating to the keeping of registers of marriage services \nprovided under regulation 2. \n\nA full impact assessment has not been produced for this instrument because no, or no significant, \nimpact on the private, public or voluntary sector is foreseen. ", - "page_start": 3, - "page_end": 3, - "source_file": "uksi_20210538_en.pdf" + "text": "", + "page_start": 340, + "page_end": 340, + "source_file": "00-80T-80.pdf" } ] }, @@ -7339,70 +7339,70 @@ "target_page": 7, "target_passage": "Knee flexors 3,060 ", "chunk_present": { - "presence": true, - "index": 4 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 45, + "page_end": 45, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 240, + "page_end": 240, + "source_file": "00-80T-80.pdf" }, { - "text": "This study compared the muscle and tendon morphology of an extraordinarily strong individual, a World’s Strongest Man and deadlift \nchampion (WSM), with that of various other athletic, trained, and untrained populations. The WSM completed the following: 1) 3.0-T \nMRI scans, to determine the volume of 22 individual lower limb muscles, 5 functional muscle groups, patellar tendon (PT) cross-sec- \ntional area (CSA), and PT moment arm; and 2) countermovement jumps (CMJ) and isometric midthigh pull (IMTP) contractions. The \nWSM was compared with previously assessed groups from our laboratory (muscle and tendon) and the wider research literature \n(CMJ and IMTP). The WSM’s CMJ peak power (9,866 W) and gross (9,171 N) and net (7,480 N) IMTP peak forces were higher than \nany previously published values. The WSM’s overall measured leg muscle volume was approximately twice that of untrained controls \n( þ 96%) but with pronounced anatomical variability in the extent of muscular development. The plantar flexor group ( þ 120%) and the \nguy rope muscles (sartorius, gracilis, and semitendinosus: þ 140% to þ 202%), which stabilize the pelvis and femur, demonstrated the \nlargest differences relative to that of untrained controls. The WSM’s pronounced quadriceps size (greater than or equal to twofold vs. \nuntrained) was accompanied by modest PT moment arm differences and, notably, was not matched by an equivalent difference in PT \nCSA ( þ 30%). These results provide novel insight into the musculotendinous characteristics of an extraordinarily strong individual, \nwhich may be toward the upper limit of human variation, such that the WSM’s very pronounced lower limb muscularity also exhibited \ndistinct anatomical variability and with muscle size largely uncoupled from tendon size. ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed12.pdf" + "text": "", + "page_start": 236, + "page_end": 236, + "source_file": "00-80T-80.pdf" }, { - "text": "In this paper, we present the findings from a unique op- \nportunity to examine the laboratory function, muscle size, \nand distribution of muscle mass, as well as patellar tendon \nsize and moment arm, of a World’s Strongest Man and dead- \nlift champion (WSM) in comparison with existing data on \nuntrained individuals, power athletes (100-m-track sprint- \ners), and long-term resistance-trained populations that we \nhave assessed previously (10, 11, 13–15). \n\nMRI Measurement of Muscle Tendon Unit Morphology \nand Moment Arm \nMATERIALS AND METHODS \n\nParticipant \n\nThe WSM’s achievements included one World’s Strongest \nMan title (14 mo prior to measurement), five Britain’s \nStrongest Man titles (the most recent 6 mo prior to measure- \nment), twice being World Deadlift Champion and Deadlift \nWorld Record holder (500 kg; at the time of measurement), \nand second place at Europe’s Strongest Man. Prior to agreeing \nto participate, the purpose of the research study and the test- \ning procedures were explained to the participant along with \nthe risks and benefits of taking part. The participant gave his \nwritten informed consent to participate in the study that was \napproved by the Loughborough University Ethical Advisory \nCommittee (Ethics Number R18-P090). Included in the writ- \nten consent was a statement providing permission for publi- \ncation of the collected data and the likelihood that their \nidentity may be evident based on their achievements and \ncharacteristics, despite anonymization. ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed12.pdf" + "text": "", + "page_start": 408, + "page_end": 408, + "source_file": "00-80T-80.pdf" }, { - "text": "All muscles \n\nPlantar flexors \nKnee flexors \nHip extensors \nKnee extensors \nHip flexors \nIsometric Midthigh Pull and Countermovement Jump \n\nGross (including body weight) and net (above body \nweight) IMTP peak forces of the WSM were 9,171 N and 7,480 \nN, respectively. The WSM’s gross IMTP peak force was 54% \ngreater than the highest comparable group mean we located \n(subelite weightlifters: 5,942 ± 844 N (20); Fig. 2A). The \nWSM’s net IMTP peak force was 100% greater than the high- \nest comparable group mean value in the literature (collegiate \nsoccer athletes: 3,740 ± 692 N (26); Fig. 2B). \n\nSartorius \nSemitendinosus \nGracilis \nSoleus \nVastus medialis \nAdductor Magnus \nGluteus maximus \nBiceps femoris long head \nMedial gastrocnemius \nVastus lateralis \nGluteus medius and minimus \nLateral gastrocnemius \nVastus intermedius \nTensor fasciae latae \nLateral compartment \nAnterior compartment \nSemimembranosus \nRectus femoris \nPopliteus \nIliopsoas \nPosterior compartment \nBiceps femoris short head ", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed12.pdf" + "text": "", + "page_start": 236, + "page_end": 236, + "source_file": "00-80T-80.pdf" }, { - "text": "NEW & NOTEWORTHY Lower-body muscle size of an extraordinarily strong individual, a World’s Strongest Man and deadlift \nchampion (WSM), was approximately twice that of controls but was underpinned by pronounced anatomical variability in the \nextent of muscular development ( þ 23–202%): the plantar flexor group and guy rope muscles demonstrating the largest differen- \nces. The WSM’s quadriceps size (more than or equal to twice that of controls) contrasted with modest differences in patella ten- \ndon moment arm ( þ 18%) and was uncoupled from patellar tendon size ( þ 30%). \n\nisometric force; magnetic resonance imaging; power; strength ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed12.pdf" + "text": "", + "page_start": 236, + "page_end": 236, + "source_file": "00-80T-80.pdf" }, { - "text": "and net) and CMJ power values previously reported by 54%, \n100%, and 164%, respectively. The WSM had overall lower- \nbody muscularity approximately twice that of untrained con- \ntrols ( þ 96%) and 32% greater than that of elite 100-m sprint- \ners. However, there was substantial anatomical variability in \nthe magnitude of the differences, ranging from the plantar \nflexors ( þ 120% vs. untrained) to the hip flexors ( þ 65% vs. \nuntrained). Similarly, some specific muscles, such as the guy \nrope muscles that stabilize the femur and pelvis, were 2.5–3.0 \ntimes the volume of untrained individuals (gracilis þ 140%, \nsemitendinosus þ 157%, and sartorius þ 202%) but others dis- \nplayed more marginal differences (BFsh þ 23%, iliopsoas \nþ 32% vs. untrained). Considering the knee extensors, the \nWSM had both quadriceps femoris volume greater than or \nequal to twofold that of untrained controls and a greater pa- \ntella tendon moment arm than we have previously measured \n( þ 18% vs. untrained), which would be expected to combine \nto facilitate extraordinary strength. Furthermore, despite the \nWSM’s extremely large quadriceps femoris, their patellar ten- \ndon CSA was only 30% greater than that of untrained controls \nand not outside the range of tendons we have previously \nassessed. The results of this study provide novel insights into \nthe muscle and tendon characteristics, as well as the strength \nand power capabilities, of an extraordinarily strong individual \nthat may be toward the upper limit of human variation in \nthese characteristics. ", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed12.pdf" + "text": "", + "page_start": 408, + "page_end": 408, + "source_file": "00-80T-80.pdf" }, { - "text": "supplement consumption included protein, branched-chain \namino acids, and electrolytes. \n\npredictions of skeletal muscle mass nor dual-energy X-ray \nabsorptiometry provides detailed information on the size of \nspecific individual muscles. Given the known importance of \nmuscle size as a determinant of muscular strength (9–11), pro- \nnounced muscle size seems likely to be critical to extreme \nthe specific muscle size of \nhuman strength; however, \nextremely strong individuals remains unknown. Similarly, a \nlarge moment arm (e.g., of the patella tendon at the knee joint) \ncould contribute to the expression of high muscular strength \n(10, 12), and a large tendon may mitigate the mechanical stress \nit experiences with very high muscular loads, and therefore, \nthese characteristics may also be expected in individuals \nselected for exceptional strength. \n\nOverview \n\nThe WSM reported for a single test session that involved \nthe following assessments (listed in order): axial T1 weighted \n3.0-T MRI scans from T12 to the lateral malleolus [to assess \nmuscle size throughout the lower body (left and right sides)], \naxial and sagittal T1-weighted MRI scans of both knees [to \nassess patellar tendon cross-sectional area (CSA) and patellar \ntendon moment arm], maximum countermovement jumps \n(CMJ), and maximum isometric midthigh pulls (IMTPs). The \nmuscle size, patellar tendon CSA, and patellar tendon \nmoment arm of the WSM were compared with various popu- \nlations measured within our laboratory, as indicated in \nTable 1, alongside participant descriptives (10, 11, 13–15). In \naddition, the IMTP and CMJ measures were compared with \nexisting published literature (included studies are summar- \nized in Supplemental Materials 1 and 2, alongside participant \ndescriptives). ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed12.pdf" + "text": "", + "page_start": 236, + "page_end": 236, + "source_file": "00-80T-80.pdf" }, { - "text": "changes in response to functional overload/resistance \ntraining. For example, we previously found patellar ten- \ndon CSA to show very subtle changes after 15 wk (45 train- \ning sessions) of heavy resistance training [ þ 1.4% (41)] and \nno differences between long-term resistance-trained indi- \nviduals and untrained controls (15). \n\npopulations. Overall leg muscle volume of the WSM was \napproximately twice that of untrained controls but with pro- \nnounced anatomical variability in the extent of muscular de- \nvelopment. The plantar flexor muscle group and the guy \nrope muscles (sartorius, gracilis, and semitendinosus: þ 140 \nto þ 202%), which stabilize the pelvis and femur, demon- \nstrated the largest differences. The pronounced quadriceps \nfemoris size of the WSM (greater than or equal to twice that \nof untrained) was accompanied by a more modest difference \nin patella tendon moment arm ( þ 18%) and was not matched \nby a proportional difference in tendon size ( þ 30%). \n\nLimitations \n\nDATA AVAILABILITY \n\nData will be made available upon reasonable request. ", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed12.pdf" + "text": "", + "page_start": 236, + "page_end": 236, + "source_file": "00-80T-80.pdf" }, { - "text": "DISCUSSION \n\nThis study is the first to document the lower-body muscle \nand tendon morphology of a World’s Strongest Man and \ndeadlift champion (i.e., an exceptionally strong individual), \nand these are presented alongside functional whole body \nassessments, which exceeded the highest IMTP force (gross \n\nJ Appl Physiol (cid:4) doi:10.1152/japplphysiol.00342.2024 (cid:4) www.jappl.org ", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed12.pdf" + "text": "", + "page_start": 236, + "page_end": 236, + "source_file": "00-80T-80.pdf" } ] }, @@ -7419,64 +7419,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 19, + "page_end": 19, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 307, + "page_end": 307, + "source_file": "00-80T-80.pdf" }, { - "text": "In this paper, we present the findings from a unique op- \nportunity to examine the laboratory function, muscle size, \nand distribution of muscle mass, as well as patellar tendon \nsize and moment arm, of a World’s Strongest Man and dead- \nlift champion (WSM) in comparison with existing data on \nuntrained individuals, power athletes (100-m-track sprint- \ners), and long-term resistance-trained populations that we \nhave assessed previously (10, 11, 13–15). \n\nMRI Measurement of Muscle Tendon Unit Morphology \nand Moment Arm \nMATERIALS AND METHODS \n\nParticipant \n\nThe WSM’s achievements included one World’s Strongest \nMan title (14 mo prior to measurement), five Britain’s \nStrongest Man titles (the most recent 6 mo prior to measure- \nment), twice being World Deadlift Champion and Deadlift \nWorld Record holder (500 kg; at the time of measurement), \nand second place at Europe’s Strongest Man. Prior to agreeing \nto participate, the purpose of the research study and the test- \ning procedures were explained to the participant along with \nthe risks and benefits of taking part. The participant gave his \nwritten informed consent to participate in the study that was \napproved by the Loughborough University Ethical Advisory \nCommittee (Ethics Number R18-P090). Included in the writ- \nten consent was a statement providing permission for publi- \ncation of the collected data and the likelihood that their \nidentity may be evident based on their achievements and \ncharacteristics, despite anonymization. ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed12.pdf" + "text": "", + "page_start": 21, + "page_end": 21, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": "INTRODUCTION \nhealthy aging (5). However, our knowledge of extreme human \nstrength is limited. \n\nTo date, there is little scientific information on the charac- \nteristics of extremely strong humans in terms of laboratory- \nbased tests of strength and power, particularly the size and dis- \ntribution of their muscle mass, as well as tendon size and joint \nmechanics (moment arm). Kraemer et al. (6) examined the \nbody composition of elite strongman competitors using dual- \nenergy X-ray absorptiometry scanning and found that they \nhad a body mass (153 ± 19 kg) and lean mass (118 ± 12 kg) \napproximately twice that of an average untrained healthy \nyoung man. Whole body skeletal muscle mass of athletes from \nstrength- and power-based sports has also been estimated \nusing ultrasound measurements at a limited number of ana- \ntomical locations (7, 8). However, neither ultrasound-derived Feats of strength have fascinated man since the early stages \nof human civilization, as shown by the archeological evidence \nof inscribed heavy stones at Olympia and Thera in Greece, \ndated to the 6th century BC, detailing the way they were lifted \nby Bybon and Eumastus, respectively (1). Over the centuries, \nmany types of strength competitions have existed; some of \nwhich have been codified and endured within modern sport- \ning competitions (e.g., weightlifting, powerlifting, and shot \nput). In addition, professional strongman competitions, such \nas the annually contested “World’s Strongest Man” event, \ngenerate extensive global interest (2). Moreover, scientific \nunderstanding of muscular strength is important because of \nits role in athletic performance (3), injury prevention (4), and ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed12.pdf" + "text": "", + "page_start": 21, + "page_end": 21, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": "NEW & NOTEWORTHY Lower-body muscle size of an extraordinarily strong individual, a World’s Strongest Man and deadlift \nchampion (WSM), was approximately twice that of controls but was underpinned by pronounced anatomical variability in the \nextent of muscular development ( þ 23–202%): the plantar flexor group and guy rope muscles demonstrating the largest differen- \nces. The WSM’s quadriceps size (more than or equal to twice that of controls) contrasted with modest differences in patella ten- \ndon moment arm ( þ 18%) and was uncoupled from patellar tendon size ( þ 30%). \n\nisometric force; magnetic resonance imaging; power; strength ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed12.pdf" + "text": "", + "page_start": 307, + "page_end": 307, + "source_file": "00-80T-80.pdf" }, { - "text": "**1.2 Reference Documents**\n\n| | Id | | | Reference | | | Title | | | Version | |\n|---|---|---|---|---|---|---|---|---|---|---|---|\n| | Id | | | Reference | | | Title | | | Version | |\n| [1] | | | EDP_S1_MAN | | | EDP_S1_MAN_Portal-Version1-UserManual_v1.0 | | | 1.0 | | |\n| [2] | | | EDP_S1_MAN | | | EDP_S1_MAN_Portal-Version1.3-UserManual_v1.2 | | | 1.3 | | |\n| [3] | | | EDP_S1_MAN | | | EDP_S1_MAN_Portal-Version2.0-UserManual_v1.0 | | | 2.0 | | |\n| [4] | | | EDP_S1_MAN | | | EDP_S1_MAN_Portal-Version3.0-UserManual_v1.0 | | | 3.0 | | |\n", - "page_start": 4, - "page_end": 4, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + "text": "", + "page_start": 21, + "page_end": 21, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": "This study compared the muscle and tendon morphology of an extraordinarily strong individual, a World’s Strongest Man and deadlift \nchampion (WSM), with that of various other athletic, trained, and untrained populations. The WSM completed the following: 1) 3.0-T \nMRI scans, to determine the volume of 22 individual lower limb muscles, 5 functional muscle groups, patellar tendon (PT) cross-sec- \ntional area (CSA), and PT moment arm; and 2) countermovement jumps (CMJ) and isometric midthigh pull (IMTP) contractions. The \nWSM was compared with previously assessed groups from our laboratory (muscle and tendon) and the wider research literature \n(CMJ and IMTP). The WSM’s CMJ peak power (9,866 W) and gross (9,171 N) and net (7,480 N) IMTP peak forces were higher than \nany previously published values. The WSM’s overall measured leg muscle volume was approximately twice that of untrained controls \n( þ 96%) but with pronounced anatomical variability in the extent of muscular development. The plantar flexor group ( þ 120%) and the \nguy rope muscles (sartorius, gracilis, and semitendinosus: þ 140% to þ 202%), which stabilize the pelvis and femur, demonstrated the \nlargest differences relative to that of untrained controls. The WSM’s pronounced quadriceps size (greater than or equal to twofold vs. \nuntrained) was accompanied by modest PT moment arm differences and, notably, was not matched by an equivalent difference in PT \nCSA ( þ 30%). These results provide novel insight into the musculotendinous characteristics of an extraordinarily strong individual, \nwhich may be toward the upper limit of human variation, such that the WSM’s very pronounced lower limb muscularity also exhibited \ndistinct anatomical variability and with muscle size largely uncoupled from tendon size. ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed12.pdf" + "text": "", + "page_start": 21, + "page_end": 21, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": "NAVWEPS OO-BOT-80 \nTABLE OF CONTENTS \n\nCHAPTER 5. OPERAilNG STRENGTH LIMITATIONS \n\nGENERAL OEFlNlTlONS AND STRUCTURAL REQUlREMENTS \n\nSTATIC STRENGTH .._.......... ~.~~~.~ ~..~ \n\nLimit load \nFactor of safety \nMaterial properties \n\nSERVICE LIFE \n\nPati \nLoa r \nCreep considerations \ne consideration \nspectrum attd cumulative damage \n\nAEROELASTIC EFFECTS. \n\nStiffness and rigidity \n\nAIRCRAFT \n\nLIMITATIONS \nFLIGHT LOADS-MANEUVERS AND GUSTS. \n\nLOADS AND OPERATING \n\nLoadfactor..................................................... \nManeuvering load factors.. \nMaximum lift capability \nEffect of gross weight \n\n^ \nClllStlOadtacfors..............,................................. \n. ._\n\nGust load increment \nEffect of gust intensity and lift curve slope \nEffect of wing loading and altitude \nEffect of overstrea. \n\nTHE V-n OR V-g DIAGRAM. \n\nEffect of weight, configuration;altihtde, and symmetry of Ior-Ang \nLimit load factors \nUltitnute load facvxs \nMaximum lift capability \nLimit airspeed \nOperating env+pe \nManeuver’speed and penetration of turbulence ", - "page_start": 16, - "page_end": 16, + "text": "", + "page_start": 307, + "page_end": 307, "source_file": "00-80T-80.pdf" }, { - "text": "to distinguish between \nstrength and stiffness. Strength is simply the \nresistance to load while stiffness is the resist- \nance to deflection or deformation. While \nstrength and stiffness are related, it is necessary \nto appreciate that adequate structural strength \ndoes not automatically provide adequate stiff- \nness. Thus, special consideration is necessary \nthe structural components with \nto provide \nspecific stiffness characteristics to prevent un- \ndesirable aeroelastic effects during normal \noperation. \n\nIt is important \n\nAn obvious solution to the apparent prob- \nfatigue strength, \nlems of static strength, \nstiffness and rigidity would be to build \nthe \nairplane like a product of an anvil works, \ncapable of withstanding all conceivable loads. \nHowever, high performance airplane con- \ninefi- \nfigurations cannot be developed with \ncient, lowly stressed structures. The effect of \nadditional weight \nis best illustrated by pre- \nliminary design studies of a very long range, \nthe preliminary \nhigh altitude bomber. \nphases of design, each additional pound of \nany weight would necessitate a 25-pound \nincrease in gross weight to maintain the same \nperformance. An increase in the weight of \nany item produced a chain reaction-more \nfuel, larger tanks, bigger engines, more fuel, \nIn the \nheavier landing gear, more fuel, etc. \ncompetitive sense of design, no additional \nstructural weight can be tolerated to provide \nmore strength than is specified as necessary \nfor the design mission requirement. ", - "page_start": 349, - "page_end": 349, - "source_file": "00-80T-80.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": "[5] F. Brochard-Wyart and J. Daillant, “Drying of solids wetted by thin liquid films,” Can. J. Phys. 68, \n\n1084–1088 (1989). \n\n[6] P. M¨uller-Buschbaum, “Dewetting and pattern formation in thin polymer films as investigated in real \n\nand reciprocal space,” J. Phys.-Condes. Matter 15, R1549–R1582 (2003). \n\n[7] R. Seemann, S. Herminghaus, C. Neto, S. Schlagowski, D. Podzimek, R. Konrad, H. Mantz, and \n\nK. Jacobs, “Dynamics and structure formation in thin polymer melt films,” J. Phys.-Condes. Matter \n\n17, S267–S290 (2005). \n\n[8] U. Thiele, “Structure formation in thin liquid films,” in S. Kalliadasis and U. Thiele, editors, “Thin \n\nfilms of Soft Matter,” pages 25–93, Springer, Wien (2007). \n\n[9] R. Xie, A. Karim, J. F. Douglas, C. C. Han, and R. A. Weiss, “Spinodal dewetting of thin polymer ", - "page_start": 26, - "page_end": 26, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_RCI_2013.pdf" } ] }, @@ -7487,70 +7487,70 @@ "target_page": 10, "target_passage": "Despite using a wide-bore MRI scanner, due to the size of the WSM’s shoulders and arms, it was not possible to scan their upper body", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 187, + "page_end": 187, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 62, + "page_end": 62, + "source_file": "00-80T-80.pdf" }, { - "text": "Although the current investigation provides a detailed \nassessment of an individual at/toward the upper limit of \nhuman strength performance, it is important to appreciate \nstudy limitations. First, the participant was not measured im- \nmediately before their World’s Strongest Man championship \nsuccess or other landmark performances, and it is entirely pos- \nsible the functional and structural characteristics we assessed \nmay have been even higher directly prior to peak performan- \nces. Despite using a wide-bore MRI scanner, due to the size of \nthe WSM’s shoulders and arms, it was not possible to scan their \nupper body. Thus, we were not able to investigate this aspect of \nthe WSM’s muscle morphology; although given that greater hy- \npertrophy occurs in the upper body compared with the lower \nbody (42), it is possible that the WSM’s upper-body muscle size \nrelative to untrained controls may have been even more pro- \nnounced than what we have documented for the lower body. \nIn the current study to provide the most representative data on \nuntrained control participants, the largest available untrained \ncontrol populations were used for each category of measure- \nments. Thus, different untrained control populations were \nused [e.g., comparison of quadricep and hamstring size (n ¼ \n102) vs. comparison of all the leg muscles (n ¼ 11)], which led to \nsome subtle discrepancies in the contrasts between these \ngroups and the WSM [e.g., quadriceps femoris/knee extensors, \nþ 127% and þ 99% relative to our large pooled (n ¼ 102) and \nsmaller (n ¼ 11) untrained control samples, respectively]. \nImportantly, however, this discrepancy does not appear to \nmeaningfully affect the interpretation of the findings. There \nwere subtle differences in the precise scanning and analysis \napproaches used with the reference populations featured in \nthis study, including 1) magnetic field strength [1.5 T (10, 11, 15) \nvs. 3.0 T, WSM and (13, 14)]; 2) the interslice distance used to \nquantify quadriceps femoris and hamstrings muscle volume \n[1.5 cm (10, 11, 14) vs. 2.0 cm, WSM and (13)]; 3) the calculation \nof muscle volume [area under the cubic spline ACSA-muscle \nlength curve: (10, 11, 14) vs. the equation detailed earlier: WSM \nand (13)]; and 4) the use of unilateral MRI measures derived \nfrom one limb (10, 11, 14, 15) or collapsed across two limbs \n[WSM and (13)]. However, it seems likely that these subtle dif- \nferences would have had at most a very minor effect on the \nfindings. Finally, it is also important to highlight that the differ- \nences documented between the WSM and comparative popula- \ntions for the various measures included in the current study \ncannot be assumed to be anything other than a combination of \nboth innate (genetic) and environmental (training and nutri- \ntion) factors. ", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed12.pdf" + "text": "", + "page_start": 62, + "page_end": 62, + "source_file": "00-80T-80.pdf" }, { - "text": "In this paper, we present the findings from a unique op- \nportunity to examine the laboratory function, muscle size, \nand distribution of muscle mass, as well as patellar tendon \nsize and moment arm, of a World’s Strongest Man and dead- \nlift champion (WSM) in comparison with existing data on \nuntrained individuals, power athletes (100-m-track sprint- \ners), and long-term resistance-trained populations that we \nhave assessed previously (10, 11, 13–15). \n\nMRI Measurement of Muscle Tendon Unit Morphology \nand Moment Arm \nMATERIALS AND METHODS \n\nParticipant \n\nThe WSM’s achievements included one World’s Strongest \nMan title (14 mo prior to measurement), five Britain’s \nStrongest Man titles (the most recent 6 mo prior to measure- \nment), twice being World Deadlift Champion and Deadlift \nWorld Record holder (500 kg; at the time of measurement), \nand second place at Europe’s Strongest Man. Prior to agreeing \nto participate, the purpose of the research study and the test- \ning procedures were explained to the participant along with \nthe risks and benefits of taking part. The participant gave his \nwritten informed consent to participate in the study that was \napproved by the Loughborough University Ethical Advisory \nCommittee (Ethics Number R18-P090). Included in the writ- \nten consent was a statement providing permission for publi- \ncation of the collected data and the likelihood that their \nidentity may be evident based on their achievements and \ncharacteristics, despite anonymization. ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed12.pdf" + "text": "", + "page_start": 62, + "page_end": 62, + "source_file": "00-80T-80.pdf" }, { - "text": "The participant reported for their MRI scan [3.0-T \nDiscovery MR750W (70-cm-wide bore), GE Medical] having \nnot completed any strenuous physical activity in (cid:2)24 h and \nhad received prior instruction to arrive in a relaxed state hav- \ning eaten and drunk normally. The participant sat quietly for \n15 min prior to their scan. The participant lay supine for the \nMRI scan of the lower-body musculature from T12 to the lat- \neral malleolus. A body coil (GE Medical) allowed axial T1- \nweighted images (time of repetition/time to echo 600/8.144 \nms, image matrix 512 (cid:3) 512, field of view 500 (cid:3) 500 mm, \npixel size 0.9766 (cid:3) 0.9766 mm, slice thickness 5 mm, and \ninterslice gap 5 mm) to be acquired in five overlapping \nblocks. Images of both sides of the body were acquired \nwithin a single scan for blocks 1 (T12 to pelvis), 4 (knee joint \nspace to midshank), and 5 (midshank to lateral malleolus). \nHowever, due to the size of the participant’s thighs, it was \nnecessary to scan each thigh individually for blocks 2 (pelvis \nto midthigh) and 3 (midthigh to knee joint space); this \ninvolved the radiographer repositioning the field of view \nbetween scanning the first and the second thigh but not \nphysically moving the coil or the participant. Oil-filled cap- \nsules were secured to the surface of the participant’s skin \nwith Transpore tape at intervals along the length of the lower \nbody prior to the scan and in an offline analysis used to ver- \nify the alignment of the blocks (Horos software, Version 3.36, \nhttps://horosproject.org/). ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed12.pdf" + "text": "", + "page_start": 62, + "page_end": 62, + "source_file": "00-80T-80.pdf" }, { - "text": "**Study design**\nThe participant underwent 26 MRI scanning sessions from 3 weeks \nbefore conception through 2 years postpartum (162 weeks), during \nwhich high-resolution anatomical and diffusion spectrum imaging \nscans of the brain were acquired. Scans were distributed throughout \nthis period, including prepregnancy (four scans), first trimester (four \nscans), second trimester (six scans), third trimester (five scans) and \npostpartum (seven scans; Fig. 1c). The first 6 sessions took place at \nthe UCSB Brain Imaging Center (BIC), the final 20 sessions took place \nat the UCI Facility for Imaging and Brain Research (FIBRE). The major- \nity of scans took place between 9 AM and 2 PM, limiting significant \nAM–PM fluctuations49. The MRI protocol, scanner (Siemens 3T Prisma) \nand software (version MR E11) were identical across sites. Each scan- \nner was checked weekly for the duration of the study and passed all \nQC reports indicating no significant alterations in the geometry. To \nensure the robustness of the findings, after the final study session, the \nparticipant completed back-to-back validation scans at UCI and UCSB \nwithin a 12-h window to assess reliability between scanners. Intraclass \ncorrelation coefficients (two-way, random effects, absolute agreement, \nsingle rater) reveal ‘excellent’ test–retest reliability between scanners, \nincluding ROI-level GMV (ICC = 0.97, 95% CI: 0.80–0.99), ROI-level \nCT (ICC = 0.96, 95% CI: 0.90–0.98), MTL subfield volume (ICC = 0.99, \n95% CI: 0.97–0.99) and ROI-level QA (ICC = 0.94, 95% CI: 0.91–0.97). \nFurthermore, when examining the relationship between gestation \nweek and GMV among UCI-only gestational sessions, findings were \nconsistent (Supplementary Fig. 12), indicating that site differences \nare highly unlikely to have contributed meaningfully to the observed \neffects. Although not applicable here, we note that having a control \nparticipant scanned over a similar duration within the same scanner is \ncritical for estimating how much variation in the brain can be attributed \nto within-scanner variability. ", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed4.pdf" + "text": "", + "page_start": 62, + "page_end": 62, + "source_file": "00-80T-80.pdf" }, { - "text": "Area of acquisition \nT1-weighted and dMRI scans = whole-brain \nT2-weighted scan = high-resolution imaging of medial temporal lobe \n\nNot used \n\nParameters TR = 4300 ms, echo time = 100.2 ms, 139 directions, b-max = 4990, FoV = 259 x 259 mm, 78 slices, 1.7986 x 1.7986 x 1.8 mm voxel \nresolution \n\nPreprocessing \n\nPreprocessing software \n\nGray Matter Volume & Cortical Thickness: \nAdvanced Normalization Tools (ANTs), version 2.1.0 \nFreeSurfer, version 7 \n\nT2-weighted MTL scans: \nAutomatic Segmentation of Hippocampal Subfields (ASHS), version 7/2018 \n\nDiffusion imaging: \nQSIprep, version 0.15.3 \nDSI Studio, version Chen-2022-07-31 \n\nNormalization Normalization differed by modality due to inherent limitations of applicable processing pipelines. \n\nGray Matter Volume & Cortical Thickness: \nAll analyses were kept in native subject-space to limit the amount of warping and leverage the advantages of a precision \nimaging design. \n\nT2-weighted MTL scans: \nT2w images were registered to the segmentation template (see below) using ANTs deformable registration. ", - "page_start": 16, - "page_end": 16, - "source_file": "pubmed4.pdf" + "text": "", + "page_start": 62, + "page_end": 62, + "source_file": "00-80T-80.pdf" }, { - "text": "INTRODUCTION \nhealthy aging (5). However, our knowledge of extreme human \nstrength is limited. \n\nTo date, there is little scientific information on the charac- \nteristics of extremely strong humans in terms of laboratory- \nbased tests of strength and power, particularly the size and dis- \ntribution of their muscle mass, as well as tendon size and joint \nmechanics (moment arm). Kraemer et al. (6) examined the \nbody composition of elite strongman competitors using dual- \nenergy X-ray absorptiometry scanning and found that they \nhad a body mass (153 ± 19 kg) and lean mass (118 ± 12 kg) \napproximately twice that of an average untrained healthy \nyoung man. Whole body skeletal muscle mass of athletes from \nstrength- and power-based sports has also been estimated \nusing ultrasound measurements at a limited number of ana- \ntomical locations (7, 8). However, neither ultrasound-derived Feats of strength have fascinated man since the early stages \nof human civilization, as shown by the archeological evidence \nof inscribed heavy stones at Olympia and Thera in Greece, \ndated to the 6th century BC, detailing the way they were lifted \nby Bybon and Eumastus, respectively (1). Over the centuries, \nmany types of strength competitions have existed; some of \nwhich have been codified and endured within modern sport- \ning competitions (e.g., weightlifting, powerlifting, and shot \nput). In addition, professional strongman competitions, such \nas the annually contested “World’s Strongest Man” event, \ngenerate extensive global interest (2). Moreover, scientific \nunderstanding of muscular strength is important because of \nits role in athletic performance (3), injury prevention (4), and ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed12.pdf" + "text": "", + "page_start": 62, + "page_end": 62, + "source_file": "00-80T-80.pdf" }, { - "text": "| n/a | | Involved in the study\nAntibodies\nEukaryotic cell lines\nPalaeontology and archaeology\nAnimals and other organisms\nClinical data\nDual use research of concern\nPlants |\n|---|---|---|\n| n/a | | Involved in the study Antibodies Eukaryotic cell lines Palaeontology and archaeology Animals and other organisms Clinical data Dual use research of concern Plants |\n| | | |\n\n\n| n/a | | Involved in the study\nChIP-seq\nFlow cytometry\nMRI-based neuroimaging |\n|---|---|---|\n| n/a | | Involved in the study ChIP-seq Flow cytometry MRI-based neuroimaging |\n| | | |\n\n\nMagnetic resonance imaging \n\nExperimental design \n\nDesign type Structural & Diffusion MRI \n\nDesign specifications No task-based fMRI used in this manuscript. \n\nBehavioral performance measures N/A; no performance metrics collected \n\nAcquisition \n\nImaging type(s) Structural \n\nField strength 3 \n\nSequence & imaging parameters \n\nHigh-resolution anatomical scans were acquired using a T1-weighted (T1w) magnetization prepared rapid gradient echo \n(MPRAGE) sequence (TR = 2500 ms, TE = 2.31 ms, T1 = 934 ms, flip angle = 7°, 0.8 mm thickness) followed by a gradient \necho fieldmap (TR = 758 ms; TE1 = 4.92 ms; TE2 = 7.38 ms; flip angle = 60°). A T2-weighted (T2w) turbo spin echo (TSE) \nscan was also acquired with an oblique coronal orientation positioned orthogonally to the main axis of the hippocampus \n(TR/TE = 9860/50 ms, flip angle = 122°, 0.4 × 0.4 mm2 in-plane resolution, 2 mm slice thickness, 38 interleaved slices \nwith no gap, total acquisition time = 5:42 min). ", - "page_start": 16, - "page_end": 16, - "source_file": "pubmed4.pdf" + "text": "", + "page_start": 62, + "page_end": 62, + "source_file": "00-80T-80.pdf" }, { - "text": "**MRI acquisition.**MRI scanning sessions at the University of Califor- \nnia, Santa Barbara and Irvine were conducted on 3T Prisma scanners \nequipped with 64-channel phased-array head/neck coil (of which 50 \ncoils are used for axial brain imaging). High-resolution anatomical scans \nwere acquired using a T1-weighted (T1w) magnetization prepared rapid \ngradient echo (MPRAGE) sequence (repetition time (TR) = 2,500 ms, \ntime to echo (TE) = 2.31 ms, inversion time (TI) = 934 ms, flip angle = 7°, \n0.8 mm thickness) followed by a gradient echo field map (TR = 758 ms, \nTE1 = 4.92 ms, TE2 = 7.38 ms, flip angle = 60°). A T2-weighted (T2w) \nturbo spin echo scan was also acquired with an oblique coronal orienta- \ntion positioned orthogonally to the main axis of the hippocampus (TR/ \nTE = 9,860/50 ms, flip angle = 122°, 0.4 × 0.4 mm2 in-plane resolution, \n2-mm slice thickness, 38 interleaved slices with no gap, total acquisi- \ntion time = 5 min and 42 sec). The Diffusion Spectrum Imaging (DSI) \nprotocol sampled the entire brain with the following parameters: \nsingle phase, TR = 4,300 ms, echo time = 100.2 ms, 139 directions, \n*b*-max = 4,990, FoV = 259 × 259 mm, 78 slices, 1.7986 × 1.7986 × 1.8 mm \nvoxel resolution. These images were linearly registered to the \nwhole-brain T1w MPRAGE image. A custom foam headcase was used \nto provide extra padding around the head and neck, as well as to mini- \nmize head motion. Additionally, a custom-built sound-absorbing foam \ngirdle was placed around the participant’s waist to attenuate sound \nnear the fetus during second-trimester and third-trimester scanning. ", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed4.pdf" + "text": "", + "page_start": 62, + "page_end": 62, + "source_file": "00-80T-80.pdf" } ] }, @@ -7561,70 +7561,70 @@ "target_page": 2, "target_passage": "Multiple sclerosis (MS) is a progressive inflammatory disease of the central nervous system (CNS) that is typically diagnosed at 30– 40 years of ag", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 16, + "page_end": 16, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_GLW_2002.pdf" }, { - "text": "1 Introduction \n\nMultiple sclerosis (MS) is a progressive inflammatory disease of \nthe central nervous system (CNS) that is typically diagnosed at 30– \n40 years of age (1). A great concern is the significantly lower levels \nof physical activity (PA) in people with MS (pwMS) across \ndisability levels than in their healthy counterparts (2, 3). ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed13.pdf" + "text": "", + "page_start": 6, + "page_end": 6, + "source_file": "NYSE_GLW_2002.pdf" }, { - "text": "1. Walton C, King R, Rechtman L, Kaye W, Leray E, Marrie RA, et al. Rising \ninsights from the Atlas of MS, third \n\n11. Unluer NO, Ozkan T, Yasa ME, Ates Y, Anlar O. Investigation of the \nrelationship between trunk motor control and balance, functional mobility, and gait \ncapacity in patients with multiple sclerosis/multipl sklerozlu hastalarda govde motor \nkontrolu ile denge, fonksiyonel mobilite ve yuruyus kapasitesi arasindaki iliskinin \nincelenmesi. Türk Nöroloji Dergisi. (2021) 27(3):283. doi: 10.4274/tdn.2021.41017 \n\nprevalence of multiple sclerosis worldwide: \nedition. Mult Scler. (2020) 26(14):1816–21. doi: 10.1177/1352458520970841 \n\n2. Casey B, Coote S, Galvin R, Donnelly A. Objective physical activity levels in \npeople with multiple sclerosis: meta-analysis. Scand J Med Sci Sports. (2018) 28 \n(9):1960–9. doi: 10.1111/sms.13214 \n\n12. Learmonth YC, Motl RW. Physical activity and exercise training in multiple \nsclerosis: a review and content analysis of qualitative research identifying perceived \ndeterminants and consequences. Disabil Rehabil. (2016) 38(13):1227–42. doi: 10. \n3109/09638288.2015.1077397 \n3. Kinnett-Hopkins D, Adamson B, Rougeau K, Motl RW. People with MS are less \nphysically active than healthy controls but as active as those with other chronic \ndiseases: an updated meta-analysis. Mult Scler Relat Disord. (2017) 13:38–43. \ndoi: 10.1016/j.msard.2017.01.016 \n\n13. Fikke HK, Normann B, Sivertsen M, Dahl SSH, Arntzen EC. Optimizing \nsensorimotor function, physical activity and employment for people with MS—a \n10.52705/ \nfeasibility \nc14a8ca05f7546dabc18bd0275cf2edd \n4. Hoang PD, Lord S, Gandevia S, Menant J. Exercise and sports science Australia \n(ESSA) position statement on exercise for people with mild to moderate multiple \nsclerosis. J Sci Med Sport. (2022) 25(2):146–54. doi: 10.1016/j.jsams.2021.08.015 \n\n90(1):32–42. study. Fysioterapeuten. (2023) doi: ", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed13.pdf" + "text": "", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_GLW_2002.pdf" }, { - "text": "physical \n09593985.2014.1002873 \ntherapy. Physiother Theory Pract. \n\n31. Russell N, Gallagher S, Msetfi RM, Hayes S, Motl RW, Coote S. Experiences of \npeople with multiple sclerosis participating in a social cognitive behavior change \nphysical activity intervention. Physiother Theory Pract. (2022) 39(5):1–9. doi: 10. \n1080/09593985.2022.2030828 \n\n46. Anens E, Zetterberg L, Urell C, Emtner M, Hellström K. Self-reported \nphysical \na \ncross-sectional study. BMC Neurol. (2017) 17(1):204. doi: 10.1186/s12883-017- \n0981-4 \n\nactivity correlates in Swedish adults with multiple sclerosis: \n\n32. Smith M, Neibling B, Williams G, Birks M, Barker R. Consumer experience \nof a flexible exercise participation program (FEPP) for individuals with multiple \nsclerosis: a mixed-methods study. Physiother Res Int. (2021) 26(4):e1922. doi: 10. \n1002/pri1922 \n47. Herring TE, Knowles LM, Alschuler KN. Outdoor adventure programs for \npersons with multiple sclerosis: a review and agenda for future research. Int J MS \nCare. (2021) 23(4):186–92. doi: 10.7224/1537-2073.2020-066 \n\n33. Shumway-Cook A, Woollacott MH, Rachwani J, Santamaria V. Motor Control: \nTranslating Research into Clinical Practice. 6th ed. Philadelphia: Wolters Kluwer \nHealth (2023). \n48. Creswell JW, Poth CN. Qualitative Inquiry & Research Design: Choosing Among \nFive Approaches. 4th ed. California: Sage (2018). ", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed13.pdf" + "text": "", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_GLW_2002.pdf" }, { - "text": "Prior to recruitment, the study was introduced to individuals \nwith multiple sclerosis (pwMS) through a seminar hosted by the \nNordland MS Association. Additionally, \nseminars were \nconducted for health professionals in community healthcare and \nat the regional hospital. Written information about this study \n(and the RCT) was sent from the MS clinic at the regional \nto all eligible individuals affiliated with the \nhospital by post \nIndividuals who wished to participate signed the \nhospital. \nattached consent \nin the pre-stamped \nfollows: had been \nenvelope. The inclusion criteria were as \ndiagnosed with MS, had a score on the Expanded Disability \nStatus Scale (EDSS) (29) of ≤3.5, was ≥18 years, was employed \n(10%–100% of \nfull-time) and residential address in the two \npredefined municipalities. The exclusion criteria were as follows: \npregnancy, exacerbation of symptoms within two weeks prior to \nenrollment and other serious conditions compromising balance, \nwalking or work capacity. All participants in the intervention \ngroup of the RCT (n = 15) were included (Table 3). \n\nform and returned it ", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed13.pdf" + "text": "", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_GLW_2002.pdf" }, { - "text": "14. Arntzen EC, Straume B, Odeh F, Feys P, Normann B. Group-based, \nindividualized, comprehensive core stability and balance intervention provides \nimmediate and long-term improvements in walking in individuals with multiple \nsclerosis: a randomized controlled trial. Physiother Res Int. (2019) 25(1):e1798. \ndoi: 10.1002/pri.1798 \n5. Dalgas U, Langeskov-Christensen M, Stenager E, Riemenschneider M, Hvid LG. \nExercise as medicine in multiple sclerosis—time for a paradigm shift: preventive, \nsymptomatic, and disease-modifying aspects and perspectives. Curr Neurol Neurosci \nRep. (2019) 19(11):1–12. doi: 10.1007/s11910-019-1002-3 \n\n6. Riemenschneider M, Hvid LG, Ringgaard S, Nygaard MKE, Eskildsen SF, \nGaemelke T, et al. Investigating the potential disease-modifying and neuroprotective \nefficacy of exercise therapy early in the disease course of multiple sclerosis: the early \nmultiple sclerosis exercise study (EMSES). Mult Scler. (2022) 28(10):1620–9. doi: 10. \n1177/13524585221079200 \n15. Arntzen EC, Straume BK, Odeh F, Feys P, Zanaboni P, Normann B. Group- \nbased individualized comprehensive core stability intervention improves balance in \npersons with multiple sclerosis: a randomized controlled trial. Phys Ther. (2019) 99 \n(8):1027–38. doi: 10.1093/ptj/pzz017 \n\n16. Arntzen EC, Øberg GK, Gallagher S, Normann B. Group-based, individualized \nexercises can provide perceived bodily changes and strengthen aspects of self in \nindividuals with MS: a qualitative interview study. Physiother Theory Pract. (2019) \n37(10):1080–95. doi: 10.1080/09593985.2019.1683923 \n7. Kalb R, Brown TR, Coote S, Costello K, Dalgas U, Garmon E, et al. Exercise and \nlifestyle physical activity recommendations \nfor people with multiple sclerosis \nthroughout the disease course. Mult Scler. (2020) 26(12):1459–69. doi: 10.1177/ \n1352458520915629 \n\n17. Florio-Smith J, Ayer M, Colhoun S, Daykin N, Hamill B, Liu X, et al. The \nimportance of the patient’s perspective in decision-making in multiple sclerosis: \nresults of the OwnMS patient perspectives study. Mult Scler Relat Disord. (2023) \n75:104757. doi: 10.1016/j.msard.2023.104757 \n8. Moreno-Navarro P, Manca A, Martinez G, Ventura L, Barbado D, Vera-García FJ, \net al. Test-retest reliability and known-groups validity of trunk muscle tests in people \nwith multiple sclerosis: a cross-sectional, case-control study. Phys Ther. (2021) 101 \n(5):1–9. doi: 10.1093/ptj/ptzab049 \n\n18. Kleim JA, Jones TA. Principles of experience-dependent neural plasticity: \nimplications for rehabilitation after brain damage. J Speech Lang Hear Res. (2008) \n51(1):225–39. doi: 10.1044/1092-4388(2008/018) \n9. Raats J, Arntzen EC, Lamers I, Feys P, Normann B. What is the distribution of \ntrunk impairments and its relationship with disability level \nin individuals with \nmultiple sclerosis? Mul Scler Relat Disord. (2021) 57:103325. doi: 10.1016/j.msard. \n2021.103325 19. Thompson E. Mind in Life: Biology, Phenomenology, and The Sciences of Mind. \nCambridge, Mass: Harvard University Press (2007). \n\n10. Normann B, Arntzen EC. What are the relationships between trunk control, \nbalance and walking in individuals with multiple sclerosis with minor to moderate \ndisability? Eur J Physiother. (2021) 23(6):377–83. doi: 10.1080/21679169.2020.1772870 \n20. Merleau-Ponty M. Phenomenology of Perception. London: Routledge Classics \n(2008). \n\n21. Buhrmann T, Di Paolo E. The sense of agency—a phenomenological \nconsequence of enacting sensorimotor schemes. Phenomenol Cogn Sci. (2017) 16 \n(2):207–36. doi: 10.1007/s11097-015-9446-7 \n34. Gallagher S, Bower M. Making enactivism even more embodied. AVANT: \nJ Philos Interdiscip Vanguard. (2014) 5(2):232–47. doi: 10.26913/50202014.0109.0011 \n\n35. Di Paolo E, Cuffari E, Jaegher H. Linguistic Bodies: The Continuity between Life \n\n22. De Jaegher H, Di Paolo E. Participatory sense-making: an enactive approach to \nsocial cognition. Phenomenol Cogni Sci. (2007) 6(4):485–507. doi: 10.1007/s1197-007- \n9076-9 \n\nand Language. Cambridge: MIT press (2018). \n36. Colombetti G. The embodied and situated nature of moods. Philosophia (Ramat \nGan). (2017) 45(4):1437–51. doi: 10.1007/s11406-017-9817-0 ", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed13.pdf" + "text": "", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_GLW_2002.pdf" }, { - "text": "people in eastern European and Baltic states have a life expectancy (at the age of 65) of less than 17 \nand up to 19.5 years, they all are under the average of 20.0 for the EU28. Some mixed results can be \nobserved for Germany, Belgium and Denmark, but clearly southern and northern countries as well as \nFrance have the highest life expectancy. \n\n**Regarding mortality and morbidity**, in 2019 at EU27 level the**main causes of death**were \ncardiovascular diseases plus stroke and ischaemic diseases (35%), cancer (26%), respiratory diseases \n(8%), and accidents and external causes (5%).192 ", - "page_start": 79, - "page_end": 79, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 161, + "page_end": 161, + "source_file": "00-80T-80.pdf" }, { - "text": "21,274 excluded \n8,273 Previous diagnosis of asthma \n5,363 Previous diagnosis of COPD \n190 Age < 18 years \n1,763 Previous diagnosis of CF, bronchiectasis, pulmonary \nfibrosis, or lung cancer \n1,331 History of MI, heart problems, stroke, aortic or cerebral \naneurysm, eye surgery, or detached retina in past 3 mos. \n19 Pregnant, in the third trimester \n3,715 Under care of respirologist or using an inhaled respiratory ", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed6_cc4.pdf" + "text": "", + "page_start": 161, + "page_end": 161, + "source_file": "00-80T-80.pdf" }, { - "text": "STUDY DESIGN AND METHODS: This population-based study included 2,857 adults who were \nexperiencing respiratory symptoms. These individuals had not been previously diagnosed \nwith any lung conditions and were recruited from 17 Canadian centers using random digit \ndialing. Each participant underwent spirometry testing both before and after using a bron- \nchodilator to determine if they met the diagnostic criteria for COPD, asthma, or preserved \nratio impaired spirometry (PRISm), or if their spirometry results were normal. An age- \nmatched control group (n ¼ 231) was similarly recruited using random digit dialing. A \ndyspnea impact assessment score from 0 to 100 was produced using questions from the \nCOPD Assessment Test and St. George’s Respiratory questionnaire. \nRESULTS: Individuals with PRISm (n ¼ 172) reported more impactful dyspnea (mean score, \n63.0; 95% CI, 59.5-66.4) than those with undiagnosed asthma (n ¼ 265; mean score, 56.6; \n95% CI, 53.9-59.3) or undiagnosed COPD (n ¼ 330; mean score, 57.5; 95% CI, 55.1-59.9). All \ngroups reported significantly more impactful dyspnea than the control group (mean score, \n13.8; 95% CI, 11.8-15.7). Patient-specific risk factors including age, sex, BMI, smoking, and \ncomorbidities explained 20.6% of the variation in dyspnea. An additional 12.4% of the \nvariation was explained by disease classification and another 1.7% by the severity of lung \nfunction impairment assessed with spirometry. After adjusting for age, sex, and BMI, greater \ndyspnea impact was associated with increased health care utilization, lower quality of life, and \nreduced work productivity. \nINTERPRETATION: Our findings showed that in community-based adults with undiagnosed \nrespiratory symptoms, those identified with PRISm experienced the greatest impact of dys- \npnea. Dyspnea imposes burdens on the health care system and is associated with impaired \nquality of life and work productivity. \nCHEST 2024; 166(6):1296-1308 ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed6_cc4.pdf" + "text": "", + "page_start": 2, + "page_end": 2, + "source_file": "NYSE_GLW_2002.pdf" } ] }, @@ -7641,64 +7641,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 287, + "page_end": 287, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 321, + "page_end": 321, + "source_file": "00-80T-80.pdf" }, { - "text": "in a \nDiscussion: High-intensity training combined with detailed exercises \nphysiotherapy outdoor group was perceived to create meaningful bodily changes \nand enhance PA and prospects for both PA and life. Importantly, however, some \nnegative experiences were also reported from the high-intensity training. Enactive \nthe importance of \nthe illumination of new perspectives: \ntheory allowed for \nembodiment for self-efficacy and of tailored physiotherapy and an outdoor-group \nenvironment for exploring one’s own limits to physical capabilities. These aspects \nshould inform future exercise interventions in pwMS with low disability. \n\nKEYWORDS \n\nphysical activity, physiotherapy, multiple sclerosis, qualitative study, exercise therapy, \npostural balance, enactive theory ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed13.pdf" + "text": "", + "page_start": 320, + "page_end": 320, + "source_file": "00-80T-80.pdf" }, { - "text": "physical \n09593985.2014.1002873 \ntherapy. Physiother Theory Pract. \n\n31. Russell N, Gallagher S, Msetfi RM, Hayes S, Motl RW, Coote S. Experiences of \npeople with multiple sclerosis participating in a social cognitive behavior change \nphysical activity intervention. Physiother Theory Pract. (2022) 39(5):1–9. doi: 10. \n1080/09593985.2022.2030828 \n\n46. Anens E, Zetterberg L, Urell C, Emtner M, Hellström K. Self-reported \nphysical \na \ncross-sectional study. BMC Neurol. (2017) 17(1):204. doi: 10.1186/s12883-017- \n0981-4 \n\nactivity correlates in Swedish adults with multiple sclerosis: \n\n32. Smith M, Neibling B, Williams G, Birks M, Barker R. Consumer experience \nof a flexible exercise participation program (FEPP) for individuals with multiple \nsclerosis: a mixed-methods study. Physiother Res Int. (2021) 26(4):e1922. doi: 10. \n1002/pri1922 \n47. Herring TE, Knowles LM, Alschuler KN. Outdoor adventure programs for \npersons with multiple sclerosis: a review and agenda for future research. Int J MS \nCare. (2021) 23(4):186–92. doi: 10.7224/1537-2073.2020-066 \n\n33. Shumway-Cook A, Woollacott MH, Rachwani J, Santamaria V. Motor Control: \nTranslating Research into Clinical Practice. 6th ed. Philadelphia: Wolters Kluwer \nHealth (2023). \n48. Creswell JW, Poth CN. Qualitative Inquiry & Research Design: Choosing Among \nFive Approaches. 4th ed. California: Sage (2018). ", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed13.pdf" + "text": "", + "page_start": 321, + "page_end": 321, + "source_file": "00-80T-80.pdf" }, { - "text": "Background and purpose: Physical activity (PA) is often reduced in people with \nMS (pwMS), even when disability is low. Understanding the perspectives of pwMS \non interventions aiming to improve PA is important to inform the development \nof such services. The aim of \nthis study was to explore the experiences \nof pwMS participating in an outdoor, high-intensity and balance exercise \ngroup intervention. \nMethods: This qualitative study was nested within an RCT exploring a novel \nintervention integrating sensorimotor exercises with high-intensity intervals of \nin-depth interviews with the intervention group \nrunning/walking. \n(n = 15; 12 women, 3 men; age 38–66; EDSS score 0–3.5) were conducted \npostintervention (mean days = 14), analyzed using a phenomenological- \ninspired approach with systematic text condensation, and interpreted based on \nenactive theory. \nResults: Four categories were generated: (1) Exploration of one’s own physical \nabilities: Challenging one’s own limits was perceived by all participants to \nimprove movement performance and/or intensity level. Such bodily changes \nengendered strong positive feelings. Some negative consequences of high- \nintensity training were described, increasing a feeling of loss. (2) New insights \nand beliefs: Participants experienced enhanced beliefs \nin their own \ncapabilities, which they integrated in activities outside the intervention. (3) An \nengaging environment: The group setting was perceived as supportive, and \nthe outdoor environment was perceived as stimulating activity. (4) Professional \nleadership, \ntailoring and co-creation of enjoyment: Physiotherapist-led, \nindividualized interactions were regarded as necessary to safely revisit prior \nactivities, such as running. Co-creating enjoyment facilitated high-intensity \ntraining and intervention adherence. \n\nIndividual, ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed13.pdf" + "text": "", + "page_start": 6, + "page_end": 6, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "trust \n\nparticipants \nindividually was described as important from this perspective. In \nin which the physiotherapist \nparticular, bodily interactions \ndemonstrated with his or her own body or placed his or her \nhands on the participant’s body to correct a movement were \nreported to be successful, as it helped to increase speed and gave \nparticipants a sense of performing better or for a longer duration. \nIf they did an exercise in a suboptimal way, participants reported \nreceiving precise supervision, or if they expressed pain or were \ninjured, the physiotherapist was supportive, assessed them and ", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed13.pdf" + "text": "", + "page_start": 6, + "page_end": 6, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "Individuals with undiagnosed respiratory symptoms, \ndetermined to have asthma or COPD through \nspirometry, experience poor health status.28 Therefore, \nthe implementation of known treatment approaches for \nasthma or COPD is important to improve their \nconditions.29 In contrast, those with normal spirometry \nor PRISm face unclear treatment approaches. Long- \nacting BD therapy in symptomatic individuals with \ntobacco exposure with normal spirometry is not \neffective.30 Weight management programs may be useful \nfor individuals who are obese with PRISm-related \ndyspnea; however, this awaits definitive clinical trials.31 In conclusion, our study measured dyspnea impact in \nindividuals with no preexisting diagnosis of lung disease \nwho reported respiratory symptoms as part of a \npurposeful case finding strategy. Individuals with PRISm \nexhibited the greatest impact of dyspnea, even higher \nthan those newly diagnosed with asthma or COPD. \nAfter adjusting for patient factors, comorbidities, \npulmonary diseases, and severity of lung physiologic \nimpairment, most of the variability in dyspnea remained \nunexplained. We also showed that dyspnea was \nassociated with increased health care utilization, \nimpaired quality of life, and work productivity. ", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed6_cc4.pdf" + "text": "", + "page_start": 321, + "page_end": 321, + "source_file": "00-80T-80.pdf" }, { - "text": "“Yes” responses were followed by questions regarding \nthe quantity of services utilized (i.e. number of opioid \npainkillers, number of diagnostic tests or number of \nemergency room visits). All utilization questions were \nanswered on a categorical scale (0, 1, 2–5, 5–10, or > 10) \nindicating the quantity of a particular service received \nduring the applicable follow-up timeframe. At 6-month \nfollow-up, study participants reported their use of ser- \nvices for the previous 2 months, allowing a timeframe of \n4 months from initial evaluation for them to complete \nphysical therapy. At 12-month follow-up, study partici- \npants reported their use of services over the previous \n6 months since their last survey. This method provided \nan 8-month overall follow-up period after physical ther- \napy and two follow-up points were included to minimize \nrecall bias. \n\nIntervention \nAll physical therapy treatment was provided at the discre- \ntion of the treating clinician. The duration of the episode, \nthe number of physical therapy visits, and individual treat- \nment parameters (type, \nfrequency) \nwere not collected for pragmatic reasons. In particular, \nclinical and utilization data are not commonly collected in \na standardized format and would need to be extracted \nfrom disparate medical record databases across different \nhealth care systems to assess treatment. This was not feas- \nible given the scope and design of \nthis multisite \nsurvey-based study. However, instead of coding treatment \ntype we included baseline-to-4 week change in pain inten- \nsity, region-specific disability, and OSPRO-YF scores in \neach model as measures of treatment response. In that \nmanner the individual effects of the treatment received \nwere included in the predictive models, without directly \naccounting for the type of treatment. \n\nintensity, duration, ", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed5.pdf" + "text": "", + "page_start": 321, + "page_end": 321, + "source_file": "00-80T-80.pdf" }, { - "text": "(eg, climate, air quality/industrialization, socioeconomic \nstatus) of the catchment population tend to vary across \nstudy sites. \n\nApproximately 65% of the variability in dyspnea \nremained unexplained by the factors examined in our \nstudy. Most individuals in our study showed normal \nspirometry results but still carried a substantial \nburden of dyspnea, an inconsistency that needs \nexplanation. Several factors not included in our \nanalysis may have contributed to the unexplained \nvariation. Environmental factors (eg, air pollution, \nallergen exposure, seasonal variations in symptoms) \nare potential contributors to this unexplained \nvariability.22 Genetic predispositions could also play a \nsignificant role, as suggested by a study that revealed \nthat parents with dyspnea were 1.8 times more likely \nto have offspring with dyspnea.23 Additionally, fitness \ncould be a contributing factor, especially in \nindividuals with undiagnosed PRISm, asthma, or \nCOPD who may restrict their activities to avoid \ndyspnea, and hence become deconditioned.6 \n\nDyspnea is a complex, subjective symptom that is \nmodified by nonrespiratory factors including \npsychosocial, social, and environmental influences.5 \nInterindividual variability in the perception of dyspnea, \ninfluenced by these nonrespiratory factors, may play an \nimportant role. A study conducted by Ziegler et al24 \nassessed the perception of dyspnea in 42 healthy \nindividuals using a standardized inspiratory resistive \nloading stimulus. The study used the modified Borg \nscale to measure dyspnea perception levels. Among the \nparticipants subjected to the same inspiratory resistive \nload, 31%, 45%, and 24% of participants classified their \nlevel of dyspnea as low, intermediate, and high, \nrespectively. The study revealed that differences between \nindividuals contribute considerable variability to the \nperception of dyspnea, even among healthy participants. ", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed6_cc4.pdf" + "text": "", + "page_start": 321, + "page_end": 321, + "source_file": "00-80T-80.pdf" }, { - "text": "A second limitation is that we did not know about the \nsubjects’ prior experiences with physical \ntherapy, or \nwhether they arrived at physical therapy through direct \naccess or referral from another provider. These factors \ncould be associated with treatment expectations, which \nhave known effects on treatment outcomes [52, 53]. We \nalso did not collect specific information on treatment. \nBut by including changes \nin pain, disability, and \npain-related psychological distress in the models, we \nwere able to account for treatment response. The benefit \nof this approach is that models are generalizable for pre- \ndicting utilization outcomes across “real-world” prag- \nmatic \ntreatment \nvariation is expected. The drawback is that we are pro- \nhibited from making conclusions regarding which char- \ninfluence \nacteristics of \nsubsequent pain-related healthcare utilization. Important \ncharacteristics to consider would include number of \nvisits, type of interventions or whether patients com- \npleted their course of physical therapy. These have been \nproposed or identified as important contributors to \ndownstream costs following physical therapy [54, 55] \nand may be a source of unexplained variance in our \nmodels. Characteristics of the clinical encounter should \nbe considered in future studies to refine the prediction \nmodels developed in our analyses. \n\nphysical therapy settings where ", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed5.pdf" + "text": "", + "page_start": 6, + "page_end": 6, + "source_file": "Excel Training Manual 1.pdf" } ] }, @@ -7709,70 +7709,70 @@ "target_page": 4, "target_passage": "The inclusion criteria were as follows: had been diagnosed with MS, had a score on the Expanded Disability Status Scale (EDSS) (29) of ≤3.5, was ≥18 years, was employed (10%–100% of full-time) and residential address in the two predefined municipalities", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 391, + "page_end": 391, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 14, + "page_end": 14, + "source_file": "NASDAQ_FFIN_2002.pdf" }, { - "text": "Prior to recruitment, the study was introduced to individuals \nwith multiple sclerosis (pwMS) through a seminar hosted by the \nNordland MS Association. Additionally, \nseminars were \nconducted for health professionals in community healthcare and \nat the regional hospital. Written information about this study \n(and the RCT) was sent from the MS clinic at the regional \nto all eligible individuals affiliated with the \nhospital by post \nIndividuals who wished to participate signed the \nhospital. \nattached consent \nin the pre-stamped \nfollows: had been \nenvelope. The inclusion criteria were as \ndiagnosed with MS, had a score on the Expanded Disability \nStatus Scale (EDSS) (29) of ≤3.5, was ≥18 years, was employed \n(10%–100% of \nfull-time) and residential address in the two \npredefined municipalities. The exclusion criteria were as follows: \npregnancy, exacerbation of symptoms within two weeks prior to \nenrollment and other serious conditions compromising balance, \nwalking or work capacity. All participants in the intervention \ngroup of the RCT (n = 15) were included (Table 3). \n\nform and returned it ", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed13.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "physical \n09593985.2014.1002873 \ntherapy. Physiother Theory Pract. \n\n31. Russell N, Gallagher S, Msetfi RM, Hayes S, Motl RW, Coote S. Experiences of \npeople with multiple sclerosis participating in a social cognitive behavior change \nphysical activity intervention. Physiother Theory Pract. (2022) 39(5):1–9. doi: 10. \n1080/09593985.2022.2030828 \n\n46. Anens E, Zetterberg L, Urell C, Emtner M, Hellström K. Self-reported \nphysical \na \ncross-sectional study. BMC Neurol. (2017) 17(1):204. doi: 10.1186/s12883-017- \n0981-4 \n\nactivity correlates in Swedish adults with multiple sclerosis: \n\n32. Smith M, Neibling B, Williams G, Birks M, Barker R. Consumer experience \nof a flexible exercise participation program (FEPP) for individuals with multiple \nsclerosis: a mixed-methods study. Physiother Res Int. (2021) 26(4):e1922. doi: 10. \n1002/pri1922 \n47. Herring TE, Knowles LM, Alschuler KN. Outdoor adventure programs for \npersons with multiple sclerosis: a review and agenda for future research. Int J MS \nCare. (2021) 23(4):186–92. doi: 10.7224/1537-2073.2020-066 \n\n33. Shumway-Cook A, Woollacott MH, Rachwani J, Santamaria V. Motor Control: \nTranslating Research into Clinical Practice. 6th ed. Philadelphia: Wolters Kluwer \nHealth (2023). \n48. Creswell JW, Poth CN. Qualitative Inquiry & Research Design: Choosing Among \nFive Approaches. 4th ed. California: Sage (2018). ", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed13.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "in a \nDiscussion: High-intensity training combined with detailed exercises \nphysiotherapy outdoor group was perceived to create meaningful bodily changes \nand enhance PA and prospects for both PA and life. Importantly, however, some \nnegative experiences were also reported from the high-intensity training. Enactive \nthe importance of \nthe illumination of new perspectives: \ntheory allowed for \nembodiment for self-efficacy and of tailored physiotherapy and an outdoor-group \nenvironment for exploring one’s own limits to physical capabilities. These aspects \nshould inform future exercise interventions in pwMS with low disability. \n\nKEYWORDS \n\nphysical activity, physiotherapy, multiple sclerosis, qualitative study, exercise therapy, \npostural balance, enactive theory ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed13.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "| Week 1: MS outpatient\nclinic | Consultation with the MS nurse (20 min) to address work-related issues based on a structured guide comprising the following themes: knowledge\nof MS at the workplace, experienced work-related challenges due to MS, potential needs and facilitators. |\n|---|---|\n| Week 1: MS outpatient clinic | Consultation with the MS nurse (20 min) to address work-related issues based on a structured guide comprising the following themes: knowledge of MS at the workplace, experienced work-related challenges due to MS, potential needs and facilitators. |\n| | Physiotherapy assessment (60 min) to explore the potential for changes in balance and walking aiming to turn focus toward possibilities and thus, motivate the patient. |\n| | Based on these assessments the MS nurse and the physiotherapist indicated the aspects of importance on a standardized form to inform the municipal physiotherapist. |\n| | Standardized testing (baseline, for the RCT). |\n| Week 2–5: Municipality | Physiotherapy assessment (60–90 min) to explore the patient’s impairments and potential for improvements in a clinical examination prior to group-training. |\n| | Indoor group (60 min × 2 weekly, for 4 weeks). There were three to five participants in each group and one physiotherapist. Trunk control, balance and physical activity were addressed (GroupCoreDIST). Participants received a link to CoreDIST digital exercise-videos and were advised to do them 1 × weekly throughout the intervention. (videos can be accessed here: https://www.nord.no/en/node/35,098) |\n| | Digital meeting with a multidisciplinary team (pwMS, employer, physiotherapist & MS nurse) (20 min) regarding barriers to work participation and needs for adaptations regarding work and physical activity, according to a structured meeting-guide (one meeting). |\n| Week 6 | Standardized testing (midway, for the RCT). |\n| Week 7–10: Municipality | Outdoor group (60 min × 2 weekly, for 4 weeks). A maximum of ten participants and two physiotherapists were included in each group. Trunk control and balance (GroupCoreDIST exercises) were addressed, and high-intensity walking or running was performed. The intervention was conducted in a city park where both flat and uneven surfaces and hilly terrain were available (Table 2). |\n| | Additionally, participants were encouraged to comply with the exercise-videos through a weekly SMS-reminder. |\n| Week 11–14 | Standardized testing (final, for the RCT) and qualitative interviews. |\n", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed13.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "Enjoyment has previously been reported to promote PA \nin pwMS, and our study brings requested knowledge of what \nin an exercise intervention (46): \ncan constitute enjoyment \nplayful group-exercise tasks, a cheerful physiotherapist, and the \noutdoor environment. \n\nThe appreciation of being active outdoors in the study sample \naligns with that in the general population (47). The outdoors \nprovided a natural environment, which both invited participants to \nactively explore abilities thought of as left behind after their \ndiagnosis with MS, such as running, and provided an appreciated \nbreak from focusing on MS symptoms. We also suggest that the \npositive \nchallenging weather \nconditions and the added meaning of exercising among other \npeople in the city park can be explained according to such terms. \nThese positive experiences show how we are enmeshed in our \nhistory, context and social encounters (35) and how these aspects \nshould also be accounted for when designing exercise interventions. \n\nexperiences of mastering the ", + "text": "", "page_start": 9, "page_end": 9, - "source_file": "pubmed13.pdf" + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "The way the physiotherapists led the group and, in particular, \ninteracted with each participant were regarded as helpful \nfor \nimproving their bodily functions and activity levels. Some \nparticipants reported being afraid to try out new activities or \ntraining at high intensities after being diagnosed with MS but felt \nsafe to explore when supervised by the physiotherapist because of \nin the relationship between them and in the \ntheir \nphysiotherapist’s professional knowledge. \n\nI have simply been taught some tools to improve certain parts of \nmy body and how that has an effect on, for example, walking: \nThat my hip has to be with me to maintain balance—and that \nmakes how I stand on the ground important. Previously I was \nnot aware of that…., now everything works better. (ID6, EDSS: 2) \n\nTwo participants reported that the intervention motivated \nthem to commit to new exercise routines, and some stated that \nthey had more “readiness” for activities such as playing with \ntheir grandchildren, hiking with friends, or engaging in a high- \nintensity activity. Some stated that their bodily changes were \nperhaps not noticeable for others, but they themselves noticed \nthat it was easier to climb stairs, balance on one leg and walk \nfast or that they now moved in a “better way” or with less pain. \nThree participants perceived the duration of the outdoor group \nto be too short to feel \nlasting improvements in their physical \nendurance or muscular strength. \n\nHow the physiotherapist approached the ", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed13.pdf" + "text": "", + "page_start": 118, + "page_end": 118, + "source_file": "00-80T-80.pdf" }, { - "text": "community healthcare in the two municipalities. The project team \nincluded three individuals representing users from the Nordland \nMS Association, along with an MS nurse and a neurologist from \nthe MS-outpatient clinic, and three physiotherapists/ researchers. \n\nTABLE 3 Participant demographic information. \n\n| Variable | Total (n = 15) |\n|---|---|\n| Variable | Total (n = 15) |\n| Age in years | Mean 47.6 (SD 6.04) |\n| Gender (women/men) | 12 woman/3 men (80%/20%) |\n| Type of MS | Relapsing remitting 15 (100%) |\n| EDSS | Mean 1.8 (SD 0.9) |\n| Years since diagnosis | Mean 10.4 (SD 7.8) |\n| Participation in the outdoor group | Mean 4.6 sessions/total mean attendance 57.3% |\n\n\n2.4 Research team and reflexivity \n\nin \nneurological physiotherapy. BN and ECA developed the \nCoreDISTparticipation intervention, and SSHD contributed to \nthe development of the outdoor part. \n\nAll researchers on the team are clinical specialists \n\nThe researchers’ closeness to the intervention and the \nclinical field may have strengthened the depth and relevance \nof their interpretations in this study (27), as it was easy to \nunderstand what participants described and helped form \nfollow-up questions during the interviews. However, closeness \nmay also produce a risk of “blind spots”, as the researchers \nmay prejudice participants’ experiences, omitting questions \nwhere the answers are believed to be obvious (27). Thus, \nand rigor were \nthe process, \nthroughout \nenhanced by discussing \nand \ninterpretations with external researchers (including specialists \nin enactive theory), as well as user \nrepresentatives. The \nframework (enactive theory) enhanced \npresented theoretical \nthe distance to the material, as recommended in qualitative \nresearch (28). ", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed13.pdf" + "text": "", + "page_start": 396, + "page_end": 396, + "source_file": "sg246915.pdf" }, { - "text": "Background and purpose: Physical activity (PA) is often reduced in people with \nMS (pwMS), even when disability is low. Understanding the perspectives of pwMS \non interventions aiming to improve PA is important to inform the development \nof such services. The aim of \nthis study was to explore the experiences \nof pwMS participating in an outdoor, high-intensity and balance exercise \ngroup intervention. \nMethods: This qualitative study was nested within an RCT exploring a novel \nintervention integrating sensorimotor exercises with high-intensity intervals of \nin-depth interviews with the intervention group \nrunning/walking. \n(n = 15; 12 women, 3 men; age 38–66; EDSS score 0–3.5) were conducted \npostintervention (mean days = 14), analyzed using a phenomenological- \ninspired approach with systematic text condensation, and interpreted based on \nenactive theory. \nResults: Four categories were generated: (1) Exploration of one’s own physical \nabilities: Challenging one’s own limits was perceived by all participants to \nimprove movement performance and/or intensity level. Such bodily changes \nengendered strong positive feelings. Some negative consequences of high- \nintensity training were described, increasing a feeling of loss. (2) New insights \nand beliefs: Participants experienced enhanced beliefs \nin their own \ncapabilities, which they integrated in activities outside the intervention. (3) An \nengaging environment: The group setting was perceived as supportive, and \nthe outdoor environment was perceived as stimulating activity. (4) Professional \nleadership, \ntailoring and co-creation of enjoyment: Physiotherapist-led, \nindividualized interactions were regarded as necessary to safely revisit prior \nactivities, such as running. Co-creating enjoyment facilitated high-intensity \ntraining and intervention adherence. \n\nIndividual, ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed13.pdf" + "text": "", + "page_start": 118, + "page_end": 118, + "source_file": "00-80T-80.pdf" } ] }, @@ -7789,64 +7789,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 388, + "page_end": 388, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, + "text": "", + "page_start": 50, + "page_end": 50, "source_file": "Excel Training Manual 1.pdf" }, { - "text": "In 2004, Santos continued its \nnormal business of actively \nmanaging its portfolio through \nthe divestment of non-core assets \nand the acquisition of assets that \nfit well with existing Santos \nassets or can add to the ability \nof the Company to meet its \nstrategic goals. \n\nPetroleum Australia Ltd, raising \napproximately $10.6 million. \n\nEarly in the second half of 2004, \nSantos concluded the sale of its \nnon-core onshore Otway Basin \ninterests to Origin Energy for \n$25.75 million. This sale \nresulted in an after-tax profit \nof $18 million that was booked \nin 2004. \n\nAs a result of this activity, \nSantos realised an after-tax profit \nof $47.4 million on oil and gas \nasset sales and will continue to \nhigh-grade its portfolio on an \nongoing basis. \n\nLate in the year, Santos sold its \n18.02% share in the Carpentaria \nGas Pipeline between Ballera \nand Mount Isa in Queensland \nto Australian Pipeline Trust for \n$59 million, resulting in a \n$21 million after-tax profit \nthat was booked in the 2004 \nfinancial year. ", - "page_start": 25, - "page_end": 25, - "source_file": "ASX_STO_2004.pdf" + "text": "", + "page_start": 50, + "page_end": 50, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "**MALEO NEGOTIATIONS**\n**ADVANCED**\nOutside Australia, Santos and \nits co-venturers have executed \na Heads of Agreement for the \nsale of the entire gas reserves \nof the Maleo field offshore East \nJava, Indonesia. Santos continued \nnegotiations with PT Perusahaan \nGas Negara, Indonesia’s state- \nowned gas distributor, on behalf \nof the joint venture to finalise \nthe Gas Sales Agreement. The \nproject is targeting first \nproduction in the first half of \n2006 at rates of up to 100 \nmmcf/d for more than five years. \n\nsubsidiary, Santos Direct Pty Ltd \n(‘Santos Direct’). \n\nThe move to market and sell gas \ndirectly into the Victorian retail \nmarket is a first for Santos and \nleverages off Santos’ position as \none of Australia’s largest gas \nproducers, supplying wholesale \ngas to major industrial customers \nand specialist marketers in all \nmainland Australian states and \nterritories. \n\n**FIRST RETAIL GAS SALES WITH**\n**SANTOS DIRECT**\nAs well as selling gas into the \nwholesale gas market, Santos \nsecured a retail gas licence from \nthe Victorian Government in \n2004. This allows Santos to sell \ngas direct to industrial customers \nand into the Victorian spot \nmarket through a wholly-owned ", - "page_start": 23, - "page_end": 23, - "source_file": "ASX_STO_2004.pdf" + "text": "", + "page_start": 50, + "page_end": 50, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "Santos has been recognised for \nits achievements in this area. \nSantos’ 2003 Annual Report \nwas featured as an example \nof best practice reporting in \nPricewaterhouseCoopers’*Trends*\n*in Corporate Reporting 2004*\npublication. Reports from \ncompanies worldwide are \nconsidered in compiling this \npublication and they must \nmeet specified criteria. This is \nthe third time a Santos annual \nreport has been featured. Santos \nwas also awarded a 2004 Silver \nAward for Excellence in Annual \nReporting for the 2002 Annual \nReport by the Australasian \nReporting Awards. \n\n**POSITIONING THE WORKFORCE**\n**FOR THE FUTURE**\nSantos commenced a major \ncompany-wide transformational \nchange program in late 2003. \nThe program was designed to \nsignificantly improve Santos’ \nperformance in four areas: key \nbusiness processes, financial \nperformance, organisation \nstructure and company culture. \n\nFurther improvements were also \nmade with the implementation \nof the Environment, Health and \nSafety Management System \nstandards, with Santos operations \nundergoing full assessments \nagainst standards for the \nfirst time. \n\nReorganising and simplifying the \nCompany’s structure was one of \nthe major outcomes and in May \n2004 Santos began operating \nunder a new functionally-based \norganisation structure. ", - "page_start": 28, - "page_end": 28, - "source_file": "ASX_STO_2004.pdf" + "text": "", + "page_start": 195, + "page_end": 195, + "source_file": "00-80T-80.pdf" }, { - "text": "**22. Investments in Controlled Entities**\n\n**Name**\n**Place of**\n**incorporation**\n**Name**\n\nSA \n\nSantos Brantas Pty Ltd3 \nSantos (Donggala) Pty Ltd3 \nSantos Egypt Pty Ltd3 \nSantos Hides Ltd \nSantos International Operations Pty Ltd \nSantos (Madura Offshore) Pty Ltd \nSantos Niugini Exploration Limited \nSantos (Nth Bali 1) Pty Ltd \nSantos (Papalang) Pty Ltd \nSantos (Popodi) Pty Ltd \nSantos (JPDA 91-01) Pty Ltd \nSantos (JPDA 91-12) Pty Ltd \nSantos (NGA) Pty Ltd \nSantos (N.T.) Pty Ltd \n*Controlled entity of Santos (N.T.) Pty Ltd*\nBonaparte Gas & Oil Pty Limited \n\nVIC \nVIC \nQLD \nNSW \nNSW \nNSW \nQLD \nNSW \nWA \n\nVIC \nQLD \nVIC \nNSW \nQLD \n\nSantos Offshore Pty Ltd \nSantos Oil Exploration (Malaysia) Sdn Bhd (in liquidation) \nSantos Petroleum Pty Ltd \nSantos QNT Pty Ltd \n*Controlled entities of Santos QNT Pty Ltd*\nSA \nSA \nQLD \nNSW ", - "page_start": 72, - "page_end": 72, - "source_file": "ASX_STO_2004.pdf" + "text": "", + "page_start": 50, + "page_end": 50, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "A one US cent movement in the \nAustralia–US dollar exchange rate \nwould produce a change in profit \nafter tax of A$8 million, and \na 1% change in interest rates \nequates to a change in net profit \nafter tax of A$9 million. \n\n**A STRONG FINANCIAL**\n**PERFORMANCE**\nIt was pleasing that Santos \nwas able to conclude 2004 \non a higher note than it started. \n2004 has also been an important \nperiod for shareholders, with a \nsignificant improvement in the \nSantos share price combined with \nan increase in the dividend. \n\nWe achieved record annual \nrevenue thanks to higher oil and \ngas prices combined with the \nreturn of full production at \nMoomba to produce a 21.5% jump \nin second half sales: the best \nresult for any six-month period \nin Santos' history. \n\nThe average realised price for \ncrude oil was up nearly 19% \nto A$51.83 per barrel. ", - "page_start": 7, - "page_end": 7, - "source_file": "ASX_STO_2004.pdf" + "text": "", + "page_start": 195, + "page_end": 195, + "source_file": "00-80T-80.pdf" }, { - "text": "Santos will continue with a high \ndevelopment expenditure in 2005, \nbut expects to spend more in line \nwith cash generation. Exploration \nspend is estimated to be about \n$150 million, while development \nspend is expected to be reduced \nto $530 million and delineation \nto $90 million. Other capital \nspending is expected to be \nreduced to $80 million. \n\n**DEPRECIATION, DEPLETION AND**\n**AMORTISATION**\nAll things being equal, DD&A \ncould have been expected to \nbe lower this year, as Santos \nproduced lower volumes and had \nwritten off the Heytesbury plant \nin the onshore Otway Basin \nlast year. \n\n**CASH FLOW LOWER**\nWhile Santos had a strong profit \nyear, this is not fully reflected in \ncash flows. \nThis results in a total planned \ncapital expenditure for 2005 of \napproximately $850 million. \n\n**FINANCIAL FLEXIBILITY INTACT**\nSantos ended the year in a \nstrong financial position with its \nfinancial flexibility intact, despite \nthe record development spending. \n\nThe FUELS issue was successful \nand Santos’ gearing increased \nonly marginally, despite the large \ncapital program in 2004. \n\nHowever, two factors caused an \nincrease in 2004 DD&A. Firstly, \nwhile reserve revisions were \npositive overall, negative \nrevisions were predominantly in \nproducing areas which increased \ndepletion rates in 2004, while \npositive reserve revisions were in \nareas where Santos is not yet \nproducing or where straight line \ndepreciation is dominant; for \nexample, Casino and John \nBrookes. ", - "page_start": 13, - "page_end": 13, - "source_file": "ASX_STO_2004.pdf" + "text": "", + "page_start": 195, + "page_end": 195, + "source_file": "00-80T-80.pdf" }, { - "text": "Santos QNT (No. 1) Pty Ltd \n*Controlled entities of Santos QNT (No. 1) Pty Ltd*\nSantos Petroleum Management Pty Ltd \nSantos Petroleum Operations Pty Ltd \nTMOC Exploration Proprietary Limited \n\nACT \nACT \nSA \nSA \nNSW \nWA \nACT \n\nSantos QNT (No. 2) Pty Ltd \n*Controlled entities of Santos QNT (No. 2) Pty Ltd*\n\nAssociated Petroleum Pty Ltd \nMoonie Oil Pty Ltd \nPetromin Pty Ltd \nSantos (299) Pty Ltd \nSantos Exploration Pty Ltd \nSantos Gnuco Pty Ltd \nTransoil Pty Ltd \nSantos Resources Pty Ltd \nSantos Timor Sea Pipeline Pty Ltd \nSesap Pty Ltd2 \nVamgas Pty Ltd \nBarracuda Limited \nLavana Limited \nNovus UK (Kakap 2) Limited2 \nPeko Offshore Ltd \nSanro Insurance Pte Ltd \nSantos Americas and Europe Corporation \n*Controlled entity of Santos Americas and Europe Corporation*\nPNG \nPNG \nUK \nBER \nSING \nUSA \n\nSantos USA Corp \nSantos (Bawean) Pty Ltd USA \nSA ", - "page_start": 72, - "page_end": 72, - "source_file": "ASX_STO_2004.pdf" + "text": "", + "page_start": 195, + "page_end": 195, + "source_file": "00-80T-80.pdf" }, { - "text": "of opportunities to use fewer \ngreenhouse-emitting or renewable \nsources of energy. \n\nPartnerships continued in 2004 \nwith the Australian School of \nPetroleum, the Adelaide Symphony \nOrchestra, the State Opera \nCompany of South Australia, the \nArt Gallery of South Australia and \nthe Lloyd McDermott Foundation. \n\nTo achieve these commitments \nSantos is actively pursuing an \nemissions intensity reduction \ntarget (greenhouse emissions \nper unit of production) of 20% \nin the period from 2002 to 2008. \n\n**CORPORATE GOVERNANCE**\nFor the third year running, the \nintegrity of Santos’ corporate \ngovernance was recognised in \n2004 with the maximum five-star \nrating in the Corporate \nGovernance Research Report \nprepared by Horwath and the \nUniversity of Newcastle. \n\nOne of the highlights of the 2004 \nprogram was the establishment \nof the Santos Community Fund. \nIt brings together all of the \ncontributions Santos makes to \ncommunity-based organisations \nand recognises and supports the \nefforts of Santos employees who \nchoose to contribute their own \ntime and resources to improving \ntheir communities. \nA more detailed overview of \ncorporate governance at Santos \nfollows on page 29 of this \nAnnual Report. ", - "page_start": 30, - "page_end": 30, - "source_file": "ASX_STO_2004.pdf" + "text": "", + "page_start": 50, + "page_end": 50, + "source_file": "Excel Training Manual 1.pdf" } ] }, @@ -7857,70 +7857,70 @@ "target_page": 2, "target_passage": "The nonvanishing neutrino masses have been confirmed by various neutrino oscillation phenomena and indicate the evidence of new physics beyond the Standard Model.", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 120, + "page_end": 120, + "source_file": "00-80T-80.pdf" }, { - "text": "The nonvanishing neutrino masses have been confirmed by various neutrino oscillation \n\nphenomena and indicate the evidence of new physics beyond the Standard Model. The most \n\nattractive idea to naturally explain the tiny neutrino masses is the seesaw mechanism [1], in \n\nwhich the right-handed (RH) neutrinos singlet under the SM gauge group are introduced. \nU(1)Y × \nL model based on the gauge group SU(3)C × \nL [2] is an elegant and simple extension of the SM, in which the RH neutrinos of \n\nThe minimal gauged U(1)B \nSU(2)L × \n− \n\nU(1)B \n− \n\nthree generations are necessarily introduced because of the gauge and gravitational anomaly \n\nIn addition, the mass of RH neutrinos arises associated with the U(1)B cancellations. L \n− \n\ngauge symmetry breaking. \n\nAlthough the scale of the B L gauge symmetry breaking is basically arbitrary as long as \n− \n\nphenomenological constraints are satisfied, one interesting option is to take it to be the TeV \n\nscale [3]. It has been recently pointed out [4] that when the classical conformal invariance ", - "page_start": 2, - "page_end": 2, - "source_file": "1002.2525.pdf" + "text": "", + "page_start": 120, + "page_end": 120, + "source_file": "00-80T-80.pdf" }, { - "text": "The mass of the new neutral gauge boson Z ′ arises by the U(1)B L gauge symmetry \n− \n\nbreaking, \n\nM 2 \nZ ′ = 4g2 \nB \n2. \nLv′ \n(10) \n− \n\nAssociated with the U(1)B L gauge symmetry breaking, the RH neutrinos Ni acquire masses \n− \n\nv′ \n√2 \nMNi = \n(11) \n\nFrom LEP experiment, the current lower bound on the Z ′ boson mass has been found to \n\nbe [10, 11] \n\nMZ ′ \ngB \n= 2v′ & 6 7 TeV. (12) \n− L \n− \n\nTwo Z2-even RH neutrinos N1 and N2 are responsible for light neutrino masses via the \n\nseesaw mechanism, \n\nv2 \n2MNi \nmναβ = yαiyiβ . (13) \n\n− Xi=1,2 \nNote that the rank of this mass matrix is two, so that the lightest neutrino is massless. ", - "page_start": 4, - "page_end": 4, - "source_file": "1002.2525.pdf" + "text": "", + "page_start": 120, + "page_end": 120, + "source_file": "00-80T-80.pdf" }, { - "text": "Note that two RH neutrinos are enough to reconcile with the observed neutrino oscillation \n\ndata, with a prediction of one massless light neutrino. Therefore, without introducing any \n\nadditional new dynamical degrees of freedom, the DM particle arises in the minimal gauged \n\nU(1)B L model. \n− \n\nThe paper is organized as follows. In the next section, we briefly describe our model. In \n\nsection III, we estimate the thermal relic density of the RH neutrino and identify the model ", - "page_start": 2, - "page_end": 2, - "source_file": "1002.2525.pdf" + "text": "", + "page_start": 120, + "page_end": 120, + "source_file": "00-80T-80.pdf" }, { - "text": "is imposed on the minimal U(1)B L model, the symmetry breaking scale appears to be the \n− \n\nTeV scale naturally. If this is the case, all new particles, the Z ′ gauge boson, the B L \n\n− \nL gauge Higgs boson H and the RH neutrinos appear at the TeV scale unless the U(1)B \n− \n\ncoupling is extremely small, and they can be discovered at Large Hadron Collider [5–8]. \n\nThen we may be able to understand the relation between the gauge symmetry breaking and \n\nthe origin of neutrino masses. \n\nAlthough such a TeV scale model is interesting and appealing, one might think that the \n\nabsence of dark matter (DM) candidate is a shortcoming of this model. A sterile RH neutrino \n\nwith mass of the order of MeV is one possibility [9]. In this paper, we propose a very simple \n\nidea to introduce the DM candidate in the minimal gauged U(1)B L model. We introduce \n− \n\nthe Z2 parity into the model and impose one of three RH neutrinos to be odd, while the \n\nothers even. In this way, the Z2-odd RH neutrino becomes stable and the DM candidate. ", - "page_start": 2, - "page_end": 2, - "source_file": "1002.2525.pdf" + "text": "", + "page_start": 120, + "page_end": 120, + "source_file": "00-80T-80.pdf" }, { - "text": "We have proposed a scenario of the RH neutrino dark matter in the context of the minimal \n\ngauged U(1)B L model. We have introduced a discrete Z2 parity in the model, so that one \n− \n\nRH neutrino assigned as Z2-odd can be stable and, hence, the DM candidate, while the other \n\ntwo RH neutrinos account for neutrino masses and mixings through the seesaw mechanism. \n\nNo additional degrees of freedom are necessary to be added. We have evaluated the relic \n\ndensity of the dark matter particle. The dominant annihilation modes are via the Higgs \n\nboson exchange processes in the s-channel and thus, our model can be called Higgs portal \n\nDM model. It has been found that the relic density consistent with the current observation \n\n8 ", - "page_start": 8, - "page_end": 8, - "source_file": "1002.2525.pdf" + "text": "", + "page_start": 24, + "page_end": 24, + "source_file": "NASDAQ_FFIN_2002.pdf" }, { - "text": "Osamu Seto† \n\nDepartment of Architecture and Building Engineering, \n\nHokkai-Gakuen University, Sapporo 062-8605, Japan \n\nAbstract \n\nWe propose a scenario of the right-handed neutrino dark matter in the context of the minimal \n\ngauged U (1)B L model by introducing an additional parity which ensures the stability of dark \n− \n\nmatter particle. The annihilation of this right-handed neutrino takes place dominantly through the \n\ns-channel Higgs boson exchange, so that this model can be called Higgs portal dark matter model. \n\nWe show that the thermal relic abundance of the right-handed neutrino dark matter with help of \n\nHiggs resonance can match the observed dark matter abundance. In addition we estimate the cross \n\nsection with nucleon and show that the next generation direct dark matter search experiments can \n\nexplore this model. ", - "page_start": 1, - "page_end": 1, - "source_file": "1002.2525.pdf" + "text": "", + "page_start": 23, + "page_end": 23, + "source_file": "NASDAQ_FFIN_2002.pdf" }, { - "text": "II. THE MINIMAL GAUGED U (1)B L MODEL WITH Z2 PARITY \n− \n\nThe model is based on the gauge group SU(3)C × SU(2)L × U(1)Y × \nU(1)B L. Additional \n\n− \nL, a SM singlet \nfields besides the standard model fields are a gauge field Z ′µ of the U(1)B \n− \n\nB L Higgs boson Ψ with two U(1)B L charge, and three RH neutrinos Ni which are \n− \n− \n\nnecessary for the gauge and gravitational anomaly cancellations. In describing the RH \n\nneutrinos, we use the four component representation of RH neutrino constructed from the \n\nWeyl spinor νRi, \n\nνRi \n\nNi ≡ \n, (1) \n  \n\nǫ ν∗Ri \n  \nFor the two RH neutrinos, N1 and N2, we assign Z2 parity even, while odd for N3, so that \n\nthe RH neutrino N3 is stable and, hence, the DM candidate. ", - "page_start": 3, - "page_end": 3, - "source_file": "1002.2525.pdf" + "text": "", + "page_start": 120, + "page_end": 120, + "source_file": "00-80T-80.pdf" }, { - "text": "The DM RH neutrino interacts with the SM particles through couplings with B L \n− \n\ngauge and B L Higgs bosons. Note that neutrino Dirac Yukawa interactions are absent \n− \n\nbecause of the Z2 parity. The most of annihilation of the RH neutrinos occurs via Z ′, H and \n\nh exchange processes in the s-channel. In practice, the dominant contributions come from \n\nthe Higgs (h and H) exchange diagrams, because the Z ′ exchange processes are suppressed \n\nL Higgs VEV v′ & 3 TeV. Thus, we obtain Higgs portal DM \nby the inverse square of the B \nof RH neutrino effectively. The relevant annihilation modes are the annihilation into f ¯f , \n\n− \n\nW +W −, ZZ, and h(H)h(H). Since RH neutrino DM couples to only B L Higgs Ψ while \n− \n\na SM particle does to SM Higgs Φ, the DM annihilation occurs only through the mixing \n\nbetween these two Higgs bosons. Although it is not so severe, the precision electroweak \n\nmeasurements [12] as well as the unitarity bound [13] give constraints on the mixing angle ", - "page_start": 5, - "page_end": 5, - "source_file": "1002.2525.pdf" + "text": "", + "page_start": 22, + "page_end": 22, + "source_file": "NASDAQ_FFIN_2002.pdf" } ] }, @@ -7937,63 +7937,63 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 209, + "page_end": 209, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 298, + "page_end": 298, + "source_file": "00-80T-80.pdf" }, { - "text": "and mass spectrum of the Higgs bosons. \n\nThe thermal relic abundance of DM \n\n109 mN /Td \n√g \nσv \nMP h \n\nΩN h2 = 1.1 1, GeV− (14) \n× \ni \n\nwith the Planck mass MP , the thermal averaged product of the annihilation cross section \n\nσv and the relative velocity , the total number of relativistic degrees of freedom in the \nh i \n\nthermal bath g , and the decoupling temperature Td, is evaluated by solving the Boltzmann \n∗ \n\nequation for the number density of RH neutrino nN ; \n\ndnN \ndt \n(n2 \nn2 \nEQ), \n+ 3HnN = σv \nN − −h i \n\nand the Friedmann equation \n\n2 \n\n˙a \na(cid:19) \n8π \n3M 2 \nP \n= \n≡ (cid:18) \n\nwith nEQ and a(t) being the equilibrium number density and the scale factor, under the \n\nradiation dominated Universe with the energy density ρ = ρrad [14]. \n\n5 ", - "page_start": 5, - "page_end": 5, - "source_file": "1002.2525.pdf" + "text": "", + "page_start": 298, + "page_end": 298, + "source_file": "00-80T-80.pdf" }, { - "text": "Fig. 1 shows the relic density ΩN h2 as a function of the DM mass mN for a set of \n\nparameters: (v′, Mh, MH, MZ ′, sin θ) = (4000 GeV, 120 GeV, 200 GeV, 1000 GeV, 0.7), for \n\nexample. Willkinson Microwave Anisotropy Probe measured the value of DM abundance as \n\nΩDM h2 \nonly near Higgs resonances, mN ≈ \n\n0.1 [15]. The figure shows that a desired DM relic abundance can be obtained for \n≃ \n\nMh/2 or MH /2. \n\nFig. 2 shows the relic density ΩN h2 as a function of the DM mass mN for a smaller Higgs \n\nmixing sin θ = 0.3 (others are the same as in Fig. 1). Compared with Fig. 1, for mN . MW \nwhere the DM particles dominantly annihilate into f ¯f , the relic density further increases \n\nbecause of the small mixing angle. When the DM is heavier, the annihilation mode into \n\nHiggs boson pairs is opened and the relic density slightly deceases, but the reduction is not \n\nenough to reach ΩN h2 \n≃ \n\n 1000 ", - "page_start": 6, - "page_end": 6, - "source_file": "1002.2525.pdf" + "text": "", + "page_start": 298, + "page_end": 298, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\ndensity ratio= ", - "page_start": 20, - "page_end": 20, + "text": "", + "page_start": 298, + "page_end": 298, "source_file": "00-80T-80.pdf" }, { - "text": "We have proposed a scenario of the RH neutrino dark matter in the context of the minimal \n\ngauged U(1)B L model. We have introduced a discrete Z2 parity in the model, so that one \n− \n\nRH neutrino assigned as Z2-odd can be stable and, hence, the DM candidate, while the other \n\ntwo RH neutrinos account for neutrino masses and mixings through the seesaw mechanism. \n\nNo additional degrees of freedom are necessary to be added. We have evaluated the relic \n\ndensity of the dark matter particle. The dominant annihilation modes are via the Higgs \n\nboson exchange processes in the s-channel and thus, our model can be called Higgs portal \n\nDM model. It has been found that the relic density consistent with the current observation \n\n8 ", - "page_start": 8, - "page_end": 8, - "source_file": "1002.2525.pdf" + "text": "", + "page_start": 150, + "page_end": 150, + "source_file": "00-80T-80.pdf" }, { - "text": "the dominant dynamic process, but does not allow one to probe this assumption. In Section III B \n\nwe show how one may develop a dynamical density functional theory (DDFT) that describes the \n\nsystem at a similar level to the KMC. However, the DDFT may also be easily extended to include \n\nother effects such as fluid diffusion, that the KMC does not incorporate. ", - "page_start": 9, - "page_end": 9, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 150, + "page_end": 150, + "source_file": "00-80T-80.pdf" }, { - "text": "Osamu Seto† \n\nDepartment of Architecture and Building Engineering, \n\nHokkai-Gakuen University, Sapporo 062-8605, Japan \n\nAbstract \n\nWe propose a scenario of the right-handed neutrino dark matter in the context of the minimal \n\ngauged U (1)B L model by introducing an additional parity which ensures the stability of dark \n− \n\nmatter particle. The annihilation of this right-handed neutrino takes place dominantly through the \n\ns-channel Higgs boson exchange, so that this model can be called Higgs portal dark matter model. \n\nWe show that the thermal relic abundance of the right-handed neutrino dark matter with help of \n\nHiggs resonance can match the observed dark matter abundance. In addition we estimate the cross \n\nsection with nucleon and show that the next generation direct dark matter search experiments can \n\nexplore this model. ", - "page_start": 1, - "page_end": 1, - "source_file": "1002.2525.pdf" + "text": "", + "page_start": 298, + "page_end": 298, + "source_file": "00-80T-80.pdf" }, { - "text": "DENSITY. The density of the air is a prop- \nerty of greatest importance in the study of \naerodynamics. The density of air is simply \nthe mass of air per~cubic foot of volume and \nis a direct measure of the quantity of matter \nin each cubic foot of air. Air at standard sea \nlcvcl conditions weighs 0.0765 pounds per cubic \nfoot and has a density of 0.002378 slugs per \ncubic foot. At an altitude of 40,000 feet the \nair density is approximately 25 percent of the \nsea level value. \n\nThe shorthand notation used for air density \nis p (rho) and the standard sea level air density \nis then pO. In many parts of aerodynamics it \nis very convenient to consider the proportion \nof the ambient air density and standard sea \nlevel air density. This density ratio is assigned \nthe shorthand notation of c (sigma). \n\nambient air density \nstandard sea level air density \n\na = PIP0 \n\nA general gas law defines the relationship of \npressure temperature, and density when there \nis no change of state or heat transfer. Simply \nstated this would be “density varies directly \nwith pressure, inversely with \ntemperature.” \nUsing the properties previously defined, ", - "page_start": 20, - "page_end": 20, + "text": "", + "page_start": 150, + "page_end": 150, "source_file": "00-80T-80.pdf" }, { - "text": "\n\nDENSITY ALTITUDE CHART \n\n+g& ", - "page_start": 31, - "page_end": 31, + "text": "", + "page_start": 150, + "page_end": 150, "source_file": "00-80T-80.pdf" } ] @@ -8005,70 +8005,70 @@ "target_page": 6, "target_passage": "When the DM is heavier, the annihilation mode into Higgs boson pairs is opened and the relic density slightly deceases", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 332, + "page_end": 332, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 417, + "page_end": 417, + "source_file": "00-80T-80.pdf" }, { - "text": "Fig. 1 shows the relic density ΩN h2 as a function of the DM mass mN for a set of \n\nparameters: (v′, Mh, MH, MZ ′, sin θ) = (4000 GeV, 120 GeV, 200 GeV, 1000 GeV, 0.7), for \n\nexample. Willkinson Microwave Anisotropy Probe measured the value of DM abundance as \n\nΩDM h2 \nonly near Higgs resonances, mN ≈ \n\n0.1 [15]. The figure shows that a desired DM relic abundance can be obtained for \n≃ \n\nMh/2 or MH /2. \n\nFig. 2 shows the relic density ΩN h2 as a function of the DM mass mN for a smaller Higgs \n\nmixing sin θ = 0.3 (others are the same as in Fig. 1). Compared with Fig. 1, for mN . MW \nwhere the DM particles dominantly annihilate into f ¯f , the relic density further increases \n\nbecause of the small mixing angle. When the DM is heavier, the annihilation mode into \n\nHiggs boson pairs is opened and the relic density slightly deceases, but the reduction is not \n\nenough to reach ΩN h2 \n≃ \n\n 1000 ", - "page_start": 6, - "page_end": 6, - "source_file": "1002.2525.pdf" + "text": "", + "page_start": 417, + "page_end": 417, + "source_file": "00-80T-80.pdf" }, { - "text": "can be achieved only when the annihilation processes are enhanced by Higgs resonances. \n\nTherefore, the mass of the RH neutrino DM should be around a half of Higgs boson masses. \n\nWe have also calculated the elastic scattering cross section between the DM particle and a \n\nproton and found it within the reach of future experiments for the direct DM search. ", - "page_start": 9, - "page_end": 9, - "source_file": "1002.2525.pdf" + "text": "", + "page_start": 417, + "page_end": 417, + "source_file": "00-80T-80.pdf" }, { - "text": "We have proposed a scenario of the RH neutrino dark matter in the context of the minimal \n\ngauged U(1)B L model. We have introduced a discrete Z2 parity in the model, so that one \n− \n\nRH neutrino assigned as Z2-odd can be stable and, hence, the DM candidate, while the other \n\ntwo RH neutrinos account for neutrino masses and mixings through the seesaw mechanism. \n\nNo additional degrees of freedom are necessary to be added. We have evaluated the relic \n\ndensity of the dark matter particle. The dominant annihilation modes are via the Higgs \n\nboson exchange processes in the s-channel and thus, our model can be called Higgs portal \n\nDM model. It has been found that the relic density consistent with the current observation \n\n8 ", - "page_start": 8, - "page_end": 8, - "source_file": "1002.2525.pdf" + "text": "", + "page_start": 417, + "page_end": 417, + "source_file": "00-80T-80.pdf" }, { - "text": "the dominant dynamic process, but does not allow one to probe this assumption. In Section III B \n\nwe show how one may develop a dynamical density functional theory (DDFT) that describes the \n\nsystem at a similar level to the KMC. However, the DDFT may also be easily extended to include \n\nother effects such as fluid diffusion, that the KMC does not incorporate. ", - "page_start": 9, - "page_end": 9, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 417, + "page_end": 417, + "source_file": "00-80T-80.pdf" }, { - "text": "Our model is quite analogous to the so-called gauge singlet scalar dark matter [16–18]. \n\nSome recent studies can be found in Refs. [19, 20]. In the gauge singlet scalar DM model, the \n\nthermal abundance is mainly controlled by the interactions between the SM Higgs boson and \n\nthe DM particle. In our model, B L Higgs VEV v′ can play the same role for mN < MW , \n− \n\nnamely a larger v′ corresponds to weaker coupling between DM and Higgs for a fixed DM \n\nmass. On the other hand, for mN > MW the difference appears. Even if the annihilation \n\n6 ", - "page_start": 6, - "page_end": 6, - "source_file": "1002.2525.pdf" + "text": "", + "page_start": 417, + "page_end": 417, + "source_file": "00-80T-80.pdf" }, { - "text": "**Turning off data retention protection**\nWhen you turn off data retention protection, the following descriptions explain what happens \nwhen you use the creation-based object expiration policy and the event-based retention \nobject expiration policy: \n\n(cid:2) Creation-based object expiration policy: Content Manager OnDemand issues a**delete**\n\n**object**command through the Tivoli Storage Manager API. Objects are deleted during the \nnext inventory expiration. If a Content Manager OnDemand application group is deleted, a \n**delete filespace**command is issued instead, and the objects are immediately deleted \nwith the file space. \n\n(cid:2) Event-based retention object expiration policy: Content Manager OnDemand issues an \n**event trigger**command through the Tivoli Storage Manager API. The status of the \nobjects that are affected changes from PENDING to STARTED, and the objects are expired by \nTivoli Storage Manager based on their retention parameters. If the retention parameters \nare set to NOLIMIT, the objects never expire. If a Content Manager OnDemand application \ngroup is deleted, a**delete filespace**command is issued instead, and the objects are \nimmediately deleted with the file space. ", - "page_start": 259, - "page_end": 259, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 416, + "page_end": 416, + "source_file": "00-80T-80.pdf" }, { - "text": "and mass spectrum of the Higgs bosons. \n\nThe thermal relic abundance of DM \n\n109 mN /Td \n√g \nσv \nMP h \n\nΩN h2 = 1.1 1, GeV− (14) \n× \ni \n\nwith the Planck mass MP , the thermal averaged product of the annihilation cross section \n\nσv and the relative velocity , the total number of relativistic degrees of freedom in the \nh i \n\nthermal bath g , and the decoupling temperature Td, is evaluated by solving the Boltzmann \n∗ \n\nequation for the number density of RH neutrino nN ; \n\ndnN \ndt \n(n2 \nn2 \nEQ), \n+ 3HnN = σv \nN − −h i \n\nand the Friedmann equation \n\n2 \n\n˙a \na(cid:19) \n8π \n3M 2 \nP \n= \n≡ (cid:18) \n\nwith nEQ and a(t) being the equilibrium number density and the scale factor, under the \n\nradiation dominated Universe with the energy density ρ = ρrad [14]. \n\n5 ", - "page_start": 5, - "page_end": 5, - "source_file": "1002.2525.pdf" + "text": "", + "page_start": 416, + "page_end": 416, + "source_file": "00-80T-80.pdf" }, { - "text": "**Turning on data retention protection**\nWhen you turn on data retention protection, the following descriptions explain what happens \nwhen you use creation-based object expiration policy and event-based retention object \nexpiration policy: \n\n(cid:2) Creation-based object expiration policy: Content Manager OnDemand issues no \n\ncommands to Tivoli Storage Manager. The objects are effectively orphaned by Content \nManager OnDemand and are expired by Tivoli Storage Manager based on their retention \nparameters. If the retention parameters are set to NOLIMIT, the objects never expire. \n\n(cid:2) Event-based retention object expiration policy: Content Manager OnDemand issues an \n\n**event trigger**command through the Tivoli Storage Manager API. The event status of the \nobjects that are affected is changed from PENDING to STARTED, and the affected objects \nare expired by Tivoli Storage Manager based on their retention parameters. If the retention \nparameters are set to NOLIMIT, the objects never expire. \n\nIf a Content Manager OnDemand application group is deleted, a**delete filespace**\ncommand cannot be used with data retention protection; the operation is treated the same \nas though a delete is indicated. The status of all of the affected objects is changed from \nPENDING to STARTED, and the affected objects are expired by Tivoli Storage Manager \nbased on their retention parameters. This action leaves the file space entries in Tivoli \nStorage Manager, so you must manually delete these entries when the file space is empty \n(even with data retention protection on). ", - "page_start": 259, - "page_end": 259, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 416, + "page_end": 416, + "source_file": "00-80T-80.pdf" } ] }, @@ -8079,70 +8079,70 @@ "target_page": 1, "target_passage": "LLM routers aim to balance quality and cost of generation by classifying queries and routing them to a cheaper or more expensive LLM depending on their complexity. ", "chunk_present": { - "presence": true, - "index": 5 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 206, + "page_end": 206, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 286, + "page_end": 286, + "source_file": "00-80T-80.pdf" }, { - "text": "In contrast to routers motivated by controlling costs, several LLM router designs focus solely on improving quality of \nresponses [31, 45, 57, 58]. \n\nThe LLM routers described thus far do not modify the queries or individual LLM responses. Other types of control planes \ndo. Ensemble approaches such as mixture-of-expert (MoE) [29, 30, 52, 56] architectures select a subset of underlying \nmodels to apply to each token of a query and merge their responses. LLM synthesis [40] architectures operate similarly, \nbut route the entire query to a subset of underlying LLMs and merge their responses. These approaches reduce inference \ncosts by using fewer and/or less complex underlying models. \n\nApplications of LLM routers. A key use case for LLM routers is to help LLM-based application reduce cost. Several \ncommercial routers, including Unify [12], Martian [5], NotDiamond [7], and others, offer this as a service. By replacing a \nfew lines of code, the application can send user queries to a router service, rather than directly to some LLM provider. The \nservice selects the optimal LLM and forwards the queries. Commercial router services claim that this results in significant \ncost savings: up to 98% in the case of Martian [5], and 10× in the case of NotDiamond [7]. ", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv1.pdf" + "text": "", + "page_start": 285, + "page_end": 285, + "source_file": "00-80T-80.pdf" }, { - "text": "10 Conclusion \n\nLLM routers balance quality and cost of LLM inference by routing different queries to different LLMs. They are an \nexample of a broader, emerging class of systems we call “LLM control planes” that aim to achieve various quality, \nefficiency, and cost objectives by orchestrating use of multiple LLMs to respond to a query. \n\n17 ", - "page_start": 17, - "page_end": 17, - "source_file": "arxiv1.pdf" + "text": "", + "page_start": 285, + "page_end": 285, + "source_file": "00-80T-80.pdf" }, { - "text": "LLM routers. A prominent example of this emerging class of LLM control planes are LLM routers [27, 41, 47, 53, 59]. \nLLM routers decide which of the two (or, sometimes, more) LLMs to use to answer a query. In prescriptive routing, \nthe router applies some lightweight classifier to the input query that determines which underlying LLM to utilize for a \nresponse. The classifier is itself a learned function that scores the complexity of the query. Deployments can then configure \na score threshold for when to route a query to the more expensive LLM. This threshold can be tuned using representative \nworkloads to achieve a desired cost-performance trade-off. Figure 1 shows the basic workflow of binary LLM routers. \n\nNon-prescriptive routing [15, 20, 68] uses the responses from one or more underlying LLMs to determine which response \nto return to the user. For example, FrugalGPT [20] submits the query to a sequence of models (ordered by price) called a \ncascade, stopping when it obtains a response classified by the router as sufficient. \n\n2 ", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv1.pdf" + "text": "", + "page_start": 285, + "page_end": 285, + "source_file": "00-80T-80.pdf" }, { - "text": "ABSTRACT \n\nLLM routers aim to balance quality and cost of generation by classifying queries and routing them to \na cheaper or more expensive LLM depending on their complexity. Routers represent one type of what \nwe call LLM control planes: systems that orchestrate use of one or more LLMs. In this paper, we \ninvestigate routers’ adversarial robustness. \nWe first define LLM control plane integrity, i.e., robustness of LLM orchestration to adversarial in- \nputs, as a distinct problem in AI safety. Next, we demonstrate that an adversary can generate query- \nindependent token sequences we call “confounder gadgets” that, when added to any query, cause LLM \nrouters to send the query to a strong LLM. \nOur quantitative evaluation shows that this attack is successful both in white-box and black-box settings \nagainst a variety of open-source and commercial routers, and that confounding queries do not affect \nthe quality of LLM responses. Finally, we demonstrate that gadgets can be effective while maintaining \nlow perplexity, thus perplexity-based filtering is not an effective defense. We finish by investigating \nalternative defenses. \n\n1 Introduction ", - "page_start": 1, - "page_end": 1, - "source_file": "arxiv1.pdf" + "text": "", + "page_start": 286, + "page_end": 286, + "source_file": "00-80T-80.pdf" }, { - "text": "Routing attacks can be deployed for various adversarial objectives, e.g., to ensure that the adversary always obtains the \nhighest-quality answer regardless of the target applications’s internal routing policies and cost constraints, or to mali- \nciously inflate the target’s LLM costs. As LLM control planes grow in importance and sophistication, we hope that this \nwork will motivate further research on their adversarial robustness. \n\n2 LLM Control Planes and Routing \n\nInference using large language models (LLMs) is traditionally monolithic: a single model is applied to an input or se- \nquence of inputs. This methodology can be sub-optimal for various reasons. State-of-the-art models are often expensive, \nwith API access to LLMs costing as much as several dollars for each query. Elsewhere, distinct LLMs may excel at dif- \nferent tasks, and selectively using them may improve overall quality on a diverse workload. Finally, combining multiple \nLLMs, even all trained for similar tasks, may become increasingly prevalent as performance improvements of individual \nLLMs plateaus [8–10]. \n\nResearchers and practitioners are therefore now developing inference architectures that use multiple LLMs to answer \nqueries. These LLMs are orchestrated by what we call an LLM control plane (borrowing the terminology from network- \ning [13]). The control plane may route queries or parts of queries to different LLMs, derive new strings to query to \nunderlying LLMs, combine answers from underlying LLMs, and more. ", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv1.pdf" + "text": "", + "page_start": 286, + "page_end": 286, + "source_file": "00-80T-80.pdf" }, { - "text": "A natural solution to balancing performance and economic considerations is to take advantage of the availability of mul- \ntiple LLMs at different price-performance points. Recently proposed LLM routing systems [5, 12, 27, 47, 53] orchestrate \ntwo or more LLMs and adaptively route each query to the cheapest LLM they deem likely to generate a response of \nsufficient quality. In the two-LLM case, let Ms be an expensive, high-quality model and Mw a weaker, lower-grade one. \nGiven query q, the routing algorithm R(·) applies a classifier to q that outputs 0 if Mw is sufficient for answering q, or 1 \nif Ms is required. The system then routes q accordingly. \n\nLLM routing is an example of a general class of systems we call LLM control planes, which orchestrate the use of multiple \nLLMs to process inputs, as further described in Section 2. \n\nOur contributions. First, we introduce LLM control plane integrity as a novel problem in AI safety. Recently proposed \nLLM control-plane algorithms are learned, calibrated classifiers (see Section 2). Their inputs are queries from potentially \nadversarial users. Robustness of control-plane algorithms to adversarial queries is a new problem, distinct from adversarial \nrobustness of the underlying LLMs. ", - "page_start": 1, - "page_end": 1, - "source_file": "arxiv1.pdf" + "text": "", + "page_start": 286, + "page_end": 286, + "source_file": "00-80T-80.pdf" }, { - "text": "Figure 1: LLM routers classify queries and route complex ones to an expensive/strong model, others to a cheaper/weak \nmodel. To control costs, LLM routers can be calibrated to maintain (for an expected workload) a specific ratio between \nqueries sent to the strong and weak models. ", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv1.pdf" + "text": "", + "page_start": 286, + "page_end": 286, + "source_file": "00-80T-80.pdf" }, { - "text": "LLM-based filtering. Even though adversarially modified queries cannot be easily detected using perplexity, they may \nstill be “unnatural.” A possible defense is to employ an oracle LLM to determine if the query is natural or not. This defense \nrequires the router to invoke an additional LLM for every processed query, which is computationally expensive in the case \nof a high-quality open-sourced LLM or financially costly in the case of a high-quality commercial LLM. Therefore, this \ndefense is unlikely to be practical. Furthermore, it is possible to optimize gadgets so that they both have low perplexity \nand appear “natural” to LLM evaluators [69]. \n\nParaphrasing. Filtering defenses like those discussed above are passive. An active alternative is to paraphrase queries \nusing an oracle LLM. LLMs are trained to generate natural text and are thus likely to remove unnatural substrings when \nparaphrasing a query. This defense is likely impractical for two reasons. First, and as with LLM-based filtering, it requires \n\n16 ", - "page_start": 16, - "page_end": 16, - "source_file": "arxiv1.pdf" + "text": "", + "page_start": 286, + "page_end": 286, + "source_file": "00-80T-80.pdf" } ] }, @@ -8153,70 +8153,70 @@ "target_page": 3, "target_passage": " An LLM control plane Rω is a potentially randomized algorithm.", "chunk_present": { - "presence": true, - "index": 6 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 170, + "page_end": 170, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "3 LLM Control Plane Integrity \n\nIn this section, we define LLM control plane integrity. Informally, it means that decisions made about underlying LLM \nqueries made by the control plane algorithms cannot be subverted by adversarial queries. Looking ahead, we will focus \non one class of control plane: predictive LLM routing as used to manage cost. ", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv1.pdf" + "text": "", + "page_start": 194, + "page_end": 194, + "source_file": "00-80T-80.pdf" }, { - "text": "Routing attacks can be deployed for various adversarial objectives, e.g., to ensure that the adversary always obtains the \nhighest-quality answer regardless of the target applications’s internal routing policies and cost constraints, or to mali- \nciously inflate the target’s LLM costs. As LLM control planes grow in importance and sophistication, we hope that this \nwork will motivate further research on their adversarial robustness. \n\n2 LLM Control Planes and Routing \n\nInference using large language models (LLMs) is traditionally monolithic: a single model is applied to an input or se- \nquence of inputs. This methodology can be sub-optimal for various reasons. State-of-the-art models are often expensive, \nwith API access to LLMs costing as much as several dollars for each query. Elsewhere, distinct LLMs may excel at dif- \nferent tasks, and selectively using them may improve overall quality on a diverse workload. Finally, combining multiple \nLLMs, even all trained for similar tasks, may become increasingly prevalent as performance improvements of individual \nLLMs plateaus [8–10]. \n\nResearchers and practitioners are therefore now developing inference architectures that use multiple LLMs to answer \nqueries. These LLMs are orchestrated by what we call an LLM control plane (borrowing the terminology from network- \ning [13]). The control plane may route queries or parts of queries to different LLMs, derive new strings to query to \nunderlying LLMs, combine answers from underlying LLMs, and more. ", + "text": "", "page_start": 2, "page_end": 2, - "source_file": "arxiv1.pdf" + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "10 Conclusion \n\nLLM routers balance quality and cost of LLM inference by routing different queries to different LLMs. They are an \nexample of a broader, emerging class of systems we call “LLM control planes” that aim to achieve various quality, \nefficiency, and cost objectives by orchestrating use of multiple LLMs to respond to a query. \n\n17 ", - "page_start": 17, - "page_end": 17, - "source_file": "arxiv1.pdf" + "text": "", + "page_start": 2, + "page_end": 2, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "A natural solution to balancing performance and economic considerations is to take advantage of the availability of mul- \ntiple LLMs at different price-performance points. Recently proposed LLM routing systems [5, 12, 27, 47, 53] orchestrate \ntwo or more LLMs and adaptively route each query to the cheapest LLM they deem likely to generate a response of \nsufficient quality. In the two-LLM case, let Ms be an expensive, high-quality model and Mw a weaker, lower-grade one. \nGiven query q, the routing algorithm R(·) applies a classifier to q that outputs 0 if Mw is sufficient for answering q, or 1 \nif Ms is required. The system then routes q accordingly. \n\nLLM routing is an example of a general class of systems we call LLM control planes, which orchestrate the use of multiple \nLLMs to process inputs, as further described in Section 2. \n\nOur contributions. First, we introduce LLM control plane integrity as a novel problem in AI safety. Recently proposed \nLLM control-plane algorithms are learned, calibrated classifiers (see Section 2). Their inputs are queries from potentially \nadversarial users. Robustness of control-plane algorithms to adversarial queries is a new problem, distinct from adversarial \nrobustness of the underlying LLMs. ", - "page_start": 1, - "page_end": 1, - "source_file": "arxiv1.pdf" + "text": "", + "page_start": 194, + "page_end": 194, + "source_file": "00-80T-80.pdf" }, { - "text": "Formalizing control planes. An LLM control plane Rω is a potentially randomized algorithm. It is parameterized by \na string ω, called the parameters. It utilizes some number n of LLMs denoted by M. We will mostly focus on the \ncase of n = 2, and, for reasons that will be clear in a moment, use Ms (“strong”) and Mw (“weak”) to denote the two \nunderlying LLMs. Then inference on an input x ∈ X for some set X of allowed queries is performed by computing \na response via y ←$ RM \nω (x). Here we use ←$ to denote running R with fresh random coins; we use ← when R is \ndeterministic. We focus on inference for a single query, but it is straightforward to extend our abstraction for control \nplanes to include sessions: the controller would maintain state across invocations, potentially adapting its behavior as a \nfunction of a sequence of queries and responses. \n\nLLM control planes should, in general, be relatively computationally lightweight, at least compared to the underlying \nLLMs. This is particularly so in the cost-motivated usage of control planes, as a computationally or financially expensive \ncontrol plane would eat into cost savings incurred by utilizing cheaper underlying LLMs for some queries. For example, \npredictive binary routers use relatively simple classifiers to determine which of Ms or Mw should be used to respond to a \nquery. ", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv1.pdf" + "text": "", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "LLM routers. A prominent example of this emerging class of LLM control planes are LLM routers [27, 41, 47, 53, 59]. \nLLM routers decide which of the two (or, sometimes, more) LLMs to use to answer a query. In prescriptive routing, \nthe router applies some lightweight classifier to the input query that determines which underlying LLM to utilize for a \nresponse. The classifier is itself a learned function that scores the complexity of the query. Deployments can then configure \na score threshold for when to route a query to the more expensive LLM. This threshold can be tuned using representative \nworkloads to achieve a desired cost-performance trade-off. Figure 1 shows the basic workflow of binary LLM routers. \n\nNon-prescriptive routing [15, 20, 68] uses the responses from one or more underlying LLMs to determine which response \nto return to the user. For example, FrugalGPT [20] submits the query to a sequence of models (ordered by price) called a \ncascade, stopping when it obtains a response classified by the router as sufficient. \n\n2 ", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv1.pdf" + "text": "", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "ABSTRACT \n\nLLM routers aim to balance quality and cost of generation by classifying queries and routing them to \na cheaper or more expensive LLM depending on their complexity. Routers represent one type of what \nwe call LLM control planes: systems that orchestrate use of one or more LLMs. In this paper, we \ninvestigate routers’ adversarial robustness. \nWe first define LLM control plane integrity, i.e., robustness of LLM orchestration to adversarial in- \nputs, as a distinct problem in AI safety. Next, we demonstrate that an adversary can generate query- \nindependent token sequences we call “confounder gadgets” that, when added to any query, cause LLM \nrouters to send the query to a strong LLM. \nOur quantitative evaluation shows that this attack is successful both in white-box and black-box settings \nagainst a variety of open-source and commercial routers, and that confounding queries do not affect \nthe quality of LLM responses. Finally, we demonstrate that gadgets can be effective while maintaining \nlow perplexity, thus perplexity-based filtering is not an effective defense. We finish by investigating \nalternative defenses. \n\n1 Introduction ", - "page_start": 1, - "page_end": 1, - "source_file": "arxiv1.pdf" + "text": "", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "In contrast to routers motivated by controlling costs, several LLM router designs focus solely on improving quality of \nresponses [31, 45, 57, 58]. \n\nThe LLM routers described thus far do not modify the queries or individual LLM responses. Other types of control planes \ndo. Ensemble approaches such as mixture-of-expert (MoE) [29, 30, 52, 56] architectures select a subset of underlying \nmodels to apply to each token of a query and merge their responses. LLM synthesis [40] architectures operate similarly, \nbut route the entire query to a subset of underlying LLMs and merge their responses. These approaches reduce inference \ncosts by using fewer and/or less complex underlying models. \n\nApplications of LLM routers. A key use case for LLM routers is to help LLM-based application reduce cost. Several \ncommercial routers, including Unify [12], Martian [5], NotDiamond [7], and others, offer this as a service. By replacing a \nfew lines of code, the application can send user queries to a router service, rather than directly to some LLM provider. The \nservice selects the optimal LLM and forwards the queries. Commercial router services claim that this results in significant \ncost savings: up to 98% in the case of Martian [5], and 10× in the case of NotDiamond [7]. ", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv1.pdf" + "text": "", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_JWN_2014.pdf" } ] }, @@ -8227,70 +8227,70 @@ "target_page": 5, "target_passage": " Given a query xi, we prepend a confounder gadget ci, which is a short sequence of adversarially chosen tokens.", "chunk_present": { - "presence": true, - "index": 3 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Let B = {˜c0, . . . , ˜cB}. \n\n(3) Find the candidate that maximizes the score: \n\nc(t+1) \ni ← arg max \nSθ(c∥xi) . (1) \nc∈B \n\nThe final confounder c(T ) \nis used with query xi. We early abort if, after 25 iterations, there is no update to the confounder \ngadget. Technically, we could abort early if we find a confounder whose score exceeds τ . Running further can be useful \nwhen an adversary does not know τ . \n\ni \n\nThe attack’s runtime is dominated by T · B times the cost of executing S. In practice, S are designed to be fast (otherwise \nrouters would significantly increase the latency of applications that use them). We report precise timings later; in summary, \nthe attack is fast because we can set T to be relatively small and still find high-scoring confounders. \n\nDue to the randomness in index and token selection, the method converges to different, yet similarly effective, confounder \ngadgets on each run. Our evaluation will thus measure average performance over multiple gadgets. ", - "page_start": 6, - "page_end": 6, - "source_file": "arxiv1.pdf" + "text": "", + "page_start": 144, + "page_end": 144, + "source_file": "00-80T-80.pdf" }, { - "text": "Confounder gadgets. Our approach works as follows. Given a query xi, we prepend a confounder gadget ci, which is a \nshort sequence of adversarially chosen tokens. The modified query is ˆxi = ci∥xi where ∥ denotes string concatenation. \nIntuitively, we will use optimization to search for confounders that trick the scoring function into ranking ˆxi as sufficiently \ncomplex to require the strong model. \n\nIn the white-box, query-specific setting, we can choose ci as a function of xi and the known parameters ω = (S, θ, τ ). To \ndo so, we fix a confounder length of n tokens and let I be a token dictionary (it should be a sufficiently large subset of the \ntoken dictionary used by S). Then we set the gadget to initially be n tokens all fixed to the same value from I. The exact \nchoice of the initialization token is not important; in our implementation, we used the first token in the dictionary (‘!’). \nDenote this initial confounder as c(0) \ni = [c(0) i,1 , c(0) i,2 , . . . , c(0) \ni,n]. ", - "page_start": 5, - "page_end": 5, - "source_file": "arxiv1.pdf" + "text": "", + "page_start": 143, + "page_end": 143, + "source_file": "00-80T-80.pdf" }, { - "text": "We introduced and defined a new safety property, LLM control plane integrity. \nInformally, this property holds if an \nadversarial user cannot influence routing decisions made by the control plane. To show that existing LLM routers do not \nsatisfy this property, we designed, implemented, and evaluated a black-box optimization method for generating query- \nindependent “confounder gadgets.” When added to any query, the confounder gadget confuses the router into routing the \nquery to the adversary-chosen LLM. \n\nWe evaluated the efficacy of confounder gadgets on multiple open-source and commercial routers and demonstrated that \nthey successfully reroute queries without a negative impact on the quality of responses. We also discussed defenses against \nthese attacks and indicated directions for future research. \n\nAcknowledgments \n\nThis research was supported in part by the Google Cyber NYC Institutional Research Program, the Israel Science Founda- \ntion (Grant No. 1336/22), and the European Union (ERC, FTRC, 101043243). Views and opinions expressed are however \nthose of the author(s) only and do not necessarily reflect those of the European Union or the European Research Council. \nNeither the European Union nor the granting authority can be held responsible for them. ", - "page_start": 18, - "page_end": 18, - "source_file": "arxiv1.pdf" + "text": "", + "page_start": 143, + "page_end": 143, + "source_file": "00-80T-80.pdf" }, { - "text": "C Optimization-Free Gadget Generation \n\nWe evaluate optimization-free alternatives to our black-box optimization method for generating confounder gadgets. \n\nFixed gadget. A simple way to create a gadget without resorting to optimization is to repeat n tokens. We use ! as the \ninitialization token, so the gadget in this case is !!!!!!!!!!. Another possibility is to select n tokens uniformly at random. \nTable 14 shows the upgrade rates for both options, were in the latter setting we repeat the process 10 times and report the \naverage result and the standard error. While they are non-negligible, especially for the randomly sampled gadgets, they \nsignificantly underperform the upgrade rates reported in Table 1 for optimized gadgets. \n\nInstruction injection. Prompt injection is a known attack on LLMs [50, 64], thus we consider a gadget consisting of a \ndirect instruction to the router to treat the query as a complex one and obtain a high-quality response. \n\nWe evaluated 4 differently phrased instructions: two created manually and two generated by, respectively, Gemini [61] \nand GPT-4o [2], denoted as “ours-1”, “ours-2”, “Gemini”, and “GPT”. \n\nTable 15 reports the results. This method works well in a few cases but poorly in most. This highlights the difference \nbetween attacking LLMs and attacking LLM routers. ", - "page_start": 24, - "page_end": 24, - "source_file": "arxiv1.pdf" + "text": "", + "page_start": 59, + "page_end": 59, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "The black-box setting: confounders that transfer. Finally, the attacks so far are in the white-box setting, where the \nattacker can optimize directly against Sθ. While in some cases routing control planes will be public knowledge, in others, \nincluding the proprietary control planes we explore in Section 7, they are hidden. This gives rise to the black-box setting. \nWhile an attacker might seek to perform model extraction attacks [43, 65] to learn θ, we instead explore attacks that \ntransfer from one router to another. \nIn more detail, we assume the adversary has access to a router R′ \nω′, called the surrogate, that is trained on data similar to \nthat used for the target router. Then the attack is the same as above, except that we use the surrogate’s scoring function \nS′ \nθ′ instead of the target’s Sθ. Again, we will see that this works surprisingly well: the query-independent confounders \nfound for the surrogate transfer to successfully reroute queries against the target router. \n\nPutting it all together. In summary, our methodology for input adaptation attacks is: \n\n(Preprocessing) Develop a single query-independent confounder gadget c, using either the target router or surrogate \nto score the confounder. \n(1) ", - "page_start": 6, - "page_end": 6, - "source_file": "arxiv1.pdf" + "text": "", + "page_start": 59, + "page_end": 59, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "Figure 2: Overview of our attack on LLM routing control plane integrity. The attack adds to each query a prefix (repre- \nsented by the gear), called a “confounder gadget,” that causes the router to send the query to the strong model. ", - "page_start": 5, - "page_end": 5, - "source_file": "arxiv1.pdf" + "text": "", + "page_start": 143, + "page_end": 143, + "source_file": "00-80T-80.pdf" }, { - "text": "Query-specific gadgets. By default, our gadget generation method is query-independent and the same gadget can be used \nto reroute any query. An adversary with more resources may instead generate a dedicated gadget for each query (using \nthe same algorithm). \n\nTable 8 and Table 9 show the results for the white-box and black-box settings, respectively. (Here, percentage numbers \nare not averaged and there is no standard error since we used a single gadget per query.) The white-box results are nearly \nperfect; the black-box results are often better but sometimes somewhat worse than those for query-independent gadgets. \nWe conjecture that this is due to some level of overfitting. \n\n11 ", - "page_start": 11, - "page_end": 11, - "source_file": "arxiv1.pdf" + "text": "", + "page_start": 143, + "page_end": 143, + "source_file": "00-80T-80.pdf" }, { - "text": "Query-independent confounders. One downside of the per-query approach is that the adversary must repeat, for each \nquery, the search for a good confounder. In practice, the adversary might prefer a query-independent attack. Our con- \nfounder gadget approach extends to this setting readily: perform the search routine above for an empty query. In other \nwords, just ignore xi in the query-dependent attack above, replacing Sθ(c∥xi) in Eq. 1 with Sθ(c). This finds a sin- \ngle query-independent confounder c that can be prefixed to all queries, i.e., ˆxi = c∥xi. We will show that this works \nsurprisingly well. \n\nIt is tempting to assume the reason a query-independent confounder works well is that a good scoring function should be \nroughly monotonic in query extensions, i.e., one might expect that Sθ(c∥x) ≥ Sθ(c) for almost any suffix x. This intuition \nis not correct. In our experiments, we found that Sθ(c∥x) < Sθ(c) for many x and some of the routers discussed below. \nNevertheless, by ensuring that Sθ(c) is pretty high (set the number of iterations T higher) the resulting query-independent \nconfounder works well. That is, we at least get that Sθ(c∥x) > Sθ(x). ", - "page_start": 6, - "page_end": 6, - "source_file": "arxiv1.pdf" + "text": "", + "page_start": 143, + "page_end": 143, + "source_file": "00-80T-80.pdf" + }, + { + "text": "", + "page_start": 144, + "page_end": 144, + "source_file": "00-80T-80.pdf" } ] }, @@ -8301,70 +8301,70 @@ "target_page": 1, "target_passage": "We considerthe case of a two-level atomic beam interacting with a single-mode Ramsey cavity of separated-oscillating-field resonators with the cavity mode linewidth is much wider than the atomic gain linewidth. Thus we call it bad-cavity Ramsey laser. ", "chunk_present": { - "presence": true, - "index": 5 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 275, + "page_end": 275, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 91, + "page_end": 91, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": "**The Linewidth of Ramsey Laser with Bad Cavity**\n\nYang Li, Wei Zhuang, Jinbiao Chen,∗ and Hong Guo† \n*CREAM Group, State Key Laboratory of Advanced Optical Communication*\n*Systems and Networks (Peking University) and Institute of Quantum Electronics,*\n*School of Electronics Engineering and Computer Science,*\n*and Center for Computational Science and Engineering (CCSE), Peking University, Beijing 100871, P. R. China*\n(Dated: October 29, 2018) \n\nWe investigate a new laser scheme by using Ramsey separated-field technique with bad cavity. By studying \nthe linewidth of the stimulated-emission spectrum of this kind of laser inside the cavity, we find its linewidth \nis more than two orders of magnitude narrower than atomic natural linewidth, and it is far superior to that \nof conventional optical Ramsey method and any other available subnatural linewidth spectroscopy at present. \nSince any cavity related noise is reduced to cavity-pulling effect in bad cavity laser, this Ramsey laser provides \nthe possibility of precision subnatural linewidth spectroscopy, which is critical for the next generation of optical \nclock and atom interferometers. \n\nPACS numbers: 42.55.Ah, 42.50.Ar, 42.60.Da, 32.30.-r ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2670.pdf" + "text": "", + "page_start": 325, + "page_end": 325, + "source_file": "00-80T-80.pdf" }, { - "text": "In summary, we propose a new subnatural \nlinewidth spectroscopy technique, which is a laser by us- \ning Ramsey seperated-field cavity to realize the output of \nstimulated-emission radiation via multiple coherent interac- \ntion with atomic beam. We find the linewidth of Ramsey laser \nis subnatural if we choose an appropriate atomic level, and the \nbad-cavity laser mechanism will dramatically reduce cavity- \nrelated noise as discussed in active optical clock [15–19]. Our \nresults show that this new subnatural linewidth spectroscopy \nis superior to conventional optical Ramsey seperated-field \nspectroscopy and any other available subnatural spectroscopy \ntechnique at present [3–10]. Considering one have to ap- \nply the separated-field method in any phase detection as in \nRamsey-Bord*e*´interferometer [2], to investigate the effects of \nphase differences between the two oscillating fields [31] in \nthis stimulated separated-field method with such subnatural \nlinewidth will be our next research aim. \n\n*Conclusion:*\n\n[18] Y. Wang, Chinese Science Bulletin**54**, 347 (2009). \n[19] D. Meiser, J. Ye, D. R. Carlson, and M. J. Holland, Phys. Rev. ", - "page_start": 4, - "page_end": 4, - "source_file": "1001.2670.pdf" + "text": "", + "page_start": 325, + "page_end": 325, + "source_file": "00-80T-80.pdf" }, { - "text": "Though, the natural linewidth of quantum transition was \nregarded as the ultimate limit to high-resolution laser spec- \ntroscopy [4], several methods of subnatural linewidth spec- \ntroscopy have been proposed to gain subnatural linewidth [3– \n10]. However, in all these efforts, including optical Ramsey \nspectroscopy, subnatural line is realized at the expense of a \nquick reduction in signal-to-noise (SNR) ratio due to the ex- \nponential decaying of signal, thus all these schemes can only \nget the linewidth several times narrower than the atomic nat- \nural linewidth. In the past three decades, this situation does \nnot change in the field of the precision laser spectroscopy. \nOn the other hand, the thermal noise of the cavity mirrors is \nthe main obstacle for further linewidth reduction of a laser \n[11, 12], and it is a challenge to substantially reduce this noise \nfurther[13]. Recently, a new scheme, called active optical \nclock [14–18], was proposed to substantially reduce the laser \nlinewidth. With lattice trapped atoms, it is possible to reach \nmHz linewidth laser based on the mechanism of active optical \nclock [14, 15, 19]. The principal mechanism of active optical \nclock is to directly extract light emitted from the ultranarrow \natomic transition with a cavity mode linewidth much wider \nthan that of lasing. This bad cavity ensures that any frequency \nshift due to cavity noise reduces to cavity-pulling effect [15– \n17], then the thermal noise is not the major obstacle again for \nreducing the linewidth. This means the bad cavity can play an \nindispensable role in new subnatural linewidth spectroscopy. \nIn this Letter, we propose a new scheme called Ramsey \nlaser with bad cavity. Distinct from any previous applications \nof conventional Ramsey separated oscillating fields method \n[1], which focuses on the absorption spectrum, we here fo- ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2670.pdf" + "text": "", + "page_start": 325, + "page_end": 325, + "source_file": "00-80T-80.pdf" }, { - "text": "*Theoretical framework:*We consider the case of a two-level \natomic beam interacting with a single-mode Ramsey cavity \nof separated-oscillating-field resonators with the cavity mode \nlinewidth is much wider than the atomic gain linewidth. Thus \nwe call it bad-cavity Ramsey laser. All atoms are pumped \nonto the upper lasing state**a**before entering the first cavity \nof seperated field, and the lower lasing state is**b**. We assume \nall the atoms have the same velocities υ, that means what we \nconsider here is a homogeneous laser system. And for the \nsake of simplicity, we consider the two-standing waves linear \noptical Ramsey configuration with a grid as spatial selector \n[20, 21]. Our treatment can be extended to other configura- \ntions as in [22–24]. The length of each oscillating part is*l*, \nand the length of the free drift region is*L*. The corresponding \nHamiltonian is \n\n[ω*j*\n*a*(*t*)σ*j* *a*+ ω*j*\n*b*(*t*)σ*j*\n*b*] \n*H*= ~ωˆ*a*† ˆ*a*+ ~ \n\nX*j*\nΓ*j*(*t*)(ˆ*a*† ˆσ*j*\n− \n+ ~*g*\nX*j*", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2670.pdf" + "text": "", + "page_start": 325, + "page_end": 325, + "source_file": "00-80T-80.pdf" }, { - "text": "Our method of Ramsey laser is suitable for any atoms with \nmetastable energy level, as an example, we choose the tran- \nsition from the metastable state 4*s*4*p*3*P*1 to the ground state \n4*s*2 1*S*0 of 40Ca to check the striking feature of this laser: sub- \nnatural linewidth. As mentioned in [29], the corresponding \nnatural linewidth of the metastable state 4*s*4*p*3*P*1 is 320Hz. \nAs in the recently proposed active optical clock with atomic \nbeam [15], the velocity of the atoms in thermal atomic beam is \nabout 500m/s, and the length of the interaction region is about \n1mm, then the time for the atom to traverse each coherent- \ninteraction region is on the order of magnitude of 1 µs. \nIf \na bad cavity with κ is on the order of 107Hz, the relation \n1 is satisfied. Then when*g*is on the order of the \nκ/2 \nmagnitude of kHz, which can be easily achieved for current \ntechnique [30], from the linewidth expression of Eq.(16) the \norder of magnitude of linewidth is below 1 Hz. This means \nthe linewidth of a Ramsey laser can be more than two or- \nders of magnitude narrower than the atomic natural linewidth, \ntherefore our Ramsey method provides a new subnatural spec- \ntroscopy technique. And since it is stimulated-emission spec- \ntrum, it overcomes the difficulty in other subnatural linewidth \nspectroscopy schemes where the quick reduction of signal to \nnoise ratio is a formidable limit. We should point out that \nthis Ramsey laser does not escape the limitation of all active \noptical clock: in order to pump atoms to the excited state ef- \nfectively and to be stimulated emit photon during the lifetime \nof a metastable state, this new method will only be applicable \nto some special transitions [17]. \n\nτ− \n≫ ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2670.pdf" + "text": "", + "page_start": 325, + "page_end": 325, + "source_file": "00-80T-80.pdf" }, { - "text": "0 \n1 \n0 \n2 \n\nn \na \nJ \n\n5 \n1 \n\n*Introduction:*Since the invention of the separated-field \ntechnique [1], it has played an important role in the field of \nprecision spectroscopy due to its linewidth narrowing effect \nvia multiple coherent interaction. Atomic clocks based on \nthis technique have greatly extended our ability for frequency \nmeasurement, further, almost all the atom interferometers are \nbased on this technique [2]. \n\ncus on the stimulated emission spectrum via multiple coher- \nent interactions inside the cavity. We find this Ramsey laser \ncan provide a stimulated-emission spectrum with a linewidth \nmuch narrower than that of any conventional optical Ramsey \nseperated-field spectroscopy, which is commonly applied in \noptical atomic clock. Our results also show that a subnatural \nlinewidth spectroscopy, superior to any other available subnat- \nural spectroscopy technique at present [3–10], can be reached \nby this kind of laser, if a suitable atomic level structure is cho- \nsen. Thus, this method can provide an effective subnatural \nspectroscopy, and the possibilities for the new optical clock \nscheme [15] and atom interferometers [2]. \n\n] \nh \np \n- \nt \nn \na \nu \nq \n[ \n\n1 \nv \n0 \n7 \n6 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2670.pdf" + "text": "", + "page_start": 325, + "page_end": 325, + "source_file": "00-80T-80.pdf" }, { - "text": "where Ω*R*\nresonance, \nthe Rabi \n*DS T*=*g*2 ˜*Nass*/*I*0γ*ab*\n,*DRam*\nand \n*ab*, \n∆2 = ω \nω*b*2) presents the detuning in the free \n(ω*a*2 − \ndrift region.*p*is a parameter, which characterizes the pump- \ning statistics: a Poissonian excitation statistics corresponds to \n*p*= 0 , and for a regular statistics we have*p*= 1. \n\nis \n\n− \n\n*Laser linwidth:*Suppose the quantum fluctuation is small, \nthe evolution of the fluctuations can be obtained by making a \nlinearization of the c-number Langevin equations around the \nsteady-state solution. Then the measured spectra of field fluc- \ntuations will be directly related to these quantities. By Fourier \ntransformations of the linearized equation, we get the ampli- \ntude and phase quadrature components δ*X*(ω) and δ*Y*(ω) [26]. \nWell above threshold, one can neglect the amplitude fluctu- \nations, and the linewidth inside the cavity is related to the \nphase-diffusion coefficient [25]. For small fluctuation of laser \nphase, the spectrum of phase fluctuations is simply related to \nthe spectrum of the phase quadrature component of the field \nfluctuations, namely, \n\nThen the linewidth of Ramsey laser with bad cavity is given \nby \n\nγ2 \n*ab*\n(κ/2 + γ*ab*)2 { \n\n. \n} \n(11) \nSince*DS T*/*DRam*≪ \n1 in our situation, and in the case of max- \nimal photon number, the steady state value of ˜*Nass*is about \n*R*τ/2. Then we get the \n\n2*g*2 \nκ ≈ − ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2670.pdf" + "text": "", + "page_start": 325, + "page_end": 325, + "source_file": "00-80T-80.pdf" }, { - "text": "[28] N. A. Abraham, P. Mandel, and L. M. Narducci,*Dynamic In-*\n*stabilities and Pulsations in Lasers*, Progress in Optics XXV, \nedited by E. Wolf (Elsevier, Amsterdam, 1988). \n**13**4345 (1980). \n[29] L. Pasternack, D. M. Silver, D. R. Yarkony, and P. J. Dagdigian, \n[6] H. -W. Lee, P. Meystre, and M. O. Scully, Phys. Rev. A**24**, 1914 \nJ. Phys. B**13**, 2231 (1980). \n(1981). \n\n[30] K. An and M. S. Feld, Phys. Rev. A**56**, 1662(1997). \n[31] N. F. Ramsey and H. B. Silsbee, Phys. Rev.**84**, 506(1951). \n[7] F. Shimizu, K. Shimizu, and H. Takuma, Phys. Rev. A**28**, 2248 \n(1983). \n[8] W. Gawlik, J. Kowalski, F. Tr¨ager, and M. Vollmer, Phys. Rev. ", - "page_start": 4, - "page_end": 4, - "source_file": "1001.2670.pdf" + "text": "", + "page_start": 325, + "page_end": 325, + "source_file": "00-80T-80.pdf" } ] }, @@ -8375,70 +8375,70 @@ "target_page": 2, "target_passage": "The steady-state solutions for the mean values of the field and atomic variables for laser operation are obtained by dropping the noise terms of the c-number Langevin equations and setting the time derivatives equal to zero.", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 210, + "page_end": 210, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 275, + "page_end": 275, + "source_file": "00-80T-80.pdf" }, { - "text": "*t*′) + ˜*D*(1) \n*kl*δ(*t*\n− \n*t*′ + τ) + ˜*D*(3) \n*kl*δ(*t*\n− \n*t*′ + τ +*T*) + ˜*D*(5) \n*kl*δ(*t*\n− \n*t*′ + 2τ +*T*) + ˜*D*(7) \n*kl*δ(*t*\n*t*′ +*T*), \n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n\nτ *t*′ *T*) \n− − \n2τ *t*′ *T*) \n\n− \n*t*′ − \n*T*) \n− − \n(8) \n− \n\nwhere ˜*D*(*i*) \nrelated to quantum Langevin diffusion coefficients*D*(*i*) \n[27]. \n*a*(*t*), \n\n*Steady-state solutions:*The steady-state solutions for the \nmean values of the field and atomic variables for laser op- \neration are obtained by dropping the noise terms of the c- \nnumber Langevin equations and setting the time derivatives \nequal to zero. The analytical solutions are very complex, and \none could numerically solve the steady-state equations. In this \npaper, we only care about the bad cavity limit γ*max*≪ \n≪ \nτ− \nκ/2. Since the atomic transit time is much shorter than \nthe damping times of atomic variables, one could ignore the \neffect of the spontaneous emission of the atom. By the stan- \ndard way [25], We get the following steady-state values: \n, \n\n, \n\n, \n\n, ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2670.pdf" + "text": "", + "page_start": 273, + "page_end": 273, + "source_file": "00-80T-80.pdf" }, { - "text": "c. Click the Define a Field icon on the toolbar. \n\nd. In the Add a Field window, complete the following steps: \n\ni. On the Field Information tab, verify the attributes of the Index field. For example, the \ntext string that you selected in the report window is displayed under Reference \nString and the trigger identifies the trigger on which the field is based. Click**Help**for \nassistance with the options and values that you can specify. \n\nii. On the Database Field Attributes tab, verify the attributes of the database field. In \nthe Database Field Name field, enter the name of the application group field into \nwhich you want Content Manager OnDemand to store the index value. In the Folder \nField Name field, enter the name of the folder field to display in the client search \nwindow. Click**Help**for assistance with the other options and values that you can \nspecify. \n\niii. Click**OK**to define the field and index. \n\ne. To verify the locations of the fields, complete the following steps: \n\ni. Place the report window into display mode. Blue boxes are drawn around the fields. \n\nii. Click the**Select**tool. \n\niii. In the Select window, under Fields, double-click**Field 1**. The graphical indexer ", - "page_start": 196, - "page_end": 196, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 274, + "page_end": 274, + "source_file": "00-80T-80.pdf" }, { - "text": "Our method of Ramsey laser is suitable for any atoms with \nmetastable energy level, as an example, we choose the tran- \nsition from the metastable state 4*s*4*p*3*P*1 to the ground state \n4*s*2 1*S*0 of 40Ca to check the striking feature of this laser: sub- \nnatural linewidth. As mentioned in [29], the corresponding \nnatural linewidth of the metastable state 4*s*4*p*3*P*1 is 320Hz. \nAs in the recently proposed active optical clock with atomic \nbeam [15], the velocity of the atoms in thermal atomic beam is \nabout 500m/s, and the length of the interaction region is about \n1mm, then the time for the atom to traverse each coherent- \ninteraction region is on the order of magnitude of 1 µs. \nIf \na bad cavity with κ is on the order of 107Hz, the relation \n1 is satisfied. Then when*g*is on the order of the \nκ/2 \nmagnitude of kHz, which can be easily achieved for current \ntechnique [30], from the linewidth expression of Eq.(16) the \norder of magnitude of linewidth is below 1 Hz. This means \nthe linewidth of a Ramsey laser can be more than two or- \nders of magnitude narrower than the atomic natural linewidth, \ntherefore our Ramsey method provides a new subnatural spec- \ntroscopy technique. And since it is stimulated-emission spec- \ntrum, it overcomes the difficulty in other subnatural linewidth \nspectroscopy schemes where the quick reduction of signal to \nnoise ratio is a formidable limit. We should point out that \nthis Ramsey laser does not escape the limitation of all active \noptical clock: in order to pump atoms to the excited state ef- \nfectively and to be stimulated emit photon during the lifetime \nof a metastable state, this new method will only be applicable \nto some special transitions [17]. \n\nτ− \n≫ ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2670.pdf" + "text": "", + "page_start": 274, + "page_end": 274, + "source_file": "00-80T-80.pdf" }, { - "text": "where Ω*R*\nresonance, \nthe Rabi \n*DS T*=*g*2 ˜*Nass*/*I*0γ*ab*\n,*DRam*\nand \n*ab*, \n∆2 = ω \nω*b*2) presents the detuning in the free \n(ω*a*2 − \ndrift region.*p*is a parameter, which characterizes the pump- \ning statistics: a Poissonian excitation statistics corresponds to \n*p*= 0 , and for a regular statistics we have*p*= 1. \n\nis \n\n− \n\n*Laser linwidth:*Suppose the quantum fluctuation is small, \nthe evolution of the fluctuations can be obtained by making a \nlinearization of the c-number Langevin equations around the \nsteady-state solution. Then the measured spectra of field fluc- \ntuations will be directly related to these quantities. By Fourier \ntransformations of the linearized equation, we get the ampli- \ntude and phase quadrature components δ*X*(ω) and δ*Y*(ω) [26]. \nWell above threshold, one can neglect the amplitude fluctu- \nations, and the linewidth inside the cavity is related to the \nphase-diffusion coefficient [25]. For small fluctuation of laser \nphase, the spectrum of phase fluctuations is simply related to \nthe spectrum of the phase quadrature component of the field \nfluctuations, namely, \n\nThen the linewidth of Ramsey laser with bad cavity is given \nby \n\nγ2 \n*ab*\n(κ/2 + γ*ab*)2 { \n\n. \n} \n(11) \nSince*DS T*/*DRam*≪ \n1 in our situation, and in the case of max- \nimal photon number, the steady state value of ˜*Nass*is about \n*R*τ/2. Then we get the \n\n2*g*2 \nκ ≈ − ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2670.pdf" + "text": "", + "page_start": 274, + "page_end": 274, + "source_file": "00-80T-80.pdf" }, { - "text": "0 \n1 \n0 \n2 \n\nn \na \nJ \n\n5 \n1 \n\n*Introduction:*Since the invention of the separated-field \ntechnique [1], it has played an important role in the field of \nprecision spectroscopy due to its linewidth narrowing effect \nvia multiple coherent interaction. Atomic clocks based on \nthis technique have greatly extended our ability for frequency \nmeasurement, further, almost all the atom interferometers are \nbased on this technique [2]. \n\ncus on the stimulated emission spectrum via multiple coher- \nent interactions inside the cavity. We find this Ramsey laser \ncan provide a stimulated-emission spectrum with a linewidth \nmuch narrower than that of any conventional optical Ramsey \nseperated-field spectroscopy, which is commonly applied in \noptical atomic clock. Our results also show that a subnatural \nlinewidth spectroscopy, superior to any other available subnat- \nural spectroscopy technique at present [3–10], can be reached \nby this kind of laser, if a suitable atomic level structure is cho- \nsen. Thus, this method can provide an effective subnatural \nspectroscopy, and the possibilities for the new optical clock \nscheme [15] and atom interferometers [2]. \n\n] \nh \np \n- \nt \nn \na \nu \nq \n[ \n\n1 \nv \n0 \n7 \n6 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2670.pdf" + "text": "", + "page_start": 274, + "page_end": 274, + "source_file": "00-80T-80.pdf" }, { - "text": "**The Linewidth of Ramsey Laser with Bad Cavity**\n\nYang Li, Wei Zhuang, Jinbiao Chen,∗ and Hong Guo† \n*CREAM Group, State Key Laboratory of Advanced Optical Communication*\n*Systems and Networks (Peking University) and Institute of Quantum Electronics,*\n*School of Electronics Engineering and Computer Science,*\n*and Center for Computational Science and Engineering (CCSE), Peking University, Beijing 100871, P. R. China*\n(Dated: October 29, 2018) \n\nWe investigate a new laser scheme by using Ramsey separated-field technique with bad cavity. By studying \nthe linewidth of the stimulated-emission spectrum of this kind of laser inside the cavity, we find its linewidth \nis more than two orders of magnitude narrower than atomic natural linewidth, and it is far superior to that \nof conventional optical Ramsey method and any other available subnatural linewidth spectroscopy at present. \nSince any cavity related noise is reduced to cavity-pulling effect in bad cavity laser, this Ramsey laser provides \nthe possibility of precision subnatural linewidth spectroscopy, which is critical for the next generation of optical \nclock and atom interferometers. \n\nPACS numbers: 42.55.Ah, 42.50.Ar, 42.60.Da, 32.30.-r ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2670.pdf" + "text": "", + "page_start": 274, + "page_end": 274, + "source_file": "00-80T-80.pdf" }, { - "text": "] \nh \np \n- \nm \ne \nh \nc \n. \ns \nc \ni \ns \ny \nh \np \n[ \n\n1 \nv \n8 \n4 \n6 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nAn alternative procedure consists in carrying out \nmolecular simulations, where both the solvent and solute \nare treated explicitly. After a rigorous averaging over \nthe solvent configurations, a coarse-grained description \nof the ions, which still includes the effect of the solvent \nstructure, can be obtained [8–11]. However, this set of \nmethods is purely numeric; they do not provide any an- \nalytical expression for thermodynamic quantities. They \nare therefore restricted to simple geometries [12, 13] (bulk \nsolutions or planar interfaces). The description of com- \nplex systems, such as porous or electrochemical materi- \nals, is still based on continuous solvent models [14]. \n\nIn this letter we present a method aimed at bridging \nthe gap between analytical and numerical approaches. It \nis based on the application of liquid perturbation theory \n(LPT) [15] to effective ion-ion potentials extracted from ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2648.pdf" + "text": "", + "page_start": 274, + "page_end": 274, + "source_file": "00-80T-80.pdf" }, { - "text": "The background copy rate property determines the speed at which grains are copied as a \nbackground operation, immediately after the FlashCopy mapping is started. That speed is \ndefined by the user when creating the FlashCopy mapping, and can be changed dynamically \nfor each individual mapping, whatever its state. Mapping copy rate values can be 0 - 150, with \nthe corresponding speeds that are listed in Table 11-1. \n\nWhen the background copy function is not performed (copy rate = 0), the target volume \nremains a valid copy of the source data only while the FlashCopy mapping remains in place. \n\nTable 11-1 Copy rate values ", - "page_start": 470, - "page_end": 470, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 274, + "page_end": 274, + "source_file": "00-80T-80.pdf" } ] }, @@ -8455,64 +8455,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 381, + "page_end": 381, + "source_file": "00-80T-80.pdf" }, { - "text": "From the expression above, we find that the pumping statis- \ntic can influence the linewidth. For regular injection (*p*= 1), \nthe linewidth is the narrowest, while for Poissonian injection \n(*p*= 0), the linewidth is the broadest. But even for regular \ninjection, the linewidth is larger than the case of one cavity. \nThat means the mechanism of separated-field does not play \nthe role in reducing the linewidth as in the conventional opti- \ncal Ramsey method, which is counter-intuitive. However, the \nseparated fields are indispensable for any phase detection like \natom interferometry. The details about the method of active \natom interferometry will appear elsewhere. \n\n1 \n*I*0 \n(δϕ2)ω = (δ*Y*2)ω. \n\n1 1 \n\nκ/2, as in the recently \nτ− \nIn the region γ*ab*≪ \nproposed active optical clock [15] with atomic beam. The \nphase quadrature component of the field fluctuations can be \nexpressed as \n\n*T*− \n≪ ≪ \n\n*g*2 \n4(κ/2 + γ*ab*)2 { \n4γ*ab*˜*Nass*", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2670.pdf" + "text": "", + "page_start": 383, + "page_end": 383, + "source_file": "00-80T-80.pdf" }, { - "text": "Though, the natural linewidth of quantum transition was \nregarded as the ultimate limit to high-resolution laser spec- \ntroscopy [4], several methods of subnatural linewidth spec- \ntroscopy have been proposed to gain subnatural linewidth [3– \n10]. However, in all these efforts, including optical Ramsey \nspectroscopy, subnatural line is realized at the expense of a \nquick reduction in signal-to-noise (SNR) ratio due to the ex- \nponential decaying of signal, thus all these schemes can only \nget the linewidth several times narrower than the atomic nat- \nural linewidth. In the past three decades, this situation does \nnot change in the field of the precision laser spectroscopy. \nOn the other hand, the thermal noise of the cavity mirrors is \nthe main obstacle for further linewidth reduction of a laser \n[11, 12], and it is a challenge to substantially reduce this noise \nfurther[13]. Recently, a new scheme, called active optical \nclock [14–18], was proposed to substantially reduce the laser \nlinewidth. With lattice trapped atoms, it is possible to reach \nmHz linewidth laser based on the mechanism of active optical \nclock [14, 15, 19]. The principal mechanism of active optical \nclock is to directly extract light emitted from the ultranarrow \natomic transition with a cavity mode linewidth much wider \nthan that of lasing. This bad cavity ensures that any frequency \nshift due to cavity noise reduces to cavity-pulling effect [15– \n17], then the thermal noise is not the major obstacle again for \nreducing the linewidth. This means the bad cavity can play an \nindispensable role in new subnatural linewidth spectroscopy. \nIn this Letter, we propose a new scheme called Ramsey \nlaser with bad cavity. Distinct from any previous applications \nof conventional Ramsey separated oscillating fields method \n[1], which focuses on the absorption spectrum, we here fo- ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2670.pdf" + "text": "", + "page_start": 382, + "page_end": 382, + "source_file": "00-80T-80.pdf" }, { - "text": "Our method of Ramsey laser is suitable for any atoms with \nmetastable energy level, as an example, we choose the tran- \nsition from the metastable state 4*s*4*p*3*P*1 to the ground state \n4*s*2 1*S*0 of 40Ca to check the striking feature of this laser: sub- \nnatural linewidth. As mentioned in [29], the corresponding \nnatural linewidth of the metastable state 4*s*4*p*3*P*1 is 320Hz. \nAs in the recently proposed active optical clock with atomic \nbeam [15], the velocity of the atoms in thermal atomic beam is \nabout 500m/s, and the length of the interaction region is about \n1mm, then the time for the atom to traverse each coherent- \ninteraction region is on the order of magnitude of 1 µs. \nIf \na bad cavity with κ is on the order of 107Hz, the relation \n1 is satisfied. Then when*g*is on the order of the \nκ/2 \nmagnitude of kHz, which can be easily achieved for current \ntechnique [30], from the linewidth expression of Eq.(16) the \norder of magnitude of linewidth is below 1 Hz. This means \nthe linewidth of a Ramsey laser can be more than two or- \nders of magnitude narrower than the atomic natural linewidth, \ntherefore our Ramsey method provides a new subnatural spec- \ntroscopy technique. And since it is stimulated-emission spec- \ntrum, it overcomes the difficulty in other subnatural linewidth \nspectroscopy schemes where the quick reduction of signal to \nnoise ratio is a formidable limit. We should point out that \nthis Ramsey laser does not escape the limitation of all active \noptical clock: in order to pump atoms to the excited state ef- \nfectively and to be stimulated emit photon during the lifetime \nof a metastable state, this new method will only be applicable \nto some special transitions [17]. \n\nτ− \n≫ ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2670.pdf" + "text": "", + "page_start": 382, + "page_end": 382, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\nWATER INJECTION \n\nWATER INJECTION \nNOZZLES ", - "page_start": 148, - "page_end": 148, + "text": "", + "page_start": 382, + "page_end": 382, "source_file": "00-80T-80.pdf" }, { - "text": "**The Linewidth of Ramsey Laser with Bad Cavity**\n\nYang Li, Wei Zhuang, Jinbiao Chen,∗ and Hong Guo† \n*CREAM Group, State Key Laboratory of Advanced Optical Communication*\n*Systems and Networks (Peking University) and Institute of Quantum Electronics,*\n*School of Electronics Engineering and Computer Science,*\n*and Center for Computational Science and Engineering (CCSE), Peking University, Beijing 100871, P. R. China*\n(Dated: October 29, 2018) \n\nWe investigate a new laser scheme by using Ramsey separated-field technique with bad cavity. By studying \nthe linewidth of the stimulated-emission spectrum of this kind of laser inside the cavity, we find its linewidth \nis more than two orders of magnitude narrower than atomic natural linewidth, and it is far superior to that \nof conventional optical Ramsey method and any other available subnatural linewidth spectroscopy at present. \nSince any cavity related noise is reduced to cavity-pulling effect in bad cavity laser, this Ramsey laser provides \nthe possibility of precision subnatural linewidth spectroscopy, which is critical for the next generation of optical \nclock and atom interferometers. \n\nPACS numbers: 42.55.Ah, 42.50.Ar, 42.60.Da, 32.30.-r ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2670.pdf" + "text": "", + "page_start": 382, + "page_end": 382, + "source_file": "00-80T-80.pdf" }, { - "text": "In summary, we propose a new subnatural \nlinewidth spectroscopy technique, which is a laser by us- \ning Ramsey seperated-field cavity to realize the output of \nstimulated-emission radiation via multiple coherent interac- \ntion with atomic beam. We find the linewidth of Ramsey laser \nis subnatural if we choose an appropriate atomic level, and the \nbad-cavity laser mechanism will dramatically reduce cavity- \nrelated noise as discussed in active optical clock [15–19]. Our \nresults show that this new subnatural linewidth spectroscopy \nis superior to conventional optical Ramsey seperated-field \nspectroscopy and any other available subnatural spectroscopy \ntechnique at present [3–10]. Considering one have to ap- \nply the separated-field method in any phase detection as in \nRamsey-Bord*e*´interferometer [2], to investigate the effects of \nphase differences between the two oscillating fields [31] in \nthis stimulated separated-field method with such subnatural \nlinewidth will be our next research aim. \n\n*Conclusion:*\n\n[18] Y. Wang, Chinese Science Bulletin**54**, 347 (2009). \n[19] D. Meiser, J. Ye, D. R. Carlson, and M. J. Holland, Phys. Rev. ", - "page_start": 4, - "page_end": 4, - "source_file": "1001.2670.pdf" + "text": "", + "page_start": 382, + "page_end": 382, + "source_file": "00-80T-80.pdf" }, { - "text": "where Ω*R*\nresonance, \nthe Rabi \n*DS T*=*g*2 ˜*Nass*/*I*0γ*ab*\n,*DRam*\nand \n*ab*, \n∆2 = ω \nω*b*2) presents the detuning in the free \n(ω*a*2 − \ndrift region.*p*is a parameter, which characterizes the pump- \ning statistics: a Poissonian excitation statistics corresponds to \n*p*= 0 , and for a regular statistics we have*p*= 1. \n\nis \n\n− \n\n*Laser linwidth:*Suppose the quantum fluctuation is small, \nthe evolution of the fluctuations can be obtained by making a \nlinearization of the c-number Langevin equations around the \nsteady-state solution. Then the measured spectra of field fluc- \ntuations will be directly related to these quantities. By Fourier \ntransformations of the linearized equation, we get the ampli- \ntude and phase quadrature components δ*X*(ω) and δ*Y*(ω) [26]. \nWell above threshold, one can neglect the amplitude fluctu- \nations, and the linewidth inside the cavity is related to the \nphase-diffusion coefficient [25]. For small fluctuation of laser \nphase, the spectrum of phase fluctuations is simply related to \nthe spectrum of the phase quadrature component of the field \nfluctuations, namely, \n\nThen the linewidth of Ramsey laser with bad cavity is given \nby \n\nγ2 \n*ab*\n(κ/2 + γ*ab*)2 { \n\n. \n} \n(11) \nSince*DS T*/*DRam*≪ \n1 in our situation, and in the case of max- \nimal photon number, the steady state value of ˜*Nass*is about \n*R*τ/2. Then we get the \n\n2*g*2 \nκ ≈ − ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2670.pdf" + "text": "", + "page_start": 382, + "page_end": 382, + "source_file": "00-80T-80.pdf" }, { - "text": "also shift the spinodal and binodal lines as compared to the locations of these lines in the phase \n\ndiagram for the pure solvent [41]. As a consequence, the solute concentration influences the hole \n\nnucleation rate. More importantly, the solute particles may also destabilise the dewetting fronts. \n\nAs a result, one may find strongly ramified structures in all three systems [23, 25, 40, 42]. A \n\nselection of images exhibiting some of the possible structures is displayed in Fig.1. \n\nFor volatile solvents, the contact lines retract even for wetting fluids. It has been found that such \n\nevaporatively receding contact lines may deposit very regular line or ring patterns parallel to the \n\nmoving contact line [24, 43]. The deposition of a single ring of colloids from a evaporating \n\ndrop of colloidal suspension is well known as the ‘coffee stain effect’ [44]. Detailed investiga- \n\ntions reveal the emergence of rich structures including multiple irregular rings, networks, regular \n\ndroplet patterns, sawtooth patterns, Sierpinski carpets, and – in the case of DNA – liquid crys- \n\ntalline structures [22, 30, 45–49]. The deposition of regularly spaced straight lines orthogonal to ", - "page_start": 4, - "page_end": 4, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 382, + "page_end": 382, + "source_file": "00-80T-80.pdf" } ] }, @@ -8523,70 +8523,70 @@ "target_page": 1, "target_passage": "Ferromagnetic (FM) semiconductors offer the prospect of combining high-density storage and gate-controlled logic in a single material.", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "] \ni \nc \ns \n- \nl \nr \nt \n\nFerromagnetic (FM) semiconductors offer the prospect \nof combining high-density storage and gate-controlled \nlogic in a single material. The realization of spin-valve \ndevices from FM semiconductors requires the controlled \nswitching of magnetization in adjacent layers between \nantiferromagnetic (AFM) and FM configurations. This \nhas motivated several theoretical investigations of inter- \nlayer coupling in all-semiconductor devices1, and AFM \ncoupling has recently been demonstrated in (Ga,Mn)As \nmultilayers separated by p-type non-magnetic spacers2. \nHowever, the Curie temperature TC of (Ga,Mn)As is \ncurrently limited to 185 K in single layers3, and is \ntypically much lower for layers embedded within a \nheterostructure2, which is an obstacle to the practical \nimplementation of semiconductor spintronics. \n\nm \n\n. \nt \na \nm \n- \nd \nn \no \nc \n[ \n\nHere, we demonstrate an antiferromagnetic coupling \nand exchange bias in Fe/(Ga,Mn)As bilayer films, by \ncombining element-specific XMCD measurements and \nbulk-sensitive superconducting quantum interference de- \nvice (SQUID) magnetometry. As with previous studies \nof FM metal/FM semiconductor bilayers4,5 (and in con- \ntrast to AFM coupled FM metal/FM metal exchange bias \nstructures10,11) the layers are in direct contact without \na non-magnetic spacer in between. We distinguish in- \nterface and bulk (Ga,Mn)As layers that are respectively \nstrongly and weakly antiferromagnetically coupled to the \nFe overlayer. In agreement with Ref.7, the interface layer \nremains polarized at room temperature. \n\n1 \nv \n9 \n4 \n4 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2449.pdf" + "text": "", + "page_start": 111, + "page_end": 111, + "source_file": "00-80T-80.pdf" }, { - "text": "Similar behavior is observed for bilayer samples con- \ntaining a 10 nm or 50 nm (Ga,Mn)As layer, with a \nbias field which is approximately inversely proportional \nto the thickness d of the ferromagnetic semiconductor \nlayer (Fig. 1, inset). This 1/d dependence of HE was \nfound previously for MnAs/(Ga,Mn)As bilayers4, and \nis generally observed in exchanged-biased thin films12. \nFrom this dependence it is possible to describe the ex- \nchange bias in terms of an interface energy per unit area, \n∆E = MF SHEd = 0.003 erg/cm2. This value is rather \nsmall compared to typical exchange bias systems12, re- \nflecting the low moment density MF S of the diluted \nFM semiconductor layer. However, the bias field for a \ngiven (Ga,Mn)As thickness is larger than is observed for \nMnO/(Ga,Mn)As structures13, while the reproducibility \nand flexibility of the present structures is much higher \ndue to the single-crystalline ferromagnetic nature of the \nFe layer. ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2449.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "I. INTRODUCTION \n\nfrustrated magnetic \nsystems1 still raises great interest, both in consequence \nof theoretical aspects, related to their peculiar criti- \ncal properties2, and in view of possible technological \napplications3. Indeed, beside conventional ferromagnetic \nor antiferromagnetic phase transitions, in many new ma- \nterials other nontrivial and unconventional forms of or- \ndering have been observed4,5. A quantity of particular \ninterest in this context is the spin chirality, an order pa- \nrameter which turned out to be extremely relevant in, \ne.g., magnetoelectric materials6, itinerant MnSi7, binary \ncompounds as FeGe8, glass transition of spins9, and XY \nhelimagnets, as Holmium, Terbium or Dysprosium10. In \nthe latter case, a new universality class was predicted be- \ncause a Z2 × SO(2) symmetry is spontaneously broken \nin the ordered phase2: In fact, when dealing with such \nsystems, in addition to the SO(2) symmetry of the spin \ndegrees of freedom ~Si, one has to consider also the Z2 \nsymmetry of the spin chirality κij ∝ \n\nThe study of low dimensional ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0510.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "The development of FM metal/FM semiconductor het- \nerostructures has the potential to bring together the \nbenefits of metal and semiconductor based spintron- \nics, offering access to new functionalities and physi- \ncal phenomena. Recent studies of MnAs/(Ga,Mn)As \nand NiFe/(Ga,Mn)As bilayer films have shown FM in- \nterlayer coupling and independent magnetization be- \nhavior, respectively4,5. Of particular interest is the \nFe/(Ga,Mn)As system, since the growth of epitaxial \nFe/GaAs(001) films is well-established6. Remarkably, a \nrecent x-ray magnetic circular dichroism (XMCD) study \nhas shown that Fe may induce a proximity polariza- \ntion in the near-surface region of (Ga,Mn)As, antipar- \nallel to the Fe moment and persisting even above room \ntemperature7. Devices incorporating Fe/(Ga,Mn)As \ntherefore offer the prospect of obtaining non-volatile \nroom temperature spin-polarization in a semiconductor. \nUntil now, no information has been revealed about the \ncoupling of Fe to (Ga,Mn)As layers away from the near- \nsurface region. At the surface, the (Ga,Mn)As layer may \nbe highly non-stoichiometric and Mn-rich, due to its non- \nequilibrium nature8,9. Previously, Fe/(Ga,Mn)As layers \nwere produced by a process including exposure to air fol- \nlowed by sputtering and annealing prior to Fe deposition, ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2449.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "In summary, we have demonstrated antiferromagnetic \ncoupling between Fe and (Ga,Mn)As layers in bilayer \nstructures. A markedly different coupling is observed for \nthe bulk of the (Ga,Mn)As layer and for Mn moments \nin the near-interface region. A thickness-dependent ex- \nchange bias field is observed to affect the whole of the \nbulk (Ga,Mn)As layer, which aligns antiparallel to the \nFe layer at low fields, and switches to parallel when the \nexternal field is large enough to overcome the bias field \nand the magnetocrystalline anisotropy fields. In contrast, \nthe interfacial Mn moments remain aligned antiparallel \nto the Fe layer even at 20 kOe, the largest field studied, \nand are polarized at temperatures well above the TC of \nthe bulk (Ga,Mn)As layer. The latter observation con- \nfirms the recently reported result of Ref. 7, in which \nthe Fe/(Ga,Mn)As bilayers were produced by a different \nmethod but showed qualitatively similar behavior of the \ninterfacial moments. Our results shed new light on the \nmagnetic coupling in Fe/(Ga,Mn)As hybrid layers which \nare of potential interest for room temperature spintron- \nics, and also offer a means of controlling the spin orien- \ntation in a FM semiconductor. \nfrom EU grants \nacknowledge \nand \nSemiSpinNet-215368 \nSTFC studentship grant CMPC07100. The Advanced \nLight Source is supported by the U.S. Department of \nEnergy under Contract No. \nDE-AC02-05CH11231. \nWe thank Leigh Shelford for help during the Diamond \nbeamtime. \n\nWe ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2449.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "measurements were performed on beamline I06 at the \nDiamond Light Source, and on beamline 4.0.2 at the Ad- \nvanced Light Source. Total-electron yield (TEY) and \nfluorescence yield (FY) were monitored simultaneously \nusing the sample drain current and the photocurrent of a \ndiode mounted at 90◦ to the incident beam, respectively. \nwere \nmagnetometry \nand \ncontrol Fe/GaAs(001) \nfirst \non \nperformed \ngrown under \nthe \nsamples, \n(Ga,Mn)As/GaAs(001) \nsame conditions as the bilayers, \nto determine the \nmagnetic anisotropies of the individual layers and the \nCurie temperature of the (Ga,Mn)As layer. The Fe film \nhas a uniaxial magnetic anisotropy with easy axis along \nthe [110] orientation, similar to previous studies6. For \nthe (Ga,Mn)As control sample, there is a competition \nbetween cubic and uniaxial magnetic anisotropies, with \nthe former dominant at low temperatures and favoring \neasy axes along the in-plane h100i orientations, and the \nlatter dominant close to TC (∼35 K) giving an easy axis \nalong the [1¯10] orientation. Figure 1 shows [110] magne- \ntization versus temperature curves and low temperature \nhysteresis loops for a bilayer film containing a 20 nm \nthick (Ga,Mn)As layer. The total remnant moment of \nthe bilayer film decreases on cooling under zero magnetic \nfield below the TC of the (Ga,Mn)As, indicating that \nthis layer aligns antiparallel to the Fe magnetization \nat zero field. The hysteresis curve shows a two-step \nmagnetization reversal, indicating different behavior of \nthe Fe and (Ga,Mn)As layers, with the smaller loop \nattributed to the dilute moment (Ga,Mn)As film. The \nminor hysteresis loop shown in Fig. 1 clearly shows a \nshift from zero field by a bias field HE, indicating that \nthe Fe layer induces an exchange bias in the magnetic \nsemiconductor. The shape and size of the minor loop \nis in agreement with the hysteresis loop for the control \n(Ga,Mn)As sample, also shown in Fig. 1. This strongly \nindicates that the exchange bias affects the whole of the \n(Ga,Mn)As layer in the bilayer sample. \n\nSQUID ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2449.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "Figure 2(a)-(c) shows the magnetic field dependence of \nXMCD asymmetry, defined as (Il − Ir)/(Il + Ir) where \nIl(r) is the absorption for left- (right-) circularly polarized \nx-rays. This is measured at the Fe and Mn L3 absorption \npeaks for a Fe(2 nm)/(Ga,Mn)As(10 nm) sample at 2 K. \nThe external field is applied along the photon incidence \ndirection, which is at 70◦ to the surface normal with \nan in-plane projection along the [110] axis. The XMCD \ndata show that the Fe film displays a square hysteresis \nloop with a single magnetization switch, as expected for \na monocrystalline Fe film with strong uniaxial magnetic \nanisotropy. The Mn XMCD shows a more complicated \nloop due to the effect of the interlayer coupling. The pro- \njected Mn moment aligns antiparallel to the Fe moment \nat remanence, and undergoes a magnetization reversal of \nopposite sign to the Fe. With further increase of the ex- \nternal magnetic field, the Mn moment gradually rotates \naway from antiparallel alignment with the Fe layer, and \ninto the field direction. Qualitatively similar behavior \nis observed for the Fe(2 nm)/(Ga,Mn)As(20 nm) sam- \nple: the (Ga,Mn)As layer is aligned antiparallel to the \nFe layer at zero field, although the bias field is lower by \napproximately a factor of two. ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2449.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "samples15, the projected Mn 3d magnetic moments are \nobtained as −1.4 µB and +0.8 µB per ion at remanence \nand 1000 Oe, respectively. \n\nmonolayers, assuming a uniform distribution of Mn ions \nand magnetic moments throughout the (Ga,Mn)As film. \nThis is around a factor of three thinner than in Ref.7, \nwhich could be due to the lower Mn concentration or the \ndifferent preparation method of the present samples. \n\nThe difference between these values can be understood \nas being due to an interface layer which is strongly anti- \nferromagnetically coupled to the Fe layer. At zero field, \nboth the interfacial and bulk Mn are aligned antiparallel \nto the Fe layer. At high fields, the bulk of the (Ga,Mn)As \nlayer away from the interface is re-oriented into the exter- \nnal field direction. However, the interfacial Mn remains \nantiparallel to the Fe layer and thus partially compen- \nsates the XMCD signal from the bulk of the (Ga,Mn)As. \nFrom the size of the remanent and 1000 Oe magnetic \nmoments, it can be estimated that around 25-30% of the \nTEY XMCD signal can be ascribed to the interfacial Mn \nwhich is strongly coupled to the Fe moments. ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2449.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" } ] }, @@ -8597,69 +8597,69 @@ "target_page": 2, "target_passage": "SQUID magnetometry measurements were first performed on control Fe/GaAs(001) and (Ga,Mn)As/GaAs(001) samples", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 131, + "page_end": 131, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 151, + "page_end": 151, + "source_file": "00-80T-80.pdf" }, { - "text": "measurements were performed on beamline I06 at the \nDiamond Light Source, and on beamline 4.0.2 at the Ad- \nvanced Light Source. Total-electron yield (TEY) and \nfluorescence yield (FY) were monitored simultaneously \nusing the sample drain current and the photocurrent of a \ndiode mounted at 90◦ to the incident beam, respectively. \nwere \nmagnetometry \nand \ncontrol Fe/GaAs(001) \nfirst \non \nperformed \ngrown under \nthe \nsamples, \n(Ga,Mn)As/GaAs(001) \nsame conditions as the bilayers, \nto determine the \nmagnetic anisotropies of the individual layers and the \nCurie temperature of the (Ga,Mn)As layer. The Fe film \nhas a uniaxial magnetic anisotropy with easy axis along \nthe [110] orientation, similar to previous studies6. For \nthe (Ga,Mn)As control sample, there is a competition \nbetween cubic and uniaxial magnetic anisotropies, with \nthe former dominant at low temperatures and favoring \neasy axes along the in-plane h100i orientations, and the \nlatter dominant close to TC (∼35 K) giving an easy axis \nalong the [1¯10] orientation. Figure 1 shows [110] magne- \ntization versus temperature curves and low temperature \nhysteresis loops for a bilayer film containing a 20 nm \nthick (Ga,Mn)As layer. The total remnant moment of \nthe bilayer film decreases on cooling under zero magnetic \nfield below the TC of the (Ga,Mn)As, indicating that \nthis layer aligns antiparallel to the Fe magnetization \nat zero field. The hysteresis curve shows a two-step \nmagnetization reversal, indicating different behavior of \nthe Fe and (Ga,Mn)As layers, with the smaller loop \nattributed to the dilute moment (Ga,Mn)As film. The \nminor hysteresis loop shown in Fig. 1 clearly shows a \nshift from zero field by a bias field HE, indicating that \nthe Fe layer induces an exchange bias in the magnetic \nsemiconductor. The shape and size of the minor loop \nis in agreement with the hysteresis loop for the control \n(Ga,Mn)As sample, also shown in Fig. 1. This strongly \nindicates that the exchange bias affects the whole of the \n(Ga,Mn)As layer in the bilayer sample. \n\nSQUID ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2449.pdf" + "text": "", + "page_start": 149, + "page_end": 149, + "source_file": "00-80T-80.pdf" }, { - "text": "The Fe and (Ga,Mn)As layers of the present study \nwere both grown by molecular beam epitaxy in the same \nultra-high vacuum system, in order to ensure a clean in- \nterface between them. The (Ga,Mn)As layer of thickness \n10 to 50 nm was deposited on a GaAs(001) substrate \nat a temperature of 260◦C, using previously established \nmethods3,8. A low Mn concentration of x ≈ 0.03 was \nchosen in order to avoid the formation of compensating \nMn interstitials. The substrate temperature was then \nreduced to ∼0◦C, before depositing a 2 nm Fe layer, \nplus a 2 nm Al capping layer. \nIn-situ reflection high \nenergy electron diffraction and ex-situ x-ray reflectivity \nand diffraction measurements confirmed that the layers \nare single-crystalline with sub-nm interface roughness. \nSQUID magnetometry measurements were performed us- \ning a Quantum Design Magnetic Property Measurement \nSystem. Mn and Fe L2,3 x-ray absorption and XMCD ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2449.pdf" + "text": "", + "page_start": 149, + "page_end": 149, + "source_file": "00-80T-80.pdf" }, { - "text": "dependence of different samples during the measurement \nstage. For each temperature we have usually performed \nthree independent simulations, each one containing at \nleast 2×105 measurements, taken after discarding up to \n5×104 Monte Carlo steps in order to assure thermal equi- \nlibration. \n\nIn the proximity of the critical region the multiple his- \ntogram (MH) technique was also employed21, as it allows \nus to estimate the physical observables of interest over a \nwhole temperature range in a substantially continuous \nway by interpolating results obtained from sets of simu- \nlations performed at some different temperatures. \n\nFor all the quantities of interest, the average value and \nthe error estimate were obtained by the bootstrap re- \nsampling method22 given that, as pointed out in Ref. 23, \nfor a large enough number of measurements, this method \nturns out to be more accurate than the usual blocking \ntechnique. In our implementation, we pick out randomly \na sizable number of measurements (typically, between 1 \nand 1×103 for the single simulation, and between 1 and \n5×104 for the MH technique), and iterate the re-sampling \nat least one hundred times. ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0510.pdf" + "text": "", + "page_start": 150, + "page_end": 150, + "source_file": "00-80T-80.pdf" }, { - "text": "To monitor state-dependent mood and lifestyle measures, the \nfollowing scales were administered on each experiment day: Perceived \nStress Scale50, Pittsburgh Sleep Quality Index51, State-Trait Anxiety \nInventory for Adults52 and Profile of Mood States53. Correlation analy- \nses between state-dependent measures, summary brain metrics and \ngestation week revealed little to no relationships. The only exception \nto this was a moderate negative association between global QA and \nstate anxiety (Spearman’s correlation (*ρ*) = −0.65,*q*= 0.04; baseline—36 \nweeks,*n*= 16). By making this data openly accessible, we encourage a \nmore nuanced approach toward exploring mood and lifestyle measures \nin relation to brain changes over pregnancy. \n\n**Endocrine procedures**\nThe participant underwent a blood draw (*n*= 19; Fig. 1c) before \nMRI scanning. Sex steroid concentrations were determined via \nultra-sensitive liquid chromatography–mass spectrometry at the \nBrigham and Women’s Hospital Research Assay Core (BRAC). Assay \nsensitivities, dynamic range and intra-assay coefficients of variation \n\nNature Neuroscience ", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed4.pdf" + "text": "", + "page_start": 150, + "page_end": 150, + "source_file": "00-80T-80.pdf" }, { - "text": "where Zo ∼ 2 ωsf χ0/ ∂Π \n∂ω \n\n. The imaginary part \n| \nof the spin susceptibility describing a gaped continuum \nexists for for Ω ≥ 2∆ and is \n\nΩ=ω0 \n\nThe collective nature of spin fluctuations is reflected in \nthe fact that the coupling λ and the bosonic frequency \nωsf are related: λ scales as ξ2, where ξ is the bosonic \nmass (the distance to a bosonic instability), and ωsf ∝ \n2 (see Ref. 49). For a flat χ(q ∼ Q) the product λωsf \nξ− \ndoes not depend on ξ and is the overall dimensional scale \nfor boson-mediated interactions. \n\n′′ \nχ (q, Ω) = Im \n1 − 1 \nωsf \n\" \n\n(cid:0) \n\nχ0 \nπ∆2 \nΩ + i π \n≈ Im \n1 − 1 \nωsf 2 Ω \" # \n\n(cid:1) \nIn Eq. (23) D(x) = K1(x) \nK2(x) \n, and K1(x) and K2(x) \nare Elliptic integrals of first and second kind. The real \npart of χ is obtained by Kramers-Kr¨onig transform of the \nimaginary part. \n\n(cid:0) \n− \nx ", - "page_start": 11, - "page_end": 11, - "source_file": "1001.0764.pdf" + "text": "", + "page_start": 150, + "page_end": 150, + "source_file": "00-80T-80.pdf" }, { - "text": "In this paper, we present the findings from a unique op- \nportunity to examine the laboratory function, muscle size, \nand distribution of muscle mass, as well as patellar tendon \nsize and moment arm, of a World’s Strongest Man and dead- \nlift champion (WSM) in comparison with existing data on \nuntrained individuals, power athletes (100-m-track sprint- \ners), and long-term resistance-trained populations that we \nhave assessed previously (10, 11, 13–15). \n\nMRI Measurement of Muscle Tendon Unit Morphology \nand Moment Arm \nMATERIALS AND METHODS \n\nParticipant \n\nThe WSM’s achievements included one World’s Strongest \nMan title (14 mo prior to measurement), five Britain’s \nStrongest Man titles (the most recent 6 mo prior to measure- \nment), twice being World Deadlift Champion and Deadlift \nWorld Record holder (500 kg; at the time of measurement), \nand second place at Europe’s Strongest Man. Prior to agreeing \nto participate, the purpose of the research study and the test- \ning procedures were explained to the participant along with \nthe risks and benefits of taking part. The participant gave his \nwritten informed consent to participate in the study that was \napproved by the Loughborough University Ethical Advisory \nCommittee (Ethics Number R18-P090). Included in the writ- \nten consent was a statement providing permission for publi- \ncation of the collected data and the likelihood that their \nidentity may be evident based on their achievements and \ncharacteristics, despite anonymization. ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed12.pdf" + "text": "", + "page_start": 150, + "page_end": 150, + "source_file": "00-80T-80.pdf" }, { - "text": "The exact sample size (*n*) for each experimental group/condition, given as a discrete number and unit of measurement \n\nA statement on whether measurements were taken from distinct samples or whether the same sample was measured repeatedly \n\nThe statistical test(s) used AND whether they are one- or two-sided \n*Only common tests should be described solely by name; describe more complex techniques in the Methods section.*\n\nA description of all covariates tested \n\nA description of any assumptions or corrections, such as tests of normality and adjustment for multiple comparisons \n\nA full description of the statistical parameters including central tendency (e.g. means) or other basic estimates (e.g. regression coefficient) \nAND variation (e.g. standard deviation) or associated estimates of uncertainty (e.g. confidence intervals) \n\nFor null hypothesis testing, the test statistic (e.g.*F*,*t*,*r*) with confidence intervals, effect sizes, degrees of freedom and*P*value noted \n*Give P values as exact values whenever suitable.*\n\nFor Bayesian analysis, information on the choice of priors and Markov chain Monte Carlo settings \n\nFor hierarchical and complex designs, identification of the appropriate level for tests and full reporting of outcomes \n\nEstimates of effect sizes (e.g. Cohen's*d*, Pearson's*r*), indicating how they were calculated ", - "page_start": 14, - "page_end": 14, - "source_file": "pubmed4.pdf" - }, + "text": "", + "page_start": 150, + "page_end": 150, + "source_file": "00-80T-80.pdf" + }, { - "text": "\n\ntests may ", - "page_start": 79, - "page_end": 79, + "text": "", + "page_start": 150, + "page_end": 150, "source_file": "00-80T-80.pdf" } ] @@ -8671,70 +8671,70 @@ "target_page": 2, "target_passage": "For FY the magnitude of the XMCD is similar (but of opposite sign) at remanence and at high mag netic fields, whereas for TEY at remanence it is approx imately a factor of two larger than at 1000 Oe.", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 294, + "page_end": 294, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 263, + "page_end": 263, + "source_file": "00-80T-80.pdf" }, { - "text": "Clear differences are observed between the Mn XMCD \nhysteresis loops obtained using TEY and FY detection \nmodes. For FY the magnitude of the XMCD is similar \n(but of opposite sign) at remanence and at high mag- \nnetic fields, whereas for TEY at remanence it is approx- \nimately a factor of two larger than at 1000 Oe. The \nMn L2,3 XMCD spectra recorded at remanence and at \n1000 Oe, shown in Fig. 3, confirm this result. At re- \nmanence the FY and TEY detected XMCD have similar \nmagnitudes. However, under a large external field the \nXMCD is substantially smaller in TEY than in FY, con- \nfirming that the net magnetization of the Mn ions near \nthe interface is significantly less than in the bulk of the \n(Ga,Mn)As film. This is the case even up to the high- \nest field applied (20 kOe). By applying the XMCD sum \nrules14 to the TEY data, and by comparing the spectra to \nprevious measurements on well-characterized (Ga,Mn)As ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2449.pdf" + "text": "", + "page_start": 46, + "page_end": 46, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "L2,3 absorption edges in order to determine the magnetic \nresponse of the individual elements. In L2,3 XMCD, elec- \ntrons are excited from a 2p core level to the unoccupied \n3d valence states of the element of interest by circularly \npolarized x-rays at the resonance energies of the transi- \ntions. The difference in absorption for opposite polariza- \ntions gives a direct and element-specific measurement of \nthe projection of the 3d magnetic moment along the x- \nray polarization vector. The absorption cross-section is \nconventionally obtained by measuring the decay products \n– either fluorescent x-rays or electrons – of the photoex- \ncited core hole. The type of decay product measured \ndetermines the probing depth of the technique. For Mn \nL2,3 absorption, the probing depths for FY and TEY de- \ntection are λF Y ≈ 100 nm and λT EY ≈ 3 nm. \nIn the \ncurrent experiment, the Mn XMCD measured using FY \nand TEY are thus sensitive to the bulk of the (Ga,Mn)As \nfilm and the near-interface layers, respectively. ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2449.pdf" + "text": "", + "page_start": 46, + "page_end": 46, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "FIG. 3. (color online) (a) Polarization-averaged Mn L2,3 spec- \ntrum for a Fe/(Ga,Mn)As film; (b) XMCD spectra measured \nin remanence at 2 K; (c) XMCD spectra measured under a \n1000 Oe applied field at 2 K; (d) XMCD spectrum measured \nunder a 2000 Oe applied field at 300 K. XMCD spectra are \nobtained using TEY (thick red lines) and FY (thin blue lines) \ndetection. ", - "page_start": 6, - "page_end": 6, - "source_file": "1001.2449.pdf" + "text": "", + "page_start": 46, + "page_end": 46, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "The interfacial Mn moments are ascribed to the prox- \nimity polarization of the (Ga,Mn)As interface by the Fe \nlayer, such as was shown previously by XMCD as well as \nab initio theory7. Evidence for this can be observed from \nmeasurement of the Mn L2,3 XMCD signal at tempera- \ntures above the (Ga,Mn)As TC . Similar to the previous \nstudy7, we observe a small but not negligible signal at \nroom temperature (Fig. 3), with opposite sign to the Fe \nL2,3 XMCD. Its spectral shape is characteristic of a local- \nized electronic configuration close to d5, similar to bulk \n(Ga,Mn)As7,9,15 but in contrast to Mn in more metallic \n7 or MnAs16. A slight \nenvironments such as MnxFe1−x \nbroadening is observed on the low energy side of the Mn \nL3 peak, which may be due to the different screening in- \nduced by proximity to the Fe layer. Since the measured \nintensity is attenuated with distance z from the surface \nas I = I0 exp(−z/λT EY ), the thickness of the strongly \ncoupled interface layer is estimated to be ∼0.7 nm or 2-3 ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2449.pdf" + "text": "", + "page_start": 92, + "page_end": 92, + "source_file": "00-80T-80.pdf" }, { - "text": "measurements were performed on beamline I06 at the \nDiamond Light Source, and on beamline 4.0.2 at the Ad- \nvanced Light Source. Total-electron yield (TEY) and \nfluorescence yield (FY) were monitored simultaneously \nusing the sample drain current and the photocurrent of a \ndiode mounted at 90◦ to the incident beam, respectively. \nwere \nmagnetometry \nand \ncontrol Fe/GaAs(001) \nfirst \non \nperformed \ngrown under \nthe \nsamples, \n(Ga,Mn)As/GaAs(001) \nsame conditions as the bilayers, \nto determine the \nmagnetic anisotropies of the individual layers and the \nCurie temperature of the (Ga,Mn)As layer. The Fe film \nhas a uniaxial magnetic anisotropy with easy axis along \nthe [110] orientation, similar to previous studies6. For \nthe (Ga,Mn)As control sample, there is a competition \nbetween cubic and uniaxial magnetic anisotropies, with \nthe former dominant at low temperatures and favoring \neasy axes along the in-plane h100i orientations, and the \nlatter dominant close to TC (∼35 K) giving an easy axis \nalong the [1¯10] orientation. Figure 1 shows [110] magne- \ntization versus temperature curves and low temperature \nhysteresis loops for a bilayer film containing a 20 nm \nthick (Ga,Mn)As layer. The total remnant moment of \nthe bilayer film decreases on cooling under zero magnetic \nfield below the TC of the (Ga,Mn)As, indicating that \nthis layer aligns antiparallel to the Fe magnetization \nat zero field. The hysteresis curve shows a two-step \nmagnetization reversal, indicating different behavior of \nthe Fe and (Ga,Mn)As layers, with the smaller loop \nattributed to the dilute moment (Ga,Mn)As film. The \nminor hysteresis loop shown in Fig. 1 clearly shows a \nshift from zero field by a bias field HE, indicating that \nthe Fe layer induces an exchange bias in the magnetic \nsemiconductor. The shape and size of the minor loop \nis in agreement with the hysteresis loop for the control \n(Ga,Mn)As sample, also shown in Fig. 1. This strongly \nindicates that the exchange bias affects the whole of the \n(Ga,Mn)As layer in the bilayer sample. \n\nSQUID ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2449.pdf" + "text": "", + "page_start": 53, + "page_end": 53, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "Figure 2(a)-(c) shows the magnetic field dependence of \nXMCD asymmetry, defined as (Il − Ir)/(Il + Ir) where \nIl(r) is the absorption for left- (right-) circularly polarized \nx-rays. This is measured at the Fe and Mn L3 absorption \npeaks for a Fe(2 nm)/(Ga,Mn)As(10 nm) sample at 2 K. \nThe external field is applied along the photon incidence \ndirection, which is at 70◦ to the surface normal with \nan in-plane projection along the [110] axis. The XMCD \ndata show that the Fe film displays a square hysteresis \nloop with a single magnetization switch, as expected for \na monocrystalline Fe film with strong uniaxial magnetic \nanisotropy. The Mn XMCD shows a more complicated \nloop due to the effect of the interlayer coupling. The pro- \njected Mn moment aligns antiparallel to the Fe moment \nat remanence, and undergoes a magnetization reversal of \nopposite sign to the Fe. With further increase of the ex- \nternal magnetic field, the Mn moment gradually rotates \naway from antiparallel alignment with the Fe layer, and \ninto the field direction. Qualitatively similar behavior \nis observed for the Fe(2 nm)/(Ga,Mn)As(20 nm) sam- \nple: the (Ga,Mn)As layer is aligned antiparallel to the \nFe layer at zero field, although the bias field is lower by \napproximately a factor of two. ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2449.pdf" + "text": "", + "page_start": 53, + "page_end": 53, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "samples15, the projected Mn 3d magnetic moments are \nobtained as −1.4 µB and +0.8 µB per ion at remanence \nand 1000 Oe, respectively. \n\nmonolayers, assuming a uniform distribution of Mn ions \nand magnetic moments throughout the (Ga,Mn)As film. \nThis is around a factor of three thinner than in Ref.7, \nwhich could be due to the lower Mn concentration or the \ndifferent preparation method of the present samples. \n\nThe difference between these values can be understood \nas being due to an interface layer which is strongly anti- \nferromagnetically coupled to the Fe layer. At zero field, \nboth the interfacial and bulk Mn are aligned antiparallel \nto the Fe layer. At high fields, the bulk of the (Ga,Mn)As \nlayer away from the interface is re-oriented into the exter- \nnal field direction. However, the interfacial Mn remains \nantiparallel to the Fe layer and thus partially compen- \nsates the XMCD signal from the bulk of the (Ga,Mn)As. \nFrom the size of the remanent and 1000 Oe magnetic \nmoments, it can be estimated that around 25-30% of the \nTEY XMCD signal can be ascribed to the interfacial Mn \nwhich is strongly coupled to the Fe moments. ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.2449.pdf" + "text": "", + "page_start": 46, + "page_end": 46, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "FIG. 1. \n(color) Main figure: Major (red/black) and minor \n(green) hysteresis loops along the [110] axis at 5 K, for a \nFe (2 nm)/(Ga,Mn)As (20 nm) film, and the hysteresis loop \nfor a control (Ga,Mn)As (20 nm) film along the same axis \n(blue). Left inset: Magnetization versus temperature for the \nFe/(Ga,Mn)As film at remanence (black) and under a 500 Oe \napplied field (red). Right inset: Exchange bias field versus \nthickness d of the (Ga,Mn)As film (points) and fit showing \n1/d dependence (dashed line). ", - "page_start": 4, - "page_end": 4, - "source_file": "1001.2449.pdf" + "text": "", + "page_start": 46, + "page_end": 46, + "source_file": "OTC_NSANY_2004.pdf" } ] }, @@ -8751,64 +8751,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 279, + "page_end": 279, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 387, + "page_end": 387, + "source_file": "00-80T-80.pdf" }, { - "text": "21. Controlled entities \n\nCountry of \nIncorporation Entity \n\nParent Entity \nKingsgate Consolidated Limited \n\nSubsidiaries \nDominion Mining Ltd \n\nChallenger Gold Operations Pty Ltd(i) \n\nQuadrio Resources Limited(ii) \n\nGawler Gold Mining Pty Ltd \n\nDominion Copper Pty Ltd \n\nDominion Metals Proprietary Limited \n\nYilgarn Metals Limited \n\nKingsgate Treasury Pty Ltd(iii) \n\nKingsgate Bowdens Pty Limited \n\nKingsgate Capital Pty Ltd \n\nKingsgate Nominees Pty Limited \n\nKingsgate South America Pty Ltd \n\nLaguna Resources NL \n\nLaguna Exploration Pty Ltd \n\nAkara Mining Limited (iv) \n\nIssara Mining Ltd \n\nSuan Sak Patana Ltd \n\nPhar Mai Exploration Ltd \n\nRichaphum Mining Ltd \n\nPhar Lap Ltd \n\nPhar Rong Ltd \n\nDominion (Lao) Co., Ltd \n\nLaguna Chile Ltda \n\nMinera Kingsgate Limitada \n\nKingsgate Peru SRL \n\nMinera Kingsgate Argentina S.A. \n\n(i) \n(ii) Quadrio Resources Limited was sold by the Group during the year. \n(iii) Kingsgate Treasury Pty Ltd changed its name from Yilgarn Metals Exploration Pty Ltd on 29 November 2012. \n(iv) Akara Mining Limited changed its name to Akara Resource Public Company Limited on 29 August 2013. \n\nChallenger Gold Operations Pty Ltd changed its name from Dominion Gold Operations Pty Ltd on 26 March 2013. ", - "page_start": 95, - "page_end": 95, - "source_file": "ASX_KCN_2013.pdf" + "text": "", + "page_start": 236, + "page_end": 236, + "source_file": "00-80T-80.pdf" }, { - "text": "Sale of Exploration Assets \nOn 28 March 2013, the Group sold its explora- \ntion assets in Western Australia and Queensland \nthrough the sale of shares in its subsidiary \ncompany, Quadrio Resources Limited, to Caravel \nMinerals Limited (“Caravel”), an Australian \ncompany listed on the ASX. \n\n| 2013\n$’000 | 2012\n$’000 |\n|---|---|\n| 2013 $’000 | 2012 $’000 |\n| 15,148 | |\n| 7,591 | |\n| 22,739 | |\n\n\nKingsgate received 135,000,000 fully paid \nordinary shares in the issued capital of Caravel \nand 20,000,000 unlisted options to acquire \nCaravel shares exercisable at 10 cents on or \nbefore three years from the date of issue. \nSubsequent to the sale, Kingsgate became the \nlargest shareholder in Caravel with 35.54% held \nat 30 June 2013. Kingsgate’s holding in Caravel \nreduced to 27.04% post 30 June 2013 following \na rights issue by Caravel that Kingsgate did not \nparticipate in. ", - "page_start": 44, - "page_end": 44, - "source_file": "ASX_KCN_2013.pdf" + "text": "", + "page_start": 236, + "page_end": 236, + "source_file": "00-80T-80.pdf" }, { - "text": "Convertible loan facility \nKingsgate has a five year A$35 million convert- \nible loan facility with Investec entered into in a \nprior period to provide funding for the Bowdens \nacquisition. Kingsgate has the option to make a \nprepayment against the facility with an issue of \nKingsgate shares. \n\nRestructure of corporate loan and \nconvertible loan facilities \nAs indicated previously in the Preliminary Final \nreport, at balance date it was the Group’s inten- \ntion to restructure and amalgamate these \nfacilities in the next financial year. This relates to \nthe potential for completion of the Initial Public \nOffering (“IPO”) of Akara on the Stock Exchange \nof Thailand and the updated mine plan for \nChallenger. Any restructure would optimise the \nGroup’s anticipated balance sheet liquidity and \noperational cash flows. Accordingly, the Group \nclassified the total amount drawn down under \nthese facilities of $55 million as a current liability \nat 30 June 2013. ", - "page_start": 12, - "page_end": 12, - "source_file": "ASX_KCN_2013.pdf" + "text": "", + "page_start": 235, + "page_end": 235, + "source_file": "00-80T-80.pdf" }, { - "text": "General Manager Exploration and Resource \nDevelopment \nRon James has 30 years of experience in explora- \ntion and mining at management level inclusive \nof setting up gold mines and exploration \nprojects from their earliest stages through to \ndevelopment and sustainability. Before joining \nKingsgate, he was Chief Mine Geologist at the \nGold Ridge Mine in the Solomon Islands and \nlater Group Exploration Manager for Ross Mining \nNL. Ron is familiar with the technical and oper- \nating requirements for emerging projects in a \nvariety of terrains and environments and has a \nstrong focus on maximising returns from ore \nbodies through optimum waste and ore classifi- \ncation as well as increasing reserves from near- \nmine resource development. \n\nGeneral Manager Finance and Administration \nCompany Secretary \nRoss Coyle joined Kingsgate in March 2011 \nfollowing the Company’s acquisition of Dominion \nMining Limited and was with the Dominion \ngroup for over 25 years. He is a qualified \naccountant and has over 30 years experience in \nfinance and accounting within the resource \nindustry. He was Finance Director of Dominion \nfrom 1996. Ross was appointed Kingsgate’s \nCompany Secretary in September 2011. Duane Woodbury \nBEc (Hons) \n\nChief Financial Officer \nDuane Woodbury was appointed Chief Financial \nOfficer of Kingsgate on 1 September 2011. \nDuane has a BEc (Hons) Degree and has worked \nin various financial, accounting and advisory \nroles during his career in a number of locations, \nincluding London, New York and Singapore. He \nhas been assisting Kingsgate in its business \ndevelopment initiatives since August 2007 and \nbrings over 20 years of experience in financial \nmarkets and corporate finance transactions, \nprincipally with the Macquarie Group. ", - "page_start": 40, - "page_end": 40, - "source_file": "ASX_KCN_2013.pdf" + "text": "", + "page_start": 23, + "page_end": 23, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "Tim Benfield \nDip CSM (mining), MBA, MAusIMM \n\nKingsgate’s executives have a comprehensive \nrange of skills and experience including mine \ndevelopment and operations, exploration, finance \nand administration. They are supported by highly \nqualified specialists, whose backgrounds cover \nthe full scope of mining resources activities. \n\nChief Operating Officer \nTim Benfield joined Kingsgate in February 2012 \nas Chief Operating Officer. Tim is a mining \nengineer with over 21 years underground and \nopen pit experience in the mining industry in \nboth operational and corporate roles. He has \noperational and project development experience \nin Australia, Africa and Saudi Arabia. This \nincludes 10 years with Barrick Gold of Australia \nwhere he provided support to four operating \nmines and two development projects. Tim was \nmost recently General Manager of the Pajingo \nGold mine in Queensland for Evolution Mining \nLimited. \n\nSenior members of Kingsgate’s management \nteam are: \n\nGavin Thomas \nBSc (Geology), FAusIMM \n\nManaging Director and Chief Executive Officer \nGavin Thomas was appointed Chief Executive \nOfficer of Kingsgate in 2004 and joined the \nKingsgate Board on 16th November 2007. Gavin \nhas had a successful career in developing mining \ncompanies from the exploration phase into \nmid-tier gold or copper producers. He has over \n42 years of international experience in exploring \nfor, evaluating, developing, operating and \nreclaiming mines in North and South America, \nAustralia, the Southwest Pacific, Asia and \nEurope. Amongst Gavin’s credits is the discovery \nof “Lihir” in Papua New Guinea, one of the \nlargest gold deposits in the world. In particular, \nhe has extensive experience in Thailand and \nSouth America. ", - "page_start": 40, - "page_end": 40, - "source_file": "ASX_KCN_2013.pdf" + "text": "", + "page_start": 22, + "page_end": 22, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "〉〉 \n\nTranche one will be a $25 million Akara Pre \nIPO Bond with a maturity date of 31 July \n2015. The current intention is for this \ntranche to be repaid as part of the Akara IPO, \nalthough at Kingsgate’s election repayment \ncan be made by either cash or in Kingsgate’s \nshares. \n\n〉〉 \n\nTranche two is an amortising facility with $5 \nmillion to be repaid during the 2014 financial \nyear and the balance of $10 million repaid \nduring the 2015 financial year. ", - "page_start": 12, - "page_end": 12, - "source_file": "ASX_KCN_2013.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "Significant change in \nthe state of affairs \n\nThere were no significant changes in the state \nof affairs of the Group that occurred during the \nfinancial year not otherwise disclosed in this \nreport or the consolidated financial statements. \n\nTranche one will be a $25,000,000 Akara \nPre IPO Bond with a maturity date of 31 July \n2015. The current intention is for this \ntranche to be repaid as part of the Akara IPO \nalthough at Kingsgate’s election repayment \ncan be made by either cash or in Kingsgate’s \nshares. \n\nMatters subsequent to \nthe end of the financial year \n\nKingsgate has received from its lender a credit \napproved term sheet (subject to formal docu- \nmentation) for the restructure of the existing \ncorporate loan facility which is drawn to \n$20,000,000 and the existing convertible loan \nfacility which is drawn to $35,000,000. \n\n〉〉 \n\nTranche two is an amortising facility with \n$5,000,000 to be repaid during the 2014 \nfinancial year and the balance of \n$10,000,000 repaid during the 2015 \nfinancial year. \n\nManagement and the Board regularly review the \nrisk portfolio of the business and the effective- \nness of the Group’s management of those risks. ", - "page_start": 47, - "page_end": 47, - "source_file": "ASX_KCN_2013.pdf" + "text": "", + "page_start": 235, + "page_end": 235, + "source_file": "00-80T-80.pdf" }, { - "text": "Auditor’s Independence Declaration \n\nAs lead auditor for the audit of Kingsgate Consolidated Limited for the year ended 30 June 2013, \nI declare that to the best of my knowledge and belief, there have been: \n\na) \n no contraventions of the auditor independence requirements of the*Corporations Act 2001*\nin relation to the audit; and \n\nb) no contraventions of any applicable code of professional conduct in relation to the audit. \n\nThis declaration is in respect of Kingsgate Consolidated Limited and the entities it controlled during \nthe period. ", - "page_start": 63, - "page_end": 63, - "source_file": "ASX_KCN_2013.pdf" + "text": "", + "page_start": 235, + "page_end": 235, + "source_file": "00-80T-80.pdf" } ] }, @@ -8819,70 +8819,70 @@ "target_page": 6, "target_passage": "The study demonstrated that open pit mining at two million tonnes per year and processing by milling and agitation leaching in cyanide was technically feasible, although high capital and power costs negatively impacted project economic returns. ", "chunk_present": { - "presence": true, - "index": 4 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 14, + "page_end": 14, + "source_file": "ASX_MRM_2000.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, + "text": "", + "page_start": 30, + "page_end": 30, "source_file": "Excel Training Manual 1.pdf" }, { - "text": "\nNUEVA NUEVA \n\nESPERANZA ESPERANZA ", - "page_start": 14, - "page_end": 14, - "source_file": "ASX_KCN_2013.pdf" + "text": "", + "page_start": 136, + "page_end": 136, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\nNUEVA \nNUEVA \nESPERANZA \nESPERANZA ", - "page_start": 29, - "page_end": 29, - "source_file": "ASX_KCN_2013.pdf" + "text": "", + "page_start": 31, + "page_end": 31, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "Nueva Esperanza \nThe Nueva Esperanza Project was advanced \nduring the year with the completion of a draft \nfeasibility study. This study included a decision \nto mine the Arqueros and Teterita portions of \nNueva Esperanza. The study demonstrated that \nopen pit mining at two million tonnes per year \nand processing by milling and agitation leaching \nin cyanide was technically feasible, although \nhigh capital and power costs negatively \nimpacted project economic returns. ", - "page_start": 6, - "page_end": 6, - "source_file": "ASX_KCN_2013.pdf" + "text": "", + "page_start": 136, + "page_end": 136, + "source_file": "00-80T-80.pdf" }, { - "text": "\nNUEVA NUEVA \nAntofagasta \n\nESPERANZA ESPERANZA \nChañaral \n\nCOPIAPO COPIAPO \n\nLa Serena \n3 30° ", - "page_start": 22, - "page_end": 22, - "source_file": "ASX_KCN_2013.pdf" + "text": "", + "page_start": 301, + "page_end": 301, + "source_file": "00-80T-80.pdf" }, { - "text": "Nueva Esperanza Silver / Gold Project \nThe Nueva Esperanza Silver / Gold Project \nadvanced during the year with an initial scoping \nstudy for a decision to mine the Arqueros and \nTeterita portions of Nueva Esperanza completed \nin late 2012. The study demonstrated that open \npit mining at two million tonnes per year and \nprocessing by milling and agitation leaching in \ncyanide was technically feasible although high \ncapital and power costs negatively impacted \nproject economic returns. \nExploration \nThe Group has a portfolio of exploration tene- \nments and applications in Thailand, Chile and \nLao PDR. Following the sale of exploration \ntenements to Caravel (refer below), exploration \nin Australia is currently only conducted in the \nvicinity of the Challenger Mine in South Australia \nand the Bowdens Silver Project in New South \nWales. \n\nTotal mill throughput for the year was 5.7 million \ntonnes, 11.4% higher than 2012, despite the \nimpact of the 63 day delay during which Plant #2 \nwas not operating. The overall plant availability \nof 98.1% was slightly lower than the previous \nyear’s 98.4%. The expanded plant is operating \naround 24% above the annual “nameplate” \nthroughput rate at 6.2 million tonnes per annum \nand this is expected to continue. ", - "page_start": 44, - "page_end": 44, - "source_file": "ASX_KCN_2013.pdf" + "text": "", + "page_start": 31, + "page_end": 31, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "Environmental approvals to commence \nconstruction and mining at Nueva Esperanza \nwere granted in July 2013 for the original \nArqueros project. Work is underway to modify \nand update the environmental assessment to \nincorporate the heap leach process. ", - "page_start": 29, - "page_end": 29, - "source_file": "ASX_KCN_2013.pdf" + "text": "", + "page_start": 137, + "page_end": 137, + "source_file": "00-80T-80.pdf" }, { - "text": "| 28\nProjects Report\nu\n7 0 °\nP E R U\nB O L I V I A\n2 0 °\nAntofagasta NNUUEEVVAA\nEESSPPEERRAANNZZAA\nChañaral\nCCOOPPIIAAPPOO\nLa Serena\n33 0 °\nSantiago\nA R G E N T I N A\n4 0 °\n5 0 °\nwww.kingsgate.com.au | Nueva Esperanza\nProject\nChile\nSummary\nThe Nueva Esperanza Project is 100% owned\nby Kingsgate since February 2012. Nueva\nEsperanza is located in the Maricunga Gold Belt\nnear Copiapó, a regional mining centre in\nNorthern Chile. The silver-rich mineralisation is\nhosted by the Esperanza high-sulphidation\nepithermal alteration system associated with\nthe Cerros Bravos volcanic complex.\nThe project consists of three well-defined miner-\nalised deposits and a number of undeveloped\nexploration targets. The main deposits are\nArqueros, Chimberos and Teterita. Arqueros was\npreviously mined on a limited scale by under-\nground methods and Chimberos was exploited\nas an open pit mine, delivering about 40 million\nounces of silver in 1998/99. All three deposits\ncurrently have a combined Mineral Resources of\nabout 93 million ounces of silver equivalent or\n1.6 million ounces of gold equivalent (EQ60)1.\nA feasibility study for a decision to mine the\nArqueros portion of Nueva Esperanza was\ncompleted in late 2012, demonstrating that open\npit mining at two million tonnes per year and\nprocessing by milling and agitation leaching in\ncyanide was technically feasible. Work remained\nto integrate the Teterita and Chimberos deposits\ninto the project, as well as to test lower cost\noptions for processing. Continued metallurgical\ntestwork has shown that mineralisation from all\nthree deposits by heap leaching is technically and\neconomically feasible and the preferred alterna-\ntive for development.\nEnvironmental approvals to commence\nconstruction and mining at Nueva Esperanza\nwere granted in July 2013 for the original\nArqueros project. Work is underway to modify\nand update the environmental assessment to\nincorporate the heap leach process.\n1 E\u0007quivalence is based on gold/silver price ratio\nof 60. Gold equivalence = gold content plus\n(silver content divided by 60), whereas Silver\nequivalent silver content plus (gold content\nmultiplied by 60). |\n|---|---|\n| 28 Projects Report u 7 0 ° P E R U B O L I V I A 2 0 ° Antofagasta NNUUEEVVAA EESSPPEERRAANNZZAA Chañaral CCOOPPIIAAPPOO La Serena 33 0 ° Santiago A R G E N T I N A 4 0 ° 5 0 ° www.kingsgate.com.au | Nueva Esperanza Project Chile Summary The Nueva Esperanza Project is 100% owned by Kingsgate since February 2012. Nueva Esperanza is located in the Maricunga Gold Belt near Copiapó, a regional mining centre in Northern Chile. The silver-rich mineralisation is hosted by the Esperanza high-sulphidation epithermal alteration system associated with the Cerros Bravos volcanic complex. The project consists of three well-defined miner- alised deposits and a number of undeveloped exploration targets. The main deposits are Arqueros, Chimberos and Teterita. Arqueros was previously mined on a limited scale by under- ground methods and Chimberos was exploited as an open pit mine, delivering about 40 million ounces of silver in 1998/99. All three deposits currently have a combined Mineral Resources of about 93 million ounces of silver equivalent or 1.6 million ounces of gold equivalent (EQ60)1. A feasibility study for a decision to mine the Arqueros portion of Nueva Esperanza was completed in late 2012, demonstrating that open pit mining at two million tonnes per year and processing by milling and agitation leaching in cyanide was technically feasible. Work remained to integrate the Teterita and Chimberos deposits into the project, as well as to test lower cost options for processing. Continued metallurgical testwork has shown that mineralisation from all three deposits by heap leaching is technically and economically feasible and the preferred alterna- tive for development. Environmental approvals to commence construction and mining at Nueva Esperanza were granted in July 2013 for the original Arqueros project. Work is underway to modify and update the environmental assessment to incorporate the heap leach process. 1 E\u0007quivalence is based on gold/silver price ratio of 60. Gold equivalence = gold content plus (silver content divided by 60), whereas Silver equivalent silver content plus (gold content multiplied by 60). |\n", - "page_start": 30, - "page_end": 30, - "source_file": "ASX_KCN_2013.pdf" + "text": "", + "page_start": 31, + "page_end": 31, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "Summary \n\nThe Nueva Esperanza Project is 100% owned \nby Kingsgate since February 2012. Nueva \nEsperanza is located in the Maricunga Gold Belt \nnear Copiapó, a regional mining centre in \nNorthern Chile. The silver-rich mineralisation is \nhosted by the Esperanza high-sulphidation \nepithermal alteration system associated with \nthe Cerros Bravos volcanic complex. \n\nThe project consists of three well-defined miner- \nalised deposits and a number of undeveloped \nexploration targets. The main deposits are \nArqueros, Chimberos and Teterita. Arqueros was \npreviously mined on a limited scale by under- \nground methods and Chimberos was exploited \nas an open pit mine, delivering about 40 million \nounces of silver in 1998/99. All three deposits \ncurrently have a combined Mineral Resources of \nabout 93 million ounces of silver equivalent or \n1.6 million ounces of gold equivalent (EQ60)1. \n\nA feasibility study for a decision to mine the \nArqueros portion of Nueva Esperanza was \ncompleted in late 2012, demonstrating that open \npit mining at two million tonnes per year and \nprocessing by milling and agitation leaching in \ncyanide was technically feasible. Work remained \nto integrate the Teterita and Chimberos deposits \ninto the project, as well as to test lower cost \noptions for processing. Continued metallurgical \ntestwork has shown that mineralisation from all \nthree deposits by heap leaching is technically and \neconomically feasible and the preferred alterna- \ntive for development. ", - "page_start": 29, - "page_end": 29, - "source_file": "ASX_KCN_2013.pdf" + "text": "", + "page_start": 31, + "page_end": 31, + "source_file": "Excel Training Manual 1.pdf" } ] }, @@ -8893,70 +8893,70 @@ "target_page": 11, "target_passage": " Net cash outflows from financing activities was $1.7 million", "chunk_present": { - "presence": true, - "index": 8 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 369, + "page_end": 369, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 322, + "page_end": 322, + "source_file": "00-80T-80.pdf" }, { - "text": "Net cash outflow from investing activities \n\nCash flows from financing activities \nProceeds from borrowings, net of transaction costs \n\nRepayment of borrowings \n\nProceeds from the issue of shares \n\nPayments for acquisition of non-controlling interests \n\nDividends paid \n\nNet cash (outflow) / inflow from financing activities \n\nNet (decrease) / increase in cash held \n\nCash at the beginning of the year \n\nEffects of exchange rates on cash and cash equivalents \n\nCash at the end of the year \n\nThe above Statement of Cash Flows should be read in conjunction with the accompanying notes. ", - "page_start": 68, - "page_end": 68, - "source_file": "ASX_KCN_2013.pdf" + "text": "", + "page_start": 323, + "page_end": 323, + "source_file": "00-80T-80.pdf" }, { - "text": "〉〉 \n\nTranche one will be a $25 million Akara Pre \nIPO Bond with a maturity date of 31 July \n2015. The current intention is for this \ntranche to be repaid as part of the Akara IPO, \nalthough at Kingsgate’s election repayment \ncan be made by either cash or in Kingsgate’s \nshares. \n\n〉〉 \n\nTranche two is an amortising facility with $5 \nmillion to be repaid during the 2014 financial \nyear and the balance of $10 million repaid \nduring the 2015 financial year. ", - "page_start": 12, - "page_end": 12, - "source_file": "ASX_KCN_2013.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "The Financial Report of Kingsgate Consolidated \nLimited (Kingsgate or the “Company”) for the \nyear ended 30 June 2013 was authorised for \nissue in accordance with a resolution of \nDirectors on 23 September 2013. \n\nin Australian dollars, which is the Company’s \nfunctional currency and presentation currency. \n\nRounding of amounts \n\nThe Company is of a kind referred to in ASIC \nClass Order 98/100 dated 10 July 1998 and in \naccordance with that Class Order, all financial \ninformation presented in Australian dollars has \nbeen rounded to the nearest thousand, or in \ncertain cases, the nearest dollar. \n\nKingsgate is a Company limited by shares incor- \nporated in Australia whose shares are publicly \ntraded on the Australian Securities Exchange \nusing the ASX code KCN. The consolidated \nfinancial statements of the Company as at and \nfor the year ended 30 June 2013 comprise the \nCompany and its subsidiaries (together referred \nto as the “Group” and individually as “Group \nentities”). A description of the nature of the \nGroup’s operations and its principal activities \nis included in the Directors’ Report. \n\nThe preparation of financial statements requires \nthe use of certain critical accounting estimates. \nIt also requires management to exercise its \njudgement in the process of applying the \nGroup’s accounting policies. The areas involving \na higher degree of judgement or complexity, or \nareas where assumptions and estimates are \nsignificant to the financial statements are \ndisclosed in Note 3. ", - "page_start": 69, - "page_end": 69, - "source_file": "ASX_KCN_2013.pdf" + "text": "", + "page_start": 323, + "page_end": 323, + "source_file": "00-80T-80.pdf" }, { - "text": "Significant change in \nthe state of affairs \n\nThere were no significant changes in the state \nof affairs of the Group that occurred during the \nfinancial year not otherwise disclosed in this \nreport or the consolidated financial statements. \n\nTranche one will be a $25,000,000 Akara \nPre IPO Bond with a maturity date of 31 July \n2015. The current intention is for this \ntranche to be repaid as part of the Akara IPO \nalthough at Kingsgate’s election repayment \ncan be made by either cash or in Kingsgate’s \nshares. \n\nMatters subsequent to \nthe end of the financial year \n\nKingsgate has received from its lender a credit \napproved term sheet (subject to formal docu- \nmentation) for the restructure of the existing \ncorporate loan facility which is drawn to \n$20,000,000 and the existing convertible loan \nfacility which is drawn to $35,000,000. \n\n〉〉 \n\nTranche two is an amortising facility with \n$5,000,000 to be repaid during the 2014 \nfinancial year and the balance of \n$10,000,000 repaid during the 2015 \nfinancial year. \n\nManagement and the Board regularly review the \nrisk portfolio of the business and the effective- \nness of the Group’s management of those risks. ", - "page_start": 47, - "page_end": 47, - "source_file": "ASX_KCN_2013.pdf" + "text": "", + "page_start": 323, + "page_end": 323, + "source_file": "00-80T-80.pdf" }, { - "text": "Convertible loan facility \nKingsgate has a five year A$35 million convert- \nible loan facility with Investec entered into in a \nprior period to provide funding for the Bowdens \nacquisition. Kingsgate has the option to make a \nprepayment against the facility with an issue of \nKingsgate shares. \n\nRestructure of corporate loan and \nconvertible loan facilities \nAs indicated previously in the Preliminary Final \nreport, at balance date it was the Group’s inten- \ntion to restructure and amalgamate these \nfacilities in the next financial year. This relates to \nthe potential for completion of the Initial Public \nOffering (“IPO”) of Akara on the Stock Exchange \nof Thailand and the updated mine plan for \nChallenger. Any restructure would optimise the \nGroup’s anticipated balance sheet liquidity and \noperational cash flows. Accordingly, the Group \nclassified the total amount drawn down under \nthese facilities of $55 million as a current liability \nat 30 June 2013. ", - "page_start": 12, - "page_end": 12, - "source_file": "ASX_KCN_2013.pdf" + "text": "", + "page_start": 323, + "page_end": 323, + "source_file": "00-80T-80.pdf" }, { - "text": "21. Controlled entities \n\nCountry of \nIncorporation Entity \n\nParent Entity \nKingsgate Consolidated Limited \n\nSubsidiaries \nDominion Mining Ltd \n\nChallenger Gold Operations Pty Ltd(i) \n\nQuadrio Resources Limited(ii) \n\nGawler Gold Mining Pty Ltd \n\nDominion Copper Pty Ltd \n\nDominion Metals Proprietary Limited \n\nYilgarn Metals Limited \n\nKingsgate Treasury Pty Ltd(iii) \n\nKingsgate Bowdens Pty Limited \n\nKingsgate Capital Pty Ltd \n\nKingsgate Nominees Pty Limited \n\nKingsgate South America Pty Ltd \n\nLaguna Resources NL \n\nLaguna Exploration Pty Ltd \n\nAkara Mining Limited (iv) \n\nIssara Mining Ltd \n\nSuan Sak Patana Ltd \n\nPhar Mai Exploration Ltd \n\nRichaphum Mining Ltd \n\nPhar Lap Ltd \n\nPhar Rong Ltd \n\nDominion (Lao) Co., Ltd \n\nLaguna Chile Ltda \n\nMinera Kingsgate Limitada \n\nKingsgate Peru SRL \n\nMinera Kingsgate Argentina S.A. \n\n(i) \n(ii) Quadrio Resources Limited was sold by the Group during the year. \n(iii) Kingsgate Treasury Pty Ltd changed its name from Yilgarn Metals Exploration Pty Ltd on 29 November 2012. \n(iv) Akara Mining Limited changed its name to Akara Resource Public Company Limited on 29 August 2013. \n\nChallenger Gold Operations Pty Ltd changed its name from Dominion Gold Operations Pty Ltd on 26 March 2013. ", - "page_start": 95, - "page_end": 95, - "source_file": "ASX_KCN_2013.pdf" + "text": "", + "page_start": 323, + "page_end": 323, + "source_file": "00-80T-80.pdf" }, { - "text": "Finance costs \nFinance costs increased to $18.8 million (2012: \n$9.4 million). Finance costs comprise interest on \nborrowings the Group has in place, unwinding of \ndiscount on provisions as required by Accounting \nStandards and amortisation of borrowings set-up \ncosts. The main contributor to the increase in \nfinance costs was accelerated amortisation of \nborrowing costs required due to debt restruc- \ntures undertaken during the year and planned for \nthe next financial year. Borrowing costs relating \nto the previous finance facilities were expensed \nin full prior to new facilities being put in place. \n\nCash Flow \n\nNet operating cash inflow was $85.0 million. \nInvesting cash outflow for property, plant, \nequipment and exploration, evaluation and \ndevelopment was $133.7 million. Net cash \noutflows from financing activities was \n$1.7 million, including a net drawdown (net \nof transaction costs) of $36.7 million of the \nmulti-currency and syndicated loan facilities \nfollowing a loan restructure by the Group’s \n\nOperating Profit and Cash Flow \n\nIncome Tax \nKingsgate’s Thai subsidiary company, Akara \nResources Public Company Limited (“Akara”), \nhas received approval from The Royal Thai Board \nof Investment (BOI) of the Office of the Prime \nMinister for promotion of Chatree. Subject to \nmeeting the BOI conditions and based on an \nannual production limit of 178,416 ounces of \ngold and 583,733 ounces of silver, Akara’s \nChatree Gold Mine is entitled to: ", - "page_start": 11, - "page_end": 11, - "source_file": "ASX_KCN_2013.pdf" + "text": "", + "page_start": 323, + "page_end": 323, + "source_file": "00-80T-80.pdf" }, { - "text": "Cash Flows from Operating Activities \nNet income \nAdjustments to reconcile net income to net cash provided by operating activities: \n\nDepreciation, amortization and impairment \nStock-based compensation \nInventory and purchase commitments write-downs \nForeign currency transaction net unrealized loss (gain) \nDeferred income taxes \nNon-cash interest and other operating activities \nChanges in operating assets and liabilities: \n\nAccounts receivable \nInventory \nOperating lease vehicles \nPrepaid expenses and other assets \nAccounts payable, accrued and other liabilities \nDeferred revenue \n\nNet cash provided by operating activities \n\nCash Flows from Investing Activities \nPurchases of property and equipment excluding finance leases, net of sales \nPurchases of solar energy systems, net of sales \nPurchases of investments \nProceeds from maturities of investments \nProceeds from sales of investments \nBusiness combinations, net of cash acquired \n\nNet cash used in investing activities \n\nCash Flows from Financing Activities \nProceeds from issuances of debt \nRepayments of debt \nProceeds from exercises of stock options and other stock issuances \nPrincipal payments on finance leases \nDebt issuance costs \nDistributions paid to noncontrolling interests in subsidiaries \nPayments for buy-outs of noncontrolling interests in subsidiaries \n\nNet cash provided by financing activities \n\nEffect of exchange rate changes on cash and cash equivalents and restricted cash ", - "page_start": 12, - "page_end": 12, - "source_file": "tesla_form_10q.pdf" + "text": "", + "page_start": 322, + "page_end": 322, + "source_file": "00-80T-80.pdf" } ] }, @@ -8967,70 +8967,70 @@ "target_page": 1, "target_passage": "These Regulations extend to England and Wales. ", "chunk_present": { - "presence": true, - "index": 5 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 284, + "page_end": 284, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 305, + "page_end": 305, + "source_file": "00-80T-80.pdf" }, { - "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations provide for records of marriages to be kept in churches and chapels of the \nChurch of England and the Church in Wales, other than chapels to which Part 5 of the Marriage \nAct 1949 applies (naval, military and air force chapels). \n\nRegulation 2 requires parochial church councils to provide books known as “registers of marriage \nservices” to churches and chapels in their parish in which banns of matrimony may be published, \nfor the purposes of keeping the records required by regulation 3. Regulation 2 also imposes \nrequirements relating to the durability and pre-printed content of these registers, and provides that \nthey belong to the parochial church council. \n\nRegulation 3 requires specified information to be recorded in a register of marriage services when \na marriage has been solemnized on or after 4th May 2021 according to the rites of the Church of \nEngland or Church in Wales in a church or chapel in which banns of matrimony may be \npublished. The record must be made and signed by the member of the clergy by whom the \nmarriage was solemnized. ", - "page_start": 3, - "page_end": 3, - "source_file": "uksi_20210538_en.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "Regulations 15 to 17 amend the Special Educational Needs (Personal Budgets) Regulations 2014 \n(‘the Personal Budgets Regulations 2014’). \n\nRegulation 17 inserts a similar glossing provision into the Personal Budgets Regulations 2014 as \nregulation 5 does in respect of the SEND Regulations 2014. \n\nRegulations 18 to 27 amend the Special Educational Needs and Disability (Detained Persons) \nRegulations 2015 (‘the Detained Persons Regulations 2015’). \n\nRegulation 20 inserts a glossing provision into the Detained Persons Regulations 2015 similar to \nthe ones in regulations 5 and 17 in relation to the SEND Regulations 2014 and the Personal \nBudgets Regulations 2014 respectively. \n\nRegulations 21 to 27 make textual amendments to the Detained Persons Regulations 2015 to relax \ntime limits. \n\nRegulations 28 to 30 amend the Special Educational Needs and Disability (First-tier Tribunal \nRecommendations Power) Regulations 2017 (‘the First-tier Tribunal Regulations 2017’). \n\nRegulation 30 inserts a glossing provision into the First-tier Tribunal Regulations 2017 similar to \nthose in regulations 5, 17 and 20. ", - "page_start": 6, - "page_end": 6, - "source_file": "uksi_20200471_en.pdf" + "text": "", + "page_start": 304, + "page_end": 304, + "source_file": "00-80T-80.pdf" }, { - "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations make amendments to secondary legislation relating to special educational \nneeds and disability in order to provide exceptions to time limits set out in that legislation where \nthey cannot be met because of a reason relating to the incidence or transmission of coronavirus. \n\nRegulation 2 contains review and expiry provisions. The Secretary of State is required to review \nthe effectiveness of the Regulations during the period in which they have effect. The Regulations \ncease to have effect on 25th September 2020. \n\nRegulations 3 to 14 amend the Special Educational Needs and Disability Regulations 2014 (‘the \nSEND Regulations 2014’). \n\nRegulation 5 inserts a glossing provision into the SEND Regulations 2014 which relaxes certain \nrequirements in those Regulations for actions to be taken within specified time limits where it is \nnot reasonably practicable for a person to meet those requirements for a reason relating to the \nincidence or transmission of coronavirus. Instead, any such requirement is to be read as a \nrequirement for such action to be taken as soon as reasonably practicable. \n\nRegulations 6 to 14 make textual amendments to the SEND Regulations 2014 to relax time limits. ", - "page_start": 6, - "page_end": 6, - "source_file": "uksi_20200471_en.pdf" + "text": "", + "page_start": 304, + "page_end": 304, + "source_file": "00-80T-80.pdf" }, { - "text": "*Made* *-* *-* *-* *-* *29th April 2021*\n\n*Coming into force -* *-* *4th May 2021*\n\nThe Registrar General makes these Regulations with the approval of the Secretary of State in \nexercise of the powers conferred by section 74(1)(c)(v), (1A)(a) and (3) of the Marriage Act \n1949(**a**). \n\n**Citation, commencement, extent and interpretation**\n\n**1.**—(1) These Regulations may be cited as the Marriage (Keeping of Records in Churches and \n\nChapels) Regulations 2021. \n\n(2) These Regulations come into force on 4th May 2021. \n(3) These Regulations extend to England and Wales. \n(4) In these Regulations, “chapel” does not include a chapel to which Part 5 of the Marriage Act \n1949 (marriages in naval, military and air force chapels) applies(**b**). \n\n**Duty of parochial church councils to provide registers of marriage services**\n\n**2.**—(1) The parochial church council of a parish must provide books for the purpose of making \nrecords under regulation 3 to each church and chapel of the Church of England(**c**) in that parish in \nwhich banns of matrimony may be published. \n\n(2) Books provided under paragraph (1) are to be known as “registers of marriage services”. \n(3) A register of marriage services provided under paragraph (1) must meet the requirements of \nparagraphs (4) and (5). \n\n(4) The register must be made of durable material. \n(5) For the purposes of enabling a record to be made in the register under regulation 3 in respect \n\nof a marriage, the register must be printed in such a way that it— ", - "page_start": 1, - "page_end": 1, - "source_file": "uksi_20210538_en.pdf" + "text": "", + "page_start": 304, + "page_end": 304, + "source_file": "00-80T-80.pdf" }, { - "text": "**Duty to record information about marriages solemnized according to the rites of the Church**\n**of England or Church in Wales**\n\n**3.**—(1) Paragraphs (2), (3) and (4) apply where a marriage has been solemnized according to the \nrites of the Church of England in a church or chapel in which banns of matrimony may be \npublished. \n\n(2) As soon as practicable after the marriage has been solemnized, the clergyman by whom the \nmarriage was solemnized must make a record of the following information in relation to that \nmarriage in a register of marriage services provided to the church or chapel under regulation \n2(1)— \n\n(a) the date and place of the marriage; \n(b) the name and surname of each party; \n(c) the date of birth of each party; \n(d) the occupation (if any) of each party; \n(e) the address of each party at the time of the marriage; \n(f) \n\nthe names and surnames of each party’s parents, so far as those names and surnames are \nknown to the clergyman who solemnized the marriage; \n\n(g) the name and surname of each of the witnesses in whose presence the marriage was \nsolemnized; \n\n(h) the name and surname of the clergyman by whom the marriage was solemnized. \n\n(3) The clergyman must record the information required by paragraph (2) in English, and may \nalso record information required by that paragraph in Welsh where the church or chapel is situated \nin Wales. \n\n(4) After making a record under paragraph (2) the clergyman must sign it. \n(5) This regulation does not apply in relation to a marriage solemnized before 4th May 2021. ", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20210538_en.pdf" + "text": "", + "page_start": 304, + "page_end": 304, + "source_file": "00-80T-80.pdf" }, { - "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThe Regulations amend the International Tax Compliance Regulations 2015 (“the principal \nRegulations”) which give effect to agreements and arrangements reached between the United \nKingdom and other jurisdictions to improve international tax compliance. \n\nRegulation 2(2) extends the application of the principal Regulations to arrangements entered into \nby the United Kingdom for the exchange of financial account information with other jurisdictions \nup to 19th April 2020, the date before the Regulations are made. \n\nRegulation 2(5) omits various accounts from the category of excluded accounts. Regulation \n2(4)(b) amends the definitions of “new account” and “pre-existing account” in relation to those ", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20200438_en.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "SCHEDULE 16 Regulation 26(3) \n\nTransitional provision \n\n**1.**Passenger information provided before 4.00 a.m. on 17th May 2021 by a person pursuant to \nregulation 3 of the Health Protection (Coronavirus, International Travel) (England) Regulations \n2020 (“the 2020 Regulations”) in advance of arrival in England is treated as passenger information \nprovided for the purposes of these Regulations where the person arrives in England on or after that \ndate. \n\n**2.**Confirmation given by the Foreign, Commonwealth and Development Office that a person is \nnot required to comply with regulation 3B of the 2020 Regulations is treated as confirmation that \nthe person is not required to comply with regulation 6 of these Regulations where the person \narrives in England on or after 4.00 a.m. on 17th May 2021. \n\n**3.**A designation by the Secretary of State of a person as an authorised person under regulation \n5(7) of the 2020 Regulations has effect as a designation of that person as an authorised person \nunder of regulation 11(11)(c) of these Regulations. \n\n**4.**Regulation 5A of the 2020 Regulations continues to have effect in relation to a constable who \nexercises the powers in that regulation in relation to a person who arrived in England before 4.00 \na.m. on 17th May 2021. ", - "page_start": 89, - "page_end": 89, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 304, + "page_end": 304, + "source_file": "00-80T-80.pdf" }, { - "text": "service and experience in stores and online, \n\n• the effectiveness of planned advertising, marketing and promotional campaigns in the highly competitive retail industry, \n• weather conditions, natural disasters, health hazards, national security or other market disruptions, or the prospects of these events \nand the resulting impact on consumer spending patterns, \n• our compliance with applicable banking-related laws and regulations impacting our ability to extend credit to our customers, \n\nemployment laws and regulations, certain international laws and regulations, other laws and regulations applicable to us, including \nthe outcome of claims and litigation and resolution of tax matters, and ethical standards, \n• impact of the current regulatory environment and financial system and health care reforms, \n\nNordstrom, Inc. and subsidiaries 5 ", - "page_start": 17, - "page_end": 17, - "source_file": "NYSE_JWN_2014.pdf" + "text": "", + "page_start": 304, + "page_end": 304, + "source_file": "00-80T-80.pdf" } ] }, @@ -9041,70 +9041,70 @@ "target_page": 1, "target_passage": " The parochial church council of a parish must provide books for the purpose of making records under regulation 3 to each church and chapel of the Church of England(c) in that parish in which banns of matrimony may be published.", "chunk_present": { - "presence": true, - "index": 5 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 154, + "page_end": 154, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 184, + "page_end": 184, + "source_file": "00-80T-80.pdf" }, { - "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations provide for records of marriages to be kept in churches and chapels of the \nChurch of England and the Church in Wales, other than chapels to which Part 5 of the Marriage \nAct 1949 applies (naval, military and air force chapels). \n\nRegulation 2 requires parochial church councils to provide books known as “registers of marriage \nservices” to churches and chapels in their parish in which banns of matrimony may be published, \nfor the purposes of keeping the records required by regulation 3. Regulation 2 also imposes \nrequirements relating to the durability and pre-printed content of these registers, and provides that \nthey belong to the parochial church council. \n\nRegulation 3 requires specified information to be recorded in a register of marriage services when \na marriage has been solemnized on or after 4th May 2021 according to the rites of the Church of \nEngland or Church in Wales in a church or chapel in which banns of matrimony may be \npublished. The record must be made and signed by the member of the clergy by whom the \nmarriage was solemnized. ", - "page_start": 3, - "page_end": 3, - "source_file": "uksi_20210538_en.pdf" + "text": "", + "page_start": 180, + "page_end": 180, + "source_file": "00-80T-80.pdf" }, { - "text": "(a) indicates the descriptions of information required by each of sub-paragraphs (a) to (h) of \nregulation 3(2) in relation to the marriage, and \n\n(b) provides corresponding spaces for recording information required by each of those sub- \n\nparagraphs in relation to the marriage. \n\n(6) A register of marriage services provided under paragraph (1) by a parochial church council \nbelongs to that parochial church council. ", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20210538_en.pdf" + "text": "", + "page_start": 180, + "page_end": 180, + "source_file": "00-80T-80.pdf" }, { - "text": "**Duty to record information about marriages solemnized according to the rites of the Church**\n**of England or Church in Wales**\n\n**3.**—(1) Paragraphs (2), (3) and (4) apply where a marriage has been solemnized according to the \nrites of the Church of England in a church or chapel in which banns of matrimony may be \npublished. \n\n(2) As soon as practicable after the marriage has been solemnized, the clergyman by whom the \nmarriage was solemnized must make a record of the following information in relation to that \nmarriage in a register of marriage services provided to the church or chapel under regulation \n2(1)— \n\n(a) the date and place of the marriage; \n(b) the name and surname of each party; \n(c) the date of birth of each party; \n(d) the occupation (if any) of each party; \n(e) the address of each party at the time of the marriage; \n(f) \n\nthe names and surnames of each party’s parents, so far as those names and surnames are \nknown to the clergyman who solemnized the marriage; \n\n(g) the name and surname of each of the witnesses in whose presence the marriage was \nsolemnized; \n\n(h) the name and surname of the clergyman by whom the marriage was solemnized. \n\n(3) The clergyman must record the information required by paragraph (2) in English, and may \nalso record information required by that paragraph in Welsh where the church or chapel is situated \nin Wales. \n\n(4) After making a record under paragraph (2) the clergyman must sign it. \n(5) This regulation does not apply in relation to a marriage solemnized before 4th May 2021. ", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20210538_en.pdf" + "text": "", + "page_start": 180, + "page_end": 180, + "source_file": "00-80T-80.pdf" }, { - "text": "*Made* *-* *-* *-* *-* *29th April 2021*\n\n*Coming into force -* *-* *4th May 2021*\n\nThe Registrar General makes these Regulations with the approval of the Secretary of State in \nexercise of the powers conferred by section 74(1)(c)(v), (1A)(a) and (3) of the Marriage Act \n1949(**a**). \n\n**Citation, commencement, extent and interpretation**\n\n**1.**—(1) These Regulations may be cited as the Marriage (Keeping of Records in Churches and \n\nChapels) Regulations 2021. \n\n(2) These Regulations come into force on 4th May 2021. \n(3) These Regulations extend to England and Wales. \n(4) In these Regulations, “chapel” does not include a chapel to which Part 5 of the Marriage Act \n1949 (marriages in naval, military and air force chapels) applies(**b**). \n\n**Duty of parochial church councils to provide registers of marriage services**\n\n**2.**—(1) The parochial church council of a parish must provide books for the purpose of making \nrecords under regulation 3 to each church and chapel of the Church of England(**c**) in that parish in \nwhich banns of matrimony may be published. \n\n(2) Books provided under paragraph (1) are to be known as “registers of marriage services”. \n(3) A register of marriage services provided under paragraph (1) must meet the requirements of \nparagraphs (4) and (5). \n\n(4) The register must be made of durable material. \n(5) For the purposes of enabling a record to be made in the register under regulation 3 in respect \n\nof a marriage, the register must be printed in such a way that it— ", - "page_start": 1, - "page_end": 1, - "source_file": "uksi_20210538_en.pdf" + "text": "", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "**Requirements about the keeping of registers of marriage services**\n\n**4.**—(1) The rector, vicar or curate in charge of a church or chapel to which a register of marriage \n\nservices has been provided under regulation 2(1) must— \n\n(a) ensure that the register is kept in that church or chapel, and \n(b) do everything that is reasonably practicable to ensure that the register is protected against \n\ntheft, loss or damage. \n\n(2) Where there is no rector, vicar or curate in charge of a church or chapel to which a register of \nmarriage services has been provided under regulation 2(1), the obligations under paragraph (1) in \nrespect of that register fall on the churchwardens of the parish in which the church or chapel is \nsituated. ", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20210538_en.pdf" + "text": "", + "page_start": 180, + "page_end": 180, + "source_file": "00-80T-80.pdf" }, { - "text": "One of Louis's more infamous decrees was the*Grande Ordonnance sur les Colonies*of \n1685, the*Code Noir*(black code). Although it sanctioned slavery, it attempted to humanise \nthe practice by prohibiting the separation of families. Additionally, in the colonies, only \nRoman Catholics could own slaves, and these had to be baptised. \n\nLouis ruled through a number of councils: \n\nConseil d'en haut (\"High Council\", concerning the most important matters of \nstate)—composed of the king, the crown prince, the controller-general of \nfinances, and the secretaries of state in charge of various departments. The \nmembers of that council were called ministers of state. \nConseil des dépêches (\"Council of Messages\", concerning notices and administrative reports from the provinces). \nConseil de Conscience (\"Council of Conscience\", concerning religious affairs and episcopal appointments). \nConseil royal des finances (\"Royal Council of Finances\") headed by the \"chef du conseil des finances\" (an \nhonorary post in most cases)—this was one of the few posts in the council available to the high aristocracy.[38] \n\n**Early wars in the Low Countries**\n\n**Spain**\n\nThe death of Louis's maternal uncle King Philip IV of Spain in 1665 precipitated the War of Devolution. In 1660, Louis had \nmarried Philip IV's eldest daughter, Maria Theresa, as one of the provisions of the 1659 Treaty of the Pyrenees.[39] The marriage \ntreaty specified that Maria Theresa was to renounce all claims to Spanish territory for herself and all her descendants.[39] Mazarin ", - "page_start": 6, - "page_end": 6, - "source_file": "wikipedia5.pdf" + "text": "", + "page_start": 180, + "page_end": 180, + "source_file": "00-80T-80.pdf" }, { - "text": "**Piety and religion**\n\nLouis was a pious and devout king who saw himself as the head and protector of the \nCatholic Church in France. He made his devotions daily regardless of where he was, \nfollowing the liturgical calendar regularly.[107] Under the influence of his very religious \nsecond wife, he became much stronger in the practice of his Catholic faith.[108] This \nincluded banning opera and comedy performances during Lent.[108] \n\nTowards the middle and the end of his reign, the centre for the King's religious \nobservances was usually \nthe Chapelle Royale at Versailles. Ostentation was a \ndistinguishing feature of daily Mass, annual celebrations, such as those of Holy Week, and \nspecial ceremonies.[109] Louis established the Paris Foreign Missions Society, but his \nfor undermining \ninformal alliance with \nChristendom.[110] \n\nthe Ottoman Empire was criticised ", - "page_start": 16, - "page_end": 16, - "source_file": "wikipedia5.pdf" + "text": "", + "page_start": 180, + "page_end": 180, + "source_file": "00-80T-80.pdf" }, { - "text": "**Edict of Fontainebleau**\n\nLouis decided to persecute Protestants and revoke the 1598 Edict of Nantes, which awarded Huguenots political and religious \nfreedom. He saw the persistence of Protestantism as a disgraceful reminder of royal powerlessness. After all, the Edict was the \npragmatic concession of his grandfather Henry IV to end the longstanding French Wars of Religion. An additional factor in \nLouis's thinking was the prevailing contemporary European principle to assure socio-political stability,*cuius regio, eius religio*\n(\"whose realm, his religion\"), the idea that the religion of the ruler should be the religion of the realm (as originally confirmed in \ncentral Europe in the Peace of Augsburg of 1555).[67] \n\nResponding to petitions, Louis initially excluded Protestants from office, constrained the meeting of synods, closed churches \noutside of Edict-stipulated areas, banned Protestant outdoor preachers, and prohibited domestic Protestant migration. He also \ndisallowed Protestant-Catholic intermarriages to which third parties objected, encouraged missions to the Protestants, and ", - "page_start": 10, - "page_end": 10, - "source_file": "wikipedia5.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_GLW_2002.pdf" } ] }, @@ -9115,70 +9115,70 @@ "target_page": 8, "target_passage": "The prison population grew rapidly between 1993 to 2008, at an average of 4% a year.", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 152, + "page_end": 152, + "source_file": "00-80T-80.pdf" }, { - "text": "**2. Recent trends in the population**\n\nThe ‘Story of the Prison Population 1993 to 2012’ is an in-depth look at what \nhappened to the prison population between 1993 and 2012 and the major \nfactors contributing to the changes.4 \n\nThe prison population grew rapidly between 1993 to 2008, at an average of \n4% a year. This rapid rise was driven by: \n\n \n\nincreased numbers of people sentenced to immediate custody from \n1993 to 2002; \n\n \n\nincreases in the average custodial sentence length and increased use \nof indeterminate sentences; and \n\n an increase in numbers recalled to prison following breaches of the \nconditions of licence and these offenders spending longer in prison \nonce recalled. ", - "page_start": 8, - "page_end": 8, - "source_file": "legal4_opengouvernementlicense.pdf" + "text": "", + "page_start": 151, + "page_end": 151, + "source_file": "00-80T-80.pdf" }, { - "text": "The rise in the prison population slowed considerably from the summer of \n2008, in part due to the introduction of the Criminal Justice and Immigration \nAct (CJIA) 20085 which changed sentencing and offender management in \nways which helped to reduce growth in the prison population. \n\nThis flatter trend continued until the public disorder seen in UK cities from 6 to \n9 August 2011 which had an immediate but temporary impact on the prison \npopulation. \n\nDuring 2012 and into 2013, the prison population began to fall due to a falling \nremand population and a continued decline in the number of under 18s in \ncustody. The falling remand population during 2012 reflected falling volumes \ngoing through the courts plus the introduction, in December 2012, of \nmeasures restricting the use of remand for all offenders who would be unlikely \nto receive a custodial sentence.6 \n\nFrom the end of August 2013 to the end of October 2013, the remand \npopulation rose sharply, driving an overall increase in the prison population. \nThis was being driven by an increase in demand in the Crown Courts, \nespecially among more serious tri-able either way cases. The total population \nhas continued to rise since the beginning of 2014 and reached 85,9257 on the ", - "page_start": 8, - "page_end": 8, - "source_file": "legal4_opengouvernementlicense.pdf" + "text": "", + "page_start": 151, + "page_end": 151, + "source_file": "00-80T-80.pdf" }, { - "text": "**Key points**\n\nThis bulletin presents projections of the prison population in England and \nWales from November 2014 to December 2020. The prison population \nprojections are based on assumptions about future custodial convictions and \nincorporate the anticipated impacts of agreed policy and procedural initiatives. \n\nThe “Central Scenario” estimates that the prison population will increase from \nthe current position 85,9251 to 87,700 by June 2015. By the end of June 2020 \nthe prison population is projected to be 90,200. This Central Scenario is our \nbest estimate based on the available information. The projected prison \npopulation under our Central Scenario is shown in Chart 1. \n\nThe prison population projections are produced using a model of flows of \noffenders into and out of prison which counts the resulting prison population \neach month. \n\n**Chart 1: Projected prison population (Central Scenario)**", - "page_start": 4, - "page_end": 4, - "source_file": "legal4_opengouvernementlicense.pdf" + "text": "", + "page_start": 151, + "page_end": 151, + "source_file": "00-80T-80.pdf" }, { - "text": "**Prison Population Projections 2014 – 2020**\n\nAt the core of the method is a model of flows of offenders into and out of \nprison which counts the resulting prison population each month for sentenced, \nrecall and remand prisoners. \n\nInputs to the prison projections model include projections of future custodial \nconvictions. These are generated from time series projections of numbers of \ndefendants entering the criminal courts and take into account the age, gender \nand offence of defendants entering the system, the flow of cases through the \ncourts and the sentences which concluded cases attract. \n\nThe prison projections model monitors the sizes of the sentenced, recall and \nremand prison populations. These populations depend on the inflows defined \nabove and the outflows. These outflows are defined by observed distributions \nof custodial sentence lengths, and the proportion of custodial sentences \nserved for subsets of these populations. The model also simulates the ageing \nof the prison population over time. \n\nThe projection model is based on data up to June 2014 from various sources \nincluding court proceedings and performance data, sentencing data and \nprison receptions and population data. \n\nThe results of the prison projections model are supplemented with an estimate \nof the future non-criminal and fine defaulter populations, which is based on the \nlatest available data to September 2014. ", - "page_start": 11, - "page_end": 11, - "source_file": "legal4_opengouvernementlicense.pdf" + "text": "", + "page_start": 151, + "page_end": 151, + "source_file": "00-80T-80.pdf" }, { - "text": "Scenario 1 Central Scenario \n\nIllustrative Scenario 1 estimates that the prison population will rise to 87,100 \nby the end of June 2015 and then fall to 81,400 by the end of June 2020. \n\nIllustrative Scenario 2 estimates that the prison population will rise to 88,900 \nby the end of June 2015 and to 98,900 by the end of June 2020. \n\nThe projected trends reflect the cumulative impacts of the various sentencing, \nlegislative and procedural assumptions that are used to generate the \nprojections. The seasonal pattern reflects the dip in the prison population \nwhich is always seen around the Christmas period. \n\nIn the Central Scenario, the prison population is expected to rise to 90,200 by \nJune 2020. The projected population increase is largely due to the recent \ntrends in case mix where we have seen more serious cases come before the \ncourts. This results in offenders receiving longer custodial sentence lengths, \nwhich in turn places an upward pressure on the prison population. The growth \nin this scenario is largely driven by the rise in the determinate population \nwhich is projected to grow to 60,200 by June 2020. This is partially due to the ", - "page_start": 13, - "page_end": 13, - "source_file": "legal4_opengouvernementlicense.pdf" + "text": "", + "page_start": 151, + "page_end": 151, + "source_file": "00-80T-80.pdf" }, { - "text": "4 Story of the Prison Population: www.gov.uk/government/publications/story-of-the-prison- \npopulation-1993-2012 \n5 services.parliament.uk/bills/2007-08/criminaljusticeandimmigration.html \n6 http://services.parliament.uk/bills/2010-11/legalaidsentencingandpunishmentofoffenders.html \n7 www.gov.uk/government/statistics/prison-population-figures-2014 \n\n6 ", - "page_start": 8, - "page_end": 8, - "source_file": "legal4_opengouvernementlicense.pdf" + "text": "", + "page_start": 151, + "page_end": 151, + "source_file": "00-80T-80.pdf" }, { - "text": "Custodial conviction projections for each sub-population were smoothed using \na centred 12 month average. No seasonality in prison receptions and \ndischarges was modelled explicitly. Seasonality was measured in the historical \nprison population and applied as a series of percentage adjustments to the \nfinal population projections. Seasonal factors for a set of sub-population \ncategories (Remand, Determinate by sentence length band and Recall) were \nidentified for each month by measuring statistically significant deviations from \na centred 12 month average. ", - "page_start": 29, - "page_end": 29, - "source_file": "legal4_opengouvernementlicense.pdf" + "text": "", + "page_start": 152, + "page_end": 152, + "source_file": "00-80T-80.pdf" }, { - "text": "Average Time Served \nAverage Time Served \n\nFor the determinate population, the monthly inflows to prison are based on the \ncustodial convictions projections described above. These custodial convictions \ninclude offenders that may already be serving a sentence for a previous crime \nor those who would serve their whole custodial sentence on remand, meaning \nthat they would not be a new reception to prison. To convert from custodial \nconvictions to prison receptions we apply a conversion ratio derived from the \nhistorical proportions of custodial convictions to prison receptions for each \nsub-population averaged over the last twelve months of historical data (April \n2013 to March 2014 inclusive). \n\nMonthly outflows for the determinate population are based on observed \ncustodial sentence lengths and the observed percentage of sentence length \nserved taken from October 2013 to April 2014. Each projected offender that \nenters the model is given a custodial sentence length that is randomly \nselected from the relevant distribution. These distributions are populated with \ncustodial sentence lengths from actual offender receptions who share the \nsame characteristics of offence, gender and age group in the observed time \nperiod. The percent of custodial sentence length served is derived in the same \nmanner, except that the observed distribution is made up of discharged \noffenders further disaggregated by custodial sentence length band. ", - "page_start": 27, - "page_end": 27, - "source_file": "legal4_opengouvernementlicense.pdf" + "text": "", + "page_start": 152, + "page_end": 152, + "source_file": "00-80T-80.pdf" } ] }, @@ -9189,70 +9189,70 @@ "target_page": 13, "target_passage": "The Central Scenario estimates that the prison population will rise to 87,700 by the end of June 2015 and to 90,200 by the end of June 2020. ", "chunk_present": { - "presence": true, - "index": 3 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 211, + "page_end": 211, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**Key points**\n\nThis bulletin presents projections of the prison population in England and \nWales from November 2014 to December 2020. The prison population \nprojections are based on assumptions about future custodial convictions and \nincorporate the anticipated impacts of agreed policy and procedural initiatives. \n\nThe “Central Scenario” estimates that the prison population will increase from \nthe current position 85,9251 to 87,700 by June 2015. By the end of June 2020 \nthe prison population is projected to be 90,200. This Central Scenario is our \nbest estimate based on the available information. The projected prison \npopulation under our Central Scenario is shown in Chart 1. \n\nThe prison population projections are produced using a model of flows of \noffenders into and out of prison which counts the resulting prison population \neach month. \n\n**Chart 1: Projected prison population (Central Scenario)**", - "page_start": 4, - "page_end": 4, - "source_file": "legal4_opengouvernementlicense.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**4. Results**\n\nThe Central Scenario estimates that the prison population will rise to 87,700 \nby the end of June 2015 and to 90,200 by the end of June 2020. \n\nChart 2 presents Prison population projections from November 2014 to \nDecember 2020. \n\n**Chart 2: Projected monthly prison population (all scenarios)**", - "page_start": 13, - "page_end": 13, - "source_file": "legal4_opengouvernementlicense.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Scenario 1 Central Scenario \n\nIllustrative Scenario 1 estimates that the prison population will rise to 87,100 \nby the end of June 2015 and then fall to 81,400 by the end of June 2020. \n\nIllustrative Scenario 2 estimates that the prison population will rise to 88,900 \nby the end of June 2015 and to 98,900 by the end of June 2020. \n\nThe projected trends reflect the cumulative impacts of the various sentencing, \nlegislative and procedural assumptions that are used to generate the \nprojections. The seasonal pattern reflects the dip in the prison population \nwhich is always seen around the Christmas period. \n\nIn the Central Scenario, the prison population is expected to rise to 90,200 by \nJune 2020. The projected population increase is largely due to the recent \ntrends in case mix where we have seen more serious cases come before the \ncourts. This results in offenders receiving longer custodial sentence lengths, \nwhich in turn places an upward pressure on the prison population. The growth \nin this scenario is largely driven by the rise in the determinate population \nwhich is projected to grow to 60,200 by June 2020. This is partially due to the ", - "page_start": 13, - "page_end": 13, - "source_file": "legal4_opengouvernementlicense.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**Prison Population Projections 2014 – 2020**\n\nAt the core of the method is a model of flows of offenders into and out of \nprison which counts the resulting prison population each month for sentenced, \nrecall and remand prisoners. \n\nInputs to the prison projections model include projections of future custodial \nconvictions. These are generated from time series projections of numbers of \ndefendants entering the criminal courts and take into account the age, gender \nand offence of defendants entering the system, the flow of cases through the \ncourts and the sentences which concluded cases attract. \n\nThe prison projections model monitors the sizes of the sentenced, recall and \nremand prison populations. These populations depend on the inflows defined \nabove and the outflows. These outflows are defined by observed distributions \nof custodial sentence lengths, and the proportion of custodial sentences \nserved for subsets of these populations. The model also simulates the ageing \nof the prison population over time. \n\nThe projection model is based on data up to June 2014 from various sources \nincluding court proceedings and performance data, sentencing data and \nprison receptions and population data. \n\nThe results of the prison projections model are supplemented with an estimate \nof the future non-criminal and fine defaulter populations, which is based on the \nlatest available data to September 2014. ", - "page_start": 11, - "page_end": 11, - "source_file": "legal4_opengouvernementlicense.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**1. Central Scenario**\n\nThis bulletin presents prison population projections for England and Wales \nfrom November 2014 to December 2020. The central projection is produced to \naid development, capacity planning and resource allocation within the Criminal \nJustice System (CJS) and the National Offender Management Service \n(NOMS). The latest published useable operational capacity (21 November \n2014) is 88,0152. \n\nThe Central Scenario estimates that the prison population will rise to 87,700 \nby the end of June 2015 and to 90,200 by the end of June 2020. \n\nThe Central Scenario tracks the impact of current trends in sentencing on \ncustodial convictions, custodial sentence lengths and hence on the resulting \nprison population. These assumptions have been agreed through a \nconsultative process. Government policy is only included in these projections \nwhen it has received Royal Assent. These projections also take into account \nother drivers including: \n\n \n\ntrends in the age, gender and offence of defendants entering the \nsystem and in the flow of cases through the courts; \n\n assumptions regarding future parole hearing frequency and expected \noutcomes for indeterminate (Life and Indeterminate for the Public \nProtection) sentences; ", - "page_start": 6, - "page_end": 6, - "source_file": "legal4_opengouvernementlicense.pdf" + "text": "", + "page_start": 233, + "page_end": 233, + "source_file": "00-80T-80.pdf" }, { - "text": "**2. Recent trends in the population**\n\nThe ‘Story of the Prison Population 1993 to 2012’ is an in-depth look at what \nhappened to the prison population between 1993 and 2012 and the major \nfactors contributing to the changes.4 \n\nThe prison population grew rapidly between 1993 to 2008, at an average of \n4% a year. This rapid rise was driven by: \n\n \n\nincreased numbers of people sentenced to immediate custody from \n1993 to 2002; \n\n \n\nincreases in the average custodial sentence length and increased use \nof indeterminate sentences; and \n\n an increase in numbers recalled to prison following breaches of the \nconditions of licence and these offenders spending longer in prison \nonce recalled. ", - "page_start": 8, - "page_end": 8, - "source_file": "legal4_opengouvernementlicense.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**Prison Population Projections 2014 – 2020**\n\nThe approach for the other sub-populations is similar and has not been \nsubstantially revised since the 2013 publication. The methodology applied to \neach is briefly outlined below. \n\nThe recall population is projected going forward based on time-series data \navailable to October 2014. \n\nFor remand prisoners the average time served on remand is calculated from \nthe ratio of the remand population to remand receptions. The modelled stock \nof prisoners is calibrated to historical actuals by varying levels of receptions. \nThe remand population is generated in two parts both using this approach – \nuntried remand and unsentenced remand populations being treated \nseparately. \n\nIPP and life sentence prisoners have an extra section in the stock-flow \nstructure which models the indeterminate nature of their sentence lengths. \nOutflows for IPP and life sentence prisoners depend on the tariff lengths they \nreceive and on the frequency and outcome of Parole Board hearings. The \nvalues of these parameters are set and calibrated to reflect the most recent \ndata on Parole Board outcomes. \n\nNOMS have made an agreement with the Home Office to hold an increased \nnumber of immigration detainees, which are only seen in the final two periods \nof historical data. The projected size of the non-criminal population is therefore \nset equal to the average size of the non-criminal population over the last two \nmonths of available data. This ensures that the non-criminal projections reflect \nthe latest and most accurate count of the non-criminal population. ", - "page_start": 28, - "page_end": 28, - "source_file": "legal4_opengouvernementlicense.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**5. Previous Projections**\n\nAt the end of September 2014 the published prison population was within 1.8 \n% of the 2013 Scenario 2 (central) projection, and within 3.4 % of the 2013 \nScenario 1 projection and 0.2 % of the 2013 Scenario 3 projection. This does \nnot indicate which scenario the actual prison population will track going \nforward. \n\nDifferences between the 2013 projections and the actual population could be \nexplained by changes, different to those projected, in overall demand, offence \nmix, age and gender of defendants, court routes, custody rates or sentence \nlengths. \n\nChart 3 plots the 2014 Central Scenario projection against the three 2013 \nprison population projections. The 2014-2020 Central Scenario projection is \nabove all three scenarios from last year. The higher level of the new \nprojections can be attributed to a more serious case mix coming into the \ncourts with a resulting increase in average custodial sentence lengths. The \nprojection for June 2019 in the Central Scenario this year is 10.2 % above the \nequivalent scenario (Scenario 2) last year. \n\n**Chart 3: Comparing 2013 and 2014 projections (November 2014 – December**\n**2020)**\n\n**Total Prison Population**\n**Prison population projections from November 2014 to December 2020**\n95,000 ", + "text": "", "page_start": 15, "page_end": 15, - "source_file": "legal4_opengouvernementlicense.pdf" + "source_file": "NYSE_MGM_2004.pdf" } ] }, @@ -9263,70 +9263,70 @@ "target_page": 30, "target_passage": "Press enquiries should be directed to the Ministry of Justice press office, telephone: 020 3334 3536 ", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 411, + "page_end": 411, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 13, + "page_end": 13, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "**Contact Points for further information**\n\nCurrent and previous editions of this publication are available for download \nfrom www.justice.gov.uk/publications/statistics-and-data/index.htm \n\nPress enquiries should be directed to the Ministry of Justice press office, \ntelephone: 020 3334 3536 \n\nOther enquiries about these statistics should be directed to: \n\nJustice Statistics Analytical Services \nMinistry of Justice \n7th Floor \n102 Petty France \nLondon \nSW1H 9AJ \n\nGeneral enquiries about the statistical work of the Ministry of Justice can be e- \nmailed to: statistics.enquiries@justice.gsi.gov.uk \n\nGeneral information about the official statistics system of the UK is available \nfrom www.statistics.gov.uk ", - "page_start": 30, - "page_end": 30, - "source_file": "legal4_opengouvernementlicense.pdf" + "text": "", + "page_start": 13, + "page_end": 13, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": " press ", - "page_start": 7, - "page_end": 7, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 60, + "page_end": 60, + "source_file": "sg246915.pdf" }, { - "text": "© Crown copyright 2020 \n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, \nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament. ", - "page_start": 3, - "page_end": 3, - "source_file": "uksi_20200438_en.pdf" + "text": "", + "page_start": 13, + "page_end": 13, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "© Crown copyright 2020 \n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, \nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament. ", - "page_start": 6, - "page_end": 6, - "source_file": "uksi_20200471_en.pdf" + "text": "", + "page_start": 13, + "page_end": 13, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "(5) An Assistant Minister shall- \n\n(a) \n\nassist the President or the Vice-President in the discharge of such of the \nfunctions of the office of President or Vice-President as the President may \nspecify; or \nassist such Minister in the discharge of the functions assigned to him or her \nunder subsection (4) of this section as the President may specify. \n\n(b) \n\n**51. Attorney-General**\n\n(1) There shall be an Attorney-General appointed by the President whose office \n\nshall be a public office. \n\n(2) A person shall not be qualified to be appointed to the Office of Attorney- ", - "page_start": 24, - "page_end": 24, - "source_file": "Botswana-constitution.pdf" + "text": "", + "page_start": 13, + "page_end": 13, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "during which any person has been qualified to practise as an advocate or attorney any \nperiod during which he or she has held judicial office after becoming so qualified shall be \nincluded. \n\n(5) If the office of Chief Justice is vacant or if the Chief Justice is for any reason \n\nunable to perform the functions of his or her office, then, until a person has been \nappointed to and has assumed the functions of that office or until the Chief Justice has \nresumed those functions, as the case may be, those functions shall be performed by \nsuch one of the judges of the High Court or such other person qualified for appointment \nas a judge of the High Court as the President may appoint for that purpose: \n\nProvided that- \n\n(i) a person may be appointed under this subsection notwithstanding that he or \nshe has attained the age of 70 years or such other age as may be prescribed \nfor the purposes of section 97 of this Constitution; \n\n(ii) a person appointed under this subsection, who is not a judge of the High Court, \nmay, notwithstanding the assumption or resumption of the functions of the office \nof Chief Justice by the holder of that office, continue to act as a judge of the ", - "page_start": 41, - "page_end": 41, - "source_file": "Botswana-constitution.pdf" + "text": "", + "page_start": 13, + "page_end": 13, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "© Crown copyright 2021 \n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, \nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament. ", - "page_start": 3, - "page_end": 3, - "source_file": "uksi_20210538_en.pdf" + "text": "", + "page_start": 44, + "page_end": 44, + "source_file": "00-80T-80.pdf" }, { - "text": "© Crown copyright 2021 \n\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, \nController of Her Majesty’s Stationery Office and Queen’s Printer of Acts of Parliament. ", - "page_start": 91, - "page_end": 91, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 13, + "page_end": 13, + "source_file": "ASX_KCN_2013.pdf" } ] }, @@ -9343,64 +9343,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 338, + "page_end": 338, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 312, + "page_end": 312, + "source_file": "sg246915.pdf" }, { - "text": "| To start with go to the | SPARQL Query | |\n|---|---|---|\n| To start with go to the | SPARQL Query | |\n| Window>Tabs>SPARQL Query | | . This |\n", - "page_start": 68, - "page_end": 68, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 391, + "page_end": 391, + "source_file": "00-80T-80.pdf" }, { - "text": "9.2 SPARQL Queries \nSPARQL is a powerful language, and one could write a whole book about it. In fact, there are books \nwritten about it. The best one I have seen is the O’Reilly book Learning SPARQL by Bob DuCharme. \nThis is an excellent book that not only goes into SPARQL but into topics such as RDF/RDFS and how \ntriples are used to represent all information in OWL. I will only touch on those issues here, there is much \nmore to say about them and DuCharme’s book is a great place to learn more. If some of the following is a \nbit hard to understand don’t be discouraged. This is just an attempt to give a very high level introduction \nto something that requires significant study to really understand. \n\nEssentially SPARQL is to the Semantic Web and Knowledge Graphs as SQL is to relational databases. \nJust as SQL can do more than just query, it can also assert new information into a database, so SPARQL \ncan as well. The current SPARQL plugins for Protégé are somewhat limited and don’t support the \nstatements such as INSERT for entering new data so we will just cover the basics of using SPARQL as a \nquery language but keep in mind there is a lot more to it than what we briefly cover here. ", - "page_start": 68, - "page_end": 68, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 391, + "page_end": 391, + "source_file": "00-80T-80.pdf" }, { - "text": "| | | | | Module Name | | | Function | |\n|---|---|---|---|---|---|---|---|---|\n| | | | | Module Name | | | Function | |\n| | | | | | | - SPARQL Assistant - SPARQL Saving/Modifying a Query - SPARQL Queries | | |\n\n\n*Table 1-3: Main functions of the Portal Version 3.0*", - "page_start": 7, - "page_end": 7, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + "text": "", + "page_start": 312, + "page_end": 312, + "source_file": "sg246915.pdf" }, { - "text": "The SELECT part of a SPARQL query determines what data to display. The WHERE part of a query \ndetermines what to match in the query. If you want to display everything matched in the WHERE clause \nyou can just use a*for the SELECT clause. The initial default query in this tab is set up with no \nknowledge of the specific ontology. I.e., it will return all the classes that are subclasses of other classes \nregardless of the ontology. To get information about Pizzas the first thing we need to do is to add \nanother prefix to the beginning of the query. In our case the Pizza ontology has been set up with a \nmapping to the prefix pizza (you can see this in the ontology prefixes tab in the Active ontology tab \ndiscussed in chapter 7). So, add the following to the SPARQL query after the last PREFIX statement: \n\nPREFIX pizza: \n\nWe are almost ready to query the actual ontology. For our first query let’s find all the Pizzas purchased by \na Customer. The SPARQL code for this is: \n\n68 ", - "page_start": 69, - "page_end": 69, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 312, + "page_end": 312, + "source_file": "sg246915.pdf" }, { - "text": "You are likely familiar with storing data in SQL and NoSQL databases in traditional solutions. Due \n\nto its rapid response and low latency, Amazon DynamoDB, a NoSQL data store released in 2012 is a \n\nfrequently used data storage service for serverless solutions. ", - "page_start": 76, - "page_end": 76, - "source_file": "serverless-core.pdf" + "text": "", + "page_start": 312, + "page_end": 312, + "source_file": "sg246915.pdf" }, { - "text": "**3.7.4 SPARQL Queries**\n\n", - "page_start": 57, - "page_end": 57, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + "text": "", + "page_start": 312, + "page_end": 312, + "source_file": "sg246915.pdf" }, { - "text": "| Acronym | Description |\n|---|---|\n| Acronym | Description |\n| SPARQL | Query language for linked data (RDF) |\n| SSL | Secure Socket Layer |\n| URL | Uniform Resource Locator |\n| XML | Extensible Markup Language |\n\n\n*Table 1-2: Abbreviations and Acronyms*", - "page_start": 5, - "page_end": 5, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + "text": "", + "page_start": 311, + "page_end": 311, + "source_file": "sg246915.pdf" }, { - "text": "**3.7 SPARQL Manager**\n\nThe SPARQL Manager provides a graphical user interface (GUI) for sending user defined queries to \nthe Virtuoso SPARQL query engine. \n\nThe powerful SPARQL Protocol and RDF Query Language are primarily aimed at professionals for \nquerying metadata as Linked Data. A basic knowledge of the DCAT-AP specification is highly \nrecommended. \n\nIn the future, users of the SPARQL Manager will be able to save their queries for scheduled \nexecution. Additionally a notification will be send to the user when a result has changed. \n\nClicking the info icon in the upper right corner will display a step-by-step walkthrough of all \ncomponents with a short info about their function. \n\nThis is possible in both of modes of the SPARQL Manager, the search and the assistant mode, which \nwill be described in the following sections. ", - "page_start": 54, - "page_end": 54, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + "text": "", + "page_start": 314, + "page_end": 314, + "source_file": "sg246915.pdf" } ] }, @@ -9417,64 +9417,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 131, + "page_end": 131, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**3.4 Graphical Data Visualisation Tool**\n\nThis section describes the features of the graphical visualisation tool for numeric data. The features \nare currently available for XLS (Excel) and CSV files, except for the selection of the sheet name which \nis applicable only for Excel files. \n\nMost GUI elements from the “Graph” tab (records selection, search box, filters and fields buttons) \nare also available on the “Grid” tab and work in the same way. ", - "page_start": 43, - "page_end": 43, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + "text": "", + "page_start": 241, + "page_end": 241, + "source_file": "00-80T-80.pdf" }, { - "text": "**3.3 Visualization of Geo-Spatial Data (map.apps)**\n\nThe visualization of geo-spatial data within the European Data Portal provides previewing \nfunctionality for spatial open data. The aim is to allow the user to assess if a dataset meets specific \nrequirements in terms of spatial and thematic coverage. The functionality that is provided in the \nheader (links to disclaimers and language switching) is consistent in the entire portal. \n\n**3.3.1 How to visualize geo-spatial data from a dataset resource**\n\nAccessing the geo-spatial visualization is achieved via the Data Platform interface. A user searches for \nspecific data, enters the dataset view of reasonable results and displays the available distributions \n(see Section 3.2.5). If a dataset distribution is supported by the geo-spatial visualization, a globe \nbutton is displayed (see Figure 3). This is the entry point into the map viewer application. Supported \nformats are OGC Web Map Service (WMS) and GeoJSON. If the user visits the geo-spatial \nvisualization for the first time, an interactive user tutorial is provided to guide the use through \nspecific functions of the user interface, similar to this written user manual. ", - "page_start": 38, - "page_end": 38, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + "text": "", + "page_start": 24, + "page_end": 24, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Tools for simulating POMDP-AIF models were originally developed as part of the \nDEM [20] library for MATLAB [21] (part of the larger SPM library [22]). Since then, a \nmodal and flexible software package pymdp [23] was created for Python [24], as well as a \nperformance-oriented package cpp-AIF [25] for C++ [26] that can be used across platforms. \nFinally, the factor graph library RxInfer [27] for Julia [28] has also been used to implement \nsome AIF models on an efficient factor graph back-end [29–31]. The important tools \nthat these packages provide make AIF available for researchers to perform simulation \nstudies and for use in engineering contexts. They do not, however, usually allow for \nfitting models to empirically observed data, which is a fundamental method used in \ncognitive modelling [32], often in the context of computational psychiatry [13], to infer the \nmechanisms underlying variations in behaviour or to investigate the differences between \n(for example, clinical) populations. Smith and colleagues [33] provided a guide for manually \ndoing variational Bayesian parameter estimation based on empirical data, but only in \nMATLAB and restricted to a particular class of variational parameter estimation methods \n(variational Laplace), instead of the sampling-based methods that currently predominate in \nthe field of cognitive modelling [34,35]. ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed7_cc4.pdf" + "text": "", + "page_start": 24, + "page_end": 24, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "•**Data modeling**- build new data models, or design models based on existing data models. \n\n•**Data visualization**- map queries and visualize the access patterns (facets) of the application \n\nwithout writing code. Every facet corresponds to a different access pattern in DynamoDB. You \n\ncan manually add data to your data model. \n\n•**Operation builder**- use the*operation builder*to develop and test queries, and query live \n\ndatasets. You can also build and perform data plane operations, including creating projection \n\nand condition expressions, and generating sample code in multiple languages. ", - "page_start": 84, - "page_end": 84, - "source_file": "serverless-core.pdf" + "text": "", + "page_start": 24, + "page_end": 24, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**3.4.1 How to visualize graphical data from a dataset resource**\n\nAs a result of a dataset search, the system displays on the “Dataset” tab all distributions \n(resource/data files) that are part of the selected dataset. Each XLS or CSV distribution of the dataset \ncan be further explored by clicking on “Open Visualization” under the “Options” button – if available. ", - "page_start": 43, - "page_end": 43, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + "text": "", + "page_start": 24, + "page_end": 24, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "| 1.3 Terminology | |\n|---|---|\n| Acronym | Description |\n| API | Application Programmer Interface |\n| CKAN | (replaced by the “Data Platform”) |\n| CSV | Comma separated values |\n| Data Platform | Single page web app for managing and displaying datasets |\n| DCAT-AP | DCAT Application Profile - Metadata specification based on the Data Catalogue vocabulary (DCAT) |\n| DRUPAL | Content Management System |\n| ECAS / EU-Login | EU user login page |\n| EDP | European Data Portal |\n| FME | Feature Manipulation Engine |\n| GUI | Graphical User Interface |\n| HTTP | Hypertext Transfer Protocol |\n| JSON | JavaScript Object Notation (a lightweight data-interchange format) |\n| maps.app | Geo-spatial data visualization application |\n| MQA | Metadata Quality Assistant |\n| RDF | Resource Description Framework |\n| SOLR | Search engine used for portal content search and dataset search |\n\n\nEuropean Data Portal Version 4.3 – User Manual Page**4**of 57 ", - "page_start": 4, - "page_end": 4, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + "text": "", + "page_start": 24, + "page_end": 24, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "IBM STAT can be downloaded from this IBM Support web page. \n\nYou can download the Storage Tier Advisor Tool and install it on your Windows-based \ncomputer. The tool is packaged as an ISO file that must be extracted to a temporary location. \n\nThe tool installer is at temporary_location\\IMAGES\\STAT\\Disk1\\InstData\\NoVM\\. By default, \nthe Storage Tier Advisor Tool is installed in C:\\Program Files\\IBM\\STAT\\*.*\n\nOn IBM Storwize V7000, the heat data files are found in the /dumps/easytier directory on the \nconfiguration node and are named dpa_heat.node_panel_name.time_stamp.data. Any heat \ndata file is erased when it exists for longer than 7 days. \n\nHeat files must be offloaded and Storage Tier Advisor Tool started from a Windows command \nprompt console with the file specified as a parameter, as shown in Example 10-6. \n\nExample 10-6 Running STAT in Windows command prompt \n\nC:\\Program Files (x86)\\IBM\\STAT>stat dpa_heat.7822DFF-1.181028.073824.data \n\nThe Storage Tier Advisor Tool creates a set of .html and .csv files that can be used for Easy \nTier analysis. ", - "page_start": 436, - "page_end": 436, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 24, + "page_end": 24, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Ensure that no existing application has the same application ID in the target application \ngroup. For more information, see the section “Adding items to a server” in the*IBM Content*\n*Manager OnDemand for Multiplatforms, V9.5, Administration Guide*, SC19-3352. \n\n**Selecting font by line data graphical indexer**\nThe font that is used by the line data graphical indexer to display a document can be changed \nfrom within the line data graphical indexer at the Content Manager OnDemand Administrator \nClient. ", - "page_start": 77, - "page_end": 77, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 242, + "page_end": 242, + "source_file": "00-80T-80.pdf" } ] }, @@ -9491,64 +9491,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 242, + "page_end": 242, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 247, + "page_end": 247, + "source_file": "00-80T-80.pdf" }, { - "text": "**3.1.5 How to view “Tweets” on the EDP**\n\nThe Home Page displays the latest tweets on the European Data Portal in the “Tweets” panel on the \nright hand side. \n\n‐**Click on any of the tweets to display the complete tweet on twitter.**\n\n‐ **Scroll vertically to see previous tweets.**", - "page_start": 20, - "page_end": 20, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + "text": "", + "page_start": 247, + "page_end": 247, + "source_file": "00-80T-80.pdf" }, { - "text": "In this research, we were interested in tweets containing either #climatechange or #globalwarming, \nas these two hashtags exactly correspond to climate change and global warming, respectively, the two \ncompeting definitions of climate issues. We did not follow [79] to include #AGW (anthropogenic global \nwarming) as query hashtags in our research because we think that this refers to global warming in \na defined category so cannot be regarded in parallel with the two considered hashtags. We limited the \nscope of the search to English-language tweets generated between 1 January 2009 and 31 December \n2018. We only collected tweets containing either of the two hashtags in the body of the tweets rather \nthan those containing these hashtags in the retweeted or quoted text, as we think that retweeted text or \nquoted texts cannot directly represent the tweeter’s usage pattern of the two terminologies. \n\nTo collect these tweets, we used a Python-based crawler to send requests to the Twitter server to \nselect hashtags, language, start date, and end date as inputs. Once the first request was completed, \nthe server responded with a file in json format and the first 20 qualified tweets in a time-descending \norder. By parsing the json file, we obtained a string for the crawler to build the next request and obtain \nthe next 20 tweets. Thus, a loop was written to keep the crawler sending requests and the crawler \nwas automatically terminated when all the qualified tweets publicly available were collected. Our \ncrawler respected Twitter’s robot.txt and we did not collect, analyze or display any user information in \nour study. ", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 247, + "page_end": 247, + "source_file": "00-80T-80.pdf" }, { - "text": "There are many other words in tweets besides hashtags to express the author’s intention. Multiple \napproaches, such as LDA and STM [32,73], can help to extract topics from unstructured texts. But in \nthis study, targeting on hashtags is more in line with our research question. Firstly, hashtags were \ninvented spontaneously by users of Twitter in 2007 as a mechanism to categorize discussions [74]. \nWords with hashtags are recognized as topics and considered worthy of public discussion. Secondly, \nby attaching # to certain words in tweets, the users intentionally anchor their tweets to certain topics. \nThe operator # explicitly reflects the author’s emphasis, which can help us extract rather than infer the \nauthor’s identification of the topic of the tweets. Our research question is to analyze and visualize \nthe associations of topics in public climate discourse. Compared with other approaches, analyzing \nhashtags co-occurrence pattern has advantage in extracting the structure of public discussions. ", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 428, + "page_end": 428, + "source_file": "00-80T-80.pdf" }, { - "text": "All the hashtags in the tweets were automatically extracted with the Regular Expression Library \nin Python. Hashtags were transformed to lowercase letters, and clear synonyms were stemmed \n(e.g., #trump, #DonaldTrump, #donaldtrump). As all the tweets in the “climate change” dataset \ncontained the #climatechange hashtag and all the tweets in the “global warming” dataset contained the \n#globalwarming hashtag, we did not document these two hashtags when processing data. The number \nof hashtags contained in the two discourses in each year is displayed in Figure 1b. Hashtags whose \nfrequency was lower than ten times are excluded in the network analysis. As hashtags are intended \nto be a topic anchor [52], extremely low frequency means that the hashtag is not recognized socially, \nand excluding them helps researchers focus on meaningful rather than occasional associations. \n\n3.3. Measurement \n\n3.3.1. Hashtag Co-Occurrence Network ", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 247, + "page_end": 247, + "source_file": "00-80T-80.pdf" }, { - "text": "Hum. Serv.**2012**, 30, 160–185. [CrossRef] \n\n54. Yang, G. Narrative agency in hashtag activism: The case of# BlackLivesMatter. Media Commun.**2016**, 4, 13. \n55. Bruns, A.; Burgess, J.E. The use of Twitter hashtags in the formation of ad hoc publics. In Proceedings of the \n6th European Consortium for Political Research (ECPR) General Conference 2011, Reykjavík, Iceland, 25–27 \nAugust 2011. \n\n56. Rzeszotarski, J.M.; Spiro, E.S.; Matias, J.N.; Monroy-Hernández, A.; Morris, M.R. Is anyone out there?: \nUnpacking Q&A hashtags on twitter. In Proceedings of the SIGCHI Conference on Human Factors in \nComputing Systems, Toronto, ON, Canada, 26 April–1 May 2014; pp. 2755–2758. \n\n57. Tsur, O.; Rappoport, A. What’s in a hashtag?: Content based prediction of the spread of ideas in microblogging \ncommunities. In Proceedings of the Fifth ACM International Conference on Web Search and Data Mining, \nSeattle, WA, USA, 8–12 February 2012; pp. 643–652. \n\n58. Yang, L.; Sun, T.; Zhang, M.; Mei, Q. We know what@ you# tag: Does the dual role affect hashtag adoption? \nIn Proceedings of the 21st international conference on World Wide Web, Lyon, France, 16–20 April 2012; \npp. 261–270. \n\n59. Weller, K.; Dröge, E.; Puschmann, C. Citation Analysis in Twitter: Approaches for Defining and Measuring \nInformation Flows within Tweets during Scientific Conferences. In Proceedings of the Making Sense of \nMicroposts 2011, Heraklion, Greece, 30 May 2011; pp. 1–12. \n\n60. Meraz, S. Hashtag wars and networked framing: The private/public networked protest repertoires of occupy \non twitter. In Between the Public and Private in Mobile Communication; Routledge: Abingdon, UK, 2017; \npp. 303–323. \n\n61. Meraz, S.; Papacharissi, Z. Networked gatekeeping and networked framing on# Egypt. Int. J. Press.**2013**, 18, ", - "page_start": 19, - "page_end": 19, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 40, + "page_end": 40, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "Press: Amsterdam, The Netherlands, 2013; p. 335. \n\n70. Grundberg, M.D.; Lindgren, S. Translocal frame extensions in a networked protest: Situating the# IdleNoMore \n\nhashtag. IC Rev. Cient*í*fica De Inf. Y Comun.**2015**, 11, 49–57. \n\n71. Bruns, A.; Burgess, J.E. # ausvotes: How Twitter covered the 2010 Australian federal election. Commun. \n\nPolitics Cult.**2011**, 44, 37–56. \n\n72. Pearce, W.; Holmberg, K.; Hellsten, I.; Nerlich, B. Climate change on Twitter: Topics, communities and \n\nconversations about the 2013 IPCC Working Group 1 report. PLoS ONE**2014**, 9, e94785. [CrossRef] \n\n73. Zhao, W.X.; Jiang, J.; Weng, J.; He, J.; Lim, E.P.; Yan, H.; Li, X. Comparing twitter and traditional media using \ntopic models. In Proceedings of the European Conference on Information Retrieval, Dublin, Ireland, 18–21 \nApril 2011; pp. 338–349. \n\n74. Doctor, V. Hashtag History: When and What Started It? Available online: https://www.hashtags.org/featured/ \n\nhashtag-history-when-and-what-started-it/ (accessed on 16 January 2020). \n\n75. Newman, T.P. Tracking the release of IPCC AR5 on Twitter: Users, comments, and sources following the \nrelease of the Working Group I Summary for Policymakers. Public Underst. Sci.**2017**, 26, 815–825. [CrossRef] \nSegerberg, A.; Bennett, W.L. Social media and the organization of collective action: Using Twitter to explore \nthe ecologies of two climate change protests. Commun. Rev.**2011**, 14, 197–215. [CrossRef] \nStatista. Number of Monthly Active Twitter Users Worldwide from 1st Quarter 2010 to 1st Quarter 2019 (in \nMillions). 2019. Available online: https://www.statista.com/statistics/282087/number-of-monthly-active- \ntwitter-users/ (accessed on 10 October 2019). \n\n76. \n\n77. \n\n78. Liu, Y.; Kliman-Silver, C.; Mislove, A. The tweets they are a-changin’: Evolution of Twitter users and behavior. \nIn Proceedings of the Eighth International AAAI Conference on Weblogs and Social Media, Ann Arbor, MI, \nUSA, 1–4 June 2014. \n\n79. Williams, H.T.; McMurray, J.R.; Kurz, T.; Lambert, F.H. Network analysis reveals open forums and echo \nchambers in social media discussions of climate change. Glob. Environ. Chang.**2015**, 32, 126–138. [CrossRef] \n80. Guo, L.; Rohde, J.A.; Wu, H.D. Who is responsible for Twitter’s echo chamber problem? Evidence from 2016 \n\nUS election networks. Inf. Commun. Soc.**2020**, 23, 234–251. [CrossRef] \n\n81. Gephi. Websites of Gephi. Available online: https://gephi.org (accessed on 16 January 2020). \n82. Calabrese, C.; Anderton, B.N.; Barnett, G.A. Online Representations of “Genome Editing” Uncover \nOpportunities for Encouraging Engagement: A Semantic Network Analysis. Sci. Commun.**2019**, 41, \n222–242. [CrossRef] \nFruchterman, T.M.; Reingold, E.M. Graph drawing by force-directed placement. Softw. Pract. Exp.**1991**, 21, \n1129–1164. [CrossRef] \n\n83. \n\n84. Myers, J.L.; Well, A.D.; Lorch, R.F., Jr. Research Design and Statistical Analysis; Routledge: Abingdon, UK, 2013. \n85. Krackhardt, D. Predicting with networks: Nonparametric multiple regression analysis of dyadic data. Soc. \n\nNetw.**1988**, 10, 359–381. [CrossRef] \n\n86. Borgatti, S.P.; Everett, M.G.; Freeman, L.C. Ucinet for Windows: Software for Social Network Analysis; Analytic \n\nTechnologies: Harvard, MA, USA, 2002; Volume 6. \n\n87. Zaval, L.; Keenan, E.A.; Johnson, E.J.; Weber, E.U. How warm days increase belief in global warming. Nat. \n\nClim. Chang.**2014**, 4, 143. [CrossRef] \n\n88. Marx, S.M.; Weber, E.U.; Orlove, B.S.; Leiserowitz, A.; Krantz, D.H.; Roncoli, C.; Phillips, J. Communication \nand mental processes: Experiential and analytic processing of uncertain climate information. Glob. Environ. \nChang.**2007**, 17, 47–58. [CrossRef] \n\n89. Bostrom, A.; Morgan, M.G.; Fischhoff, B.; Read, D. What do people know about global climate change? 1. \n\nMental models. Risk Anal.**1994**, 14, 959–970. [CrossRef] \n\n90. Moser, S.C. Communicating climate change: History, challenges, process and future directions. Wiley \n\nInterdiscip. Rev. Clim. Chang.**2010**, 1, 31–53. [CrossRef] \n\n91. Huang, J.; Thornton, K.M.; Efthimiadis, E.N. Conversational tagging in twitter. In Proceedings of the 21st \nACM Conference on Hypertext and Hypermedia, Toronto, ON, Canada, 13–16 June 2010; pp. 173–178. \n\n92. Callon, M. Acting in an Uncertain World; MIT Press: Cambridge, MA, USA, 2009. \n93. O’Neill, S.; Williams, H.T.; Kurz, T.; Wiersma, B.; Boykoff, M. Dominant frames in legacy and social media \n\ncoverage of the IPCC Fifth Assessment Report. Nat. Clim. Chang.**2015**, 5, 380. [CrossRef] ", - "page_start": 20, - "page_end": 20, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 428, + "page_end": 428, + "source_file": "00-80T-80.pdf" }, { - "text": "**3. Methods**\n\n3.1. Data Source \n\nAs Twitter has been recognized as a popular discussion forum [75] and a social activity platform [76] \nfor climate issues, we followed the literature [5,8,18] and used tweets to investigate distinct perceptions \nof climate issues and evolution on social media. Although Twitter’s ecosystem has been changing \nin terms of the number of active users, user demographics, and tweeting conventions in the past \nyears [77,78], the problem is unavoidable for all the information ecosystems on the Internet. As Twitter \nis one of the most popular social websites, we defined our study as characterizing the perception of \nclimate issues among social media users rather than all the netizens or the whole population. \n\n3.2. Data ", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 247, + "page_end": 247, + "source_file": "00-80T-80.pdf" }, { - "text": "Given our goal of exploring the difference between the two discourses, the 615,816 tweets \ncontaining both hashtags simultaneously were excluded to differentiate between the two datasets \nfollowing [67,80]. A total of 6,662,478 tweets were retained, of which 5,774,747 contained #climatechange, \nand 887,731 contained “#globalwarming”. The number of qualified tweets containing #climatechange \nand #globalwarming in each year is displayed in Figure 1a. ", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 247, + "page_end": 247, + "source_file": "00-80T-80.pdf" } ] }, @@ -9565,64 +9565,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 13, + "page_end": 13, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 388, + "page_end": 388, + "source_file": "00-80T-80.pdf" }, { - "text": "Try it: Select File > Save As, and then select OneDrive and give this document a name. \n\nIf you sign in to Office 365 on another device, this document will be in your list of recent files. \nYou can pick up where you left off… even if you left the document open on the computer you’re \nusing now. ", - "page_start": 2, - "page_end": 2, - "source_file": "welcome_to_word_template.pdf" + "text": "", + "page_start": 36, + "page_end": 36, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "Access files anywhere \n\nNeed to work on the go and across different devices? Click**File**>**Account**to sign \nin with your Microsoft account and access your recently used files anywhere, on \nany device, through seamless integration between Office, OneDrive, OneDrive for \nBusiness, and SharePoint. ", - "page_start": 2, - "page_end": 2, - "source_file": "Word QS.pdf" + "text": "", + "page_start": 387, + "page_end": 387, + "source_file": "00-80T-80.pdf" }, { - "text": "View who else is typing \n\nCo-authoring Word documents that are shared on OneDrive or on a \nSharePoint site happens in real-time, which means you can easily view where \nother authors are making changes in the same document that you’re currently \nworking in. ", - "page_start": 3, - "page_end": 3, - "source_file": "Word QS.pdf" + "text": "", + "page_start": 387, + "page_end": 387, + "source_file": "00-80T-80.pdf" }, { - "text": "With this document saved in OneDrive, you can share it with others. They don’t even need Word \nto open it. \n\nTry it: Select Share, and send a link to this document. (keyboard shortcut – Alt+F+Z or Alt+Z+S) \n\nYou can send the link by typing someone’s email address or by copying the link and pasting it \ninto a message or chat. If you want them to read the document but not edit it, set their \npermission to view-only. \n\nIf they don’t have Word, the document will open in their web browser, in Word Online. ", - "page_start": 3, - "page_end": 3, - "source_file": "welcome_to_word_template.pdf" + "text": "", + "page_start": 387, + "page_end": 387, + "source_file": "00-80T-80.pdf" }, { - "text": "Find recent files \n\nWhether you only work with files stored on your PC’s local hard drive or you store \nfiles in multiple shared locations, selecting**File**>**Open**takes you to your recently \nused documents and any files that you may have pinned to your list. ", - "page_start": 2, - "page_end": 2, - "source_file": "Word QS.pdf" + "text": "", + "page_start": 387, + "page_end": 387, + "source_file": "00-80T-80.pdf" }, { - "text": "*Figure 3-7 Folder general information*\n\n**Display Document Location**\nThe Display Document Location setting (Figure 3-7) determines whether the client shows the \nstorage location of each document in the document list by placing an icon next to each entry. \nThe possible locations are cache storage (on the library server or an object server) or archive \nstorage. ", - "page_start": 78, - "page_end": 78, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 387, + "page_end": 387, + "source_file": "00-80T-80.pdf" }, { - "text": "**10.5.3 Removing documents from the Tivoli Storage Manager archive**\n\nRemoving a document from archive storage means that the backup (if the primary document \ncopy is in cache) or long-term copy (if the primary document copy is in archive) of the \ndocument is deleted from the system. You remove documents from archive storage when you \nno longer have a business or legal requirement to keep them. \n\nA*management class*contains an archive copy group that specifies the criteria that makes a \ndocument eligible for deletion. Documents become eligible for deletion under the following \nconditions: \n\n(cid:2) Administrators delete documents from client nodes \n(cid:2) An archived document exceeds the time criteria in the archive copy group (how long \narchived copies are kept) \n\nASM does not delete information about expired documents from its database until expiration \nprocessing runs. You can run expiration processing either automatically or manually by \ncommand. Ensure that expiration processing runs periodically to allow ASM to reuse storage \npool space that is occupied by expired documents. \n\nWhen expiration processing runs, ASM deletes documents from its database. The storage \nspace that these documents used to occupy then becomes reclaimable. For more \ninformation, see “Reclaiming space in storage pools” on page 233. ", - "page_start": 256, - "page_end": 256, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 387, + "page_end": 387, + "source_file": "00-80T-80.pdf" }, { - "text": "If the system is authenticated, it can then access cloud storage to copy data to the cloud \nstorage or restore data that is copied to cloud storage back to the system. The system \nsupports one cloud account to a single cloud service provider. Migration between providers is \nnot supported. ", - "page_start": 200, - "page_end": 200, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 387, + "page_end": 387, + "source_file": "00-80T-80.pdf" } ] }, @@ -9639,64 +9639,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 200, + "page_end": 200, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 2, + "page_end": 2, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Pro tip: If you selected whole words for this exercise, did you notice that Word popped up a \nlittle toolbar, with the font formatting options? \n\nBetween that and keyboard shortcuts like Ctrl+B \nand Ctrl+I, you save time by not having to go up to \nthe Home tab all the time. ", - "page_start": 4, - "page_end": 4, - "source_file": "welcome_to_word_template.pdf" + "text": "", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Try it: Apply the Heading 1 style: \n\n1. Put your cursor somewhere in the heading above (“Make magic: use Heading styles”) – \n\ndon’t select anything. \n\n2. On the Home tab, find Styles, and select Heading 1 (keyboard shortcut Ctrl+Alt+1). \n\nTa-da! Now it looks like a heading, and acts like one too. ", - "page_start": 5, - "page_end": 5, - "source_file": "welcome_to_word_template.pdf" + "text": "", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\nmouse, the keyboard or a combination of the two. \nOnce selected, you can use the range for input, or \napply formatting, or copy the cells as required. ", - "page_start": 17, - "page_end": 17, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**1.1 Shortcut function:**\n\n1) Swipe to the left till you find the \"+\" icon, click the icon to add part of the functions in the \nshortcut. \n2) Scroll down the screen when the watch is in the dial interface, you can find Bluetooth \nconnection status, time, power, brightness adjustment and other functions. ", - "page_start": 2, - "page_end": 2, - "source_file": "6126797.pdf" + "text": "", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**CHANGING FONTS**\n\nThe appearance that you choose for your text is \nreferred to as the***font***or***typeface***. Font \ntraditionally refers to a combination of typeface, \nstyle and size in points (e.g. Arial Bold 12 pt). ", - "page_start": 22, - "page_end": 22, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**Handy to Know…**\n You may have noticed that the text didn’t \n\nchange size when you used the mini toolbar \nuntil you actually clicked on a different font \nsize. This is because***Live Preview***doesn’t \nwork with the mini toolbar. ", - "page_start": 23, - "page_end": 23, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "With this document saved in OneDrive, you can share it with others. They don’t even need Word \nto open it. \n\nTry it: Select Share, and send a link to this document. (keyboard shortcut – Alt+F+Z or Alt+Z+S) \n\nYou can send the link by typing someone’s email address or by copying the link and pasting it \ninto a message or chat. If you want them to read the document but not edit it, set their \npermission to view-only. \n\nIf they don’t have Word, the document will open in their web browser, in Word Online. ", + "text": "", "page_start": 3, "page_end": 3, - "source_file": "welcome_to_word_template.pdf" + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**SELECTING ROWS**\n\nIf you want to make changes to an***entire row***, \nsuch as bolding all of the headings in a row or \nchanging the font of all the cell entries, you must \nfirst select the row. This is done by clicking on the ", - "page_start": 18, - "page_end": 18, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_MGM_2004.pdf" } ] }, @@ -9707,70 +9707,70 @@ "target_page": 6, "target_passage": "They work best when your document is formatted with styles", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 305, + "page_end": 305, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 298, + "page_end": 298, + "source_file": "00-80T-80.pdf" }, { - "text": "Style sets and themes let you completely change the look of your document in an instant. They \nwork best when your document is formatted with styles (so it’s good that we fixed that Heading \nstyle, above). \n\nTry it: Explore style sets and themes: \n\n1. On the Design tab, select Themes, and choose a theme from the drop-down. \nNotice that the gallery of style sets updates to reflect the theme you picked. \n\n2. Select any theme you like from the drop-down and click to apply. ", - "page_start": 6, - "page_end": 6, - "source_file": "welcome_to_word_template.pdf" + "text": "", + "page_start": 298, + "page_end": 298, + "source_file": "00-80T-80.pdf" }, { - "text": "To make a good summary, you need to: \n\n• Keep it brief. \n\n• Make sure to use main headings and keywords. \n\n• Focus on the main ideas. \n\n• Classify and organise the information in a logical manner. \n\n• Use your own words where possible. \n\n• Include examples. \n\n• Remember that your summaries are there to help you. ", - "page_start": 29, - "page_end": 29, - "source_file": "basic-english-language-skills.PDF" + "text": "", + "page_start": 298, + "page_end": 298, + "source_file": "00-80T-80.pdf" }, { - "text": "In forming its recommendations the Committee \ntakes into consideration the Group’s stage of \ndevelopment, remuneration in the industry and \nperformance. The Corporate Governance \nStatement provides further information on \nthe role of this committee. 〉〉 \n\ncontribute to appropriate attraction and \nretention strategies for Directors and \nexecutives. \n\nDuring the year the Company introduced a STI \nPlan that is based on Key Management Personnel \nindividual performance measures and a Long- \nTerm Incentive (“LTI”) Executive Rights Plan that \nprovides performance-based remuneration to \nmembers of management through the issue of \nDeferred Rights and Performance Rights vesting \nover a period of three years. These new plans are \ndiscussed in further detail later in this report. \nRemuneration Consultants \nThe Group engages the services of independent \nand specialist remuneration consultants from \ntime to time. Under the*Corporations Act 2001*, \nremuneration consultants must be engaged by \nthe Non-Executive Directors and reporting of \nany remuneration recommendations must be \nmade directly to the Remuneration Committee. \n\nIn consultation with external remuneration \nconsultants, the Group has structured an execu- \ntive remuneration framework that is market \ncompetitive and complimentary to the business \nstrategy of the organisation. \n\nThe framework is intended to provide a mix of \nfixed and variable remuneration, with a blend of \nshort and long-term incentives as appropriate. \nAs executives gain seniority within the Group, \nthe balance of this mix shifts to a higher propor- \ntion of “at risk” rewards (refer to chart – \nRemuneration Reward Mix on the following \npage). \n\nVoting and comments made at \nthe Company’s 2012 AGM \n\nThe table below provides a summary of the \nBoard’s action and / or comments in response to \nconcerns raised by shareholders at the 2012 \nAGM in relation to remuneration. ", - "page_start": 51, - "page_end": 51, - "source_file": "ASX_KCN_2013.pdf" + "text": "", + "page_start": 298, + "page_end": 298, + "source_file": "00-80T-80.pdf" }, { - "text": "Get writing suggestions \n\nWith**Editor**, bring out your best writing. Editor helps you bring out your best \nwriting by giving you intelligent writing suggestions. It also calculates an Editor \nScore based on the number and types of suggestions you have yet to address. \nSelect an underlined word or phrase to accept or ignore a suggestion. ", - "page_start": 3, - "page_end": 3, - "source_file": "Word QS.pdf" + "text": "", + "page_start": 95, + "page_end": 95, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "**2.2 Remuneration and Nominations Committee**\nThe remuneration and nominations committee is structured so that it: \n\n• \n• \n• Has at least three members. \nConsists of a majority of independent Directors; \nIs chaired by an independent Director; and \n\nThe responsibilities of the committee include recommendations to the Board about: \n\n• \n• \n• \n• \n• Remuneration practices and levels of Executives and Non-executive Directors; \nThe necessary and desirable competencies of Directors; \nReview of board succession plans; \nThe development of a process for evaluation of the performance of the board, its committees and Directors; and, \nThe appointment and re-election of Directors. \n\nThe combined Remuneration and Nominations Committee consists of three independent Non-Executive Directors and reports \nits recommendations to the Board for approval. Formal minutes are kept of each meeting and submitted to the Board for review. \nThe members of the Remuneration and Nominations Committee is listed on page 26 of the Directors’ Report. A Remuneration \nand Nominations Committee charter is published on the Company’s website. \n\nThe Board reviews the composition and skill sets of the Committee on a regular basis, and considers that the current \ncomposition, size and skills of the Committee to be appropriate. ", - "page_start": 52, - "page_end": 52, - "source_file": "ASX_SEA_2014.pdf" + "text": "", + "page_start": 298, + "page_end": 298, + "source_file": "00-80T-80.pdf" }, { - "text": "The remuneration of Non-Executive Directors is structured separately from that of the executive Director and senior executives. \nThe Remuneration Report at pages 28 to 43 of this Annual Report sets out details of the Company’s policies and practices for \nremunerating Directors (Executive and Non-Executive) and Key Management Personnel. \n\nThe Remuneration and Nominations Committee Charter is available in the corporate governance section of Sundance’s website. ", - "page_start": 55, - "page_end": 55, - "source_file": "ASX_SEA_2014.pdf" + "text": "", + "page_start": 298, + "page_end": 298, + "source_file": "00-80T-80.pdf" }, { - "text": "Make magic: use Heading styles \n\nThe heading for this part (“Make magic: use Heading styles”) looks the same as the other \nheadings in this document, but it’s not as useful. It’s formatted with font settings (font, size, and \ncolor), while the other headings are formatted with a Heading style (Heading 1, to be exact). \n\nSee the little triangle when you mouse over those other \nheadings? \n\nYou can collapse and expand everything under a heading, like an \noutline. But this one’s not working. Let’s fix it. ", - "page_start": 5, - "page_end": 5, - "source_file": "welcome_to_word_template.pdf" + "text": "", + "page_start": 298, + "page_end": 298, + "source_file": "00-80T-80.pdf" }, { - "text": "Triggered by developments in digital and communication technologies, several new types of mobile \nwork have developed. In principle, the place of work can be anywhere, in a car, train, hotel, at the \npremises of other employers, at remote office-like locations, or at the client’s workplace or at private \nhomes of clients; it is not ‘place-bound’. Most of this mobile work still takes place in the contractual form \nof regular employment, but mobile work is also a major field for many new forms of new work contracts, \ntriggered by the technological possibilities. \n\n**Traditional home-based work**consists of the production of small goods that — from a technical point \nof view — can be produced in private homes (clothes, artisan work and very repetitive work like sorting). \nThis work is performed for an enterprise or a person contracted by the enterprise for the organisation of \nhome-based work and is located at the homes of the workers. It might require extra technical equipment, \nbut sometimes usual private equipment is sufficient. The traditional home-based work very probably has \ndecreased to a low level, the quantity of this type of home-based work is not monitored at EU level.81 \nRegulation of OSH for such home-based work has a long tradition in OSH legislation, mostly aimed at \nachieving working conditions as similar as possible to the other employees in an enterprise, regarding \nwages, social protection, and safety and health. ", - "page_start": 49, - "page_end": 49, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 301, + "page_end": 301, + "source_file": "00-80T-80.pdf" } ] }, @@ -9787,64 +9787,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 49, + "page_end": 49, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "The first two years of the VERITAS blazar KSP \nwere highly successful. Highlights include the detec- \ntion of more than a 16 VHE blazars with the obser- \nvations almost always having contemporaneous MWL \ndata. Among these detections are 8 VHE blazar dis- \ncoveries, including the first three IBLs known to emit \nVHE γ-rays. All but a handful of the blazars on the \ninitial VERITAS discovery target list were observed, \nand the flux limits generated for those not VHE de- \ntected are generally the most-constraining ever. The \nexcess seen in the stacked blazar analysis suggests \nthat the initial direction of the VERITAS discovery \nprogram was well justified, and that follow-up obser- \nvations of many of these initial targets will result in \nVHE discoveries. In addition, the Fermi-LAT is iden- \ntifying many new compelling targets for the VERITAS \nblazar discovery program. These new candidates have \nalready resulted in 3 VHE blazar discoveries. The \nfuture of the VERITAS blazar discovery program is \nclearly very bright. ", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0770.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Prior to the launch of Fermi VERITAS had discov- \nered VHE emission from 2 blazars. These included \nthe first VHE-detected IBL, W Comae [14, 15], and \nthe HBL 1ES 0806+524 [16]. VERITAS has discov- \nered 6 VHE blazars since the launch of Fermi. Three \nof these were initially observed by VERITAS prior to \nthe release of Fermi-LAT results, due to the X-ray \nbrightness of the synchrotron peaks of their SEDs. \n\n**4. Blazar Discovery Program**\n\nThe blazars observed in the discovery program are \nlargely high-frequency-peaked BL Lac objects. How- \never, the program also includes IBLs (intermediate- \npeaked) and LBLs (low-peaked), as well as flat spec- \ntrum radio quasars (FSRQs), in an attempt to in- \ncrease the types of blazars known to emit VHE γ-rays. \nThe observed targets are drawn from a target list con- \ntaining objects visible to the telescopes at reasonable \nzenith angles (−8◦ < δ < 72◦), without a previously \npublished VHE limit below 1.5% Crab, and with a \nmeasured redshift z < 0.3. To further the study of the ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0770.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "EBL a few objects having a large (z > 0.3) are also \nincluded in the target list. The target list includes: \n\nVERITAS observes for ∼750 h and ∼250 h each \nyear during periods of astronomical darkness and par- \ntial moonlight, respectively. The moonlight observa- \ntions are almost exclusively used for a blazar discovery \nprogram, and a large fraction of the dark time is used \nfor the blazar KSP, which consists of: \n\n• Four distant (z > 0.3) BL Lac objects recom- \n\n• A VHE blazar discovery program (∼200 h / yr): \nEach year ∼10 targets are selected to receive \n∼10 h of observations each during astronomi- \ncal darkness. These data are supplemented by \ndiscovery observations during periods of partial \nmoonlight. \n\nmended by [5, 10]. \n\nEGRET [12]. \n\n• A target-of-opportunity (ToO) observation pro- \ngram (∼50 h / yr): VERITAS blazar obser- \nvations can be triggered by either a VERI- \nTAS blazar discovery, a VHE flaring alert (>2 \nCrab) from the blazar monitoring program of \nthe Whipple 10-m telescope or from another \nVHE instrument, or a lower-energy flaring alert \n(optical, X-ray or Fermi-LAT). Should the guar- \nanteed allocation be exhausted, further time can \nbe requested from a pool of director’s discre- \ntionary time. \n\n• Multi-wavelength (MWL) \n\nstudies of VHE \nblazars (∼50 h / yr + ToO): Each year one \nblazar receives a deep exposure in a pre-planned \ncampaign of extensive, simultaneous MWL (X- \nray, optical, radio) measurements. ToO observa- \ntion proposals for MWL measurements are also \nsubmitted to lower-energy observatories (e.g. \nSwift) and are triggered by a VERITAS discov- \nery or flaring alert. \n\n**5. VERITAS AGN Detections**\n\nVERITAS has detected VHE γ-ray emission from \n16 AGN (15 blazars), including 8 VHE discoveries. \nThese AGN are shown in Table I, and each has been \ndetected by the Large Area Telescope (LAT) instru- \nment aboard the Fermi Gamma-ray Space Telescope. \nEvery blazar discovered by VERITAS was the sub- \nject of ToO MWL observations to enable modeling of \nits simultaneously-measured SED. The known VHE \nblazars detected by VERITAS were similarly the tar- \ngets of MWL observations. \n\n• Distant VHE blazar studies to constrain the ex- \ntragalactic background light (EBL): Here dis- \ntant targets are given a higher priority in the \nblazar discovery program, as well as for the \nMWL observations of known VHE blazars, par- \nticularly those with hard VHE spectra. \n**5.1. Recent VERITAS Blazar Discoveries**", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0770.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "vations of VHE blazars, can measure both SED peaks \nand are crucial for extracting information from the \nobservations of VHE blazars. They are used to con- \nstrain the size, magnetic field and Doppler factor of \nthe emission region, as well as to determine the origin \n(leptonic or hadronic) of the VHE γ-rays. In leptonic \nscenarios, such MWL observations are used to mea- \nsure the spectrum of high-energy electrons producing \nthe emission, as well as to elucidate the nature of the \nseed photons. Additionally, an accurate measure of \nthe cosmological EBL density requires accurate mod- \neling of the blazar’s intrinsic VHE emission that can \nonly be performed with contemporaneous MWL ob- \nservations. ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "The VERITAS array of four 12-m diameter imaging atmospheric-Cherenkov telescopes in southern Arizona is \nused to study very high energy (VHE; E>100 GeV) γ-ray emission from astrophysical objects. VERITAS is \ncurrently the most sensitive VHE γ-ray observatory in the world and one of the VERITAS collaboration’s Key \nScience Projects (KSP) is the study of blazars. These active galactic nuclei (AGN) are the most numerous class \nof identified VHE sources, with ∼30 known to emit VHE photons. More than 70 AGN, almost all of which \nare blazars, have been observed with the VERITAS array since 2007, in most cases with the deepest-ever VHE \nexposure. These observations have resulted in the detection of VHE γ-rays from 16 AGN (15 blazars), including \n8 for the first time at these energies. The VERITAS blazar KSP is summarized in this proceeding and selected \nresults are presented. \n0 \n1 \n0 \n2 \n\nn \na \nJ \n**1. Introduction**\n\n5 \n\n] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**5.2. Discoveries Motivated by Fermi-LAT**\n\nThe successful VHE discovery observations by \nVERITAS of three blazars was motivated primarily \nby results from the first year of LAT data taking. In \nparticular, the VHE detections of PKS 1424+240 [21] \nand 1ES 0502+675 [22] were the result of VERITAS \nobservations triggered by the inclusion of these objects \nin the Fermi-LAT Bright AGN List [13]. The former \nis only the third IBL known to emit VHE gamma- \nrays, and the latter is the most distant BL Lac object \n\n**7. Multi-wavelength Studies of VHE**\n**Blazars**\n\nDuring the first three seasons of VERITAS obser- \nvations, pre-planned extensive MWL campaigns were \norganized for three blazars 1ES 2344+514 (2007-08), \n1ES 1218+304 (2008-09) and 1ES 0229+200 (2009- \n10 - ongoing). \nIn addition, numerous ToO MWL- \nobservation campaigns were performed. These include \ncampaigns for every blazar/AGN discovered by VER- \nITAS, and all include Swift (XRT and UVOT) data. \nAll MWL campaigns on the VHE blazars discovered 2RBS 0413 was observed further by VERITAS in Fall 2009. \n\neConf C091122 ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0770.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Active galactic nuclei are the most numerous class \nof identified VHE γ-ray sources. These objects emit \nnon-thermal radiation across ∼20 orders of magnitude \nin energy and rank among the most powerful particle \naccelerators in the universe. A small fraction of AGN \npossess strong collimated outflows (jets) powered by \naccretion onto a supermassive black hole (SMBH). \nVHE γ-ray emission can be generated in these jets, \nlikely in a compact region very near the SMBH event \nhorizon. Blazars, a class of AGN with jets pointed \nalong the line-of-sight to the observer, are of par- \nticular interest in the VHE regime. Approximately \n30 blazars, primarily high-frequency-peaked BL Lacs \n(HBL), are identified as sources of VHE γ-rays, and \nsome are spectacularly variable on time scales com- \nparable to the light crossing time of their SMBH (∼2 \nmin; [1]). VHE blazar studies probe the environment \nvery near the central SMBH and address a wide range \nof physical phenomena, including the accretion and \njet-formation processes. These studies also have cos- \nmological implications, as VHE blazar data can be \nused to strongly constrain primordial radiation fields \n(see the extragalactic background light (EBL) con- \nstraints from, e.g., [2, 3]). \n\n**2. VERITAS**", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "More than 50 VHE blazar candidates were observed \nby VERITAS between September 2007 and June 2009. \nThe total exposure on the 49 non-detected candi- \ndates is ∼305 h live time (average of 6.2 h per can- \ndidate). Approximately 55% of the total exposure is \nsplit amongst the 27 observed HBL. The remainder is \ndivided amongst the 8 IBL (26%), 5 LBL (6%), and 9 \nFSRQ (13%). There are no clear indications of signifi- \ncant VHE γ-ray emission from any of these 49 blazars \n[25]. However, the observed significance distribution is \nclearly skewed towards positive values (see Figure 1). \nA stacking analysis performed on the entire data sam- \nple shows an overall excess of 430 γ-rays, correspond- \ning to a statistical significance of 4.8σ, observed from \nthe directions of the candidate blazars. The IBL and \nHBL targets make up 96% of the observed excess. Ob- \nservations of these objects also comprise ∼80% of the \ntotal exposure. An identical stacked analysis of all \nthe extragalactic non-blazar targets observed, but not \nclearly detected (>5σ), by VERITAS does not show \na significant excess (∼120 h exposure). The stacked \nexcess persists using alternate methods for estimating \nthe background at each blazar location, and with dif- \nferent event selection criteria (e.g. soft cuts optimized \nfor sources with ΓVHE > 4). The distribution of VHE \nflux upper limits is shown in Figure 1. These 49 VHE \nflux upper limits are generally the most-constraining \never reported for these objects. ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0770.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" } ] }, @@ -9855,70 +9855,70 @@ "target_page": 2, "target_passage": "The blazars observed in the discovery program are largely high-frequency-peaked BL Lac objects. How ever, the program also includes IBLs (intermediate peaked) and LBLs (low-peaked), as well as flat spec trum radio quasars (FSRQs), in an attempt to in crease the types of blazars known to emit VHE γ-rays.", "chunk_present": { - "presence": true, - "index": 6 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 107, + "page_end": 107, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 139, + "page_end": 139, + "source_file": "00-80T-80.pdf" }, { - "text": "The first two years of the VERITAS blazar KSP \nwere highly successful. Highlights include the detec- \ntion of more than a 16 VHE blazars with the obser- \nvations almost always having contemporaneous MWL \ndata. Among these detections are 8 VHE blazar dis- \ncoveries, including the first three IBLs known to emit \nVHE γ-rays. All but a handful of the blazars on the \ninitial VERITAS discovery target list were observed, \nand the flux limits generated for those not VHE de- \ntected are generally the most-constraining ever. The \nexcess seen in the stacked blazar analysis suggests \nthat the initial direction of the VERITAS discovery \nprogram was well justified, and that follow-up obser- \nvations of many of these initial targets will result in \nVHE discoveries. In addition, the Fermi-LAT is iden- \ntifying many new compelling targets for the VERITAS \nblazar discovery program. These new candidates have \nalready resulted in 3 VHE blazar discoveries. The \nfuture of the VERITAS blazar discovery program is \nclearly very bright. ", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0770.pdf" + "text": "", + "page_start": 136, + "page_end": 136, + "source_file": "00-80T-80.pdf" }, { - "text": "The Fermi-LAT is already having a significant im- \npact on the blazar KSP. In future seasons, the VER- \nITAS blazar discovery program will focus its dis- \ncovery program on hard-spectrum blazars detected \nby Fermi-LAT, and will likely have a greater focus \non high-risk/high-reward objects at larger redshifts \n(0.3 < z < 0.7). \nIn addition, the number of VHE \nblazars studied in pre-planned MWL campaigns will \nincrease as data from the Fermi-LAT will be publicly \navailable. \nIn particular, the extensive pre-planned \nMWL campaigns will focus on objects that are note- \nworthy for the impact their data may have on under- \nstanding the EBL. The simultaneous observations of \nblazars by VERITAS and Fermi-LAT will completely \nresolve the higher-energy SED peak, often for the first \ntime, enabling unprecedented constraints on the un- \nderlying blazar phenomena to be derived. ", - "page_start": 5, - "page_end": 5, - "source_file": "1001.0770.pdf" + "text": "", + "page_start": 136, + "page_end": 136, + "source_file": "00-80T-80.pdf" }, { - "text": "EBL a few objects having a large (z > 0.3) are also \nincluded in the target list. The target list includes: \n\nVERITAS observes for ∼750 h and ∼250 h each \nyear during periods of astronomical darkness and par- \ntial moonlight, respectively. The moonlight observa- \ntions are almost exclusively used for a blazar discovery \nprogram, and a large fraction of the dark time is used \nfor the blazar KSP, which consists of: \n\n• Four distant (z > 0.3) BL Lac objects recom- \n\n• A VHE blazar discovery program (∼200 h / yr): \nEach year ∼10 targets are selected to receive \n∼10 h of observations each during astronomi- \ncal darkness. These data are supplemented by \ndiscovery observations during periods of partial \nmoonlight. \n\nmended by [5, 10]. \n\nEGRET [12]. \n\n• A target-of-opportunity (ToO) observation pro- \ngram (∼50 h / yr): VERITAS blazar obser- \nvations can be triggered by either a VERI- \nTAS blazar discovery, a VHE flaring alert (>2 \nCrab) from the blazar monitoring program of \nthe Whipple 10-m telescope or from another \nVHE instrument, or a lower-energy flaring alert \n(optical, X-ray or Fermi-LAT). Should the guar- \nanteed allocation be exhausted, further time can \nbe requested from a pool of director’s discre- \ntionary time. \n\n• Multi-wavelength (MWL) \n\nstudies of VHE \nblazars (∼50 h / yr + ToO): Each year one \nblazar receives a deep exposure in a pre-planned \ncampaign of extensive, simultaneous MWL (X- \nray, optical, radio) measurements. ToO observa- \ntion proposals for MWL measurements are also \nsubmitted to lower-energy observatories (e.g. \nSwift) and are triggered by a VERITAS discov- \nery or flaring alert. \n\n**5. VERITAS AGN Detections**\n\nVERITAS has detected VHE γ-ray emission from \n16 AGN (15 blazars), including 8 VHE discoveries. \nThese AGN are shown in Table I, and each has been \ndetected by the Large Area Telescope (LAT) instru- \nment aboard the Fermi Gamma-ray Space Telescope. \nEvery blazar discovered by VERITAS was the sub- \nject of ToO MWL observations to enable modeling of \nits simultaneously-measured SED. The known VHE \nblazars detected by VERITAS were similarly the tar- \ngets of MWL observations. \n\n• Distant VHE blazar studies to constrain the ex- \ntragalactic background light (EBL): Here dis- \ntant targets are given a higher priority in the \nblazar discovery program, as well as for the \nMWL observations of known VHE blazars, par- \nticularly those with hard VHE spectra. \n**5.1. Recent VERITAS Blazar Discoveries**", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0770.pdf" + "text": "", + "page_start": 137, + "page_end": 137, + "source_file": "00-80T-80.pdf" }, { - "text": "The motivation for observing blazars in the sub- \nmillimeter is to study behavior close to the central \nengine, where the jet material is presumably still be- \ning accelerated. The separate emission processes that \ncontribute to overall SED may present differently in \nBL Lacs and FSRQs, allowing us to understand the \nsimilarities and differences between blazar types. We \nhave investigated these differences between objects in \nterms of submillimeter behavior and, in conclusion, \nfind that \n\n• The SMA blazars exhibit submillimeter energy \nindexes that follow the spectral se- \nspectral \nquence interpretation of blazars. ", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0806.pdf" + "text": "", + "page_start": 137, + "page_end": 137, + "source_file": "00-80T-80.pdf" }, { - "text": "Prior to the launch of Fermi VERITAS had discov- \nered VHE emission from 2 blazars. These included \nthe first VHE-detected IBL, W Comae [14, 15], and \nthe HBL 1ES 0806+524 [16]. VERITAS has discov- \nered 6 VHE blazars since the launch of Fermi. Three \nof these were initially observed by VERITAS prior to \nthe release of Fermi-LAT results, due to the X-ray \nbrightness of the synchrotron peaks of their SEDs. \n\n**4. Blazar Discovery Program**\n\nThe blazars observed in the discovery program are \nlargely high-frequency-peaked BL Lac objects. How- \never, the program also includes IBLs (intermediate- \npeaked) and LBLs (low-peaked), as well as flat spec- \ntrum radio quasars (FSRQs), in an attempt to in- \ncrease the types of blazars known to emit VHE γ-rays. \nThe observed targets are drawn from a target list con- \ntaining objects visible to the telescopes at reasonable \nzenith angles (−8◦ < δ < 72◦), without a previously \npublished VHE limit below 1.5% Crab, and with a \nmeasured redshift z < 0.3. To further the study of the ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0770.pdf" + "text": "", + "page_start": 137, + "page_end": 137, + "source_file": "00-80T-80.pdf" }, { - "text": "**5.2. Discoveries Motivated by Fermi-LAT**\n\nThe successful VHE discovery observations by \nVERITAS of three blazars was motivated primarily \nby results from the first year of LAT data taking. In \nparticular, the VHE detections of PKS 1424+240 [21] \nand 1ES 0502+675 [22] were the result of VERITAS \nobservations triggered by the inclusion of these objects \nin the Fermi-LAT Bright AGN List [13]. The former \nis only the third IBL known to emit VHE gamma- \nrays, and the latter is the most distant BL Lac object \n\n**7. Multi-wavelength Studies of VHE**\n**Blazars**\n\nDuring the first three seasons of VERITAS obser- \nvations, pre-planned extensive MWL campaigns were \norganized for three blazars 1ES 2344+514 (2007-08), \n1ES 1218+304 (2008-09) and 1ES 0229+200 (2009- \n10 - ongoing). \nIn addition, numerous ToO MWL- \nobservation campaigns were performed. These include \ncampaigns for every blazar/AGN discovered by VER- \nITAS, and all include Swift (XRT and UVOT) data. \nAll MWL campaigns on the VHE blazars discovered 2RBS 0413 was observed further by VERITAS in Fall 2009. \n\neConf C091122 ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0770.pdf" + "text": "", + "page_start": 137, + "page_end": 137, + "source_file": "00-80T-80.pdf" }, { - "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**3. VERITAS Blazar KSP**\n\n• All nearby (z < 0.3) HBL and IBL recom- \nmended as potential VHE emitters in [5, 6, 7]. \n\n• The X-ray brightest HBL (z < 0.3) in the recent \nSedentary [8] and ROXA [9] surveys. \n\n• Several FSRQ recommended as potential VHE \nemitters in [6, 11]. \n\n• All nearby (z < 0.3) blazars detected by \n\n• All nearby (z < 0.3) blazars contained in the \nFermi-LAT Bright AGN Sample [13]. \n\n• All sources (|b| > 10◦) detected by Fermi-LAT \nwhere extrapolations of their MeV-GeV γ-ray \nspectrum (including EBL absorption; assuming \nz = 0.3 if the redshift is unknown) indicates a \npossible VERITAS detection in less than 20 h. \nThis criteria is the focus of the 2009-10 VERI- \nTAS blazar discovery program. ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0770.pdf" + "text": "", + "page_start": 137, + "page_end": 137, + "source_file": "00-80T-80.pdf" }, { - "text": "More than 50 VHE blazar candidates were observed \nby VERITAS between September 2007 and June 2009. \nThe total exposure on the 49 non-detected candi- \ndates is ∼305 h live time (average of 6.2 h per can- \ndidate). Approximately 55% of the total exposure is \nsplit amongst the 27 observed HBL. The remainder is \ndivided amongst the 8 IBL (26%), 5 LBL (6%), and 9 \nFSRQ (13%). There are no clear indications of signifi- \ncant VHE γ-ray emission from any of these 49 blazars \n[25]. However, the observed significance distribution is \nclearly skewed towards positive values (see Figure 1). \nA stacking analysis performed on the entire data sam- \nple shows an overall excess of 430 γ-rays, correspond- \ning to a statistical significance of 4.8σ, observed from \nthe directions of the candidate blazars. The IBL and \nHBL targets make up 96% of the observed excess. Ob- \nservations of these objects also comprise ∼80% of the \ntotal exposure. An identical stacked analysis of all \nthe extragalactic non-blazar targets observed, but not \nclearly detected (>5σ), by VERITAS does not show \na significant excess (∼120 h exposure). The stacked \nexcess persists using alternate methods for estimating \nthe background at each blazar location, and with dif- \nferent event selection criteria (e.g. soft cuts optimized \nfor sources with ΓVHE > 4). The distribution of VHE \nflux upper limits is shown in Figure 1. These 49 VHE \nflux upper limits are generally the most-constraining \never reported for these objects. ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0770.pdf" + "text": "", + "page_start": 137, + "page_end": 137, + "source_file": "00-80T-80.pdf" } ] }, @@ -9929,70 +9929,70 @@ "target_page": 3, "target_passage": "More than 50 VHE blazar candidates were observed by VERITAS betweenSeptember 2007 andJune 2009.", "chunk_present": { - "presence": true, - "index": 7 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 27, + "page_end": 27, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "The first two years of the VERITAS blazar KSP \nwere highly successful. Highlights include the detec- \ntion of more than a 16 VHE blazars with the obser- \nvations almost always having contemporaneous MWL \ndata. Among these detections are 8 VHE blazar dis- \ncoveries, including the first three IBLs known to emit \nVHE γ-rays. All but a handful of the blazars on the \ninitial VERITAS discovery target list were observed, \nand the flux limits generated for those not VHE de- \ntected are generally the most-constraining ever. The \nexcess seen in the stacked blazar analysis suggests \nthat the initial direction of the VERITAS discovery \nprogram was well justified, and that follow-up obser- \nvations of many of these initial targets will result in \nVHE discoveries. In addition, the Fermi-LAT is iden- \ntifying many new compelling targets for the VERITAS \nblazar discovery program. These new candidates have \nalready resulted in 3 VHE blazar discoveries. The \nfuture of the VERITAS blazar discovery program is \nclearly very bright. ", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0770.pdf" + "text": "", + "page_start": 26, + "page_end": 26, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "The VERITAS array of four 12-m diameter imaging atmospheric-Cherenkov telescopes in southern Arizona is \nused to study very high energy (VHE; E>100 GeV) γ-ray emission from astrophysical objects. VERITAS is \ncurrently the most sensitive VHE γ-ray observatory in the world and one of the VERITAS collaboration’s Key \nScience Projects (KSP) is the study of blazars. These active galactic nuclei (AGN) are the most numerous class \nof identified VHE sources, with ∼30 known to emit VHE photons. More than 70 AGN, almost all of which \nare blazars, have been observed with the VERITAS array since 2007, in most cases with the deepest-ever VHE \nexposure. These observations have resulted in the detection of VHE γ-rays from 16 AGN (15 blazars), including \n8 for the first time at these energies. The VERITAS blazar KSP is summarized in this proceeding and selected \nresults are presented. \n0 \n1 \n0 \n2 \n\nn \na \nJ \n**1. Introduction**\n\n5 \n\n] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" + "text": "", + "page_start": 25, + "page_end": 25, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "**5.2. Discoveries Motivated by Fermi-LAT**\n\nThe successful VHE discovery observations by \nVERITAS of three blazars was motivated primarily \nby results from the first year of LAT data taking. In \nparticular, the VHE detections of PKS 1424+240 [21] \nand 1ES 0502+675 [22] were the result of VERITAS \nobservations triggered by the inclusion of these objects \nin the Fermi-LAT Bright AGN List [13]. The former \nis only the third IBL known to emit VHE gamma- \nrays, and the latter is the most distant BL Lac object \n\n**7. Multi-wavelength Studies of VHE**\n**Blazars**\n\nDuring the first three seasons of VERITAS obser- \nvations, pre-planned extensive MWL campaigns were \norganized for three blazars 1ES 2344+514 (2007-08), \n1ES 1218+304 (2008-09) and 1ES 0229+200 (2009- \n10 - ongoing). \nIn addition, numerous ToO MWL- \nobservation campaigns were performed. These include \ncampaigns for every blazar/AGN discovered by VER- \nITAS, and all include Swift (XRT and UVOT) data. \nAll MWL campaigns on the VHE blazars discovered 2RBS 0413 was observed further by VERITAS in Fall 2009. \n\neConf C091122 ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0770.pdf" + "text": "", + "page_start": 22, + "page_end": 22, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "Prior to the launch of Fermi VERITAS had discov- \nered VHE emission from 2 blazars. These included \nthe first VHE-detected IBL, W Comae [14, 15], and \nthe HBL 1ES 0806+524 [16]. VERITAS has discov- \nered 6 VHE blazars since the launch of Fermi. Three \nof these were initially observed by VERITAS prior to \nthe release of Fermi-LAT results, due to the X-ray \nbrightness of the synchrotron peaks of their SEDs. \n\n**4. Blazar Discovery Program**\n\nThe blazars observed in the discovery program are \nlargely high-frequency-peaked BL Lac objects. How- \never, the program also includes IBLs (intermediate- \npeaked) and LBLs (low-peaked), as well as flat spec- \ntrum radio quasars (FSRQs), in an attempt to in- \ncrease the types of blazars known to emit VHE γ-rays. \nThe observed targets are drawn from a target list con- \ntaining objects visible to the telescopes at reasonable \nzenith angles (−8◦ < δ < 72◦), without a previously \npublished VHE limit below 1.5% Crab, and with a \nmeasured redshift z < 0.3. To further the study of the ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0770.pdf" + "text": "", + "page_start": 159, + "page_end": 159, + "source_file": "00-80T-80.pdf" }, { - "text": "EBL a few objects having a large (z > 0.3) are also \nincluded in the target list. The target list includes: \n\nVERITAS observes for ∼750 h and ∼250 h each \nyear during periods of astronomical darkness and par- \ntial moonlight, respectively. The moonlight observa- \ntions are almost exclusively used for a blazar discovery \nprogram, and a large fraction of the dark time is used \nfor the blazar KSP, which consists of: \n\n• Four distant (z > 0.3) BL Lac objects recom- \n\n• A VHE blazar discovery program (∼200 h / yr): \nEach year ∼10 targets are selected to receive \n∼10 h of observations each during astronomi- \ncal darkness. These data are supplemented by \ndiscovery observations during periods of partial \nmoonlight. \n\nmended by [5, 10]. \n\nEGRET [12]. \n\n• A target-of-opportunity (ToO) observation pro- \ngram (∼50 h / yr): VERITAS blazar obser- \nvations can be triggered by either a VERI- \nTAS blazar discovery, a VHE flaring alert (>2 \nCrab) from the blazar monitoring program of \nthe Whipple 10-m telescope or from another \nVHE instrument, or a lower-energy flaring alert \n(optical, X-ray or Fermi-LAT). Should the guar- \nanteed allocation be exhausted, further time can \nbe requested from a pool of director’s discre- \ntionary time. \n\n• Multi-wavelength (MWL) \n\nstudies of VHE \nblazars (∼50 h / yr + ToO): Each year one \nblazar receives a deep exposure in a pre-planned \ncampaign of extensive, simultaneous MWL (X- \nray, optical, radio) measurements. ToO observa- \ntion proposals for MWL measurements are also \nsubmitted to lower-energy observatories (e.g. \nSwift) and are triggered by a VERITAS discov- \nery or flaring alert. \n\n**5. VERITAS AGN Detections**\n\nVERITAS has detected VHE γ-ray emission from \n16 AGN (15 blazars), including 8 VHE discoveries. \nThese AGN are shown in Table I, and each has been \ndetected by the Large Area Telescope (LAT) instru- \nment aboard the Fermi Gamma-ray Space Telescope. \nEvery blazar discovered by VERITAS was the sub- \nject of ToO MWL observations to enable modeling of \nits simultaneously-measured SED. The known VHE \nblazars detected by VERITAS were similarly the tar- \ngets of MWL observations. \n\n• Distant VHE blazar studies to constrain the ex- \ntragalactic background light (EBL): Here dis- \ntant targets are given a higher priority in the \nblazar discovery program, as well as for the \nMWL observations of known VHE blazars, par- \nticularly those with hard VHE spectra. \n**5.1. Recent VERITAS Blazar Discoveries**", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0770.pdf" + "text": "", + "page_start": 22, + "page_end": 22, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "More than 50 VHE blazar candidates were observed \nby VERITAS between September 2007 and June 2009. \nThe total exposure on the 49 non-detected candi- \ndates is ∼305 h live time (average of 6.2 h per can- \ndidate). Approximately 55% of the total exposure is \nsplit amongst the 27 observed HBL. The remainder is \ndivided amongst the 8 IBL (26%), 5 LBL (6%), and 9 \nFSRQ (13%). There are no clear indications of signifi- \ncant VHE γ-ray emission from any of these 49 blazars \n[25]. However, the observed significance distribution is \nclearly skewed towards positive values (see Figure 1). \nA stacking analysis performed on the entire data sam- \nple shows an overall excess of 430 γ-rays, correspond- \ning to a statistical significance of 4.8σ, observed from \nthe directions of the candidate blazars. The IBL and \nHBL targets make up 96% of the observed excess. Ob- \nservations of these objects also comprise ∼80% of the \ntotal exposure. An identical stacked analysis of all \nthe extragalactic non-blazar targets observed, but not \nclearly detected (>5σ), by VERITAS does not show \na significant excess (∼120 h exposure). The stacked \nexcess persists using alternate methods for estimating \nthe background at each blazar location, and with dif- \nferent event selection criteria (e.g. soft cuts optimized \nfor sources with ΓVHE > 4). The distribution of VHE \nflux upper limits is shown in Figure 1. These 49 VHE \nflux upper limits are generally the most-constraining \never reported for these objects. ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0770.pdf" + "text": "", + "page_start": 22, + "page_end": 22, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "• 1ES 0806+524: The observed SED of this new \nVHE HBL can be explained by an SSC model \n[16]. \n\n• W Comae: This IBL, the first discovered at \nVHE, flared twice in 2008 [14, 15]. Modeling of \nthe SED is improved by including an external- \nCompton (EC) component in an SSC interpre- \ntation. \n\n• 3C 66A: This IBL flared at VHE and MeV-GeV \nenergies in 2008[17, 18]. Similar to W Comae \nand PKS 1424+240, modeling of observed SED \nsuggests a strong EC component in addition to \nan SSC component. \n\n• Mkn 421: This HBL exhibited major flaring be- \nhavior for several months in 2008. Correlations \nof the VHE and X-ray flux were observed, along \nwith spectral hardening with increased flux in \nboth bands [29]. The MWL aspect of the VERITAS blazar KSP has \nalso been highly successful. Every VERITAS obser- \nvation of a known, or newly discovered, VHE blazar \nhas been accompanied by contemporaneous MWL ob- \nservations. These data have resulted in the identifica- ", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0770.pdf" + "text": "", + "page_start": 21, + "page_end": 21, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**3. VERITAS Blazar KSP**\n\n• All nearby (z < 0.3) HBL and IBL recom- \nmended as potential VHE emitters in [5, 6, 7]. \n\n• The X-ray brightest HBL (z < 0.3) in the recent \nSedentary [8] and ROXA [9] surveys. \n\n• Several FSRQ recommended as potential VHE \nemitters in [6, 11]. \n\n• All nearby (z < 0.3) blazars detected by \n\n• All nearby (z < 0.3) blazars contained in the \nFermi-LAT Bright AGN Sample [13]. \n\n• All sources (|b| > 10◦) detected by Fermi-LAT \nwhere extrapolations of their MeV-GeV γ-ray \nspectrum (including EBL absorption; assuming \nz = 0.3 if the redshift is unknown) indicates a \npossible VERITAS detection in less than 20 h. \nThis criteria is the focus of the 2009-10 VERI- \nTAS blazar discovery program. ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0770.pdf" + "text": "", + "page_start": 21, + "page_end": 21, + "source_file": "NYSE_CHK_2010.pdf" } ] }, @@ -10003,70 +10003,70 @@ "target_page": 1, "target_passage": " We introduce a new software package for the Julia programming language, the library ActiveInference.jl.", "chunk_present": { - "presence": true, - "index": 3 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 292, + "page_end": 292, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 313, + "page_end": 313, + "source_file": "00-80T-80.pdf" }, { - "text": "**3. Using ActiveInference.jl**\n\nIn this section, we provide an overview of the various functions a user will need to \noperate ActiveInference. This includes functionalities for creating POMDP agents, for sim- \nulating behaviour and for fitting the models to data. In the next section, we demonstrate \nhow to use the package on a concrete worked example. ActiveInference is under continual \ndevelopment, and the newest version of the package, including documentation for how to \nuse it, can be found at github.com/ilabcode/ActiveInference.jl. \n\n3.1. Creating and Using a POMDP ", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed7_cc4.pdf" + "text": "", + "page_start": 31, + "page_end": 31, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "1 \n\nSchool of Culture and Communication, Aarhus University, 8000 Aarhus, Denmark; \n202204724@post.au.dk (S.W.N.); 202204836@post.au.dk (J.E.L.) \n\n2 Department of Collective Behaviour, Max Planck Institute of Animal Behavior, D-78457 Konstanz, Germany \n3 VERSES Research Lab., Los Angeles, CA 90016, USA; k.friston@ucl.ac.uk \n4 Queen Square Institute of Neurology, University College London, London WC1N 3BG, UK \n5 \n\nInteracting Minds Centre, Aarhus University, 8000 Aarhus, Denmark; chmathys@cas.au.dk (C.M.); \nptw@cas.au.dk (P.T.W.) \n\n** ***Correspondence: cheins@ab.mpg.de \n† \nThese authors contributed equally to this work. \n\n**Abstract:**We introduce a new software package for the Julia programming language, \nthe library ActiveInference.jl. To make active inference agents with Partially Ob- \nservable Markov Decision Process (POMDP) generative models available to the grow- \ning research community using Julia, we re-implemented the pymdp library for Python. \nActiveInference.jl is compatible with cutting-edge Julia libraries designed for cognitive \nand behavioural modelling, as it is used in computational psychiatry, cognitive science \nand neuroscience. This means that POMDP active inference models can now be easily \nfit to empirically observed behaviour using sampling, as well as variational methods. In \nthis article, we show how ActiveInference.jl makes building POMDP active inference \nmodels straightforward, and how it enables researchers to use them for simulation, as well \nas fitting them to data or performing a model comparison. ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed7_cc4.pdf" + "text": "", + "page_start": 315, + "page_end": 315, + "source_file": "00-80T-80.pdf" }, { - "text": "In this section, we outline how to use \nparameter recovery and predictive checks. \nActiveInference for simulation and model fitting in conjunction with ActionModels. In the \nfollowing section, we show how to achieve this on a concrete worked example. \n\n**4. Usage Example**\n\nIn this section, we demonstrate a full usage example of how to create an AIF agent, sim- \nulate behaviour in a classic T-maze environment and fit the AIF agent to a simulated exam- \nple dataset. We provide the necessary code to run this simulation. All code required to repro- \nduce the example simulation can be found in an open source OSF repository osf.io/j3k5q/. \nThis example was performed with the current version of ActiveInference.jl (0.1.1); the \nnewest version can be found at github.com/ilabcode/ActiveInference.jl. \n\n4.1. Setting Up Environment and Agent \n\nA T-maze is a simple task commonly employed in the behavioural sciences, as well \nas in the AIF literature [14,54–57]. It is a minimal type of task that requires balancing \nexploration and exploitation, or epistemic and pragmatic value, respectively. It is also \nsuitably represents in a discrete state space. Together, this makes it easily compatible with \na POMDP-based AIF approach. ", - "page_start": 17, - "page_end": 17, - "source_file": "pubmed7_cc4.pdf" + "text": "", + "page_start": 31, + "page_end": 31, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "In this paper, we introduce ActiveInference.jl, a new software library for Julia [28] \nthat aims to provide easy-to-use tools for model fitting with AIF models and to introduce \nAIF to the growing community of researchers using Julia for computational psychiatry and \ncognitive modelling. Julia is a free and open-source high-level programming language that \nretains an easy user interface reminiscent of that in MATLAB and Python. Simultaneously, ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed7_cc4.pdf" + "text": "", + "page_start": 31, + "page_end": 31, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "**Citation:**Nehrer, S.W.; Ehrenreich \nLaursen, J.; Heins, C.; Friston, K.; \n\nMathys, C.; Thestrup Waade, P. \nIntroducing ActiveInference.jl: A \nJulia Library for Simulation and \n**1. Introduction**\nParameter Estimation with Active \n\nWe introduce a novel software library for Julia, ActiveInference, which lets users \nproduce the simulated behaviour of agents and their internal belief states with active \ninference (AIF) models, as well as fit such models to empirically observed behaviour. \nAIF [1–3] is a generally applicable formal framework for understanding and simulating \nintelligent behaviour that is based in neurobiology and first principles from statistical \nphysics [4–8]. AIF treats action and perception as unified under a joint imperative: to \nminimise the variational free energy (VFE), which quantifies how well the agent’s internal \ngenerative model explains incoming sensory observations. It is an upper bound on the \nthe surprise from sensory observations, making AIF formally related to prediction error \n\nInference Models. Entropy**2025**, 27, 62. \nhttps://doi.org/10.3390/e27010062 ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed7_cc4.pdf" + "text": "", + "page_start": 32, + "page_end": 32, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "[30] W. Fedus, B. Zoph, and N. Shazeer, “Switch transformers: Scaling to trillion parameter models with simple and \nefficient sparsity,” Journal of Machine Learning Research (JMLR), 2022. \n\n[31] T. Feng, Y. Shen, and J. You, “Graphrouter: A graph-based router for LLM selections,” arXiv preprint \narXiv:2410.03834, 2024. \n\n[32] I. J. Goodfellow, J. Shlens, and C. Szegedy, “Explaining and harnessing adversarial examples,” in International \nConference on Learning Representations (ICLR), 2015. \n\n[33] K. Greshake, S. Abdelnabi, S. Mishra, C. Endres, T. Holz, and M. Fritz, “Not what you’ve signed up for: Compro- \nmising real-world LLM-integrated applications with indirect prompt injection,” in ACM AISec, 2023. \n\n[34] J. Hayes, I. Shumailov, and I. Yona, “Buffer overflow in mixture of experts,” arXiv preprint arXiv:2402.05526, 2024. ", - "page_start": 20, - "page_end": 20, - "source_file": "arxiv1.pdf" + "text": "", + "page_start": 32, + "page_end": 32, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "| \u0007 | | |\n|---|---|---|\n| \u0007 | | |\n| | using Pkg | |\n| | Pkg.add(ActiveInference) | |\n| | | |\n| | using ActiveInference | |\n| | | |\n\n\nWe first set up the environment or generative process: the T-maze. The T-maze is included \nas a pre-made environment in ActiveInference, so we simply loaded it. We set the reward \nprobability for the reward condition to 95 percent: ", - "page_start": 18, - "page_end": 18, - "source_file": "pubmed7_cc4.pdf" + "text": "", + "page_start": 315, + "page_end": 315, + "source_file": "00-80T-80.pdf" }, { - "text": "For example, on Linux, you run this command: \n\nexport LD_LIBRARY_PATH=\"/opt/ibm/ondemand/V9.5/www:$LD_LIBRARY_PATH \n\nThe Content Navigator installer creates a shared native library in WebSphere Application \nServer. You can review this library in the Integrated Solution Console in the Environment, \nShared libraries section. You need a library that has the class path set to the location of the \nODApi.jar (for example, /opt/ibm/ondemand/V9.5/www/api/ODApi.jar) and the Native Library \nPath set to the ODWEK directory (for example, /opt/ibm/ondemand/V9.5/www). If you \nencounter any errors, ensure that these paths are valid. \n\n**Note:**If multiple applications reference the same native library, the library gets loaded \nmultiple times. But because the ODWEK library is a shared library, it can be loaded only \none time for each JVM. So, if you are running multiple ODWEK web applications in one \nWebSphere Application Server, you must configure the shared library reference on the \nClass Loader level of the server itself instead of on the application level. You can use the \nIntegrated Solution Console, which is in the class loader of the application server, for this \ntask. ", - "page_start": 219, - "page_end": 219, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 315, + "page_end": 315, + "source_file": "00-80T-80.pdf" } ] }, @@ -10083,64 +10083,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 22, + "page_end": 22, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "| \u0007 | | |\n|---|---|---|\n| \u0007 | | |\n| | using ActiveInference | |\n| | | |\n\n\nCentral to the package is the AIF object. This is a structure containing all the components of \nthe generative model, as well as the dynamic belief states and the various settings needed to \nperform AIF, and is used in conjunction with most of the high-level functions of the package. \nAn AIF object can be created with the init_aif function, which takes as arguments the \ncomponents of the generative model and a dictionary of various settings and parameters: ", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed7_cc4.pdf" + "text": "", + "page_start": 213, + "page_end": 213, + "source_file": "00-80T-80.pdf" }, { - "text": "Artificial intelligence was founded as an academic discipline in 1956,[6] and the field went through \nmultiple cycles of optimism throughout its history,[7][8] followed by periods of disappointment and loss of \nfunding, known as AI winters.[9][10] Funding and interest vastly increased after 2012 when deep learning \noutperformed previous AI techniques.[11] This growth accelerated further after 2017 with the transformer \narchitecture,[12] and by the early 2020s many billions of dollars were being invested in AI and the field \nexperienced rapid ongoing progress in what has become known as the AI boom. The emergence of \nadvanced generative AI in the midst of the AI boom and its ability to create and modify content exposed \nseveral unintended consequences and harms in the present and raised concerns about the risks of AI and \nits long-term effects in the future, prompting discussions about regulatory policies to ensure the safety \nand benefits of the technology. ", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 69, + "page_end": 69, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "**AI welfare and rights**\n\nIt is difficult or impossible to reliably evaluate whether an advanced AI is sentient (has the ability to feel), \nand if so, to what degree.[388] But if there is a significant chance that a given machine can feel and suffer, \nthen it may be entitled to certain rights or welfare protection measures, similarly to animals.[389][390] \nSapience (a set of capacities related to high intelligence, such as discernment or self-awareness) may \nprovide another moral basis for AI rights.[389] Robot rights are also sometimes proposed as a practical \nway to integrate autonomous agents into society.[391] \n\nIn 2017, the European Union considered granting \"electronic personhood\" to some of the most capable AI \nsystems. Similarly to the legal status of companies, it would have conferred rights but also \nresponsibilities.[392] Critics argued in 2018 that granting rights to AI systems would downplay the \nimportance of human rights, and that legislation should focus on user needs rather than speculative \nfuturistic scenarios. They also noted that robots lacked the autonomy to take part to society on their \nown.[393][394] \n\nProgress in AI increased interest in the topic. Proponents of AI welfare and rights often argue that AI \nsentience, if it emerges, would be particularly easy to deny. They warn that this may be a moral blind spot \nanalogous to slavery or factory farming, which could lead to large-scale suffering if sentient AI is created \nand carelessly exploited.[390][389] ", - "page_start": 27, - "page_end": 27, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 390, + "page_end": 390, + "source_file": "00-80T-80.pdf" }, { - "text": "Some authors have suggested in practice, that the definition of AI is vague and difficult to define, with \ncontention as to whether classical algorithms should be categorised as AI,[367] with many companies \nduring the early 2020s AI boom using the term as a marketing buzzword, often even if they did \"not \nactually use AI in a material way\".[368] ", - "page_start": 25, - "page_end": 25, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 213, + "page_end": 213, + "source_file": "00-80T-80.pdf" }, { - "text": "Franzen) sued AI companies for using their work to train generative AI.[195][196] Another discussed \napproach is to envision a separate*sui generis*system of protection for creations generated by AI to ensure \nfair attribution and compensation for human authors.[197] ", - "page_start": 14, - "page_end": 14, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 213, + "page_end": 213, + "source_file": "00-80T-80.pdf" }, { - "text": "**Artificial intelligence**\n\n**Artificial intelligence**(**AI**), in its broadest sense, is intelligence exhibited by machines, particularly \ncomputer systems. It is a field of research in computer science that develops and studies methods and \nsoftware that enable machines to perceive their environment and use learning and intelligence to take \nactions that maximize their chances of achieving defined goals.[1] Such machines may be called AIs. \n\nHigh-profile applications of AI include advanced web search engines (e.g., Google Search); \nrecommendation systems (used by YouTube, Amazon, and Netflix); virtual assistants (e.g., Google \nAssistant, Siri, and Alexa); autonomous vehicles (e.g., Waymo); generative and creative tools (e.g., \nChatGPT and AI art); and superhuman play and analysis in strategy games (e.g., chess and Go). However, \nmany AI applications are not perceived as AI: \"A lot of cutting edge AI has filtered into general \napplications, often without being called AI because once something becomes useful enough and common \nenough it's not labeled AI anymore.\"[2][3] \n\nVarious subfields of AI research are centered around particular goals and the use of particular tools. The \ntraditional goals of AI research include reasoning, knowledge representation, planning, learning, natural \nlanguage processing, perception, and support for robotics.[a] General intelligence—the ability to complete \nany task performed by a human on an at least equal level—is among the field's long-term goals.[4] To \nreach these goals, AI researchers have adapted and integrated a wide range of techniques, including \nsearch and mathematical optimization, formal logic, artificial neural networks, and methods based on \nstatistics, operations research, and economics.[b] AI also draws upon psychology, linguistics, philosophy, \nneuroscience, and other fields.[5] ", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 213, + "page_end": 213, + "source_file": "00-80T-80.pdf" }, { - "text": "Artificial intelligent (AI) agents are software entities designed to \nperceive their environment, make decisions, and take actions \nautonomously to achieve specific goals. These agents can interact \nwith users, their environment, or other agents. AI agents are used \nin various applications, including virtual assistants, chatbots, \nindustrial \nautonomous vehicles, game-playing systems, and \nrobotics. AI agents operate within the constraints of their \nprogramming, available computational resources, and hardware \nlimitations. This means they are restricted to performing tasks \nwithin their defined scope and have finite memory and processing \ncapabilities. In real-world applications, AI agents often face time \nconstraints for decision-making and action execution. Many AI \nagents incorporate learning algorithms, enabling them to improve \ntheir performance over time through experience or training. Using \nmachine learning, AI agents can adapt to new situations and \noptimise their behaviour for their designated tasks.[175][176][177] ", - "page_start": 12, - "page_end": 12, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 213, + "page_end": 213, + "source_file": "00-80T-80.pdf" }, { - "text": "**Ethics**\n\nAI has potential benefits and potential risks.[183] AI may be able to advance science and find solutions for \nserious problems: Demis Hassabis of DeepMind hopes to \"solve intelligence, and then use that to solve \neverything else\".[184] However, as the use of AI has become widespread, several unintended \nconsequences and risks have been identified.[185] In-production systems can sometimes not factor ethics \nand bias into their AI training processes, especially when the AI algorithms are inherently unexplainable \nin deep learning.[186] ", - "page_start": 13, - "page_end": 13, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 213, + "page_end": 213, + "source_file": "00-80T-80.pdf" } ] }, @@ -10157,64 +10157,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 411, + "page_end": 411, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 323, + "page_end": 323, + "source_file": "00-80T-80.pdf" }, { - "text": "**3. Using ActiveInference.jl**\n\nIn this section, we provide an overview of the various functions a user will need to \noperate ActiveInference. This includes functionalities for creating POMDP agents, for sim- \nulating behaviour and for fitting the models to data. In the next section, we demonstrate \nhow to use the package on a concrete worked example. ActiveInference is under continual \ndevelopment, and the newest version of the package, including documentation for how to \nuse it, can be found at github.com/ilabcode/ActiveInference.jl. \n\n3.1. Creating and Using a POMDP ", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed7_cc4.pdf" + "text": "", + "page_start": 152, + "page_end": 152, + "source_file": "00-80T-80.pdf" }, { - "text": "**2. Active Inference with POMDPs**\n\nIn this section, we briefly describe the core concepts of AIF and POMDPs. This \nshould familiarise the reader with the vernacular used in the later sections regarding \nthe functionalities of the package. While various extensions, such as structure learning, \nwhich enables an agent to learn the structure or shape of its environment through model \ncomparison [44–47], or hierarchical and temporally deep POMDPs [48,49], are relevant for \nfuture work, describing these in detail is beyond the scope of this foundational paper. \n\nAt the core of AIF lies the minimisation of a variational free energy upper bound on \nsurprise for perception, as well as action. This is motivated by the free energy principle [4–8], \nwhich states that self-organising systems can be described as minimising the variational \nfree energy of their sensory states. The minimisation of free energy generally takes two ", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed7_cc4.pdf" + "text": "", + "page_start": 152, + "page_end": 152, + "source_file": "00-80T-80.pdf" }, { - "text": "A library of pre-made canonical POMDP models could be created so that users can eas- \nily implement them directly. Alternatives to the fixed-point iteration method for updating \nposteriors over environmental states could be included, like the marginal message passing \nalgorithm. There are various ways in which the package can be made more computationally \nefficient, and it could be compared with other software implementations. There are plenty \nof utility and plotting functions that could be added to the package to make it easier to \nuse and to facilitate integration with the model-fitting packages it relies on; for example, \nto allow for combining the models with linear regressions to compare parameters values \nof different populations in a single model. More complex types of POMDP models can \nalso be added, like hierarchical and temporally deep POMDPs. Model structure learning \ncould be considered, where different model structures are compared and chosen between \nby evaluating their free energies. Sophisticated inference, where predictions are also made \nabout changes in one’s own beliefs—depending on expected action-dependent observations \nin the future—could also be implemented [58]. Finally, the package could be extended to \nother types of generative models than POMDPs, including other universal models, like \ngeneralised filtering [17] and Hierarchical Gaussian Filter models [41], as well as custom ", - "page_start": 29, - "page_end": 29, - "source_file": "pubmed7_cc4.pdf" + "text": "", + "page_start": 152, + "page_end": 152, + "source_file": "00-80T-80.pdf" }, { - "text": "2.1. POMDPs in Active Inference \n\nIn AIF, the POMDP is one of the most common families of generative models used \nto make inferences about the environment. It is a Markovian discrete state-space model, \nwhere employing it means representing the environment and observations as inhabiting \none among a set of possible (possibly multidimensional) states, and that the changes \nin these states can only depend on the system’s previous state and the agent’s actions. \nEnvironmental states are not directly observable, so they have to be inferred based on \nincoming sensory observations. In AIF for POMDPs and other generative models in general, \nboth perception and action are cast as Bayesian inferences (see Sections 2.2 and 2.3), as well \nas the learning of parameters of the generative model (see Section 2.4). Crucially, an agent’s \ngenerative model does not a priori have to be isomorphic to the true environment (i.e., \nthe data-generating process), although this will generally lead to a successful inference, \nand that the generative model will therefore often come to resemble the environment \nthrough learning. \n\nA discrete state-space POMDP in AIF is conventionally defined by five main sets of \nparameters:**A**,**B**,**C**,**D**and**E**[1,33], see Figure 1. Together, these parametrise the agent’s \nprior beliefs about the prior probability of different states in the environment, how states \nof the environment change and how they generate observations. Typically, they will be \nvectors, matrices or tensors; however, henceforth we denote them by their corresponding \nletter in bold. These make up the components needed for the agent to perform AIF. ", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed7_cc4.pdf" + "text": "", + "page_start": 152, + "page_end": 152, + "source_file": "00-80T-80.pdf" }, { - "text": "1 \n\nSchool of Culture and Communication, Aarhus University, 8000 Aarhus, Denmark; \n202204724@post.au.dk (S.W.N.); 202204836@post.au.dk (J.E.L.) \n\n2 Department of Collective Behaviour, Max Planck Institute of Animal Behavior, D-78457 Konstanz, Germany \n3 VERSES Research Lab., Los Angeles, CA 90016, USA; k.friston@ucl.ac.uk \n4 Queen Square Institute of Neurology, University College London, London WC1N 3BG, UK \n5 \n\nInteracting Minds Centre, Aarhus University, 8000 Aarhus, Denmark; chmathys@cas.au.dk (C.M.); \nptw@cas.au.dk (P.T.W.) \n\n** ***Correspondence: cheins@ab.mpg.de \n† \nThese authors contributed equally to this work. \n\n**Abstract:**We introduce a new software package for the Julia programming language, \nthe library ActiveInference.jl. To make active inference agents with Partially Ob- \nservable Markov Decision Process (POMDP) generative models available to the grow- \ning research community using Julia, we re-implemented the pymdp library for Python. \nActiveInference.jl is compatible with cutting-edge Julia libraries designed for cognitive \nand behavioural modelling, as it is used in computational psychiatry, cognitive science \nand neuroscience. This means that POMDP active inference models can now be easily \nfit to empirically observed behaviour using sampling, as well as variational methods. In \nthis article, we show how ActiveInference.jl makes building POMDP active inference \nmodels straightforward, and how it enables researchers to use them for simulation, as well \nas fitting them to data or performing a model comparison. ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed7_cc4.pdf" + "text": "", + "page_start": 17, + "page_end": 17, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "**Conflicts of Interest:**The authors declare no conflicts of interest. The funders had no role in the design \nof this study; in the collection, analyses or interpretation of data; in the writing of this manuscript; or \nin the decision to publish the results. \n\n**Abbreviations**\n\nThe following abbreviations are used in this manuscript: \n\nAIF \nFEP \nVFE \nEFE \nMCMC Markov Chain Monte Carlo \nPOMDP \n\nActive inference \nFree energy principle \nVariational free energy \nExpected free energy \n\nPartially Observed Markov Decision Process ", - "page_start": 30, - "page_end": 30, - "source_file": "pubmed7_cc4.pdf" + "text": "", + "page_start": 17, + "page_end": 17, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "In the next section, we provide a conceptual and formal introduction to AIF, particu- \nlarly in the context of using POMDP generative models. In Section 3, we demonstrate how \nto use the package in practice, both for simulation and parameter estimation. In Section 4, \nwe give a fully worked example of how ActiveInference can be used with a concrete \nsimulated dataset. Finally, we discuss potential applications and future directions for \ndeveloping the package. ", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed7_cc4.pdf" + "text": "", + "page_start": 152, + "page_end": 152, + "source_file": "00-80T-80.pdf" }, { - "text": "| \u0007 | | |\n|---|---|---|\n| \u0007 | | |\n| | observation = [1] # observation with one modality | |\n| | # Run the action model for a single observation | |\n| | action_distributions = action_pomdp!(aif::AIF, observation) | |\n| | | |\n", - "page_start": 14, - "page_end": 14, - "source_file": "pubmed7_cc4.pdf" + "text": "", + "page_start": 152, + "page_end": 152, + "source_file": "00-80T-80.pdf" } ] }, @@ -10225,70 +10225,70 @@ "target_page": 2, "target_passage": "Dyspnea refers to a subjective sensation of breathing discomfort.", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 201, + "page_end": 201, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 285, + "page_end": 285, + "source_file": "00-80T-80.pdf" }, { - "text": "Dyspnea is a prevalent symptom with consequences that \nextend beyond its physiologic implications. A study in \nEuropean patients with COPD explored the burden of \ndyspnea and identified potential correlates. The study \nrevealed that higher dyspnea impact correlated with \nlower health-related quality of life, increased work \nimpairment, and a higher frequency of emergency \ndepartment visits.7 \n\nDyspnea refers to a subjective sensation of breathing \ndiscomfort.1 In a study involving a community-based \npopulation aged > 70 years, the prevalence of dyspnea \nwas found to be 32%.2 Dyspnea can lead to limitations in \ndaily activities, reduced exercise tolerance, and \nheightened mortality risks.3 \n\nThe three objectives of our study were as follows: (1) to \nevaluate the impact of dyspnea in adults from the \ngeneral population who had no prior diagnosis of \nrespiratory disease but who reported having significant \nrespiratory symptoms in the past 6 months; (2) to \nidentify associated risk factors for dyspnea and estimate \ntheir influence on the symptom; and (3) to explore the \nrelationship between dyspnea and health care utilization, \nquality of life, and work productivity in adults with \nundiagnosed respiratory symptoms. ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed6_cc4.pdf" + "text": "", + "page_start": 285, + "page_end": 285, + "source_file": "00-80T-80.pdf" }, { - "text": "There were significant but modest differences in mean \ndyspnea levels across the 17 study sites (data not \nshown), which are not explained by the risk factors we \naccounted for in our study. This finding is not surprising \nbecause some of the potential contributing factors \npreviously mentioned and other site-specific factors \nThe affective dimension of dyspnea can be captured \nusing additional questionnaires (eg, Multidimensional \nDyspnea Profile, Dyspnea-12). Studies have explored the \nuse of the Multidimensional Dyspnea Profile in ", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed6_cc4.pdf" + "text": "", + "page_start": 285, + "page_end": 285, + "source_file": "00-80T-80.pdf" }, { - "text": "outpatients with cardiorespiratory disease25 and the \nDyspnea-12 in patients with asthma26 and found that \nthe affective aspect of dyspnea can significantly influence \nthe impact of dyspnea on health status, irrespective of \nthe intensity of breathlessness. \n\nand validated respiratory health questionnaires, and \nour dyspnea assessment measure is a weighted average \nof responses to these validated questions. \nConsequently, the measure has an immediate \ninterpretation in terms of the lived day-to-day \nexperience of individuals. \n\nIn those with PRISm, there was a strong, positive \nassociation between higher values for the FEV1/FVC \nratio and dyspnea. For the PRISm group, a higher \nFEV1/FVC ratio may reflect diminished lung \ncompliance due to interstitial lung disease and/or \nrespiratory system restriction due to obesity, which \ncould contribute to worse dyspnea. Conversely, the \nassociation of dyspnea with the FEV1/FVC ratio was in \nthe opposite direction for those with asthma or COPD, \nand a lower FEV1/FVC ratio correlated with worse \ndyspnea, as expected. ", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed6_cc4.pdf" + "text": "", + "page_start": 285, + "page_end": 285, + "source_file": "00-80T-80.pdf" }, { - "text": "(eg, climate, air quality/industrialization, socioeconomic \nstatus) of the catchment population tend to vary across \nstudy sites. \n\nApproximately 65% of the variability in dyspnea \nremained unexplained by the factors examined in our \nstudy. Most individuals in our study showed normal \nspirometry results but still carried a substantial \nburden of dyspnea, an inconsistency that needs \nexplanation. Several factors not included in our \nanalysis may have contributed to the unexplained \nvariation. Environmental factors (eg, air pollution, \nallergen exposure, seasonal variations in symptoms) \nare potential contributors to this unexplained \nvariability.22 Genetic predispositions could also play a \nsignificant role, as suggested by a study that revealed \nthat parents with dyspnea were 1.8 times more likely \nto have offspring with dyspnea.23 Additionally, fitness \ncould be a contributing factor, especially in \nindividuals with undiagnosed PRISm, asthma, or \nCOPD who may restrict their activities to avoid \ndyspnea, and hence become deconditioned.6 \n\nDyspnea is a complex, subjective symptom that is \nmodified by nonrespiratory factors including \npsychosocial, social, and environmental influences.5 \nInterindividual variability in the perception of dyspnea, \ninfluenced by these nonrespiratory factors, may play an \nimportant role. A study conducted by Ziegler et al24 \nassessed the perception of dyspnea in 42 healthy \nindividuals using a standardized inspiratory resistive \nloading stimulus. The study used the modified Borg \nscale to measure dyspnea perception levels. Among the \nparticipants subjected to the same inspiratory resistive \nload, 31%, 45%, and 24% of participants classified their \nlevel of dyspnea as low, intermediate, and high, \nrespectively. The study revealed that differences between \nindividuals contribute considerable variability to the \nperception of dyspnea, even among healthy participants. ", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed6_cc4.pdf" + "text": "", + "page_start": 285, + "page_end": 285, + "source_file": "00-80T-80.pdf" }, { - "text": "Take-home Points \n\nStudy Question: How profoundly are adults with \nundiagnosed respiratory symptoms \naffected by \ndyspnea? \nResults: In community-based adults with undiag- \nnosed respiratory symptoms, those identified with \npreserved ratio impaired spirometry experienced the \ngreatest impact of dyspnea, followed by those with \nundiagnosed asthma or COPD. Greater dyspnea \nimpact was associated with increased health care \nutilization, lower quality of life, and reduced work \nproductivity. \nInterpretation: Dyspnea imposes burdens on the \nhealth care system and is associated with impaired \nquality of life and work productivity. ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed6_cc4.pdf" + "text": "", + "page_start": 21, + "page_end": 21, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "prevalence of dyspnea in the adult general population \nacross 11 studies was estimated to be 10%. Dyspnea can \narise from a broad spectrum of underlying factors, \nincluding both respiratory and nonrespiratory \nconditions. Studies have revealed that dyspnea is not \nsolely attributable to respiratory conditions but is also \nheavily influenced by cardiovascular deconditioning and \nby nonrespiratory factors, including psychosocial, social, \nand environmental determinants.5,6 ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed6_cc4.pdf" + "text": "", + "page_start": 21, + "page_end": 21, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "Although neither the CAT nor the SGRQ are dyspnea- \nspecific tools, both are recommended by the Global Initia- \ntive for Chronic Obstructive Lung Disease to evaluate \nsymptoms, including dyspnea,20 and both yield a richer \nassessment of dyspnea than the modified Medical \nResearch Council breathlessness scale.20 Fifteen questions \nwere taken from the CAT and SGRQ questionnaires that \nreferred to individuals’ experiences with dyspnea, and a \ncomposite measure of dyspnea impact using a weighted \nsum of the responses to the 15 questions was constructed. \nQuestions were coded so that larger values indicate more \nimpactful dyspnea. Weights used for question responses \nin calculating the dyspnea impact assessment measure \nwere those of the first component of a principal compo- \nnent analysis (PCA) based on the covariance matrix of \nquestion responses. Questions with multiple responses \nand ordinal structure are individually more informative \nand thus were accorded higher weight than individual \ntrue-false questions. No additional PCA component was \nanticipated a priori to be material for our investigation, \nand an eigenvalue analysis of the PCA was conducted to \nverify this assumption. ", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed6_cc4.pdf" + "text": "", + "page_start": 286, + "page_end": 286, + "source_file": "00-80T-80.pdf" }, { - "text": "Table 2 shows mean responses to the 15 dyspnea \nquestions for each disease classification and presents \nquestion weights (PCA scoring coefficients) used for \ncalculating the dyspnea impact assessment. \n\nIndividuals with PRISm reported the highest dyspnea \nimpact, with a significantly greater mean score (63.0; \n95% CI, 59.5-66.4) than those with undiagnosed \nasthma or COPD (Table 3). Those with undiagnosed \nasthma or COPD had similar mean scores (56.6; \n95% CI, 53.9-59.3 and 57.5; 95% CI, 55.1-59.9, \nrespectively), followed by those with normal \nspirometry (51.8; 95% CI, 50.7-52.8). All four groups \nreported significantly more impactful dyspnea than \nthe control group (mean score, 13.8; 95% CI, 11.8- \n15.7). Table 3 shows between-group differences in \nmean dyspnea impact assessments for each pair of \ndisease outcomes. Figure 2 compares box plots of the \ndyspnea impact assessment values across disease \nclassifications. ", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed6_cc4.pdf" + "text": "", + "page_start": 286, + "page_end": 286, + "source_file": "00-80T-80.pdf" } ] }, @@ -10305,64 +10305,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 300, + "page_end": 300, + "source_file": "00-80T-80.pdf" }, { - "text": "Dyspnea is a prevalent symptom with consequences that \nextend beyond its physiologic implications. A study in \nEuropean patients with COPD explored the burden of \ndyspnea and identified potential correlates. The study \nrevealed that higher dyspnea impact correlated with \nlower health-related quality of life, increased work \nimpairment, and a higher frequency of emergency \ndepartment visits.7 \n\nDyspnea refers to a subjective sensation of breathing \ndiscomfort.1 In a study involving a community-based \npopulation aged > 70 years, the prevalence of dyspnea \nwas found to be 32%.2 Dyspnea can lead to limitations in \ndaily activities, reduced exercise tolerance, and \nheightened mortality risks.3 \n\nThe three objectives of our study were as follows: (1) to \nevaluate the impact of dyspnea in adults from the \ngeneral population who had no prior diagnosis of \nrespiratory disease but who reported having significant \nrespiratory symptoms in the past 6 months; (2) to \nidentify associated risk factors for dyspnea and estimate \ntheir influence on the symptom; and (3) to explore the \nrelationship between dyspnea and health care utilization, \nquality of life, and work productivity in adults with \nundiagnosed respiratory symptoms. ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed6_cc4.pdf" + "text": "", + "page_start": 147, + "page_end": 147, + "source_file": "00-80T-80.pdf" }, { - "text": "(eg, climate, air quality/industrialization, socioeconomic \nstatus) of the catchment population tend to vary across \nstudy sites. \n\nApproximately 65% of the variability in dyspnea \nremained unexplained by the factors examined in our \nstudy. Most individuals in our study showed normal \nspirometry results but still carried a substantial \nburden of dyspnea, an inconsistency that needs \nexplanation. Several factors not included in our \nanalysis may have contributed to the unexplained \nvariation. Environmental factors (eg, air pollution, \nallergen exposure, seasonal variations in symptoms) \nare potential contributors to this unexplained \nvariability.22 Genetic predispositions could also play a \nsignificant role, as suggested by a study that revealed \nthat parents with dyspnea were 1.8 times more likely \nto have offspring with dyspnea.23 Additionally, fitness \ncould be a contributing factor, especially in \nindividuals with undiagnosed PRISm, asthma, or \nCOPD who may restrict their activities to avoid \ndyspnea, and hence become deconditioned.6 \n\nDyspnea is a complex, subjective symptom that is \nmodified by nonrespiratory factors including \npsychosocial, social, and environmental influences.5 \nInterindividual variability in the perception of dyspnea, \ninfluenced by these nonrespiratory factors, may play an \nimportant role. A study conducted by Ziegler et al24 \nassessed the perception of dyspnea in 42 healthy \nindividuals using a standardized inspiratory resistive \nloading stimulus. The study used the modified Borg \nscale to measure dyspnea perception levels. Among the \nparticipants subjected to the same inspiratory resistive \nload, 31%, 45%, and 24% of participants classified their \nlevel of dyspnea as low, intermediate, and high, \nrespectively. The study revealed that differences between \nindividuals contribute considerable variability to the \nperception of dyspnea, even among healthy participants. ", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed6_cc4.pdf" + "text": "", + "page_start": 95, + "page_end": 95, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "There were significant but modest differences in mean \ndyspnea levels across the 17 study sites (data not \nshown), which are not explained by the risk factors we \naccounted for in our study. This finding is not surprising \nbecause some of the potential contributing factors \npreviously mentioned and other site-specific factors \nThe affective dimension of dyspnea can be captured \nusing additional questionnaires (eg, Multidimensional \nDyspnea Profile, Dyspnea-12). Studies have explored the \nuse of the Multidimensional Dyspnea Profile in ", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed6_cc4.pdf" + "text": "", + "page_start": 147, + "page_end": 147, + "source_file": "00-80T-80.pdf" }, { - "text": "Although neither the CAT nor the SGRQ are dyspnea- \nspecific tools, both are recommended by the Global Initia- \ntive for Chronic Obstructive Lung Disease to evaluate \nsymptoms, including dyspnea,20 and both yield a richer \nassessment of dyspnea than the modified Medical \nResearch Council breathlessness scale.20 Fifteen questions \nwere taken from the CAT and SGRQ questionnaires that \nreferred to individuals’ experiences with dyspnea, and a \ncomposite measure of dyspnea impact using a weighted \nsum of the responses to the 15 questions was constructed. \nQuestions were coded so that larger values indicate more \nimpactful dyspnea. Weights used for question responses \nin calculating the dyspnea impact assessment measure \nwere those of the first component of a principal compo- \nnent analysis (PCA) based on the covariance matrix of \nquestion responses. Questions with multiple responses \nand ordinal structure are individually more informative \nand thus were accorded higher weight than individual \ntrue-false questions. No additional PCA component was \nanticipated a priori to be material for our investigation, \nand an eigenvalue analysis of the PCA was conducted to \nverify this assumption. ", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed6_cc4.pdf" + "text": "", + "page_start": 315, + "page_end": 315, + "source_file": "sg246915.pdf" }, { - "text": "outpatients with cardiorespiratory disease25 and the \nDyspnea-12 in patients with asthma26 and found that \nthe affective aspect of dyspnea can significantly influence \nthe impact of dyspnea on health status, irrespective of \nthe intensity of breathlessness. \n\nand validated respiratory health questionnaires, and \nour dyspnea assessment measure is a weighted average \nof responses to these validated questions. \nConsequently, the measure has an immediate \ninterpretation in terms of the lived day-to-day \nexperience of individuals. \n\nIn those with PRISm, there was a strong, positive \nassociation between higher values for the FEV1/FVC \nratio and dyspnea. For the PRISm group, a higher \nFEV1/FVC ratio may reflect diminished lung \ncompliance due to interstitial lung disease and/or \nrespiratory system restriction due to obesity, which \ncould contribute to worse dyspnea. Conversely, the \nassociation of dyspnea with the FEV1/FVC ratio was in \nthe opposite direction for those with asthma or COPD, \nand a lower FEV1/FVC ratio correlated with worse \ndyspnea, as expected. ", - "page_start": 11, - "page_end": 11, - "source_file": "pubmed6_cc4.pdf" + "text": "", + "page_start": 315, + "page_end": 315, + "source_file": "sg246915.pdf" }, { - "text": "Table 2 shows mean responses to the 15 dyspnea \nquestions for each disease classification and presents \nquestion weights (PCA scoring coefficients) used for \ncalculating the dyspnea impact assessment. \n\nIndividuals with PRISm reported the highest dyspnea \nimpact, with a significantly greater mean score (63.0; \n95% CI, 59.5-66.4) than those with undiagnosed \nasthma or COPD (Table 3). Those with undiagnosed \nasthma or COPD had similar mean scores (56.6; \n95% CI, 53.9-59.3 and 57.5; 95% CI, 55.1-59.9, \nrespectively), followed by those with normal \nspirometry (51.8; 95% CI, 50.7-52.8). All four groups \nreported significantly more impactful dyspnea than \nthe control group (mean score, 13.8; 95% CI, 11.8- \n15.7). Table 3 shows between-group differences in \nmean dyspnea impact assessments for each pair of \ndisease outcomes. Figure 2 compares box plots of the \ndyspnea impact assessment values across disease \nclassifications. ", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed6_cc4.pdf" + "text": "", + "page_start": 95, + "page_end": 95, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "Take-home Points \n\nStudy Question: How profoundly are adults with \nundiagnosed respiratory symptoms \naffected by \ndyspnea? \nResults: In community-based adults with undiag- \nnosed respiratory symptoms, those identified with \npreserved ratio impaired spirometry experienced the \ngreatest impact of dyspnea, followed by those with \nundiagnosed asthma or COPD. Greater dyspnea \nimpact was associated with increased health care \nutilization, lower quality of life, and reduced work \nproductivity. \nInterpretation: Dyspnea imposes burdens on the \nhealth care system and is associated with impaired \nquality of life and work productivity. ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed6_cc4.pdf" + "text": "", + "page_start": 5, + "page_end": 5, + "source_file": "Microscope Manual.pdf" }, { - "text": "Dyspnea was severe and prevalent within our study \ngroup; however, it remained undiagnosed. A study \nconducted by Stefan et al32 revealed that physicians \nunderestimated their patients’ dyspnea 37.9% of the \ntime, whereas nurses underestimated it 3.5% of the time. \nMoreover, many patients limit their physical activities, \nwhich lead them to downplay the extent of their \ndyspnea.19 Patient underreporting of symptoms, coupled \n\nFunding/Support \nThis study is supported by the Canadian Institutes of \nHealth Research [FDN Grant 154322]. \n\nFinancial/Nonfinancial Disclosures \nNone declared. ", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed6_cc4.pdf" + "text": "", + "page_start": 314, + "page_end": 314, + "source_file": "sg246915.pdf" + }, + { + "text": "", + "page_start": 374, + "page_end": 374, + "source_file": "00-80T-80.pdf" } ] }, @@ -10379,64 +10379,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "ASX_SEA_2014.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 299, + "page_end": 299, + "source_file": "00-80T-80.pdf" }, { - "text": "| Source of revenue\nMonthly subscriber fees for wireless, cable, telephony and Internet\nservices, rental of equipment, network services and media subscriptions\nRevenue from airtime, data services, roaming, long-distance and optional\nservices, pay-per-use services and other sales of products\nRevenue from the sale of wireless and cable equipment\nEquipment subsidies related to providing equipment to new and existing\nsubscribers\nInstallation fees charged to subscribers in Cable\nActivation fees charged to subscribers in Wireless\nAdvertising revenue\nMonthly subscription revenues received by television stations for\nsubscriptions from cable and satellite providers\nToronto Blue Jays’ revenue from home game admission and concessions\nToronto Blue Jays’ revenue from the Major League Baseball Revenue\nSharing Agreement which redistributes funds between member clubs\nbased on each club’s relative revenues\nRevenue from Toronto Blue Jays, radio and television broadcast\nagreements\nAwards granted to customers through customer loyalty programs, which\nare considered a separately identifiable component of the sales\ntransactions\nInterest income on credit card receivables | How we recognize it\n• Record revenue as the service is provided\n• Record revenue as the services or products are delivered\n• Record revenue when the equipment is delivered and accepted by\nthe independent dealer or subscriber in direct sales\n• Record a reduction of equipment revenues when the equipment is\nactivated\n• These fees do not meet the criteria as a separate unit of accounting\n• We defer and amortize these fees over the related service period,\nwhich is approximately three years\n• In Business Solutions we defer and amortize fees over the length of\nthe customer contract\n• These fees do not meet the criteria as a separate unit of accounting\n• We record these fees as part of equipment revenue\n• Record revenue in the period the advertising airs on our radio or\ntelevision stations, is featured in our publications or displayed on our\ndigital properties\n• Record revenue in the month the services are delivered to cable and\nsatellite providers’ subscribers\n• Recognize revenue as the related games are played during the\nbaseball season and goods are sold\n• Recognize revenue when it can be determined\n• Record revenue at the time the related games are aired\n• Estimate the portion of the original sale to allocate to the award\ncredit based on the fair value of the future goods and services that\ncan be obtained when the credit is redeemed\n• Defer the allocated amount until the awards are redeemed by the\ncustomer and we provide the goods or services\n• Recognize revenue based on the redemption of award credits relative\nto the award credits that we expect to be redeemed\n• Record revenue as earned using the effective interest rate method |\n|---|---|\n| Source of revenue Monthly subscriber fees for wireless, cable, telephony and Internet services, rental of equipment, network services and media subscriptions Revenue from airtime, data services, roaming, long-distance and optional services, pay-per-use services and other sales of products Revenue from the sale of wireless and cable equipment Equipment subsidies related to providing equipment to new and existing subscribers Installation fees charged to subscribers in Cable Activation fees charged to subscribers in Wireless Advertising revenue Monthly subscription revenues received by television stations for subscriptions from cable and satellite providers Toronto Blue Jays’ revenue from home game admission and concessions Toronto Blue Jays’ revenue from the Major League Baseball Revenue Sharing Agreement which redistributes funds between member clubs based on each club’s relative revenues Revenue from Toronto Blue Jays, radio and television broadcast agreements Awards granted to customers through customer loyalty programs, which are considered a separately identifiable component of the sales transactions Interest income on credit card receivables | How we recognize it • Record revenue as the service is provided • Record revenue as the services or products are delivered • Record revenue when the equipment is delivered and accepted by the independent dealer or subscriber in direct sales • Record a reduction of equipment revenues when the equipment is activated • These fees do not meet the criteria as a separate unit of accounting • We defer and amortize these fees over the related service period, which is approximately three years • In Business Solutions we defer and amortize fees over the length of the customer contract • These fees do not meet the criteria as a separate unit of accounting • We record these fees as part of equipment revenue • Record revenue in the period the advertising airs on our radio or television stations, is featured in our publications or displayed on our digital properties • Record revenue in the month the services are delivered to cable and satellite providers’ subscribers • Recognize revenue as the related games are played during the baseball season and goods are sold • Recognize revenue when it can be determined • Record revenue at the time the related games are aired • Estimate the portion of the original sale to allocate to the award credit based on the fair value of the future goods and services that can be obtained when the credit is redeemed • Defer the allocated amount until the awards are redeemed by the customer and we provide the goods or services • Recognize revenue based on the redemption of award credits relative to the award credits that we expect to be redeemed • Record revenue as earned using the effective interest rate method |\n", - "page_start": 99, - "page_end": 99, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 1, + "page_end": 1, + "source_file": "Microscope Manual.pdf" }, { - "text": "**Key Achievements**\n\n**Higher Operating Revenue and Adjusted Operating Profit**\n(cid:129) Consolidated operating revenue was 2% higher this year compared \nto 2012, led by an increase in data revenue at Wireless, higher \nInternet \nrevenue at Cable, higher Next Generation revenue at \nBusiness Solutions and higher subscriber revenue at Media. Revenue \ngrew by 3% in Cable, 7% in Business Solutions and 5% in Media, \nwhile revenue at Wireless remained unchanged as the increase in \ndata revenue was offset by the decrease in voice revenue. (cid:129) In May 2013, each of Fitch Ratings and Standard and Poor’s Ratings \nServices upgraded RCI’s senior unsecured debt to BBB+ (from BBB) with \na stable outlook, while Moody’s Investors Service’s comparable rating is \nBaa1 with a stable outlook remained unchanged from last year. \n\n(cid:129) Consolidated adjusted operating profit rose 3% this year to $4,993 \nmillion, with consolidated adjusted operating profit margins of 39.3%, \nresulting from higher revenue, the realization of cost efficiencies and \nshifts in the mix of revenue from products and services sold. \n(cid:129) Postpaid Wireless subscriber growth continued with net additions of ", - "page_start": 32, - "page_end": 32, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 300, + "page_end": 300, + "source_file": "00-80T-80.pdf" }, { - "text": "Contributed service revenue and expenses recorded in the consolidated statements of activities consist \nof contributed legal services, engineering services, subscription services, and internet hosting services \nand bandwidth. The amounts of specialized contributed legal services as revenue and expenses are \n$82,638 and $493,315 for the years ended June 30, 2024 and 2023, respectively. The value of \nspecialized engineering services as revenue and expenses are $0 and $498,800 for the years ended \nJune 30, 2024 and 2023, respectively. The value of donated subscription services as revenue and \nexpenses was $124,738 and $0 for the years ended June 30, 2024 and 2023, respectively. The \namounts of contributed internet hosting services and bandwidth for the years ended June 30, 2024 and \n2023 is $56,100 and $48,338, respectively. Included in the 2024 and 2023 amounts are donated \nhosting services and bandwidth from the following companies: (1) FiberRing, (2) Tele2, (3) Datahop, \n(4) LibertyGlobal, (5) Init7, and (6) Arelion. \n\n***(m) Revenue Recognition – Contracts With Customers***\n\nThe Foundation recognizes revenue from contracts with customers related to Wikimedia, LLC under \nAccounting Standards Codification Topic 606, Revenue from Contracts with Customers, which \nestablishes a principle that revenue is recognized upon transfer of control of promised products and \nservices to customers in an amount that reflects the consideration the Foundation expects to receive in \nexchange for those products or services. ", - "page_start": 11, - "page_end": 11, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + "text": "", + "page_start": 300, + "page_end": 300, + "source_file": "00-80T-80.pdf" }, { - "text": "**Note 11. Major Customers**\n\nThe Company has one major customer and relationship that is a significant source of revenue. In 2003, as during the \npast number of years, the Company's relationship with Sprint continued to increase, due to growth in the PCS business \nsegment. Approximately 61.2% of total revenues in 2003 were generated by or through Sprint and its customers using \nthe Company's portion of Sprint’s nationwide PCS network. This was compared to 57.6% in 2002, and 47.1% of total \nrevenue in 2001. No other customer relationship on a stand-alone basis generates more than 2.5% of the Company’s \ntotal revenue for 2003, 2002 and 2001. ", - "page_start": 35, - "page_end": 35, - "source_file": "NASDAQ_SHEN_2003.pdf" + "text": "", + "page_start": 1, + "page_end": 1, + "source_file": "Microscope Manual.pdf" }, { - "text": "Facility lease revenue contributed $5.5 million to wireline revenues, a decrease of $0.2 million or 3.5%. The decrease \nwas primarily the result of the prolonged decline of lease rates associated with competitive pricing pressures and the \neconomic downturn in the telecommunications industry. During 2002 the Company completed a second, diverse fiber \nroute to its existing interconnection point in the Dulles airport area of Northern Virginia. This fiber route provides \nincreased reliability for customers in the event of fiber cuts or breaks, and extends the availability of the Company’s \nfiber network to additional market locations but to date has not added additional revenue to the Company’s operation. \n\nBilling and collection services and other revenues contributed $0.4 million to wireline revenues, which was the same as \n2002 results. Revenues from this service had declined in recent years, with interexchange carriers now issuing a \ngreater proportion of their bills directly to their customers. \n\nWireline revenues from cable television services were $4.4 million, an increase of $0.1 million or 1.7%. The number \nof subscribers and service plan prices remained relatively constant during 2003. \n\nOther revenues, primarily consisting of Internet and 511Virginia service revenues were $5.8 million in 2003, an \nincrease of $0.7 million or 13.5%. The Company had 17,420 dial-up Internet subscribers at December 31, 2003, \ncompared to 18,050 at the end of the previous year. During 2003, the Company’s DSL high-speed Internet access \nsubscriber count increased to 1,298 from 646. Total Internet service revenue was $4.5 million, an increase of $0.3 \nmillion or 10.7%. The 511Virginia contract with the Virginia Department of Transportation contributed $1.3 million to \nother revenues, an increase of $0.4 million or 41.3%. Telecommunications equipment sales, services and lease \nrevenues were $1.1 million, which reflects a $0.1 million decrease from 2002 results. ", - "page_start": 49, - "page_end": 49, - "source_file": "NASDAQ_SHEN_2003.pdf" + "text": "", + "page_start": 300, + "page_end": 300, + "source_file": "00-80T-80.pdf" }, { - "text": "Business Solutions continues to focus mainly on next generation IP- \nbased services, and on leveraging higher margin on-net and near-net \nservice revenue opportunities, using existing network facilities to \nexpand offerings to the medium and large sized enterprise, public \nsector and carrier markets. Next generation services now represent 59% \nof total service revenue. \nExcluding the impact of \nacquisitions: \n(cid:129) operating revenue would have been 3% lower this year compared to \n\nthe Blackiron and Pivot Data Centres \n\nRevenue from the lower margin off-net legacy business generally \nincludes local and long-distance voice services and legacy data services \nwhich often use facilities that are leased rather than owned. \n\nlast year, instead of 7% higher as reported \n(cid:129) adjusted operating profit would have been 11% higher this year \ncompared to last year, instead of 19% higher as reported \n\nrecent data centre business acquisitions, Business \nFollowing our \nSolutions is now also focused on data centre colocation, hosting, cloud \nand disaster recovery services. \nWe continue to work on data centre business integration and the \noptimization of Business Solutions’ overall cost structures. \n\n**BUSINESS SOLUTIONS ADJUSTED OPERATING PROFIT**\n(IN MILLIONS OF DOLLARS) ", - "page_start": 50, - "page_end": 50, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 300, + "page_end": 300, + "source_file": "00-80T-80.pdf" }, { - "text": "$1,544.2 \n\nRevenue of the Company by revenue source for the years ended December 31, 2004, 2003 and 2002 is as \nfollows: \n\n**Years Ended December 31,**\n**2003** **2002**", - "page_start": 90, - "page_end": 90, - "source_file": "NYSE_RSG_2004.pdf" + "text": "", + "page_start": 300, + "page_end": 300, + "source_file": "00-80T-80.pdf" }, { - "text": "**Operating Revenue**\nOur operating revenue depends on the size of our subscriber base, the \naverage revenue per user and revenue from equipment sales. \n\n*Higher Network Revenue*\nNetwork revenue includes revenue derived from voice and data services \nfrom postpaid monthly fees, airtime, data usage, long distance charges, \noptional service charges, inbound and outbound roaming charges and \ncertain fees, as well as prepaid usage for airtime, data and other \nancillary charges such as long distance. ", - "page_start": 43, - "page_end": 43, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 13, + "page_end": 13, + "source_file": "ASX_SEA_2014.pdf" } ] }, @@ -10453,64 +10453,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 182, + "page_end": 182, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 56, + "page_end": 56, + "source_file": "00-80T-80.pdf" }, { - "text": "**JOHN CHARLES ELLICE-FLINT**\nBSc (Hons) \nAge 54. Managing Director since \n19 December 2000, member of \nthe Environmental and Safety \nCommittee of the Board, Director \nof Santos Finance Ltd and also \nChairman of other Santos Ltd \nsubsidiary companies. Thirty \nyears’ experience in the \ninternational oil and gas industry \nincluding twenty six years with \nUnocal, including as Senior Vice \nPresident: Global Exploration and \nTechnology and Vice President: \nCorporate Planning and Economics. \nMember and Chair of the South \nAustralian Museum Board. \n\n**GRAEME WILLIAM MCGREGOR**\nAO, BEc, FCPA, FAIM, FAICD \nAge 66. Director since **CHRISTOPHER JOHN RECNY**\nBSc, MSc, MBA \nAge 51. Independent non- \n\n**Santos Board of Directors during November 2004 Board meeting held at Moomba, Cooper Basin.**\n**Left to right: Graeme McGregor, John Ellice-Flint, Peter Barnett, Stephen Gerlach, Michael Harding, Judith**\n**Sloan, Michael O’Leary and Frank Conroy (who retired in December 2004). Kenneth Dean and Christopher**\n**Recny subsequently joined the Board in February 2005.**\n\n**PETER CHARLES BARNETT**\nFCPA \nAge 64. Director since \n31 October 1995 and member \nof the Environmental and Safety \nCommittee, Nomination \nCommittee, Finance Committee \nand Remuneration Committee \nof the Board. Director of AMCIL \nLtd and Opis Capital Ltd. Former \nManaging Director and Chief \nExecutive Officer of Pasminco \nLtd (1988–1995) and Chief \nExecutive Officer of EZ Industries \nLtd. Former director of Mayne \nGroup Ltd. ", - "page_start": 43, - "page_end": 43, - "source_file": "ASX_STO_2004.pdf" + "text": "", + "page_start": 114, + "page_end": 114, + "source_file": "00-80T-80.pdf" }, { - "text": "Under the Board Guidelines, \nit is the responsibility of the \nNomination Committee to devise \nthe criteria for, and review \nmembership of, and nominations \nto, the Board. The primary \ncriteria adopted in selection of \nsuitable Board candidates is their \ncapacity to contribute to the \nongoing development of the \nCompany having regard to the \nlocation and nature of the \nCompany’s significant business \ninterests and to the candidates’ \nage and experience by reference \nto the attributes of existing \nBoard members. \n\n• an affiliation with an entity \n\nwhich accounts for 5% or more \nor the revenue or expense of \nthe Company. \n\nThe Board has determined that \nthere should not be any arbitrary \nlength of tenure that should be \nconsidered to materially interfere \nwith a Director’s ability to act in \nthe best interests of the \nCompany, as it believes this \nassessment must be made on a \ncase by case basis with reference \nto the length of service of all \nmembers of the Board. \n\nWhen a Board vacancy exists or \nwhere it is considered that the \nBoard would benefit from the \nservices of a new Director with \nparticular skills, the Nomination \nCommittee has responsibility for \nproposing candidates for \nconsideration by the Board and, \nwhere appropriate, engages the \nservices of external consultants. ", - "page_start": 32, - "page_end": 32, - "source_file": "ASX_STO_2004.pdf" + "text": "", + "page_start": 114, + "page_end": 114, + "source_file": "00-80T-80.pdf" }, { - "text": "**Executive Officers**\n\n**Teri Bariquit,**49 \nExecutive Vice President, \nNordstrom Merchandising Group \n\n**Kirk Beardsley,**46 \nExecutive Vice President, \nOnline Merchandising \n\n**Terence Boyle,**42 \nExecutive Vice President, \nNordstromrack.com|HauteLook \n\n**Brian K. Dennehy,**49 \nExecutive Vice President and \nChief Marketing Officer \n\n**James A. Howell,**49 \nExecutive Vice President, \nFinance and Treasurer \n\n**Michael G. Koppel,**58 \nExecutive Vice President and \nChief Financial Officer \n\n**Gemma Lionello,**49 \nExecutive Vice President and \nGeneral Merchandise Manager, \nCosmetics Division \n\n**Daniel F. Little,**53 \nExecutive Vice President and \nChief Information Officer \n\n**Lisa Luther,**46 \nExecutive Vice President of \nFinance and Operations, \nNordstrom.com ", - "page_start": 92, - "page_end": 92, - "source_file": "NYSE_JWN_2014.pdf" + "text": "", + "page_start": 55, + "page_end": 55, + "source_file": "00-80T-80.pdf" }, { - "text": "Executive management attend \nBoard and Committee meetings, \nat which they report to Directors \nwithin their respective areas of \nresponsibility. This assists the \nBoard in maintaining its \nunderstanding of the Company’s \nbusiness and assessing the \nexecutive management team. \nWhere appropriate, advisors to \nthe Company attend meetings of \nthe Board and of its Committees. \n\nGenerally, the Board considers a \nDirector to be independent if he \nor she is not a member of \nmanagement and is free of any \nbusiness or other relationship \nthat could materially interfere \nwith, or could reasonably be \n**2.3 Composition of the Board**\nThe composition of the Board is \ndetermined in accordance with \nthe Company’s Constitution and \nthe Board Guidelines which, \namong other things, require that: \n\nThe names and details of the \nexperience, qualifications, special \n\nAnnual Report 2004 ", - "page_start": 32, - "page_end": 32, - "source_file": "ASX_STO_2004.pdf" + "text": "", + "page_start": 114, + "page_end": 114, + "source_file": "00-80T-80.pdf" }, { - "text": "**STEPHEN GERLACH**\nLLB \nAge 59. Director since 5 \nSeptember 1989 and Chairman \nsince 4 May 2001. Chairman of \nSantos Finance Ltd and of the \nEnvironmental and Safety \nCommittee, Finance Committee \nand Nomination Committee and \nmember of the Remuneration \nCommittee of the Board. \nChairman of Futuris Corporation \nLtd and Challenger Beston \nLimited and a Director of \nSouthcorp Ltd. Former Managing \nPartner of the Adelaide legal \nfirm, Finlaysons. Former Chairman \nof Amdel Ltd and Equitoral \nMining Ltd. \n\n**RICHARD MICHAEL HARDING**\nMSc \nAge 55. Director since 1 March \n2004 and member of the Audit \nCommittee of the Board. Former \nPresident and General Manager \nof BP Developments Australia \nLimited and former Vice-Chairman \nand Council member of the \nAustralian Petroleum Production \nand Exploration Association. \nChairman of the Ministry of \nDefence Command Support, \nTraining and Simulation Project \nGovernance Board and Director \nof Arc Energy Ltd. **MICHAEL ANTHONY O’LEARY**\nDipMinE, BSc, FAusIMM, FAIM, \nFAICD \nAge 69. Director since \n15 October 1996 and member \nof the Environmental and Safety \nCommittee of the Board. Director \nof Newcrest Mining Ltd. Former \nChairman of Hamersley Iron, \nArgyle Diamonds, Dampier Salt, \nformer Deputy Chairman of Bank \nof Western Australia Ltd and \nformer Director of Rio Tinto Ltd \nand Rio Tinto plc. ", - "page_start": 43, - "page_end": 43, - "source_file": "ASX_STO_2004.pdf" + "text": "", + "page_start": 114, + "page_end": 114, + "source_file": "00-80T-80.pdf" }, { - "text": "of, non-executive, independent \nDirectors, except for the \nEnvironmental and Safety \nCommittee, which includes \nthe CEO as a member. \n• the Board should comprise a \n\nThe Board Guidelines prescribe \nthat the Board is to meet at \nleast eight times a year, \nincluding a strategy meeting of \ntwo days duration. The number \nof meetings of the Board and of \neach of its Committees and the \nnames of attendees at those \nmeetings are set out on page 47 \nof this Annual Report. Board \nMeetings are structured in two \nseparate sessions, without \nmanagement present for one of \nthose sessions. The agenda for \nmeetings is prepared by the \nCompany Secretary in \nconjunction with the Chairman \nand CEO, with periodic input \nfrom the Board. Comprehensive \nBoard papers are distributed to \nDirectors in advance of \nscheduled meetings. Board \nmeetings take place both at the \nCompany’s head office and at key \noperating sites, to assist the \nBoard in its understanding of \noperational issues. \n\nsubstantial majority of \nindependent, non-executive \nDirectors; \n\nCurrently, the Board comprises \neight non-executive Directors \nand one executive Director. The \nBoard has adopted the definition \nset out in the ASX Best Practice \nRecommendations and as defined \nin the 2002 guidelines of the \nInvestment and Financial \nServices Association Limited and \nconsiders all current non- \nexecutive Directors, including the \nChairman, to be independent \ndirectors. ", - "page_start": 32, - "page_end": 32, - "source_file": "ASX_STO_2004.pdf" + "text": "", + "page_start": 114, + "page_end": 114, + "source_file": "00-80T-80.pdf" }, { - "text": "**Robert B. Sari,**58 \nExecutive Vice President, \nGeneral Counsel and Secretary \n\n**Michael Sato,**48 \nExecutive Vice President, \nSupply Chain \n\n**Tricia D. Smith,**43 \nExecutive Vice President and \nGeneral Merchandise Manager, \nDesigner, Women’s and Kids’ \nApparel \n\n**Geevy S. K. Thomas,**50 \nExecutive Vice President and \nPresident, Nordstrom Rack \n\n**Paige L. Thomas,**43 \nExecutive Vice President and \nGeneral Merchandise Manager, \nNordstrom Rack \n\n**Mark J. Tritton,**51 \nExecutive Vice President and \nPresident, Nordstrom Product Group \n\n**David M. Witman,**56 \nExecutive Vice President and \nGeneral Merchandise Manager, \nMen’s Apparel \n\n**Kenneth J. Worzel,**50 \nExecutive Vice President, \nStrategy and Development ", - "page_start": 92, - "page_end": 92, - "source_file": "NYSE_JWN_2014.pdf" + "text": "", + "page_start": 50, + "page_end": 50, + "source_file": "ASX_STO_2004.pdf" }, { - "text": "〉〉 \n\nTo ensure that the review of remuneration \npractices and strategies on which decision \nmaking is based is objective and well founded, \nthe Remuneration Committee engages external \nremuneration consultants. \n\nreviewing the structure, size and composi- \ntion of the Board; \n\n〉〉 \n\nfrom time to time assessing the extent to \nwhich the required skills are represented on \nthe Board and ensuring an appropriate \nsuccession planning is in place; \n\nThe Remuneration Committee supports and \nadvises the Board in fulfilling its responsibilities \nto shareholders by: \n〉〉 \n\nestablishing processes for the review of the \nperformance of individual Directors and the \nBoard as a whole, its committees and key \nexecutives; and \n〉〉 \nensuring shareholder and employee interests \nare aligned; \nRisk Oversight and Management \n〉〉 \n\nestablishing processes for the identification \nof suitable candidates for appointment to \nthe Board. \n\n〉〉 \nensuring the Company is able to attract, \ndevelop and retain talented employees; \n\nThe Board, through the Audit Committee, is \nresponsible for ensuring that there are adequate \npolicies in place in relation to risk management, \ncompliance and internal control systems. \n\n〉〉 ", - "page_start": 37, - "page_end": 37, - "source_file": "ASX_KCN_2013.pdf" + "text": "", + "page_start": 50, + "page_end": 50, + "source_file": "ASX_STO_2004.pdf" } ] }, @@ -10521,70 +10521,70 @@ "target_page": 12, "target_passage": " the Moomba incident resulted in $17 million of one-off costs in 2004.", "chunk_present": { - "presence": true, - "index": 3 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 185, + "page_end": 185, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 37, + "page_end": 37, + "source_file": "ASX_MRM_2000.pdf" }, { - "text": "Santos benefited from higher \nworld oil prices and realised \nUS$51.83 per boe in 2004, an \nincrease of 19% over 2003. The \nbenefit of higher world oil prices \nsubstantially offset the impact \nof lower production volumes. \n\nFor 2005, production is expected \nto improve by around 15%, or \n4% excluding the impact of the \nMoomba incident. Santos now \nexpects production to be around \n54 million boe in 2005. This \nincrease is largely driven by the \ncommissioning of Mutineer-Exeter \nin March 2005 and the John \nBrookes gas field in the middle \nof the year. \n\nSantos was also able to negotiate \nhigher domestic gas prices (up \n4% on average) and deliver new \nrevenue streams from project \nstart-ups and acquisitions during \nthe year. \nPiecing this together, the key \nthemes in our financial \nperformance were: \n\n**PRODUCTION COSTS**\n**UNDER CONTROL**\nProduction costs in 2004 were \n$309 million, up $45 million or \n17% on 2003. Analysis shows \nthat Santos was able to continue **PRODUCTION HAMPERED BY**\n**MOOMBA INCIDENT**\n2004 production was lower due \nto the Moomba incident, which \nreduced production by 4.6 million ", - "page_start": 12, - "page_end": 12, - "source_file": "ASX_STO_2004.pdf" + "text": "", + "page_start": 157, + "page_end": 157, + "source_file": "00-80T-80.pdf" }, { - "text": "($8 million) and one-off stock \nwrite-offs ($5 million) were \noffset by $17 million in cost \nsavings largely as a result of \nSantos’ continuous \nimprovement initiatives \n\n• the Moomba incident resulted \nin $17 million of one-off costs \nin 2004. \n\n• cost savings in established \nproduction areas more than \noffset increases in the price \nof services and materials \n\n• Santos’ cost base rose as \nproduction from new \ndevelopments and acquisitions \nwere added to the Company’s \nexpanding portfolio of \nproducing assets. ", - "page_start": 12, - "page_end": 12, - "source_file": "ASX_STO_2004.pdf" + "text": "", + "page_start": 35, + "page_end": 35, + "source_file": "ASX_MRM_2000.pdf" }, { - "text": "**22. Investments in Controlled Entities**\n\n**Name**\n**Place of**\n**incorporation**\n**Name**\n\nSA \n\nSantos Brantas Pty Ltd3 \nSantos (Donggala) Pty Ltd3 \nSantos Egypt Pty Ltd3 \nSantos Hides Ltd \nSantos International Operations Pty Ltd \nSantos (Madura Offshore) Pty Ltd \nSantos Niugini Exploration Limited \nSantos (Nth Bali 1) Pty Ltd \nSantos (Papalang) Pty Ltd \nSantos (Popodi) Pty Ltd \nSantos (JPDA 91-01) Pty Ltd \nSantos (JPDA 91-12) Pty Ltd \nSantos (NGA) Pty Ltd \nSantos (N.T.) Pty Ltd \n*Controlled entity of Santos (N.T.) Pty Ltd*\nBonaparte Gas & Oil Pty Limited \n\nVIC \nVIC \nQLD \nNSW \nNSW \nNSW \nQLD \nNSW \nWA \n\nVIC \nQLD \nVIC \nNSW \nQLD \n\nSantos Offshore Pty Ltd \nSantos Oil Exploration (Malaysia) Sdn Bhd (in liquidation) \nSantos Petroleum Pty Ltd \nSantos QNT Pty Ltd \n*Controlled entities of Santos QNT Pty Ltd*\nSA \nSA \nQLD \nNSW ", - "page_start": 72, - "page_end": 72, - "source_file": "ASX_STO_2004.pdf" + "text": "", + "page_start": 157, + "page_end": 157, + "source_file": "00-80T-80.pdf" }, { - "text": "Santos QNT (No. 1) Pty Ltd \n*Controlled entities of Santos QNT (No. 1) Pty Ltd*\nSantos Petroleum Management Pty Ltd \nSantos Petroleum Operations Pty Ltd \nTMOC Exploration Proprietary Limited \n\nACT \nACT \nSA \nSA \nNSW \nWA \nACT \n\nSantos QNT (No. 2) Pty Ltd \n*Controlled entities of Santos QNT (No. 2) Pty Ltd*\n\nAssociated Petroleum Pty Ltd \nMoonie Oil Pty Ltd \nPetromin Pty Ltd \nSantos (299) Pty Ltd \nSantos Exploration Pty Ltd \nSantos Gnuco Pty Ltd \nTransoil Pty Ltd \nSantos Resources Pty Ltd \nSantos Timor Sea Pipeline Pty Ltd \nSesap Pty Ltd2 \nVamgas Pty Ltd \nBarracuda Limited \nLavana Limited \nNovus UK (Kakap 2) Limited2 \nPeko Offshore Ltd \nSanro Insurance Pte Ltd \nSantos Americas and Europe Corporation \n*Controlled entity of Santos Americas and Europe Corporation*\nPNG \nPNG \nUK \nBER \nSING \nUSA \n\nSantos USA Corp \nSantos (Bawean) Pty Ltd USA \nSA ", - "page_start": 72, - "page_end": 72, - "source_file": "ASX_STO_2004.pdf" + "text": "", + "page_start": 36, + "page_end": 36, + "source_file": "ASX_MRM_2000.pdf" }, { - "text": "2004 \nperformance \nComments \n\n-13.1% Moomba incident impact \n\n121% \nExcludes Jeruk \nexploration success \n\nUS$12.37 \nImpacted by development focus \nin 2004 \n\nA$21 On target \n\n8.8% Improving trend \n\n9.4% Improving trend ", - "page_start": 8, - "page_end": 8, - "source_file": "ASX_STO_2004.pdf" + "text": "", + "page_start": 36, + "page_end": 36, + "source_file": "ASX_MRM_2000.pdf" }, { - "text": "Santos has been recognised for \nits achievements in this area. \nSantos’ 2003 Annual Report \nwas featured as an example \nof best practice reporting in \nPricewaterhouseCoopers’*Trends*\n*in Corporate Reporting 2004*\npublication. Reports from \ncompanies worldwide are \nconsidered in compiling this \npublication and they must \nmeet specified criteria. This is \nthe third time a Santos annual \nreport has been featured. Santos \nwas also awarded a 2004 Silver \nAward for Excellence in Annual \nReporting for the 2002 Annual \nReport by the Australasian \nReporting Awards. \n\n**POSITIONING THE WORKFORCE**\n**FOR THE FUTURE**\nSantos commenced a major \ncompany-wide transformational \nchange program in late 2003. \nThe program was designed to \nsignificantly improve Santos’ \nperformance in four areas: key \nbusiness processes, financial \nperformance, organisation \nstructure and company culture. \n\nFurther improvements were also \nmade with the implementation \nof the Environment, Health and \nSafety Management System \nstandards, with Santos operations \nundergoing full assessments \nagainst standards for the \nfirst time. \n\nReorganising and simplifying the \nCompany’s structure was one of \nthe major outcomes and in May \n2004 Santos began operating \nunder a new functionally-based \norganisation structure. ", - "page_start": 28, - "page_end": 28, - "source_file": "ASX_STO_2004.pdf" + "text": "", + "page_start": 37, + "page_end": 37, + "source_file": "ASX_MRM_2000.pdf" }, { - "text": "to effectively control its costs \nin the face of significant external \npressures in the form of rising \nservices and materials prices. \n\nExamining production costs in \ndetail reveals: \n\n• the start-up of Bayu-Undan and \nacquisitions added $16 million \nto Santos’ cost base \n\n• changes in our accounting \n\nadded a further $16 million \nto Santos’ production costs ", - "page_start": 12, - "page_end": 12, - "source_file": "ASX_STO_2004.pdf" + "text": "", + "page_start": 38, + "page_end": 38, + "source_file": "ASX_MRM_2000.pdf" }, { - "text": "25.0 \n\n10.3 \n50.0 \n10.3 \n*Santos operated. \n10.3 \n\n(I) Includes interests held by Basin Oil Pty Ltd. By contract dated 17 February 2005, Santos agreed \n40.0 \n\nto acquire Basin Oil Pty Ltd effective 1 January 2005. The transaction is expected to be \ncompleted in the second quarter of 2005. \n40.0 \n\n43 Annual Report 2004 ", - "page_start": 45, - "page_end": 45, - "source_file": "ASX_STO_2004.pdf" + "text": "", + "page_start": 41, + "page_end": 41, + "source_file": "ASX_MRM_2000.pdf" } ] }, @@ -10595,70 +10595,70 @@ "target_page": 19, "target_passage": " Oil is the main focus of the 2005 program", "chunk_present": { - "presence": true, - "index": 5 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 313, + "page_end": 313, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Santos has been recognised for \nits achievements in this area. \nSantos’ 2003 Annual Report \nwas featured as an example \nof best practice reporting in \nPricewaterhouseCoopers’*Trends*\n*in Corporate Reporting 2004*\npublication. Reports from \ncompanies worldwide are \nconsidered in compiling this \npublication and they must \nmeet specified criteria. This is \nthe third time a Santos annual \nreport has been featured. Santos \nwas also awarded a 2004 Silver \nAward for Excellence in Annual \nReporting for the 2002 Annual \nReport by the Australasian \nReporting Awards. \n\n**POSITIONING THE WORKFORCE**\n**FOR THE FUTURE**\nSantos commenced a major \ncompany-wide transformational \nchange program in late 2003. \nThe program was designed to \nsignificantly improve Santos’ \nperformance in four areas: key \nbusiness processes, financial \nperformance, organisation \nstructure and company culture. \n\nFurther improvements were also \nmade with the implementation \nof the Environment, Health and \nSafety Management System \nstandards, with Santos operations \nundergoing full assessments \nagainst standards for the \nfirst time. \n\nReorganising and simplifying the \nCompany’s structure was one of \nthe major outcomes and in May \n2004 Santos began operating \nunder a new functionally-based \norganisation structure. ", - "page_start": 28, - "page_end": 28, - "source_file": "ASX_STO_2004.pdf" + "text": "", + "page_start": 211, + "page_end": 211, + "source_file": "00-80T-80.pdf" }, { - "text": "Santos continues to build \nan inventory of high quality \noptions to provide a platform \nfor production growth over \nthe coming years. Santos is \ncommitted to a program of \ndiversification while capitalising \non the long-term Cooper Basin \nlegacy asset. Most importantly, \nthis involves leveraging \nthe strengths of the core \ncompetencies built up over \na number of years and Santos' \nwell-positioned domestic \ngas franchise. ", - "page_start": 23, - "page_end": 23, - "source_file": "ASX_STO_2004.pdf" + "text": "", + "page_start": 211, + "page_end": 211, + "source_file": "00-80T-80.pdf" }, { - "text": "of opportunities to use fewer \ngreenhouse-emitting or renewable \nsources of energy. \n\nPartnerships continued in 2004 \nwith the Australian School of \nPetroleum, the Adelaide Symphony \nOrchestra, the State Opera \nCompany of South Australia, the \nArt Gallery of South Australia and \nthe Lloyd McDermott Foundation. \n\nTo achieve these commitments \nSantos is actively pursuing an \nemissions intensity reduction \ntarget (greenhouse emissions \nper unit of production) of 20% \nin the period from 2002 to 2008. \n\n**CORPORATE GOVERNANCE**\nFor the third year running, the \nintegrity of Santos’ corporate \ngovernance was recognised in \n2004 with the maximum five-star \nrating in the Corporate \nGovernance Research Report \nprepared by Horwath and the \nUniversity of Newcastle. \n\nOne of the highlights of the 2004 \nprogram was the establishment \nof the Santos Community Fund. \nIt brings together all of the \ncontributions Santos makes to \ncommunity-based organisations \nand recognises and supports the \nefforts of Santos employees who \nchoose to contribute their own \ntime and resources to improving \ntheir communities. \nA more detailed overview of \ncorporate governance at Santos \nfollows on page 29 of this \nAnnual Report. ", - "page_start": 30, - "page_end": 30, - "source_file": "ASX_STO_2004.pdf" + "text": "", + "page_start": 211, + "page_end": 211, + "source_file": "00-80T-80.pdf" }, { - "text": "**HIGH IMPACT DRILLING**\n**IN 2005**\nThe 2005 exploration program \nhas the highest resource potential \nof any program undertaken \nat Santos. \n\nSuez in Egypt, the Bonaparte \nBasin in the Timor Sea and the \nCarnarvon Basin offshore \nWestern Australia. exploration portfolio. A \nmulti-well drilling program \nwill be undertaken in Santos’ \nKutei Basin PSCs during 2005. \n\nThe 2005 program reflects \nthe increasing materiality of \nSantos’ exploration portfolio \nand continues the emphasis on \nmore globally-focused exploration \nas an important part of the \nCompany’s growth strategy. \n\nAnother gas discovery has \nbeen made at Hurricane 1 in \nthe Carnarvon Basin, offshore \nWestern Australia. While both \nwells were discoveries, they \nrequire further evaluation to \ndetermine their commercial \nsignificance. \n\nSantos plans to drill 25 wells and \nwill invest $150 million testing \nprospects within its expanding \ndomestic and international \nexploration portfolio – up 19% \nfrom the $126 million spent on \nexploration in 2004. \n\nSantos has already had drilling \nsuccess early in 2005 with the \nHiu Aman 1 well – the first to be \ndrilled by Santos in the Donggala \nPSC. Hiu Aman 1 has indicated \nthe presence of a prolific \nhydrocarbon system in this area. \nThe discovery should add other \nlower risk prospects to Santos’ \nOil is the main focus of the \n2005 program with most activity \nin the Kutei and East Java Basins \noffshore Indonesia, the Gulf of ", - "page_start": 19, - "page_end": 19, - "source_file": "ASX_STO_2004.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Outside Australia, Santos has also \nbuilt a core business in Indonesia \nthrough new field developments \nsuch as Oyong and Maleo. Santos \nis further reinforcing its \ncapabilities to implement high \nvalue offshore development \nprojects through an improved \ndrilling capability (including \ndeepwater and high pressure \nreservoirs) and functional \nleadership in the areas of \nreservoir and production \nengineering. \n\nThe other project that \ncommenced production during \nthe year was the Minerva gas \nfield in the Otway Basin offshore \nVictoria which started up \nin December. \n\nWhile Santos' share of production \nis only 10%, the project has \ngreater significance for Santos \nbecause it has enabled the \ncommencement of direct-to- \ncustomer marketing through \nSantos Direct. \n\nSantos, with the assistance \nof external experts and other \nmembers of the joint venture, \nassessed the risk of reserve \nuncertainty against the \nincremental value to be created \nby a fast-track development and \ndecided to proceed with the \ndevelopment, which was designed \nto provide substantial flexibility \nto cope with a wide range of \nproduction rate and reserve \noutcomes. \n**BAYU-UNDAN AND MINERVA**\n**COMMISSIONED**\nThere has been considerable \nprogress on all of these projects \nduring 2004 with two projects \nbeing commissioned: Bayu-Undan \nliquids and Minerva gas. **MUTINEER-EXETER**\n**COMMISSIONING**\nAnother important project for \nSantos is the Mutineer-Exeter \noil fields development. ", - "page_start": 20, - "page_end": 20, - "source_file": "ASX_STO_2004.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "across Santos operations. The \nlong-term environmental and \nfinancial benefits of using this \ntechnology are expected to be \nconsiderable. \n\nSantos has a number of long-term \nprojects underway which will \noptimise the substantial \ninvestment the Company makes \nin training people. Importantly, \nthese projects will deliver \nprograms that are targeted to \nmeet business and individual \nneeds and to support culture \nchange initiatives. \n\n**REDUCED OIL SPILLS**\nThere was a substantial reduction \nin the volume of hydrocarbons \nreleased to the environment \nin 2004, with uncontained \nhydrocarbons spilt reducing from \n1,943 cubic metres to 83 cubic \nmetres and Santos continues to \nfocus on reducing oil spills. \n\n**BANKSIA AWARDS**\nSantos was selected in 2004 \nas a finalist in the Banksia \nEnvironmental Awards for the \nwork undertaken in the Company- \nled initiative to protect the \nworld-renowned Coongie Lakes, \nresulting in the area being \ndeclared a new National Park by \nthe South Australian Government. \n**GREENHOUSE POLICY**\nSantos released its Greenhouse \nPolicy in 2004 to drive performance \nimprovements in this area through \nreducing emissions and producing \noil and gas more efficiently. ", - "page_start": 29, - "page_end": 29, - "source_file": "ASX_STO_2004.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**22. Investments in Controlled Entities**\n\n**Name**\n**Place of**\n**incorporation**\n**Name**\n\nSA \n\nSantos Brantas Pty Ltd3 \nSantos (Donggala) Pty Ltd3 \nSantos Egypt Pty Ltd3 \nSantos Hides Ltd \nSantos International Operations Pty Ltd \nSantos (Madura Offshore) Pty Ltd \nSantos Niugini Exploration Limited \nSantos (Nth Bali 1) Pty Ltd \nSantos (Papalang) Pty Ltd \nSantos (Popodi) Pty Ltd \nSantos (JPDA 91-01) Pty Ltd \nSantos (JPDA 91-12) Pty Ltd \nSantos (NGA) Pty Ltd \nSantos (N.T.) Pty Ltd \n*Controlled entity of Santos (N.T.) Pty Ltd*\nBonaparte Gas & Oil Pty Limited \n\nVIC \nVIC \nQLD \nNSW \nNSW \nNSW \nQLD \nNSW \nWA \n\nVIC \nQLD \nVIC \nNSW \nQLD \n\nSantos Offshore Pty Ltd \nSantos Oil Exploration (Malaysia) Sdn Bhd (in liquidation) \nSantos Petroleum Pty Ltd \nSantos QNT Pty Ltd \n*Controlled entities of Santos QNT Pty Ltd*\nSA \nSA \nQLD \nNSW ", - "page_start": 72, - "page_end": 72, - "source_file": "ASX_STO_2004.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**Santos employees rehabilitating a section of the River Torrens in Adelaide, as part of Santos’ three-year**\n**commitment to the Our Patch project.**\n\nSantos has adopted a patch of \nthe River Torrens and employees \nare assisting with the remediation \nand revegetation of this area in \na volunteering program. ", - "page_start": 30, - "page_end": 30, - "source_file": "ASX_STO_2004.pdf" + "text": "", + "page_start": 210, + "page_end": 210, + "source_file": "00-80T-80.pdf" } ] }, @@ -10669,70 +10669,70 @@ "target_page": 2, "target_passage": " The primary aim of the OSPRO cohort study was to de velop and validate review of systems (i.e. evidence of sys temic involvement) and yellow flag (i.e. pain-related psychological distress) screening tools for use in out patient orthopedic physical therapy settings", "chunk_present": { - "presence": true, - "index": 5 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 295, + "page_end": 295, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 325, + "page_end": 325, + "source_file": "00-80T-80.pdf" }, { - "text": "Abbreviations \nCCI: Charlson comorbidity index; OSPRO: Optimal Screening for Prediction of \nReferral and Outcome; OSPRO-ROS: Review of systems screening tool from \nOSPRO cohort study; OSPRO-YF: Pain-related psychological distress screening \ntool from OSPRO cohort study \n\nReceived: 9 November 2017 Accepted: 14 August 2018 \n\nReferences \n1. \n\n2. \n\n3. \n\n4. \n\n5. \n\n6. ", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed5.pdf" + "text": "", + "page_start": 324, + "page_end": 324, + "source_file": "00-80T-80.pdf" }, { - "text": "Methods \nDataset and patient population \nThis study used data from the Orthopedic Physical Ther- \napy – Investigative Network’s (OPT-IN) Optimal Screen- \ning for Prediction of Referral and Outcome (OSPRO) \nvalidation cohort study, a longitudinal prospective study \nof individuals with knee, shoulder, back or neck pain seek- \ning Physical Therapy in the US. A convenience sample \nwas recruited from December 2014 and December 2015 \nby participating OPT-IN clinics. The OPT-IN clinics that \nparticipated in data collection represented multiple geo- \ngraphic regions in the US including the Mideast, South- \neast, Great Lakes, Rocky Mountain States and Far West, \nwith an attempt to balance recruitment between urban \nand rural settings over the entire OPT-IN network. Phys- \nical therapists practicing in these clinics identified eligible \nparticipants at initial evaluation and directed them to a se- \ncure study website for the informed consent process and \nbaseline self-report assessment. Eligibility criteria have \nbeen thoroughly reported elsewhere [19] and were \nthat was \nintentionally broad to develop a cohort \ngeneralizable to those seeking physical therapy for com- \nmon musculoskeletal conditions in the US. Participants \ncompleted follow-up self-reported assessments on the \nstudy website at 4 weeks, 6 months and 12 months. Partic- \nipants were notified of a pending assessment by an email \nthat directed them back to the study website to complete \ntheir follow-up assessment. For additional details of the \ndataset and cohort, readers are directed to the published \ncohort profile [19]. ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed5.pdf" + "text": "", + "page_start": 324, + "page_end": 324, + "source_file": "00-80T-80.pdf" }, { - "text": "OSPRO Yellow Flag tool (OSPRO-YF) \nThe OSPRO-YF is a yellow flag assessment tool that in- \ncludes items from pain vulnerability domains (negative \naffect and fear-avoidance) and pain resilience domains \n(positive affect and self-efficacy) to aid with identification \nof pain-related psychological distress in outpatient ortho- \npedic physical therapy settings [37]. The OSPRO-YF has \ngood concurrent \nand \nregion-specific disability [37] and is capable of predicting \npain intensity, disability, quality of life and persistent pain \n12 months following physical therapy in patients with \nmusculoskeletal pain [20, 21]. The full-length OSPRO-YF \nhas 17-items, however a shortened 10-item version is also \navailable with an acceptable trade-off in accuracy. Like the \nOSPRO-ROS, the OSPRO-YF is designed for implementa- \ntion into electronic medical record (EMR) systems to \nquickly and accurately identify risk for a variety of clinical \noutcomes [19]. For statistical analyses, a summary score \nwas derived for each version by adding the item responses \nafter reverse-scoring items 2, 13, 14, 15 and 17 so that \nhigher scores indicate higher pain-related psychological \ndistress. The summary score was then included in each \nmodel as a continuous independent variable. ", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed5.pdf" + "text": "", + "page_start": 324, + "page_end": 324, + "source_file": "00-80T-80.pdf" }, { - "text": "The primary aim of the OSPRO cohort study was to de- \nvelop and validate review of systems (i.e. evidence of sys- \ntemic involvement) and yellow flag (i.e. pain-related \npsychological distress) screening tools for use in out- \npatient orthopedic physical therapy settings. These screen- \ning tools, once validated and refined for clinical decision \nmaking, may improve the value of care delivery by accur- \nately identifying individuals who 1) are appropriate for \nreferral \nof \nnon-musculoskeletal symptoms, and/or 2) would benefit \nfrom enhanced, psychologically-informed physical ther- \napy. Early identification of individuals most appropriate \nfor these modified pathways of care has the potential to \nreduce wasteful downstream health care utilization, limit \nthe risk of unwarranted and costly care escalation, and im- \nprove clinical outcomes. Results of the primary analyses \nexamining the predictive ability of the OSPRO tools for \npain, disability, health status, and comorbidity outcomes \nhave been previously published [20]. Pre-planned second- \nary analyses included prediction of persistent pain state \n[21] and this current analysis predicting future healthcare \nutilization. All subjects consented to participation in the \nstudy and ethics approval was granted by the University of \nFlorida Institutional Review Board. \n\nto other providers for management ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed5.pdf" + "text": "", + "page_start": 324, + "page_end": 324, + "source_file": "00-80T-80.pdf" }, { - "text": "OSPRO-YF (10 items) \nOSPRO-ROS (10 items) \n\nBlock 3 .321 .321 \n\nOSPRO-YF (+ 7 items) \nOSPRO-ROS (+ 13 items) \n\nBlock 4 \n\n4-week change \n(Pain, Disability, OSPRO-YF) \n\nAll values are variance explained (pseudo-R2); Health care utilization (dependent) variables refer to utilization during the follow-up period, whereas independent \nvariables refer to measurements taken before the follow-up period \n*p < 0.05,**p < 0.01 ", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed5.pdf" + "text": "", + "page_start": 324, + "page_end": 324, + "source_file": "00-80T-80.pdf" }, { - "text": "In future studies, we will embed the OSPRO tools into \nelectronic medical record (EMR) databases to refine and \ntest outcomes prediction models at the health care systems \nlevel. Importantly, we will collect clinical encounter data \nthrough the EMR and combine it with administrative or \nbilling data to confirm the results of this study with more \nobjective measures of health care use. These studies will \nalso allow us to provide better guidance on how to use the \nOSPRO tools to identify serious psychiatric involvement or \nsystemic sources of pain that require medical referral. Fi- \nnally, we will explore alternative scoring strategies for the \ntools, such as weighted scoring for the OSPRO-ROS and \nuse of predicted full-length psychological questionnaire \nscores for the OSPRO-YF. Healthcare providers could then \nuse the collective information from these studies to build \nlearning health systems that facilitate effective, real-time \nclinical decision-making support to improve value of care \nfor patients with musculoskeletal pain. \n\nConclusion \nBaseline disability and change in pain intensity were im- \nportant predictors of \nsubsequent pain-related \nany \nhealthcare utilization, while predictors of individual ser- \nvice utilization were outcome-specific. Identification of \nrisk is improved through treatment monitoring for pain \nand, in some cases, disability and pain-related psycho- \nlogical distress. Comorbidity burden was an important \npredictor of subsequent utilization of opioids and diag- \nnostic tests and imaging, both of which have been recent \ntargets of healthcare policy to constrain their unneces- \nsary use. Future research is needed to refine these pre- \ndictor variables and incorporate them into risk models \nthat support clinical decision-making so that treatment \neffectiveness and efficiency are optimized in value-based \nsystems. \n\nthe clinical encounter might \n\nThird, we were unable to adequately model the spe- \ncific effects of worker’s compensation, self-pay and some ", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed5.pdf" + "text": "", + "page_start": 324, + "page_end": 324, + "source_file": "00-80T-80.pdf" }, { - "text": "Assessment tools \nOSPRO Review of Systems tool (OSPRO-ROS) \nThe OSPRO-ROS is a review-of-systems screening tool for \nuse in outpatient orthopedic physical therapy settings [36]. \nThe OSPRO-ROS has demonstrated good concurrent val- \nidity with depression and a comprehensive 97-item battery \n[36] \nof non-musculoskeletal symptoms (i.e., red flags). \nModerate \nthe \ncapabilities of \nstrong predictive \nOSPRO-ROS have been reported for persistence of pain, \nquality of life, and change in comorbidity 12 months fol- \nlowing physical therapy in patients with musculoskeletal \npain [20, 21]. The OSPRO-ROS includes standard symp- \ntom descriptors to aid with identification of systemic or \nnon-musculoskeletal origins of musculoskeletal pain. It \nincludes questions related to symptoms of the cardiovascu- \nlar, gastrointestinal, endocrine, nervous, \nintegumentary, \npulmonary, and musculoskeletal systems. The full-length \n23-item version of the OSPRO-ROS is capable of identify- \ning 100% of positive red-flag responders (i.e. \nindicating \n“yes” to at least one systemic symptom on a questionnaire) \nin outpatient orthopedic physical therapy settings. [36] A \nshorter, 10-item version is also available that has been \n\nto ", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed5.pdf" + "text": "", + "page_start": 325, + "page_end": 325, + "source_file": "00-80T-80.pdf" }, { - "text": "Full multivariate model performance \nOverall performance for each full multivariate model is \nlisted in Table 5. Block 1 (Demographic, clinical and co- \nmorbidity) consistently contributed to prediction of \nhealthcare utilization and accounted for the greatest \namount of variation in utilization outcome for all \nmodels. Block 4 (change scores for pain, disability, and \nOSPRO-YF) provided statistically significant contribu- \ntions in all models except prediction of injection. Blocks \nincluding baseline OSPRO-YF and OSPRO-ROS, both \nshort and long forms, did not predict utilization out- \ncomes. Weighted models consistently outperformed \ntheir complete case analysis model counterparts with \noverall model pseudo-R2 values ranging from .337 (Any \ncare) to .611 (Emergency room). Results \nFour hundred and forty subjects were recruited at initial \nevaluation. Follow-up at 4 weeks was 75.0% (n = 330), at \n6 months was 69.0% (n = 304) and at 12 months was \n65.2% (n = 287). Baseline demographics and health-related \ncharacteristics for the full cohort, as well as those who did \nand did not complete all \nfollow-up are presented in \nTables 1, 2 and 3. Those who did not complete follow-up \nwere younger, more likely to be non-white, had less than a \ncollege degree, were more likely to have had sudden \nsymptom onset, had higher baseline pain intensity, and \nhad higher baseline pain-related psychological distress \nmeasured by the OSPRO-YF. Only those with complete ", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed5.pdf" + "text": "", + "page_start": 328, + "page_end": 328, + "source_file": "00-80T-80.pdf" } ] }, @@ -10743,70 +10743,70 @@ "target_page": 3, "target_passage": "Pain intensity was assessed by the numerical pain rating scale (NPRS) ranging from “0” (no pain) to “10” (worst pain imaginable)", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 271, + "page_end": 271, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 261, + "page_end": 261, + "source_file": "00-80T-80.pdf" }, { - "text": "Pain-related clinical variables \nPain status was determined using established definitions \nthat account for the duration of pain and activity limita- \ntions [22, 23] using the following two questions: 1) \n“How long have you been experiencing your current \npainful symptoms?” and 2) “Have you experienced ANY \npain and activity limitations every day for the past 3 \nmonths?” Responses to question 1 of “greater than 90 \ndays” or responses to question 2 of “Yes” were used to \nclassify patients as having persistent pain at \ninitial \nevaluation. \n\nPain intensity \nPain intensity was assessed by the numerical pain rating \nscale (NPRS) ranging from “0” (no pain) to “10” (worst ", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed5.pdf" + "text": "", + "page_start": 8, + "page_end": 8, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "[24–26]. Participants \n\npain imaginable) \nrated their \ncurrent pain intensity, as well as their best (lowest) and \nworst \nthe past 24 h. \nCurrent, best and worst pain ratings were averaged for \npurposes of analysis. \n\nHealthcare utilization predictors \nWe collected potential predictors by self-reported ques- \ntionnaires at initial evaluation using an online study web- \nsite. Participants were directed back to the study website \n4 weeks following initial evaluation to again complete \nquestions on pain intensity, disability, and pain-related \npsychological distress. Change in pain intensity, disability, \nand pain-related psychological distress from baseline to \n4 weeks were modeled as treatment response variables \nand included as potential predictors. \n\n(highest) pain intensity over \n\nRegion-specific disability \nSelf-reported region-specific disability was assessed with \nthe Neck Disability Index [27, 28], Oswestry Disability \nQuestionnaire [29, 30], Quick Disability of Arm Shoulder \nand Hand [31] or International Knee Documentation \nCommittee Subjective Knee Form [32] for cervical, low \nback, shoulder and knee pain, respectively. Region-specific \ndisability measures were z-transformed for purposes of \nanalysis, consistent with our prior work involving multiple \nanatomical regions [33]. ", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed5.pdf" + "text": "", + "page_start": 259, + "page_end": 259, + "source_file": "00-80T-80.pdf" }, { - "text": "Abstract \n\nBackground: In the United States, value-based purchasing has created the need for healthcare systems to prospectively \nidentify patients at risk for high healthcare utilization beyond a physical therapy episode for musculoskeletal pain. The \npurpose of this study was to determine predictors of pain-related healthcare utilization subsequent to an index episode \nof physical therapy for musculoskeletal pain. \n\nMethods: This study assessed data from the Optimal Screening for Prediction of Referral and Outcome (OSPRO) \nlongitudinal cohort study that recruited individuals with a primary complaint of neck, low back, knee or shoulder \npain in physical therapy (n = 440). Demographics, health-related information, review of systems, comorbidity and \npain-related psychological distress measures were collected at baseline evaluation. Baseline to 4-week changes in \npain intensity, disability, and pain-related psychological distress were measured as treatment response variables. \nAt 6-months and 1-year after baseline evaluation, individuals reported use of opioids, injection, surgery, diagnostic tests \nor imaging, and emergency room visits for their pain condition over the follow-up period. Separate prediction models \nwere developed for any subsequent care and service-specific utilization. \n\nResults: Subsequent pain-related healthcare utilization was reported by 43% (n = 106) of the study sample that completed \nthe 12-month follow-up (n = 246). Baseline disability and 4-week change in pain intensity were important global predictors \nof subsequent healthcare utilization. Age, insurance status, comorbidity burden, baseline pain, and 4-week changes in pain \nintensity, disability and pain-related psychological distress predicted specific service utilization. ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed5.pdf" + "text": "", + "page_start": 259, + "page_end": 259, + "source_file": "00-80T-80.pdf" }, { - "text": "Discussion \nThis study identified novel predictors for pain-related \nutilization outcomes following an episode of physical \ntherapy for a primary complaint of musculoskeletal \npain. The most robust \nfinding from these analyses \nwas that baseline disability and change in pain inten- \nsity over the first 4 weeks following physical therapy \nevaluation were consistent predictors of subsequent \npain-related healthcare utilization in those participants \nthat completed all follow up. Aside from these robust \npredictors, other individual predictors of utilization \nwere highly outcome-specific. High model specificity \nfor utilization outcomes observed in this study is con- \nsistent with a recent systematic review that \nfound \nsimilar levels of model specificity for more traditional \noutcomes \nlike pain intensity, disability and work \nabsenteeism [14]. Across models, health-related vari- \nables were generally stronger predictors than sociode- \nmographic factors, which is also supported by prior \nresearch [15, 16]. Additionally, there were cases when \nprediction models were improved for specific services \n(e.g. surgery, use of opioids) when considering change \nin pain, disability or pain-related psychological dis- \ntress. A notable finding is that the OSPRO-YF had \nthe greatest utility when used to measure change in \npain-related psychological distress. Current risk pre- \ndiction paradigms in musculoskeletal pain consider \nonly baseline pain-related psychological distress. How- \nthese results underscore the importance of \never, ", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed5.pdf" + "text": "", + "page_start": 8, + "page_end": 8, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "\n\nRANGE PERFORMANCE ", - "page_start": 176, - "page_end": 176, + "text": "", + "page_start": 412, + "page_end": 412, "source_file": "00-80T-80.pdf" }, { - "text": "OSPRO Yellow Flag tool (OSPRO-YF) \nThe OSPRO-YF is a yellow flag assessment tool that in- \ncludes items from pain vulnerability domains (negative \naffect and fear-avoidance) and pain resilience domains \n(positive affect and self-efficacy) to aid with identification \nof pain-related psychological distress in outpatient ortho- \npedic physical therapy settings [37]. The OSPRO-YF has \ngood concurrent \nand \nregion-specific disability [37] and is capable of predicting \npain intensity, disability, quality of life and persistent pain \n12 months following physical therapy in patients with \nmusculoskeletal pain [20, 21]. The full-length OSPRO-YF \nhas 17-items, however a shortened 10-item version is also \navailable with an acceptable trade-off in accuracy. Like the \nOSPRO-ROS, the OSPRO-YF is designed for implementa- \ntion into electronic medical record (EMR) systems to \nquickly and accurately identify risk for a variety of clinical \noutcomes [19]. For statistical analyses, a summary score \nwas derived for each version by adding the item responses \nafter reverse-scoring items 2, 13, 14, 15 and 17 so that \nhigher scores indicate higher pain-related psychological \ndistress. The summary score was then included in each \nmodel as a continuous independent variable. ", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed5.pdf" + "text": "", + "page_start": 412, + "page_end": 412, + "source_file": "00-80T-80.pdf" }, { - "text": "We have engaged each of Fitch Ratings (Fitch), Moody’s Investors \nService (Moody’s) and Standard & Poor’s Ratings Services (Standard & \nPoor’s) to rate our public debt issues. In May 2013, each of Fitch and \nStandard & Poor’s upgraded RCI’s senior unsecured debt to BBB+ (from \nBBB) with a stable outlook. Moody’s comparably equivalent rating of \nBaa1 with a stable outlook has not changed from last year. \n\nThe table below shows the credit ratings on our borrowings received \nfrom the rating agencies as of December 31, 2013: \nshort-term and, or \n\n**Corporate credit issuer**\n**default rating** **Senior unsecured debt**\n\nCredit ratings are not recommendations for investors to purchase, hold \nor sell the rated securities, nor are they a comment on market price or \ninvestor suitability. There is no assurance that a rating will remain in \neffect for a given period of time, or that a rating will not be revised or \nwithdrawn entirely by a rating agency if it believes circumstances \nwarrant it. The ratings on our senior debt provided by Standard & \nPoor’s, Fitch and Moody’s are investment grade ratings. \n\ninstitutions until \n\n**RATIO OF ADJUSTED OPERATING PROFIT TO INTEREST**", - "page_start": 65, - "page_end": 65, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "\n\nEFFECT OF WIN0 ON RANGE ", - "page_start": 187, - "page_end": 187, - "source_file": "00-80T-80.pdf" + "text": "", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_SMFG_2011.pdf" } ] }, @@ -10823,64 +10823,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 384, + "page_end": 384, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "233 Norder et al., 2017: Beyond return to work from sickness absence due to mental disorders: 5-year longitudinal \nstudy of employment status among production workers, here \n234 Leka & Jain, 2017: EU Compass for Action on Mental Health and Well-Being - Mental Health in the Workplace \nin Europe \n235 Musculoskeletal disorders refer to backache and/or muscular pains in shoulders, neck, upper limbs and/or \nlower limbs (hips, legs, knees, feet, etc.). In the medical systematic it is the IC 10 group of diseases: Diseases of \nthe musculoskeletal system and connective tissue. \n236 EU-OSHA, 2019: Work-related musculoskeletal disorders: prevalence, costs and demographics in the EU \n237 Graveling, 2018: Ergonomics and Musculoskeletal Disorders (MSDs) in the Workplace. A Forensic and \nEpidemiological Analysis \n238 Da Costa & Viera, 2010: Risk factors for work-related musculoskeletal disorders: a systematic review of recent \nlongitudinal studies, here \n239 EU-OSHA, 2020: Work-related musculoskeletal disorders: why are they still so prevalent? Evidence from a \nliterature review (p. 15). \n240 EU-OSHA, 2019: Summary - Work-related musculoskeletal disorders: prevalence, costs and demographics in \nthe EU (p. 8). \n241 EU-OSHA, 2019: Work-related musculoskeletal disorders: prevalence, costs and demographics in the EU \n242 Ibid., p. 174ff. ", - "page_start": 150, - "page_end": 150, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 21, + "page_end": 21, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "In a similar way,**the levels of ergonomic risks**are related with the sectoral structure of a country, \ndetermining the type of occupations and work tasks. EU-OSHA provided a detailed analysis of the \nprevalence of musculoskeletal disorders (MSDs) and the related risk factors in several studies on \nmusculoskeletal diseases, for example, ‘Work-related musculoskeletal disorders: why are they still so \nprevalent?’58 \n\nAn example of the**interrelation between sectors and risks is the connection**between the sector \naggregate ‘Trade, transport, food/accommodation and recreation activities’ and three major indicators \nof ergonomic burden, that is, ‘Painful, tiring positions’, ‘Repetitive hand or arm movements’, and \n‘Carrying or moving heavy loads’. \n\nSeven countries have a share of employees in this sector of more than 30% (Cyprus, Greece, Spain, \nMalta, Bulgaria, Croatia and Latvia), and many of them are present in two or three lists of countries with \nthe highest number of responses regarding the indicators. ", - "page_start": 43, - "page_end": 43, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 205, + "page_end": 205, + "source_file": "00-80T-80.pdf" }, { - "text": "Abstract \n\nBackground: In the United States, value-based purchasing has created the need for healthcare systems to prospectively \nidentify patients at risk for high healthcare utilization beyond a physical therapy episode for musculoskeletal pain. The \npurpose of this study was to determine predictors of pain-related healthcare utilization subsequent to an index episode \nof physical therapy for musculoskeletal pain. \n\nMethods: This study assessed data from the Optimal Screening for Prediction of Referral and Outcome (OSPRO) \nlongitudinal cohort study that recruited individuals with a primary complaint of neck, low back, knee or shoulder \npain in physical therapy (n = 440). Demographics, health-related information, review of systems, comorbidity and \npain-related psychological distress measures were collected at baseline evaluation. Baseline to 4-week changes in \npain intensity, disability, and pain-related psychological distress were measured as treatment response variables. \nAt 6-months and 1-year after baseline evaluation, individuals reported use of opioids, injection, surgery, diagnostic tests \nor imaging, and emergency room visits for their pain condition over the follow-up period. Separate prediction models \nwere developed for any subsequent care and service-specific utilization. \n\nResults: Subsequent pain-related healthcare utilization was reported by 43% (n = 106) of the study sample that completed \nthe 12-month follow-up (n = 246). Baseline disability and 4-week change in pain intensity were important global predictors \nof subsequent healthcare utilization. Age, insurance status, comorbidity burden, baseline pain, and 4-week changes in pain \nintensity, disability and pain-related psychological distress predicted specific service utilization. ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed5.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "Pain-related clinical variables \nPain status was determined using established definitions \nthat account for the duration of pain and activity limita- \ntions [22, 23] using the following two questions: 1) \n“How long have you been experiencing your current \npainful symptoms?” and 2) “Have you experienced ANY \npain and activity limitations every day for the past 3 \nmonths?” Responses to question 1 of “greater than 90 \ndays” or responses to question 2 of “Yes” were used to \nclassify patients as having persistent pain at \ninitial \nevaluation. \n\nPain intensity \nPain intensity was assessed by the numerical pain rating \nscale (NPRS) ranging from “0” (no pain) to “10” (worst ", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed5.pdf" + "text": "", + "page_start": 205, + "page_end": 205, + "source_file": "00-80T-80.pdf" }, { - "text": "Assessment tools \nOSPRO Review of Systems tool (OSPRO-ROS) \nThe OSPRO-ROS is a review-of-systems screening tool for \nuse in outpatient orthopedic physical therapy settings [36]. \nThe OSPRO-ROS has demonstrated good concurrent val- \nidity with depression and a comprehensive 97-item battery \n[36] \nof non-musculoskeletal symptoms (i.e., red flags). \nModerate \nthe \ncapabilities of \nstrong predictive \nOSPRO-ROS have been reported for persistence of pain, \nquality of life, and change in comorbidity 12 months fol- \nlowing physical therapy in patients with musculoskeletal \npain [20, 21]. The OSPRO-ROS includes standard symp- \ntom descriptors to aid with identification of systemic or \nnon-musculoskeletal origins of musculoskeletal pain. It \nincludes questions related to symptoms of the cardiovascu- \nlar, gastrointestinal, endocrine, nervous, \nintegumentary, \npulmonary, and musculoskeletal systems. The full-length \n23-item version of the OSPRO-ROS is capable of identify- \ning 100% of positive red-flag responders (i.e. \nindicating \n“yes” to at least one systemic symptom on a questionnaire) \nin outpatient orthopedic physical therapy settings. [36] A \nshorter, 10-item version is also available that has been \n\nto ", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed5.pdf" + "text": "", + "page_start": 205, + "page_end": 205, + "source_file": "00-80T-80.pdf" }, { - "text": "Discussion \nThis study identified novel predictors for pain-related \nutilization outcomes following an episode of physical \ntherapy for a primary complaint of musculoskeletal \npain. The most robust \nfinding from these analyses \nwas that baseline disability and change in pain inten- \nsity over the first 4 weeks following physical therapy \nevaluation were consistent predictors of subsequent \npain-related healthcare utilization in those participants \nthat completed all follow up. Aside from these robust \npredictors, other individual predictors of utilization \nwere highly outcome-specific. High model specificity \nfor utilization outcomes observed in this study is con- \nsistent with a recent systematic review that \nfound \nsimilar levels of model specificity for more traditional \noutcomes \nlike pain intensity, disability and work \nabsenteeism [14]. Across models, health-related vari- \nables were generally stronger predictors than sociode- \nmographic factors, which is also supported by prior \nresearch [15, 16]. Additionally, there were cases when \nprediction models were improved for specific services \n(e.g. surgery, use of opioids) when considering change \nin pain, disability or pain-related psychological dis- \ntress. A notable finding is that the OSPRO-YF had \nthe greatest utility when used to measure change in \npain-related psychological distress. Current risk pre- \ndiction paradigms in musculoskeletal pain consider \nonly baseline pain-related psychological distress. How- \nthese results underscore the importance of \never, ", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed5.pdf" + "text": "", + "page_start": 205, + "page_end": 205, + "source_file": "00-80T-80.pdf" }, { - "text": "Prediction of Referral and Outcome (OSPRO) in patients with \nmusculoskeletal pain conditions: a longitudinal validation cohort from the \nUSA. BMJ Open. 2017;7:e015188. \n\n20. George SZ, Beneciuk JM, Lentz TA, Wu SS, Dai Y, Bialosky JE, Zeppieri G Jr. \nOptimal Screening for Prediction of Referral and Outcome (OSPRO) for \nMusculoskeletal Pain Conditions: Results From the Validation Cohort. J \nOrthop Sports Phys Ther. 2018;48(6):460–75. \n\n21. Beneciuk JM, Lentz TA, He Y, Wu SS, George SZ. Prediction of persistent \nmusculoskeletal pain at 12 months: a secondary analysis of the Optimal \nScreening for Prediction of Referral and Outcome (OSPRO) validation cohort \nstudy. Phys Ther. 2018;98:290–301. \nFreburger JK, Holmes GM, Agans RP, Jackman AM, Darter JD, Wallace AS, et \nal. The rising prevalence of chronic low back pain. Arch Intern Med. 2009; \n169:251–8. \n\n46. Harris RJ. A primer of multivariate statistics. 3rd ed. Mahwah: Psychology \nPress; 2001. \n47. Piette JD, Kerr EA. The impact of comorbid chronic conditions on diabetes \ncare. Diabetes Care. 2006;29:725–31. \n48. Rice ASC, Smith BH, Blyth FM. Pain and the global burden of disease. Pain. 22. \n\n23. Carey TS, Freburger JK, Holmes GM, Jackman A, Knauer S, Wallace A, et al. \n\nRace, care seeking, and utilization for chronic back and neck pain: \npopulation perspectives. J Pain Off J Am Pain Soc. 2010;11:343–50. \nJensen MP, Turner JA, Romano JM, Fisher LD. Comparative reliability and \nvalidity of chronic pain intensity measures. Pain. 1999;83:157–62. \n\n50. \n24. \n\n51. 25. Bolton JE. Accuracy of recall of usual pain intensity in back pain patients. \nPain. 1999;83:533–9. ", - "page_start": 13, - "page_end": 13, - "source_file": "pubmed5.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "Moreover,**the prevalence of MSDs is not decreasing**, as could be expected due to the sectoral shifts \nof workforce from industry and agriculture to services. The authors of the EU-OSHA study ‘Work-related \nmusculoskeletal disorders: why are they still so prevalent?’ consider several reasons for this: the \nergonomic burden shifted to other tasks, for example, handling of patients instead of handling of heavy \nloads, more inactivity with other musculoskeletal consequences, more time pressure, an ageing \nworkforce, and inadequate work organisation and contractual arrangements. 239 \n\nThe tremendous shift of workforce to administrative and often digitalised work contributes to an increase \nof the number of workers suffering from the consequences of**physical inactivity**due to**permanent**\n**sedentary work**, mostly with digital equipment. The figure below shows the spread of these diseases \nin different occupations.240 ", - "page_start": 87, - "page_end": 87, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 205, + "page_end": 205, + "source_file": "00-80T-80.pdf" } ] }, @@ -10891,70 +10891,70 @@ "target_page": 2, "target_passage": "Creative Commons (CC) is the global nonprofit organization behind the CC Licenses and public domain tools, which power open sharing on popular platforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy.", "chunk_present": { - "presence": true, - "index": 8 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 276, + "page_end": 276, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "This is a frame from “Twenty Years of Creative Commons (in Sixty Seconds)” by Ryan Junell and Glenn \nOtis Brown for Creative Commons licensed under CC BY 4.0. It includes adaptations of multiple open \nand public domain works. View full licensing and attribution information about all works included in the \nvideo on Flickr. ", - "page_start": 12, - "page_end": 12, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + "text": "", + "page_start": 338, + "page_end": 338, + "source_file": "00-80T-80.pdf" }, { - "text": "What Is Creative Commons? \nCreative Commons is a global nonprofit organization \ndedicated to supporting an open and accessible Internet \nthat is enriched with free knowledge and creative resources \nfor people around the world to use, share, and cultivate. \n\nOur easy-to-use licenses provide a simple, standardized way \nto give the public permission to share and use your creative \nwork — on conditions of your choice. CC licenses let you \nchange your copyright terms from the default of “all rights \nreserved” to “some rights reserved.” \n\nMillions of people use CC licenses on some of the world’s \nmost popular platforms for user-generated content. When \nyou use a CC license to share your photos, videos, or blog, \nyour creation joins a globally accessible pool of resources \nthat includes the work of artists, educators, scientists, and \ngovernments. ", - "page_start": 1, - "page_end": 1, - "source_file": "Publicdomain.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "© The Author(s) 2023. Published by Oxford University Press. \nThis is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which \npermits unrestricted reuse, distribution, and reproduction in any medium, provided the original work is properly cited. ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed1.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "**Publisher’s note**Springer Nature remains neutral with regard to jurisdictional claims in \npublished maps and institutional affiliations. \n\n**Open Access**This article is licensed under a Creative Commons Attribution \n4.0 International License, which permits use, sharing, adaptation, distribution \nand reproduction in any medium or format, as long as you give appropriate \n\ncredit to the original author(s) and the source, provide a link to the Creative Commons licence, \nand indicate if changes were made. The images or other third party material in this article are \nincluded in the article’s Creative Commons licence, unless indicated otherwise in a credit line \nto the material. If material is not included in the article’s Creative Commons licence and your \nintended use is not permitted by statutory regulation or exceeds the permitted use, you will \nneed to obtain permission directly from the copyright holder. To view a copy of this licence, \nvisit http://creativecommons.org/licenses/by/4.0/. genome-wide genealogies. Preprint at*bioRxiv*https://doi.org/10.1101/2021.07.13.452277 \n(2021). \n41. Coop, G. Genetic similarity versus genetic ancestry groups as sample descriptors in \nhuman genetics. Preprint at https://arxiv.org/abs/2207.11595 (2022). \n© The Author(s) 2025 ", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed3.pdf" + "text": "", + "page_start": 338, + "page_end": 338, + "source_file": "00-80T-80.pdf" }, { - "text": "© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access \narticle distributed under the terms and conditions of the Creative Commons Attribution \n(CC BY) license (http://creativecommons.org/licenses/by/4.0/). ", - "page_start": 22, - "page_end": 22, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "**Copyright:**© 2025 by the authors. \nLicensee MDPI, Basel, Switzerland. \nThis article is an open access article \ndistributed under the terms and \nconditions of the Creative Commons \nAttribution (CC BY) license \n(https://creativecommons.org/ \nlicenses/by/4.0/). ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed7_cc4.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "Creative Commons (CC) is the global nonprofit organization behind the CC \nLicenses and public domain tools, which power open sharing on popular \nplatforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. \nSince 2002, the CC Licenses have served as an alternative to traditional \ncopyright, providing a simple, standardized, and legal way for individuals and \ninstitutions to freely share images, music, research, educational resources, and \ncultural artifacts. \n\n**Chief Executive Officer**\nAnna Tumadóttir \n\n**General Counsel**\nKat Walsh ", - "page_start": 2, - "page_end": 2, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "**Funding**\nFunding was provided by the National Key Research and Development program of China (Grant Nos. \n2019YFA0607403 and 2017YFD0300301) and National Natural Science Foundation of China (Grant Nos. \n41961124007 and 41871026). \n\n**Competing interests**\nThe authors declare no competing interests. \n\n**Additional information**\n**Correspondence**and requests for materials should be addressed to K.L. \n\n**Reprints and permissions information**is available at www.nature.com/reprints. \n\n**Publisher’s note**Springer Nature remains neutral with regard to jurisdictional claims in published maps and \ninstitutional affiliations. \n\n**Open Access**This article is licensed under a Creative Commons Attribution 4.0 International \nLicense, which permits use, sharing, adaptation, distribution and reproduction in any medium or \nformat, as long as you give appropriate credit to the original author(s) and the source, provide a link to the \nCreative Commons licence, and indicate if changes were made. The images or other third party material in this \narticle are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the \nmaterial. If material is not included in the article’s Creative Commons licence and your intended use is not \npermitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from \nthe copyright holder. To view a copy of this licence, visit http:// creat iveco mmons. org/ licen ses/ by/4. 0/. ", - "page_start": 14, - "page_end": 14, - "source_file": "pubmed9.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_SMFG_2011.pdf" } ] }, @@ -10965,70 +10965,70 @@ "target_page": 4, "target_passage": "The first CC License was created in 2002.", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 169, + "page_end": 169, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 368, + "page_end": 368, + "source_file": "00-80T-80.pdf" }, { - "text": "**Licenses and Public Domain Tools**\n\nThe first CC License was created in 2002. Today, we boast**six CC Licenses**and \ntwo public domain tools, setting a global standard for sharing. \n\n**We’ve estimated that over 2.5 billion pieces of content**\n**were CC Licensed by the end of 2023.**\n\nOur legal and technology staff \ncontinued to make key \ninfrastructure updates and \nmanage daily maintenance to \nensure these Licenses work for \neveryone. ", - "page_start": 4, - "page_end": 4, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + "text": "", + "page_start": 369, + "page_end": 369, + "source_file": "00-80T-80.pdf" }, { - "text": "**3.2.6 How to view licensing information**\n\nLicensing information is available for all datasets associated with common licences, which are \nsupported by the Licence Assistant. When available a link to the assistant is provided on left side of a \ndataset page. \n\nBy clicking on the**licence name**(here: cc-by), the Licence Assistant tool is opened in a new window, \ndisplaying relevant information for this particular licence. ", - "page_start": 34, - "page_end": 34, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + "text": "", + "page_start": 369, + "page_end": 369, + "source_file": "00-80T-80.pdf" }, { - "text": "with. The vast majority of in-copyright books are out-of-print or out-of-commerce, and most \nare not actively managed by their rightsholders. There is no official registry of copyrighted \nworks and their owners, and existing datasets can be incomplete or erroneous. 16 \n\nAs a result, there may be no way to license the vast majority of in-copyright books, especially \nthose that have or have had limited commercial value. \n Put differently, the barrier to using \nmost books is not simply to pay publishers; even if one had significant financial resources, \nlicensing would not enable access to most works. \n\n17 \n\n**Permissively licensed works**\n\nThere are books that have been permissively licensed in an easily identifiable way, such as \nworks placed under Creative Commons (CC) licenses. Such works explicitly allow particular \nuses of works subject to various responsibilities (e.g., requiring attribution by the user in their \nfollow-on use). \n\nWhile such works could be candidates for inclusion in a books data commons, their inclusion \ndepends on whether the license’s terms can be complied with in the context of AI training. \nFor instance, in the context of CC licensed works, there are requirements for proper \nattribution across all licenses (the CC tools Public Domain Dedication (CC0) and Public \nDomain Mark (PDM) are not licenses and do not require attribution). 18 ", - "page_start": 10, - "page_end": 10, - "source_file": "creative_common_ai.pdf" + "text": "", + "page_start": 369, + "page_end": 369, + "source_file": "00-80T-80.pdf" }, { - "text": "**In 2023, we greatly expanded our CC Licenses**\n**training and education offerings:**\n\n**19 Workshops & Trainings**\nwith institutions like ALA, Connecticut Humanities & State University of New York, \nDigital Research Alliance of Canada, and WikiConf North America. \n\n**2 Week-Long CC Certificate Bootcamps**\nfor California Community Colleges. \n\n**27 Webinars**\non topics like the basics of Open Culture, the possibilties of Open Educational \nResources (OER) for business-university cooperation, and the future of CC Licenses \nin digital and online education. \n\n**12 CC Legal Open Office Hours**\nhosted by our legal team, providing a personalized opportunity for the CC \ncommunity to ask questions about CC Licenses, open access, and sharing. ", - "page_start": 5, - "page_end": 5, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + "text": "", + "page_start": 368, + "page_end": 368, + "source_file": "00-80T-80.pdf" }, { - "text": "| | Understanding\nCreative Commons\nlicense\nbefore licensing your work | |\n|---|---|---|\n| | Understanding Creative Commons license before licensing your work | |\n| | | |\n| | THREE-LAYER DESIGN Creative Commons (CC) license has three layers: \"Legal Code\" (base layer): contains terms and conditions to be used by lawyers and legally applicable in court. \"Human Readable\" (commons deeds): contain the summary of the legal code and key terms. \"Machine Readable\": contains HTML or codes for machines to recognize a work is available under a Creative Commons license. | |\n| | FOUR ELEMENTS BY (\"Attribution\"): users must credit the author of the work they are using. BY NC SA (\"ShareAlike\"): adaptations based on this work must be licensed under the same license. NC (\"NonCommercial\"): the work is only available to be used for noncommercial purposes. ND (\"NoDerivative\"): reusers making cannot share adaptations of SA ND the work. | |\n| | SIX LICENSES » open share, commercialize CC BY (\"Attribution\") allows people to use the work for any purpose (even & more commercially and even in modified form) as long as they give attribution to the remix, can creator. you CC BY-SA (\"Attribution-ShareAlike\") allows people to use the work for any purpose (even commercially and even in modified form), as long as they give attribution to the creator and make any adaptations they share with others available under the same or & a compatible license. share only CC BY-NC (\"Attribution-NonCommercial\") allows people to use the work for remix noncommercial purposes only, and only as long as they give attribution to the can creator. you CC BY-NC-SA (\"Attribution-NonCommercial-ShareAlike\") allows people to use the work for noncommercial purposes only, and only as long as they give attribution to only the creator and make any adaptations they share with others available under the restrictive same or a compatible license. share CC BY-ND (\"Attribution-NoDerivative\") allows people to use the unadapted work for can any purpose (even commercially), as long as they give attribution to the creator. more you CC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the « unadapted work for noncommercial purposes only, and only as long as they give attribution to the licensor. | |\n| | REMIND THAT… CC license only applicable to the work that is within the scope of copyright law. CC license can be used when … you want to give others permissions to freely copy and redistribute your work, and you want to give others permission to freely transform, alter, or otherwise create derivative works based on your work. | |\n| | CC LICENSE CAN'T BE USED FOR … fair use, fair dealing, or some other limitation and exception to copyright applies the the work. ALSO FOR … the work that is already in the Public Domain. For those who want to waive their rights from copyright protection, use CC0 (\"CC Zero\"). | |\n| | NOW, SHARE YOUR WORK! https://creativecommons.org/choose/ Texts are adapted from CC Certification for Educators. CC BY license. BY, SA, NC, ND icons, CC BY, CC BY-SA, CC BY-NC, CC BY-NC-SA, CC BY-ND, and CC BY-NC-ND buttons are trademark of Creative Commons, and subject to their policies. 3-layer design of CC license image is taken from CC Certification for Educators. CC BY license. Line, icons, and gradients are from Canva, and subject to their policies. | |\n", - "page_start": 1, - "page_end": 1, - "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + "text": "", + "page_start": 368, + "page_end": 368, + "source_file": "00-80T-80.pdf" }, { - "text": "What Is Creative Commons? \nCreative Commons is a global nonprofit organization \ndedicated to supporting an open and accessible Internet \nthat is enriched with free knowledge and creative resources \nfor people around the world to use, share, and cultivate. \n\nOur easy-to-use licenses provide a simple, standardized way \nto give the public permission to share and use your creative \nwork — on conditions of your choice. CC licenses let you \nchange your copyright terms from the default of “all rights \nreserved” to “some rights reserved.” \n\nMillions of people use CC licenses on some of the world’s \nmost popular platforms for user-generated content. When \nyou use a CC license to share your photos, videos, or blog, \nyour creation joins a globally accessible pool of resources \nthat includes the work of artists, educators, scientists, and \ngovernments. ", - "page_start": 1, - "page_end": 1, - "source_file": "Publicdomain.pdf" + "text": "", + "page_start": 368, + "page_end": 368, + "source_file": "00-80T-80.pdf" }, { - "text": "**Copyright:**© 2025 by the authors. \nLicensee MDPI, Basel, Switzerland. \nThis article is an open access article \ndistributed under the terms and \nconditions of the Creative Commons \nAttribution (CC BY) license \n(https://creativecommons.org/ \nlicenses/by/4.0/). ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed7_cc4.pdf" + "text": "", + "page_start": 367, + "page_end": 367, + "source_file": "00-80T-80.pdf" }, { - "text": "© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access \narticle distributed under the terms and conditions of the Creative Commons Attribution \n(CC BY) license (http://creativecommons.org/licenses/by/4.0/). ", - "page_start": 22, - "page_end": 22, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 369, + "page_end": 369, + "source_file": "00-80T-80.pdf" } ] }, @@ -11045,64 +11045,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 222, + "page_end": 222, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 322, + "page_end": 322, + "source_file": "00-80T-80.pdf" }, { - "text": "This is a frame from “Twenty Years of Creative Commons (in Sixty Seconds)” by Ryan Junell and Glenn \nOtis Brown for Creative Commons licensed under CC BY 4.0. It includes adaptations of multiple open \nand public domain works. View full licensing and attribution information about all works included in the \nvideo on Flickr. ", - "page_start": 12, - "page_end": 12, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + "text": "", + "page_start": 320, + "page_end": 320, + "source_file": "00-80T-80.pdf" }, { - "text": "© The Author(s) 2023. Published by Oxford University Press. \nThis is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which \npermits unrestricted reuse, distribution, and reproduction in any medium, provided the original work is properly cited. ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed1.pdf" + "text": "", + "page_start": 320, + "page_end": 320, + "source_file": "00-80T-80.pdf" }, { - "text": "What Is Creative Commons? \nCreative Commons is a global nonprofit organization \ndedicated to supporting an open and accessible Internet \nthat is enriched with free knowledge and creative resources \nfor people around the world to use, share, and cultivate. \n\nOur easy-to-use licenses provide a simple, standardized way \nto give the public permission to share and use your creative \nwork — on conditions of your choice. CC licenses let you \nchange your copyright terms from the default of “all rights \nreserved” to “some rights reserved.” \n\nMillions of people use CC licenses on some of the world’s \nmost popular platforms for user-generated content. When \nyou use a CC license to share your photos, videos, or blog, \nyour creation joins a globally accessible pool of resources \nthat includes the work of artists, educators, scientists, and \ngovernments. ", - "page_start": 1, - "page_end": 1, - "source_file": "Publicdomain.pdf" + "text": "", + "page_start": 320, + "page_end": 320, + "source_file": "00-80T-80.pdf" }, { - "text": "**Publisher’s note**Springer Nature remains neutral with regard to jurisdictional claims in \npublished maps and institutional affiliations. \n\n**Open Access**This article is licensed under a Creative Commons Attribution \n4.0 International License, which permits use, sharing, adaptation, distribution \nand reproduction in any medium or format, as long as you give appropriate \n\ncredit to the original author(s) and the source, provide a link to the Creative Commons licence, \nand indicate if changes were made. The images or other third party material in this article are \nincluded in the article’s Creative Commons licence, unless indicated otherwise in a credit line \nto the material. If material is not included in the article’s Creative Commons licence and your \nintended use is not permitted by statutory regulation or exceeds the permitted use, you will \nneed to obtain permission directly from the copyright holder. To view a copy of this licence, \nvisit http://creativecommons.org/licenses/by/4.0/. genome-wide genealogies. Preprint at*bioRxiv*https://doi.org/10.1101/2021.07.13.452277 \n(2021). \n41. Coop, G. Genetic similarity versus genetic ancestry groups as sample descriptors in \nhuman genetics. Preprint at https://arxiv.org/abs/2207.11595 (2022). \n© The Author(s) 2025 ", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed3.pdf" + "text": "", + "page_start": 320, + "page_end": 320, + "source_file": "00-80T-80.pdf" }, { - "text": "2023 was a busy year at Creative \nCommons. Our**Open Culture**program \nand**Open Climate Campaign**entered \ntheir third and second years, respectively. \nWe hosted our first in-person CC Global \nSummit since 2019 in Mexico City. We \nheld critical consultations and open \npanels on AI, copyright, and the CC \nLicenses, cultural heritage, education, \nand science; and we launched our**Open**\n**Infrastructure Circle**in an effort to \nensure the CC Licenses are funded well \ninto the future. ", - "page_start": 3, - "page_end": 3, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + "text": "", + "page_start": 320, + "page_end": 320, + "source_file": "00-80T-80.pdf" }, { - "text": "**Copyright:**© 2025 by the authors. \nLicensee MDPI, Basel, Switzerland. \nThis article is an open access article \ndistributed under the terms and \nconditions of the Creative Commons \nAttribution (CC BY) license \n(https://creativecommons.org/ \nlicenses/by/4.0/). ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed7_cc4.pdf" + "text": "", + "page_start": 320, + "page_end": 320, + "source_file": "00-80T-80.pdf" }, { - "text": "**Funding**\nFunding was provided by the National Key Research and Development program of China (Grant Nos. \n2019YFA0607403 and 2017YFD0300301) and National Natural Science Foundation of China (Grant Nos. \n41961124007 and 41871026). \n\n**Competing interests**\nThe authors declare no competing interests. \n\n**Additional information**\n**Correspondence**and requests for materials should be addressed to K.L. \n\n**Reprints and permissions information**is available at www.nature.com/reprints. \n\n**Publisher’s note**Springer Nature remains neutral with regard to jurisdictional claims in published maps and \ninstitutional affiliations. \n\n**Open Access**This article is licensed under a Creative Commons Attribution 4.0 International \nLicense, which permits use, sharing, adaptation, distribution and reproduction in any medium or \nformat, as long as you give appropriate credit to the original author(s) and the source, provide a link to the \nCreative Commons licence, and indicate if changes were made. The images or other third party material in this \narticle are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the \nmaterial. If material is not included in the article’s Creative Commons licence and your intended use is not \npermitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from \nthe copyright holder. To view a copy of this licence, visit http:// creat iveco mmons. org/ licen ses/ by/4. 0/. ", - "page_start": 14, - "page_end": 14, - "source_file": "pubmed9.pdf" + "text": "", + "page_start": 320, + "page_end": 320, + "source_file": "00-80T-80.pdf" }, { - "text": "© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access \narticle distributed under the terms and conditions of the Creative Commons Attribution \n(CC BY) license (http://creativecommons.org/licenses/by/4.0/). ", - "page_start": 22, - "page_end": 22, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 320, + "page_end": 320, + "source_file": "00-80T-80.pdf" } ] }, @@ -11113,70 +11113,70 @@ "target_page": 3, "target_passage": "Killam Properties Inc. is a growth oriented Canadian real estate company.", "chunk_present": { - "presence": true, - "index": 9 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 337, + "page_end": 337, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 372, + "page_end": 372, + "source_file": "00-80T-80.pdf" }, { - "text": "The Company’s significant investment in subsidiaries and a joint venture, all of which are incorporated in Canada, are listed in the following \ntable: \n\n**Subsidiary** **% Interest**\n\nKillam Properties Inc. 100% \n\nKillam investments inc. 100% \n\nKillam investments (Pei) inc. 100% \n\nKillam Properties Apartments Trust 100% \n\nKillam Properties M.H.C. Trust 100% \n\n661047 n.B. inc. 100% \n\nBlackshire court limited 100% \n\nBlackshire court limited Partnership 95.92% \n\nKillam KFH (180 mill st.) inc. 100% \n\nKillam KFH (Kanata lakes) inc. 100% \n\nKillam KFH (1355 silver spear road) inc. 100% \n\nKillam KFH sigma GP inc. 50% \n\nKillam KFH‑Sigma Properties LP 25% ", - "page_start": 70, - "page_end": 70, - "source_file": "TSX_KMP_2013.pdf" + "text": "", + "page_start": 372, + "page_end": 372, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\nKillam properties inc \n**2013 annual report**", - "page_start": 1, - "page_end": 1, - "source_file": "TSX_KMP_2013.pdf" + "text": "", + "page_start": 372, + "page_end": 372, + "source_file": "00-80T-80.pdf" }, { - "text": "Killam complements its acquisition program with the construction of apartment buildings. During 2013, Killam completed the development \nof four projects totalling 282 units and commenced two additional projects in the second half of the year. Management does not expect \ndevelopments to exceed 5% of the total asset base in any given year. \n\nIn addition, the Company owns MHCs, also known as land‑lease communities or trailer parks. Killam owns the land and infrastructure supporting \neach community and leases the lots to tenants, who own their own homes and pay Killam a monthly site rent. Killam owns 35 communities \nwhich accounted for 14% of Killam’s NOI in 2013. During the year Killam sold ten MHC properties located in New Brunswick, allowing the \nCompany to crystallize the value of the properties at attractive cap‑rates and use the funds to continue to grow the apartment portfolio. \n\n**Key Performance Indicators (KPIs)**\n\nManagement measures Killam’s performance based on the following KPIs: ", - "page_start": 23, - "page_end": 23, - "source_file": "TSX_KMP_2013.pdf" + "text": "", + "page_start": 372, + "page_end": 372, + "source_file": "00-80T-80.pdf" }, { - "text": "**PART II**\n\n**Business Overview**\n\nKillam Properties Inc., based in Halifax, Nova Scotia, is one of Canada’s largest residential landlords, owning, operating, managing and developing \nmulti‑family residential and Manufactured Home Community (“MHC”) properties. Killam’s 164 apartment properties are located in Atlantic \nCanada’s six largest urban centres and in Ontario. The Company’s 35 MHCs are located in Ontario and Atlantic Canada. The value of Killam’s \nreal estate assets at December 31, 2013, was $1.5 billion. Killam is focused on growing its portfolio, maximizing the value of its properties and \nincreasing FFo per share. \n\nKillam was founded in 2000, based on the recognition of an opportunity to create value through the consolidation of apartments in Atlantic \nCanada and MHCs across Canada. Killam’s first apartment was purchased in 2002 and its first MHC was purchased in 2003. From 2002 to 2009, \nKillam’s apartment portfolio grew through the acquisition of properties in Atlantic Canada’s six largest cities, namely Halifax, Moncton, Saint \nJohn, Fredericton, St. John’s and Charlottetown. Killam is now Atlantic Canada’s largest residential landlord, with a 14.2% market share of the \nmulti‑family rental units in these core markets. Killam entered the Ontario apartment market in 2010, and today owns twelve properties in the \nprovince, including assets in Toronto, Ottawa, London and Cambridge. Killam plans to expand its presence in Ontario with additional acquisitions \nand developments. The apartment business is Killam’s largest business segment, accounting for 86% of the Company’s NOI from property \noperations and equity income in 2013. At December 31, 2013, Killam’s apartment portfolio consisted of 12,647 units. ", - "page_start": 23, - "page_end": 23, - "source_file": "TSX_KMP_2013.pdf" + "text": "", + "page_start": 372, + "page_end": 372, + "source_file": "00-80T-80.pdf" }, { - "text": "Killam also has a 19% market share in Charlottetown, the capital and economic center of Prince Edward Island. \n\n**Expanding Ownership in Ontario**\n\nKillam’s apartment portfolio includes 1,359 apartment units in Ontario, up from 225 units three years ago, and includes properties in Ottawa, \nToronto, London and Cambridge. In addition to apartments, 42% of Killam’s MHC sites are located in Ontario. Killam is focused on increasing its \ngeographic diversification by acquiring more properties in Ontario. \n\n**A Diversified Portfolio of Apartment Properties**\n\nKillam’s apartment portfolio includes a variety of property types, including high‑rise (24% of units), mid‑rise with elevators (33%) , walk‑ups (41%) \nand a small number of townhouses (2%). The portfolio includes rents ranging from affordable to high‑end Class A properties. The average rent \nfor Killam’s apartment units at the end of 2013 was $915. \n\nThe average age of Killam’s apartment portfolio is 28 years. With a focus on both developing and acquiring newer properties, 23% of Killam’s \napartments are considered new (built after 2001), on a unit count basis. Compared to the national average of 7%, as per CMHC’s 2010 Housing \nObserver, Killam’s portfolio is considerably newer and should result in lower capital and maintenance costs for the foreseeable future. 43% of \nKillam’s noi is generated from apartment units that are considered new, with 20% of the company’s noi generated from units built in the last \nfive years. ", - "page_start": 33, - "page_end": 33, - "source_file": "TSX_KMP_2013.pdf" + "text": "", + "page_start": 372, + "page_end": 372, + "source_file": "00-80T-80.pdf" }, { - "text": "a Diversified portfolio \n\nKillam has a diverse portfolio of both apartments and manufactured home communities. The \napartment portfolio represents 86% of Killam’s earnings and includes a variety of property types, \nsuch as high-rises, mid-rises and walk-ups, in nine urban centres across five provinces. With a wide \nselection of properties and price points in each city, Killam caters to a broad tenant base. \nKillam’s 35 manufactured home communities represent 14% of earnings and are located \nprimarily in Nova Scotia and Ontario. The manufactured home communities complement the \napartment business, providing stable and predictable cash flows. ", - "page_start": 13, - "page_end": 13, - "source_file": "TSX_KMP_2013.pdf" + "text": "", + "page_start": 372, + "page_end": 372, + "source_file": "00-80T-80.pdf" }, { - "text": "Marketing and leasing initiatives have been a priority at Killam, including increasing the number of leasing agents, investment in marketing \npromotions (including a successful radio campaign) and expanding incentive offerings at specific properties. Management was pleased with the \nimprovements realized during the second half of the year. The marketing and leasing focus will continue in 2014 and will also include programs \ntargeting tenant retention. Killam’s expanded leasing process and well‑maintained, quality asset base has enabled Killam to outperform CMHC’s \nreported averages in Killam’s core markets in Atlantic Canada. Killam’s increased investment in Ontario has also been beneficial in 2013, with \nimprovement in occupancy during each quarter of the year. ", - "page_start": 37, - "page_end": 37, - "source_file": "TSX_KMP_2013.pdf" + "text": "", + "page_start": 105, + "page_end": 105, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "about Killam properties inc. \nKillam Properties Inc. is a growth oriented Canadian real estate \ncompany. We own, manage and develop multi-family residential \nproperties in Atlantic Canada and Ontario. Since our first acquisition \nin 2002, our real estate portfolio has grown to $1.5 billion and \nincludes 12,647 apartment units and 5,164 manufactured home \ncommunity (MHC) sites. We are committed to growing Killam’s \nearnings by maximizing the returns from our existing portfolio and \nexpanding through acquisitions and development. \n\nour mission \nTo have a team of caring staff deliver clean, safe, quality housing to \ntenants who are proud to call our properties home. \n\nour core Values \n\nDo the \n**Right**\nThing \nStrong \n**Customer**\nRelationships Creative \n**Solutions** Curb \n**Appeal** **Build**\nCommunity ", - "page_start": 3, - "page_end": 3, - "source_file": "TSX_KMP_2013.pdf" + "text": "", + "page_start": 373, + "page_end": 373, + "source_file": "00-80T-80.pdf" } ] }, @@ -11193,64 +11193,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 14, + "page_end": 14, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 314, + "page_end": 314, + "source_file": "sg246915.pdf" }, { - "text": "\n\nKillam properties inc \n**2013 annual report**", - "page_start": 1, - "page_end": 1, - "source_file": "TSX_KMP_2013.pdf" + "text": "", + "page_start": 388, + "page_end": 388, + "source_file": "00-80T-80.pdf" }, { - "text": "Killam also has a 19% market share in Charlottetown, the capital and economic center of Prince Edward Island. \n\n**Expanding Ownership in Ontario**\n\nKillam’s apartment portfolio includes 1,359 apartment units in Ontario, up from 225 units three years ago, and includes properties in Ottawa, \nToronto, London and Cambridge. In addition to apartments, 42% of Killam’s MHC sites are located in Ontario. Killam is focused on increasing its \ngeographic diversification by acquiring more properties in Ontario. \n\n**A Diversified Portfolio of Apartment Properties**\n\nKillam’s apartment portfolio includes a variety of property types, including high‑rise (24% of units), mid‑rise with elevators (33%) , walk‑ups (41%) \nand a small number of townhouses (2%). The portfolio includes rents ranging from affordable to high‑end Class A properties. The average rent \nfor Killam’s apartment units at the end of 2013 was $915. \n\nThe average age of Killam’s apartment portfolio is 28 years. With a focus on both developing and acquiring newer properties, 23% of Killam’s \napartments are considered new (built after 2001), on a unit count basis. Compared to the national average of 7%, as per CMHC’s 2010 Housing \nObserver, Killam’s portfolio is considerably newer and should result in lower capital and maintenance costs for the foreseeable future. 43% of \nKillam’s noi is generated from apartment units that are considered new, with 20% of the company’s noi generated from units built in the last \nfive years. ", - "page_start": 33, - "page_end": 33, - "source_file": "TSX_KMP_2013.pdf" + "text": "", + "page_start": 239, + "page_end": 239, + "source_file": "00-80T-80.pdf" }, { - "text": "The Company’s significant investment in subsidiaries and a joint venture, all of which are incorporated in Canada, are listed in the following \ntable: \n\n**Subsidiary** **% Interest**\n\nKillam Properties Inc. 100% \n\nKillam investments inc. 100% \n\nKillam investments (Pei) inc. 100% \n\nKillam Properties Apartments Trust 100% \n\nKillam Properties M.H.C. Trust 100% \n\n661047 n.B. inc. 100% \n\nBlackshire court limited 100% \n\nBlackshire court limited Partnership 95.92% \n\nKillam KFH (180 mill st.) inc. 100% \n\nKillam KFH (Kanata lakes) inc. 100% \n\nKillam KFH (1355 silver spear road) inc. 100% \n\nKillam KFH sigma GP inc. 50% \n\nKillam KFH‑Sigma Properties LP 25% ", - "page_start": 70, - "page_end": 70, - "source_file": "TSX_KMP_2013.pdf" + "text": "", + "page_start": 239, + "page_end": 239, + "source_file": "00-80T-80.pdf" }, { - "text": "Killam complements its acquisition program with the construction of apartment buildings. During 2013, Killam completed the development \nof four projects totalling 282 units and commenced two additional projects in the second half of the year. Management does not expect \ndevelopments to exceed 5% of the total asset base in any given year. \n\nIn addition, the Company owns MHCs, also known as land‑lease communities or trailer parks. Killam owns the land and infrastructure supporting \neach community and leases the lots to tenants, who own their own homes and pay Killam a monthly site rent. Killam owns 35 communities \nwhich accounted for 14% of Killam’s NOI in 2013. During the year Killam sold ten MHC properties located in New Brunswick, allowing the \nCompany to crystallize the value of the properties at attractive cap‑rates and use the funds to continue to grow the apartment portfolio. \n\n**Key Performance Indicators (KPIs)**\n\nManagement measures Killam’s performance based on the following KPIs: ", - "page_start": 23, - "page_end": 23, - "source_file": "TSX_KMP_2013.pdf" + "text": "", + "page_start": 240, + "page_end": 240, + "source_file": "00-80T-80.pdf" }, { - "text": "With strong demand for the acquisition of apartments over the last three years, cap‑rates have declined and the pricing differential between \nolder and newer buildings has reduced. This enables Killam to increase the amount of newer apartments in its portfolio without paying a \nsignificant premium for quality assets. \n\n**Geographic Diversification**\n\nGeographic diversification in the apartment segment is a priority for Killam. With a 14.2% market share in its core markets in Atlantic Canada, \nKillam is the region’s largest residential landlord. The maximum market share Management foresees Killam reaching in Atlantic Canada is \nbetween 15%‑18%. With Atlantic Canada representing only 4.9% of the Canadian rental market, Killam’s growth opportunities increase \nsignificantly when considering assets outside Atlantic Canada. \n\nWith its strong operating platform, Killam can support a larger and more geographically diverse portfolio. The Company is actively building \na portfolio in targeted Ontario markets, including Ottawa, the Greater Toronto Area, and Southwestern Ontario. An increased investment in \nOntario, and potentially Western Canada, will increase the Company’s diversification and exposure in high growth centres in Canada. Based on \nthe Company’s portfolio at year‑end, 15% of Killam’s 2014 NOI will be generated in Ontario. Management has set a long‑term target of growing \nthe amount of NOI generated outside of Atlantic Canada to 50%. ", - "page_start": 29, - "page_end": 29, - "source_file": "TSX_KMP_2013.pdf" + "text": "", + "page_start": 388, + "page_end": 388, + "source_file": "00-80T-80.pdf" }, { - "text": "**Business Strategy**\n\n**Maximize NOI from Existing Portfolio**\n\nManagement is focused on increasing the value of its real estate portfolio by maximizing revenue and operating efficiencies. To achieve NOI \ngrowth, Killam must address three critical factors; occupancy, rental rates, and operating costs. The Company focuses on customer service, \ninvesting in its properties, leasing and marketing initiatives, and training its employees to maximize these outcomes. \n\nManagement is able to directly control approximately 40% of operating expenses, including labour costs, repairs and maintenance and property \ngeneral and administrative expenses. The remaining operating costs, including utilities and property taxes, are less controllable. Killam’s \napartments are currently heated with a combination of natural gas, electricity and oil. Volatile oil and natural gas prices have an impact on \nKillam’s operating costs. To mitigate this volatility, the Company is active in energy conservation initiatives and regularly monitors its energy \nusage. \n\n**Growth through Acquisitions**\n\nKillam is expanding its portfolio by acquiring newer, centrally located buildings and is focused on Ontario. During 2013 Killam completed $121.1 \nmillion in acquisitions, including properties in Toronto, Ottawa, Moncton and Prince Edward Island. \n\n**Growth through Development**\n\nKillam enhances its portfolio growth opportunities by developing properties. Killam started apartment developments in 2010 and has completed \nfive properties to‑date, including four in 2013. Building new properties directly allows Killam to control the quality and features of the buildings, \nmaximizes the use of excess land and eliminates the seller’s profit, generating higher returns than through acquisitions. Management expects to \nlimit development projects to approximately 5% of the balance sheet on an annual basis. ", - "page_start": 29, - "page_end": 29, - "source_file": "TSX_KMP_2013.pdf" + "text": "", + "page_start": 314, + "page_end": 314, + "source_file": "sg246915.pdf" }, { - "text": "increasing Geographic \nDiversification \n\nWith a home base in Halifax, Killam’s roots are in atlantic canada and the \ncompany has successfully grown by consolidating the residential real estate \nmarket in the region’s urban centres. in order to meet its long-term growth \ntargets and increase its investment in canada’s most dynamic real estate \nmarkets, Killam has been actively expanding its apartment portfolio in ontario \nand is exploring investment opportunities in Western canada. since 2010, \nKillam has expanded its apartment target markets to include specific cities \nin ontario, and has invested approximately $200 million in real estate assets \nin the province. approximately 15% of Killam’s 2014 net operating income is \nexpected to be earned in ontario. the company has set a long-term target to \nearn 50% of its net operating income outside atlantic canada. ", - "page_start": 17, - "page_end": 17, - "source_file": "TSX_KMP_2013.pdf" + "text": "", + "page_start": 314, + "page_end": 314, + "source_file": "sg246915.pdf" }, { - "text": "**Dear Shareholders,**\n\nI am pleased to review Killam’s 2013 performance with you, and outline our strategy and plans for the \nfuture. We are progressing nicely with our priorities to increase the quality of our portfolio and expand \ngeographically. In addition, we are focused on three key areas of growth for the Company: increase the \nvalue of our existing portfolio, acquire accretively and develop profitably. \n\nDuring the past year we expanded communication of our corporate strategy to reach the broader Killam \ncommunity with the introduction of Killam’s Core Values. These values have been inherent in the Company \nsince our first acquisition in 2002, but had not been broadly promoted until this past year. Our Core Values \n(Curb Appeal, Build Community, Strong Customer Relationships, Do the Right Thing and Creative Solutions) \n\nare represented in the colourful squares you will see throughout this year’s \nreport. Killam employees across the Company demonstrate these values in their \ndaily work, distinguishing Killam as a high-quality landlord. The introduction of a \nquarterly awards program, which recognizes employees who exemplify Killam’s \n\nCore Values, enables us to celebrate these values. I have been impressed by both the number and quality \nof nominations. We truly have a remarkable group of employees who go above and beyond in providing \nexceptional service to our tenants. ", - "page_start": 9, - "page_end": 9, - "source_file": "TSX_KMP_2013.pdf" + "text": "", + "page_start": 315, + "page_end": 315, + "source_file": "sg246915.pdf" } ] }, @@ -11267,64 +11267,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 355, + "page_end": 355, + "source_file": "00-80T-80.pdf" }, - { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + { + "text": "", + "page_start": 378, + "page_end": 378, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\nKillam properties inc \n**2013 annual report**", - "page_start": 1, - "page_end": 1, - "source_file": "TSX_KMP_2013.pdf" + "text": "", + "page_start": 379, + "page_end": 379, + "source_file": "00-80T-80.pdf" }, { - "text": "Killam complements its acquisition program with the construction of apartment buildings. During 2013, Killam completed the development \nof four projects totalling 282 units and commenced two additional projects in the second half of the year. Management does not expect \ndevelopments to exceed 5% of the total asset base in any given year. \n\nIn addition, the Company owns MHCs, also known as land‑lease communities or trailer parks. Killam owns the land and infrastructure supporting \neach community and leases the lots to tenants, who own their own homes and pay Killam a monthly site rent. Killam owns 35 communities \nwhich accounted for 14% of Killam’s NOI in 2013. During the year Killam sold ten MHC properties located in New Brunswick, allowing the \nCompany to crystallize the value of the properties at attractive cap‑rates and use the funds to continue to grow the apartment portfolio. \n\n**Key Performance Indicators (KPIs)**\n\nManagement measures Killam’s performance based on the following KPIs: ", - "page_start": 23, - "page_end": 23, - "source_file": "TSX_KMP_2013.pdf" + "text": "", + "page_start": 379, + "page_end": 379, + "source_file": "00-80T-80.pdf" }, { - "text": "In 2013, Killam sold a portfolio of ten MHCs in New Brunswick that allowed Killam to crystallize the increased value of this portfolio at attractive \ncap‑rates. This creates moderate short‑term dilution but it provides the Company with funds to continue its geographic diversification by \naccretively growing its apartment portfolio in Ontario. ", - "page_start": 29, - "page_end": 29, - "source_file": "TSX_KMP_2013.pdf" + "text": "", + "page_start": 379, + "page_end": 379, + "source_file": "00-80T-80.pdf" }, { - "text": "Marketing and leasing initiatives have been a priority at Killam, including increasing the number of leasing agents, investment in marketing \npromotions (including a successful radio campaign) and expanding incentive offerings at specific properties. Management was pleased with the \nimprovements realized during the second half of the year. The marketing and leasing focus will continue in 2014 and will also include programs \ntargeting tenant retention. Killam’s expanded leasing process and well‑maintained, quality asset base has enabled Killam to outperform CMHC’s \nreported averages in Killam’s core markets in Atlantic Canada. Killam’s increased investment in Ontario has also been beneficial in 2013, with \nimprovement in occupancy during each quarter of the year. ", - "page_start": 37, - "page_end": 37, - "source_file": "TSX_KMP_2013.pdf" + "text": "", + "page_start": 379, + "page_end": 379, + "source_file": "00-80T-80.pdf" }, { - "text": "**Business Strategy**\n\n**Maximize NOI from Existing Portfolio**\n\nManagement is focused on increasing the value of its real estate portfolio by maximizing revenue and operating efficiencies. To achieve NOI \ngrowth, Killam must address three critical factors; occupancy, rental rates, and operating costs. The Company focuses on customer service, \ninvesting in its properties, leasing and marketing initiatives, and training its employees to maximize these outcomes. \n\nManagement is able to directly control approximately 40% of operating expenses, including labour costs, repairs and maintenance and property \ngeneral and administrative expenses. The remaining operating costs, including utilities and property taxes, are less controllable. Killam’s \napartments are currently heated with a combination of natural gas, electricity and oil. Volatile oil and natural gas prices have an impact on \nKillam’s operating costs. To mitigate this volatility, the Company is active in energy conservation initiatives and regularly monitors its energy \nusage. \n\n**Growth through Acquisitions**\n\nKillam is expanding its portfolio by acquiring newer, centrally located buildings and is focused on Ontario. During 2013 Killam completed $121.1 \nmillion in acquisitions, including properties in Toronto, Ottawa, Moncton and Prince Edward Island. \n\n**Growth through Development**\n\nKillam enhances its portfolio growth opportunities by developing properties. Killam started apartment developments in 2010 and has completed \nfive properties to‑date, including four in 2013. Building new properties directly allows Killam to control the quality and features of the buildings, \nmaximizes the use of excess land and eliminates the seller’s profit, generating higher returns than through acquisitions. Management expects to \nlimit development projects to approximately 5% of the balance sheet on an annual basis. ", - "page_start": 29, - "page_end": 29, - "source_file": "TSX_KMP_2013.pdf" + "text": "", + "page_start": 379, + "page_end": 379, + "source_file": "00-80T-80.pdf" }, { - "text": "**Dear Shareholders,**\n\nI am pleased to review Killam’s 2013 performance with you, and outline our strategy and plans for the \nfuture. We are progressing nicely with our priorities to increase the quality of our portfolio and expand \ngeographically. In addition, we are focused on three key areas of growth for the Company: increase the \nvalue of our existing portfolio, acquire accretively and develop profitably. \n\nDuring the past year we expanded communication of our corporate strategy to reach the broader Killam \ncommunity with the introduction of Killam’s Core Values. These values have been inherent in the Company \nsince our first acquisition in 2002, but had not been broadly promoted until this past year. Our Core Values \n(Curb Appeal, Build Community, Strong Customer Relationships, Do the Right Thing and Creative Solutions) \n\nare represented in the colourful squares you will see throughout this year’s \nreport. Killam employees across the Company demonstrate these values in their \ndaily work, distinguishing Killam as a high-quality landlord. The introduction of a \nquarterly awards program, which recognizes employees who exemplify Killam’s \n\nCore Values, enables us to celebrate these values. I have been impressed by both the number and quality \nof nominations. We truly have a remarkable group of employees who go above and beyond in providing \nexceptional service to our tenants. ", - "page_start": 9, - "page_end": 9, - "source_file": "TSX_KMP_2013.pdf" + "text": "", + "page_start": 163, + "page_end": 163, + "source_file": "sg246915.pdf" }, { - "text": "Killam also has a 19% market share in Charlottetown, the capital and economic center of Prince Edward Island. \n\n**Expanding Ownership in Ontario**\n\nKillam’s apartment portfolio includes 1,359 apartment units in Ontario, up from 225 units three years ago, and includes properties in Ottawa, \nToronto, London and Cambridge. In addition to apartments, 42% of Killam’s MHC sites are located in Ontario. Killam is focused on increasing its \ngeographic diversification by acquiring more properties in Ontario. \n\n**A Diversified Portfolio of Apartment Properties**\n\nKillam’s apartment portfolio includes a variety of property types, including high‑rise (24% of units), mid‑rise with elevators (33%) , walk‑ups (41%) \nand a small number of townhouses (2%). The portfolio includes rents ranging from affordable to high‑end Class A properties. The average rent \nfor Killam’s apartment units at the end of 2013 was $915. \n\nThe average age of Killam’s apartment portfolio is 28 years. With a focus on both developing and acquiring newer properties, 23% of Killam’s \napartments are considered new (built after 2001), on a unit count basis. Compared to the national average of 7%, as per CMHC’s 2010 Housing \nObserver, Killam’s portfolio is considerably newer and should result in lower capital and maintenance costs for the foreseeable future. 43% of \nKillam’s noi is generated from apartment units that are considered new, with 20% of the company’s noi generated from units built in the last \nfive years. ", - "page_start": 33, - "page_end": 33, - "source_file": "TSX_KMP_2013.pdf" + "text": "", + "page_start": 163, + "page_end": 163, + "source_file": "sg246915.pdf" }, { - "text": "The Company’s significant investment in subsidiaries and a joint venture, all of which are incorporated in Canada, are listed in the following \ntable: \n\n**Subsidiary** **% Interest**\n\nKillam Properties Inc. 100% \n\nKillam investments inc. 100% \n\nKillam investments (Pei) inc. 100% \n\nKillam Properties Apartments Trust 100% \n\nKillam Properties M.H.C. Trust 100% \n\n661047 n.B. inc. 100% \n\nBlackshire court limited 100% \n\nBlackshire court limited Partnership 95.92% \n\nKillam KFH (180 mill st.) inc. 100% \n\nKillam KFH (Kanata lakes) inc. 100% \n\nKillam KFH (1355 silver spear road) inc. 100% \n\nKillam KFH sigma GP inc. 50% \n\nKillam KFH‑Sigma Properties LP 25% ", - "page_start": 70, - "page_end": 70, - "source_file": "TSX_KMP_2013.pdf" + "text": "", + "page_start": 163, + "page_end": 163, + "source_file": "sg246915.pdf" } ] }, @@ -11341,64 +11341,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 313, + "page_end": 313, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, + "text": "", + "page_start": 50, + "page_end": 50, "source_file": "Excel Training Manual 1.pdf" }, { - "text": "×1.6 \n×1.9 \n×3.7 \n- \n×77 \n×22 \n×9.4 \n×4 \n×2.5‡ \n×9 \n×2 \n×27∗∗ \n×434‡ BERT6 \nBERT6 \nBERT3 \nBERT6 \nBERT12 \nBERT12 \nBERT4 \nBERT24 \nBERT6 \nBERT8 \nBERT6 \nmBERT3 \nBiLSTM1 MNLI, QQP, SST-2 \n\n- \n- \n- BERT12 MNLI, SST-2, CoNLL-03, SQuAD \nBERT12 \nBERT12 MNLI \nNo WNLI, MNLI; SQuAD \n\n98%‡ \n99%‡ \n94%¶ \n94–100% ×1.9‡ \n- \n- \n- BERT24 \nBERT24 \nBERT12 MNLI, QQP, SQuAD \nBERT12 \n\nSQuAD, Natural Questions \nNo WNLI, STS-B; SQuAD \n\nNo MNLI-mm; SQuAD \n\n† MNLI, SST-2 \n† MNLI, SST-2 \nNo WNLI \nNo WNLI; RACE 97% \n107% \n98% \n99% - \n- \n×1.9 \n×2–4.5 BERT12 \nBERT12 \nBERT6 \nBERT12 ", - "page_start": 11, - "page_end": 11, - "source_file": "arxiv2_taclccby4_license.pdf" + "text": "", + "page_start": 51, + "page_end": 51, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "3.3 World knowledge \n\nThe bulk of evidence about commonsense knowl- \nedge captured in BERT comes from practitioners \nusing it to extract such knowledge. One direct prob- \ning study of BERT reports that BERT struggles \nwith pragmatic inference and role-based event \nknowledge (Ettinger, 2019). BERT also struggles \nwith abstract attributes of objects, as well as visual \nand perceptual properties that are likely to be as- \nsumed rather than mentioned (Da and Kasai, 2019). \nThe MLM component of BERT is easy to \nadapt for knowledge induction by filling in the Furthermore, different probing methods may \nlead to complementary or even contradictory con- \nclusions, which makes a single test (as in most stud- ", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv2_taclccby4_license.pdf" + "text": "", + "page_start": 200, + "page_end": 200, + "source_file": "00-80T-80.pdf" }, { - "text": "improve BERT’s architecture, pre-training and fine- \ntuning. We conclude by discussing the issue of \noverparameterization, the approaches to compress- \ning BERT, and the nascent area of pruning as a \nmodel analysis technique. ", - "page_start": 1, - "page_end": 1, - "source_file": "arxiv2_taclccby4_license.pdf" + "text": "", + "page_start": 51, + "page_end": 51, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "BERT struggles with representations of num- \nbers. Addition and number decoding tasks showed \nthat BERT does not form good representations for \nfloating point numbers and fails to generalize away \nfrom the training data (Wallace et al., 2019b). A \npart of the problem is BERT’s wordpiece tokeniza- \ntion, since numbers of similar values can be divided \nup into substantially different word chunks. \n\nHowever, BERT cannot reason based on its \nworld knowledge. Forbes et al. (2019) show that \nBERT can \"guess\" the affordances and properties of \nmany objects, but can not reason about the relation- \nship between properties and affordances. For ex- \nample, it “knows\" that people can walk into houses, \nand that houses are big, but it cannot infer that \nhouses are bigger than people. Zhou et al. (2020) \nand Richardson and Sabharwal (2019) also show \nthat the performance drops with the number of nec- \nessary inference steps. Some of BERT’s world \nknowledge success comes from learning stereotypi- \ncal associations (Poerner et al., 2019), e.g., a person \nwith an Italian-sounding name is predicted to be \nItalian, even when it is incorrect. ", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv2_taclccby4_license.pdf" + "text": "", + "page_start": 51, + "page_end": 51, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "5.3 Pre-training BERT \n\nThe original BERT is a bidirectional Transformer \npre-trained on two tasks: next sentence prediction \n(NSP) and masked language model (MLM) (sec- \ntion 2). Multiple studies have come up with alter- \nnative training objectives to improve on BERT, \nwhich could be categorized as follows: ", - "page_start": 8, - "page_end": 8, - "source_file": "arxiv2_taclccby4_license.pdf" + "text": "", + "page_start": 51, + "page_end": 51, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "A big methodological challenge in the current \nNLP is that the reported performance improve- \nments of new models may well be within varia- \ntion induced by environment factors (Crane, 2018). \nBERT is not an exception. Dodge et al. (2020) \nreport significant variation for BERT fine-tuned \non GLUE tasks due to both weight initialization \nand training data order. They also propose early \nstopping on the less-promising seeds. \n\nIn general, larger BERT models perform better \n(Liu et al., 2019a; Roberts et al., 2020), but not \nalways: BERT-base outperformed BERT-large on \nsubject-verb agreement (Goldberg, 2019) and sen- \ntence subject detection (Lin et al., 2019). Given \nthe complexity of language, and amounts of pre- \ntraining data, it is not clear why BERT ends up with \nredundant heads and layers. Clark et al. (2019) sug- \ngest that one possible reason is the use of attention \ndropouts, which causes some attention weights to \nbe zeroed-out during training. \n\nAlthough we hope that the above observations \nmay be useful for the practitioners, this section \ndoes not exhaust the current research on fine-tuning \nand its alternatives. For example, we do not cover \nsuch topics as Siamese architectures, policy gradi- \nent training, automated curriculum learning, and \nothers. ", - "page_start": 10, - "page_end": 10, - "source_file": "arxiv2_taclccby4_license.pdf" + "text": "", + "page_start": 51, + "page_end": 51, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "Since their introduction in 2017, Transformers \n(Vaswani et al., 2017) have taken NLP by storm, \noffering enhanced parallelization and better model- \ning of long-range dependencies. The best known \nTransformer-based model is BERT (Devlin et al., \n2019); it obtained state-of-the-art results in numer- \nous benchmarks and is still a must-have baseline. \nWhile it is clear that BERT works remarkably \nwell, it is less clear why, which limits further \nhypothesis-driven improvement of the architecture. \nUnlike CNNs, the Transformers have little cogni- \ntive motivation, and the size of these models limits \nour ability to experiment with pre-training and per- \nform ablation studies. This explains a large number \nof studies over the past year that attempted to un- \nderstand the reasons behind BERT’s performance. \nIn this paper, we provide an overview of what \nhas been learned to date, highlighting the questions \nwhich are still unresolved. We first consider the \nlinguistic aspects of it, i.e., the current evidence \nregarding the types of linguistic and world knowl- \nedge learned by BERT, as well as where and how \nthis knowledge may be stored in the model. We \nthen turn to the technical aspects of the model and \nprovide an overview of the current proposals to ", - "page_start": 1, - "page_end": 1, - "source_file": "arxiv2_taclccby4_license.pdf" + "text": "", + "page_start": 50, + "page_end": 50, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "3.2 Semantic knowledge \n\nTo date, more studies have been devoted to BERT’s \nknowledge of syntactic rather than semantic phe- \nnomena. However, we do have evidence from an \nMLM probing study that BERT has some knowl- \nedge of semantic roles (Ettinger, 2019). BERT \neven displays some preference for the incorrect \nfillers for semantic roles that are semantically re- \nlated to the correct ones, as opposed to those that \nare unrelated (e.g. \"to tip a chef\" is better than \"to \ntip a robin\", but worse than \"to tip a waiter\"). \n\nFigure 2: BERT world knowledge (Petroni et al., 2019) \n\nblanks (e.g. \"Cats like to chase [___]\"). Petroni \net al. (2019) showed that, for some relation types, \nvanilla BERT is competitive with methods rely- \ning on knowledge bases (Figure 2), and Roberts \net al. (2020) show the same for open-domain QA \nusing T5 model (Raffel et al., 2019). Davison et al. \n(2019) suggest that it generalizes better to unseen \ndata. In order to retrieve BERT’s knowledge, we \nneed good template sentences, and there is work \non their automatic extraction and augmentation \n(Bouraoui et al., 2019; Jiang et al., 2019b). \nTenney et al. (2019b) showed that BERT en- \ncodes information about entity types, relations, \nsemantic roles, and proto-roles, since this infor- \nmation can be detected with probing classifiers. ", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv2_taclccby4_license.pdf" + "text": "", + "page_start": 200, + "page_end": 200, + "source_file": "00-80T-80.pdf" } ] }, @@ -11409,70 +11409,70 @@ "target_page": 2, "target_passage": " As far as how syntaxis represented, it seems that syntactic structure is not directly encoded in self-attention weights.", "chunk_present": { - "presence": true, - "index": 5 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 320, + "page_end": 320, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 311, + "page_end": 311, + "source_file": "sg246915.pdf" }, { - "text": "×1.6 \n×1.9 \n×3.7 \n- \n×77 \n×22 \n×9.4 \n×4 \n×2.5‡ \n×9 \n×2 \n×27∗∗ \n×434‡ BERT6 \nBERT6 \nBERT3 \nBERT6 \nBERT12 \nBERT12 \nBERT4 \nBERT24 \nBERT6 \nBERT8 \nBERT6 \nmBERT3 \nBiLSTM1 MNLI, QQP, SST-2 \n\n- \n- \n- BERT12 MNLI, SST-2, CoNLL-03, SQuAD \nBERT12 \nBERT12 MNLI \nNo WNLI, MNLI; SQuAD \n\n98%‡ \n99%‡ \n94%¶ \n94–100% ×1.9‡ \n- \n- \n- BERT24 \nBERT24 \nBERT12 MNLI, QQP, SQuAD \nBERT12 \n\nSQuAD, Natural Questions \nNo WNLI, STS-B; SQuAD \n\nNo MNLI-mm; SQuAD \n\n† MNLI, SST-2 \n† MNLI, SST-2 \nNo WNLI \nNo WNLI; RACE 97% \n107% \n98% \n99% - \n- \n×1.9 \n×2–4.5 BERT12 \nBERT12 \nBERT6 \nBERT12 ", - "page_start": 11, - "page_end": 11, - "source_file": "arxiv2_taclccby4_license.pdf" + "text": "", + "page_start": 312, + "page_end": 312, + "source_file": "sg246915.pdf" }, { - "text": "layers are more transferable (Liu et al., 2019a). In \nfine-tuning, it explains why the final layers change \nthe most (Kovaleva et al., 2019), and why restoring \nthe weights of lower layers of fine-tuned BERT to \ntheir original values does not dramatically hurt the \nmodel performance (Hao et al., 2019). \n\nsistently better, but the gains varied by setting. \n\nAll in all, changes in the number of heads \nand layers appear to perform different func- \ntions. The issue of model depth must be related to \nthe information flow from the most task-specific \nlayers closer to the classifier (Liu et al., 2019a), \nto the initial layers which appear to be the most \ntask-invariant (Hao et al., 2019), and where the \ntokens resemble the input tokens the most (Brun- \nner et al., 2020) (see subsection 4.3). If that is the \ncase, a deeper model has more capacity to encode \ninformation that is not task-specific. \n\nTenney et al. (2019a) suggest that while syntactic \ninformation appears early in the model and can be \nlocalized, semantics is spread across the entire \nmodel, which explains why certain non-trivial ex- \namples get solved incorrectly at first but correctly \nat the later layers. This is rather to be expected: \nsemantics permeates all language, and linguists de- \nbate whether meaningless structures can exist at \nall (Goldberg, 2006, p.166-182). But this raises \nthe question of what stacking more Transformer \nlayers in BERT actually achieves in terms of the \nspread of semantic knowledge, and whether that \nis beneficial. Tenney et al. compared BERT-base \nand BERT-large, and found that the overall pattern \nof cumulative score gains is the same, only more \nspread out in the larger model. ", - "page_start": 7, - "page_end": 7, - "source_file": "arxiv2_taclccby4_license.pdf" + "text": "", + "page_start": 312, + "page_end": 312, + "source_file": "sg246915.pdf" }, { - "text": "A big methodological challenge in the current \nNLP is that the reported performance improve- \nments of new models may well be within varia- \ntion induced by environment factors (Crane, 2018). \nBERT is not an exception. Dodge et al. (2020) \nreport significant variation for BERT fine-tuned \non GLUE tasks due to both weight initialization \nand training data order. They also propose early \nstopping on the less-promising seeds. \n\nIn general, larger BERT models perform better \n(Liu et al., 2019a; Roberts et al., 2020), but not \nalways: BERT-base outperformed BERT-large on \nsubject-verb agreement (Goldberg, 2019) and sen- \ntence subject detection (Lin et al., 2019). Given \nthe complexity of language, and amounts of pre- \ntraining data, it is not clear why BERT ends up with \nredundant heads and layers. Clark et al. (2019) sug- \ngest that one possible reason is the use of attention \ndropouts, which causes some attention weights to \nbe zeroed-out during training. \n\nAlthough we hope that the above observations \nmay be useful for the practitioners, this section \ndoes not exhaust the current research on fine-tuning \nand its alternatives. For example, we do not cover \nsuch topics as Siamese architectures, policy gradi- \nent training, automated curriculum learning, and \nothers. ", - "page_start": 10, - "page_end": 10, - "source_file": "arxiv2_taclccby4_license.pdf" + "text": "", + "page_start": 192, + "page_end": 192, + "source_file": "00-80T-80.pdf" }, { - "text": "As far as how syntax is represented, it seems \nthat syntactic structure is not directly encoded \nin self-attention weights. Htut et al. (2019) were \nunable to extract full parse trees from BERT heads \neven with the gold annotations for the root. Jawahar \net al. (2019) include a brief illustration of a depen- \ndency tree extracted directly from self-attention \nweights, but provide no quantitative evaluation. \n\nThe fill-in-the-gap probes of MLM showed that \nBERT takes subject-predicate agreement into \naccount when performing the cloze task (Gold- \nberg, 2019; van Schijndel et al., 2019), even for \nmeaningless sentences and sentences with distrac- \ntor clauses between the subject and the verb (Gold- \nberg, 2019). A study of negative polarity items \n(NPIs) by Warstadt et al. (2019) showed that BERT \nis better able to detect the presence of NPIs (e.g. \n\"ever\") and the words that allow their use (e.g. \n\"whether\") than scope violations. \n\nThe above claims of syntactic knowledge are be- \nlied by the evidence that BERT does not \"under- \nstand\" negation and is insensitive to malformed \ninput. In particular, its predictions were not al- \ntered2 even with shuffled word order, truncated \nsentences, removed subjects and objects (Ettinger, \n2019). This could mean that either BERT’s syn- \ntactic knowledge is incomplete, or it does not \nneed to rely on it for solving its tasks. The latter \nseems more likely, since Glavaš and Vuli´c (2020) ", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv2_taclccby4_license.pdf" + "text": "", + "page_start": 311, + "page_end": 311, + "source_file": "sg246915.pdf" }, { - "text": "5.4 Fine-tuning BERT \n\nPre-training + fine-tuning workflow is a crucial \npart of BERT. The former is supposed to provide \ntask-independent knowledge, and the latter would \npresumably teach the model to rely more on the \nrepresentations useful for the task at hand. \n\nKovaleva et al. (2019) did not find that to be the \ncase for BERT fine-tuned on GLUE tasks5: dur- \ning fine-tuning, the most changes for 3 epochs oc- \ncurred in the last two layers of the models, but those \nchanges caused self-attention to focus on [SEP] \nrather than on linguistically interpretable patterns. \nIt is understandable why fine-tuning would increase \nthe attention to [CLS], but not [SEP]. If Clark \net al. (2019) are correct that [SEP] serves as \"no- \nop\" indicator, fine-tuning basically tells BERT what \nto ignore. \n\nFigure 5: Pre-trained weights help BERT find wider \noptima in fine-tuning on MRPC (right) than training \nfrom scratch (left) (Hao et al., 2019) \n\nbeddings as input for training BERT, while Po- \nerner et al. (2019) adapt entity vectors to BERT \nrepresentations. As mentioned above, Wang et al. \n(2020c) integrate knowledge not through entity em- \nbeddings, but through additional pre-training ob- \njective of knowledge base completion. Sun et al. \n(2019b,c) modify the standard MLM task to mask \nnamed entities rather than random words, and Yin \net al. (2020) train with MLM objective over both \ntext and linearized table data. Wang et al. (2020a) \nenhance RoBERTa with both linguistic and factual \nknowledge with task-specific adapters. \n\nSeveral studies explored the possibilities of im- \n\nproving the fine-tuning of BERT: ", - "page_start": 9, - "page_end": 9, - "source_file": "arxiv2_taclccby4_license.pdf" + "text": "", + "page_start": 311, + "page_end": 311, + "source_file": "sg246915.pdf" }, { - "text": "Stochastic Parrots \n\nmBERT across 29 tasks. Either way, these models do not address \nthe inclusion problems raised by [65], who note that over 90% of \nthe world’s languages used by more than a billion people currently \nhave little to no support in terms of language technology. \n\nAlongside work investigating what information the models re- \ntain from the data, we see a trend in reducing the size of these \nmodels using various techniques such as knowledge distillation \n[26, 58], quantization [118, 153], factorized embedding parame- \nterization and cross-layer parameter sharing [70], and progressive \nmodule replacing [146]. Rogers et al. [110] provide a comprehensive \ncomparison of models derived from BERT using these techniques, \nsuch as DistilBERT [113] and ALBERT [70]. While these models \nmaintain and sometimes exceed the performance of the original \nBERT model, despite their much smaller size, they ultimately still \nrely on large quantities of data and significant processing and stor- \nage capabilities to both hold and reduce the model. ", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv5_ccby4license.pdf" + "text": "", + "page_start": 311, + "page_end": 311, + "source_file": "sg246915.pdf" }, { - "text": "Pre-training is the most expensive part of train- \ning BERT, and it would be informative to know \nhow much benefit it provides. On some tasks, a \nrandomly initialized and fine-tuned BERT obtains \ncompetitive or higher results than the pre-trained \nBERT with the task classifier and frozen weights \n(Kovaleva et al., 2019). The consensus in the com- \nmunity is that pre-training does help in most situa- \ntions, but the degree and its exact contribution re- \nquires further investigation. Prasanna et al. (2020) \nfound that most weights of pre-trained BERT are \nuseful in fine-tuning, although there are \"better\" \nand \"worse\" subnetworks. One explanation is that \npre-trained weights help the fine-tuned BERT find \nwider and flatter areas with smaller generalization \nerror, which makes the model more robust to over- \nfitting (see Figure 5 from Hao et al. (2019)). \n\nGiven the large number and variety of proposed \nmodifications, one would wish to know how much \nimpact each of them has. However, due to the \noverall trend towards large model sizes, systematic \nablations have become expensive. Most new mod- \nels claim superiority on standard benchmarks, but \ngains are often marginal, and estimates of model \nstability and significance testing are very rare. \n\nWith large models, even fine-tuning becomes ex- \npensive, but Houlsby et al. (2019) show that it can \n\n5Kondratyuk and Straka (2019) suggest that fine-tuning on \nUniversal Dependencies does result in syntactically meaning- \nful attention patterns, but there was no quantitative evaluation. ", - "page_start": 9, - "page_end": 9, - "source_file": "arxiv2_taclccby4_license.pdf" + "text": "", + "page_start": 311, + "page_end": 311, + "source_file": "sg246915.pdf" }, { - "text": "3.3 World knowledge \n\nThe bulk of evidence about commonsense knowl- \nedge captured in BERT comes from practitioners \nusing it to extract such knowledge. One direct prob- \ning study of BERT reports that BERT struggles \nwith pragmatic inference and role-based event \nknowledge (Ettinger, 2019). BERT also struggles \nwith abstract attributes of objects, as well as visual \nand perceptual properties that are likely to be as- \nsumed rather than mentioned (Da and Kasai, 2019). \nThe MLM component of BERT is easy to \nadapt for knowledge induction by filling in the Furthermore, different probing methods may \nlead to complementary or even contradictory con- \nclusions, which makes a single test (as in most stud- ", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv2_taclccby4_license.pdf" + "text": "", + "page_start": 192, + "page_end": 192, + "source_file": "00-80T-80.pdf" } ] }, @@ -11483,70 +11483,70 @@ "target_page": 3, "target_passage": " BERTstruggles with representations of numbers. ", "chunk_present": { - "presence": true, - "index": 3 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 388, + "page_end": 388, + "source_file": "00-80T-80.pdf" }, { - "text": "×1.6 \n×1.9 \n×3.7 \n- \n×77 \n×22 \n×9.4 \n×4 \n×2.5‡ \n×9 \n×2 \n×27∗∗ \n×434‡ BERT6 \nBERT6 \nBERT3 \nBERT6 \nBERT12 \nBERT12 \nBERT4 \nBERT24 \nBERT6 \nBERT8 \nBERT6 \nmBERT3 \nBiLSTM1 MNLI, QQP, SST-2 \n\n- \n- \n- BERT12 MNLI, SST-2, CoNLL-03, SQuAD \nBERT12 \nBERT12 MNLI \nNo WNLI, MNLI; SQuAD \n\n98%‡ \n99%‡ \n94%¶ \n94–100% ×1.9‡ \n- \n- \n- BERT24 \nBERT24 \nBERT12 MNLI, QQP, SQuAD \nBERT12 \n\nSQuAD, Natural Questions \nNo WNLI, STS-B; SQuAD \n\nNo MNLI-mm; SQuAD \n\n† MNLI, SST-2 \n† MNLI, SST-2 \nNo WNLI \nNo WNLI; RACE 97% \n107% \n98% \n99% - \n- \n×1.9 \n×2–4.5 BERT12 \nBERT12 \nBERT6 \nBERT12 ", + "text": "", "page_start": 11, "page_end": 11, - "source_file": "arxiv2_taclccby4_license.pdf" + "source_file": "ASX_SEA_2014.pdf" }, { - "text": "BERT struggles with representations of num- \nbers. Addition and number decoding tasks showed \nthat BERT does not form good representations for \nfloating point numbers and fails to generalize away \nfrom the training data (Wallace et al., 2019b). A \npart of the problem is BERT’s wordpiece tokeniza- \ntion, since numbers of similar values can be divided \nup into substantially different word chunks. \n\nHowever, BERT cannot reason based on its \nworld knowledge. Forbes et al. (2019) show that \nBERT can \"guess\" the affordances and properties of \nmany objects, but can not reason about the relation- \nship between properties and affordances. For ex- \nample, it “knows\" that people can walk into houses, \nand that houses are big, but it cannot infer that \nhouses are bigger than people. Zhou et al. (2020) \nand Richardson and Sabharwal (2019) also show \nthat the performance drops with the number of nec- \nessary inference steps. Some of BERT’s world \nknowledge success comes from learning stereotypi- \ncal associations (Poerner et al., 2019), e.g., a person \nwith an Italian-sounding name is predicted to be \nItalian, even when it is incorrect. ", + "text": "", "page_start": 3, "page_end": 3, - "source_file": "arxiv2_taclccby4_license.pdf" + "source_file": "ASX_SEA_2014.pdf" }, { - "text": "3.3 World knowledge \n\nThe bulk of evidence about commonsense knowl- \nedge captured in BERT comes from practitioners \nusing it to extract such knowledge. One direct prob- \ning study of BERT reports that BERT struggles \nwith pragmatic inference and role-based event \nknowledge (Ettinger, 2019). BERT also struggles \nwith abstract attributes of objects, as well as visual \nand perceptual properties that are likely to be as- \nsumed rather than mentioned (Da and Kasai, 2019). \nThe MLM component of BERT is easy to \nadapt for knowledge induction by filling in the Furthermore, different probing methods may \nlead to complementary or even contradictory con- \nclusions, which makes a single test (as in most stud- ", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv2_taclccby4_license.pdf" + "text": "", + "page_start": 5, + "page_end": 5, + "source_file": "ASX_SEA_2014.pdf" }, { - "text": "5.3 Pre-training BERT \n\nThe original BERT is a bidirectional Transformer \npre-trained on two tasks: next sentence prediction \n(NSP) and masked language model (MLM) (sec- \ntion 2). Multiple studies have come up with alter- \nnative training objectives to improve on BERT, \nwhich could be categorized as follows: ", - "page_start": 8, - "page_end": 8, - "source_file": "arxiv2_taclccby4_license.pdf" + "text": "", + "page_start": 7, + "page_end": 7, + "source_file": "ASX_SEA_2014.pdf" }, { - "text": "5.4 Fine-tuning BERT \n\nPre-training + fine-tuning workflow is a crucial \npart of BERT. The former is supposed to provide \ntask-independent knowledge, and the latter would \npresumably teach the model to rely more on the \nrepresentations useful for the task at hand. \n\nKovaleva et al. (2019) did not find that to be the \ncase for BERT fine-tuned on GLUE tasks5: dur- \ning fine-tuning, the most changes for 3 epochs oc- \ncurred in the last two layers of the models, but those \nchanges caused self-attention to focus on [SEP] \nrather than on linguistically interpretable patterns. \nIt is understandable why fine-tuning would increase \nthe attention to [CLS], but not [SEP]. If Clark \net al. (2019) are correct that [SEP] serves as \"no- \nop\" indicator, fine-tuning basically tells BERT what \nto ignore. \n\nFigure 5: Pre-trained weights help BERT find wider \noptima in fine-tuning on MRPC (right) than training \nfrom scratch (left) (Hao et al., 2019) \n\nbeddings as input for training BERT, while Po- \nerner et al. (2019) adapt entity vectors to BERT \nrepresentations. As mentioned above, Wang et al. \n(2020c) integrate knowledge not through entity em- \nbeddings, but through additional pre-training ob- \njective of knowledge base completion. Sun et al. \n(2019b,c) modify the standard MLM task to mask \nnamed entities rather than random words, and Yin \net al. (2020) train with MLM objective over both \ntext and linearized table data. Wang et al. (2020a) \nenhance RoBERTa with both linguistic and factual \nknowledge with task-specific adapters. \n\nSeveral studies explored the possibilities of im- \n\nproving the fine-tuning of BERT: ", + "text": "", "page_start": 9, "page_end": 9, - "source_file": "arxiv2_taclccby4_license.pdf" + "source_file": "ASX_SEA_2014.pdf" }, { - "text": "improve BERT’s architecture, pre-training and fine- \ntuning. We conclude by discussing the issue of \noverparameterization, the approaches to compress- \ning BERT, and the nascent area of pruning as a \nmodel analysis technique. ", - "page_start": 1, - "page_end": 1, - "source_file": "arxiv2_taclccby4_license.pdf" + "text": "", + "page_start": 10, + "page_end": 10, + "source_file": "ASX_SEA_2014.pdf" }, { - "text": "3.2 Semantic knowledge \n\nTo date, more studies have been devoted to BERT’s \nknowledge of syntactic rather than semantic phe- \nnomena. However, we do have evidence from an \nMLM probing study that BERT has some knowl- \nedge of semantic roles (Ettinger, 2019). BERT \neven displays some preference for the incorrect \nfillers for semantic roles that are semantically re- \nlated to the correct ones, as opposed to those that \nare unrelated (e.g. \"to tip a chef\" is better than \"to \ntip a robin\", but worse than \"to tip a waiter\"). \n\nFigure 2: BERT world knowledge (Petroni et al., 2019) \n\nblanks (e.g. \"Cats like to chase [___]\"). Petroni \net al. (2019) showed that, for some relation types, \nvanilla BERT is competitive with methods rely- \ning on knowledge bases (Figure 2), and Roberts \net al. (2020) show the same for open-domain QA \nusing T5 model (Raffel et al., 2019). Davison et al. \n(2019) suggest that it generalizes better to unseen \ndata. In order to retrieve BERT’s knowledge, we \nneed good template sentences, and there is work \non their automatic extraction and augmentation \n(Bouraoui et al., 2019; Jiang et al., 2019b). \nTenney et al. (2019b) showed that BERT en- \ncodes information about entity types, relations, \nsemantic roles, and proto-roles, since this infor- \nmation can be detected with probing classifiers. ", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv2_taclccby4_license.pdf" + "text": "", + "page_start": 11, + "page_end": 11, + "source_file": "ASX_SEA_2014.pdf" }, { - "text": "A big methodological challenge in the current \nNLP is that the reported performance improve- \nments of new models may well be within varia- \ntion induced by environment factors (Crane, 2018). \nBERT is not an exception. Dodge et al. (2020) \nreport significant variation for BERT fine-tuned \non GLUE tasks due to both weight initialization \nand training data order. They also propose early \nstopping on the less-promising seeds. \n\nIn general, larger BERT models perform better \n(Liu et al., 2019a; Roberts et al., 2020), but not \nalways: BERT-base outperformed BERT-large on \nsubject-verb agreement (Goldberg, 2019) and sen- \ntence subject detection (Lin et al., 2019). Given \nthe complexity of language, and amounts of pre- \ntraining data, it is not clear why BERT ends up with \nredundant heads and layers. Clark et al. (2019) sug- \ngest that one possible reason is the use of attention \ndropouts, which causes some attention weights to \nbe zeroed-out during training. \n\nAlthough we hope that the above observations \nmay be useful for the practitioners, this section \ndoes not exhaust the current research on fine-tuning \nand its alternatives. For example, we do not cover \nsuch topics as Siamese architectures, policy gradi- \nent training, automated curriculum learning, and \nothers. ", - "page_start": 10, - "page_end": 10, - "source_file": "arxiv2_taclccby4_license.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "", + "page_start": 80, + "page_end": 80, + "source_file": "00-80T-80.pdf" } ] }, @@ -11557,70 +11557,70 @@ "target_page": 4, "target_passage": "The corporation has 10 affiliate banks, which provide services from 28 full-service locations in the Central, West and High Plains regions of Texas. ", "chunk_present": { - "presence": true, - "index": 3 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 194, + "page_end": 194, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 265, + "page_end": 265, + "source_file": "00-80T-80.pdf" }, { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES \nNotes to Consolidated Financial Statements \nDecember 31, 2002, 2001 and 2000 \n\n1. SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES: \n\nNature of Operations \n\nFirst Financial Bankshares, Inc. (a Texas corporation) (“Bankshares”) is a financial holding company which owns \n(through its wholly-owned Delaware subsidiary) all of the capital stock of ten banks located in Texas as of \nDecember 31, 2002. Those subsidiary banks are First National Bank of Abilene; Hereford State Bank; First \nNational Bank, Sweetwater; Eastland National Bank; First Financial Bank, National Association, Cleburne; \nStephenville Bank & Trust Co.; San Angelo National Bank; Weatherford National Bank; First Financial Bank, \nNational Association, Southlake and City National Bank, Mineral Wells. Each subsidiary bank’s primary source of \nrevenue is providing loans and banking services to consumers and commercial customers in the market area in \nwhich the subsidiary is located. \n\nA summary of significant accounting policies of Bankshares and subsidiaries (collectively, the “Company”) applied \nin the preparation of the accompanying consolidated financial statements follows. The accounting principles \nfollowed by the Company and the methods of applying them are in conformity with both accounting principles \ngenerally accepted in the United States of America and prevailing practices of the banking industry. ", - "page_start": 73, - "page_end": 73, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "First Financial Bankshares, Inc. is a financial holding company \n\nheadquartered in Abilene, Texas, with consolidated assets of $2.0 billion \n\nas of December 31, 2002. The corporation has 10 affiliate banks, \n\nwhich provide services from 28 full-service locations in the Central, West \n\nand High Plains regions of Texas. The common stock of First Financial \n\nBankshares, Inc. is held by more than 3,500 shareholders and is listed \n\non The NASDAQ Stock Market® under the symbol FFIN. ", - "page_start": 4, - "page_end": 4, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 266, + "page_end": 266, + "source_file": "00-80T-80.pdf" }, { - "text": "range of services to individuals, associations, and corporations. These services include administering estates, \ntestamentary trusts, various types of living trusts, and agency accounts. In addition, First National Bank of Abilene, \nFirst Financial Bank, Cleburne, San Angelo National Bank and First Financial Bank, National Association, \nSouthlake, Texas provide securities brokerage services through arrangements with various third parties. \n\nWe have filed an application with the office of the Comptroller of the Currency to form a limited purpose \nnational bank under which we will consolidate the management of our current trust departments. The new entity \nwill operate as a subsidiary of our subsidiary holding company, First Financial Bankshares of Delaware, Inc. We \nbelieve that with this structure we can more effectively manage our current trust operations and provide trust \nservices to customers of our banks that do not currently have trust departments. We anticipate that the new trust \ncompany will begin operations in the latter part of 2003. \n\n**Competition**\n\nCommercial banking in Texas is highly competitive, and because we hold less than 1% of the state’s deposits, \nwe represent only a minor segment of the industry. To succeed in this industry, our management believes that our \nbanks must have the capability to compete in the areas of (1) interest rates paid or charged; (2) scope of services \noffered; and (3) prices charged for such services. Our subsidiary banks compete in their respective service areas \nagainst highly competitive banks, thrifts, savings and loan associations, small loan companies, credit unions, \nmortgage companies, and brokerage firms, all of which are engaged in providing financial products and services and \nsome of which are larger than our subsidiary banks in terms of capital, resources and personnel. ", - "page_start": 31, - "page_end": 31, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "*Mergers and Acquisitions*\n\nWe generally must obtain approval from the banking regulators before we can acquire other financial \ninstitutions. We must not engage in certain acquisitions if we are undercapitalized. Furthermore, the BHCA \nprovides that the Federal Reserve Board cannot approve any acquisition, merger or consolidation that may \nsubstantially lessen competition in the banking industry, create a monopoly in any section of the country, or be a \nrestraint of trade. However, the Federal Reserve Board may approve such a transaction if the convenience and \nneeds of the community clearly outweigh any anti-competitive effects. Specifically, the Federal Reserve Board \nwould consider, among other factors, the expected benefits to the public (greater convenience, increased \ncompetition, greater efficiency, etc.) against the risks of possible adverse effects (undue concentration of resources, \ndecreased or unfair competition, conflicts of interest, unsound banking practices, etc.). \n\n*Banks*\n\nFederal and state laws and regulations that govern banks have the effect of, among other things, regulating the \nscope of business, investments, cash reserves, the purpose and nature of loans, the maximum interest rate chargeable \non loans, the amount of dividends declared, and required capitalization ratios. \n\n*National Banking Associations*. Banks that are organized as national banking associations under the National \nBank Act are subject to regulation and examination by the Office of the Comptroller of the Currency, or OCC. The \nOCC supervises, regulates and regularly examines the First National Bank of Abilene, First National Bank, \nSweetwater, First Financial Bank, National Association, Cleburne, Eastland National Bank, San Angelo National \nBank, Weatherford National Bank, First Financial Bank, National Association, Southlake and City National Bank, \nMineral Wells. The OCC’s supervision and regulation of banks is primarily intended to protect the interests of \ndepositors. The National Bank Act: \n\n• \n• \n• \n\nrequires each national banking association to maintain reserves against deposits, \n\nrestricts the nature and amount of loans that may be made and the interest that may be charged, and \n\nrestricts investments and other activities. ", - "page_start": 32, - "page_end": 32, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 265, + "page_end": 265, + "source_file": "00-80T-80.pdf" }, { - "text": "*State Banks*. Banks that are organized as state banks under Texas law are subject to regulation and examination \nby the Banking Commissioner of the State of Texas. The Commissioner regulates and supervises, and the Texas \nBanking Department regularly examines, Hereford State Bank and Stephenville Bank and Trust Co. The \nCommissioner’s supervision and regulation of banks is primarily designed to protect the interests of depositors. \nTexas law \n\n• \n• \n• \n\nrequires each state bank to maintain reserves against deposits, \n\nrestricts the nature and amount of loans that may be made and the interest that may be charged, and \n\nrestricts investments and other activities. \n\nBecause our Texas-chartered banks are members of the FDIC, they are also subject to regulation at the federal \nlevel by the FDIC, and are subject to most of the federal laws described below. \n\n*Deposit Insurance*\n\nEach of our subsidiary banks is a member of the FDIC. The FDIC provides deposit insurance protection that \ncovers all deposit accounts in FDIC-insured depository institutions and generally does not exceed $100,000 per \ndepositor. Our subsidiary banks must pay assessments to the FDIC under a risk-based assessment system for federal \ndeposit insurance protection. FDIC-insured depository institutions that are members of the Bank Insurance Fund pay \ninsurance premiums at rates based on their risk classification. Institutions assigned to higher risk classifications (i.e., \ninstitutions that pose a greater risk of loss to their respective deposit insurance funds) pay assessments at higher rates \nthan institutions that pose a lower risk. An institution’s risk classification is assigned based on its capital levels and \nthe level of supervisory concern the institution poses to bank regulators. In addition, the FDIC can impose special \nassessments to cover the costs of borrowings from the U.S. Treasury, the Federal Financing Bank and the Bank \nInsurance Fund member banks. As of December 31, 2002, the assessment rate for each of our subsidiary banks is at \nthe lowest level risk-based premium available. ", - "page_start": 33, - "page_end": 33, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 265, + "page_end": 265, + "source_file": "00-80T-80.pdf" }, { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES \nNotes to Consolidated Financial Statements \nDecember 31, 2002, 2001 and 2000 \n\nQuantitative measures established by regulation to ensure capital adequacy require Bankshares and each of its \nsubsidiaries to maintain minimum amounts and ratios (set forth in the table below) of total and Tier I capital (as \ndefined in the regulations) to risk-weighted assets (as defined), and of Tier I capital (as defined), to average assets \n(as defined). Management believes as of December 31, 2002 and 2001, that Bankshares and each of its subsidiaries \nmeet all capital adequacy requirements to which they are subject. \n\nAs of December 31, 2002 and 2001, the most recent notification from each respective subsidiaries’ primary \nregulator categorized each of Bankshares’ subsidiaries as well-capitalized under the regulatory framework for \nprompt corrective action. To be categorized as well capitalized, the subsidiaries must maintain minimum total \nrisk-based, Tier I risk-based, and Tier I leverage ratios as set forth in the table. \n\nThere are no conditions or events since that notification that management believes have changed the institutions’ \ncategories. Bankshares’ and its significant subsidiaries’ actual capital amounts and ratios are presented in the table \nbelow: ", - "page_start": 88, - "page_end": 88, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "**First Financial Bankshares, Inc.**\n\nWe provide management and technical resources and policy direction to our subsidiary banks, which enables \nthem to improve or expand their banking services while continuing their local activity and identity. Each of our \nsubsidiary banks operates under the day-to-day management of its own board of directors and officers, with \nsubstantial authority in making decisions concerning their own investments, loan policies, interest rates, and service \ncharges. We provide resources and policy direction in, among other things, the following areas: \n\n• \n• \n• \n• \n\nasset and liability management; \n\naccounting, budgeting, planning and insurance; \n\ncapitalization; and \n\nregulatory compliance. \n\nIn particular, we assist our subsidiary banks with, among other things, decisions concerning major capital \nexpenditures, employee fringe benefits, including pension plans and group insurance, dividend policies, and \nappointment of officers and directors and their compensation. We also perform, through corporate staff groups or \nby outsourcing to third parties, internal audits and loan reviews of our subsidiary banks. Through First National \nBank of Abilene, we provide advice and specialized services for our banks related to lending, investing, purchasing, \nadvertising, public relations, and computer services. \n\nWhile we have no specific acquisition agreements in place or commitments to expand our branch network, we \nperiodically evaluate various potential financial institution acquisition opportunities and also periodically evaluate \npotential locations for new branch offices. We anticipate that funding for any acquisitions or expansions would be \nprovided from our existing cash balances, available dividends from subsidiary banks, utilization of available lines of \ncredit and future debt or equity offerings. ", - "page_start": 30, - "page_end": 30, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "**Services Offered by Our Subsidiary Banks**\n\nEach of our subsidiary banks is a separate legal entity that operates under the day-to-day management of its own \nboard of directors and officers. Each of our subsidiary banks provides general commercial banking services, which \ninclude accepting and holding checking, savings and time deposits, making loans, automated teller machines, drive- \nin and night deposit services, safe deposit facilities, transmitting funds, and performing other customary commercial \nbanking services. Certain of our subsidiary banks also administer pension plans, profit sharing plans and other \nemployee benefit plans. First National Bank of Abilene, First National Bank, Sweetwater, Stephenville Bank and \nTrust Co. and San Angelo National Bank have active trust departments. The trust departments offer a complete ", - "page_start": 30, - "page_end": 30, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 265, + "page_end": 265, + "source_file": "00-80T-80.pdf" } ] }, @@ -11637,64 +11637,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, + "text": "", + "page_start": 26, + "page_end": 26, "source_file": "Excel Training Manual 1.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 326, + "page_end": 326, + "source_file": "00-80T-80.pdf" }, { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES \nNotes to Consolidated Financial Statements \nDecember 31, 2002, 2001 and 2000 \n\n1. SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES: \n\nNature of Operations \n\nFirst Financial Bankshares, Inc. (a Texas corporation) (“Bankshares”) is a financial holding company which owns \n(through its wholly-owned Delaware subsidiary) all of the capital stock of ten banks located in Texas as of \nDecember 31, 2002. Those subsidiary banks are First National Bank of Abilene; Hereford State Bank; First \nNational Bank, Sweetwater; Eastland National Bank; First Financial Bank, National Association, Cleburne; \nStephenville Bank & Trust Co.; San Angelo National Bank; Weatherford National Bank; First Financial Bank, \nNational Association, Southlake and City National Bank, Mineral Wells. Each subsidiary bank’s primary source of \nrevenue is providing loans and banking services to consumers and commercial customers in the market area in \nwhich the subsidiary is located. \n\nA summary of significant accounting policies of Bankshares and subsidiaries (collectively, the “Company”) applied \nin the preparation of the accompanying consolidated financial statements follows. The accounting principles \nfollowed by the Company and the methods of applying them are in conformity with both accounting principles \ngenerally accepted in the United States of America and prevailing practices of the banking industry. ", - "page_start": 73, - "page_end": 73, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 327, + "page_end": 327, + "source_file": "00-80T-80.pdf" }, { - "text": "First Financial Bankshares, Inc. is a financial holding company \n\nheadquartered in Abilene, Texas, with consolidated assets of $2.0 billion \n\nas of December 31, 2002. The corporation has 10 affiliate banks, \n\nwhich provide services from 28 full-service locations in the Central, West \n\nand High Plains regions of Texas. The common stock of First Financial \n\nBankshares, Inc. is held by more than 3,500 shareholders and is listed \n\non The NASDAQ Stock Market® under the symbol FFIN. ", - "page_start": 4, - "page_end": 4, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "In our opinion, the financial statements referred to above present fairly, in all material respects, the financial position \nof First Financial Bankshares, Inc. and subsidiaries at December 31, 2002, and the consolidated results of their \noperations and their cash flows for the year then ended in conformity with accounting principles generally accepted \nin the United States. ", - "page_start": 65, - "page_end": 65, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 327, + "page_end": 327, + "source_file": "00-80T-80.pdf" }, { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES \nNotes to Consolidated Financial Statements \nDecember 31, 2002, 2001 and 2000 \n\nCondensed Statements of Cash Flows- \n For the Years Ended December 31, 2002, 2001, and 2000 \n\n 2002 2001 \nCash flows from operating activities: \n\nNet earnings \nAdjustments to reconcile net earnings to net \n$33,952,550 $29,354,505 \n\ncash provided by operating activities: \n\nExcess of earnings over \n dividends of subsidiary banks \nDepreciation \nDiscount accretion, net of premium amortization \nAmortization of excess of cost over fair value \n of assets acquired \nGain on sale of securities \n(Increase) decrease in other assets \n(Decrease) increase in liabilities \n\n(8,479,939) \n54,219 \n- \n\n- \n- \n(215,435) \n (1,041,688) 55,576 \n- \n559,515 \n 186,391 \n\nNet cash provided by operating activities 24,269,707 25,600,985 \n\nCash flows from investing activities: \n\nPurchases of bank premises and equipment \nActivity in available-for-sale securities: \n(50,481) \n\nSales \nMaturities \nPurchases \n- \n- \n- \n - \n- \n10,000,000 \n- \nCash payment for stock acquisition (16,500,000) \n\n (50,481) (6,657,291) ", - "page_start": 92, - "page_end": 92, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 327, + "page_end": 327, + "source_file": "00-80T-80.pdf" }, { - "text": "Our subsidiary banks paid aggregate dividends of approximately $26.6 million in 2002 and approximately $25.5 \nmillion in 2001. Under the dividend restrictions discussed above, as of December 31, 2002, our subsidiary banks, \nwithout obtaining governmental approvals, could have declared in the aggregate additional dividends of \napproximately $20.7 million from retained net profits. \n\nTo pay dividends, we and our subsidiary banks must maintain adequate capital above regulatory guidelines. In \naddition, if the applicable regulatory authority believes that a bank under its jurisdiction is engaged in or is about to \nengage in an unsafe or unsound practice (which, depending on the financial condition of the bank, could include the \npayment of dividends), the authority may require, after notice and hearing, that such bank cease and desist from the \nunsafe practice. The Federal Reserve Board and the OCC have each indicated that paying dividends that deplete a \nbank’s capital base to an inadequate level would be an unsafe and unsound banking practice. The Federal Reserve \nBoard, the OCC and the FDIC have issued policy statements that recommend that bank holding companies and \ninsured banks should generally only pay dividends to the extent that net income is sufficient to cover both cash \ndividends and rate of earnings retention consistent with capital needs, asset quality and overall financial condition. \nNo undercapitalized institution may pay a dividend. ", - "page_start": 34, - "page_end": 34, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 327, + "page_end": 327, + "source_file": "00-80T-80.pdf" }, { - "text": "amounted to 49.1%, 48.9% and 45.2% of net earnings, respectively, in 2002, 2001 and 2000. Given our current \nstrong capital position and projected earnings and asset growth rates, we do not anticipate any change in our current \ndividend policy. \n\nEach state bank that is a member of the Federal Reserve System and each national banking association is \nrequired by federal law to obtain the prior approval of the Federal Reserve Board and the OCC, respectively, to \ndeclare and pay dividends if the total of all dividends declared in any calendar year would exceed the total of (1) \nsuch bank’s net profits (as defined and interpreted by regulation) for that year plus (2) its retained net profits (as \ndefined and interpreted by regulation) for the preceding two calendar years, less any required transfers to surplus. In \naddition, these banks may only pay dividends to the extent that retained net profits (including the portion transferred \nto surplus) exceed bad debts (as defined by regulation). \n\nTo pay dividends, we and our subsidiary banks must maintain adequate capital above regulatory guidelines. In \naddition, if the applicable regulatory authority believes that a bank under its jurisdiction is engaged in or is about to \nengage in an unsafe or unsound practice (which, depending on the financial condition of the bank, could include the \npayment of dividends), the authority may require, after notice and hearing, that such bank cease and desist from the \nunsafe practice. The Federal Reserve Board and the OCC have each indicated that paying dividends that deplete a \nbank’s capital base to an inadequate level would be an unsafe and unsound banking practice. The Federal Reserve \nBoard, the OCC and the FDIC have issued policy statements that recommend that bank holding companies and \ninsured banks should generally only pay dividends out of current operating earnings. ", - "page_start": 56, - "page_end": 56, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 327, + "page_end": 327, + "source_file": "00-80T-80.pdf" }, - { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES \nNotes to Consolidated Financial Statements \nDecember 31, 2002, 2001 and 2000 \n\nQuantitative measures established by regulation to ensure capital adequacy require Bankshares and each of its \nsubsidiaries to maintain minimum amounts and ratios (set forth in the table below) of total and Tier I capital (as \ndefined in the regulations) to risk-weighted assets (as defined), and of Tier I capital (as defined), to average assets \n(as defined). Management believes as of December 31, 2002 and 2001, that Bankshares and each of its subsidiaries \nmeet all capital adequacy requirements to which they are subject. \n\nAs of December 31, 2002 and 2001, the most recent notification from each respective subsidiaries’ primary \nregulator categorized each of Bankshares’ subsidiaries as well-capitalized under the regulatory framework for \nprompt corrective action. To be categorized as well capitalized, the subsidiaries must maintain minimum total \nrisk-based, Tier I risk-based, and Tier I leverage ratios as set forth in the table. \n\nThere are no conditions or events since that notification that management believes have changed the institutions’ \ncategories. Bankshares’ and its significant subsidiaries’ actual capital amounts and ratios are presented in the table \nbelow: ", - "page_start": 88, - "page_end": 88, - "source_file": "NASDAQ_FFIN_2002.pdf" + { + "text": "", + "page_start": 326, + "page_end": 326, + "source_file": "00-80T-80.pdf" }, { - "text": "range of services to individuals, associations, and corporations. These services include administering estates, \ntestamentary trusts, various types of living trusts, and agency accounts. In addition, First National Bank of Abilene, \nFirst Financial Bank, Cleburne, San Angelo National Bank and First Financial Bank, National Association, \nSouthlake, Texas provide securities brokerage services through arrangements with various third parties. \n\nWe have filed an application with the office of the Comptroller of the Currency to form a limited purpose \nnational bank under which we will consolidate the management of our current trust departments. The new entity \nwill operate as a subsidiary of our subsidiary holding company, First Financial Bankshares of Delaware, Inc. We \nbelieve that with this structure we can more effectively manage our current trust operations and provide trust \nservices to customers of our banks that do not currently have trust departments. We anticipate that the new trust \ncompany will begin operations in the latter part of 2003. \n\n**Competition**\n\nCommercial banking in Texas is highly competitive, and because we hold less than 1% of the state’s deposits, \nwe represent only a minor segment of the industry. To succeed in this industry, our management believes that our \nbanks must have the capability to compete in the areas of (1) interest rates paid or charged; (2) scope of services \noffered; and (3) prices charged for such services. Our subsidiary banks compete in their respective service areas \nagainst highly competitive banks, thrifts, savings and loan associations, small loan companies, credit unions, \nmortgage companies, and brokerage firms, all of which are engaged in providing financial products and services and \nsome of which are larger than our subsidiary banks in terms of capital, resources and personnel. ", - "page_start": 31, - "page_end": 31, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 326, + "page_end": 326, + "source_file": "00-80T-80.pdf" } ] }, @@ -11711,64 +11711,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 4, + "page_end": 4, + "source_file": "NASDAQ_EMMS_2004.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 357, + "page_end": 357, + "source_file": "00-80T-80.pdf" }, { - "text": "*Tier I Capital (to Average Assets):*\n Consolidated \n First National Bank of Abilene \n San Angelo National Bank \n Weatherford National Bank $202,507,000 \n$ 64,971,000 \n$ 14,703,000 \n$ 18,757,000 ", - "page_start": 88, - "page_end": 88, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 359, + "page_end": 359, + "source_file": "00-80T-80.pdf" }, { - "text": "*Tier I Capital (to Risk-Weighted Assets):*\n Consolidated \n First National Bank of Abilene \n San Angelo National Bank \n Weatherford National Bank $184,820,000 \n$ 61,895,000 \n$ 26,672,000 \n$ 18,019,000 \n\n*Tier I Capital (to Average Assets):*\n Consolidated \n First National Bank of Abilene \n San Angelo National Bank \n Weatherford National Bank $184,820,000 \n$ 61,895,000 \n$ 26,672,000 \n$ 18,019,000 ", - "page_start": 89, - "page_end": 89, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 359, + "page_end": 359, + "source_file": "00-80T-80.pdf" }, { - "text": "**Services Offered by Our Subsidiary Banks**\n\nEach of our subsidiary banks is a separate legal entity that operates under the day-to-day management of its own \nboard of directors and officers. Each of our subsidiary banks provides general commercial banking services, which \ninclude accepting and holding checking, savings and time deposits, making loans, automated teller machines, drive- \nin and night deposit services, safe deposit facilities, transmitting funds, and performing other customary commercial \nbanking services. Certain of our subsidiary banks also administer pension plans, profit sharing plans and other \nemployee benefit plans. First National Bank of Abilene, First National Bank, Sweetwater, Stephenville Bank and \nTrust Co. and San Angelo National Bank have active trust departments. The trust departments offer a complete ", - "page_start": 30, - "page_end": 30, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 359, + "page_end": 359, + "source_file": "00-80T-80.pdf" }, { - "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES \nNotes to Consolidated Financial Statements \nDecember 31, 2002, 2001 and 2000 \n\n1. SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES: \n\nNature of Operations \n\nFirst Financial Bankshares, Inc. (a Texas corporation) (“Bankshares”) is a financial holding company which owns \n(through its wholly-owned Delaware subsidiary) all of the capital stock of ten banks located in Texas as of \nDecember 31, 2002. Those subsidiary banks are First National Bank of Abilene; Hereford State Bank; First \nNational Bank, Sweetwater; Eastland National Bank; First Financial Bank, National Association, Cleburne; \nStephenville Bank & Trust Co.; San Angelo National Bank; Weatherford National Bank; First Financial Bank, \nNational Association, Southlake and City National Bank, Mineral Wells. Each subsidiary bank’s primary source of \nrevenue is providing loans and banking services to consumers and commercial customers in the market area in \nwhich the subsidiary is located. \n\nA summary of significant accounting policies of Bankshares and subsidiaries (collectively, the “Company”) applied \nin the preparation of the accompanying consolidated financial statements follows. The accounting principles \nfollowed by the Company and the methods of applying them are in conformity with both accounting principles \ngenerally accepted in the United States of America and prevailing practices of the banking industry. ", - "page_start": 73, - "page_end": 73, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 16, + "page_end": 16, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "*Mergers and Acquisitions*\n\nWe generally must obtain approval from the banking regulators before we can acquire other financial \ninstitutions. We must not engage in certain acquisitions if we are undercapitalized. Furthermore, the BHCA \nprovides that the Federal Reserve Board cannot approve any acquisition, merger or consolidation that may \nsubstantially lessen competition in the banking industry, create a monopoly in any section of the country, or be a \nrestraint of trade. However, the Federal Reserve Board may approve such a transaction if the convenience and \nneeds of the community clearly outweigh any anti-competitive effects. Specifically, the Federal Reserve Board \nwould consider, among other factors, the expected benefits to the public (greater convenience, increased \ncompetition, greater efficiency, etc.) against the risks of possible adverse effects (undue concentration of resources, \ndecreased or unfair competition, conflicts of interest, unsound banking practices, etc.). \n\n*Banks*\n\nFederal and state laws and regulations that govern banks have the effect of, among other things, regulating the \nscope of business, investments, cash reserves, the purpose and nature of loans, the maximum interest rate chargeable \non loans, the amount of dividends declared, and required capitalization ratios. \n\n*National Banking Associations*. Banks that are organized as national banking associations under the National \nBank Act are subject to regulation and examination by the Office of the Comptroller of the Currency, or OCC. The \nOCC supervises, regulates and regularly examines the First National Bank of Abilene, First National Bank, \nSweetwater, First Financial Bank, National Association, Cleburne, Eastland National Bank, San Angelo National \nBank, Weatherford National Bank, First Financial Bank, National Association, Southlake and City National Bank, \nMineral Wells. The OCC’s supervision and regulation of banks is primarily intended to protect the interests of \ndepositors. The National Bank Act: \n\n• \n• \n• \n\nrequires each national banking association to maintain reserves against deposits, \n\nrestricts the nature and amount of loans that may be made and the interest that may be charged, and \n\nrestricts investments and other activities. ", - "page_start": 32, - "page_end": 32, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 359, + "page_end": 359, + "source_file": "00-80T-80.pdf" }, { - "text": "Such statements reflect the current views of our management with respect to future events and are subject to these \nand other risks, uncertainties and assumptions relating to our operations, results of operations, growth strategy and \nliquidity. All subsequent written and oral forward-looking statements attributable to us or persons acting on our \nbehalf are expressly qualified in their entirety by this paragraph. \n\n**PART I**\n\n**ITEM 1.** **BUSINESS**\n\n**General**\n\nFirst Financial Bankshares, Inc., a Texas corporation, is a financial holding company registered under the Bank \nHolding Company Act of 1956, or BHCA. As such, we are supervised by the Board of Governors of the Federal \nReserve System, or Federal Reserve Board, as well as several other state and federal regulators. We were formed as \na bank holding company in 1956 under the original name F & M Operating Company, but our banking operations \ndate back to 1890, when Farmers and Merchants National Bank opened for business in Abilene, Texas. By virtue of \na series of reorganizations, mergers, and acquisitions since 1956, we now own, through our wholly-owned Delaware \nsubsidiary, First Financial Bankshares of Delaware, Inc., ten banks organized and located in Texas. These ten banks \nare: \n\n• First National Bank of Abilene, Abilene, Texas; \n• Hereford State Bank, Hereford, Texas; \n• First National Bank, Sweetwater, Texas; \n\n• Eastland National Bank, Eastland, Texas; \n• First Financial Bank, National Association, Cleburne, Texas; \n• Stephenville Bank and Trust Co., Stephenville, Texas; \n• San Angelo National Bank, San Angelo, Texas; \n• Weatherford National Bank, Weatherford, Texas; \n• First Financial Bank, National Association, Southlake, Texas; and \n• City National Bank, Mineral Wells, Texas. \n\nAs described in more detail below, we elected to be treated as a financial holding company in September 2001. \n\nOur service centers are located primarily in North Central and West Texas. Considering the branches and \nlocations of all our subsidiary banks, as of December 31, 2002, we had 28 financial centers across Texas, with seven \nlocations in Abilene, two locations in Cleburne, two locations in Stephenville, two locations in San Angelo, three \nlocations in Weatherford, and one location each in Mineral Wells, Hereford, Sweetwater, Eastland, Southlake, \nAledo, Alvarado, Burleson, Keller, Trophy Club, Roby, and Trent. \n\nInformation on our revenues, profits and losses and total assets appears in the discussion of our Results of \nOperations contained in Item 7 hereof. ", - "page_start": 29, - "page_end": 29, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 359, + "page_end": 359, + "source_file": "00-80T-80.pdf" }, { - "text": "| | | | | |\n|---|---|---|---|---|\n| | | | | |\n| Robert S. Patterson First National Bank of Abilene | | | | |\n\n\nDavid Byrd \n*San Angelo*\n*National Bank*", - "page_start": 15, - "page_end": 15, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 16, + "page_end": 16, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "range of services to individuals, associations, and corporations. These services include administering estates, \ntestamentary trusts, various types of living trusts, and agency accounts. In addition, First National Bank of Abilene, \nFirst Financial Bank, Cleburne, San Angelo National Bank and First Financial Bank, National Association, \nSouthlake, Texas provide securities brokerage services through arrangements with various third parties. \n\nWe have filed an application with the office of the Comptroller of the Currency to form a limited purpose \nnational bank under which we will consolidate the management of our current trust departments. The new entity \nwill operate as a subsidiary of our subsidiary holding company, First Financial Bankshares of Delaware, Inc. We \nbelieve that with this structure we can more effectively manage our current trust operations and provide trust \nservices to customers of our banks that do not currently have trust departments. We anticipate that the new trust \ncompany will begin operations in the latter part of 2003. \n\n**Competition**\n\nCommercial banking in Texas is highly competitive, and because we hold less than 1% of the state’s deposits, \nwe represent only a minor segment of the industry. To succeed in this industry, our management believes that our \nbanks must have the capability to compete in the areas of (1) interest rates paid or charged; (2) scope of services \noffered; and (3) prices charged for such services. Our subsidiary banks compete in their respective service areas \nagainst highly competitive banks, thrifts, savings and loan associations, small loan companies, credit unions, \nmortgage companies, and brokerage firms, all of which are engaged in providing financial products and services and \nsome of which are larger than our subsidiary banks in terms of capital, resources and personnel. ", - "page_start": 31, - "page_end": 31, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 16, + "page_end": 16, + "source_file": "Excel Training Manual 1.pdf" } ] }, @@ -11785,64 +11785,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 416, + "page_end": 416, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 307, + "page_end": 307, + "source_file": "00-80T-80.pdf" }, { - "text": "In 2007 Chesapeake launched a scholarship program in Texas with an \ninitial $1.25 million contribution, challenging the cities of Fort Worth and Dal- \nlas to match its gift within a year. The cities responded and matched the gift, \nso Chesapeake in 2008 added another $1.25 million to the fund, bringing the \ntotal to $3.75 million. The Chesapeake Scholarship Fund currently funds the \ncost of higher education for 48 minority students. The fund provides each \nstudent $20,000 a year for up to four years at the school of their choice. To \ndate more than $1.0 million has been distributed to deserving local students. \nTo help ensure the training of qualified geologists, engineers, land- \nmen and energy lawyers in the next generation, we award scholarships \nto students pursuing energy-related degrees. We also help mentor them \nthrough Chesapeake’s Peak Program. Junior- and senior-level scholarship \nrecipients are paired with Chesapeake employee mentors who help devel- \nop students’ knowledge and provide career advice. There are currently 25 \nmentors and 40 scholarship recipients participating in the Peak Program. \n\nChesapeake partners with other companies and organizations to meet \nbasic, practical needs in hundreds of communities. An example is our ", - "page_start": 27, - "page_end": 27, - "source_file": "NYSE_CHK_2010.pdf" + "text": "", + "page_start": 177, + "page_end": 177, + "source_file": "00-80T-80.pdf" }, { - "text": "**Financial education**\n**through teaching of**\n**investment skills**\n\nPromoting environmentally-aware \n\nmanagement and supporting business \n\nventures in China through the fund \n\nSMBC Friend Securities runs an online \nSMBC Friend Securities runs an online \n\neducation program, “You・You Toshi” \nYou Toshi” \neducation program, “You \ninexperi- \n(Self-composed Investment), for inexperi \n(Self-composed Investment), for \n\nenced investors. \nenced investors. \n\nThe service is free and includes a training \nThe service is free and includes a training \n\nprogram that can be used as a tool for \nprogram that can be used as a tool for \n\nlifelong study of investment skills. \nlifelong study of investment skills. ", - "page_start": 9, - "page_end": 9, - "source_file": "NYSE_SMFG_2011.pdf" + "text": "", + "page_start": 306, + "page_end": 306, + "source_file": "00-80T-80.pdf" }, { - "text": "**China**\n**2**\n\n**Scholarships at major universities**\n\nSumitomo Mitsui Banking Corporation (China) Limited \nSumitomo Mitsui Banking Corporation (China) Limited \nestablished a scholarship program for students of Zhejiang \nestablished a scholarship program for students of Zhejiang \nUniversity, Shanghai Inter \nUniversity, Shanghai Inter- \nnational Studies University, \nnational Studies University, \nSun Yat-sen University, \nSun Yat-sen University, \nand other universities. \nand other universities. ", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_SMFG_2011.pdf" + "text": "", + "page_start": 37, + "page_end": 37, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "10. FINANCIAL INSTRUMENTS WITH OFF-BALANCE-SHEET RISK: \n\nThe Company is a party to financial instruments with off-balance-sheet risk in the normal course of business to meet \nthe financing needs of its customers. These financial instruments include unfunded lines of credit, commitments to ", - "page_start": 84, - "page_end": 84, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 177, + "page_end": 177, + "source_file": "00-80T-80.pdf" }, { - "text": "incidental to a financial activity. Thus, with the enactment of the Gramm-Leach-Bliley Act, banks, securities firms \nand insurance companies find it easier to acquire or affiliate with each other and cross-sell financial products. The \nact permits a single financial services organization to offer a more complete array of financial products and services \nthan historically was permitted. \n\nA financial holding company is essentially a bank holding company with significantly expanded powers. Under \nthe Gramm-Leach-Bliley Act, among the activities that will be deemed “financial in nature” for financial holding \ncompanies are, in addition to traditional lending activities, securities underwriting, dealing in or making a market in \nsecurities, sponsoring mutual funds and investment companies, insurance underwriting and agency activities, \nactivities which the Federal Reserve Board determines to be closely related to banking, and certain merchant \nbanking activities. The Federal Reserve Board has proposed permitting a number of additional financial activities, \nbut we cannot predict whether any of these additional proposals will be adopted or the form any final rule will take. \n\nWe elected to become a financial holding company in September 2001. As a financial holding company, we \nhave very broad discretion to affiliate with securities firms and insurance companies, make merchant banking \ninvestments, and engage in other activities that the Federal Reserve Board has deemed financial in nature. In order \nto continue as a financial holding company, we must continue to be well-capitalized, well-managed and maintain \ncompliance with the Community Reinvestment Act. Depending on the types of financial activities that we may \nengage in in the future, under Gramm-Leach-Bliley’s fractional regulation principles, we may become subject to \nsupervision by additional government agencies. The election to be treated as a financial holding company increases \nour ability to offer financial products and services that historically we were either unable to provide or were only \nable to provide on a limited basis. As a result, we will face increased competition in the markets for any new \nfinancial products and services that we may offer. Likewise, an increased amount of consolidation among banks and \nsecurities firms or banks and insurance firms could result in a growing number of large financial institutions that \ncould compete aggressively with us. ", - "page_start": 32, - "page_end": 32, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 177, + "page_end": 177, + "source_file": "00-80T-80.pdf" }, { - "text": "**The United States**\n**10**\n\n**SMBC GLOBAL FOUNDATION**\n\nBased in the United States, SMBC Global Foundation has \nBased in the United States, SMBC Global Foundation has \nprovided scholarships to more than 5,000 university students \nprovided scholarships to more than 5,000 university students \nin Asian countries since its establishment in 1994. In the \nin Asian countries since its establishment in 1994. In the \nUnited States, it supports educational trips to Japan \nUnited States, it supports educational trips to Japan \norganized by a high school located in Harlem, New York City, \norganized by a high school located in Harlem, New York City, \nand volunteer employees of SMBC and JRI to participate in \nand volunteer employees of SMBC and JRI to participate in \nschool beautification programs. The foundation also provides \nschool beautification programs. The foundation also provides \nmatching gifts for SMBC employees. \nmatching gifts for SMBC employees. ", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_SMFG_2011.pdf" + "text": "", + "page_start": 177, + "page_end": 177, + "source_file": "00-80T-80.pdf" }, { - "text": "to selected students pursuing careers in finance, economics, accounting, \nmarketing, business administration, computer science and information \ntechnology. In addition, scholars will take part in a Chesapeake Presiden- \ntial Leadership Course facilitated by faculty members in coordination with \ndesignated Chesapeake leadership coaches, including a Chesapeake senior \nvice president and OCU alumni. \n\nvolunteer program in which employees roll up their sleeves in the com- \nmunities they call home. \n\nChesapeake’s contributions take many forms: financial and equipment \ndonations, volunteerism and scholarships. Last year, we made numerous \nin-kind donations of laptops, reconditioned Chesapeake fleet vehicles and \nsubsidized office space. These contributions provide essential operating \ntools as nonprofit organizations across the nation attempt to serve more \npeople — often with lower budgets — in tough economic times. \n\nFor example, in Louisiana we donated 12 vehicles in 2010, including \none to the Panola College Oil and Natural Gas Technology Program, which \nteaches students about the natural gas industry and provides them with \nhands-on technical training. Across many of the company’s operating \nareas, we’ve donated computers to deserving students, schools and \norganizations through Chesapeake’s Discovering Tomorrow’s Leaders \nprogram. In 2010 the company equipped 14 students with laptops and \ndonated 70 computers to schools or supporting nonprofit organizations. ", - "page_start": 27, - "page_end": 27, - "source_file": "NYSE_CHK_2010.pdf" + "text": "", + "page_start": 307, + "page_end": 307, + "source_file": "00-80T-80.pdf" }, { - "text": "In the Directors’ opinion: \n\na) \n the financial statements and notes that are set out on pages 64 to 110 and the Remuneration \nReport in the Directors’ Report, are in accordance with the*Corporations Act 2001*, including: \n\ni) \n giving a true and fair view of the Group’s financial position as at 30 June 2013 and of its \nperformance for the financial year ended on that date; and \n\nii) \n complying with Australian Accounting Standards, the Corporations Regulations 2001 and \nother mandatory professional reporting requirements; and \n\nb) \n there are reasonable grounds to believe that the Company will be able to pay its debts as and \nwhen they become due and payable. \n\nNote 1 confirms that the financial statements also comply with International Financial Reporting \nStandards as issued by the International Accounting Standards Board. \n\nThe Directors have been given the declarations required by section 295A of the*Corporations Act 2001*\nfrom the Chief Executive Officer and Chief Financial Officer for the financial year ended 30 June 2013. \n\nThis declaration is made in accordance with a resolution of the Directors. ", - "page_start": 112, - "page_end": 112, - "source_file": "ASX_KCN_2013.pdf" + "text": "", + "page_start": 177, + "page_end": 177, + "source_file": "00-80T-80.pdf" } ] }, @@ -11859,64 +11859,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 316, + "page_end": 316, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 322, + "page_end": 322, + "source_file": "00-80T-80.pdf" }, { - "text": "$(143.4) $(24.0) $(167.4) \n\nIn general, goodwill is tested for impairment on an annual basis. In testing for impairment, the Company \nestimates the fair value of each operating segment and compares the fair values with the carrying values. If the \nfair value of an operating segment is greater than its carrying value, then no impairment results. If the fair \nvalue is less than its carrying value, then the Company would determine the fair value of the goodwill. The fair \nvalue of goodwill is determined by deducting the fair value of an operating segment's identiÑable assets and \nliabilities from the fair value of the operating segment as a whole, as if that operating segment had just been \nacquired and the purchase price were being initially allocated. If the fair value of the goodwill were less than \nits carrying value for a segment, an impairment charge would be recorded to earnings in the Company's \nConsolidated Statement of Income. \n\nIn addition, the Company would evaluate an operating segment for impairment if events or circumstances \nchange between annual tests indicating a possible impairment. Examples of such events or circumstances \ninclude: \n\n‚ A signiÑcant adverse change in legal factors or in the business climate, ", - "page_start": 70, - "page_end": 70, - "source_file": "NYSE_RSG_2004.pdf" + "text": "", + "page_start": 322, + "page_end": 322, + "source_file": "00-80T-80.pdf" }, { - "text": "Assets measured at fair value \nDerivative commodity contracts \nInterest rate swap contracts \nDevelopment and production \nassets (1) \n\n - \n- \n- \n\nLiabilities measured at fair value \nInterest rate swap contracts \n\nNet fair value \n\n(1) Excludes work-in-progress and restoration provision assets totaling $63.9 million. \n\n**Consolidated 31 December 2013**\n**(US$’000)** **Level 1** **Level 2** **Level 3** **Total**\n\nAssets measured at fair value \nInterest rate swap contract - 176 - 176 \n\nLiabilities measured at fair value \nDerivative commodity contracts \nInterest rate swap contracts - \n - (219) \n (147) - \n - (219) \n (147) \n\nNet fair value - (190) - (190) \n\nDuring the years ended 31 December 2014 and 2013, respectively, there were no transfers between level 1 and level \n2 fair value measurements, and no transfer into or out of level 3 fair value measurements. ", - "page_start": 83, - "page_end": 83, - "source_file": "ASX_SEA_2014.pdf" + "text": "", + "page_start": 322, + "page_end": 322, + "source_file": "00-80T-80.pdf" }, { - "text": "Note 2 – Fair Value of Financial Instruments \n\nASC 820, Fair Value Measurements (“ASC 820”) states that fair value is an exit price, representing the amount that \n\nwould be received to sell an asset or paid to transfer a liability in an orderly transaction between market participants. As such, \nfair value is a market-based measurement that should be determined based on assumptions that market participants would use \nin pricing an asset or a liability. The three-tiered fair value hierarchy, which prioritizes which inputs should be used in \nmeasuring fair value, is comprised of: (Level I) observable inputs such as quoted prices in active markets; (Level II) inputs \nother than quoted prices in active markets that are observable either directly or indirectly and (Level III) unobservable inputs \nfor which there is little or no market data. The fair value hierarchy requires the use of observable market data when available in \ndetermining fair value. Our assets and liabilities that were measured at fair value on a recurring basis were as follows (in \nmillions): \n\nSeptember 30, 2024 December 31, 2023 \n\nLevel I Level II Level III Fair Value Level I Level II Level III \n\n— $ 10,329 $ — $ 6,996 $ — $ 6,996 $ — \n\n— 4,162 — 470 — 470 — \n\n— 5,136 — 5,136 — \n\n— 480 — 480 — \n\n— 109 109 — — \n\n— $ 13,191 $ 109 $ 13,082 $ — ", - "page_start": 20, - "page_end": 20, - "source_file": "tesla_form_10q.pdf" + "text": "", + "page_start": 323, + "page_end": 323, + "source_file": "00-80T-80.pdf" }, { - "text": "In accordance with SFAS No. 133, entities are re q u i red to carry all derivative instruments on the balance sheet at fair value. The accounting for \nmovements in fair value of derivatives depends upon whether it has been designated and qualifies as part of a hedging relationship and, if so, the \nreason for holding it. If certain conditions are met, the Company may elect to designate a derivative instrument as a hedge of exposures. If the \nhedged exposure is a fair value exposure, movements in fair value are recognized in earnings with the offsetting gain or loss on the hedged item \nattributable to the hedged risk. If the hedged exposure is a cash flow exposure, the effective portion of the movement in fair value of the derivative \ni n s t rument is initially re p o rted as a component of other comprehensive income and subsequently reclassified into earnings at the time the \nf o recasted transaction impacts earnings. Amounts excluded from the assessment of hedge effectiveness as well as the ineffective portion of \nmovements in fair value of the derivative instrument are re p o rted in earnings in the current period. Accounting for foreign currency hedges is \nsimilar to the accounting for fair value and cash flow hedges. If a derivative instrument is not designated as a hedge, movements in the fair value \nof derivative instruments are recognized in earnings. ", - "page_start": 23, - "page_end": 23, - "source_file": "NASDAQ_EEFT_2000.pdf" + "text": "", + "page_start": 323, + "page_end": 323, + "source_file": "00-80T-80.pdf" }, { - "text": "All of our money market funds were classified within Level I of the fair value hierarchy because they were valued using \n\nquoted prices in active markets. Our U.S. government securities, certificates of deposit, commercial paper, time deposits and \ncorporate debt securities are classified within Level II of the fair value hierarchy and the market approach was used to \ndetermine fair value of these investments. ", - "page_start": 20, - "page_end": 20, - "source_file": "tesla_form_10q.pdf" + "text": "", + "page_start": 323, + "page_end": 323, + "source_file": "00-80T-80.pdf" }, { - "text": "and circumstances. We have re-evaluated our involvement in our \njoint arrangements and have accounted for these either using the \nproportionate \nequity method \ndepending on whether the investment is defined as a joint operation \nor a joint venture, respectively. The adoption of IFRS 11 was not \nmaterial to the current or comparative years. \n\nconsolidation method, or the \n\n(cid:129)*IFRS 13, Fair Value Measurement (IFRS 13) –*On January 1, 2013, we \nadopted IFRS 13, on a prospective basis, which provides a single source \nof guidance on how fair value is measured, replacing the fair value \nmeasurement guidance contained in individual IFRSs. IFRS 13 defines fair \nvalue and establishes a framework for measuring fair value. It does not \nintroduce new fair value measurements or eliminate the practicability \nexceptions to fair value measurements that currently exist in certain \nstandards. We have incorporated the fair \nvalue requirements \nthroughout our annual consolidated financial statements. \nYears ended December 31 \n% Chg 2012 \n\n**$** **3** $ 1 200 \n**$ 83** $ 38 ", - "page_start": 85, - "page_end": 85, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 323, + "page_end": 323, + "source_file": "00-80T-80.pdf" }, { - "text": "19. SECURITIES \n\na) Information regarding marketable securities classified as held-to-maturity debt securities and other securities as of March 31, 2005 and 2004 \nis as follows: \n\nMarketable held-to-maturity debt securities \n*Millions of yen* *Thousands of U.S. dollars*\n\nCarrying \nvalue Estimated \nfair value Unrealized \ngain (loss) Carrying \nvalue Estimated \nfair value Unrealized \ngain (loss) Fiscal year 2004*(As of Mar. 31, 2005)*\n\nSecurities whose carrying value exceeds their fair value: \n\nCorporate bonds......................................................................................................... \nTotal............................................................................................................................................... ¥201 \n¥201 ¥201 \n¥201 ¥0 \n¥0 $1,879 \n$1,879 $1,879 \n$1,879 $0 \n$0 \n\n*Millions of yen*\n\nCarrying \nvalue Estimated \nfair value Unrealized \ngain (loss) Fiscal year 2003*(As of Mar. 31, 2004)*\n\nSecurities whose carrying value exceeds their fair value: \n\nCorporate bonds......................................................................................................... \nTotal............................................................................................................................................... ¥249 \n¥249 ¥249 \n¥249 ¥0 \n¥0 ", - "page_start": 89, - "page_end": 89, - "source_file": "OTC_NSANY_2004.pdf" + "text": "", + "page_start": 323, + "page_end": 323, + "source_file": "00-80T-80.pdf" }, { - "text": "**Derivative Financial Instruments**\nThe Group uses derivative financial instruments to economically hedge its exposure to changes in commodity prices \narising in the normal course of business. The principal derivatives that may be used are commodity crude oil price \nswap, option and costless collar contracts and interest rate swaps. Their use is subject to policies and procedures as \napproved by the Board of Directors. The Group does not trade in derivative financial instruments for speculative \npurposes. \n\nDerivative financial instruments are recognised at fair value. Subsequent to initial recognition, derivative financial \ninstruments are recognised at fair value. The fair value of these derivative financial instruments is the estimated \namount that the Group would receive or pay to terminate the contracts at the reporting date, taking into account \ncurrent market prices and the current creditworthiness of the contract counterparties. The derivatives are valued \non a mark to market valuation and the gain or loss on re-measurement to fair value is recognised through the \nstatement of profit or loss and other comprehensive income. \n\ni) Financial assets at fair value through profit or loss \nFinancial assets are classified at fair value through profit or loss when they are held for trading for the purpose of \nshort term profit taking, when they are derivatives not held for hedging purposes, or designated as such to avoid an \naccounting mismatch or to enable performance evaluation where a group of financial assets is managed by key \nmanagement personnel on a fair value basis in accordance with a documented risk management or investment \nstrategy. Realised and unrealised gains and losses arising from changes in fair value are included in profit or loss in \nthe period in which they arise. ", - "page_start": 65, - "page_end": 65, - "source_file": "ASX_SEA_2014.pdf" + "text": "", + "page_start": 323, + "page_end": 323, + "source_file": "00-80T-80.pdf" } ] }, @@ -11933,64 +11933,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 249, + "page_end": 249, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 1, + "page_end": 1, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "Labour hire is heavily dependent upon the quality of the personnel database and our intention \n\nhas been announced to offer training at Dampier, Broome and Darwin for those who live in the \n\nNorth West and wish to work in the offshore industry there. Planning for this new initiative is \n\nwell advanced and we expect to be running courses for prospective offshore employees in coming \n\nmonths. Although the training program is not directed to any particular community group, it has \n\nbeen encouraging to have active support from Aboriginal leaders in the Kimberley region. ", - "page_start": 10, - "page_end": 10, - "source_file": "ASX_MRM_2000.pdf" + "text": "", + "page_start": 142, + "page_end": 142, + "source_file": "00-80T-80.pdf" }, { - "text": "company and draws on a variety of viewpoints aimed at meeting customer expectations. \n\nCombining diverse backgrounds and ways of thinking creates solutions that stretch the \n\norganization in new directions. \n\nSince the first days of the Nissan Revival Plan, everything we do at Nissan is based on \n\ncommitments. People must commit themselves to achieving goals. Some goals are internal, \n\nwhile others are of importance to a wider association of employees, shareholders, suppliers, \n\ncustomers and others. Setting a goal and developing the process to achieve it go beyond simply \n\nmeeting a target, however. These actions are meant to develop confidence and the desire to \n\nreach still higher levels of performance. ", - "page_start": 20, - "page_end": 20, - "source_file": "OTC_NSANY_2004.pdf" + "text": "", + "page_start": 142, + "page_end": 142, + "source_file": "00-80T-80.pdf" }, { - "text": "| | LEVERAGING BASE BUSINESS\nCreating value from the base business through environment,\nhealth, safety and operational excellence, optimisation\nprograms and cost leadership. |\n|---|---|\n| | LEVERAGING BASE BUSINESS Creating value from the base business through environment, health, safety and operational excellence, optimisation programs and cost leadership. |\n\n\n| | CREATING OPPORTUNITIES\nMaximising the value of the exploration program, building\na better and more balanced portfolio and pursuing new\nopportunities. |\n|---|---|\n| | CREATING OPPORTUNITIES Maximising the value of the exploration program, building a better and more balanced portfolio and pursuing new opportunities. |\n\n\n| | CAPTURING AND\nDELIVERING GROWTH\nCommencing new production, advancing key projects,\nextracting value from our infrastructure position and\nseeking innovative commercial arrangements. |\n|---|---|\n| | CAPTURING AND DELIVERING GROWTH Commencing new production, advancing key projects, extracting value from our infrastructure position and seeking innovative commercial arrangements. |\n\n\n| | MANAGING OPTIONS\nDelivering improved returns, strong cash flow and reserve\nreplacement through disciplined portfolio management,\nstrategic acquisitions and divestments, and making\nsustainable progress. |\n|---|---|\n| | MANAGING OPTIONS Delivering improved returns, strong cash flow and reserve replacement through disciplined portfolio management, strategic acquisitions and divestments, and making sustainable progress. |\n", - "page_start": 3, - "page_end": 3, - "source_file": "ASX_STO_2004.pdf" + "text": "", + "page_start": 142, + "page_end": 142, + "source_file": "00-80T-80.pdf" }, { - "text": "The third objective responds to the impact of the pandemic situation in 2020 and 2021. It includes the \ndevelopment of emergency procedures for future similar situations (‘Health crisis’). The Strategic \nFramework repeats and corroborates the value of research and data-based evidence by stating: \n*‘Research and data collection, both at EU and national level, are a pre-condition for the prevention of*\n*work-related diseases and accidents. Scientific advice and the latest technological developments feed*\n*into OSH legislation and policy.’*\n\nAlso, many Member States have agreed on provision of better data as an objective in their national \nstrategies.384 The EU strategy often gives orientation for the development of national OSH strategies. \nUnder the last strategy period, 24 of the 27 Member States had applied a strategy. Many national OSH \nstrategies contained similar targets. EU-OSHA published an overview report on national strategies, and \nthe OSH Barometer contains as one indicator a harmonised overview on the aspects of national \nstrategies.385 \n\nOSH strategies are regarded as an important and innovative policy area, a chance for better \ncollaboration, and also a very relevant joint national OSH activity. Those strategies help in priority setting \nand focused action on weaknesses. Strategies were often agreed in social dialogue processes, and \nmany strategy actors also developed new and better monitoring instruments and indicators.386 Labour \ninspections play an important or essential role in most of these strategies. 387 ", - "page_start": 124, - "page_end": 124, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 273, + "page_end": 273, + "source_file": "00-80T-80.pdf" }, { - "text": "The**International Social Security Association**(ISSA) developed the**Vision Zero initiative**. 330 ISSA \npromotes together with enterprises and many global OSH organisations this concept, aiming at the \ncomplete elimination of work accidents and occupational diseases. \n\nThe**UN**has developed a set of targets and indicators,**the Social Development Goals**(SDG).331 Target \n8 is dedicated to*‘Promote sustained, inclusive and sustainable economic growth, full and productive*\n*employment and decent work for all’.*Sub targets are: \n\n*8.5 By 2030, achieve full and productive employment and decent work for all women and men,*\n*including for young people and persons with disabilities, and equal pay for work of equal value*\n\n*8.7 Take immediate and effective measures to eradicate forced labour, end modern slavery and*\n*human trafficking and secure the prohibition and elimination of the worst forms of child labour,*\n*including recruitment and use of child soldiers, and by 2025 end child labour in all its forms*\n\n*8.8 Protect labour rights and promote safe and secure working environments for all workers,*\n*including migrant workers, in particular women migrants, and those in precarious employment*", - "page_start": 116, - "page_end": 116, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 142, + "page_end": 142, + "source_file": "00-80T-80.pdf" }, { - "text": "**State space search**\nState space search searches through a tree of possible states to try to find a goal state.[69] For example, \nplanning algorithms search through trees of goals and subgoals, attempting to find a path to a target goal, \na process called means-ends analysis.[70] \n\nSimple exhaustive searches[71] are rarely sufficient for most real-world problems: the search space (the \nnumber of places to search) quickly grows to astronomical numbers. The result is a search that is too slow \nor never completes.[15] \"Heuristics\" or \"rules of thumb\" can help prioritize choices that are more likely to \nreach a goal.[72] \n\nAdversarial search is used for game-playing programs, such as chess or Go. It searches through a tree of \npossible moves and countermoves, looking for a winning position.[73] ", - "page_start": 5, - "page_end": 5, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 142, + "page_end": 142, + "source_file": "00-80T-80.pdf" }, { - "text": "ATTAINING LEADERSHIP IN OUR INDUSTRY AND THE \nPRIVILEGE OF BEING CANADIANS’ COMPANY-OF-CHOICE IS \nABOUT DELIVERING THE BEST INNOVATIVE SERVICES WHILE \nBEING A RESPONSIBLE BUSINESS – AIMS THAT ARE DEEPLY \nCONNECTED. \n\nEach year we work hard to build a more sustainable business and \ncontribute to building a more sustainable world. Applying social and \nenvironmental responsibility throughout Rogers’ daily operations – and \nbeyond our own walls to our supply chain and communities – helps us \nattract customers, enhance employee recruitment and retention, mitigate \nrisks and provide value to all of our stakeholders. \n\nTo create a great workplace, we focus on all aspects of the employee \nexperience – investing millions in employee training and development, \nproviding attractive compensation and benefits, and developing a ", - "page_start": 20, - "page_end": 20, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 142, + "page_end": 142, + "source_file": "00-80T-80.pdf" }, { - "text": "Responsibilities of management include – \n\n• \n• \n• \n• \n• \nImplement the corporate strategy set by the Board; \nAchieve the performance targets set by the Board; \nDevelop, implement and manage risk management and internal control frameworks; \nDevelop, implement and update policies and procedures; \nProvide sufficient, relevant and timely information to the Board to enable the Board to effectively discharge its \nresponsibilities; and \n• Manage human, physical and financial resources to achieve the Company’s objectives – in other words to run the day \nto day business in an effective way. \n\n**1.2 Management Performance**\n\nSundance’s Chairman, with Non-Executive Director input, is responsible for providing feedback to the MD on his performance \nassessed against the responsibilities mentioned above. The MD, with Chairman and Non-Executive Directors input, is responsible \nfor providing feedback to senior executives and assessing their performance against the responsibilities mentioned above. \n\nDuring fiscal year 2014, an annual performance evaluation of senior executives was completed in line with the Company’s \nincentive compensation policy as well as periodic one on one discussions carried out by the MD. Appropriate induction \nprocedures are in place to allow new senior executives to participate fully and actively in management decision making at the \nearliest opportunity. ", - "page_start": 50, - "page_end": 50, - "source_file": "ASX_SEA_2014.pdf" + "text": "", + "page_start": 142, + "page_end": 142, + "source_file": "00-80T-80.pdf" } ] }, @@ -12001,70 +12001,70 @@ "target_page": 1, "target_passage": "adaptations based on this work must be licensed under the same license.", "chunk_present": { - "presence": true, - "index": 7 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 16, + "page_end": 16, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 177, + "page_end": 177, + "source_file": "00-80T-80.pdf" }, { - "text": "\nor ", - "page_start": 203, - "page_end": 203, + "text": "", + "page_start": 177, + "page_end": 177, "source_file": "00-80T-80.pdf" }, { - "text": "\n\nor ", - "page_start": 155, - "page_end": 155, + "text": "", + "page_start": 177, + "page_end": 177, "source_file": "00-80T-80.pdf" }, { - "text": "**enChoice**. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 ", - "page_start": 5, - "page_end": 5, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 177, + "page_end": 177, + "source_file": "00-80T-80.pdf" }, { - "text": "PROPELLER ADVANCE RATIO, J \n. . . . . .._.........._................ \n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..~.~~.................................... \n. . . . . . . . . . . . . . . . . \n::::::::::::::::::::::::::::::::::::::::::::~~:~~~~~~~~~~~~~~~~~~~~::::::::~::::::: \n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . \nliiiiiii!lililliiiiiiiliiiii8iiliili::::::::::::::::::::::::::::~~~~~~~~~~~ \n.,............._............................................. \n::::::::::: ::::::::::::::~~::::::::::::: \nI.. \nPOWER AVAILABLE \n--. \n\\ \nBHP \n\\ \n--- ", - "page_start": 167, - "page_end": 167, + "text": "", + "page_start": 178, + "page_end": 178, "source_file": "00-80T-80.pdf" }, { - "text": "\n\n*\n,-. \n. :,,. ", - "page_start": 374, - "page_end": 374, + "text": "", + "page_start": 178, + "page_end": 178, "source_file": "00-80T-80.pdf" }, { - "text": "| | Understanding\nCreative Commons\nlicense\nbefore licensing your work | |\n|---|---|---|\n| | Understanding Creative Commons license before licensing your work | |\n| | | |\n| | THREE-LAYER DESIGN Creative Commons (CC) license has three layers: \"Legal Code\" (base layer): contains terms and conditions to be used by lawyers and legally applicable in court. \"Human Readable\" (commons deeds): contain the summary of the legal code and key terms. \"Machine Readable\": contains HTML or codes for machines to recognize a work is available under a Creative Commons license. | |\n| | FOUR ELEMENTS BY (\"Attribution\"): users must credit the author of the work they are using. BY NC SA (\"ShareAlike\"): adaptations based on this work must be licensed under the same license. NC (\"NonCommercial\"): the work is only available to be used for noncommercial purposes. ND (\"NoDerivative\"): reusers making cannot share adaptations of SA ND the work. | |\n| | SIX LICENSES » open share, commercialize CC BY (\"Attribution\") allows people to use the work for any purpose (even & more commercially and even in modified form) as long as they give attribution to the remix, can creator. you CC BY-SA (\"Attribution-ShareAlike\") allows people to use the work for any purpose (even commercially and even in modified form), as long as they give attribution to the creator and make any adaptations they share with others available under the same or & a compatible license. share only CC BY-NC (\"Attribution-NonCommercial\") allows people to use the work for remix noncommercial purposes only, and only as long as they give attribution to the can creator. you CC BY-NC-SA (\"Attribution-NonCommercial-ShareAlike\") allows people to use the work for noncommercial purposes only, and only as long as they give attribution to only the creator and make any adaptations they share with others available under the restrictive same or a compatible license. share CC BY-ND (\"Attribution-NoDerivative\") allows people to use the unadapted work for can any purpose (even commercially), as long as they give attribution to the creator. more you CC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the « unadapted work for noncommercial purposes only, and only as long as they give attribution to the licensor. | |\n| | REMIND THAT… CC license only applicable to the work that is within the scope of copyright law. CC license can be used when … you want to give others permissions to freely copy and redistribute your work, and you want to give others permission to freely transform, alter, or otherwise create derivative works based on your work. | |\n| | CC LICENSE CAN'T BE USED FOR … fair use, fair dealing, or some other limitation and exception to copyright applies the the work. ALSO FOR … the work that is already in the Public Domain. For those who want to waive their rights from copyright protection, use CC0 (\"CC Zero\"). | |\n| | NOW, SHARE YOUR WORK! https://creativecommons.org/choose/ Texts are adapted from CC Certification for Educators. CC BY license. BY, SA, NC, ND icons, CC BY, CC BY-SA, CC BY-NC, CC BY-NC-SA, CC BY-ND, and CC BY-NC-ND buttons are trademark of Creative Commons, and subject to their policies. 3-layer design of CC license image is taken from CC Certification for Educators. CC BY license. Line, icons, and gradients are from Canva, and subject to their policies. | |\n", - "page_start": 1, - "page_end": 1, - "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + "text": "", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_HRL_2004.pdf" }, { - "text": "endurance \n\noff-optimum. .............................. \nperformance. ............... \nspecific ................................. \nengine failure \n\neffect on multiengine airplane. ............ \npower off glide performance. ................ \n\nequilibrium conditions. ....................... \nequivalent airspeed, EAT. \nequivalent parasite area. ...................... \nequivalent shaft horsepower, ESHP. ........... \nexpansionwave .............................. \nfactorofsafcty \n............................... \nfatigue considerations. ........................ \nfeathering and governing of propellers. ......... \nflap \n\naerodynamic effects. ....................... \ntypCS ...................................... \nflutter ....................................... \nforce divergence. ............................. \nfriction \n37, 43 \n41 \n342 \n218 \nMach number \n\ndefinition. .................................. \ncritical Mach “umber. ...................... \n\nbraking, \n............................. \ncocfficicnt. ................................ \nskin friction. .............................. \n\nmaneuvering load factor ..................... \nmaneuvering performance. ........ \nmaneuvering stability. \nmean aerodynamic chord, MAC. \nmirror landing system ......................... \nnormal shock wave. .......................... \nobliqueshockwave .......................... \noperating limitations \n\n........... \n...................... \n\n............. ", - "page_start": 433, - "page_end": 433, - "source_file": "00-80T-80.pdf" + "text": "", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_HRL_2004.pdf" }, { - "text": "Logging in to the OpenShift web console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224 \nDeploying an NGINX server by using the OpenShift web console. . . . . . . . . . . . . . . . . . . 225 \nDeploying a second NGINX server by using the OpenShift web console . . . . . . . . . . . . . 229 \nCustomizing the index.test file of the NGINX instances . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 \nCreating a route to balance the network traffic between the two NGINX instances. . . . . . 237 \nTesting load balancing across NGINX instances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239 \n\n**Appendix C. Seamless application movement across multicloud environments**. . 241 \nNetwork tunneling for MongoDB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242 \nMoving the application across clouds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243 \nStarting the pod at Amazon Web Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243 \nAccessing MongoDB by using the tunneled connection . . . . . . . . . . . . . . . . . . . . . . . . 244 \nMoving to the on-premises Power Systems cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245 ", - "page_start": 8, - "page_end": 8, - "source_file": "sg248459.pdf" + "text": "", + "page_start": 178, + "page_end": 178, + "source_file": "00-80T-80.pdf" } ] }, @@ -12081,64 +12081,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 206, + "page_end": 206, + "source_file": "00-80T-80.pdf" }, { - "text": "© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access \narticle distributed under the terms and conditions of the Creative Commons Attribution \n(CC BY) license (http://creativecommons.org/licenses/by/4.0/). ", - "page_start": 22, - "page_end": 22, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 331, + "page_end": 331, + "source_file": "sg246915.pdf" }, { - "text": "What Is Creative Commons? \nCreative Commons is a global nonprofit organization \ndedicated to supporting an open and accessible Internet \nthat is enriched with free knowledge and creative resources \nfor people around the world to use, share, and cultivate. \n\nOur easy-to-use licenses provide a simple, standardized way \nto give the public permission to share and use your creative \nwork — on conditions of your choice. CC licenses let you \nchange your copyright terms from the default of “all rights \nreserved” to “some rights reserved.” \n\nMillions of people use CC licenses on some of the world’s \nmost popular platforms for user-generated content. When \nyou use a CC license to share your photos, videos, or blog, \nyour creation joins a globally accessible pool of resources \nthat includes the work of artists, educators, scientists, and \ngovernments. ", - "page_start": 1, - "page_end": 1, - "source_file": "Publicdomain.pdf" + "text": "", + "page_start": 47, + "page_end": 47, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "**Copyright:**© 2025 by the authors. \nLicensee MDPI, Basel, Switzerland. \nThis article is an open access article \ndistributed under the terms and \nconditions of the Creative Commons \nAttribution (CC BY) license \n(https://creativecommons.org/ \nlicenses/by/4.0/). ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed7_cc4.pdf" + "text": "", + "page_start": 88, + "page_end": 88, + "source_file": "00-80T-80.pdf" }, { - "text": "**Publisher’s note**Springer Nature remains neutral with regard to jurisdictional claims in \npublished maps and institutional affiliations. \n\n**Open Access**This article is licensed under a Creative Commons Attribution \n4.0 International License, which permits use, sharing, adaptation, distribution \nand reproduction in any medium or format, as long as you give appropriate \n\ncredit to the original author(s) and the source, provide a link to the Creative Commons licence, \nand indicate if changes were made. The images or other third party material in this article are \nincluded in the article’s Creative Commons licence, unless indicated otherwise in a credit line \nto the material. If material is not included in the article’s Creative Commons licence and your \nintended use is not permitted by statutory regulation or exceeds the permitted use, you will \nneed to obtain permission directly from the copyright holder. To view a copy of this licence, \nvisit http://creativecommons.org/licenses/by/4.0/. genome-wide genealogies. Preprint at*bioRxiv*https://doi.org/10.1101/2021.07.13.452277 \n(2021). \n41. Coop, G. Genetic similarity versus genetic ancestry groups as sample descriptors in \nhuman genetics. Preprint at https://arxiv.org/abs/2207.11595 (2022). \n© The Author(s) 2025 ", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed3.pdf" + "text": "", + "page_start": 47, + "page_end": 47, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "**3.2.6 How to view licensing information**\n\nLicensing information is available for all datasets associated with common licences, which are \nsupported by the Licence Assistant. When available a link to the assistant is provided on left side of a \ndataset page. \n\nBy clicking on the**licence name**(here: cc-by), the Licence Assistant tool is opened in a new window, \ndisplaying relevant information for this particular licence. ", - "page_start": 34, - "page_end": 34, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + "text": "", + "page_start": 47, + "page_end": 47, + "source_file": "Excel Training Manual 1.pdf" }, - { - "text": "with. The vast majority of in-copyright books are out-of-print or out-of-commerce, and most \nare not actively managed by their rightsholders. There is no official registry of copyrighted \nworks and their owners, and existing datasets can be incomplete or erroneous. 16 \n\nAs a result, there may be no way to license the vast majority of in-copyright books, especially \nthose that have or have had limited commercial value. \n Put differently, the barrier to using \nmost books is not simply to pay publishers; even if one had significant financial resources, \nlicensing would not enable access to most works. \n\n17 \n\n**Permissively licensed works**\n\nThere are books that have been permissively licensed in an easily identifiable way, such as \nworks placed under Creative Commons (CC) licenses. Such works explicitly allow particular \nuses of works subject to various responsibilities (e.g., requiring attribution by the user in their \nfollow-on use). \n\nWhile such works could be candidates for inclusion in a books data commons, their inclusion \ndepends on whether the license’s terms can be complied with in the context of AI training. \nFor instance, in the context of CC licensed works, there are requirements for proper \nattribution across all licenses (the CC tools Public Domain Dedication (CC0) and Public \nDomain Mark (PDM) are not licenses and do not require attribution). 18 ", - "page_start": 10, - "page_end": 10, - "source_file": "creative_common_ai.pdf" + { + "text": "", + "page_start": 334, + "page_end": 334, + "source_file": "sg246915.pdf" }, { - "text": "**Funding**\nFunding was provided by the National Key Research and Development program of China (Grant Nos. \n2019YFA0607403 and 2017YFD0300301) and National Natural Science Foundation of China (Grant Nos. \n41961124007 and 41871026). \n\n**Competing interests**\nThe authors declare no competing interests. \n\n**Additional information**\n**Correspondence**and requests for materials should be addressed to K.L. \n\n**Reprints and permissions information**is available at www.nature.com/reprints. \n\n**Publisher’s note**Springer Nature remains neutral with regard to jurisdictional claims in published maps and \ninstitutional affiliations. \n\n**Open Access**This article is licensed under a Creative Commons Attribution 4.0 International \nLicense, which permits use, sharing, adaptation, distribution and reproduction in any medium or \nformat, as long as you give appropriate credit to the original author(s) and the source, provide a link to the \nCreative Commons licence, and indicate if changes were made. The images or other third party material in this \narticle are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the \nmaterial. If material is not included in the article’s Creative Commons licence and your intended use is not \npermitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from \nthe copyright holder. To view a copy of this licence, visit http:// creat iveco mmons. org/ licen ses/ by/4. 0/. ", - "page_start": 14, - "page_end": 14, - "source_file": "pubmed9.pdf" + "text": "", + "page_start": 47, + "page_end": 47, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "© The Author(s) 2023. Published by Oxford University Press. \nThis is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which \npermits unrestricted reuse, distribution, and reproduction in any medium, provided the original work is properly cited. ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed1.pdf" + "text": "", + "page_start": 335, + "page_end": 335, + "source_file": "sg246915.pdf" } ] }, @@ -12149,69 +12149,69 @@ "target_page": 1, "target_passage": "fair use, fair dealing, or some other limitation and exception to copyright applies the the work.", "chunk_present": { - "presence": true, - "index": 4 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" - }, - { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 215, + "page_end": 215, + "source_file": "00-80T-80.pdf" }, { - "text": "with. The vast majority of in-copyright books are out-of-print or out-of-commerce, and most \nare not actively managed by their rightsholders. There is no official registry of copyrighted \nworks and their owners, and existing datasets can be incomplete or erroneous. 16 \n\nAs a result, there may be no way to license the vast majority of in-copyright books, especially \nthose that have or have had limited commercial value. \n Put differently, the barrier to using \nmost books is not simply to pay publishers; even if one had significant financial resources, \nlicensing would not enable access to most works. \n\n17 \n\n**Permissively licensed works**\n\nThere are books that have been permissively licensed in an easily identifiable way, such as \nworks placed under Creative Commons (CC) licenses. Such works explicitly allow particular \nuses of works subject to various responsibilities (e.g., requiring attribution by the user in their \nfollow-on use). \n\nWhile such works could be candidates for inclusion in a books data commons, their inclusion \ndepends on whether the license’s terms can be complied with in the context of AI training. \nFor instance, in the context of CC licensed works, there are requirements for proper \nattribution across all licenses (the CC tools Public Domain Dedication (CC0) and Public \nDomain Mark (PDM) are not licenses and do not require attribution). 18 ", - "page_start": 10, - "page_end": 10, - "source_file": "creative_common_ai.pdf" + "text": "", + "page_start": 205, + "page_end": 205, + "source_file": "00-80T-80.pdf" }, { - "text": "\nCH6RD \nt -I \n\nCA \nv \n\nLOCATION OF \nMAXIMUM CAMBER \nt- ", - "page_start": 39, - "page_end": 39, + "text": "", + "page_start": 205, + "page_end": 205, "source_file": "00-80T-80.pdf" }, { - "text": "| | Understanding\nCreative Commons\nlicense\nbefore licensing your work | |\n|---|---|---|\n| | Understanding Creative Commons license before licensing your work | |\n| | | |\n| | THREE-LAYER DESIGN Creative Commons (CC) license has three layers: \"Legal Code\" (base layer): contains terms and conditions to be used by lawyers and legally applicable in court. \"Human Readable\" (commons deeds): contain the summary of the legal code and key terms. \"Machine Readable\": contains HTML or codes for machines to recognize a work is available under a Creative Commons license. | |\n| | FOUR ELEMENTS BY (\"Attribution\"): users must credit the author of the work they are using. BY NC SA (\"ShareAlike\"): adaptations based on this work must be licensed under the same license. NC (\"NonCommercial\"): the work is only available to be used for noncommercial purposes. ND (\"NoDerivative\"): reusers making cannot share adaptations of SA ND the work. | |\n| | SIX LICENSES » open share, commercialize CC BY (\"Attribution\") allows people to use the work for any purpose (even & more commercially and even in modified form) as long as they give attribution to the remix, can creator. you CC BY-SA (\"Attribution-ShareAlike\") allows people to use the work for any purpose (even commercially and even in modified form), as long as they give attribution to the creator and make any adaptations they share with others available under the same or & a compatible license. share only CC BY-NC (\"Attribution-NonCommercial\") allows people to use the work for remix noncommercial purposes only, and only as long as they give attribution to the can creator. you CC BY-NC-SA (\"Attribution-NonCommercial-ShareAlike\") allows people to use the work for noncommercial purposes only, and only as long as they give attribution to only the creator and make any adaptations they share with others available under the restrictive same or a compatible license. share CC BY-ND (\"Attribution-NoDerivative\") allows people to use the unadapted work for can any purpose (even commercially), as long as they give attribution to the creator. more you CC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the « unadapted work for noncommercial purposes only, and only as long as they give attribution to the licensor. | |\n| | REMIND THAT… CC license only applicable to the work that is within the scope of copyright law. CC license can be used when … you want to give others permissions to freely copy and redistribute your work, and you want to give others permission to freely transform, alter, or otherwise create derivative works based on your work. | |\n| | CC LICENSE CAN'T BE USED FOR … fair use, fair dealing, or some other limitation and exception to copyright applies the the work. ALSO FOR … the work that is already in the Public Domain. For those who want to waive their rights from copyright protection, use CC0 (\"CC Zero\"). | |\n| | NOW, SHARE YOUR WORK! https://creativecommons.org/choose/ Texts are adapted from CC Certification for Educators. CC BY license. BY, SA, NC, ND icons, CC BY, CC BY-SA, CC BY-NC, CC BY-NC-SA, CC BY-ND, and CC BY-NC-ND buttons are trademark of Creative Commons, and subject to their policies. 3-layer design of CC license image is taken from CC Certification for Educators. CC BY license. Line, icons, and gradients are from Canva, and subject to their policies. | |\n", - "page_start": 1, - "page_end": 1, - "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + "text": "", + "page_start": 35, + "page_end": 35, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "CC0 (“CC Zero”) is intended for use only \nby authors or holders of copyright and \n\nrelated rights (including database rights), in connection \nwith works that are still subject to those rights in one or \nmore countries. \n\nWhen CC0 is applied to a work, copyright and related \nrights are relinquished worldwide, making the work free \nfrom those restrictions to the greatest extent possible. \n\nThe Public Domain Mark (PDM) is used \nto label works that are already free of \n\nknown copyright restrictions. Unlike CC0, PDM doesn’t \nchange the copyright status of a work. \n\nPDM can be used by anyone, and is intended for use \nwith works that are already free of known copyright \nrestrictions throughout the world. ", - "page_start": 1, - "page_end": 1, - "source_file": "Publicdomain.pdf" + "text": "", + "page_start": 35, + "page_end": 35, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "**3.2.6 How to view licensing information**\n\nLicensing information is available for all datasets associated with common licences, which are \nsupported by the Licence Assistant. When available a link to the assistant is provided on left side of a \ndataset page. \n\nBy clicking on the**licence name**(here: cc-by), the Licence Assistant tool is opened in a new window, \ndisplaying relevant information for this particular licence. ", + "text": "", "page_start": 34, "page_end": 34, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "\n\nt- ", - "page_start": 187, - "page_end": 187, + "text": "", + "page_start": 205, + "page_end": 205, "source_file": "00-80T-80.pdf" }, { - "text": "**Funding**\nFunding was provided by the National Key Research and Development program of China (Grant Nos. \n2019YFA0607403 and 2017YFD0300301) and National Natural Science Foundation of China (Grant Nos. \n41961124007 and 41871026). \n\n**Competing interests**\nThe authors declare no competing interests. \n\n**Additional information**\n**Correspondence**and requests for materials should be addressed to K.L. \n\n**Reprints and permissions information**is available at www.nature.com/reprints. \n\n**Publisher’s note**Springer Nature remains neutral with regard to jurisdictional claims in published maps and \ninstitutional affiliations. \n\n**Open Access**This article is licensed under a Creative Commons Attribution 4.0 International \nLicense, which permits use, sharing, adaptation, distribution and reproduction in any medium or \nformat, as long as you give appropriate credit to the original author(s) and the source, provide a link to the \nCreative Commons licence, and indicate if changes were made. The images or other third party material in this \narticle are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the \nmaterial. If material is not included in the article’s Creative Commons licence and your intended use is not \npermitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from \nthe copyright holder. To view a copy of this licence, visit http:// creat iveco mmons. org/ licen ses/ by/4. 0/. ", - "page_start": 14, - "page_end": 14, - "source_file": "pubmed9.pdf" + "text": "", + "page_start": 34, + "page_end": 34, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "\nt ", - "page_start": 189, - "page_end": 189, + "text": "", + "page_start": 34, + "page_end": 34, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "", + "page_start": 205, + "page_end": 205, "source_file": "00-80T-80.pdf" } ] @@ -12223,70 +12223,70 @@ "target_page": 9, "target_passage": "As of December 31, 2004, our operations were organized into five regions whose boundaries may change from time to time: Eastern, Central, Southern, Southwestern and Western.", "chunk_present": { - "presence": true, - "index": 4 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 186, + "page_end": 186, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 232, + "page_end": 232, + "source_file": "00-80T-80.pdf" }, { - "text": "E u ronet Worldwide and its subsidiaries operate in two business segments: (1) a segment providing secure processing of financial transactions (the \n“Network Services Segment”); and (2) a segment producing application software for the processing of secure electronic financial transaction (the \n“ S o f t w a re Solutions Segment”). In addition, the Company’s management divides the Network Services Segment into three sub-segments: “Central \nE u ropean Sub-segment” (including Hungary, Poland, the Czech Republic, Croatia, Greece and Romania), “We s t e rn European Sub-segment” \n(including Germ a n y, France and the United Kingdom) and “Other Operations Sub-segment” (including the United States and unallocated \np rocessing center costs). These business segments, and their sub-segments, are supported by a corporate service segment, which pro v i d e s \ncorporate and other administrative services that are not directly identifiable with the two business segments (the “Corporate Services Segment”). \nThe accounting policies of each segment are the same as those described in the summary of significant accounting policies. The Company \nevaluates perf o rmance based on profit or loss from operations before income taxes not including nonre c u rring gains and net loss. Prior period \nsegment information has been restated to conform to the current period’s presentation. (See Note 19 to the Consolidated Financial Statements - \nBusiness segment information.) ", - "page_start": 17, - "page_end": 17, - "source_file": "NASDAQ_EEFT_2000.pdf" + "text": "", + "page_start": 232, + "page_end": 232, + "source_file": "00-80T-80.pdf" }, { - "text": "**(19) Business Segment Information**\n\nE u ronet and its subsidiaries operate in two business segments: (1) a segment that provides an independent shared ATM network and other \ne l e c t ronic payment network services to banks, retail and financial institutions (the “Network Services Segment”); and (2) a segment that \np roduces application software and solutions for payment and transaction delivery systems (the “Software Solutions Segment”). These \nbusiness segments are supported by a corporate service segment which provides corporate and other administrative services which are not \nd i rectly identifiable with the two business segments, (the “Corporate Services Segment”). The accounting policies of each segment are the \nsame as those described in the summary of significant accounting policies. The Company evaluates perf o rmance based on profit or loss fro m \noperations before income taxes not including nonre c u rring gains and net loss. Prior period segment information has been restated to conform \nto the current period’s presentation. ", - "page_start": 43, - "page_end": 43, - "source_file": "NASDAQ_EEFT_2000.pdf" + "text": "", + "page_start": 232, + "page_end": 232, + "source_file": "00-80T-80.pdf" }, { - "text": "**ITEM 1. BUSINESS**\n\n**Company Overview**\n\nWe are a leading provider of services in the domestic non-hazardous solid waste industry. We provide \nnon-hazardous solid waste collection services for commercial, industrial, municipal and residential customers \nthrough 140 collection companies in 22 states. We also own or operate 96 transfer stations, 58 solid waste \nlandÑlls and 35 recycling facilities. \n\nAs of December 31, 2004, our operations were organized into Ñve regions whose boundaries may change \nfrom time to time: Eastern, Central, Southern, Southwestern and Western. Each region is organized into \nseveral operating areas and each area contains a group of operating locations. Each of our regions and \nsubstantially all our areas provide collection, transfer, recycling and disposal services. We believe that this \norganizational structure facilitates the integration of our operations within each region, which is a critical \ncomponent of our operating strategy. See Note 10 of the Notes to Consolidated Financial Statements for \nfurther discussion of operating segments. \n\nWe had revenue of $2,708.1 million and $2,517.8 million and operating income of $452.3 million and \n$412.7 million for the years ended December 31, 2004 and 2003, respectively. The $190.3 million, or 7.6%, \nincrease in revenue from 2003 to 2004 is primarily attributable to the successful execution of our operating and \ngrowth strategies described below. The $39.6 million, or 9.6%, increase in operating income from 2003 to 2004 \nis partially due to higher self-insurance expense during 2003 related to existing claims and was attributable to \nthe expansion of our operations and various changes in estimates as a result of continued negative trends \nthrough the 2003 policy year. The remaining increase in operating income is due to the successful execution of \nour operating and growth strategies described below. ", - "page_start": 9, - "page_end": 9, - "source_file": "NYSE_RSG_2004.pdf" + "text": "", + "page_start": 232, + "page_end": 232, + "source_file": "00-80T-80.pdf" }, { - "text": "‚***Decentralized Management Structure.***We maintain a relatively small corporate headquarters staÅ, \nrelying on a decentralized management structure to minimize administrative overhead costs and to \nmanage our day-to-day operations more eÇciently. Our local management has extensive industry \nexperience in growing, operating and managing solid waste companies and has substantial experience \nin their local geographic markets. In early 2001, we added a sales, maintenance and operations \nmanager to each of our regional management teams, which previously consisted of a regional vice \npresident and a regional controller. We believe that strengthening our regional management teams \nallows us to more eÅectively and eÇciently drive our company's initiatives and helps ensure \nconsistency throughout our organization. Our regional management teams and our area presidents have \nextensive authority, responsibility and autonomy for operations within their respective geographic \nmarkets. Compensation for regional and area management teams is primarily based on the improve- \nment in operating income produced and the free cash Öow and return on invested capital generated in \neach manager's geographic area of responsibility. In addition, through long-term incentive programs, \nincluding stock options, we believe we have one of the lowest turnover levels in the industry for our \nlocal management teams. As a result of retaining experienced managers with extensive knowledge of \nand involvement in their local communities, we are proactive in anticipating our customers' needs and \nadjusting to changes in our markets. We also seek to implement the best practices of our various \nregions and areas throughout our operations to improve operating margins. ", - "page_start": 12, - "page_end": 12, - "source_file": "NYSE_RSG_2004.pdf" + "text": "", + "page_start": 232, + "page_end": 232, + "source_file": "00-80T-80.pdf" }, { - "text": "**EXHIBIT 23.1**\n\n**CONSENT OF INDEPENDENT REGISTERED PUBLIC ACCOUNTING FIRM**\n\nWe consent to the incorporation by reference in the Registration Statements (Form S-8 Nos. 333-81801, \n333-78125, 333-45542 and 333-104048) pertaining to the Republic Services 401(k) Plan, 1998 Stock \nIncentive Plan, Republic Services, Inc. Amended and Restated Employee Stock Purchase Plan, and Republic \nServices, Inc. Amended and Restated 1998 Stock Incentive Plan, respectively, of our reports dated \nFebruary 24, 2005, with respect to the consolidated Ñnancial statements and schedule of Republic Services, \nInc., Republic Services, Inc. management's assessment of the eÅectiveness of internal control over Ñnancial \nreporting, and the eÅectiveness of internal control over Ñnancial reporting of Republic Services, Inc., included \nin this Annual Report (Form 10-K) for the year ended December 31, 2004. ", - "page_start": 103, - "page_end": 103, - "source_file": "NYSE_RSG_2004.pdf" + "text": "", + "page_start": 232, + "page_end": 232, + "source_file": "00-80T-80.pdf" }, { - "text": "ten thousand people involved in R&D, but we also have two \n\nmajor centers in North America and Europe, and smaller \n\noperations in Taiwan, China, Thailand, South Africa and \n\nBrazil. In the past, these entities were mostly standalone \n\noperations, but today there are many more joint projects ", - "page_start": 46, - "page_end": 46, - "source_file": "OTC_NSANY_2004.pdf" + "text": "", + "page_start": 232, + "page_end": 232, + "source_file": "00-80T-80.pdf" }, { - "text": "**10. SEGMENT INFORMATION**\n\nThe Company's operations are managed and evaluated through Ñve regions: Eastern, Central, Southern, \nSouthwestern and Western. These Ñve regions are presented below as the Company's reportable segments. \nThese reportable segments provide integrated waste management services consisting of collection, transfer and \ndisposal of domestic non-hazardous solid waste. ", - "page_start": 88, - "page_end": 88, - "source_file": "NYSE_RSG_2004.pdf" + "text": "", + "page_start": 232, + "page_end": 232, + "source_file": "00-80T-80.pdf" }, { - "text": "As the Network Services Segment continued to grow throughout 1999, the Company’s management began to divide the internal org a n i z a t i o n \nof the segment into Sub-segments. Accord i n g l y, beginning in January 2000, the Company divided the Network Services Segment into thre e \nSub-segments: “Central European Sub-segment” (including Hungary, Poland, the Czech Republic, Croatia, Greece and Romania), “We s t e rn \nE u ropean Sub-segment” (including Germ a n y, France, and the United Kingdom) and “Other Operations Sub-segment” (including the United \nStates and unallocated processing center costs). Where practical, certain amounts have been reclassified to reflect the change in intern a l \nre p o rting. The Company is unable to present Network Services Segment assets by Sub-segment as of December 31, 1999. Prior to January 1, \n2000, certain assets that were used to provide support services to the Company as a whole were included in the assets in the balance sheet of \nthe Company’s wholly owned Hungarian subsidiary, Bank Tech. In order to segregate corporate assets from those of the Hungarian \noperations, these assets were transferred as of December 31, 1999, from Bank Tech to an existing Hungarian shell company, Administrative \nS e rvices. Those assets are now shown under the Other Operations Sub-segment. ", - "page_start": 43, - "page_end": 43, - "source_file": "NASDAQ_EEFT_2000.pdf" + "text": "", + "page_start": 232, + "page_end": 232, + "source_file": "00-80T-80.pdf" } ] }, @@ -12297,69 +12297,69 @@ "target_page": 12, "target_passage": "The announcement of the merger between MGM MIRAGE and Mandalay Resort Group was one of the seminal moments of 2004", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 116, + "page_end": 116, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\nThe announcement of \nthe merger between \nMGM MIRAGE and \nMandalay Resort Group \nwas one of the seminal \nmoments of 2004. ", - "page_start": 12, - "page_end": 12, + "text": "", + "page_start": 20, + "page_end": 20, "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "| wide array of community needs. From homeless shelters to\nafter-school programs, MGM MIRAGE employees have\ngenerously donated more than $8 million since 2001.\nYour company also sets aside a portion of its profits\neach year to be given to important programs intended to\nbuild stronger communities. Since 2001, your company has\ngiven more than $18 million to support such programs.\nDefining Momentum in Our Family\nOur momentum is driven from within by acknowledging\nthe contributions of each and every one of our employees,\nbusiness partners and customers. Our commitment to\ndiversity is recognition of the fact that in today’s ever-\nchanging marketplace, we must reflect that which we see\nin the world around us.\nThis commitment should be seen as a common- (from left to right) KENNETH ROSEVEAR President, MGM MIRAGE Development; JOHN T. REDMOND President & CEO, MGM Grand Resorts, LLC;\nJ. TERRENCE LANNI Chairman & CEO, MGM MIRAGE; ROBERT H. BALDWIN President & CEO, Mirage Resorts, Incorporated & President, Project CityCenter;\nsense business decision. That said, we are proud of\nGARY N. JACOBS Executive Vice President, General Counsel & Secretary, MGM MIRAGE; JAMES J. MURREN President, CFO & Treasurer, MGM MIRAGE\nthe recognition our Diversity program has received,\nincluding accolades from prestigious media such as\nFortune and DiversityInc. magazines. Defining Momentum in the Future As exciting as 2004 was, our momentum will carry us\nSince formalizing our program only four years ago, Your company achieved many business goals in 2004 to even greater achievements in 2005 and beyond.\nwe’ve made enormous strides. There is still progress to and set in motion plans for future growth. These initiatives\nbe made and your company has the momentum to will provide unmatched returns. We have also created unri-\nremain at the forefront on diversity initiatives, provid- valed opportunities for our employees and will continue\nJ. TERRENCE LANNI\ning yet another advantage for sustaining performance in our rich history of strengthening the communities in which\nChairman of the Board & Chief Executive Officer\nthe long term. we do business. March 31, 2005 | | | (from left to right) KENNETH ROSEVEAR President, MGM MIRAGE Development; JOHN T. REDMOND President & CEO, MGM Grand Resorts, LLC;\nJ. TERRENCE LANNI Chairman & CEO, MGM MIRAGE; ROBERT H. BALDWIN President & CEO, Mirage Resorts, Incorporated & President, Project CityCenter;\nGARY N. JACOBS Executive Vice President, General Counsel & Secretary, MGM MIRAGE; JAMES J. MURREN President, CFO & Treasurer, MGM MIRAGE | |\n|---|---|---|---|---|\n| wide array of community needs. From homeless shelters to after-school programs, MGM MIRAGE employees have generously donated more than $8 million since 2001. Your company also sets aside a portion of its profits each year to be given to important programs intended to build stronger communities. Since 2001, your company has given more than $18 million to support such programs. Defining Momentum in Our Family Our momentum is driven from within by acknowledging the contributions of each and every one of our employees, business partners and customers. Our commitment to diversity is recognition of the fact that in today’s ever- changing marketplace, we must reflect that which we see in the world around us. This commitment should be seen as a common- (from left to right) KENNETH ROSEVEAR President, MGM MIRAGE Development; JOHN T. REDMOND President & CEO, MGM Grand Resorts, LLC; J. TERRENCE LANNI Chairman & CEO, MGM MIRAGE; ROBERT H. BALDWIN President & CEO, Mirage Resorts, Incorporated & President, Project CityCenter; sense business decision. That said, we are proud of GARY N. JACOBS Executive Vice President, General Counsel & Secretary, MGM MIRAGE; JAMES J. MURREN President, CFO & Treasurer, MGM MIRAGE the recognition our Diversity program has received, including accolades from prestigious media such as Fortune and DiversityInc. magazines. Defining Momentum in the Future As exciting as 2004 was, our momentum will carry us Since formalizing our program only four years ago, Your company achieved many business goals in 2004 to even greater achievements in 2005 and beyond. we’ve made enormous strides. There is still progress to and set in motion plans for future growth. These initiatives be made and your company has the momentum to will provide unmatched returns. We have also created unri- remain at the forefront on diversity initiatives, provid- valed opportunities for our employees and will continue J. TERRENCE LANNI ing yet another advantage for sustaining performance in our rich history of strengthening the communities in which Chairman of the Board & Chief Executive Officer the long term. we do business. March 31, 2005 | | | (from left to right) KENNETH ROSEVEAR President, MGM MIRAGE Development; JOHN T. REDMOND President & CEO, MGM Grand Resorts, LLC; J. TERRENCE LANNI Chairman & CEO, MGM MIRAGE; ROBERT H. BALDWIN President & CEO, Mirage Resorts, Incorporated & President, Project CityCenter; GARY N. JACOBS Executive Vice President, General Counsel & Secretary, MGM MIRAGE; JAMES J. MURREN President, CFO & Treasurer, MGM MIRAGE | |\n| | | (from left to right) KENNETH ROSEVEAR President, MGM MIRAGE Development; JOHN T. REDMOND President & CEO, MGM Grand Resorts, LLC; J. TERRENCE LANNI Chairman & CEO, MGM MIRAGE; ROBERT H. BALDWIN President & CEO, Mirage Resorts, Incorporated & President, Project CityCenter; GARY N. JACOBS Executive Vice President, General Counsel & Secretary, MGM MIRAGE; JAMES J. MURREN President, CFO & Treasurer, MGM MIRAGE | (from left to right) KENNETH ROSEVEAR President, MGM MIRAGE Development; JOHN T. REDMOND President & CEO, MGM Grand Resorts, LLC; J. TERRENCE LANNI Chairman & CEO, MGM MIRAGE; ROBERT H. BALDWIN President & CEO, Mirage Resorts, Incorporated & President, Project CityCenter; GARY N. JACOBS Executive Vice President, General Counsel & Secretary, MGM MIRAGE; JAMES J. MURREN President, CFO & Treasurer, MGM MIRAGE | |\n| SENSI BELLAGIO An eclectic menu features diverse cuisines in an earthy arena replete with waterfalls and chrome. A bold wine list complements Chef Martin Heierling’s sumptuous work. | JEAN-PHILIPPE PATISSERIE BELLAGIO A mesmerizing fountain of cascading liquid chocolate showcases a splen- did selection of chocolates, cakes, crêpes, salads and sandwiches. | | | ISLA TI Designed by Jeffrey Beers, Isla bright- ens all the senses. Chef Richard Sandoval gives an innovative and modern interpretation of traditional Mexican cuisine. |\n", - "page_start": 9, - "page_end": 9, + "text": "", + "page_start": 20, + "page_end": 20, "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "| | S\nN\nI\nG\nR\nM G G 22.4% A\nM\nG\nM B G 21.8% N\nI\nT\nA\nH E T 17.4% R\nE\nP\nO\nC Z R 14.8% 4\n0\n0\n2\n10.0% 15.0% 20.0% 25.0% |\n|---|---|\n| | S N I G R M G G 22.4% A M G M B G 21.8% N I T A H E T 17.4% R E P O C Z R 14.8% 4 0 0 2 10.0% 15.0% 20.0% 25.0% |\n| Recently, we opened the SKYLOFTS, a new level of luxury Project CityCenter will literally redefine the Las Vegas Strip convention center. Our casino marketing people will be able for guests atop MGM Grand Las Vegas. and change the face of Las Vegas forever. to offer their customers wonderful new amenities to expand We’ll follow the success of these new resort features our market reach. And our development people will be able with a category-defining new nightclub at The Mirage, two Mandalay in Motion to maximize the potential of priceless Las Vegas Strip land. fabulous restaurants by Joël Robuchon at MGM Grand Las We are incredibly excited to begin our journey with the The Mandalay merger represents another defining Vegas and gaming upgrades company-wide. Second, we are talented people of Mandalay, as we work to maximize the moment for MGM MIRAGE, much like the Mirage Resorts doubling down on Las Vegas by merging with Mandalay, value of Mandalay’s instantly recognized brands and world- transaction in 2000, at a time when Las Vegas is in a state of a company we have long admired. The Mandalay merger class resorts. Long a fixture in Las Vegas, Mandalay’s resorts astounding metamorphosis. No company is better positioned represents a tremendous opportunity to build on the mo- will add to our premium portfolio and allow us to accelerate to help shape the future of Las Vegas than MGM MIRAGE. mentum established by Mike Ensign and his team. And the pace of our growth. Our hotel people will be able to mar- We employ more people, invest more money and hold more third, we are dreaming of a not-so-distant future, when ket a wider range of rooms and benefit from a world-class prime real estate than any other company in Las Vegas. The | |\n| AL FACCINTO President, MGM MIRAGE ALAN FELDMAN Senior VP Public Affairs, BRUCE GEBHARDT Senior VP, WILLIAM J. HORNBUCKLE President & PHYLLIS JAMES Senior VP & Senior International Marketing MGM MIRAGE MGM MIRAGE Global Security COO, MGM MIRAGE Europe Counsel, MGM MIRAGE | |\n", - "page_start": 25, - "page_end": 25, + "text": "", + "page_start": 20, + "page_end": 20, "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**(1) On December 13, 1999, the Board of Directors approved an initial quarterly cash dividend of $0.10 per share to stockholders of record on February 10, 2000. The dividend was**\n**paid on March 1, 2000. As a result of the acquisition of Mirage Resorts, Incorporated, we announced on April 19, 2000 that the quarterly dividend policy was discontinued.**\n\n**The acquisition of Mirage Resorts occurred on May 31, 2000. In June 2003, we ceased operations of PLAYMGMMIRAGE.com, our online gaming website (“Online”). In January**\n**2004, we sold the Golden Nugget Las Vegas and the Golden Nugget Laughlin including substantially all of the assets and liabilities of those resorts (the “Golden Nugget**\n**Subsidiaries”). In July 2004, we sold the subsidiaries that own and operate MGM Grand Australia. The results of Online, the Golden Nugget Subsidiaries and MGM Grand Australia**\n**are classified as discontinued operations for all periods presented.**", - "page_start": 28, - "page_end": 28, + "text": "", + "page_start": 20, + "page_end": 20, "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Employee giving achieved \nmomentous results last \nyear. While contributions \nto the Voice Foundation \nreached record amounts, \nMGM MIRAGE employees \nalso provided manpower to \nHabitat for Humanity to \nbuild homes for single \nworking mothers. ", - "page_start": 23, - "page_end": 23, + "text": "", + "page_start": 20, + "page_end": 20, "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "| TO OUR SHAREHOLDERS | E X P A N D I N G W I T H E X C E L L E N C E | | | | |\n|---|---|---|---|---|---|\n| TO OUR SHAREHOLDERS | E X P A N D I N G W I T H E X C E L L E N C E | | | | |\n| BELLAGIO underwent a significant expansion during 2004 result- These investments in your company’s future paid ing in the opening of the Spa Tower and several important new dividends even before the year was out. We established a amenities at this AAA Five Diamond property. Bellagio remains new record for net revenues posting $4.2 billion, a 10% Las Vegas’ first and only hotel-casino to receive this prestigious increase over 2003. recognition. These new additions add dimension and depth to the Your company’s resorts produced record EBITDA of world-famous experience awaiting guests at Bellagio. $1.46 billion, an increase of 23% over 2003, while operating MGM GRAND LAS VEGAS completed a transformation, begun income was $951 million, an increase of 36%, with record in 2003, of its food and beverage and entertainment offerings. results at Bellagio, MGM Grand Las Vegas and Beau Rivage. MGM Grand is one of the must-see attractions of Las Vegas, with Cirque du Soleil’s newest pro- Defining Momentum in the Community duction, KA`TM, and several of the Strip’s 1 I’ve spent 27 years in this profession and the finest restaurants and hottest nightspots. 8 .0 14.9% % incredible generosity of our employees never TI’s transformation was no less extensive, ceases to amaze me. Shortly after the merger 4 7 .6 % as the property’s management team with Mirage Resorts in 2000, we established conceived and implemented a program to %1 9 .5 % 4 1 9 .57 .6 % % the Voice Foundation. This allows employees to enliven the property with new restaurants .9 express themselves in the communities we serve by and nightlife. 1 4 % providing them a mechanism to raise monies for 18.0 THE MIRAGE was the site of a revolution in worthy causes. It’s their money and they decide Las Vegas’ history as the venerable buffet was given where it goes. Your company provides the marketing new life as a top dining establishment, Cravings. 2004 Revenue Mix and administrative support. Others may follow this lead, but The Mirage was Casino Rooms In each year since we established the program, the first property to breathe new life into what Food & Beverage remained of the last bastion of “old” Las Vegas. Entertainment, Retail, employees have given record amounts to support a & Other | | | | KÀ The most spectacular production ever, by a troupe renowned for its pageantry. Cirque du Soleil’s KÀ debuted at a new theatre at MGM Grand in the fourth quarter of 2004. | |\n| | | | What exactly is a defining moment? Try a multi-billion dollar project centered in the heart of Las Vegas. | What exactly is a defining moment? Try a multi-billion dollar project centered in the heart of Las Vegas. | |\n| SKYLOFTS MGM Grand A private sanctuary of sleek, elegant two-story accommo- dations, offering discerning guests the quintessential loft environment - harmonizing design, décor, ambiance and unparalleled vistas. | | BELLAGIO SPA Unique design elements, combined with an international array of innovative treatments and specially trained therapists, provide the ultimate indul- gent experience. | TEATRO MGM Grand A new genre of Las Vegas nightlife where European club influ- ences permeate. DJs spin jazz/ house throughout the evening, giving way to an energetic after-hours vibe with live cat- walk entertainment. | | |\n", - "page_start": 8, - "page_end": 8, + "text": "", + "page_start": 20, + "page_end": 20, "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**NOTE 1 — ORGANIZATION**\nMGM MIRAGE (the “Company”), formerly MGM Grand, Inc., is a Delaware \ncorporation, incorporated on January 29, 1986. As of December 31, 2004 \napproximately 58% of the outstanding shares of the Company's common stock \nwere owned by Tracinda Corporation, a Nevada corporation wholly owned by Kirk \nKerkorian. MGM MIRAGE acts largely as a holding company and, through \nwholly-owned subsidiaries, owns and/or operates casino resorts. \n\nThe Company owns and operates the following casino resorts on the Las Vegas \nStrip in Las Vegas, Nevada: Bellagio, MGM Grand Las Vegas, The Mirage, Treasure \nIsland (“TI”), New York-New York and the Boardwalk Hotel and Casino. The \nCompany owns a 50% interest in the joint venture that owns and operates the \nMonte Carlo Resort & Casino, also located on the Las Vegas Strip. \n\nThe Company owns three resorts in Primm, Nevada at the California/Nevada state \nline – Whiskey Pete’s, Buffalo Bill’s and the Primm Valley Resort – as well as two \nchampionship golf courses located near the resorts. The Company also owns \nShadow Creek, an exclusive world-class golf course located approximately ten miles \nnorth of its Las Vegas Strip resorts. ", - "page_start": 56, - "page_end": 56, + "text": "", + "page_start": 20, + "page_end": 20, "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "operate our resorts. Beyond our cash on hand, we utilize a company-wide cash \nmanagement system to minimize the amount of cash held in banks. Funds are \nswept from accounts at our resorts daily into central bank accounts, and excess \nfunds are invested overnight or are used to repay borrowings under our bank credit \nfacilities. Included in cash and cash equivalents at December 31, 2004 is $141 mil- \nlion received from the sale of MGM Grand Australia and still held in Australia, \npending clarification of the tax rule for repatriated earnings, as discussed earlier. \n\n**Cash Flows – Investing Activities**\nThe sale of the Golden Nugget Subsidiaries closed in January 2004 with net \nproceeds to the Company of $210 million. The sale of MGM Grand Australia \nclosed in July 2004 with net proceeds to the Company of $136 million. \n\nCapital expenditures in 2004 increased over 2003 due to continued spending on \nmajor projects at several of our resorts, including: \n\n• The Bellagio expansion completed in December 2004; \n• The theatre for*KÀ*at MGM Grand Las Vegas, completed in November 2004. \n\nSpending on these two projects totaled approximately $325 million. Other capital \nexpenditures were made for maintenance capital activities, including room remodel \nprojects at New York-New York and MGM Grand Las Vegas and new restaurant \nand entertainment amenities at several resorts. Capital expenditures in 2003 were \nsignificantly higher than 2002, due largely to major projects at our existing resorts, \nincluding projects described above which began in 2003, the*Zumanity*theatre at \nNew York-New York, the Bellagio room remodel and slot technology improvements. \nCapital expenditures in 2002 included general property improvements at our resorts, \nsuch as a room remodel project at The Mirage, new restaurant and nightclub \ndevelopment at several of our resorts, and various other remodeling projects. ", - "page_start": 37, - "page_end": 37, + "text": "", + "page_start": 20, + "page_end": 20, "source_file": "NYSE_MGM_2004.pdf" } ] @@ -12371,70 +12371,70 @@ "target_page": 21, "target_passage": "W RESIDENTIAL In lofts, brown stones and high-rise buildings, residential options abound to populate the new city and ener gize the surrounding areas. e have been working for some time on con ceiving the best use of the 66 acres between Monte Carlo and Bellagio, the most significant piece of undeveloped land remaining on the Las Vegas Strip.", "chunk_present": { - "presence": true, - "index": 4 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 2, + "page_end": 2, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 61, + "page_end": 61, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "Wynn Las Vegas will add room capacity to the Las Vegas market, with its 2,700 \nrooms representing a 2% increase in Las Vegas room supply. Wynn Las Vegas will \nalso feature numerous upscale restaurants and generally target customers who might \notherwise choose Bellagio, MGM Grand Las Vegas or The Mirage. We believe there ", - "page_start": 31, - "page_end": 31, - "source_file": "NYSE_MGM_2004.pdf" + "text": "", + "page_start": 104, + "page_end": 104, + "source_file": "00-80T-80.pdf" }, { - "text": "**RESULTS OF OPERATIONS**\nAt December 31, 2004, our operations consisted of 11 wholly-owned casino resorts \nand 50% investments in two other casino resorts, including: \n\n**Las Vegas, Nevada:**Bellagio, MGM Grand Las Vegas, The Mirage, TI, New York- \n\nNew York, Boardwalk, and Monte Carlo (50% owned). \n\n**Other:**\n\nThe Primm Valley Resorts (Buffalo Bill’s, Primm Valley \nResort and Whiskey Pete’s) in Primm, Nevada; Beau Rivage \nin Biloxi, Mississippi; MGM Grand Detroit; Borgata (50% \nowned) in Atlantic City, New Jersey. \n\nWe operate in one segment, the operation of casino resorts, which includes offering \ngaming, hotel, dining, entertainment, retail and other resort amenities. Slightly over \nhalf of our net revenues are derived from gaming activities, a lower percentage than \nmany of our competitors, as our operating philosophy is to provide a complete \nresort experience for our guests, including non-gaming amenities which command \npremium prices based on their quality. \n\nWe generate a majority of our net revenues and operating income from our Las \nVegas Strip resorts. In 2004, over 75% of our net revenues and operating income \nwas generated by wholly-owned Las Vegas Strip resorts. We believe that we own the \npremier casino resorts on the Las Vegas Strip, and a main focus of our strategy is to \ncontinually reinvest in these resorts to maintain that competitive advantage. Our \nconcentration on the Las Vegas Strip exposes us to certain risks outside of our \ncontrol, such as competition from other Las Vegas Strip resorts as well as new or \nexpanded resorts in Las Vegas, including Wynn Las Vegas expected to open in 2005, \nand the impact from potential expansion of gaming in California. This concentra- \ntion also exposes us to risks related to tourism and the general economy, including \nnational and global economic conditions and terrorist attacks or other global events. ", - "page_start": 30, - "page_end": 30, - "source_file": "NYSE_MGM_2004.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "| RESIDENTIAL In lofts, brown-\nstones and high-rise buildings,\nresidential options abound to\npopulate the new city and ener-\ngize the surrounding areas. | ENTERTAINMENT\nFrom street performers\nto Broadway shows,\nour entertainment will\nevoke the best of New\nYork or London. | THE SITE Located in the heart of the Las Vegas Strip, Project\nCityCenter will dwarf every development that preceded it. Its 66 acres\nwill include a 4,000-room hotel-casino and three boutique hotels. |\n|---|---|---|\n| RESIDENTIAL In lofts, brown- stones and high-rise buildings, residential options abound to populate the new city and ener- gize the surrounding areas. | ENTERTAINMENT From street performers to Broadway shows, our entertainment will evoke the best of New York or London. | THE SITE Located in the heart of the Las Vegas Strip, Project CityCenter will dwarf every development that preceded it. Its 66 acres will include a 4,000-room hotel-casino and three boutique hotels. |\n| W e have been working for some time on con- Project CityCenter represents a new era of the ceiving the best use of the 66 acres between urban complex, one that encompasses tourism, Monte Carlo and Bellagio, the most signifi- entertainment, gaming, retail and residential elements. cant piece of undeveloped land remaining on the Las Only MGM MIRAGE has the momentum – financially, Vegas Strip. We certainly could have come up with a intellectually and professionally – to effectively develop spectacular casino-hotel. But, the truth is, Las Vegas is such a project. ready for so much more. The signature building within Project CityCenter As the city eclipses two million residents on its way is the 4,000-room hotel-casino. The internationally to passing three million by the end of the decade, and acclaimed architect Cesar Pelli has been commissioned with land prices on the Strip soaring, it has become to design this iconic structure. Pelli’s initial concept clear that there is a much better and higher use drawing defines a new generation of urban landscape for for this location. As Las Vegas marks its Centennial, the Las Vegas Strip, one which includes gaming at its Project CityCenter stands as a defining moment for economic center but not as an emotional centerpiece. development in this fabled city. Project CityCenter will provide the momentum for the next era of amazing growth for your company and Las Vegas. | | |\n| | | PROJECT CITYCENTER Interstate 15 Tropicana Flamingo MONTE CARLO BELLAGIO THE MIRAGE Mountain NY/NY Las Vegas Blvd. TI Spring N MGM GRAND THE RESIDENCES AT MGM GRAND |\n", - "page_start": 21, - "page_end": 21, - "source_file": "NYSE_MGM_2004.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "**NOTE 1 — ORGANIZATION**\nMGM MIRAGE (the “Company”), formerly MGM Grand, Inc., is a Delaware \ncorporation, incorporated on January 29, 1986. As of December 31, 2004 \napproximately 58% of the outstanding shares of the Company's common stock \nwere owned by Tracinda Corporation, a Nevada corporation wholly owned by Kirk \nKerkorian. MGM MIRAGE acts largely as a holding company and, through \nwholly-owned subsidiaries, owns and/or operates casino resorts. \n\nThe Company owns and operates the following casino resorts on the Las Vegas \nStrip in Las Vegas, Nevada: Bellagio, MGM Grand Las Vegas, The Mirage, Treasure \nIsland (“TI”), New York-New York and the Boardwalk Hotel and Casino. The \nCompany owns a 50% interest in the joint venture that owns and operates the \nMonte Carlo Resort & Casino, also located on the Las Vegas Strip. \n\nThe Company owns three resorts in Primm, Nevada at the California/Nevada state \nline – Whiskey Pete’s, Buffalo Bill’s and the Primm Valley Resort – as well as two \nchampionship golf courses located near the resorts. The Company also owns \nShadow Creek, an exclusive world-class golf course located approximately ten miles \nnorth of its Las Vegas Strip resorts. ", - "page_start": 56, - "page_end": 56, - "source_file": "NYSE_MGM_2004.pdf" + "text": "", + "page_start": 61, + "page_end": 61, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "**Overall Outlook**\nWe have invested heavily in our existing operations in 2003 and 2004, and expect \nto continue to do so on a targeted basis in 2005. Our Las Vegas Strip resorts require \nongoing capital investment to maintain their competitive advantages. We believe \nthe investments in additional non-gaming amenities we made in 2003 and 2004 \nhave enhanced our ability to generate increased visitor volume and allowed us to \ncharge premium prices for our amenities. \n\nThe most likely significant factors affecting operating results at our existing resorts \nin 2005 will be the expected continued strength of the leisure and convention travel \nsegments, the expansion of Bellagio and the opening of*KÀ*and other amenities at \nMGM Grand Las Vegas, and new competition from Wynn Las Vegas on the Las \nVegas Strip. Various lodging market observers, such as PricewaterhouseCoopers \nand Smith Travel Research, are forecasting mid-single digit percentage growth in \nREVPAR in 2005, with greater REVPAR gains in full service hotels. Our REVPAR \ngrowth, and REVPAR growth in Las Vegas in general, has outpaced that of the \nnational market, and we expect that trend to continue. \n\nThe Bellagio expansion opened in late 2004 and added over 30% to the resort’s \nroom base. In addition, we added new meeting, retail and dining space and signifi- \ncantly expanded the spa and salon.*KÀ*opened in late November 2004 at MGM \nGrand Las Vegas, which had been without a featured production show for almost \ntwo years. Along with the numerous restaurant and other entertainment additions \nat MGM Grand Las Vegas,*KÀ*will enhance our ability to generate visitor traffic \nand capture a greater share of our guests’ spending. ", - "page_start": 31, - "page_end": 31, - "source_file": "NYSE_MGM_2004.pdf" + "text": "", + "page_start": 60, + "page_end": 60, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "| | S\nN\nI\nG\nR\nM G G 22.4% A\nM\nG\nM B G 21.8% N\nI\nT\nA\nH E T 17.4% R\nE\nP\nO\nC Z R 14.8% 4\n0\n0\n2\n10.0% 15.0% 20.0% 25.0% |\n|---|---|\n| | S N I G R M G G 22.4% A M G M B G 21.8% N I T A H E T 17.4% R E P O C Z R 14.8% 4 0 0 2 10.0% 15.0% 20.0% 25.0% |\n| Recently, we opened the SKYLOFTS, a new level of luxury Project CityCenter will literally redefine the Las Vegas Strip convention center. Our casino marketing people will be able for guests atop MGM Grand Las Vegas. and change the face of Las Vegas forever. to offer their customers wonderful new amenities to expand We’ll follow the success of these new resort features our market reach. And our development people will be able with a category-defining new nightclub at The Mirage, two Mandalay in Motion to maximize the potential of priceless Las Vegas Strip land. fabulous restaurants by Joël Robuchon at MGM Grand Las We are incredibly excited to begin our journey with the The Mandalay merger represents another defining Vegas and gaming upgrades company-wide. Second, we are talented people of Mandalay, as we work to maximize the moment for MGM MIRAGE, much like the Mirage Resorts doubling down on Las Vegas by merging with Mandalay, value of Mandalay’s instantly recognized brands and world- transaction in 2000, at a time when Las Vegas is in a state of a company we have long admired. The Mandalay merger class resorts. Long a fixture in Las Vegas, Mandalay’s resorts astounding metamorphosis. No company is better positioned represents a tremendous opportunity to build on the mo- will add to our premium portfolio and allow us to accelerate to help shape the future of Las Vegas than MGM MIRAGE. mentum established by Mike Ensign and his team. And the pace of our growth. Our hotel people will be able to mar- We employ more people, invest more money and hold more third, we are dreaming of a not-so-distant future, when ket a wider range of rooms and benefit from a world-class prime real estate than any other company in Las Vegas. The | |\n| AL FACCINTO President, MGM MIRAGE ALAN FELDMAN Senior VP Public Affairs, BRUCE GEBHARDT Senior VP, WILLIAM J. HORNBUCKLE President & PHYLLIS JAMES Senior VP & Senior International Marketing MGM MIRAGE MGM MIRAGE Global Security COO, MGM MIRAGE Europe Counsel, MGM MIRAGE | |\n", - "page_start": 25, - "page_end": 25, - "source_file": "NYSE_MGM_2004.pdf" + "text": "", + "page_start": 60, + "page_end": 60, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "| (from left to right) ROBERT C. SELWOOD Senior Vice President—\nAccounting; JAMES J. MURREN President, CFO & Treasurer;\nBRYAN L. WRIGHT Senior Vice President — Assistant General\nCounsel & Assistant Secretary; DANIEL J. D'ARRIGO Senior Vice\nPresident—Finance | | combination of Mandalay’s assets with our financial strength expect and demand more of our community. We are a city\nand industry-leading financial discipline will yield significant without a proper city, and that is about to change. Ambitious\nreturns for all of our stakeholders. plans are underway to revitalize Downtown Las Vegas, centered\nWe are currently planning the integration of the two around a beautiful performing arts center and an academic\ncompanies, and over time, we expect to realize the full poten- medical center; UNLV is in the midst of a major capital cam-\ntial of cost and revenue synergies. We will report on our paign to enhance the Midtown section of Las Vegas; and your\nprogress throughout the coming year. company has embarked on the most comprehensive project to\ndate – Project CityCenter, at the heart of the Las Vegas Strip.\nThe Next Moment – A City is Born The Las Vegas Strip has no sense of city now – but we\nWhat makes a great city? Las Vegas has long been believe it can. The future of Las Vegas is centered around our\nrecognized as the leisure capital of the world. The resorts in great resorts and our future development. There are many\nour valley have been the innovative leaders in the hospitality reasons we believe Project CityCenter is the right project for\nindustry and have driven the tremendous growth in visitor our Las Vegas Strip development. We believe there is a social\nvolume, high occupancy rates and surging food, beverage, imperative that Las Vegas mature as a city, not just a con-\nentertainment and gaming volumes. But there is another glomeration of suburbs. A city deserves a center – a center\nLas Vegas – a community of two million residents on its for living, working and playing. We want to be an integral\nway to three million by the end of the decade. Las Vegas is part in defining the Las Vegas of the future.\nleading the U.S. migration to the Southwest. Our newcom- And there is a business motivation. Companies in the\ners are attracted by the lifestyle, weather, cost of living and gaming industry have historically not been valued on par with\neconomic opportunity. Many have come from cities in the other hospitality companies and mixed-use real estate compa-\nEast, West and Midwest and take elements of established nies. We plan to break out of the gaming mold, and define a\ncommunities for granted, such as medical, educational and company based on extensive holdings in multiple businesses.\ncultural excellence and diversity. Project CityCenter will include major residential, retail and\nThe people of Las Vegas today have great aspirations and entertainment components. We will partner with boutique |\n|---|---|---|\n| (from left to right) ROBERT C. SELWOOD Senior Vice President— Accounting; JAMES J. MURREN President, CFO & Treasurer; BRYAN L. WRIGHT Senior Vice President — Assistant General Counsel & Assistant Secretary; DANIEL J. D'ARRIGO Senior Vice President—Finance | | combination of Mandalay’s assets with our financial strength expect and demand more of our community. We are a city and industry-leading financial discipline will yield significant without a proper city, and that is about to change. Ambitious returns for all of our stakeholders. plans are underway to revitalize Downtown Las Vegas, centered We are currently planning the integration of the two around a beautiful performing arts center and an academic companies, and over time, we expect to realize the full poten- medical center; UNLV is in the midst of a major capital cam- tial of cost and revenue synergies. We will report on our paign to enhance the Midtown section of Las Vegas; and your progress throughout the coming year. company has embarked on the most comprehensive project to date – Project CityCenter, at the heart of the Las Vegas Strip. The Next Moment – A City is Born The Las Vegas Strip has no sense of city now – but we What makes a great city? Las Vegas has long been believe it can. The future of Las Vegas is centered around our recognized as the leisure capital of the world. The resorts in great resorts and our future development. There are many our valley have been the innovative leaders in the hospitality reasons we believe Project CityCenter is the right project for industry and have driven the tremendous growth in visitor our Las Vegas Strip development. We believe there is a social volume, high occupancy rates and surging food, beverage, imperative that Las Vegas mature as a city, not just a con- entertainment and gaming volumes. But there is another glomeration of suburbs. A city deserves a center – a center Las Vegas – a community of two million residents on its for living, working and playing. We want to be an integral way to three million by the end of the decade. Las Vegas is part in defining the Las Vegas of the future. leading the U.S. migration to the Southwest. Our newcom- And there is a business motivation. Companies in the ers are attracted by the lifestyle, weather, cost of living and gaming industry have historically not been valued on par with economic opportunity. Many have come from cities in the other hospitality companies and mixed-use real estate compa- East, West and Midwest and take elements of established nies. We plan to break out of the gaming mold, and define a communities for granted, such as medical, educational and company based on extensive holdings in multiple businesses. cultural excellence and diversity. Project CityCenter will include major residential, retail and The people of Las Vegas today have great aspirations and entertainment components. We will partner with boutique |\n| | (from left to right) ROBERT C. SELWOOD Senior Vice President— Accounting; JAMES J. MURREN President, CFO & Treasurer; BRYAN L. WRIGHT Senior Vice President — Assistant General Counsel & Assistant Secretary; DANIEL J. D'ARRIGO Senior Vice President—Finance | |\n| | No company is better positioned to help shape the future of Las Vegas than MGM MIRAGE. | |\n| CYNTHIA KISER MURPHEY Senior PUNAM MATHUR Senior VP, WILLIAM MCBEATH President, ROBERT V. MOON Chairman, FELIX D. RAPPAPORT President, SCOTT SIBELLA President, TI VP, MGM MIRAGE Human Resources MGM MIRAGE Diversity/Community The Mirage MGM MIRAGE Marketing New York-New York Relations | | |\n", - "page_start": 26, - "page_end": 26, - "source_file": "NYSE_MGM_2004.pdf" + "text": "", + "page_start": 60, + "page_end": 60, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "will be some impact on these resorts from Wynn Las Vegas, but also believe that the \nbreadth of amenities in our portfolio of resorts and our loyalty and other marketing \nprograms will help minimize these competitive pressures. The proximity of Wynn \nLas Vegas to TI and The Mirage, along with pedestrian bridges linking TI with the \nFashion Show Mall and Venetian, will also benefit these resorts. ", - "page_start": 31, - "page_end": 31, - "source_file": "NYSE_MGM_2004.pdf" + "text": "", + "page_start": 59, + "page_end": 59, + "source_file": "OTC_NSANY_2004.pdf" } ] }, @@ -12445,70 +12445,70 @@ "target_page": 32, "target_passage": "The war with Iraq and the outbreak of SARS in Asia, both of which negatively impacted leisure travel and our high-end gaming business in late 2002 and early 2003", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 377, + "page_end": 377, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 313, + "page_end": 313, + "source_file": "00-80T-80.pdf" }, { - "text": "• The war with Iraq and the outbreak of SARS in Asia, both of which negatively \nimpacted leisure travel and our high-end gaming business in late 2002 and \nearly 2003; \n\n• The new labor contract covering our Las Vegas Strip employees since mid-2002, \nwhich calls for significant annual wage and benefits increases through 2007; \n• The current economic recovery in the United States, which began to impact our \noperations in the latter half of 2003 and continued to positively affect our results \nin 2004. ", - "page_start": 32, - "page_end": 32, - "source_file": "NYSE_MGM_2004.pdf" + "text": "", + "page_start": 314, + "page_end": 314, + "source_file": "00-80T-80.pdf" }, { - "text": "In 2004, there were no material unusual property transactions. In 2003, we sold 315 \nacres of land in North Las Vegas, Nevada near Shadow Creek for approximately \n$55 million, resulting in the $37 million gain reflected above. Prior to 2003, we \nclassified gains and losses on routine assets sales or disposals as a non-operating item at \nsome resorts and as an operating item at other resorts. We believe the preferable pres- \nentation of these items is as an element of operating income. Prior period statements \nhave not been reclassified as such transactions were not material in periods prior to \n2003. Until 2003, demolition costs were typically capitalized as part of new construc- \ntion. We began expensing demolition costs on major construction projects as incurred \non January 1, 2003, and are accounting for this change in policy prospectively. \nDemolition costs were not material in periods prior to 2003. Demolition costs in \n2004 and 2003 related primarily to preparation for the Bellagio standard room \nremodel, Bellagio expansion and new theatre at MGM Grand Las Vegas. Impairments \nof assets to be disposed of in 2003 consisted primarily of assets related to the former \nEFX! show and restaurants closed during 2003 at MGM Grand Las Vegas. ", - "page_start": 35, - "page_end": 35, - "source_file": "NYSE_MGM_2004.pdf" + "text": "", + "page_start": 314, + "page_end": 314, + "source_file": "00-80T-80.pdf" }, { - "text": "**RESULTS OF OPERATIONS**\nAt December 31, 2004, our operations consisted of 11 wholly-owned casino resorts \nand 50% investments in two other casino resorts, including: \n\n**Las Vegas, Nevada:**Bellagio, MGM Grand Las Vegas, The Mirage, TI, New York- \n\nNew York, Boardwalk, and Monte Carlo (50% owned). \n\n**Other:**\n\nThe Primm Valley Resorts (Buffalo Bill’s, Primm Valley \nResort and Whiskey Pete’s) in Primm, Nevada; Beau Rivage \nin Biloxi, Mississippi; MGM Grand Detroit; Borgata (50% \nowned) in Atlantic City, New Jersey. \n\nWe operate in one segment, the operation of casino resorts, which includes offering \ngaming, hotel, dining, entertainment, retail and other resort amenities. Slightly over \nhalf of our net revenues are derived from gaming activities, a lower percentage than \nmany of our competitors, as our operating philosophy is to provide a complete \nresort experience for our guests, including non-gaming amenities which command \npremium prices based on their quality. \n\nWe generate a majority of our net revenues and operating income from our Las \nVegas Strip resorts. In 2004, over 75% of our net revenues and operating income \nwas generated by wholly-owned Las Vegas Strip resorts. We believe that we own the \npremier casino resorts on the Las Vegas Strip, and a main focus of our strategy is to \ncontinually reinvest in these resorts to maintain that competitive advantage. Our \nconcentration on the Las Vegas Strip exposes us to certain risks outside of our \ncontrol, such as competition from other Las Vegas Strip resorts as well as new or \nexpanded resorts in Las Vegas, including Wynn Las Vegas expected to open in 2005, \nand the impact from potential expansion of gaming in California. This concentra- \ntion also exposes us to risks related to tourism and the general economy, including \nnational and global economic conditions and terrorist attacks or other global events. ", - "page_start": 30, - "page_end": 30, - "source_file": "NYSE_MGM_2004.pdf" + "text": "", + "page_start": 314, + "page_end": 314, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\nThe announcement of \nthe merger between \nMGM MIRAGE and \nMandalay Resort Group \nwas one of the seminal \nmoments of 2004. ", - "page_start": 12, - "page_end": 12, - "source_file": "NYSE_MGM_2004.pdf" + "text": "", + "page_start": 314, + "page_end": 314, + "source_file": "00-80T-80.pdf" }, { - "text": "| wide array of community needs. From homeless shelters to\nafter-school programs, MGM MIRAGE employees have\ngenerously donated more than $8 million since 2001.\nYour company also sets aside a portion of its profits\neach year to be given to important programs intended to\nbuild stronger communities. Since 2001, your company has\ngiven more than $18 million to support such programs.\nDefining Momentum in Our Family\nOur momentum is driven from within by acknowledging\nthe contributions of each and every one of our employees,\nbusiness partners and customers. Our commitment to\ndiversity is recognition of the fact that in today’s ever-\nchanging marketplace, we must reflect that which we see\nin the world around us.\nThis commitment should be seen as a common- (from left to right) KENNETH ROSEVEAR President, MGM MIRAGE Development; JOHN T. REDMOND President & CEO, MGM Grand Resorts, LLC;\nJ. TERRENCE LANNI Chairman & CEO, MGM MIRAGE; ROBERT H. BALDWIN President & CEO, Mirage Resorts, Incorporated & President, Project CityCenter;\nsense business decision. That said, we are proud of\nGARY N. JACOBS Executive Vice President, General Counsel & Secretary, MGM MIRAGE; JAMES J. MURREN President, CFO & Treasurer, MGM MIRAGE\nthe recognition our Diversity program has received,\nincluding accolades from prestigious media such as\nFortune and DiversityInc. magazines. Defining Momentum in the Future As exciting as 2004 was, our momentum will carry us\nSince formalizing our program only four years ago, Your company achieved many business goals in 2004 to even greater achievements in 2005 and beyond.\nwe’ve made enormous strides. There is still progress to and set in motion plans for future growth. These initiatives\nbe made and your company has the momentum to will provide unmatched returns. We have also created unri-\nremain at the forefront on diversity initiatives, provid- valed opportunities for our employees and will continue\nJ. TERRENCE LANNI\ning yet another advantage for sustaining performance in our rich history of strengthening the communities in which\nChairman of the Board & Chief Executive Officer\nthe long term. we do business. March 31, 2005 | | | (from left to right) KENNETH ROSEVEAR President, MGM MIRAGE Development; JOHN T. REDMOND President & CEO, MGM Grand Resorts, LLC;\nJ. TERRENCE LANNI Chairman & CEO, MGM MIRAGE; ROBERT H. BALDWIN President & CEO, Mirage Resorts, Incorporated & President, Project CityCenter;\nGARY N. JACOBS Executive Vice President, General Counsel & Secretary, MGM MIRAGE; JAMES J. MURREN President, CFO & Treasurer, MGM MIRAGE | |\n|---|---|---|---|---|\n| wide array of community needs. From homeless shelters to after-school programs, MGM MIRAGE employees have generously donated more than $8 million since 2001. Your company also sets aside a portion of its profits each year to be given to important programs intended to build stronger communities. Since 2001, your company has given more than $18 million to support such programs. Defining Momentum in Our Family Our momentum is driven from within by acknowledging the contributions of each and every one of our employees, business partners and customers. Our commitment to diversity is recognition of the fact that in today’s ever- changing marketplace, we must reflect that which we see in the world around us. This commitment should be seen as a common- (from left to right) KENNETH ROSEVEAR President, MGM MIRAGE Development; JOHN T. REDMOND President & CEO, MGM Grand Resorts, LLC; J. TERRENCE LANNI Chairman & CEO, MGM MIRAGE; ROBERT H. BALDWIN President & CEO, Mirage Resorts, Incorporated & President, Project CityCenter; sense business decision. That said, we are proud of GARY N. JACOBS Executive Vice President, General Counsel & Secretary, MGM MIRAGE; JAMES J. MURREN President, CFO & Treasurer, MGM MIRAGE the recognition our Diversity program has received, including accolades from prestigious media such as Fortune and DiversityInc. magazines. Defining Momentum in the Future As exciting as 2004 was, our momentum will carry us Since formalizing our program only four years ago, Your company achieved many business goals in 2004 to even greater achievements in 2005 and beyond. we’ve made enormous strides. There is still progress to and set in motion plans for future growth. These initiatives be made and your company has the momentum to will provide unmatched returns. We have also created unri- remain at the forefront on diversity initiatives, provid- valed opportunities for our employees and will continue J. TERRENCE LANNI ing yet another advantage for sustaining performance in our rich history of strengthening the communities in which Chairman of the Board & Chief Executive Officer the long term. we do business. March 31, 2005 | | | (from left to right) KENNETH ROSEVEAR President, MGM MIRAGE Development; JOHN T. REDMOND President & CEO, MGM Grand Resorts, LLC; J. TERRENCE LANNI Chairman & CEO, MGM MIRAGE; ROBERT H. BALDWIN President & CEO, Mirage Resorts, Incorporated & President, Project CityCenter; GARY N. JACOBS Executive Vice President, General Counsel & Secretary, MGM MIRAGE; JAMES J. MURREN President, CFO & Treasurer, MGM MIRAGE | |\n| | | (from left to right) KENNETH ROSEVEAR President, MGM MIRAGE Development; JOHN T. REDMOND President & CEO, MGM Grand Resorts, LLC; J. TERRENCE LANNI Chairman & CEO, MGM MIRAGE; ROBERT H. BALDWIN President & CEO, Mirage Resorts, Incorporated & President, Project CityCenter; GARY N. JACOBS Executive Vice President, General Counsel & Secretary, MGM MIRAGE; JAMES J. MURREN President, CFO & Treasurer, MGM MIRAGE | (from left to right) KENNETH ROSEVEAR President, MGM MIRAGE Development; JOHN T. REDMOND President & CEO, MGM Grand Resorts, LLC; J. TERRENCE LANNI Chairman & CEO, MGM MIRAGE; ROBERT H. BALDWIN President & CEO, Mirage Resorts, Incorporated & President, Project CityCenter; GARY N. JACOBS Executive Vice President, General Counsel & Secretary, MGM MIRAGE; JAMES J. MURREN President, CFO & Treasurer, MGM MIRAGE | |\n| SENSI BELLAGIO An eclectic menu features diverse cuisines in an earthy arena replete with waterfalls and chrome. A bold wine list complements Chef Martin Heierling’s sumptuous work. | JEAN-PHILIPPE PATISSERIE BELLAGIO A mesmerizing fountain of cascading liquid chocolate showcases a splen- did selection of chocolates, cakes, crêpes, salads and sandwiches. | | | ISLA TI Designed by Jeffrey Beers, Isla bright- ens all the senses. Chef Richard Sandoval gives an innovative and modern interpretation of traditional Mexican cuisine. |\n", - "page_start": 9, - "page_end": 9, - "source_file": "NYSE_MGM_2004.pdf" + "text": "", + "page_start": 314, + "page_end": 314, + "source_file": "00-80T-80.pdf" }, { - "text": "‚*2003:*During the Ñrst three quarters of 2003, we experienced moderate growth in revenue due to an \nincrease in core pricing. During the fourth quarter of 2003, our revenue growth from core pricing \nincreased at a more rapid pace due to our broad-based pricing initiative. \n\nDuring 2003, the economic slowdown which began during 2001 continued to negatively impact our \nbusiness. However, during 2003, our revenue growth from core volume continued to be positively \nimpacted by long-term franchise and municipal contracts that were secured during 2002. Our internal \ngrowth from core operations was 3.9% in 2003. \n\n‚*2002:*The economic slowdown which began in 2001 continued to negatively impact the portion of our \nbusiness servicing the manufacturing sector and non-residential construction industry during 2002. \nVolumes attributable to manufacturing and construction activity continued to weaken during 2002. \n\nThe weakness in our business attributable to the economic slowdown was partially oÅset by an increase \nin recycling commodity prices in the early part of 2002. \n\nDespite the weakness we experienced in the aspects of our business noted above, our internal growth \nfrom core operations for 2002 was 3.0%. During 2002, we secured several long-term franchise and \nmunicipal contracts. We also beneÑted from the geographic mix of our business which favors high- \ngrowth markets. ", - "page_start": 43, - "page_end": 43, - "source_file": "NYSE_RSG_2004.pdf" + "text": "", + "page_start": 314, + "page_end": 314, + "source_file": "00-80T-80.pdf" }, { - "text": "| | S\nN\nI\nG\nR\nM G G 22.4% A\nM\nG\nM B G 21.8% N\nI\nT\nA\nH E T 17.4% R\nE\nP\nO\nC Z R 14.8% 4\n0\n0\n2\n10.0% 15.0% 20.0% 25.0% |\n|---|---|\n| | S N I G R M G G 22.4% A M G M B G 21.8% N I T A H E T 17.4% R E P O C Z R 14.8% 4 0 0 2 10.0% 15.0% 20.0% 25.0% |\n| Recently, we opened the SKYLOFTS, a new level of luxury Project CityCenter will literally redefine the Las Vegas Strip convention center. Our casino marketing people will be able for guests atop MGM Grand Las Vegas. and change the face of Las Vegas forever. to offer their customers wonderful new amenities to expand We’ll follow the success of these new resort features our market reach. And our development people will be able with a category-defining new nightclub at The Mirage, two Mandalay in Motion to maximize the potential of priceless Las Vegas Strip land. fabulous restaurants by Joël Robuchon at MGM Grand Las We are incredibly excited to begin our journey with the The Mandalay merger represents another defining Vegas and gaming upgrades company-wide. Second, we are talented people of Mandalay, as we work to maximize the moment for MGM MIRAGE, much like the Mirage Resorts doubling down on Las Vegas by merging with Mandalay, value of Mandalay’s instantly recognized brands and world- transaction in 2000, at a time when Las Vegas is in a state of a company we have long admired. The Mandalay merger class resorts. Long a fixture in Las Vegas, Mandalay’s resorts astounding metamorphosis. No company is better positioned represents a tremendous opportunity to build on the mo- will add to our premium portfolio and allow us to accelerate to help shape the future of Las Vegas than MGM MIRAGE. mentum established by Mike Ensign and his team. And the pace of our growth. Our hotel people will be able to mar- We employ more people, invest more money and hold more third, we are dreaming of a not-so-distant future, when ket a wider range of rooms and benefit from a world-class prime real estate than any other company in Las Vegas. The | |\n| AL FACCINTO President, MGM MIRAGE ALAN FELDMAN Senior VP Public Affairs, BRUCE GEBHARDT Senior VP, WILLIAM J. HORNBUCKLE President & PHYLLIS JAMES Senior VP & Senior International Marketing MGM MIRAGE MGM MIRAGE Global Security COO, MGM MIRAGE Europe Counsel, MGM MIRAGE | |\n", - "page_start": 25, - "page_end": 25, - "source_file": "NYSE_MGM_2004.pdf" + "text": "", + "page_start": 314, + "page_end": 314, + "source_file": "00-80T-80.pdf" }, { - "text": "The Company’s operating income for 2003 was $6.9 million, compared with $5.8 million in 2002 and $5.8 million in 2001. Revenue growth, manufacturing \nefficiency improvements, cost containment and cost reduction activities were the major contributors to the operating income improvements during 2003. \nRevenue growth, cost containment and cost reduction activities during 2002 were offset by lower gross margins compared with 2001, which combined to \ncause relatively flat operating results. \n\nInterest expense was $195,000 in 2003 compared to $432,000 in 2002 and $300,000 in 2001. The decrease in 2003 is primarily related to lower average \nborrowings during 2003 as compared with 2002. The increase in 2002 is primarily related to higher average borrowings during 2002 as compared with \n2001 partially offset by a significant reduction in interest rates in 2002. The higher average borrowings during 2002 is primarily related to borrowing of \nfunds under the Company’s credit facility in late December 2001 in connection with its repurchase of outstanding common stock of the Company under a \ntender offer. The other income in 2001 was primarily related to the Company’s one-time pre-tax gain of $428,000 on the sale of a patent. ", - "page_start": 27, - "page_end": 27, - "source_file": "NASDAQ_ATRI_2003.pdf" + "text": "", + "page_start": 314, + "page_end": 314, + "source_file": "00-80T-80.pdf" } ] }, @@ -12519,69 +12519,69 @@ "target_page": 5, "target_passage": "All Naval Aviators possess a natural interest in the basic aerodynamic factors which affect the performance of all aircraft. ", "chunk_present": { - "presence": true, - "index": 4 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, + "text": "", + "page_start": 19, + "page_end": 19, "source_file": "Excel Training Manual 1.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 319, + "page_end": 319, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\nin Naval Aviation ", - "page_start": 53, - "page_end": 53, + "text": "", + "page_start": 318, + "page_end": 318, "source_file": "00-80T-80.pdf" }, { - "text": "Much of the specialized mathematical detail of aerodynamics has \nbeen omitted wherever it was considered unnecessary in the field of \nflying operations. Also, many of the basic assumptions and limita- \ntions of certain parts of aerodynamic theory have been omitted for the \nIn order to contend with \nsake of simplicity and clarity of presentation. \nthese specific shortcomings, the Naval Aviator should rely on the \nassistance of certain specially qualified individuals within Naval Avia- \ntion. For example, graduate aeronautical engineers, graduates of the \nTest Pilot Training School at the Naval Air Test Center, graduates of \nthe Naval Aviation Safety Officers Course, and technical representatives \nof the manufacturers are qualified to assist in interpreting and applying \nthe more difficult parts of aerodynamics and aeronautical engineering. \nTo be sure, the specialized qualifications of these individuals should \nbe utilized wherever possible. \n\niii ", - "page_start": 5, - "page_end": 5, + "text": "", + "page_start": 319, + "page_end": 319, "source_file": "00-80T-80.pdf" }, { - "text": "The purpose of this textbook is to present the elements of applied \nto \naerodynamics and aeronautical engineering which relate directly \nthe problems of flying operations. All Naval Aviators possess a natural \ninterest in the basic aerodynamic factors which affect the performance \nof all aircraft. Due .to the increasing complexity of modern aircraft, \nthis natural interest must be applied to develop a sound understanding \nof basic engineering principles and an appreciation of some of the more \nadvanced problems of aerodynamics and engineering. The safety and \neffectiveness of flying operations will depend greatly on the under- \nstanding and appreciation of how and why an airplane flies. The \nprinciples of aerodynamics will provide the foundations for developing \nexacting and precise flying techniques and operational procedures. \n\nThe content of this textbook has been arranged to provide as com- \nplete as possible a reference for all phases of flying in Naval Aviation. \nHence, the text material is applicable to the problems of flight train- \ntraining, and general flying operations. The manner \ning, transition \nof presentation throughout \nthe text has been designed to provide the \nelements of both theory and application and will allow either directed \nor unassisted study. As a result, the text material’will be applicable \nto supplement formal class Iectures and briefings and provide reading \nmaterial as a background for training and flying operations. ", - "page_start": 5, - "page_end": 5, + "text": "", + "page_start": 319, + "page_end": 319, "source_file": "00-80T-80.pdf" }, { - "text": "to obtain \noperating limitations and insight \nthe design performance of his aircraft. The \nperformance section of the flight handbook \nprovides the specific information regarding the \ncapabilities and limitations of each airplane. \nEvery Naval Aviator must rely upon these \nhandbook data as the guide to safe and effec- \nrive operation of his aircraft. \n\nThe performance of an aircraft is. the most \nimportant feature which defines its suitability \nfor specific missions. The principal items of \nairplane performance deserve detailed consid- \neration \nin order to better understand and \nappreciate the capabilities of each airplane. \nKnowledge of the various items of airplane \nperformance will provide the Naval Aviator \nthe \nwith a more complete appreciation of \n\n95 ", - "page_start": 113, - "page_end": 113, + "text": "", + "page_start": 319, + "page_end": 319, "source_file": "00-80T-80.pdf" }, { - "text": "In order to understand the characteristics of \nhis aircraft and develop precision flying tech- \nniques, the Naval Aviator must be familiar \nwith the fundamentals of aerodynamics. There \nare certain physical laws which describe the \nbehavior of airflow and define the various \naerodynamic forces and moments acting on a \nsurface. These principles of aerodynamics pro- \nvide the foundations for good, precise flying \ntechniques. ", - "page_start": 19, - "page_end": 19, - "source_file": "00-80T-80.pdf" + "text": "", + "page_start": 65, + "page_end": 65, + "source_file": "ASX_MRM_2000.pdf" }, { - "text": "PRIMARY CONTROL OF AIRSPEED AND \n\nWhile the previous chapters have presented \nthe detailed parts of the general field of aero- \ndynamics, there remain various problems of \nflying which require the application of princi- \nples from many parts of aerodynamics. The \napplication of aerodynamics to these various \nproblems of flying will assist the Naval Aviator \nin understanding these problems and develop- \ning good flying techniques. \n\nALTITUDE \n\nFor the conditions of steady flight, the air- \nplane must be in equilibrium. Equilibrium \nwill be achieved when there is no unbalance of \nforce’or moment acting on the airplane. \nIf it is \nassumed that the airplane is trimmed so that \nno unbalance of pitching, yawing, or rolling \nmoments exists, the principal concern is for \n\n349 ", - "page_start": 367, - "page_end": 367, - "source_file": "00-80T-80.pdf" + "text": "", + "page_start": 64, + "page_end": 64, + "source_file": "ASX_MRM_2000.pdf" }, { - "text": "**NA VAIR 00·801·80**\n\n**AERODYNAMICS FOR NAVAL**\n**AVIATORS**\n\n**BY**\n**H. H. HURT, JR.**\n**UNIVERSITY OF SOUTHERN CALIFORNIA**", - "page_start": 1, - "page_end": 1, - "source_file": "00-80T-80.pdf" + "text": "", + "page_start": 64, + "page_end": 64, + "source_file": "ASX_MRM_2000.pdf" }, { - "text": "\nthe airplane to ", - "page_start": 274, - "page_end": 274, + "text": "", + "page_start": 318, + "page_end": 318, "source_file": "00-80T-80.pdf" } ] @@ -12593,69 +12593,69 @@ "target_page": 20, "target_passage": "At standard sea level conditions the static pressure of the air is 2,116 psf (or 14.7 psi, 29.92 in. Hg, etc.) ", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 24, + "page_end": 24, + "source_file": "NASDAQ_FFIN_2002.pdf" }, { - "text": "the proportion of the ambient air temperature \nand the standard sea level air temperature. \nThis temperature ratio is assigned the short- \nhand notation of 0 (theta). \nTemperature ratio \n\npercent water vapor, argon, carbon dioxide, \netc. For the majority of all aerodynamic con- \nis considered as a uniform \nsiderations air \nmixture of these gases. The usual quantities \nused to define the properties of an air mass are \nas follows: \n\nAmbient air temperature \n=Standard sea level air temperature \n\nSTATIC PRESSURE. The absolute static \npressure of the air is a property of primary \nimportance. The static pressure of the air \nat any altitude results from the mass of air \nsupported above that level. At standard sea \nlevel conditions the static pressure of the air \nis 2,116 psf (or 14.7 psi, 29.92 in. Hg, etc.) \nand at 40,000 feet altitude this static pressure \ndecreases to approximately 19 percent of the \nsea level value. The shorthand notation for \nthe ambient static pressure is “p” \nand the \nstandard sea level static pressure is given the \nsubscript “a” \nfor zero altitude, pa. A more \nusual reference in aerodynamics and perform- \nance is the proportion of the ambient sta~tic \npressure and the standard sea level static \npressure. This static pressure ratio is assigned \nthe shorthand notation of 8 (delta). \n\n@=TITtl \n,+273 \n\n288 \n\nMany items of compressibility effects and jet \nengine performance involve consideration of \nthe temperature ratio. ", - "page_start": 20, - "page_end": 20, + "text": "", + "page_start": 141, + "page_end": 141, "source_file": "00-80T-80.pdf" }, { - "text": "\nSTATIC \nPRESSURE ", - "page_start": 133, - "page_end": 133, + "text": "", + "page_start": 141, + "page_end": 141, "source_file": "00-80T-80.pdf" }, { - "text": "pressure, q. The pressure gauge is then cali- \nbrated to indicate flight speed in the standard \nsea level air mass. For example, a dynamic \npressure of 305 psf would be realized at a sea \nlevel flight ,speed of 300 knots. \n\nsurface anflow continues to the aft stagnation \npoint where the local velocity is again zero. \nThe important point of this example of aero- \ndynamic flow is existence of the stagnation \npoint. The change in airflow static pressure \nwhich takes place at the stagnation point IS \nequal to the free stream dynamic pressure, q. \nThe measurement of free stream dynamic \npressure is fundamental to the indication of \nIn fact, airspeed indicators are sim- \nairspeed. \nply pressure gauges which measure dynamic \npressure related to various airspeeds. Typical \nin \nairspeed measuring systems are illustrated \nfigure 1.5. The pitot head has no internal \nflow velocity and the pressure in the pitot tube \nis equal to the total pressure of the airstream. \nThe purpose of the static-ports is to sense the \ntrue static pressure of the free airstream. The \ntotal pressure and static pressure lines are \nattached to a differential pressure gauge and \nis the dynamic \nthe net pressure indicated \n\nthere can be many conditions of \nflight where the airspeed indicator does not \ntruly reflect the actual velocity through \nthe \nair mass. The corrections that must be applied \nare many and lisred in sequence below: \n(1) The indicated airspeed (IAS) \n\nActually \n\nis the \nactual instrument indication for some given \nflight condition. Factors such as an altitude \nother than standard sea level, errors of the \ninstrument and errors due to the installation, \ncompressibility, etc. may create great vari- \nance between this instrument indication and \nthe actual flight speed. \n\n(2) The calibrated airspeed (CM) ", - "page_start": 28, - "page_end": 28, + "text": "", + "page_start": 141, + "page_end": 141, "source_file": "00-80T-80.pdf" }, { - "text": "Figure 1.3 illustrates the variation of static, \nflowing \ndynamic, and total pressure of air \nthe total \nthrough a closed tube. Note that \npressure is con,stant throughout \nthe length \nand any change in dynamic pressure produces \nthe same magnitude change in static pressure. \nThe dynamic pressure of a free airstream is \nthe one ‘common denominator of all aero- \ndynamic forces and moments. Dynamic pres- \nsure represents the kinetic energy of the free \nairstream and is a factor relating the capability \nfor producing changes in static pressure on a \nsurface. As defined, the dynamic, pressure \nvaries directly as the density and the square of \nthe velocity. Typical values of dynamic pres- \nsure, 4, are shown in table l-1 for various true \nairspeeds in the standard atmosphere. Notice \nthat the dynamic pressure at some fixed veloc- \nity varies directly with the density ratio at any \naltitude. Also, appreciate the fact that at an \naltitude of 40,oM) feet (where the density ratio, \nb, is 0.2462) it is necessary to have a true air \ntwice that at sea level in order to \nvelocity \nproduct the same dynamic pressure. ", - "page_start": 27, - "page_end": 27, + "text": "", + "page_start": 141, + "page_end": 141, "source_file": "00-80T-80.pdf" }, { - "text": "If a sym- \nmetrically shaped object were placed in a \nmoving airstream, the flow pattern typical of \nfigure 1.4 would result. The airstream at the \nvery nose of the object would stagnate and the \nrelative flow velocity at this point would be \nzero. The airflow ahead of the object pos- \nsesses some certain dynamic pressure and \nambient static pressure. At the very nose of \nthe object the local velocity will drop to zero \nand the airstream dynamic pressure will be \nconverted into an increase in static pressure at \nthe stagnation point. \nIn other words, there \nwill exist a static pressure at the stagnation \npoint which \nis equal to the airstream total \npressure-ambient static pressure plus dynamic \npressure. \n\nAIRSPEED MEASUREMENT. \n\nAround the surface of the object the airflow \nwill divide and the local velocity will increase \nfrom zero at the stagnation point \nto some \nmaximum on the sides of the object. \nIf fric- \ntion and viscosity effects are neglected, the \n\n9 ", - "page_start": 27, - "page_end": 27, + "text": "", + "page_start": 142, + "page_end": 142, "source_file": "00-80T-80.pdf" }, { - "text": "PREFACE.. ,., \n\nCHAPTER I: BASIC AERODYNAMICS \n\nWING AND AIRFOIL FORCES \n\nPROPERTIES OF THE ATMOSPHERE. \n\nStatic pressure \nTemperature \nDensity \nViscosity \nStandard atmosphere \nPressure altitude \nDensity altitude \n\nBERNOULLI’S PRINCIPLE AND SUBSONIC AIRFLOW.. \n\nBernoulli’s equation, \n\nIncompressible tlow \nVariation of static pressure and velocity \nKinetic and porcntial energy of flow \nStatic and dynamic prcssurc, 4 \nFactors affecting dynamic pressure \n\nAirspeed measurement.. \nStagnation prcssurc \nMeasurement of dynamic pressure \nPitot and static sources \nIndicated airspeed \n\n. . ", - "page_start": 7, - "page_end": 7, + "text": "", + "page_start": 142, + "page_end": 142, "source_file": "00-80T-80.pdf" }, { - "text": "\n\nAIRSTREAM AHEAD \nHAS AMBIENT STATIC \nPRESSURE AND DYNAMIC \nPRESSURE \nSTAGNATION PRESSURE \nIS AIRSTREAM TOTAL \nPRESSURE \n\nP+q \n\nFtgure 1.4. Flow Pattern on a Symmetrical Object ", - "page_start": 28, - "page_end": 28, + "text": "", + "page_start": 142, + "page_end": 142, "source_file": "00-80T-80.pdf" }, { - "text": "DEVELOPMENT OF AERODYNAMIC \n\nFORCES \n\nThe typical airflow patterns exemplify the \nrelationship of static pressure and velocity \ndefined by Bernoulli. Any object placed in an \nairstream will have the a& to impact or stag- \nnate at some point near the leading edge. The \npressure at this point of stagnation will be an \nabsolute static pressure equal to the total pres- \nsure of the airstream. \nIn other words, the \nstatic pressure at the stagnation point will be \ngreater than the atmospheric pressure by the \namount of the dynamic pressure of the air- \nstream. As the \nflow divides and proceeds \naround. the object, the increases in local ve- \nlocity produce decreases in static pressure. \nThis procedure of flow is best illustrated by the \nflow patterns and pressure distributions of \nfigure 1.7. ", - "page_start": 32, - "page_end": 32, + "text": "", + "page_start": 142, + "page_end": 142, "source_file": "00-80T-80.pdf" } ] @@ -12673,63 +12673,63 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 256, + "page_end": 256, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 266, + "page_end": 266, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\nAIRFOIL LIFT ", - "page_start": 35, - "page_end": 35, + "text": "", + "page_start": 266, + "page_end": 266, "source_file": "00-80T-80.pdf" }, { - "text": "The generation of lift by an airfoil is depend- \nent upon the airfoil being able to create circu- \nlation in the airstream and develop the lifting, \npressure distribution on the surface. \nIn all \ncases, the generated lift will be the net force \ncaused by the distribution of pressure over the \nupper and lower surfaces of the airfoil. At \nlow angles of attack, suction pressures usually \nwill exist on both upper and lower surfaces. \nbut the upper surface suction must be greater \nfor positive lift. At high angles of attack \nnear that for maximum lift, a positive pressure \nwill exist on the lower surface but this will \naccount for approximately one-third the net \nlift. \n\nSince the \nTERMINOLOGY. \nshape of an airfoil and the inclination to the \nairstream are so important in determining the \npressure distribution, it is necessary to properly \nterminology. Figure 1.10 \ndefine the airfoil \nshows a typical airfoil and illustrates \nthe \nvarious items of airfoil \n\nAIRFOIL \n\nterminology \n\n(1) The chord line is a straight line connect- \ning the leading and trailing edges of the \nairfoil. ", - "page_start": 38, - "page_end": 38, + "text": "", + "page_start": 266, + "page_end": 266, "source_file": "00-80T-80.pdf" }, { - "text": "\n\nLOWER SURFACE \nLIFT \nFLOWER SURFACE LIFT \n\nSYMMETRICAL AIRFOIL \nAT POSITIVE LIFT CAMBERED AIRFOIL \nAT POSITIVE LIFT \n\nA- UPPER SURFACE LIFT \nUPPER SURFACE LIFT ", - "page_start": 66, - "page_end": 66, + "text": "", + "page_start": 266, + "page_end": 266, "source_file": "00-80T-80.pdf" }, { - "text": "the cambered airfoil of \nNext, consider \nfigure 1.21 at zero lift. \nTo produce zero lift, \nthe upper and lower surface lifts must be equal. \nOne difference noted from the symmetrical air- \nfoil is that the upper and lower surface lifts are \nnot opposite one another. While no net lift \nthe couple produced by \nexists on the airfoil, \nthe upper and lower surface lifts creates a nose \ndown moment. As the angle of attack is in- \ncreased, the upper surface lift \nincreases while \nlower surface lift decreases. While a \nthe \nchange in lift has taken place, no change in \nmoment takes place about the point where \nthe lift change occurs. Since the moment \nabout the aerodynamic center is the product \nof a force (lift at the c.P.) and a lever arm \n(distance from c.9. to a.~.), an increase in lift \nmoves the center of pressure toward the aero- \ndynamic center. \n\nDEVELOPMENT OF AERODYNAMIC \n\nPITCHING MOMENTS \n\nThe distribution of pressure over a surface \nis the ,source of the aerodynamic moments as \nwell as the aerodynamic forces. A typical \nexample of this fact is the pressure distribution \nacting on the cambered airfoil of figure 1.21. \nThe upper surface has pressures distributed \nwhich produce the upper surface lift; the lower \nsurface has pressures distributed which pro- \nduce the lower surface lift. Of course, the It should be noted that the symmetrical air- \nfoil at zero lift has no pitching moment about \nthe aerodynamic center because the upper and ", - "page_start": 65, - "page_end": 65, + "text": "", + "page_start": 266, + "page_end": 266, "source_file": "00-80T-80.pdf" }, { - "text": "\n\nCAMBERED AIRFOIL \nUPPER DEVELOPING POSITIVE \nLIFT \n\nNET \nLIFT ", - "page_start": 66, - "page_end": 66, + "text": "", + "page_start": 266, + "page_end": 266, "source_file": "00-80T-80.pdf" }, { - "text": "sections have zero lift at zero angle of attack, \nthe sections with positive camber have nega- \ntive angles for zero lift. \n\nattack would produce an approximate 0.5 \nchange in lift coefficient. Evidently, lift,~curve \nslope is not a factor important in the selection \nof an airfoil. \n\nThe importance of maximum lift coefficient \nis obvious. \nIf the maximum lift coefficient is \nhigh, the stall speed will be low. However, \nthe high \nthickness and camber necessary for \nhigh section maximum lift coefficients may \nproduce low critical Mach numbers and large \ntwisting moments at high speed. In other \nwords, a high maximum lift coefficient is just \none of the many features desired of an airfoil \nsection. \n\nlift property affected by the \nairfoil shape is the section maximum lift co- \nThe effect of airfoil shape on \nefficient, ci-. \nci- can be appreciated by comparison of the \nlift curves for the five airfoils of figure 1.12. \nThe NACA airfoils 63X06,63-009, and 63i-012 \nate symmetrical sections of a basic thickness \ndistribution but maximum thicknesses of 6, \n9, and 12 percent respectively. The effect of \nthickness on ~1% is obvious from an inspec- \ntion of these curves : \n\nAn important ", - "page_start": 47, - "page_end": 47, + "text": "", + "page_start": 266, + "page_end": 266, "source_file": "00-80T-80.pdf" }, { - "text": "AIRFOIL LIFT CHARACTERISTICS. Air- \nfoil section properties differ from wing or \nairplane properties because of the effect of the \nplanform. Actually, the wing may have vati- \nous airfoil sections from root to tip with taper, \ntwist, sweepback and local flow components \nin a spanwise direction. The resulting aeto- \ndynamic properties of the wing are determined \nby the action of each section along the span \nand the three-dimensional flow. Airfoil sec- \ntion properties are derived from the basic shape \nor profile in two-dimensional flow and the force \ncoefficients are given a notation of lower case \nletters. For example, a wing or airplane lift \ncoefficient is C, while an airfoil section lift \ncoefficient is termed cr. Also, wing angle of \nattack is Q while section angle of attack is \ndifferentiated by the use of 01~. The study of \nsection properties allows an objective consider- \nation of the effects of camber, thickness, etc. \n\nThe lift characteristics of five illustrative \nairfoil sections are shown in figure 1.12. The \nsection lift coe&icient, c,, is plotted versus \nsection angle of attack, olO, for five standard \nNACA airfoil profiles. One characteristic fea- \nture of all airfoil sections is that the slope of \nthe various lift curves is essentially the same. \nAt low lift coefhcients, the section lift coeffi- \ncient \nincreases approximately 0.1 for each \ndegree increase in angle of attack. For each \nof the airfoils shown, a S’ change in angle of ", - "page_start": 45, - "page_end": 45, + "text": "", + "page_start": 266, + "page_end": 266, "source_file": "00-80T-80.pdf" }, { - "text": "and high power, the dynamic pressure in the \nshaded area can be much greater than the free \nstream and this causes considerably greater \nlift \nthan at zero thrust. At high power con- \nditions the induced flow also causes an effect \nsimilar to boundary layer control and increases \nthe maximum lift angle of attack. The typical \nfour-engine propeller driven airplane may have \n60 to 80 percent of the wing area affected by \nthe induced flow and power effects on stall \nspeeds may be considerable. Also, the lift of \nthe airplane at a given angle of attack and air- \nspeed will be greatly affected. Suppose the \nairplane shown is in the process of landing \nflare from a power-on approach. \nIf there is \na sharp, sudden reduction of power, the air- \nplane may drop suddenly because of the reduced \nlift. \n\nnet lift produced by the airfoil \nis difference \nbetween the lifts on the upper and lower sur- \nfaces. The point along the chord where the \nis effectively concentrated is \ndistributed \ntermed the “center of pressure, c.p.“ \nThe \ncenter of pressure is essentially the “center of \ngravity” \nlift pressure and \nthe location of the c.p. is a function of camber \nand section lift coe&cient \n\nlift ", - "page_start": 65, - "page_end": 65, + "text": "", + "page_start": 267, + "page_end": 267, "source_file": "00-80T-80.pdf" } ] @@ -12747,64 +12747,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 206, + "page_end": 206, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 312, + "page_end": 312, + "source_file": "sg246915.pdf" }, { - "text": "*Other Services.*We have 35 materials recovery facilities and other recycling operations, which are \ngenerally required to fulÑll our obligations under long-term municipal contracts for residential collection \nservices. These facilities sort recyclable paper, aluminum, glass and other materials. Most of these recyclable \nmaterials are internally collected by our residential collection operations. In some areas, we receive \ncommercial and industrial solid waste that is sorted at our facilities into recyclable materials and non- \nrecyclable waste. The recyclable materials are salvaged, repackaged and sold to third parties and the non- \nrecyclable waste is disposed of at landÑlls or incinerators. Wherever possible, our strategy is to reduce our \nexposure to Öuctuations in recyclable commodity prices by utilizing third party recycling facilities, thereby \nminimizing our recycling investment. \n\nWe provide remediation and other heavy construction services primarily through our subsidiary located in \nMissouri. \n\nWe also have a Texas-based compost, mulch and soil business at which yard, mill and other waste is \nprocessed, packaged and sold as various products. \n\n**Sales and Marketing**\n\nWe seek to provide quality services that will enable our company to maintain high levels of customer \nsatisfaction. We derive our business from a broad customer base which we believe will enable our company to \nexperience stable growth. We focus our marketing eÅorts on continuing and expanding business with existing \ncustomers, as well as attracting new customers. ", - "page_start": 16, - "page_end": 16, - "source_file": "NYSE_RSG_2004.pdf" + "text": "", + "page_start": 314, + "page_end": 314, + "source_file": "sg246915.pdf" }, { - "text": "‚ type of equipment furnished, \n\n‚ the type and volume or weight of the waste collected, \n\n‚ the distance to the disposal facility and \n\n‚ the cost of disposal. \n\nWe rent waste containers to construction sites and also provide waste collection services to industrial and \nconstruction facilities on a contractual basis with terms generally ranging from a single pickup to one year or \nlonger. We collect the containers or compacted waste and transport the waste either to a landÑll or a transfer \nstation for disposal. \n\nAlso, we currently provide recycling services in certain markets primarily to comply with local laws or \nobligations under our franchise agreements. These services include the curbside collection of residential \nrecyclable waste and the provision of a variety of recycling services to commercial and industrial customers. \n\n7 ", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_RSG_2004.pdf" + "text": "", + "page_start": 314, + "page_end": 314, + "source_file": "sg246915.pdf" }, { - "text": "*State Regulation.*Each state in which we operate has its own laws and regulations governing solid waste \ndisposal, water and air pollution, and, in most cases, releases and cleanup of hazardous substances and liability \nfor such matters. States also have adopted regulations governing the design, operation, maintenance and \nclosure of landÑlls and transfer stations. Our facilities and operations are likely to be subject to these types of \nrequirements. In addition, our solid waste collection and landÑll operations may be aÅected by the trend in \nmany states toward requiring the development of solid waste reduction and recycling programs. For example, \nseveral states have enacted laws that require counties or municipalities to adopt comprehensive plans to \nreduce, through solid waste planning, composting, recycling or other programs, the volume of solid waste \ndeposited in landÑlls. Additionally, laws and regulations restricting the disposal of certain waste in solid waste \nlandÑlls, including yard waste, newspapers, beverage containers, unshredded tires, lead-acid batteries and \nhousehold appliances, have been promulgated in several states and are being considered in others. Legislative \nand regulatory measures to mandate or encourage waste reduction at the source and waste recycling also are or \nhave been under consideration by the U.S. Congress and the U.S. EPA, respectively. ", - "page_start": 19, - "page_end": 19, - "source_file": "NYSE_RSG_2004.pdf" + "text": "", + "page_start": 314, + "page_end": 314, + "source_file": "sg246915.pdf" }, { - "text": "This annual report is printed on FSC® certified paper. \nThe recycled content of our paper is 30% post-consumer waste. \n©2015 Nordstrom, Inc. All rights reserved. Printed in the USA. \n374047840 PLEASE RECYCLE. ", - "page_start": 1, - "page_end": 1, - "source_file": "NYSE_JWN_2014.pdf" + "text": "", + "page_start": 314, + "page_end": 314, + "source_file": "sg246915.pdf" }, { - "text": "**ITEM 7. MANAGEMENT'S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND**\n**RESULTS OF OPERATIONS**\n\nYou should read the following discussion in conjunction with our Consolidated Financial Statements and \ntheir Notes contained in this Annual Report on Form 10-K. \n\n**Overview of Our Business**\n\nWe are a leading provider of non-hazardous solid waste collection and disposal services in the United \nStates. We provide solid waste collection services for commercial, industrial, municipal and residential \ncustomers through 140 collection companies in 22 states. We also own or operate 96 transfer stations, 58 solid \nwaste landÑlls and 35 recycling facilities. \n\nWe generate revenue primarily from our solid waste collection operations. Our remaining revenue is from \nother services including landÑll disposal, recycling, compost, mulch and soil operations. \n\nThe following table reÖects our revenue by source for the years ended December 31, 2004, 2003 and 2002 \n(in millions): \n\n**Years Ended December 31,**\n**2003** **2002**", - "page_start": 31, - "page_end": 31, - "source_file": "NYSE_RSG_2004.pdf" + "text": "", + "page_start": 425, + "page_end": 425, + "source_file": "00-80T-80.pdf" }, { - "text": "Compost Beginnings \nThe yard debris or food scraps*that you \nplace into your home compost bin, take to \na drop-off site, or set out for curbside \ncollection could become the compost that \nyou later use on your garden, lawn, and \nflowerbeds. \n\nIt is essential to place only quality organic \nmaterial into the composting process. Here \nare some tips: \n\nl The products you use or spray in your \nyard can end up in the compost process. \nCarefully read the labels of pesticide and \nherbicide products you use. (See page 9.) \n\nl Please keep yard debris free of : \n x Garbage \n x Plastic of any sort \n- Plastic plant pots \n- Plastic plant tabs \n- Plastic bags (if you want to bag \n your yard debris, use paper \n garden bags - available at most \n garden centers) \n\n x Rock, brick, or masonry \n x Glass or metal \n x Pet waste. ", - "page_start": 5, - "page_end": 5, - "source_file": "CompostGuide.pdf" + "text": "", + "page_start": 265, + "page_end": 265, + "source_file": "00-80T-80.pdf" }, { - "text": "**Competition**\n\nWe operate in a highly competitive industry. Entry into our business and the ability to operate proÑtably \nin the industry requires substantial amounts of capital and managerial experience. \n\nCompetition in the non-hazardous solid waste industry comes from a few large, national publicly-owned \ncompanies, including Waste Management and Allied Waste Industries, several regional publicly- and \nprivately-owned solid waste companies, and thousands of small privately-owned companies. Some of our \ncompetitors have signiÑcantly larger operations, and may have signiÑcantly greater Ñnancial resources, than \nwe do. In addition to national and regional Ñrms and numerous local companies, we compete with \nmunicipalities that maintain waste collection or disposal operations. These municipalities may have Ñnancial \nadvantages due to the availability of tax revenues and tax-exempt Ñnancing. \n\nWe compete for collection accounts primarily on the basis of price and the quality of our services. From \ntime to time, our competitors may reduce the price of their services in an eÅort to expand market share or to \nwin a competitively bid municipal contract. This may have an impact on our future revenue and proÑtability. \n\nIn each market in which we own or operate a landÑll, we compete for landÑll business on the basis of \ndisposal costs, geographical location and quality of operations. Our ability to obtain landÑll business may be \nlimited by the fact that some major collection companies also own or operate landÑlls to which they send their \nwaste. There also has been an increasing trend at the state and local levels to mandate waste reduction at the \nsource and to prohibit the disposal of certain types of waste, such as yard waste, at landÑlls. This may result in \nthe volume of waste going to landÑlls being reduced in certain areas, which may aÅect our ability to operate \nour landÑlls at their full capacity and/or aÅect the prices that we can charge for landÑll disposal services. In \naddition, most of the states in which we operate landÑlls have adopted plans or requirements that set goals for \nspeciÑed percentages of certain solid waste items to be recycled. ", - "page_start": 17, - "page_end": 17, - "source_file": "NYSE_RSG_2004.pdf" + "text": "", + "page_start": 312, + "page_end": 312, + "source_file": "sg246915.pdf" }, { - "text": "| | A project of the Washington Organic Recycling Council, with\nsupport from the Washington State Department of Ecology’s\nPublic Participation Grant program.\nThis product was partly funded through a grant from the\nWashington Department of Ecology. While these materials\nwere reviewed for grant consistency, this does not necessarily\nconstitute endorsement by the department.\nSpecial thanks: the original version of this brochure in 2003\nwas created by the Washington County, Oregon Solid Waste and\nRecycling Program in cooperation with the Washington Organic\nRecycling Council and the Composting Council of Oregon.\nwww.compostwashington.org www.soilsforsalmon.org\nwww.ecy.wa.gov\noriginal artwork provided by: | Tips to Remember:\n• Don’t put plants into 100% compost. Mix\ncompost thoroughly into existing soil before\nplanting.\n• When transplanting, it’s better to amend the\nwhole bed, not just planting holes, to promote\nroot growth.\n• Ask your compost supplier which compost\nproduct is best for your intended use.\n• Use compost at the recommended application\nrate.\n• To maintain healthy soil, reapply compost or\nmulch every 1-2 years.\n• Many composts are rich in plant nutrients, so\nyou may be able to reduce fertilizer use after\napplying compost.\n• Compost can also reduce your lawn and garden’s\nsummer irrigation needs.\n• Compost-amended soil and mulching slow run\noff, reduce erosion, and break down pollutants.\nWhen you use compost, you’re helping to\nprotect our precious streams, rivers, lakes, and\nmarine waters. | | |\n|---|---|---|---|---|\n| | A project of the Washington Organic Recycling Council, with support from the Washington State Department of Ecology’s Public Participation Grant program. This product was partly funded through a grant from the Washington Department of Ecology. While these materials were reviewed for grant consistency, this does not necessarily constitute endorsement by the department. Special thanks: the original version of this brochure in 2003 was created by the Washington County, Oregon Solid Waste and Recycling Program in cooperation with the Washington Organic Recycling Council and the Composting Council of Oregon. www.compostwashington.org www.soilsforsalmon.org www.ecy.wa.gov original artwork provided by: | Tips to Remember: • Don’t put plants into 100% compost. Mix compost thoroughly into existing soil before planting. • When transplanting, it’s better to amend the whole bed, not just planting holes, to promote root growth. • Ask your compost supplier which compost product is best for your intended use. • Use compost at the recommended application rate. • To maintain healthy soil, reapply compost or mulch every 1-2 years. • Many composts are rich in plant nutrients, so you may be able to reduce fertilizer use after applying compost. • Compost can also reduce your lawn and garden’s summer irrigation needs. • Compost-amended soil and mulching slow run off, reduce erosion, and break down pollutants. When you use compost, you’re helping to protect our precious streams, rivers, lakes, and marine waters. | | |\n", - "page_start": 2, - "page_end": 2, - "source_file": "CompostGuide.pdf" + "text": "", + "page_start": 311, + "page_end": 311, + "source_file": "sg246915.pdf" } ] }, @@ -12821,64 +12821,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_HRL_2004.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 377, + "page_end": 377, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\nLACCELERATION WITH 1 \nENGINE INOPERATIVE q ", - "page_start": 413, - "page_end": 413, + "text": "", + "page_start": 377, + "page_end": 377, "source_file": "00-80T-80.pdf" }, { - "text": "(cid:2) 2013 Let Me Contain That For You (LMCTFY): Let Me Contain That For You (LMCTFY) \nstarted in 2013 as an open source version of Google’s container stack. Applications can \nbe made container aware, which creates and manages their own subcontainers. \n\n(cid:2) 2013 Docker: Docker emerged, which made container service even more popular. Docker \nand container grew together. \n\n(cid:2) 2016 Security and DevOps: Container security enhanced and DevOps method evolved as \nmost preferred Container Application process. \n\n(cid:2) 2017 Container becomes more matured with CNCF and Kubernetes. ", - "page_start": 37, - "page_end": 37, - "source_file": "sg248459.pdf" + "text": "", + "page_start": 377, + "page_end": 377, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\nAFROELASTIC EFFECTS ", - "page_start": 348, - "page_end": 348, + "text": "", + "page_start": 377, + "page_end": 377, "source_file": "00-80T-80.pdf" }, { - "text": "(g) each day, they notify the Secretary of State in writing of— \n(i) the number of tests they sold on that day, and \n(ii) in relation to each test sold on that day— \n\n(aa) \n\nthe date of arrival in England of the person in respect of whom the test was \nsold, and \n\n(bb) whether the person in respect of whom the test was sold is a category 1 arrival \n\nor not; \n\n(h) if they arrange with another person (“X”) for X to carry out any element of the single \nend-to-end testing service on their behalf, the test provider ensures that X complies with \nthe following so far as relevant to the carrying out of that element— \n(i) paragraph 3(1)(e) to (i) of Schedule 10 as applied by paragraph (a) of this sub- \nparagraph, \n\n(ii) paragraph (b) to (g) of this sub-paragraph, \n(iii) paragraph 11(2), (3) and (4). \n\n(2) For the purposes of sub-paragraph (1)(h), “single end-to-end testing service” has the \n\nmeaning given in paragraph 3(2)(c) of Schedule 10. ", - "page_start": 64, - "page_end": 64, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 25, + "page_end": 25, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "made certain mistakes. The actual problem is: how many of the people who saw Gelmini \n\nunprepared on TV the day this case started*also*followed up the story in the next days and found out \n\nthat things weren't exactly as they had looked in that talk show, even if Letta had \"proved\" his case \n\nwith actual, exact \"data\"? How many citizens are educated to follow the analysis of some data*over*\n\n*time*? ", - "page_start": 21, - "page_end": 21, - "source_file": "Open_Data_Report.pdf" + "text": "", + "page_start": 377, + "page_end": 377, + "source_file": "00-80T-80.pdf" }, { - "text": "A chain consists of a set of enclosures that are correctly interconnected (Figure 13-5). Chain \n1 of an I/O group is connected to SAS port 1 of both node canisters. Chain 2 is connected to \nSAS port 2. This configuration means that chain 2 includes the SAS expander and drives of \nthe control enclosure. ", - "page_start": 702, - "page_end": 702, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 377, + "page_end": 377, + "source_file": "00-80T-80.pdf" }, { - "text": "The**oc rsync**command copies the contents to or from a directory in a running pod. If a pod \nhas multiple containers, you can specify the container ID by using the -c option. Otherwise, it \ndefaults to the first container in the pod. This is useful for transferring log files and \nconfiguration files from the container. \n\nTo copy contents from a directory in a pod to a local directory, run the following command: \n\noc rsync : [-c ] \n\nTo copy contents from a local directory to a directory in a pod, run the following command: \n\noc rsync : -c [] \n\nUse the**oc port-forward**command to forward one or more local ports to a pod. This allows \nto listen on a specific or random port locally, and have data forwarded to and from specific \nports in the pod. This command features the following format: \n\noc port-forward [:] \n\n**Note:**The OpenShift Container Platform 3.11 CLI Reference is available at this web page. \n\n**153** Chapter 6. Installing Red Hat OpenShift 3.11 on IBM PowerVC ", - "page_start": 169, - "page_end": 169, - "source_file": "sg248459.pdf" + "text": "", + "page_start": 377, + "page_end": 377, + "source_file": "00-80T-80.pdf" }, { - "text": "**4.4 OpenShift registry**\n\nOpenShift Container Platform can use any server that implements the container image \nregistry API as a source of images, including the Docker Hub, private registries that are run by \nthird parties, and the integrated OpenShift Container Platform registry. \n\n**4.4.1 Integrated OpenShift Container Registry**\n\nOpenShift Container Platform provides an integrated container image registry called \nOpenShift Container Registry (OCR). This registry that adds the ability to automatically \nprovision new image repositories on demand. This feature provides users with a built-in \nlocation for their application builds to push the resulting images. \n\nWhenever a new image is pushed to OCR, the registry notifies OpenShift Container Platform \nabout the new image, passing along all the information about it, such as the namespace, \nname, and image metadata. Different components of OpenShift Container Platform react to \nnew images, creating builds and deployments. \n\nOCR can also be deployed as a stand-alone component that acts solely as a container image \nregistry, without the build and deployment integration. \n\n**4.4.2 Third-party registries**\n\nOpenShift Container Platform can create containers by using images from third-party \nregistries. However, these registries do*not*offer the same image notification support as the \nintegrated OpenShift Container Platform registry. In this situation, OpenShift Container \nPlatform fetches tags from the remote registry upon imagestream creation. Refreshing the \nfetched tags is as simple as running the**oc import-image **command. When new \nimages are detected, the build that was described in 4.4.1, “Integrated OpenShift Container \nRegistry” and deployment reactions occur. ", - "page_start": 85, - "page_end": 85, - "source_file": "sg248459.pdf" + "text": "", + "page_start": 376, + "page_end": 376, + "source_file": "00-80T-80.pdf" } ] }, @@ -12895,64 +12895,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 0, + "page_end": 0, + "source_file": "NASDAQ_EMMS_2004.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 95, + "page_end": 95, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "**4.4 OpenShift registry**\n\nOpenShift Container Platform can use any server that implements the container image \nregistry API as a source of images, including the Docker Hub, private registries that are run by \nthird parties, and the integrated OpenShift Container Platform registry. \n\n**4.4.1 Integrated OpenShift Container Registry**\n\nOpenShift Container Platform provides an integrated container image registry called \nOpenShift Container Registry (OCR). This registry that adds the ability to automatically \nprovision new image repositories on demand. This feature provides users with a built-in \nlocation for their application builds to push the resulting images. \n\nWhenever a new image is pushed to OCR, the registry notifies OpenShift Container Platform \nabout the new image, passing along all the information about it, such as the namespace, \nname, and image metadata. Different components of OpenShift Container Platform react to \nnew images, creating builds and deployments. \n\nOCR can also be deployed as a stand-alone component that acts solely as a container image \nregistry, without the build and deployment integration. \n\n**4.4.2 Third-party registries**\n\nOpenShift Container Platform can create containers by using images from third-party \nregistries. However, these registries do*not*offer the same image notification support as the \nintegrated OpenShift Container Platform registry. In this situation, OpenShift Container \nPlatform fetches tags from the remote registry upon imagestream creation. Refreshing the \nfetched tags is as simple as running the**oc import-image **command. When new \nimages are detected, the build that was described in 4.4.1, “Integrated OpenShift Container \nRegistry” and deployment reactions occur. ", - "page_start": 85, - "page_end": 85, - "source_file": "sg248459.pdf" + "text": "", + "page_start": 309, + "page_end": 309, + "source_file": "sg246915.pdf" }, { - "text": "Figure 2-2 IBM PowerVC \n\nAround 2011, Container technology started to be a strong player in the cloud arena, which is \na method to package an application in a box so it can be run with its dependencies, isolated \nfrom other applications. For more information, see 2.3, “Containers” on page 19. \n\nA year later, Docker Containers exploded in popularity, but one thing was missing: the \nthorough view and management of the entire environment. ", - "page_start": 29, - "page_end": 29, - "source_file": "sg248459.pdf" + "text": "", + "page_start": 95, + "page_end": 95, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "**Ephemeral storage**\nContainer images are stored locally on the nodes running Red Hat OpenShift Container \nPlatform pods. \n\nWhen Docker run time is used, the /var/lib/docker mount point is used by active containers \nand pods. This local storage is where the node maintains a copy of container images that are \npulled from a container registry. This mount point is managed by docker-storage and it uses \nthe following naming format: /var/lib/docker/overlay2/ and \n/var/lib/docker/containers/. \n\n**Persistent storage**\nPersistent Volume Claims (PVC) are used to store the application data. These claims can be \nadded to the environment manually or provisioned dynamically by using a StorageClass \nobject. \n\n**Storage classes**\nThe StorageClass resource object describes and classifies different types of storage that can \nbe requested. It also provides a means for passing parameters to the backend for dynamically \nprovisioned storage on demand. \n\nStorageClass objects can also serve as a management mechanism for controlling different \nlevels of storage and access to the storage. Cluster Administrators (cluster-admin) or Storage \nAdministrators (storage-admin) define and create the StorageClass objects that users can \nuse without needing any intimate knowledge about the underlying storage volume sources. \nTherefore, the naming of the storage class that is defined in the StorageClass object must be \nuseful in understanding the type of storage it maps, whether that is storage from PowerVC \nCinder or from other storage provider. ", - "page_start": 112, - "page_end": 112, - "source_file": "sg248459.pdf" + "text": "", + "page_start": 279, + "page_end": 279, + "source_file": "00-80T-80.pdf" }, { - "text": "**Registry**\nOpenShift can build container images from source code, deploy them, and manage their \nlifecycle. To enable this process, OpenShift provides an internal, integrated registry that can \nbe deployed in the OpenShift environment to manage images. \n\nThe registry stores images and metadata. For production environments, persistent storage \nmust be used for the registry; otherwise, any images that were built or pushed into the registry \ndisappear if the pod restarts. \n\n**Aggregated logging**\nOne of the Red Hat OpenShift Container Platform optional components is named Red Hat \nOpenShift Container Platform aggregated logging. This component collects and aggregates \nlogs from the pods that are running in the Red Hat OpenShift Container Platform cluster and \n/var/log/messages on nodes. This configuration enables Red Hat OpenShift Container \nPlatform users to view the logs of projects that they can view by using a web interface. \n\nRed Hat OpenShift Container Platform aggregated logging component is a modified version \nof the ELK stack, which is composed of a few pods that are running on the Red Hat OpenShift \nContainer Platform environment: \n\n(cid:2) Elasticsearch: An object store where all logs are stored. \n\n(cid:2) Kibana: A web UI for Elasticsearch. \n\n(cid:2) Curator: Elasticsearch maintenance operations that are performed automatically on a \nper-project basis. \n\n(cid:2) Fluentd: Gathers logs from nodes and containers and feeds them to Elasticsearch. ", - "page_start": 113, - "page_end": 113, - "source_file": "sg248459.pdf" + "text": "", + "page_start": 95, + "page_end": 95, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "Consider the following basic concepts for aggregated logging: \n\n(cid:2) Cluster: A set of Elasticsearch nodes that distribute the workload. \n\n(cid:2) Node: A container that is running an instance of Elasticsearch, which is part of the cluster. \n\n(cid:2) Index: Collection of documents (container logs). \n\n(cid:2) Shards and Replicas: Indexes can be divided into sets of data that contain the primary \n\ncopy of the documents that are stored (primary shards) or backups of that primary copies \n(replica shards). Sharding allows the application to horizontally scale the information and \ndistributed/paralellized operations. Replication instead provides HA and also better search \nthroughput because searches are also run on replicas. \n\n**Note:**Using NFS storage as a volume or a persistent volume (or by way of an NAS such \nas Gluster) is not supported for Elasticsearch storage because Lucene relies on file \nsystem behavior that NFS does not supply. Data corruption and other problems can occur. \n\nRed Hat OpenShift Container Platform can gather metrics from kubelet and store the values \nin Heapster. Red Hat OpenShift Container Platform Metrics provide the ability to view CPU, \nmemory, and network-based metrics and display the values in the user interface. These \nmetrics can allow for the horizontal autoscaling of pods based on parameters that are \nprovided by a Red Hat OpenShift Container Platform user. It is important to understand \ncapacity planning when metrics are deployed into an Red Hat OpenShift Container Platform \nenvironment. ", - "page_start": 113, - "page_end": 113, - "source_file": "sg248459.pdf" + "text": "", + "page_start": 95, + "page_end": 95, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "(cid:2) 2013 Let Me Contain That For You (LMCTFY): Let Me Contain That For You (LMCTFY) \nstarted in 2013 as an open source version of Google’s container stack. Applications can \nbe made container aware, which creates and manages their own subcontainers. \n\n(cid:2) 2013 Docker: Docker emerged, which made container service even more popular. Docker \nand container grew together. \n\n(cid:2) 2016 Security and DevOps: Container security enhanced and DevOps method evolved as \nmost preferred Container Application process. \n\n(cid:2) 2017 Container becomes more matured with CNCF and Kubernetes. ", - "page_start": 37, - "page_end": 37, - "source_file": "sg248459.pdf" + "text": "", + "page_start": 311, + "page_end": 311, + "source_file": "sg246915.pdf" }, { - "text": "Containers include the following key features and benefits: \n\n(cid:2) Portability: \n\n– Single executable package with all code, configuration files, dependencies, and \nrequired libraries \n\n– Bundle must not include operating system-related files \n\n– Open runtime engine is a prerequisite \n\n– Common bins and libraries can be shared across multiple containers \n\n(cid:2) Agility: \n\n– Container system is managed by Open Container Initiative \n\n– DevOps tools and process are used for rapid code deployment by using continuous \nintegration and continuous deployment (CI/CD) \n\n– Open Source Docker engine works for Linux and Windows platforms \n\n(cid:2) Performance: \n\n– Multiple containers share operating system kernel for lightweight execution mode \n– Improves service usage, which results in reduced software license costs \n– Container start time is much faster than VM start time \n\n(cid:2) Fault isolation: \n\n– During concurrent execution, each container runs independently. A fault in one \ncontainer does not affect other container’s execution. \n\n– Container engine takes advantage of operating system security isolation technique. \n\n(cid:2) Ease of management: \n\n– Container orchestration manages installation, scalability, availability as defined \n\n– Application version upgrade, monitoring, and debugging managed centrally through \ncontainer orchestration system \n\n(cid:2) Security: ", - "page_start": 36, - "page_end": 36, - "source_file": "sg248459.pdf" + "text": "", + "page_start": 311, + "page_end": 311, + "source_file": "sg246915.pdf" }, { - "text": "The**oc rsync**command copies the contents to or from a directory in a running pod. If a pod \nhas multiple containers, you can specify the container ID by using the -c option. Otherwise, it \ndefaults to the first container in the pod. This is useful for transferring log files and \nconfiguration files from the container. \n\nTo copy contents from a directory in a pod to a local directory, run the following command: \n\noc rsync : [-c ] \n\nTo copy contents from a local directory to a directory in a pod, run the following command: \n\noc rsync : -c [] \n\nUse the**oc port-forward**command to forward one or more local ports to a pod. This allows \nto listen on a specific or random port locally, and have data forwarded to and from specific \nports in the pod. This command features the following format: \n\noc port-forward [:] \n\n**Note:**The OpenShift Container Platform 3.11 CLI Reference is available at this web page. \n\n**153** Chapter 6. Installing Red Hat OpenShift 3.11 on IBM PowerVC ", - "page_start": 169, - "page_end": 169, - "source_file": "sg248459.pdf" + "text": "", + "page_start": 311, + "page_end": 311, + "source_file": "sg246915.pdf" } ] }, @@ -12969,64 +12969,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 210, + "page_end": 210, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 334, + "page_end": 334, + "source_file": "sg246915.pdf" }, { - "text": "Dyspnea is a prevalent symptom with consequences that \nextend beyond its physiologic implications. A study in \nEuropean patients with COPD explored the burden of \ndyspnea and identified potential correlates. The study \nrevealed that higher dyspnea impact correlated with \nlower health-related quality of life, increased work \nimpairment, and a higher frequency of emergency \ndepartment visits.7 \n\nDyspnea refers to a subjective sensation of breathing \ndiscomfort.1 In a study involving a community-based \npopulation aged > 70 years, the prevalence of dyspnea \nwas found to be 32%.2 Dyspnea can lead to limitations in \ndaily activities, reduced exercise tolerance, and \nheightened mortality risks.3 \n\nThe three objectives of our study were as follows: (1) to \nevaluate the impact of dyspnea in adults from the \ngeneral population who had no prior diagnosis of \nrespiratory disease but who reported having significant \nrespiratory symptoms in the past 6 months; (2) to \nidentify associated risk factors for dyspnea and estimate \ntheir influence on the symptom; and (3) to explore the \nrelationship between dyspnea and health care utilization, \nquality of life, and work productivity in adults with \nundiagnosed respiratory symptoms. ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed6_cc4.pdf" + "text": "", + "page_start": 312, + "page_end": 312, + "source_file": "00-80T-80.pdf" }, { - "text": "There were significant but modest differences in mean \ndyspnea levels across the 17 study sites (data not \nshown), which are not explained by the risk factors we \naccounted for in our study. This finding is not surprising \nbecause some of the potential contributing factors \npreviously mentioned and other site-specific factors \nThe affective dimension of dyspnea can be captured \nusing additional questionnaires (eg, Multidimensional \nDyspnea Profile, Dyspnea-12). Studies have explored the \nuse of the Multidimensional Dyspnea Profile in ", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed6_cc4.pdf" + "text": "", + "page_start": 312, + "page_end": 312, + "source_file": "00-80T-80.pdf" }, { - "text": "(eg, climate, air quality/industrialization, socioeconomic \nstatus) of the catchment population tend to vary across \nstudy sites. \n\nApproximately 65% of the variability in dyspnea \nremained unexplained by the factors examined in our \nstudy. Most individuals in our study showed normal \nspirometry results but still carried a substantial \nburden of dyspnea, an inconsistency that needs \nexplanation. Several factors not included in our \nanalysis may have contributed to the unexplained \nvariation. Environmental factors (eg, air pollution, \nallergen exposure, seasonal variations in symptoms) \nare potential contributors to this unexplained \nvariability.22 Genetic predispositions could also play a \nsignificant role, as suggested by a study that revealed \nthat parents with dyspnea were 1.8 times more likely \nto have offspring with dyspnea.23 Additionally, fitness \ncould be a contributing factor, especially in \nindividuals with undiagnosed PRISm, asthma, or \nCOPD who may restrict their activities to avoid \ndyspnea, and hence become deconditioned.6 \n\nDyspnea is a complex, subjective symptom that is \nmodified by nonrespiratory factors including \npsychosocial, social, and environmental influences.5 \nInterindividual variability in the perception of dyspnea, \ninfluenced by these nonrespiratory factors, may play an \nimportant role. A study conducted by Ziegler et al24 \nassessed the perception of dyspnea in 42 healthy \nindividuals using a standardized inspiratory resistive \nloading stimulus. The study used the modified Borg \nscale to measure dyspnea perception levels. Among the \nparticipants subjected to the same inspiratory resistive \nload, 31%, 45%, and 24% of participants classified their \nlevel of dyspnea as low, intermediate, and high, \nrespectively. The study revealed that differences between \nindividuals contribute considerable variability to the \nperception of dyspnea, even among healthy participants. ", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed6_cc4.pdf" + "text": "", + "page_start": 312, + "page_end": 312, + "source_file": "00-80T-80.pdf" }, { - "text": "Take-home Points \n\nStudy Question: How profoundly are adults with \nundiagnosed respiratory symptoms \naffected by \ndyspnea? \nResults: In community-based adults with undiag- \nnosed respiratory symptoms, those identified with \npreserved ratio impaired spirometry experienced the \ngreatest impact of dyspnea, followed by those with \nundiagnosed asthma or COPD. Greater dyspnea \nimpact was associated with increased health care \nutilization, lower quality of life, and reduced work \nproductivity. \nInterpretation: Dyspnea imposes burdens on the \nhealth care system and is associated with impaired \nquality of life and work productivity. ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed6_cc4.pdf" + "text": "", + "page_start": 311, + "page_end": 311, + "source_file": "00-80T-80.pdf" }, { - "text": "Dyspnea was severe and prevalent within our study \ngroup; however, it remained undiagnosed. A study \nconducted by Stefan et al32 revealed that physicians \nunderestimated their patients’ dyspnea 37.9% of the \ntime, whereas nurses underestimated it 3.5% of the time. \nMoreover, many patients limit their physical activities, \nwhich lead them to downplay the extent of their \ndyspnea.19 Patient underreporting of symptoms, coupled \n\nFunding/Support \nThis study is supported by the Canadian Institutes of \nHealth Research [FDN Grant 154322]. \n\nFinancial/Nonfinancial Disclosures \nNone declared. ", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed6_cc4.pdf" + "text": "", + "page_start": 311, + "page_end": 311, + "source_file": "00-80T-80.pdf" }, { - "text": "prevalence of dyspnea in the adult general population \nacross 11 studies was estimated to be 10%. Dyspnea can \narise from a broad spectrum of underlying factors, \nincluding both respiratory and nonrespiratory \nconditions. Studies have revealed that dyspnea is not \nsolely attributable to respiratory conditions but is also \nheavily influenced by cardiovascular deconditioning and \nby nonrespiratory factors, including psychosocial, social, \nand environmental determinants.5,6 ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed6_cc4.pdf" + "text": "", + "page_start": 340, + "page_end": 340, + "source_file": "sg246915.pdf" }, { - "text": "Table 2 shows mean responses to the 15 dyspnea \nquestions for each disease classification and presents \nquestion weights (PCA scoring coefficients) used for \ncalculating the dyspnea impact assessment. \n\nIndividuals with PRISm reported the highest dyspnea \nimpact, with a significantly greater mean score (63.0; \n95% CI, 59.5-66.4) than those with undiagnosed \nasthma or COPD (Table 3). Those with undiagnosed \nasthma or COPD had similar mean scores (56.6; \n95% CI, 53.9-59.3 and 57.5; 95% CI, 55.1-59.9, \nrespectively), followed by those with normal \nspirometry (51.8; 95% CI, 50.7-52.8). All four groups \nreported significantly more impactful dyspnea than \nthe control group (mean score, 13.8; 95% CI, 11.8- \n15.7). Table 3 shows between-group differences in \nmean dyspnea impact assessments for each pair of \ndisease outcomes. Figure 2 compares box plots of the \ndyspnea impact assessment values across disease \nclassifications. ", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed6_cc4.pdf" + "text": "", + "page_start": 311, + "page_end": 311, + "source_file": "00-80T-80.pdf" }, { - "text": "Although neither the CAT nor the SGRQ are dyspnea- \nspecific tools, both are recommended by the Global Initia- \ntive for Chronic Obstructive Lung Disease to evaluate \nsymptoms, including dyspnea,20 and both yield a richer \nassessment of dyspnea than the modified Medical \nResearch Council breathlessness scale.20 Fifteen questions \nwere taken from the CAT and SGRQ questionnaires that \nreferred to individuals’ experiences with dyspnea, and a \ncomposite measure of dyspnea impact using a weighted \nsum of the responses to the 15 questions was constructed. \nQuestions were coded so that larger values indicate more \nimpactful dyspnea. Weights used for question responses \nin calculating the dyspnea impact assessment measure \nwere those of the first component of a principal compo- \nnent analysis (PCA) based on the covariance matrix of \nquestion responses. Questions with multiple responses \nand ordinal structure are individually more informative \nand thus were accorded higher weight than individual \ntrue-false questions. No additional PCA component was \nanticipated a priori to be material for our investigation, \nand an eigenvalue analysis of the PCA was conducted to \nverify this assumption. ", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed6_cc4.pdf" + "text": "", + "page_start": 311, + "page_end": 311, + "source_file": "00-80T-80.pdf" } ] }, @@ -13037,70 +13037,70 @@ "target_page": 2, "target_passage": "Don’t\tput\tplants\tinto\t100%\tcompost.\t\tMix\t\t\t\t\t\t\t\t\t compost\tthoroughly\tinto\texisting\tsoil\tbefore\t\t\t planting.", "chunk_present": { - "presence": true, - "index": 3 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 193, + "page_end": 193, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 2, + "page_end": 2, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": "| Selecting Quality Compost\nCompost is available in many product types and blends that may be\nused for different gardening applications. The type of feedstock,\nthe composting process, and any supplementary additives determine\nthe end product.\nMany facilities offer a variety of blends based on compost, such as\ngarden mix, potting soil, planting mix, mulches, turf top-dressing\nand soil blends.\nWhat to Look for in Compost\nFor most compost applications you will want a finished product that\nhas matured and stabilized. Look for material\nl with a dark, crumbly texture\nl with a mild odor\nFor most compost applications you will not want compost that is\nextremely dry or wet, or extremely hot. (Note that it is okay for\ncompost to be warm and to give off some steam and mild odor.)\nQuality Testing at Composting Facilities\nFeel free to ask your compost provider if they have a quality control\nprogram, and ask for test results. Compost facilities in Washington\nare permitted by the Department of Ecology and must meet\nstandards for both the composting process and contaminants,\nensuring a quality product. Some facilities also participate in the\n“Seal of Testing Assurance” (STA) testing program. See\n“Resources” on page 11 to learn more.\nRemember:\nYour compost provider can help you pick the best compost mix\nfor your needs. | | |\n|---|---|---|\n| Selecting Quality Compost Compost is available in many product types and blends that may be used for different gardening applications. The type of feedstock, the composting process, and any supplementary additives determine the end product. Many facilities offer a variety of blends based on compost, such as garden mix, potting soil, planting mix, mulches, turf top-dressing and soil blends. What to Look for in Compost For most compost applications you will want a finished product that has matured and stabilized. Look for material l with a dark, crumbly texture l with a mild odor For most compost applications you will not want compost that is extremely dry or wet, or extremely hot. (Note that it is okay for compost to be warm and to give off some steam and mild odor.) Quality Testing at Composting Facilities Feel free to ask your compost provider if they have a quality control program, and ask for test results. Compost facilities in Washington are permitted by the Department of Ecology and must meet standards for both the composting process and contaminants, ensuring a quality product. Some facilities also participate in the “Seal of Testing Assurance” (STA) testing program. See “Resources” on page 11 to learn more. Remember: Your compost provider can help you pick the best compost mix for your needs. | | |\n| | | |\n| | | |\n", - "page_start": 6, - "page_end": 6, - "source_file": "CompostGuide.pdf" + "text": "", + "page_start": 278, + "page_end": 278, + "source_file": "00-80T-80.pdf" }, { - "text": "| | A project of the Washington Organic Recycling Council, with\nsupport from the Washington State Department of Ecology’s\nPublic Participation Grant program.\nThis product was partly funded through a grant from the\nWashington Department of Ecology. While these materials\nwere reviewed for grant consistency, this does not necessarily\nconstitute endorsement by the department.\nSpecial thanks: the original version of this brochure in 2003\nwas created by the Washington County, Oregon Solid Waste and\nRecycling Program in cooperation with the Washington Organic\nRecycling Council and the Composting Council of Oregon.\nwww.compostwashington.org www.soilsforsalmon.org\nwww.ecy.wa.gov\noriginal artwork provided by: | Tips to Remember:\n• Don’t put plants into 100% compost. Mix\ncompost thoroughly into existing soil before\nplanting.\n• When transplanting, it’s better to amend the\nwhole bed, not just planting holes, to promote\nroot growth.\n• Ask your compost supplier which compost\nproduct is best for your intended use.\n• Use compost at the recommended application\nrate.\n• To maintain healthy soil, reapply compost or\nmulch every 1-2 years.\n• Many composts are rich in plant nutrients, so\nyou may be able to reduce fertilizer use after\napplying compost.\n• Compost can also reduce your lawn and garden’s\nsummer irrigation needs.\n• Compost-amended soil and mulching slow run\noff, reduce erosion, and break down pollutants.\nWhen you use compost, you’re helping to\nprotect our precious streams, rivers, lakes, and\nmarine waters. | | |\n|---|---|---|---|---|\n| | A project of the Washington Organic Recycling Council, with support from the Washington State Department of Ecology’s Public Participation Grant program. This product was partly funded through a grant from the Washington Department of Ecology. While these materials were reviewed for grant consistency, this does not necessarily constitute endorsement by the department. Special thanks: the original version of this brochure in 2003 was created by the Washington County, Oregon Solid Waste and Recycling Program in cooperation with the Washington Organic Recycling Council and the Composting Council of Oregon. www.compostwashington.org www.soilsforsalmon.org www.ecy.wa.gov original artwork provided by: | Tips to Remember: • Don’t put plants into 100% compost. Mix compost thoroughly into existing soil before planting. • When transplanting, it’s better to amend the whole bed, not just planting holes, to promote root growth. • Ask your compost supplier which compost product is best for your intended use. • Use compost at the recommended application rate. • To maintain healthy soil, reapply compost or mulch every 1-2 years. • Many composts are rich in plant nutrients, so you may be able to reduce fertilizer use after applying compost. • Compost can also reduce your lawn and garden’s summer irrigation needs. • Compost-amended soil and mulching slow run off, reduce erosion, and break down pollutants. When you use compost, you’re helping to protect our precious streams, rivers, lakes, and marine waters. | | |\n", - "page_start": 2, - "page_end": 2, - "source_file": "CompostGuide.pdf" + "text": "", + "page_start": 278, + "page_end": 278, + "source_file": "00-80T-80.pdf" }, { - "text": "| | Ask Your Compost Supplier\nWhether you’re buying direct from the composting facility, or from a local\nvendor, here are some good questions to ask:\n• What ingredients go into your compost?\n• What compost products or blends do you sell?\n• Are there quality control or testing results available for these\nproducts? (These may be on the manufacturer’s website.)\n• Which product is best for my intended use?\n• What application rate do you recommend?\n• How much do I need for my area? (Or see pages 4-6.)\nComparing Landscape Products\nA variety of soil and landscape products are sold. Here’s a\ncomparison:\nCompost is stable, decomposed organic matter, excellent for\nimproving soil structure, fertility, moisture holding capacity, and\nplant growth.\nMulch is any material applied to the soil surface. Woody mulches\n(high in carbon, low in nitrogen) like wood chips, bark and woody\ncomposts are great for woody plants. Annual plants should be\nmulched with nutrient-balanced mulches like compost, grass\nclippings, or leaves.\nPeat Moss is partially decayed sphagnum moss from peat bogs. It\nprovides soil porosity, but not the nutrients or biological diversity for\nhealthy soil that compost provides.\nFertilizers are concentrated sources of plant nutrients, used in small\namounts to supplement natural soil fertility.\nTopsoil that is sold is usually not native topsoil. Quality\nmanufactured topsoils are a blend of native sandy sub-soils with\ncomposted organic matter to support soil life. | |\n|---|---|---|\n| | Ask Your Compost Supplier Whether you’re buying direct from the composting facility, or from a local vendor, here are some good questions to ask: • What ingredients go into your compost? • What compost products or blends do you sell? • Are there quality control or testing results available for these products? (These may be on the manufacturer’s website.) • Which product is best for my intended use? • What application rate do you recommend? • How much do I need for my area? (Or see pages 4-6.) Comparing Landscape Products A variety of soil and landscape products are sold. Here’s a comparison: Compost is stable, decomposed organic matter, excellent for improving soil structure, fertility, moisture holding capacity, and plant growth. Mulch is any material applied to the soil surface. Woody mulches (high in carbon, low in nitrogen) like wood chips, bark and woody composts are great for woody plants. Annual plants should be mulched with nutrient-balanced mulches like compost, grass clippings, or leaves. Peat Moss is partially decayed sphagnum moss from peat bogs. It provides soil porosity, but not the nutrients or biological diversity for healthy soil that compost provides. Fertilizers are concentrated sources of plant nutrients, used in small amounts to supplement natural soil fertility. Topsoil that is sold is usually not native topsoil. Quality manufactured topsoils are a blend of native sandy sub-soils with composted organic matter to support soil life. | |\n| Compost: A Natural Cycle Composting is a natural process in which micro- organisms and macro-organisms break down organic material (leaves, twigs, grass, etc.) into a dark crum- bly soil amendment. Modern compost facilities use the same natural biological composting process. Their controlled-temperature process works faster, breaks down pesticide residues, and also kills weed seeds and plant diseases. Compost improves soil structure and plant growth by • Replenishing soil organic matter, and storing nutrients in plant-available forms • Supporting beneficial soil life • Reducing erosion and water run-off • Loosening clay soils for better root development (increasing soil pore space) • Retaining moisture in sandy soils so plants need less watering. | Ask Your Compost Supplier Whether you’re buying direct from the composting facility, or from a local vendor, here are some good questions to ask: • What ingredients go into your compost? • What compost products or blends do you sell? • Are there quality control or testing results available for these products? (These may be on the manufacturer’s website.) • Which product is best for my intended use? • What application rate do you recommend? • How much do I need for my area? (Or see pages 4-6.) Comparing Landscape Products A variety of soil and landscape products are sold. Here’s a comparison: Compost is stable, decomposed organic matter, excellent for improving soil structure, fertility, moisture holding capacity, and plant growth. Mulch is any material applied to the soil surface. Woody mulches (high in carbon, low in nitrogen) like wood chips, bark and woody composts are great for woody plants. Annual plants should be mulched with nutrient-balanced mulches like compost, grass clippings, or leaves. Peat Moss is partially decayed sphagnum moss from peat bogs. It provides soil porosity, but not the nutrients or biological diversity for healthy soil that compost provides. Fertilizers are concentrated sources of plant nutrients, used in small amounts to supplement natural soil fertility. Topsoil that is sold is usually not native topsoil. Quality manufactured topsoils are a blend of native sandy sub-soils with composted organic matter to support soil life. | |\n| | | |\n| | | |\n", - "page_start": 4, - "page_end": 4, - "source_file": "CompostGuide.pdf" + "text": "", + "page_start": 278, + "page_end": 278, + "source_file": "00-80T-80.pdf" }, { - "text": "Compost Questions and Answers \n**What is compost?**\nCompost is a natural humus-like soil amendment that results from \nthe controlled aerobic (with oxygen) decomposition of organic \nmaterials. Compost is not soil – it should be mixed with soil. It is \nnot fertilizer, although it contains many slowly released nutrients. \n\n**What materials (“feedstocks”) are used to make compost?**\nCompost facilities in Washington recycle a variety of organic \nmaterials, including yard debris, food scraps, manure, biosolids, \nforest residuals like sawdust and bark, construction wood, and \nagricultural residues. All of these materials can be used to produce \nhigh quality compost. Your supplier can tell you which materials \nthey compost. \n\n**How do I know I’m getting safe, quality compost?**\nFortunately, in Washington we have strict permitting and production \nstandards for compost facilities, that include both time and \ntemperature requirements and contaminant limits. \n\n**What about weed seeds, plant diseases or pesticide residues?**\nThe controlled time, aeration, and temperature process required in \nWashington has been shown to kill weed seeds and plant diseases. \nThat same process breaks down most pesticide residues. There are \na few agricultural pesticides that are not easily broken down, and \npermitted Washington compost manufacturers carefully watch their \nfeedstocks to keep those materials out of the composting process. ", - "page_start": 5, - "page_end": 5, - "source_file": "CompostGuide.pdf" + "text": "", + "page_start": 278, + "page_end": 278, + "source_file": "00-80T-80.pdf" }, { - "text": "| R\nC\nR\nN\nC | | esources\nompost Organizations\nWashington Organic Recycling Council\nFind a compost producer in your area\nwww.compostwashington.org\nUS Composting Council\nSeal of Testing Assurance (STA) program\nwww.compostingcouncil.org/programs/sta/\nThe Beauty of Your Lawn and Garden\nestoring the Soil to Protect our Waterways\nBlossoms from the Soil\nwww.soilsforsalmon.org Thank you for your interest in compost.\nCompost amendment and erosion control Compost is a versatile product with many benefits. It enhances\nduring construction: information for builders soil quality, helps save water, and supports your community’s\nwww.buildingsoil.org efforts to recycle organic debris. All this helps to conserve our\nnatural resources and reduces the amount of material sent to the\nlandfill.\natural Lawn & Garden Care, Soils, and Home\nomposting Compost-amended soil also helps break down pollutants and\nabsorb stormwater runoff. By making nutrients slowly available\nCity of Seattle to plants and enhancing plant health, compost can reduce the\nwww.seattle.gov/util/services/yard need for chemical fertilizers and pesticides. All these benefits\nhelp protect our lakes, rivers, and marine waters from pollution\nKing County and excessive runoff.\nwww.kingcounty.gov/soils\nCompost is a natural amendment for your lawn or garden, and\nWashington State University can be used regularly to enrich your soil. This guide is designed\nwww.puyallup.wsu.edu/soilmgmt/ to help you get the most from the compost that you buy. | | |\n|---|---|---|---|---|\n| R C R N C | | esources ompost Organizations Washington Organic Recycling Council Find a compost producer in your area www.compostwashington.org US Composting Council Seal of Testing Assurance (STA) program www.compostingcouncil.org/programs/sta/ The Beauty of Your Lawn and Garden estoring the Soil to Protect our Waterways Blossoms from the Soil www.soilsforsalmon.org Thank you for your interest in compost. Compost amendment and erosion control Compost is a versatile product with many benefits. It enhances during construction: information for builders soil quality, helps save water, and supports your community’s www.buildingsoil.org efforts to recycle organic debris. All this helps to conserve our natural resources and reduces the amount of material sent to the landfill. atural Lawn & Garden Care, Soils, and Home omposting Compost-amended soil also helps break down pollutants and absorb stormwater runoff. By making nutrients slowly available City of Seattle to plants and enhancing plant health, compost can reduce the www.seattle.gov/util/services/yard need for chemical fertilizers and pesticides. All these benefits help protect our lakes, rivers, and marine waters from pollution King County and excessive runoff. www.kingcounty.gov/soils Compost is a natural amendment for your lawn or garden, and Washington State University can be used regularly to enrich your soil. This guide is designed www.puyallup.wsu.edu/soilmgmt/ to help you get the most from the compost that you buy. | | |\n| | R C R N C | esources ompost Organizations Washington Organic Recycling Council Find a compost producer in your area www.compostwashington.org US Composting Council Seal of Testing Assurance (STA) program www.compostingcouncil.org/programs/sta/ estoring the Soil to Protect our Waterways www.soilsforsalmon.org Compost amendment and erosion control during construction: information for builders www.buildingsoil.org atural Lawn & Garden Care, Soils, and Home omposting City of Seattle www.seattle.gov/util/services/yard King County www.kingcounty.gov/soils Washington State University www.puyallup.wsu.edu/soilmgmt/ | | |\n| | | | | |\n| | | | | |\n", - "page_start": 3, - "page_end": 3, - "source_file": "CompostGuide.pdf" + "text": "", + "page_start": 278, + "page_end": 278, + "source_file": "00-80T-80.pdf" }, { - "text": "Compost Beginnings \nThe yard debris or food scraps*that you \nplace into your home compost bin, take to \na drop-off site, or set out for curbside \ncollection could become the compost that \nyou later use on your garden, lawn, and \nflowerbeds. \n\nIt is essential to place only quality organic \nmaterial into the composting process. Here \nare some tips: \n\nl The products you use or spray in your \nyard can end up in the compost process. \nCarefully read the labels of pesticide and \nherbicide products you use. (See page 9.) \n\nl Please keep yard debris free of : \n x Garbage \n x Plastic of any sort \n- Plastic plant pots \n- Plastic plant tabs \n- Plastic bags (if you want to bag \n your yard debris, use paper \n garden bags - available at most \n garden centers) \n\n x Rock, brick, or masonry \n x Glass or metal \n x Pet waste. ", - "page_start": 5, - "page_end": 5, - "source_file": "CompostGuide.pdf" + "text": "", + "page_start": 278, + "page_end": 278, + "source_file": "00-80T-80.pdf" }, { - "text": "| | The Composting Process\nEven though there are a variety of composting methods, most\ncomposting follows a similar process:\n1. Grinding Organic Materials:\nDepending on the facility, the feedstock (material) available, and\nthe desired compost product, different combinations of materials\nare added together and ground into small pieces:\n• Nitrogen-rich materials (such as grass, fresh plant\ncuttings, biosolids, and manures)\n• Carbon-rich materials (such as dried leaves, woody\nmaterials, and straw).\n2. Heating Up:\nThe material is placed into piles where it begins to heat up from\nthe biological activity of the compost microbes. Typically, com-\npost temperatures are required to reach at least 131 degrees F in a\nspecified time period in order to destroy weed seeds and patho-\ngens. The compost is turned or aerated, allowing the composting\nmicrobes to breathe. After a period of time, the nitrogen-rich\nmaterial is depleted, the biological process slows, and the hot\ncompost begins to cool.\n3. Finishing:\nTypically “finished” compost has undergone a series of steps to\nensure maturity and stability. The cooling compost is aged, which\nallows the decomposition process to slow down and the finished\ncompost to stabilize.\nThe end products you purchase may be entirely compost, or a\ncombination of compost blended with uncomposted additives\n(such as peat, bark, minerals, or soil). |\n|---|---|\n| | The Composting Process Even though there are a variety of composting methods, most composting follows a similar process: 1. Grinding Organic Materials: Depending on the facility, the feedstock (material) available, and the desired compost product, different combinations of materials are added together and ground into small pieces: • Nitrogen-rich materials (such as grass, fresh plant cuttings, biosolids, and manures) • Carbon-rich materials (such as dried leaves, woody materials, and straw). 2. Heating Up: The material is placed into piles where it begins to heat up from the biological activity of the compost microbes. Typically, com- post temperatures are required to reach at least 131 degrees F in a specified time period in order to destroy weed seeds and patho- gens. The compost is turned or aerated, allowing the composting microbes to breathe. After a period of time, the nitrogen-rich material is depleted, the biological process slows, and the hot compost begins to cool. 3. Finishing: Typically “finished” compost has undergone a series of steps to ensure maturity and stability. The cooling compost is aged, which allows the decomposition process to slow down and the finished compost to stabilize. The end products you purchase may be entirely compost, or a combination of compost blended with uncomposted additives (such as peat, bark, minerals, or soil). |\n| | |\n", - "page_start": 7, - "page_end": 7, - "source_file": "CompostGuide.pdf" + "text": "", + "page_start": 278, + "page_end": 278, + "source_file": "00-80T-80.pdf" }, { - "text": "Applications for Compost \n**Planting New Garden Beds or Lawns**\nSpread a 2-4 inch layer of compost and mix into the upper 6-12 \ninches of existing soil: use more in sandy soils, and less in heavy clay. \nReapply ½-1 inch annually on garden beds. \n\n**Mulch (surface applications on landscape beds)**\nSpread a 1-2 inch layer of coarse, woody compost. To allow proper \nairflow, it is best not to pile mulch around the stems of trees and \nshrubs. Pull mulch 1-2 inches away from stems. \n\n**Top Dressing for Lawns**\nSpread a ¼ to ½ inch layer of fine screened compost, and rake it into \nthe lawn. For best results, plug-aerate the lawn before top-dressing. \nOverseeding at the same time will thicken thin patches in lawns. \n\n**Blended (Manufactured) Topsoils**\nGood quality “topsoil” products usually include 10-40% compost by \nvolume, mixed with a sandy loam soil that allows good drainage. \nThese compost-soil blends help establish healthy lawns and gardens. ", - "page_start": 7, - "page_end": 7, - "source_file": "CompostGuide.pdf" + "text": "", + "page_start": 278, + "page_end": 278, + "source_file": "00-80T-80.pdf" } ] }, @@ -13111,70 +13111,70 @@ "target_page": 4, "target_passage": " Fertilizers are concentrated sources of plant nutrients, used in small amounts to supplement natural soil fertility. ", "chunk_present": { - "presence": true, - "index": 4 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 188, + "page_end": 188, + "source_file": "00-80T-80.pdf" }, { - "text": "| R\nC\nR\nN\nC | | esources\nompost Organizations\nWashington Organic Recycling Council\nFind a compost producer in your area\nwww.compostwashington.org\nUS Composting Council\nSeal of Testing Assurance (STA) program\nwww.compostingcouncil.org/programs/sta/\nThe Beauty of Your Lawn and Garden\nestoring the Soil to Protect our Waterways\nBlossoms from the Soil\nwww.soilsforsalmon.org Thank you for your interest in compost.\nCompost amendment and erosion control Compost is a versatile product with many benefits. It enhances\nduring construction: information for builders soil quality, helps save water, and supports your community’s\nwww.buildingsoil.org efforts to recycle organic debris. All this helps to conserve our\nnatural resources and reduces the amount of material sent to the\nlandfill.\natural Lawn & Garden Care, Soils, and Home\nomposting Compost-amended soil also helps break down pollutants and\nabsorb stormwater runoff. By making nutrients slowly available\nCity of Seattle to plants and enhancing plant health, compost can reduce the\nwww.seattle.gov/util/services/yard need for chemical fertilizers and pesticides. All these benefits\nhelp protect our lakes, rivers, and marine waters from pollution\nKing County and excessive runoff.\nwww.kingcounty.gov/soils\nCompost is a natural amendment for your lawn or garden, and\nWashington State University can be used regularly to enrich your soil. This guide is designed\nwww.puyallup.wsu.edu/soilmgmt/ to help you get the most from the compost that you buy. | | |\n|---|---|---|---|---|\n| R C R N C | | esources ompost Organizations Washington Organic Recycling Council Find a compost producer in your area www.compostwashington.org US Composting Council Seal of Testing Assurance (STA) program www.compostingcouncil.org/programs/sta/ The Beauty of Your Lawn and Garden estoring the Soil to Protect our Waterways Blossoms from the Soil www.soilsforsalmon.org Thank you for your interest in compost. Compost amendment and erosion control Compost is a versatile product with many benefits. It enhances during construction: information for builders soil quality, helps save water, and supports your community’s www.buildingsoil.org efforts to recycle organic debris. All this helps to conserve our natural resources and reduces the amount of material sent to the landfill. atural Lawn & Garden Care, Soils, and Home omposting Compost-amended soil also helps break down pollutants and absorb stormwater runoff. By making nutrients slowly available City of Seattle to plants and enhancing plant health, compost can reduce the www.seattle.gov/util/services/yard need for chemical fertilizers and pesticides. All these benefits help protect our lakes, rivers, and marine waters from pollution King County and excessive runoff. www.kingcounty.gov/soils Compost is a natural amendment for your lawn or garden, and Washington State University can be used regularly to enrich your soil. This guide is designed www.puyallup.wsu.edu/soilmgmt/ to help you get the most from the compost that you buy. | | |\n| | R C R N C | esources ompost Organizations Washington Organic Recycling Council Find a compost producer in your area www.compostwashington.org US Composting Council Seal of Testing Assurance (STA) program www.compostingcouncil.org/programs/sta/ estoring the Soil to Protect our Waterways www.soilsforsalmon.org Compost amendment and erosion control during construction: information for builders www.buildingsoil.org atural Lawn & Garden Care, Soils, and Home omposting City of Seattle www.seattle.gov/util/services/yard King County www.kingcounty.gov/soils Washington State University www.puyallup.wsu.edu/soilmgmt/ | | |\n| | | | | |\n| | | | | |\n", - "page_start": 3, - "page_end": 3, - "source_file": "CompostGuide.pdf" + "text": "", + "page_start": 186, + "page_end": 186, + "source_file": "00-80T-80.pdf" }, { - "text": "Compost Questions and Answers \n**What is compost?**\nCompost is a natural humus-like soil amendment that results from \nthe controlled aerobic (with oxygen) decomposition of organic \nmaterials. Compost is not soil – it should be mixed with soil. It is \nnot fertilizer, although it contains many slowly released nutrients. \n\n**What materials (“feedstocks”) are used to make compost?**\nCompost facilities in Washington recycle a variety of organic \nmaterials, including yard debris, food scraps, manure, biosolids, \nforest residuals like sawdust and bark, construction wood, and \nagricultural residues. All of these materials can be used to produce \nhigh quality compost. Your supplier can tell you which materials \nthey compost. \n\n**How do I know I’m getting safe, quality compost?**\nFortunately, in Washington we have strict permitting and production \nstandards for compost facilities, that include both time and \ntemperature requirements and contaminant limits. \n\n**What about weed seeds, plant diseases or pesticide residues?**\nThe controlled time, aeration, and temperature process required in \nWashington has been shown to kill weed seeds and plant diseases. \nThat same process breaks down most pesticide residues. There are \na few agricultural pesticides that are not easily broken down, and \npermitted Washington compost manufacturers carefully watch their \nfeedstocks to keep those materials out of the composting process. ", - "page_start": 5, - "page_end": 5, - "source_file": "CompostGuide.pdf" + "text": "", + "page_start": 186, + "page_end": 186, + "source_file": "00-80T-80.pdf" }, { - "text": "| | Ask Your Compost Supplier\nWhether you’re buying direct from the composting facility, or from a local\nvendor, here are some good questions to ask:\n• What ingredients go into your compost?\n• What compost products or blends do you sell?\n• Are there quality control or testing results available for these\nproducts? (These may be on the manufacturer’s website.)\n• Which product is best for my intended use?\n• What application rate do you recommend?\n• How much do I need for my area? (Or see pages 4-6.)\nComparing Landscape Products\nA variety of soil and landscape products are sold. Here’s a\ncomparison:\nCompost is stable, decomposed organic matter, excellent for\nimproving soil structure, fertility, moisture holding capacity, and\nplant growth.\nMulch is any material applied to the soil surface. Woody mulches\n(high in carbon, low in nitrogen) like wood chips, bark and woody\ncomposts are great for woody plants. Annual plants should be\nmulched with nutrient-balanced mulches like compost, grass\nclippings, or leaves.\nPeat Moss is partially decayed sphagnum moss from peat bogs. It\nprovides soil porosity, but not the nutrients or biological diversity for\nhealthy soil that compost provides.\nFertilizers are concentrated sources of plant nutrients, used in small\namounts to supplement natural soil fertility.\nTopsoil that is sold is usually not native topsoil. Quality\nmanufactured topsoils are a blend of native sandy sub-soils with\ncomposted organic matter to support soil life. | |\n|---|---|---|\n| | Ask Your Compost Supplier Whether you’re buying direct from the composting facility, or from a local vendor, here are some good questions to ask: • What ingredients go into your compost? • What compost products or blends do you sell? • Are there quality control or testing results available for these products? (These may be on the manufacturer’s website.) • Which product is best for my intended use? • What application rate do you recommend? • How much do I need for my area? (Or see pages 4-6.) Comparing Landscape Products A variety of soil and landscape products are sold. Here’s a comparison: Compost is stable, decomposed organic matter, excellent for improving soil structure, fertility, moisture holding capacity, and plant growth. Mulch is any material applied to the soil surface. Woody mulches (high in carbon, low in nitrogen) like wood chips, bark and woody composts are great for woody plants. Annual plants should be mulched with nutrient-balanced mulches like compost, grass clippings, or leaves. Peat Moss is partially decayed sphagnum moss from peat bogs. It provides soil porosity, but not the nutrients or biological diversity for healthy soil that compost provides. Fertilizers are concentrated sources of plant nutrients, used in small amounts to supplement natural soil fertility. Topsoil that is sold is usually not native topsoil. Quality manufactured topsoils are a blend of native sandy sub-soils with composted organic matter to support soil life. | |\n| Compost: A Natural Cycle Composting is a natural process in which micro- organisms and macro-organisms break down organic material (leaves, twigs, grass, etc.) into a dark crum- bly soil amendment. Modern compost facilities use the same natural biological composting process. Their controlled-temperature process works faster, breaks down pesticide residues, and also kills weed seeds and plant diseases. Compost improves soil structure and plant growth by • Replenishing soil organic matter, and storing nutrients in plant-available forms • Supporting beneficial soil life • Reducing erosion and water run-off • Loosening clay soils for better root development (increasing soil pore space) • Retaining moisture in sandy soils so plants need less watering. | Ask Your Compost Supplier Whether you’re buying direct from the composting facility, or from a local vendor, here are some good questions to ask: • What ingredients go into your compost? • What compost products or blends do you sell? • Are there quality control or testing results available for these products? (These may be on the manufacturer’s website.) • Which product is best for my intended use? • What application rate do you recommend? • How much do I need for my area? (Or see pages 4-6.) Comparing Landscape Products A variety of soil and landscape products are sold. Here’s a comparison: Compost is stable, decomposed organic matter, excellent for improving soil structure, fertility, moisture holding capacity, and plant growth. Mulch is any material applied to the soil surface. Woody mulches (high in carbon, low in nitrogen) like wood chips, bark and woody composts are great for woody plants. Annual plants should be mulched with nutrient-balanced mulches like compost, grass clippings, or leaves. Peat Moss is partially decayed sphagnum moss from peat bogs. It provides soil porosity, but not the nutrients or biological diversity for healthy soil that compost provides. Fertilizers are concentrated sources of plant nutrients, used in small amounts to supplement natural soil fertility. Topsoil that is sold is usually not native topsoil. Quality manufactured topsoils are a blend of native sandy sub-soils with composted organic matter to support soil life. | |\n| | | |\n| | | |\n", - "page_start": 4, - "page_end": 4, - "source_file": "CompostGuide.pdf" + "text": "", + "page_start": 374, + "page_end": 374, + "source_file": "00-80T-80.pdf" }, { - "text": "| | The Composting Process\nEven though there are a variety of composting methods, most\ncomposting follows a similar process:\n1. Grinding Organic Materials:\nDepending on the facility, the feedstock (material) available, and\nthe desired compost product, different combinations of materials\nare added together and ground into small pieces:\n• Nitrogen-rich materials (such as grass, fresh plant\ncuttings, biosolids, and manures)\n• Carbon-rich materials (such as dried leaves, woody\nmaterials, and straw).\n2. Heating Up:\nThe material is placed into piles where it begins to heat up from\nthe biological activity of the compost microbes. Typically, com-\npost temperatures are required to reach at least 131 degrees F in a\nspecified time period in order to destroy weed seeds and patho-\ngens. The compost is turned or aerated, allowing the composting\nmicrobes to breathe. After a period of time, the nitrogen-rich\nmaterial is depleted, the biological process slows, and the hot\ncompost begins to cool.\n3. Finishing:\nTypically “finished” compost has undergone a series of steps to\nensure maturity and stability. The cooling compost is aged, which\nallows the decomposition process to slow down and the finished\ncompost to stabilize.\nThe end products you purchase may be entirely compost, or a\ncombination of compost blended with uncomposted additives\n(such as peat, bark, minerals, or soil). |\n|---|---|\n| | The Composting Process Even though there are a variety of composting methods, most composting follows a similar process: 1. Grinding Organic Materials: Depending on the facility, the feedstock (material) available, and the desired compost product, different combinations of materials are added together and ground into small pieces: • Nitrogen-rich materials (such as grass, fresh plant cuttings, biosolids, and manures) • Carbon-rich materials (such as dried leaves, woody materials, and straw). 2. Heating Up: The material is placed into piles where it begins to heat up from the biological activity of the compost microbes. Typically, com- post temperatures are required to reach at least 131 degrees F in a specified time period in order to destroy weed seeds and patho- gens. The compost is turned or aerated, allowing the composting microbes to breathe. After a period of time, the nitrogen-rich material is depleted, the biological process slows, and the hot compost begins to cool. 3. Finishing: Typically “finished” compost has undergone a series of steps to ensure maturity and stability. The cooling compost is aged, which allows the decomposition process to slow down and the finished compost to stabilize. The end products you purchase may be entirely compost, or a combination of compost blended with uncomposted additives (such as peat, bark, minerals, or soil). |\n| | |\n", - "page_start": 7, - "page_end": 7, - "source_file": "CompostGuide.pdf" + "text": "", + "page_start": 186, + "page_end": 186, + "source_file": "00-80T-80.pdf" }, { - "text": "Building Rich and Healthy Soil \nWith Compost \nTo grow healthy plants you need healthy soil. \n\n**Healthy Soil:**\nl \n\nIs teeming with life! Healthy soil is a miniature ecosystem. \nA teaspoon of healthy soil will have upwards of four billion \ntiny organisms which recycle nutrients, suppress disease, and \ndiscourage pests. \n\nl Retains moisture but allows drainage. Healthy soil has \n\nstructure that allows water to drain through, retains moisture, \nand promotes strong root growth. \n\nl Is full of organic nutrients. Plants depend on the micro- \norganisms found in healthy organic-rich soil to provide \nnutrients to their roots, and help them thrive. \n\nA healthy garden and landscape is naturally resistant to pests, \ndrought, weeds, and diseases. Maintaining healthy soil may allow \nyou to reduce use of chemical fertilizers and pesticides. \n\n**Soil is a planting medium. Compost is a soil amendment.**\n**Do not place plants directly into 100% compost.**\n**Ask your supplier or see next page for mixes for different uses.**\n\n| Washington State Encourages the Use of Compost,\nto Protect Our Water Quality\nThe Washington State Department of Ecology recommends that soils\non construction sites be restored with compost before planting, and also\nencourages the use of compost for construction site erosion control, to reduce\nstormwater runoff and help keep our rivers, lakes, and Puget Sound clean.\nLearn more at www.SoilsforSalmon.org or www.BuildingSoil.org. | |\n|---|---|\n| Washington State Encourages the Use of Compost, to Protect Our Water Quality The Washington State Department of Ecology recommends that soils on construction sites be restored with compost before planting, and also encourages the use of compost for construction site erosion control, to reduce stormwater runoff and help keep our rivers, lakes, and Puget Sound clean. Learn more at www.SoilsforSalmon.org or www.BuildingSoil.org. | |\n| | |\n", - "page_start": 6, - "page_end": 6, - "source_file": "CompostGuide.pdf" + "text": "", + "page_start": 185, + "page_end": 185, + "source_file": "00-80T-80.pdf" }, { - "text": "| | A project of the Washington Organic Recycling Council, with\nsupport from the Washington State Department of Ecology’s\nPublic Participation Grant program.\nThis product was partly funded through a grant from the\nWashington Department of Ecology. While these materials\nwere reviewed for grant consistency, this does not necessarily\nconstitute endorsement by the department.\nSpecial thanks: the original version of this brochure in 2003\nwas created by the Washington County, Oregon Solid Waste and\nRecycling Program in cooperation with the Washington Organic\nRecycling Council and the Composting Council of Oregon.\nwww.compostwashington.org www.soilsforsalmon.org\nwww.ecy.wa.gov\noriginal artwork provided by: | Tips to Remember:\n• Don’t put plants into 100% compost. Mix\ncompost thoroughly into existing soil before\nplanting.\n• When transplanting, it’s better to amend the\nwhole bed, not just planting holes, to promote\nroot growth.\n• Ask your compost supplier which compost\nproduct is best for your intended use.\n• Use compost at the recommended application\nrate.\n• To maintain healthy soil, reapply compost or\nmulch every 1-2 years.\n• Many composts are rich in plant nutrients, so\nyou may be able to reduce fertilizer use after\napplying compost.\n• Compost can also reduce your lawn and garden’s\nsummer irrigation needs.\n• Compost-amended soil and mulching slow run\noff, reduce erosion, and break down pollutants.\nWhen you use compost, you’re helping to\nprotect our precious streams, rivers, lakes, and\nmarine waters. | | |\n|---|---|---|---|---|\n| | A project of the Washington Organic Recycling Council, with support from the Washington State Department of Ecology’s Public Participation Grant program. This product was partly funded through a grant from the Washington Department of Ecology. While these materials were reviewed for grant consistency, this does not necessarily constitute endorsement by the department. Special thanks: the original version of this brochure in 2003 was created by the Washington County, Oregon Solid Waste and Recycling Program in cooperation with the Washington Organic Recycling Council and the Composting Council of Oregon. www.compostwashington.org www.soilsforsalmon.org www.ecy.wa.gov original artwork provided by: | Tips to Remember: • Don’t put plants into 100% compost. Mix compost thoroughly into existing soil before planting. • When transplanting, it’s better to amend the whole bed, not just planting holes, to promote root growth. • Ask your compost supplier which compost product is best for your intended use. • Use compost at the recommended application rate. • To maintain healthy soil, reapply compost or mulch every 1-2 years. • Many composts are rich in plant nutrients, so you may be able to reduce fertilizer use after applying compost. • Compost can also reduce your lawn and garden’s summer irrigation needs. • Compost-amended soil and mulching slow run off, reduce erosion, and break down pollutants. When you use compost, you’re helping to protect our precious streams, rivers, lakes, and marine waters. | | |\n", - "page_start": 2, - "page_end": 2, - "source_file": "CompostGuide.pdf" + "text": "", + "page_start": 185, + "page_end": 185, + "source_file": "00-80T-80.pdf" }, { - "text": "| Selecting Quality Compost\nCompost is available in many product types and blends that may be\nused for different gardening applications. The type of feedstock,\nthe composting process, and any supplementary additives determine\nthe end product.\nMany facilities offer a variety of blends based on compost, such as\ngarden mix, potting soil, planting mix, mulches, turf top-dressing\nand soil blends.\nWhat to Look for in Compost\nFor most compost applications you will want a finished product that\nhas matured and stabilized. Look for material\nl with a dark, crumbly texture\nl with a mild odor\nFor most compost applications you will not want compost that is\nextremely dry or wet, or extremely hot. (Note that it is okay for\ncompost to be warm and to give off some steam and mild odor.)\nQuality Testing at Composting Facilities\nFeel free to ask your compost provider if they have a quality control\nprogram, and ask for test results. Compost facilities in Washington\nare permitted by the Department of Ecology and must meet\nstandards for both the composting process and contaminants,\nensuring a quality product. Some facilities also participate in the\n“Seal of Testing Assurance” (STA) testing program. See\n“Resources” on page 11 to learn more.\nRemember:\nYour compost provider can help you pick the best compost mix\nfor your needs. | | |\n|---|---|---|\n| Selecting Quality Compost Compost is available in many product types and blends that may be used for different gardening applications. The type of feedstock, the composting process, and any supplementary additives determine the end product. Many facilities offer a variety of blends based on compost, such as garden mix, potting soil, planting mix, mulches, turf top-dressing and soil blends. What to Look for in Compost For most compost applications you will want a finished product that has matured and stabilized. Look for material l with a dark, crumbly texture l with a mild odor For most compost applications you will not want compost that is extremely dry or wet, or extremely hot. (Note that it is okay for compost to be warm and to give off some steam and mild odor.) Quality Testing at Composting Facilities Feel free to ask your compost provider if they have a quality control program, and ask for test results. Compost facilities in Washington are permitted by the Department of Ecology and must meet standards for both the composting process and contaminants, ensuring a quality product. Some facilities also participate in the “Seal of Testing Assurance” (STA) testing program. See “Resources” on page 11 to learn more. Remember: Your compost provider can help you pick the best compost mix for your needs. | | |\n| | | |\n| | | |\n", - "page_start": 6, - "page_end": 6, - "source_file": "CompostGuide.pdf" + "text": "", + "page_start": 374, + "page_end": 374, + "source_file": "00-80T-80.pdf" }, { - "text": "The Commission will support Member States and local and regional authorities through \ntechnical guidance and help to mobilise funding and capacity building. It will also reflect \nthese objectives in the**European Climate Pact**. \n\n*2.2.9. Reducing pollution*\n\nPollution is a key driver of biodiversity loss and has a harmful impact on our health and \nenvironment. While the EU has a solid legal framework in place to reduce pollution, \ngreater efforts are still required. Biodiversity is suffering from the release of nutrients, \nchemical pesticides, pharmaceuticals, hazardous chemicals, urban and industrial \nwastewater, and other waste including litter and plastics. All of these pressures must be \nreduced. \n\nAs part of the Commission’s Zero Pollution Ambition for a toxic-free environment, a \nnew EU Chemicals Strategy for Sustainability will be put forward along with a**Zero**\n**Pollution Action Plan for Air, Water and Soil**. \n\nThe Commission will also promote the goal of zero pollution from nitrogen and \nphosphorus flows from fertilisers through reducing nutrient losses by at least 50%, while \nensuring that there is no deterioration in soil fertility. This will result in the**reduction of**\n**use of fertilisers by at least 20%**. This will be achieved by implementing and enforcing \nthe relevant environmental and climate legislation in full, identifying with Member States \nthe nutrient load reductions needed to achieve these goals, applying balanced fertilisation \nand sustainable nutrient management, and by managing nitrogen and phosphorus better \nthroughout their lifecycle. To this end, the Commission will work with Member States to ", - "page_start": 14, - "page_end": 14, - "source_file": "legal5_eubiodiversity_cc4.pdf" + "text": "", + "page_start": 185, + "page_end": 185, + "source_file": "00-80T-80.pdf" } ] }, @@ -13185,70 +13185,70 @@ "target_page": 4, "target_passage": "Peat Moss is partially decayed sphagnum moss from peat bogs. It provides soil porosity, but not the nutrients or biological diversity for healthy soil that compost provides.", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 14, + "page_end": 14, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 220, + "page_end": 220, + "source_file": "00-80T-80.pdf" }, { - "text": "| | Ask Your Compost Supplier\nWhether you’re buying direct from the composting facility, or from a local\nvendor, here are some good questions to ask:\n• What ingredients go into your compost?\n• What compost products or blends do you sell?\n• Are there quality control or testing results available for these\nproducts? (These may be on the manufacturer’s website.)\n• Which product is best for my intended use?\n• What application rate do you recommend?\n• How much do I need for my area? (Or see pages 4-6.)\nComparing Landscape Products\nA variety of soil and landscape products are sold. Here’s a\ncomparison:\nCompost is stable, decomposed organic matter, excellent for\nimproving soil structure, fertility, moisture holding capacity, and\nplant growth.\nMulch is any material applied to the soil surface. Woody mulches\n(high in carbon, low in nitrogen) like wood chips, bark and woody\ncomposts are great for woody plants. Annual plants should be\nmulched with nutrient-balanced mulches like compost, grass\nclippings, or leaves.\nPeat Moss is partially decayed sphagnum moss from peat bogs. It\nprovides soil porosity, but not the nutrients or biological diversity for\nhealthy soil that compost provides.\nFertilizers are concentrated sources of plant nutrients, used in small\namounts to supplement natural soil fertility.\nTopsoil that is sold is usually not native topsoil. Quality\nmanufactured topsoils are a blend of native sandy sub-soils with\ncomposted organic matter to support soil life. | |\n|---|---|---|\n| | Ask Your Compost Supplier Whether you’re buying direct from the composting facility, or from a local vendor, here are some good questions to ask: • What ingredients go into your compost? • What compost products or blends do you sell? • Are there quality control or testing results available for these products? (These may be on the manufacturer’s website.) • Which product is best for my intended use? • What application rate do you recommend? • How much do I need for my area? (Or see pages 4-6.) Comparing Landscape Products A variety of soil and landscape products are sold. Here’s a comparison: Compost is stable, decomposed organic matter, excellent for improving soil structure, fertility, moisture holding capacity, and plant growth. Mulch is any material applied to the soil surface. Woody mulches (high in carbon, low in nitrogen) like wood chips, bark and woody composts are great for woody plants. Annual plants should be mulched with nutrient-balanced mulches like compost, grass clippings, or leaves. Peat Moss is partially decayed sphagnum moss from peat bogs. It provides soil porosity, but not the nutrients or biological diversity for healthy soil that compost provides. Fertilizers are concentrated sources of plant nutrients, used in small amounts to supplement natural soil fertility. Topsoil that is sold is usually not native topsoil. Quality manufactured topsoils are a blend of native sandy sub-soils with composted organic matter to support soil life. | |\n| Compost: A Natural Cycle Composting is a natural process in which micro- organisms and macro-organisms break down organic material (leaves, twigs, grass, etc.) into a dark crum- bly soil amendment. Modern compost facilities use the same natural biological composting process. Their controlled-temperature process works faster, breaks down pesticide residues, and also kills weed seeds and plant diseases. Compost improves soil structure and plant growth by • Replenishing soil organic matter, and storing nutrients in plant-available forms • Supporting beneficial soil life • Reducing erosion and water run-off • Loosening clay soils for better root development (increasing soil pore space) • Retaining moisture in sandy soils so plants need less watering. | Ask Your Compost Supplier Whether you’re buying direct from the composting facility, or from a local vendor, here are some good questions to ask: • What ingredients go into your compost? • What compost products or blends do you sell? • Are there quality control or testing results available for these products? (These may be on the manufacturer’s website.) • Which product is best for my intended use? • What application rate do you recommend? • How much do I need for my area? (Or see pages 4-6.) Comparing Landscape Products A variety of soil and landscape products are sold. Here’s a comparison: Compost is stable, decomposed organic matter, excellent for improving soil structure, fertility, moisture holding capacity, and plant growth. Mulch is any material applied to the soil surface. Woody mulches (high in carbon, low in nitrogen) like wood chips, bark and woody composts are great for woody plants. Annual plants should be mulched with nutrient-balanced mulches like compost, grass clippings, or leaves. Peat Moss is partially decayed sphagnum moss from peat bogs. It provides soil porosity, but not the nutrients or biological diversity for healthy soil that compost provides. Fertilizers are concentrated sources of plant nutrients, used in small amounts to supplement natural soil fertility. Topsoil that is sold is usually not native topsoil. Quality manufactured topsoils are a blend of native sandy sub-soils with composted organic matter to support soil life. | |\n| | | |\n| | | |\n", - "page_start": 4, - "page_end": 4, - "source_file": "CompostGuide.pdf" + "text": "", + "page_start": 220, + "page_end": 220, + "source_file": "00-80T-80.pdf" }, { - "text": "1 2 3 \nλ (coupling) \n\nFIG. 18: The behavior of Kubo sums in the CB model. Note \nthat the spectral weight in the NS is always larger than in the \nSCS. We set ωsf = 26 meV ,λ = 1, and ∆ = 30 meV . ", - "page_start": 12, - "page_end": 12, - "source_file": "1001.0764.pdf" + "text": "", + "page_start": 371, + "page_end": 371, + "source_file": "00-80T-80.pdf" }, { - "text": "Forests are hugely important for biodiversity, climate and water regulation, the provision \nof food, medicines and materials, carbon sequestration and storage, soil stabilisation and \nthe purification of air and water. They are also a natural home for recreation and learning \nabout nature. Foresters have a key role to play in ensuring sustainable forest management \nand in restoring and sustaining biodiversity in forests. \n\nIn addition to strictly protecting all remaining EU primary and old-growth forests,**the**\n**EU must increase the quantity, quality and resilience of its forests**, notably against \nfires, droughts, pests, diseases and other threats likely to increase with climate change. \nTo retain their function for both biodiversity and climate, all forests need to be preserved \nin good health. More resilient forests can support a more resilient economy. They also \nplay an important role in providing materials, products and services, which are key for \nthe circular bio-economy. \n\nTo make this happen, the Commission will propose a dedicated**EU Forest Strategy**in \n2021 in line with our wider biodiversity and climate neutrality ambitions. It will include \na roadmap for**planting at least 3 billion additional trees in the EU by 2030**, in full \nrespect of ecological principles. This will create substantial job opportunities linked to \nthe collecting and cultivating of seeds, planting seedlings, and ensuring their \ndevelopment. Tree planting is particularly beneficial in cities, while in rural areas it can \nwork well with agroforestry, landscape features and increased carbon sequestration. At \nthe same time, the Commission will continue to work with Member States to ensure that \nthe EU is sufficiently equipped to prevent and respond to major forest fires, which can \ninflict significant damages on forest biodiversity. ", - "page_start": 10, - "page_end": 10, - "source_file": "legal5_eubiodiversity_cc4.pdf" + "text": "", + "page_start": 371, + "page_end": 371, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n“They stuck \nwith me and were \nalways team players.” ", - "page_start": 11, - "page_end": 11, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 371, + "page_end": 371, + "source_file": "00-80T-80.pdf" }, { - "text": "Zach Moore \nCraig Moorer \nJoaquin Morales \nJose Morales Jr. \nTiffany Morales \nJonathan Moreau \nAaron Morgan \nAmanda Morgan \nSigmond Morgan \nBetty Jo Morris \nCarrie Morris \nKendall Morris \nLarry Morris Jr. \nRaymond Morris II \nRichard Morris \nTheresa Morris \nTyke Morris II \nRobert Morrow \nGraham Morsch \nBrittany Mortimer \nKirby Morton \nJames Mosley \nKimberly Moss \nWilliam Moss \nWilliam Mowery \nJared Moyer \nTyler Moyers \nBrad Mueller \nMicah Mueller \nBrian Mullen \nJimmy Mullen \nLeon Mullhatten \nDirk Mullins \nDonald Mullins \nJosh Mullins \nRichard Mullins \nStephan Mullins II \nMalcolm Mulvaney \nRyan Mulvania \nHeather Munk \nJose Munoz \nOdulia Munoz \nLawrence R. Munsey Jr. \nJeffrey Murchison \nChristina Murphree \nDanielle Murray \nDennis Murray \nDylan Murray \nBrandon Murry \nLisa Mustain \nGreg Myers \nZane Myers \nKenneth Myrow Jr. \nDale Nace Jr. \nChristopher Naimo \nMartin Najera \nMike Namolek \nJared Nance \nLyman Nance \nJeff Nanna \nChris Nash \nJoe Nash Jr. \nDebbie Nauser \nRamiro Navarro \nBalde Navejar \nDeidre Neal \nDrew Neal \nStephanie Neal \nRobert Needham \nJimmy Neher \nRick Neidermeyer \nJanet Nelson \nRobert Nelson \nLiza Nestrick \nKurt Neufer \nThomas Nevill \nPreston Newton \nScott Newton \nJerry Nguyen \nKim Nguyen \nPeter Nguyen \nRobert Nichols II \nGabriel Nickeson \nGary Nicklow \nBrian Nielsen \nScott Niermeyer \nMarilyn Nimz \nDaryl Nix \nDoug Nix \nBrent Noller ", - "page_start": 45, - "page_end": 45, - "source_file": "NYSE_CHK_2010.pdf" + "text": "", + "page_start": 220, + "page_end": 220, + "source_file": "00-80T-80.pdf" }, { - "text": "What meant the most for me was the high-pulse training, as I had \nthoughts of it being a left behind phase for me. The experience of \nbeing able to master it felt so good. It enhances my focus on future \npossibilities rather than limitations. (ID4, EDSS: 0) ", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed13.pdf" + "text": "", + "page_start": 220, + "page_end": 220, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\nlaminar or ", - "page_start": 72, - "page_end": 72, + "text": "", + "page_start": 371, + "page_end": 371, "source_file": "00-80T-80.pdf" }, { - "text": "Afforestation, reforestation and tree planting to support biodiversity and ecosystem \nrestoration will be promoted through the CAP Strategic Plans, and the Cohesion Policy \nfunds. The new**European Urban Greening Platform**38 will also facilitate urban tree \nplanting, including under the LIFE programme. \n\nThe share of forest areas covered by management plans should cover all managed public \nforests and an increased number of private forests, and biodiversity-friendly practices \nsuch as closer-to-nature-forestry should continue and be further developed. To support \nthis, the Commission will develop guidelines on biodiversity-friendly afforestation and \nreforestation and closer-to-nature-forestry practices. This will be done in parallel with the \nnew EU Forest Strategy. \n\nTo gain a better picture of the health of European forests, the Commission will work with \nother data providers to further develop the**Forest Information System for Europe**. This \nwill help produce up-to-date assessments of the condition of European forests and link all \nEU forest-data web-platforms. This will also be presented as part of the EU Forest \nStrategy. \n\n*2.2.5. Win-win solutions for energy generation*\n\nDecarbonising the energy system is critical for climate neutrality, as well as for the EU’s \nrecovery from the COVID-19 crisis and long-term prosperity. More sustainably sourced \nrenewable energy will be essential to fight climate change and biodiversity loss. The EU \nwill prioritise solutions such as ocean energy, offshore wind, which also allows for fish \nstock regeneration, solar-panel farms that provide biodiversity-friendly soil cover, and \nsustainable bioenergy. ", - "page_start": 11, - "page_end": 11, - "source_file": "legal5_eubiodiversity_cc4.pdf" + "text": "", + "page_start": 221, + "page_end": 221, + "source_file": "00-80T-80.pdf" } ] }, @@ -13259,70 +13259,70 @@ "target_page": 2, "target_passage": "One way to encourage temporally adjacent representations to be predictive of each other is to ensure that they vary slowly over time. ", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 172, + "page_end": 172, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 173, + "page_end": 173, + "source_file": "00-80T-80.pdf" }, { - "text": "Slow Features. One way to encourage temporally \nadjacent representations to be predictive of each other \nis to ensure that they vary slowly over time. Early \nworks targeting predictive features encouraged represen- \ntations of individual video frames to be locally tempo- \nrally invariant, while preventing representation collapse \nby using spectral methods, as in SFA (Wiskott and Se- \njnowski, 2002), SSA (Kayser et al., 2001), and Simulated \nFixations (Zou et al., 2012). More recently, Goroshin \net al. (2015); Wang et al. (2010) train a siamese con- \nvolutional network to map the representations of two \nsubsequent frames to the same point, while encouraging \ndistant frames to have diverse representations via a pair- \nwise margin loss and a triplet loss, respectively. Other \nworks (Oord et al., 2018; Surís et al., 2021; Feichtenhofer \net al., 2021) implement temporal invariance using noise- \ncontrastive estimation (Gutmann and Hyvärinen, 2012). \nOur exploration in this paper goes beyond temporal in- ", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv3.pdf" + "text": "", + "page_start": 172, + "page_end": 172, + "source_file": "00-80T-80.pdf" }, { - "text": "Theoretical motivation. A theoretical motivation for \nthe effectiveness of this collapse prevention strategy was \nproposed in Grill et al. (2020) for the BYOL method. We \nprovide a simple adaptation of their analysis for our ℓ1 \nloss. For ease of exposition, we will disregard the effect of \nthe conditioning variable z and consider one dimensional \nrepresentations. Denote the representation Eθ(y) by \na random variable Y . The optimal predictor under \nequation (1) is thus given by the following functional \nexpression, \n\nFigure 2 Joint-Embedding Predictive Architectures are \ntrained to predict the representation of an input y from \nthe representation of another input x. The additional vari- \nable z provides the predictor with information about the \ntransformation that computes y from x. \n\nOur goal is to explore the effectiveness of feature pre- \ndiction as a stand-alone objective for learning visual \nrepresentations from video. To that end, we use a \njoint-embedding predictive architecture (JEPA) (LeCun, \n2022); see Figure 2. The main idea behind a JEPA is \nto learn by predicting the representation of an input y \nfrom the representation of another input x. The basic \narchitecture is made up of an encoder, Eθ( \n), which com- \n· \nputes the representation of the inputs, and a predictor, \n), which predicts the representation of y from the \nPϕ( \n· \nrepresentation of x, conditioned on a variable z indicat- \ning the transformation (or corruption) between x and \ny. Conditioning on z enables the generation of distinct \npredictions for various transformations of x. ", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv3.pdf" + "text": "", + "page_start": 172, + "page_end": 172, + "source_file": "00-80T-80.pdf" }, { - "text": "Self-Supervised Learning from Videos \n\nSimilar to unsupervised learning from images, a family of unsupervised video representation learning approaches \nenforces a spatio-temporal representation of a video clip to be invariant to hand-crafted spatio-temporal data \naugmentations (Parthasarathy et al., 2022). However, one obvious insight is that the temporal ordering of visual \ninformation in video can provide implicit supervision. Indeed, this insight is the key insight leveraged by many works \non unsupervised video learning. Towards leveraging temporal information as supervision, some approaches train a \nvisual encoder by predicting the temporal ordering of frames (Xu et al., 2019; Lee et al., 2017). Other approaches \nseek to predict low-level motion vectors computed from optical flow (Pintea et al., 2014), or to predict mixing pixels \nin video frames, using either a frame-interpolation objective (Kalluri et al., 2023) or a denoising autoencoder (Tong \net al., 2022; Feichtenhofer et al., 2022; Wang et al., 2023a). \n\n15 ", - "page_start": 15, - "page_end": 15, - "source_file": "arxiv3.pdf" + "text": "", + "page_start": 172, + "page_end": 172, + "source_file": "00-80T-80.pdf" }, { - "text": "Predictive Features. Going beyond local invariance, \na family of works trains a predictor network to map the \nrepresentation of a frame or clip at one time-step to a \ndistinct representation at another time-step. Srivastava \net al. (2015); Vondrick et al. (2016); Wang et al. (2023b) \ntrain such a video feature predictor network on top of \na frozen pretrained image or video encoder. Unfreezing \nthe target feature extractor, several methods train the \nvideo encoder and the predictor network simultaneously, \nwhile preventing collapse by using a supervised action \nforecasting loss (Girdhar and Grauman, 2021), or by \nusing the representations of distant clips as negative \nsamples in a contrastive loss (Han et al., 2019, 2020; \nTan et al., 2023), often focusing on small convolutional \nencoders (Han et al., 2019, 2020). The idea of learning a \nrepresentation by predicting missing information in fea- \nture space is also core to the joint-embedding predictive \narchitecture (JEPA) (LeCun, 2022), which combines a \nsiamese encoder with a predictor network. JEPAs have \nbeen successfully instantiated in several modalities, such \nas with audio data (Baevski et al., 2022b) and image \ndata (Zhou et al., 2021; Oquab et al., 2023; Assran et al., \n2023). In this work, we extend this paradigm to video \ndata by leveraging recent advances in self-supervised \nlearning. ", - "page_start": 2, - "page_end": 2, - "source_file": "arxiv3.pdf" + "text": "", + "page_start": 172, + "page_end": 172, + "source_file": "00-80T-80.pdf" }, { - "text": "Figure 1. A schematic illustration of a hierarchical active inference model. This model links (exteroceptive, interoceptive, and proprioceptive) \nsensations at lower levels with multimodal models of hidden bodily states, such as fatigue and hunger, at intermediate levels, and finally with \ntemporally extended, integrative models of the embodied self at the higher hierarchical level. In this schematic, following predictive coding (Rao and \nBallard 1999, Friston 2005), black and red circles represent neural units that encode predictions and prediction errors, respectively. The levels are \nreciprocally connected, so predictions are propagated from the top-down (black edges) and prediction errors from the bottom-up (red edges). Finally, \nthe pink triangles indicate a mechanism of precision gating (or gain control) of prediction error units, which determines their relative influence on \nunits encoding predictions. At a neurobiological level, prediction and prediction error units could be mapped to deep and superficial pyramidal cells in \ncortical hierarchies, whereas expected precision could be linked to neuromodulatory input. The elements of the generative model shown do not need \nto map one-to-one to specific brain areas or networks but are plausibly distributed across many of them. However, as a first approximation, the lower \nand intermediate layers of the generative model could be linked to brain networks that process unimodal information (e.g. sensory cortices for \nexteroceptive information) and multimodal association areas, respectively. The highest level of the generative model could be linked to brain networks \nthat process information about the self, such as the insular cortex, the anterior cingulate cortex, and the medial prefrontal cortex. See Parr et al. \n(2022) for details about hierarchical generative models supporting adaptive regulation and allostasis and Barrett and Simmons (2015) for their \nputative neuronal underpinnings. See online article for colored version of this figure. ", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed1.pdf" + "text": "", + "page_start": 172, + "page_end": 172, + "source_file": "00-80T-80.pdf" }, { - "text": "computed from another part of the video, x. The pre- \ndictor network Pϕ( \n), which maps the representation of \n· \nx to the representation of y, is trained simultaneously \nwith the encoder, and is provided specification of the \nspatio-temporal positions of y through the conditioning \nvariable z \n\nFeature Prediction versus Pixel Reconstruction. \nApproaches that predict in pixel space must dedicate \nsignificant model capacity and compute to capture all \nthe low-level detail in the visual input. By contrast, ap- \nproaches that predict in latent space have the flexibility \nto eliminate irrelevant or unpredictable pixel-level details \nfrom the target representation (Vondrick et al., 2016). \nPredicting in representation space has been shown to \nlead to versatile representations that perform well across \nmany downstream tasks through linear probing or low- \nshot adaptation (Assran et al., 2023; Oquab et al., 2023; \nAssran et al., 2022), while demonstrating an efficiency \ngain during pretraining compared to pixel level recon- \nstruction (Assran et al., 2023; Baevski et al., 2022b,a). \nThe works of Baevski et al. (2022a,b) additionally show \nthat predicting in representation space results in compet- \nitive end-to-end fine-tuning performance in the image, \naudio and text domains. In this work, we extend these \nfindings to the video modality. \n\n∆y. \n← \nNaively implementing the objective using the regression ", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv3.pdf" + "text": "", + "page_start": 172, + "page_end": 172, + "source_file": "00-80T-80.pdf" }, { - "text": "puts x and y correspond to masked regions of a video, we \napply the video masks by simply dropping a subset of the \ntokens. We apply masking at the input of the x-encoder, \nand at the output of the y-encoder to construct contex- \ntualized targets (Baevski et al., 2022b). The encoder is \nparameterized using standard ViT networks, while the \npredictor is a narrow transformer implemented using \n12 blocks with an embedding dimension of 384. Taking \ninspiration from masked autoencoders (He et al., 2021), \nour predictor takes as input the sequence of embeddings \nproduced by the x-encoder as well as a sequence of learn- \nable mask tokens with positional embeddings indicating \nthe spatio-temporal positions of the y tokens. The out- \nput of the predictor is an embedding vector for each \nmask token; see Figure 3 and refer to Appendix B for \nmore details. \n\n3.2 Prediction Task: Predicting y from x \nThe feature prediction task is based on a masked mod- \neling formulation (He et al., 2021; Tong et al., 2022); \ni.e., regions x and y from the video are sampled using \nmasking. To sample y from a video, we sample several \n(possibly overlapping) spatially continuous blocks with \nvarious aspect ratios and repeat the spatial blocks across \nthe entire temporal dimension of the video; x is taken to \nbe the complement. Masking a large continuous block \nthat covers the full temporal dimension limits informa- \ntion leakage due to the spatial and temporal redundancy \nof videos, and results in a harder prediction task (Tong \net al., 2022). ", - "page_start": 4, - "page_end": 4, - "source_file": "arxiv3.pdf" + "text": "", + "page_start": 173, + "page_end": 173, + "source_file": "00-80T-80.pdf" }, { - "text": "Another critical aspect of Fig. 1 is that it illustrates two path- \nways in which prediction errors at the proprioceptive and inte- \nroceptive levels are used to steer physical actions (reflex arcs) \nand autonomic actions (autonomic reflexes). Endowing predictive \ncoding with these reflexes—hence realizing an “active inference” \narchitecture—permits minimizing prediction errors by changing \nthe state of the world (by physically acting) or the internal milieu \n(by engaging in autonomic actions) rather than only by changing \npredictions, as described later. \n\nare reciprocally linked through top-down connections that convey \npredictions (black edges) and bottom-up connections that convey \nprediction errors (red edges), within and across levels. This predic- \ntive coding architecture permits inferring (in the Bayesian sense) \nthe most likely causes of sensations, across multiple modalities \nand multiple hierarchical levels, by minimizing prediction errors \nat all levels. The rationale is that predictions at all levels are con- \ntinuously adjusted (and synaptic weights adjusted at a slower time \nscale) until they match with incoming multimodal stimuli suf- \nficiently well, and, consequently, the prediction errors across all \nlevels are minimized. This process entails that even if a predictive \ncoding agent starts with an incorrect prediction (e.g. about what \nobject it is looking at) the prediction errors that measure a discrep- \nancy between the predicted sensations and the actual sensations \ncan help revise the initial predictions. See Parr et al. (2022) for a \nmore detailed explanation of how to interpret these schematics. ", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed1.pdf" + "text": "", + "page_start": 173, + "page_end": 173, + "source_file": "00-80T-80.pdf" } ] }, @@ -13339,64 +13339,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 216, + "page_end": 216, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 117, + "page_end": 117, + "source_file": "00-80T-80.pdf" }, { - "text": "Comparison with video models. Compared to \nlarge-scale video baselines, the V-JEPA models outper- \nform all previous models on every downstream video \nThe V-JEPA models narrow the gap with image models \non image classification tasks. \nIn particular, V-JEPA \nachieves a score of 77.4% on ImageNet using a one- \n\n8 ", - "page_start": 8, - "page_end": 8, - "source_file": "arxiv3.pdf" + "text": "", + "page_start": 118, + "page_end": 118, + "source_file": "00-80T-80.pdf" }, { - "text": "(b) Visualizations. First Row: Masked videos used as input to the V-JEPA models (a pretrained ViT-H/16 encoder and its \ncorresponding predictor network). Other rows: Bounding boxes contain various samples from the decoder overlayed on the \noriginal video. V-JEPA is not a generative model and the decoder does not have access to the context (first row), so we do \nnot expect samples to exactly match the input. This experiment qualitatively illustrates what information is encoded and \npredicted by V-JEPA. In particular, characteristics that are common across samples represent information that is encoded in \nthe V-JEPA predictions. V-JEPA generates predictions that are spatially and temporally coherent with unmask region of the \nvideo. The predictions also capture consistent motion through time. \n\nFigure 6 Qualitative Analysis. Offline visualizations of the V-JEPA feature-space predictions. ", - "page_start": 10, - "page_end": 10, - "source_file": "arxiv3.pdf" + "text": "", + "page_start": 118, + "page_end": 118, + "source_file": "00-80T-80.pdf" }, { - "text": "Figure 6b shows that the V-JEPA feature predictions \nare indeed grounded, and exhibit spatio-temporal con- \nsistency with the unmasked regions of the video. Specif- \nically, the samples in Figure 6b show that the V-JEPA \npredictor correctly captures positional uncertainty and \nproduces a variety of visual objects at various locations \nwith consistent motion. Some of the samples also demon- \nstrate an understanding of object-permanence, as the \nvisual objects remain consistent after partial occlusion. \n\n× \n\nSimilar observations hold on SSv2. The performance \nof the largest V-JEPA model on SSv2 drops by 13.9% \n\n9 ", - "page_start": 9, - "page_end": 9, - "source_file": "arxiv3.pdf" + "text": "", + "page_start": 118, + "page_end": 118, + "source_file": "00-80T-80.pdf" }, { - "text": "Comparison with image models. On tasks that re- \nquire a fine-grained understanding of motion (Something- \nSomething-v2), the V-JEPA models provide a major im- \nprovement (over +21 points) compared to large-scale \nimage baselines, such as DINOv2, OpenCLIP, and I- \nJEPA. Self-supervised pretraining from videos allows to \nmodel dynamic concepts that are not easily learned from \nstatic image datasets. Similarly, we observe that the \nV-JEPA models outperform image-based pretraining on \naction localization. \n\nOn Kinetics-400, we find image models to perform well; \ne.g., while DINOv2 (Oquab et al., 2023) previously re- \nported 78.4% on K400 with a linear probe, we improve \nthe frozen evaluation of the g/14 model to 83.4% by \nusing an attentive probe. In this case, our H/16 model \nachieves 82.0% top-1 accuracy. It is worth noting that \nthe label for many Kinetics videos can be inferred using \nappearance-based cues, without requiring an understand- \ning of motion (Sevilla-Lara et al., 2021). ", - "page_start": 8, - "page_end": 8, - "source_file": "arxiv3.pdf" + "text": "", + "page_start": 118, + "page_end": 118, + "source_file": "00-80T-80.pdf" }, { - "text": "**OnD ema nd Insta nc e**\n\n\n+ \n\nObje ct \nServe r Ob ject \nSe rver ", - "page_start": 315, - "page_end": 315, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 117, + "page_end": 117, + "source_file": "00-80T-80.pdf" }, { - "text": "(a) Visualization Methodology. We train a conditional diffusion model to decode the V-JEPA feature-space predictions to \ninterpretable pixels; the pretrained V-JEPA encoder and predictor networks are kept frozen in this process. The decoder is \nonly fed the representations predicted for the missing regions of the video, and does not have access to the unmasked regions \nof the video. ", - "page_start": 10, - "page_end": 10, - "source_file": "arxiv3.pdf" + "text": "", + "page_start": 117, + "page_end": 117, + "source_file": "00-80T-80.pdf" }, { - "text": "Table 6 Comparison with State-of-the-Art Models. We compare V-JEPA with state-of-the-art baselines in frozen evaluation \nwith an attentive probe on downstream image tasks (IN1K, Place205, iNat21) and video tasks (K400, SSv2, AVA). All models \nare evaluated at resolution 224, except I-JEPA512 and V-JEPA384 which are evaluated respectively at resolution 512 and \n384. On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views \nfrom the video. Compared to other video baselines, V-JEPA exhibits a consistent improvement across all downstream tasks. \nCompared to image-models that excel under the frozen evaluation, V-JEPA shows a significant performance improvement on \ntasks requiring motion understanding (+21 points on SSv2), and reduces the gap between video and image models on tasks \nrequiring static appearance-based features. \n\nVideo Tasks Image Tasks \n\nK400 \n(16×8×3) SSv2 \n(16×2×3) \nAVA IN1K Places205 iNat21 \nArch. Params. Data \n\nIN22K \nLAION \nLVD-142M 79.7 \n81.8 \n83.4 50.0 \n34.8 \n50.6 66.5 \n70.2 \n68.4 85.7 \n83.6 \n88.8 \n\n66.5 \n65.4 \n66.2 \n61.2 \n64.7 59.4 \n60.6 \n59.1 \n60.6 \n59.5 65.7 \n72.4 \n65.5 \n68.3 \n61.7 ", - "page_start": 7, - "page_end": 7, - "source_file": "arxiv3.pdf" + "text": "", + "page_start": 117, + "page_end": 117, + "source_file": "00-80T-80.pdf" }, { - "text": "5.3 Label-efficiency \n\nWe examine the label-efficiency of V-JEPA compared to \nother self-supervised video models by measuring the abil- \nity of the pretrained backbones to adapt to downstream \ntasks with few labels. Specifically, we investigate the \nperformance of the frozen models on Kinetics-400 and \nSomething-Something-v2 as we vary the percentage of \nlabeled examples from each dataset available for training \nthe attentive probe. We train the probes in several low- \nshot settings: using either 5% of the train set, 10%, or \n50%, and take 3 random splits in each setting to obtain \nmore robust metrics, resulting in 9 different evaluation \nexperiments for each model. Table 7 reports the mean \nperformances and standard deviation using the K400 \nand SSv2 validation sets. \n\nGiven a masked video, we use the V-JEPA pretrained \nmodels to predict the representations of the missing \nregions, and then use the decoder to project the rep- \nresentations to pixel space. Figure 6b shows decoder \noutputs for various random seeds. Qualities that are \ncommon across samples represent information that is \ncontained in the predictor representation. \n\nWe find V-JEPA to be more label-efficient than other \nself-supervised video models: decreasing the available \nnumber of labeled examples for training the attentive \nprobe results in an increase in the performance gap \nbetween V-JEPA and the other models. In particular, \nthe performance of the largest V-JEPA model on K400 \ndrops by 12% to 68.2% top-1 when we reduce the number \nof labeled examples by a factor of 10 \n(from roughly \n287 examples per class to 29 examples per class). By \ncontrast, VideoMAEv2 drops by 30% to 37.0% top-1, \nVideoMAE drops by 15.9% to 62.3% top-1, and MVD \ndrops by 14.6% to 62.6% top-1. ", - "page_start": 9, - "page_end": 9, - "source_file": "arxiv3.pdf" + "text": "", + "page_start": 117, + "page_end": 117, + "source_file": "00-80T-80.pdf" } ] }, @@ -13413,64 +13413,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 175, + "page_end": 175, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 243, + "page_end": 243, + "source_file": "00-80T-80.pdf" }, { - "text": "Table 1 Pixels vs. Featurized Targets. We ablate the effect of computing the prediction loss in feature space vs pixel space. All \nmodels are trained on VideoMix2M for 90K iterations with a batch size of 3072 using the multi-block prediction task. We \nexamine downstream performance using a frozen backbone with attentive probing, and report top-1 accuracy using a single \ncenter view. We also examine end-to-end fine-tuning performance of the models on K400. Predicting in feature space provide \na consistent improvement over pixel space prediction. \n\nFrozen Evaluation Fine-Tuning \n\nK400 \n(16×1×1) SSv2 \n(16×1×1) \nIN1K \nK400-ft \n(16×5×3) Target Arch. \n\n| Features ViT-L/16 | 73.7 | 66.2 | 74.8 | 85.6 |\n|---|---|---|---|---|\n| Features ViT-L/16 | 73.7 | 66.2 | 74.8 | 85.6 |\n", - "page_start": 5, - "page_end": 5, - "source_file": "arxiv3.pdf" + "text": "", + "page_start": 25, + "page_end": 25, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": "Frozen Evaluation w/ Att. Pooling Fine-Tuning \n\n#Samples \nSeen K400 \n(16×8×3) SSv2 \n(16×2×3) \nAVA IN1K Places205 \niNat21 K400-ft \n(16×5×3) SSv2-ft \n(16×2×3) Method Arch. Iter. \n\nMethods pretrained using pixel prediction \nOmniMAE \nVideoMAE \nHiera 75.1 \n71.1 \n68.9 ViT-L/16 \nViT-L/16 \nHiera-L 2400M 1170K \n410M \n400K \n770M 1500K 65.6 \n77.8 \n75.5 60.6 \n65.5 \n64.2 14.4 \n21.6 \n15.8 59.8 \n59.3 \n58.5 66.1 \n64.6 \n56.9 84.0 \n85.4 \n87.3 74.2 \n74.3 \n75.1 \n\n| V-JEPA ViT-L/16 270M 90K | 80.8 | 69.5 | 25.6 | 74.8 | 60.3 | 67.8 | 85.6 | 75.1 |\n|---|---|---|---|---|---|---|---|---|\n| V-JEPA ViT-L/16 270M 90K | 80.8 | 69.5 | 25.6 | 74.8 | 60.3 | 67.8 | 85.6 | 75.1 |\n", - "page_start": 7, - "page_end": 7, - "source_file": "arxiv3.pdf" + "text": "", + "page_start": 25, + "page_end": 25, + "source_file": "NYSE_RCI_2013.pdf" }, - { - "text": "Table 2 Pretraining Data Distribution. We pretrain all models for 90K iterations using a batch size of 3072, and evaluate \ndownstream performance of the frozen backbones with an attentive probe using a single center view. Average performance \nacross tasks increases with the pretraining dataset size. \n\nFrozen Evaluation \n\nK400 \n(16×1×1) SSv2 \n(16×1×1) \nIN1K Avg. \nArch. #Samples \n\nViT-L/16 \n\n| 73.7 | 66.2 | 74.8 | 71.5 |\n|---|---|---|---|\n| 73.7 | 66.2 | 74.8 | 71.5 |\n\n\n| VideoMix2M 2000K | 74.0 | 68.5 | 75.9 | 72.8 |\n|---|---|---|---|---|\n| VideoMix2M 2000K | 74.0 | 68.5 | 75.9 | 72.8 |\n", - "page_start": 5, - "page_end": 5, - "source_file": "arxiv3.pdf" + { + "text": "", + "page_start": 25, + "page_end": 25, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": "has been critical for enabling the surge of advancements \nin other modalities, such as text and images (Kaplan \net al., 2020; Cherti et al., 2023). We investigate whether \na similar trend holds for video data. To control for the \npossible confounding variable of compute budget, we \npretrain all models in Table 2 for 90K iterations using \na batch-size of 3072. We report downstream results on \nK400, SSv2, and IN1K using a frozen backbone with an \nattentive probe, and report top-1 accuracy using a single \ncenter view. \n\n| multi-block | 72.9 | 67.4 | 72.8 |\n|---|---|---|---|\n| multi-block | 72.9 | 67.4 | 72.8 |\n\n\nwith a single GeLU activation, followed by a LayerNorm, \nand finally a linear classifier. \n\nIn Table 3 we see that using adaptive pooling with \na learnable cross-attention layer leads to a significant \nimprovement of +17 points on K400 and +16.1 points \non SSv2. Using an attentive-probe is also beneficial for \nother baseline models as reported in Appendix E. \n\nTable 2 shows that average performance across tasks \nmonotonically increases as we increase the size of the \npretraining dataset, but the best task-specific perfor- \nmance is obtained by independently selecting the pre- \ntraining data for each specific downstream task. For \ninstance, the L/16 obtains its best SSv2 performance \nwhen pretrained on K710+SSv2, its best K400 perfor- \nmance when pretrained only on K710, and its best IN1K \nperformance when pretrained only on K710+HT. The \nbest average performance across all tasks is achieved by \npretraining VideoMix2M, which combines all the data \nsources. Similarly, the H/16 pretrained on K710+SSv2 \nachieves a greater K400 score than the H/16 pretrained \non VideoMix2M, however, the top performing H/16 on \naverage is pretrained on VideoMix2M. ", - "page_start": 6, - "page_end": 6, - "source_file": "arxiv3.pdf" + "text": "", + "page_start": 25, + "page_end": 25, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": "Pretraining. We combine several public datasets to \nconstruct an unsupervised video pretraining dataset, \nwhich we refer to as VideoMix2M. Specifically, we com- \nbine the videos from HowTo100M (HT) (Miech et al., \n2019), Kinetics-400/600/700 (K710) (Kay et al., 2017), \nand Something-Something-v2 (SSv2) (Goyal et al., 2017), \nand remove any overlap with the validation sets of \nKinetics-400/600/700 and Something-Something-v2, re- \nsulting in approximately 2 million videos. We train a \nViT-L/16, a ViT-H/16, and a ViT-H/16384 transformer \nmodel on VideoMix2M. We use a batch size of 3072 for \nthe ViT-L/16 and ViT-H/16 models, and a batch size \nof 2400 for the ViT-H/16384 model. Each model takes \nas input a video clip of 16 frames sampled with a frame- \nskip of 4, corresponding to roughly 3 second clips on \naverage. The ViT-L/16 and ViT-H/16 process the video \nat a spatial resolution of 224, while the ViT-H/16384 \nuses an input resolution of 384; cf. Appendix C. ", - "page_start": 4, - "page_end": 4, - "source_file": "arxiv3.pdf" + "text": "", + "page_start": 243, + "page_end": 243, + "source_file": "00-80T-80.pdf" }, { - "text": "Frozen Evaluation \n\nK400 \n(16×1×1) SSv2 \n(16×1×1) \nAvg. Att. Avg. Att. Method Arch. \n\n| V-JEPA ViT-L/16 | 56.7 | 73.7 | 50.1 | 66.2 |\n|---|---|---|---|---|\n| V-JEPA ViT-L/16 | 56.7 | 73.7 | 50.1 | 66.2 |\n", - "page_start": 6, - "page_end": 6, - "source_file": "arxiv3.pdf" + "text": "", + "page_start": 243, + "page_end": 243, + "source_file": "00-80T-80.pdf" }, { - "text": "3.1.5 Similarity analysis \nWe investigate the proximity between the datasets’ \ntopics to give insights about the benchmark con- \ntents. The methodology introduced by Muen- \nnighoff et al. (2022), i.e. computing an average \nembedding of samples from each dataset, is used to \nbuild a dataset-similarity matrix (displayed in ap- \npendix Figure 3). The distances between averaged \nembedding vectors of each dataset (which range \nfrom 0.89 to 1 in Figure 3) remain hard to interpret \ninto a dataset semantic proximity. Thus, we com- \nplement this by observing the dataset’s clouds of \nembedding in a 2D plane using PCA in Figure 4. \nFigures 4 and 3 seem to correlate, showing high \nsimilarity between two datasets when the same \nunderlying data is used in different tasks. Dataset \ntopics are pretty close, with some exceptions, such \nas the Syntec dataset. As more datasets are added \nto the benchmark, this analysis will help select new \ndata that do not produce redundant results. It may \nalso help to understand the link between the results \nand the datasets’ topics. \n\n2023) where given the original human summary \nin English and its translation in French, the model \nrates the quality of the translation from 0 to 10, \nwith 0 being of very bad quality and 10 being ex- \ncellent. The prompt is available in Figure 8. Ad- \nditionally, we manually check random translations \nwith ratings between 9 and 10 to ensure the rating \nis relevant. We do the same for all translations with \na score less than 9 and correct them7 (see the rating \ndistribution in Table 6). \n\n3.1.4 Data for the Reranking task ", - "page_start": 4, - "page_end": 4, - "source_file": "arxiv4.pdf" + "text": "", + "page_start": 24, + "page_end": 24, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": "• Samples belonging to domain classes with \nless than 500 samples were removed, which \nleads us to keep only 10 classes. \n\n• Subsampling was performed on 2 classes con- \ntaining more than 10k samples each to lower \nthe number of samples and mitigate the unbal- \nance of the dataset. \n\nMore details about this process are provided in the \nappendix A.2 along with some extracts in Figure \n6. We make the dataset publicly available in both \ntheir raw and clean versions. We use this dataset in \na clustering setup to cluster publications by their \ntitle and use the domain as ground truth. To ensure \nthe quality of this dataset, we run 3 baseline mod- \nels for classification: TF-IDF + SVM, a fine-tuned \nCamembert (Martin et al., 2019) and GPT-4 lever- \naging In-Context Learning (ICL). Furthermore, we \nrun one baseline model for topic modeling: Latent \nDirichlet Allocation (LDA) (Blei et al., 2003) and \nreport scores in the appendix A.2. \n\n3.1.3 SummEvalFr (Summarization) \nThe original SummEval dataset (Fabbri et al., 2021) \nconsists of 100 news articles from the CNN/Dai- ", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv4.pdf" + "text": "", + "page_start": 24, + "page_end": 24, + "source_file": "NYSE_RCI_2013.pdf" } ] }, @@ -13487,64 +13487,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "In a system design with decentralized control, different users are granted different levels of \nadministrative authority. For example, you might have users that have the authority to create \nusers and groups. Other users might have the authority to create application groups and \nfolders, and others might be given full system administration authority. ", - "page_start": 90, - "page_end": 90, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 148, + "page_end": 148, + "source_file": "00-80T-80.pdf" }, { - "text": "Where*pre-existing materials*are inserted in the*results*, the contracting authority may \naccept reasonable restrictions impacting on the above list, provided that the said materials \nare easily identifiable and separable from the rest, that they do not correspond to \nsubstantial elements of the*results*, and that, should the need arise, satisfactory \nreplacement solutions exist, at no additional costs to the contracting authority. In such \ncase, the contractor will have to clearly inform the contracting authority before making \nsuch choice and the contracting authority has the right to refuse it. \n\n**II.13.4. Identification of pre-existing rights**\n\nWhen delivering the*results*, the contractor must warrant that, for any use that the \ncontracting authority may envisage within the limits set in this FWC, the newly created \nparts and the*pre-existing material*incorporated in the*results*are free of claims from ", - "page_start": 25, - "page_end": 25, - "source_file": "EN-Draft FWC for services 0142.pdf" + "text": "", + "page_start": 148, + "page_end": 148, + "source_file": "00-80T-80.pdf" }, { - "text": "Provided that nothing in this subsection shall be construed as conferring on any \n\nperson or authority power to require a judge of the Court of Appeal or the High Court, the \nAuditor-General or the Director of Public Prosecutions to retire from the public service. \n(8) Any provision in this Constitution that vests in any person or authority power \n\nto remove any public officer from his or her office shall be without prejudice to the power \nof any person or authority to abolish any office or to any law providing for the compulsory \nretirement of public officers generally or in any class of public officer on attaining an age \nspecified therein. \n\n(9) Where power is vested by this Constitution in any person or authority to \nappoint any person to act in or perform the functions of any office if the holder thereof is \nhimself unable to perform those functions, no such appointment shall be called in \nquestion on the ground that the holder of the office was not unable to perform those \nfunctions. \n\n(10) No provision of this Constitution that any person or authority shall not be \n\nsubject to the direction or control of any other person or authority in the exercise of any \nfunctions under this Constitution shall be construed as precluding a court of law from \nexercising jurisdiction in relation to any question whether that person or authority has \nperformed those functions in accordance with this Constitution or any other law. ", - "page_start": 55, - "page_end": 55, - "source_file": "Botswana-constitution.pdf" + "text": "", + "page_start": 148, + "page_end": 148, + "source_file": "00-80T-80.pdf" }, { - "text": "communication be to the public generally or to any person or class of persons) and \nfreedom from interference with his or her correspondence. \n\n(2) Nothing contained in or done under the authority of any law shall be held to \n\nbe inconsistent with or in contravention of this section to the extent that the law in \nquestion makes provision- \n\n(a) \n\nthat is reasonably required in the interests of defence, public safety, public \norder, public morality or public health; or \nthat is reasonably required for the purpose of protecting the reputations, rights \nand freedoms of other persons or the private lives of persons concerned in legal \nproceedings, preventing the disclosure of information received in confidence, \nmaintaining the authority and independence of the courts, regulating \neducational institutions in the interests of persons receiving instruction therein, \nor regulating the technical administration or the technical operation of \ntelephony, telegraphy, posts, wireless, broadcasting or television; or \nthat imposes restrictions upon public officers, employees of local government \nbodies, or teachers, \n\n(c) \n\nand except so far as that provision or, as the case may be, the thing done under the \nauthority thereof is shown not to be reasonably justifiable in a democratic society. \n**13. Protection of freedom of assembly and association**", - "page_start": 12, - "page_end": 12, - "source_file": "Botswana-constitution.pdf" + "text": "", + "page_start": 148, + "page_end": 148, + "source_file": "00-80T-80.pdf" }, { - "text": "(2) Nothing contained in or done under the authority of any law shall be held to \n\nbe inconsistent with or in contravention of this section to the extent that the law in \nquestion makes provision- \n\n(a) \n\nthat is reasonably required in the interests of defence, public safety, public \norder, public morality, public health, town and country planning, the \ndevelopment and utilization of mineral resources, for the purpose of any census \nor in order to secure the development or utilization of any property for a purpose \nbeneficial to the community; \nthat is reasonably required for the purpose of protecting the rights or freedoms \nof other persons; \nthat authorizes an officer or agent of the Government of Botswana, a local \ngovernment authority or a body corporate established by law for a public \npurpose to enter on the premises of any person in order to inspect those \npremises or anything thereon for the purpose of any tax, rate or duty or in order \nto carry out work connected with any property that is lawfully on those premises \nand that belongs to that Government, authority or body corporate, as the case \nmay be; or \nthat authorizes, for the purpose of enforcing the judgment or order of a court in \nany civil proceedings, the search of any person or property by order of a court \nor entry upon any premises by such order, \n\n(d) ", - "page_start": 9, - "page_end": 9, - "source_file": "Botswana-constitution.pdf" + "text": "", + "page_start": 10, + "page_end": 10, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "**3.2 User and group administration**\n\nWhen you design a Content Manager OnDemand system, you must determine the best way \nto implement the many authority structures that are available for users and administrators of \nyour system. The span of control for the administration of the system must be considered with \nthe level of user access to the data that is stored in the system. How many different \nadministrators are required? Will all administrators have system administrator authority or will \ndifferent administrators have different levels of authority? What is the most effective way to \nrestrict a user’s access to only the data that is necessary to do that user’s job? \n\nThe answers to these questions depend on the size of the system, the degree of \ncentralization to be exercised over system administration, and the nature of the data and the \nbusiness needs of the users. \n\n**Centralized or decentralized**\nIn a system design that exercises centralized control, one or a few administrators are granted \nsystem administrator authority. A centralized system typically is used when the number of \nreports and users to be added to the system is small. Centralized administration is also \nappropriate where resources are limited and only one person might have the skills and \nknowledge to perform the system administration tasks, or where one user group performs all \nof the administration tasks. ", - "page_start": 90, - "page_end": 90, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 148, + "page_end": 148, + "source_file": "00-80T-80.pdf" }, { - "text": "The contractor shall notify the contracting authority without delay of any legally binding \nrequest for disclosure of the personal data processed on behalf of the contracting authority \nmade by any national public authority, including an authority from a third country. The \ncontractor may not give such access without the prior written authorisation of the \ncontracting authority. \n\nThe duration of processing of personal data by the contractor will not exceed the period \nreferred to in Article II.24.2. Upon expiry of this period, the contractor shall, at the choice \nof the controller, return, without any undue delay in a commonly agreed format, all \npersonal data processed on behalf of the controller and the copies thereof or shall \neffectively delete all personal data unless Union or national law requires a longer storage \nof personal data. \n\nFor the purpose of Article II.10, if part or all of the processing of personal data is \nsubcontracted to a third party, the contractor shall pass on the obligations referred to in \nArticles I.9.2 and II.9.2 in writing to those parties, including subcontractors. At the request \nof the contracting authority, the contractor shall provide a document providing evidence of \nthis commitment. ", - "page_start": 22, - "page_end": 22, - "source_file": "EN-Draft FWC for services 0142.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "Responsibilities of the board include – \n• \nProviding input into and final approval of management’s development of corporate strategy and performance \nobjectives; \n\n• Monitoring senior executives’ performance and implementation of the Company’s strategy; \n• \n• Monitoring and the approval of financial and other reporting; \n• \n• \n• \n• \n• \n• \n\nApproving and monitoring the business plan, budget and corporate policies; \n\nEnsuring an effective system of internal controls exists and is functioning as required; \nEstablishing Sundance’s vision, mission, values and ethical standards as reflected in a Code of Conduct; \nDelegating an appropriate level of authority to management and approving any additional change to those delegations; \nEnsuring appropriate resources are available to senior executives; \nAppointment, succession, performance assessment, remuneration and dismissal of the Managing Director; \nReviewing, ratifying and monitoring systems of risk management and internal control, codes of conduct, and legal \ncompliance; and \nApproving and monitoring the progress of major capital expenditure, capital management, and acquisitions and \ndivestitures. \n• \n\nThe Board has delegated responsibility to the Managing Director (“MD”) and the executive management team to manage the \nday-to-day operations and administration of the Company. In carrying out this delegation, the MD, supported by the senior \nexecutives, routinely reports to the Board regarding Sundance’s progress on achieving both the short and long-term plans for \nthe Company. The MD is accountable to the Board for the authority that is delegated by the Board. ", - "page_start": 49, - "page_end": 49, - "source_file": "ASX_SEA_2014.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" } ] }, @@ -13555,70 +13555,70 @@ "target_page": 1, "target_passage": "LACTATION ROOM.—The term ‘lactation room’ means a hygienic place, other than a bathroom, that— ‘‘(A) is shielded from view; ‘‘(B) is free from intrusion; and ‘‘(C) contains a chair, a working surface, and, if the public building is otherwise supplied with electricity, an electrical outlet. ", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 154, + "page_end": 154, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 181, + "page_end": 181, + "source_file": "00-80T-80.pdf" }, { - "text": "‘‘(3) LACTATION ROOM.—The term ‘lactation room’ means \na hygienic place, other than a bathroom, that— \n\n‘‘(A) is shielded from view; \n‘‘(B) is free from intrusion; and \n‘‘(C) contains a chair, a working surface, and, if the \npublic building is otherwise supplied with electricity, an \nelectrical outlet. \n\n‘‘(b) LACTATION ROOM REQUIRED.—Except as provided in sub- \nsection (c), the appropriate authority of a covered public building \nshall ensure that the building contains a lactation room that is \nmade available for use by members of the public to express breast \nmilk. \n\n‘‘(c) EXCEPTIONS.—A covered public building may be excluded \nfrom the requirement in subsection (b) at the discretion of the \nappropriate authority if— \n‘‘(1) the public building— \n‘‘(A) does not contain a lactation room for employees \nwho work in the building; and \n\n‘‘(B) does not have a room that could be repurposed \nas a lactation room or a space that could be made private \nusing portable materials, at a reasonable cost; or ", - "page_start": 1, - "page_end": 1, - "source_file": "PLAW-116publ30.pdf" + "text": "", + "page_start": 182, + "page_end": 182, + "source_file": "00-80T-80.pdf" }, { - "text": "*Be it enacted by the Senate and House of Representatives of*\n*the United States of America in Congress assembled,*\n\nFairness For \nBreastfeeding \nMothers Act \nof 2019. \n40 USC 101 note. \n\n**SECTION 1. SHORT TITLE.**\n\nThis Act may be cited as the ‘‘Fairness For Breastfeeding \nMothers Act of 2019’’. \n\n**SEC. 2. LACTATION ROOM IN PUBLIC BUILDINGS.**\n\n(a) LACTATION ROOM IN PUBLIC BUILDINGS.—Chapter 33 of \ntitle 40, United States Code, is amended by adding at the end \nthe following new section: \n\n**‘‘§ 3318. Lactation room in public buildings** 40 USC 3318. \n\n‘‘(a) DEFINITIONS.—In this section: \n\n‘appropriate \nauthority’ means the head of a Federal agency, the Architect \nof the Capitol, or other official authority responsible for the \noperation of a public building. \n\n‘‘(1) APPROPRIATE AUTHORITY.—The term \n\n‘‘(2) COVERED PUBLIC BUILDING.—The term ‘covered public \nbuilding’ means a public building (as defined in section 3301) \nthat is open to the public and contains a public restroom, \nand includes a building listed in section 6301 or 5101. ", - "page_start": 1, - "page_end": 1, - "source_file": "PLAW-116publ30.pdf" + "text": "", + "page_start": 182, + "page_end": 182, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\nrequirements for ", - "page_start": 210, - "page_end": 210, + "text": "", + "page_start": 182, + "page_end": 182, "source_file": "00-80T-80.pdf" }, { - "text": "**2A.**—(1) Where the coronavirus exception applies, any requirement in any of the \nregulations specified in paragraph (3) for action to be taken within a specified period of \ntime or by a certain day is to be read instead as a requirement for such action to be taken as \nsoon as reasonably practicable. \n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person \nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or \ntransmission of coronavirus. \n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)— \n\n(a) regulation 15(1) and (4) (needs assessments which are not completed); \n\n(b) regulation 16(2), (3) and (4) (transfer of a kept EHC plan); \n\n(c) regulation 17(1) and (2) (restriction on disclosure of EHC plans); \n\n(d) regulation 19 (requirement to consider mediation); \n\n(e) regulation 20(1) and (2) (where the appropriate person does not wish to or fails to \n\npursue mediation); \n\n(f) regulation 21 (mediation); \n\n(g) regulation 24(1) and (3) (mediation certificate under section 55(5) of the Act); \n\n(h) regulation 27(3) (steps to be taken by a home authority); \n\n(i) regulation 29(2) and (6) (compliance with the orders of the First-tier Tribunal); and \n\n(j) regulation 30(3) and (6) (unopposed appeals).”. ", - "page_start": 4, - "page_end": 4, - "source_file": "uksi_20200471_en.pdf" + "text": "", + "page_start": 182, + "page_end": 182, + "source_file": "00-80T-80.pdf" }, { - "text": "(a) at the end of sub-paragraph (c) omit “or”; and \n(b) at the end of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**10.**In regulation 13(3) (timescales for EHC plans), for “(d)” substitute “(e)”. \n\n**11.**After regulation 18 (circumstances in which a local authority must review an EHC plan) \n\ninsert— \n\n“**Circumstances in which it is not necessary to review an EHC plan**\n\n**18A.**—(1) It is not necessary for a local authority to review an EHC plan in accordance \nwith section 44(1) of the Act if it is impractical to do so because of a reason relating to the \nincidence or transmission of coronavirus. \n\n(2) Where paragraph (1) applies, a local authority must instead conduct such reviews as \n\nsoon as reasonably practicable.”. \n\n**12.**In regulation 22 (amending an EHC plan following a review), after paragraph (5) insert— \n\n“(6) The local authority need not comply with the time limit referred to in paragraphs (3) \nand (4) if it is impractical to do so because of a reason relating to the incidence or \ntransmission of coronavirus.”. ", - "page_start": 3, - "page_end": 3, - "source_file": "uksi_20200471_en.pdf" + "text": "", + "page_start": 183, + "page_end": 183, + "source_file": "00-80T-80.pdf" }, { - "text": "this purpose; \n\n(b) if P complies with any reasonable requirements imposed by the person so authorised in \n\nrelation to the exercise, the visit to the person or attendance at the funeral. \n\n**Meaning of “place”**\n\n**14.**For the purposes of this Schedule the place referred to in paragraphs 8 to 13 means the room \nin the designated accommodation where P is staying and, if connected to the room where P is \nstaying, the room of any person referred to in paragraph 11(a) (travelling companion), including \nany balcony, and does not include the communal areas or any garden, yard, passage, stair, garage, \nouthouse or appurtenance of the accommodation in which the place is situated. \n\n**Designations**\n\n**15.**The Secretary of State must designate for the purposes of this Schedule— \n\n(a) accommodation; \n(b) transportation to the designated accommodation, \n\nand must publish details of the designations in such manner as appears to the Secretary of State to \nbe appropriate. \n\n**Duties where P is a child**\n\n**16.**If P is a child— \n\n(a) any person who has custody or charge of P when P is travelling to England must ensure, \nso far as is reasonably practicable, that P complies with the obligations in paragraphs 5 \nand 6; \n\n(b) any person who has custody or charge of P during P’s period of self-isolation must \nensure, so far as is reasonably practicable, that P self-isolates in accordance with this \nSchedule. ", - "page_start": 78, - "page_end": 78, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 183, + "page_end": 183, + "source_file": "00-80T-80.pdf" }, { - "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations make amendments to secondary legislation relating to special educational \nneeds and disability in order to provide exceptions to time limits set out in that legislation where \nthey cannot be met because of a reason relating to the incidence or transmission of coronavirus. \n\nRegulation 2 contains review and expiry provisions. The Secretary of State is required to review \nthe effectiveness of the Regulations during the period in which they have effect. The Regulations \ncease to have effect on 25th September 2020. \n\nRegulations 3 to 14 amend the Special Educational Needs and Disability Regulations 2014 (‘the \nSEND Regulations 2014’). \n\nRegulation 5 inserts a glossing provision into the SEND Regulations 2014 which relaxes certain \nrequirements in those Regulations for actions to be taken within specified time limits where it is \nnot reasonably practicable for a person to meet those requirements for a reason relating to the \nincidence or transmission of coronavirus. Instead, any such requirement is to be read as a \nrequirement for such action to be taken as soon as reasonably practicable. \n\nRegulations 6 to 14 make textual amendments to the SEND Regulations 2014 to relax time limits. ", - "page_start": 6, - "page_end": 6, - "source_file": "uksi_20200471_en.pdf" + "text": "", + "page_start": 183, + "page_end": 183, + "source_file": "00-80T-80.pdf" }, { - "text": "time or by a certain day is to be read instead as a requirement for such action to be taken as \nsoon as reasonably practicable. \n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person \nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or \ntransmission of coronavirus. \n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)— \n\n(a) regulation 15(2) (transfer of EHC plans) (in relation to the second reference to 15 \nworking days), (4), (5), (7) (in relation to the second reference to 15 working days) \nand (8); \n\n(b) regulation 16(2) and (3) (change of responsible commissioning body); \n\n(c) regulation 20(9) and (10) (review where the child or young person attends a school \n\nor other institution); \n\n(d) regulation 21(7), (8) and (9) (review of EHC plan where the child or young person \n\ndoes not attend a school or other institution); \n\n(e) regulation 25(1) (notification of decision whether it is necessary to re-assess ", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20200471_en.pdf" + "text": "", + "page_start": 183, + "page_end": 183, + "source_file": "00-80T-80.pdf" } ] }, @@ -13635,64 +13635,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 18, + "page_end": 18, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "*Be it enacted by the Senate and House of Representatives of*\n*the United States of America in Congress assembled,*\n\nFairness For \nBreastfeeding \nMothers Act \nof 2019. \n40 USC 101 note. \n\n**SECTION 1. SHORT TITLE.**\n\nThis Act may be cited as the ‘‘Fairness For Breastfeeding \nMothers Act of 2019’’. \n\n**SEC. 2. LACTATION ROOM IN PUBLIC BUILDINGS.**\n\n(a) LACTATION ROOM IN PUBLIC BUILDINGS.—Chapter 33 of \ntitle 40, United States Code, is amended by adding at the end \nthe following new section: \n\n**‘‘§ 3318. Lactation room in public buildings** 40 USC 3318. \n\n‘‘(a) DEFINITIONS.—In this section: \n\n‘appropriate \nauthority’ means the head of a Federal agency, the Architect \nof the Capitol, or other official authority responsible for the \noperation of a public building. \n\n‘‘(1) APPROPRIATE AUTHORITY.—The term \n\n‘‘(2) COVERED PUBLIC BUILDING.—The term ‘covered public \nbuilding’ means a public building (as defined in section 3301) \nthat is open to the public and contains a public restroom, \nand includes a building listed in section 6301 or 5101. ", - "page_start": 1, - "page_end": 1, - "source_file": "PLAW-116publ30.pdf" + "text": "", + "page_start": 16, + "page_end": 16, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "SMBC has surveyed approximately 1,000 \n\nfemale employees on their careers and \n\nmajor events in their lives. Role models \n\nhave been created based on 50 of these \n\nindividual interviews, and presented in \nsubsidies and other infrastructure needed \nsubsidies and other infrastructure needed \nthe form of book, which is distributed as a \nto provide and enable old-age care services. \nto provide and enable old-age care services. \nguide to individual women’s career paths \nIf the old-age dependency ratio continues to \nIf the old-age dependency ratio continues to \nand as a management aid for superiors in \nclimb, we expect the number of employees \nclimb, we expect the number of employees \nexecutive training. \nwith care responsibilities to increase. In light \nwith care responsibilities to increase. In light \n\n**Career development handbook**\n**for young mothers**\nof this, we have broadened the scope of \nof this, we have broadened the scope of \n\nour support program to achieve a sounder \nour support program to achieve a sounder \n\nSMBC has compiled a career development \n\nhandbook covering maternity leave for all \n\nwomen employees wishing to strike a \n**After**\nbetter balance between work and family \n\nlife. It provides pathways for mothers \n\npursuing careers, citing answers by \n\nwomen who have been through this \n\nexperience to questions such as “What do \n\nI need to do to return to work?” and “How \n\ndo I go about arranging nursery school?” \n\nIt also includes preparatory exercises for \n\nexpectant mothers and support lectures \n\non child-raising leave after they return to \n\nthe workplace. ", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_SMFG_2011.pdf" + "text": "", + "page_start": 14, + "page_end": 14, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "Amendments to the Manitoba Consumer Protection Act took effect in \nSeptember 2012 and parallel the changes to the Quebec Consumer \nProtection Act. Similar legislation also came into effect in September \n2012 in Newfoundland and Labrador and has been tabled in Nova \nScotia. A private member’s bill proposing similar legislation has been \nintroduced in New Brunswick. \n\nThe licences have conditions that require us, amongst other things, to \nthe applicable \ncomply with Canadian ownership restrictions of \nlegislation, and we are currently in compliance with them. If we violate \nthe requirements, we would be subject to various penalties and it could \ninclude losing a licence in extreme cases. \n\nIn April 2012, the Ontario government announced that it would be \nintroducing legislation addressing wireless bills and contracts. The \nlegislation seeks to ensure that contracts are written in plain language \nand spell out which services come with the basic fee and which would \nresult in a higher bill. It requires providers to obtain consent in writing \nbefore they renew or amend a contract. The legislation also seeks a cap \nthat would vary \non the cost of cancelling a fixed-term contract \ndepending on the circumstances of \nthe contract. The proposed \nlegislation, which would affect new contracts, would take effect six \nmonths after being passed and would also cover existing agreements \nthat are amended, renewed or extended after that date. The legislation \nwas passed into law in October 2013. ", - "page_start": 71, - "page_end": 71, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 13, + "page_end": 13, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "There are various conflicting definitions and mathematical models of fairness. These notions depend on \nethical assumptions, and are influenced by beliefs about society. One broad category is distributive \nfairness, which focuses on the outcomes, often identifying groups and seeking to compensate for \nstatistical disparities. Representational fairness tries to ensure that AI systems do not reinforce negative \nstereotypes or render certain groups invisible. Procedural fairness focuses on the decision process rather \nthan the outcome. The most relevant notions of fairness may depend on the context, notably the type of \nAI application and the stakeholders. The subjectivity in the notions of bias and fairness makes it difficult \nfor companies to operationalize them. Having access to sensitive attributes such as race or gender is also \nconsidered by many AI ethicists to be necessary in order to compensate for biases, but it may conflict \nwith anti-discrimination laws.[219] ", - "page_start": 16, - "page_end": 16, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "Worldwide, nearly 85% of women experience one or more pregnancies \nin their lifetime1, with 140 million women becoming pregnant each \nyear. Over an approximately 40-week gestational window, the maternal \nbody undergoes profound physiological adaptations to support the \ndevelopment of the fetus, including increases in plasma volume, meta- \nbolic rate, oxygen consumption and immune regulation2. These rapid \nadaptations are initiated by 100-fold to 1,000-fold increases in hormone \nproduction, including estrogen and progesterone. These neuromodu- \nlatory hormones also drive significant reorganization of the central \nnervous system. Evidence from animal models and human studies con- \nverge on pregnancy as a period of remarkable neuroplasticity3–10 (see \nref. 10 for one of the earliest known observations). Gestational increases \nin steroid hormone synthesis drive neurogenesis, dendritic spine \ngrowth, microglial proliferation, myelination and astrocyte remodeling \n(for review, see ref. 11). These cellular changes are pronounced in brain \ncircuits that promote maternal behavior. For example, Ammari et al. \nrecently discovered that steroid hormones can fine-tune the response \nproperties of galanin neurons in the rodent medial preoptic area of \nthe hypothalamus (mPOA), leading to enhanced sensitivity in dams \nto sensory cues from newborn pups12. ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed4.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "**RISKS DUE TO LEGAL AND REGULATORY FACTORS**\n\n**We are subject to certain laws, litigation, regulatory matters and ethical standards, and our failure to comply with or adequately**\n**address developments as they arise could adversely affect our reputation and operations.**\nOur policies, procedures and practices and the technology we implement are designed to comply with federal, state, local and foreign laws, \nrules and regulations, including those imposed by the SEC and other regulatory agencies, the marketplace, the banking industry and foreign \ncountries, as well as responsible business, social and environmental practices, all of which may change from time to time. Significant \nlegislative changes, including those that relate to employment matters and health care reform, could impact our relationship with our \nworkforce, which could increase our expenses and adversely affect our operations. In addition, if we fail to comply with applicable laws and \nregulations or implement responsible business, social, environmental and supply chain practices, we could be subject to damage to our \nreputation, class action lawsuits, legal and settlement costs, civil and criminal liability, increased cost of regulatory compliance, restatements \nof our financial statements, disruption of our business and loss of customers. Any required changes to our employment practices could result \nin the loss of employees, reduced sales, increased employment costs, low employee morale and harm to our business and results of \noperations. In addition, political and economic factors could lead to unfavorable changes in federal, state and foreign tax laws, which may \nincrease our tax liabilities. An increase in our tax liabilities could adversely affect our results of operations. We are also regularly involved in \nvarious litigation matters that arise in the ordinary course of business. Litigation or regulatory developments could adversely affect our \nbusiness and financial condition. ", - "page_start": 21, - "page_end": 21, - "source_file": "NYSE_JWN_2014.pdf" + "text": "", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "*Consumer Laws and Regulations*\n\nWe are also subject to certain consumer laws and regulations that are designed to protect consumers in \ntransactions with banks. While the following list is not exhaustive, these laws and regulations include the Truth in \nLending Act, the Truth in Savings Act, the Electronic Funds Transfer Act, the Expedited Funds Availability Act, the \nEqual Credit Opportunity Act, and the Fair Housing Act, among others. These laws and regulations among other \nthings prohibit discrimination on the basis of race, gender or other designated characteristics and mandate various \ndisclosure requirements and regulate the manner in which financial institutions must deal with customers when \ntaking deposits or making loans to such customers. These and other laws also limit finance charges or other fees or \ncharges earned in our activities. We must comply with the applicable provisions of these consumer protection laws \nand regulations as part of our ongoing customer relations. \n\n*Technology Risk Management and Consumer Privacy*\n\nState and federal banking regulators have issued various policy statements emphasizing the importance of \ntechnology risk management and supervision in evaluating the safety and soundness of depository institutions with \nrespect to banks that contract with outside vendors to provide data processing and core banking functions. The use \nof technology-related products, services, delivery channels and processes expose a bank to various risks, particularly \noperational, privacy, security, strategic, reputation and compliance risk. Banks are generally expected to prudently \nmanage technology-related risks as part of their comprehensive risk management policies by identifying, measuring, \nmonitoring and controlling risks associated with the use of technology. ", - "page_start": 38, - "page_end": 38, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 10, + "page_end": 10, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "In humans, reductions in gray matter volume (GMV) have \nbeen observed postpartum13–16, particularly in regions central to \ntheory-of-mind processing13. These GMV changes persist at 6 years \npostpartum17 and are traceable decades later18,19, underscoring the \npermanence of this major remodeling event. And yet the changes that \noccur within the maternal brain during gestation itself are virtually \nunknown (see ref. 20 for early neuroimaging insight). A recent study by \nPaternina-Die et al. offers intriguing clues21. Women were scanned once \nin the third trimester and again in the postpartum period, revealing a \nreduction of cortical volume observable in the late pregnancy scan. \nThese findings suggest that pregnancy is a highly dynamic period for \nneural remodeling, yet neuroscientists lack a detailed map of how the \nhuman brain changes throughout the gestational period. \n\nHere we conducted a precision imaging study of pregnancy in \nwhich a healthy 38-year-old primiparous woman underwent 26 mag- \nnetic resonance imaging (MRI) scans and venipuncture beginning \n3 weeks preconception through 2 years postpartum. We observed \nwidespread reductions in cortical GMV and cortical thickness (CT) \noccurring in step with advancing gestational week and the dramatic \nrise in sex hormone production. Remodeling was also evident within ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed4.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_CHK_2010.pdf" } ] }, @@ -13703,70 +13703,70 @@ "target_page": 3, "target_passage": " It is not necessary for a local authority to review an EHC plan in accordance with section 44(1) of the Act if it is impractical to do so because of a reason relating to the incidence or transmission of coronavirus. ", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 115, + "page_end": 115, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 99, + "page_end": 99, + "source_file": "00-80T-80.pdf" }, { - "text": "(a) at the end of sub-paragraph (c) omit “or”; and \n(b) at the end of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**10.**In regulation 13(3) (timescales for EHC plans), for “(d)” substitute “(e)”. \n\n**11.**After regulation 18 (circumstances in which a local authority must review an EHC plan) \n\ninsert— \n\n“**Circumstances in which it is not necessary to review an EHC plan**\n\n**18A.**—(1) It is not necessary for a local authority to review an EHC plan in accordance \nwith section 44(1) of the Act if it is impractical to do so because of a reason relating to the \nincidence or transmission of coronavirus. \n\n(2) Where paragraph (1) applies, a local authority must instead conduct such reviews as \n\nsoon as reasonably practicable.”. \n\n**12.**In regulation 22 (amending an EHC plan following a review), after paragraph (5) insert— \n\n“(6) The local authority need not comply with the time limit referred to in paragraphs (3) \nand (4) if it is impractical to do so because of a reason relating to the incidence or \ntransmission of coronavirus.”. ", - "page_start": 3, - "page_end": 3, - "source_file": "uksi_20200471_en.pdf" + "text": "", + "page_start": 100, + "page_end": 100, + "source_file": "00-80T-80.pdf" }, { - "text": "time or by a certain day is to be read instead as a requirement for such action to be taken as \nsoon as reasonably practicable. \n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person \nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or \ntransmission of coronavirus. \n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)— \n\n(a) regulation 15(2) (transfer of EHC plans) (in relation to the second reference to 15 \nworking days), (4), (5), (7) (in relation to the second reference to 15 working days) \nand (8); \n\n(b) regulation 16(2) and (3) (change of responsible commissioning body); \n\n(c) regulation 20(9) and (10) (review where the child or young person attends a school \n\nor other institution); \n\n(d) regulation 21(7), (8) and (9) (review of EHC plan where the child or young person \n\ndoes not attend a school or other institution); \n\n(e) regulation 25(1) (notification of decision whether it is necessary to re-assess ", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20200471_en.pdf" + "text": "", + "page_start": 24, + "page_end": 24, + "source_file": "00-80T-80.pdf" }, { - "text": "**6.**In regulation 4 (determination whether or not special educational provision may be \n\nnecessary), after paragraph (2) insert— \n\n“(3) The local authority need not comply with the time limit referred to in paragraph (1) if \nit is impractical to do so because of a reason relating to the incidence or transmission of \ncoronavirus.”. \n\n**7.**In regulation 5(4) (decision whether or not to conduct an EHC needs assessment)— \n\n(a) at the end of sub-paragraph (c) omit “or”; and \n(b) at the end of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**8.**In regulation 8(2) (duty to co-operate in EHC needs assessments)— \n\n(a) at the end of sub-paragraph (b) omit “or”; and \n(b) at the end of sub-paragraph (c) insert— \n\n“; or \n\n(d) of a reason relating to the incidence or transmission of coronavirus”. \n\n**9.**In regulation 10(4) (decision not to secure an EHC plan)— \n\n2 ", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20200471_en.pdf" + "text": "", + "page_start": 100, + "page_end": 100, + "source_file": "00-80T-80.pdf" }, { - "text": "The Commission invites the European Parliament and the Council to endorse this \nstrategy ahead of the 15th Conference of the Parties to the Convention on Biological \nDiversity. To ensure full political ownership of this strategy, the Commission will \nsuggest a standing progress point at the Council and at the European Parliament. It will \nreview the strategy by 2024 to assess progress and whether further action is needed to \nmeet its objectives. ", - "page_start": 23, - "page_end": 23, - "source_file": "legal5_eubiodiversity_cc4.pdf" + "text": "", + "page_start": 99, + "page_end": 99, + "source_file": "00-80T-80.pdf" }, { - "text": "**23.**In regulation 8(2) (duty to co-operate in a detained person’s EHC needs assessment), at the \n\nend of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**24.**In regulation 10(4) (decision not to secure an EHC plan)— \n\n(a) at the end of sub-paragraph (b) omit “or”; and \n(b) at the end of sub-paragraph (c) insert— \n\n“; or \n\n(d) of a reason relating to the incidence or transmission of coronavirus”. \n\n**25.**In regulation 13(3) (timescales for EHC plans), for “(c)” substitute “(d)”. \n\n**26.**In regulation 29 (compliance with the orders of the First-tier Tribunal)— \n\n(a) after paragraph (6) insert— \n\n“(6A) The home authority need not comply with the time limits specified in paragraph (3) \nif it is impractical to do so because the circumstances referred to in regulation 10(4)(d) \napply.”. \n\n(b) in paragraph (7)(c) after “10(4)(a)” insert “or (d)”. ", - "page_start": 5, - "page_end": 5, - "source_file": "uksi_20200471_en.pdf" + "text": "", + "page_start": 99, + "page_end": 99, + "source_file": "00-80T-80.pdf" }, { - "text": "E M P L O Y E E R E T I R E M E N T A N D B E N E F I T P L A N S 11 \n\nA noncontributory defined benefit retirement plan is maintained for all regular employees of the Company except those of Quest Medical. This plan was \namended effective January 1, 1998 to become a cash balance pension plan. The Company’s funding policy is to make the annual contributions required by \napplicable regulations and recommended by its actuary. The Company uses a December 31 measurement date for the plan. \n\n| thousands): | |\n|---|---|\n| 2003 | |\n| $ 4,170 214 298 —- 529 (333) | $ 4,599 320 307 (616) (93) (347) |\n| $ 4,878 | $ 4,170 |\n| | |\n\n\nIn December 2002, the plan was amended to reduce benefit accruals for future service by plan participants by approximately 50 percent. This amendment \ncaused a reduction in the PBO of approximately $616,000, and is reflected as a reduction in pension expense over the estimated employee service lives. \n\nThe changes in the fair value of plan assets, funded status of the plan and the status of the prepaid pension benefit recognized, which is included in the \nCompany’s balance sheets as of December 31, 2003 and 2002 are as follows (in thousands): \n\n| 2003 | |\n|---|---|\n| 2003 | |\n| $ 4,383 963 400 (333) | $ 4,550 (750) 930 (347) |\n| $ 5,413 | $ 4,383 |\n| $ 535 1,941 (502) (88) | $ 213 2,154 (539) (132) |\n| $ 1,886 | $ 1,696 |\n| | |\n", - "page_start": 22, - "page_end": 22, - "source_file": "NASDAQ_ATRI_2003.pdf" + "text": "", + "page_start": 99, + "page_end": 99, + "source_file": "00-80T-80.pdf" }, { - "text": "With this strategy, the Commission proposes ambitious commitments for the EU to bring \nto the table. The EU should also support governments and stakeholders across the globe \nto significantly step up their ambition and their action. \n\nThe Commission proposes that the EU ensures that the post-2020 global framework \nincludes, at a minimum, the elements outlined below: \n\n Overarching global goals for biodiversity for 2050, in line with the United \nNations 2030 Agenda for Sustainable Development and the vision of ‘living in \nharmony with nature’. The ambition should be that,**by 2050, all of the world’s**\n**ecosystems are restored, resilient, and adequately protected.**The world \nshould commit to the net-gain principle to give nature back more than it takes. \nThe world should commit to no human-induced extinction of species, at \nminimum where avoidable. \n\n Ambitious**global 2030 targets in line with EU commitments**in this strategy. \nThese should clearly address the drivers of biodiversity loss and be specific, \nmeasurable, actionable, relevant and time-bound. \n\n A much**stronger implementation, monitoring and review**process. Parties \nshould revise their National Biodiversity Strategies and Action Plans by the end \nof 2021, or as a minimum, submit national commitments for the most important \ntargets. There should be a**regular review cycle**to look at progress towards the ", - "page_start": 20, - "page_end": 20, - "source_file": "legal5_eubiodiversity_cc4.pdf" + "text": "", + "page_start": 99, + "page_end": 99, + "source_file": "00-80T-80.pdf" }, { - "text": "**3. ENABLING TRANSFORMATIVE CHANGE**\n\n**3.1. A new governance framework**\n\nIn the EU, there is currently no comprehensive governance framework to steer the \nimplementation of biodiversity commitments agreed at national, European or \ninternational level. To address the gap, the Commission will put in place**a new**\n**European biodiversity governance framework**. This will help map obligations and \ncommitments and set out a roadmap to guide their implementation. \n\nAs part of this new framework, the Commission will put in place a monitoring and \nreview mechanism. This will include a**clear set of agreed indicators**and will enable \nregular progress assessment and set out corrective action if necessary. This mechanism \nwill feed the Environmental Implementation Review and contribute to the European \nSemester. \n\nThe new governance framework will ensure co-responsibility and co-ownership by all \nrelevant actors in meeting the EU’s biodiversity commitments. It will support \nadministrative capacity building, transparency, stakeholder dialogue, and participatory \ngovernance at different levels. \n\nThe Commission will assess the progress and suitability of this approach in 2023, and \nconsider whether a legally binding approach to governance is needed. \n\n**3.2.**\n\n**Stepping up**\n**environmental legislation**\n\n**implementation and enforcement of EU**\n\nAll environmental legislation relies on proper implementation and enforcement. Over the \nlast 30 years, the EU has put in place a solid legislative framework to protect and restore \nits natural capital. However, recent evaluations show that although legislation is fit for \npurpose, implementation on the ground is lagging behind60. This is having dramatic \nconsequences on biodiversity and comes with a substantial economic cost61.**The full**\n**implementation and enforcement of EU environmental legislation is therefore at the**\n**heart of this strategy**, for which political support and financial and human resources \nwill need to be prioritised. ", - "page_start": 16, - "page_end": 16, - "source_file": "legal5_eubiodiversity_cc4.pdf" + "text": "", + "page_start": 100, + "page_end": 100, + "source_file": "00-80T-80.pdf" } ] }, @@ -13783,64 +13783,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 405, + "page_end": 405, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": "**Availability**\n\nThe information in this article is applicable to the following versions of Excel. \n\nExcel for Windows Version 2408 and later. \n\nExcel for Mac Version 16.89 and later. \n\nExcel for iOS Version 2.89 and later. \n\nExcel for Android Build 16.0.18025.XXXXX or later. ", - "page_start": 48, - "page_end": 48, - "source_file": "office-pdf.pdf" + "text": "", + "page_start": 21, + "page_end": 21, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": "| Microsoft Excel will allow long cell entries to spill\nacross to other adjacent cells to the right as long\nas those cells are empty. If those cells contain\ndata the spill-over will be chopped off. If you need | | to place long text entries in a cell you can arrange\nfor Microsoft Excel to wrap the text within the cell\nand also merge that cell with others to\naccommodate the longer text entry. |\n|---|---|---|\n| Microsoft Excel will allow long cell entries to spill across to other adjacent cells to the right as long as those cells are empty. If those cells contain data the spill-over will be chopped off. If you need | | to place long text entries in a cell you can arrange for Microsoft Excel to wrap the text within the cell and also merge that cell with others to accommodate the longer text entry. |\n| | | |\n", - "page_start": 26, - "page_end": 26, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 21, + "page_end": 21, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": " \n \n \n\nA worksheet (or page) in a workbook contains 16,384***columns***that are labelled using letters of \nthe alphabet. The first column in a worksheet is labelled column***A***, while the last is labelled***XFD***\n\nA worksheet (or page) in a workbook contains 1,048,576***rows***that are labelled using numbers \nfrom 1 to 1,048,576 \n\nWhere a column and row intersect we get what is known as a***cell***. You enter your data into \nthese cells. Each cell in a worksheet can hold up to 32,767 characters – although it would be \nunrealistic to ever push it this far. Cells are referred to by their column and row labels. For \nexample, in the screen above the cell we are pointing to is***C11***– this reference is known as the \n***cell address***and is most important as it is frequently used in commands and formulas \n\n \n\nWhen you start typing something, you want it to appear somewhere in the worksheet. As a \nconsequence when the Status Bar shows***Ready***mode, at least one cell in the worksheet will be \nhighlighted – this is known as the***active cell***. In the screen above, the active cell is cell***A1***– \nnotice that the column label and the row label also appears coloured to indicate the active cell. \nYou can have more than one active cell – when this occurs you have what is known as a***range***", - "page_start": 5, - "page_end": 5, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 21, + "page_end": 21, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "\n\ncell ", - "page_start": 15, - "page_end": 15, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 21, + "page_end": 21, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": "**Chart Sheets**\n\nIf you want to keep your \nchart separate from the data \nyou can move the chart to \nits own sheet. Chart sheets \nmake it easier and more \nconvenient to work with your \nchart because you’ll see \nmore of it on the screen – \nsince the data is not there! ", - "page_start": 44, - "page_end": 44, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 21, + "page_end": 21, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": "Enable the SMS notification in the app. When one or more SMS messages are received on the \nmobile phone, the watch will receive one or more SMS reminders at the same time. \n1.5.3. Other application message notifications: \nTurn on the corresponding application message notification in the app, such as WeChat, QQ, \nOutlook, Facebook and other applications. When the mobile phone receives one/multiple \napplication message notifications, the watch will receive one/multiple corresponding message \nreminders at the same time. \n\n**1.6 Frequently used contacts**\n\nThe watch binds to the app, and you allow the watch to access to the phone book of your mobile \nphone, then you can synchronize you contacts of your mobile phone to the smartwatch. \n\n**1.7 Fitness data**\n\nFitness data is turned on by default. When you enter the fitness data interface, scroll up the \nscreen, the smartwatch will display the current data of steps, distance, and calories. The data will \nbe wiped out at 00:00 every day in the morning. \n\n**1.8 Sports modes**(walking, running, cycling, rope skipping, badminton, \n\nbasketball, football) \n\n1.8.1 Select the corresponding exercise mode, click the “Start” button on the screen to start the \nexercise; click the “Start” button again to pause the recording of the exercise; click the “End” \nbutton to end the recording, and save to the data. \n1.8.2 The data can only be saved when the recording of the exercise is more than 1 minute; If the \nrecording time is less than 1 minute, the smartwatch will remind you that the data is too little to be \nsaved. ", - "page_start": 4, - "page_end": 4, - "source_file": "6126797.pdf" + "text": "", + "page_start": 230, + "page_end": 230, + "source_file": "00-80T-80.pdf" }, { - "text": "**For Your Reference…**\nTo***enter a formula***: \n\n1. Click the cell pointer on the desired cell and \ntype the formula commencing with**=**\n\n2. Press \n\n, an arrow key or \nconfirm the data entry and to move the cell \npointer to another cell \n\n to ", - "page_start": 8, - "page_end": 8, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 230, + "page_end": 230, + "source_file": "00-80T-80.pdf" }, { - "text": "BARSKA warrants your micrscope to be free from defects in materials and workmanship for one (1) year. \nBARSKA will repair or replace such product or part thereof which, upon inspection by BARSKA, is found to be \ndefective in materials or workmanship. As a condition to the obligation of BARSKA to repair or replace such \nproduct, the product must be returned to BARSKA together with proof-of-purchase satisfactory to BARSKA. \n\nThe Proper Return Merchandise Authorization Number (RMA) must be obtained from BARSKA in advance of \nreturn. Call BARSKA at (909) 445-8168 to receive the number to be displayed on the outside of your shipping \ncontainer. \n\n**MICROSCOPE**\n**USER MANUAL**\n\nAll returns must be accompanied by a written statement setting forth the name, address, and daytime telephone \nnumber of the owner, together with a brief description of any claimed defects. Parts or product for which \nreplacement is made shall become the property of BARSKA. \n\nThe customer shall be responsible for all costs of transportation and insurance, both to and from BARSKA, and \nshall be required to prepay such costs. \n\nBARSKA shall use reasonable efforts to repair or replace any microscope covered by this warranty within thirty \ndays of receipt. In the event repair or replacement shall require more than thirty days, BARSKA shall notify the \ncustomer accordingly. BARSKA reserves the right to replace any product which has been discontinued from its \nproduct line with a new product of comparable value and function. ", - "page_start": 1, - "page_end": 1, - "source_file": "Microscope Manual.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_RCI_2013.pdf" } ] }, @@ -13851,70 +13851,70 @@ "target_page": 12, "target_passage": "To rename a worksheet: 1. Double click on the current name on the worksheet tab 2. Type the new name and press ", "chunk_present": { - "presence": true, - "index": 6 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "\n\nrename the other worksheets: ", - "page_start": 12, - "page_end": 12, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "**Handy to Know…**\n You can rename a worksheet by \n\nright-clicking on the worksheet tab to display \nthe shortcut menu and clicking on***Rename***. \n\n A worksheet tab name can contain up to 31 \n\ncharacters including spaces, but it is better to \nkeep it short and succinct. ", - "page_start": 12, - "page_end": 12, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "**For Your Reference…**\nTo***group worksheet tabs***: \n\n1. Click on the first worksheet tab \n2. Hold down , then click on the last \n\nworksheet tab ", - "page_start": 15, - "page_end": 15, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "\n\nworksheet tab ", - "page_start": 56, - "page_end": 56, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "**For Your Reference…**\nTo***rename***a***worksheet***: \n\n1. Double click on the current name on the \nworksheet tab \n\n 2. Type the new name and press ", - "page_start": 12, - "page_end": 12, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": " \n\nA workbook (as you would expect) is made up of pages known as***worksheets***. You can have as \nmany sheets in a workbook as your computer resources can accommodate. As a default, a new \nblank workbook normally has 3 worksheets labelled*Sheet1*,*Sheet2*, and*Sheet3*. Of course \nthese labels are pretty boring and meaningless and can be changed to something more relevant \n\n \nThe***Insert Worksheet***button here will insert another worksheet into the current workbook \nshould you need it ", - "page_start": 5, - "page_end": 5, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "**Handy to Know…**\n To deselect a group, either click on the tab of \na worksheet that is not in the group, or right- \nclick on a tab and select**Ungroup Sheets**. \n\n Most formatting and text changes done on a \nworksheet in a group will be applied to other \nsheets in that grouping. ", - "page_start": 15, - "page_end": 15, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "**Handy to Know…**\n To insert a worksheet between existing \n\nworksheets, right-click on the worksheet tab \nbefore which you want to insert a new sheet, \nthen click on***Insert***to display the***Insert***\ndialog box. Select***Worksheet***and click on \n**[OK]**. ", - "page_start": 10, - "page_end": 10, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" } ] }, @@ -13931,64 +13931,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 203, + "page_end": 203, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 58, + "page_end": 58, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": " \n\nA workbook (as you would expect) is made up of pages known as***worksheets***. You can have as \nmany sheets in a workbook as your computer resources can accommodate. As a default, a new \nblank workbook normally has 3 worksheets labelled*Sheet1*,*Sheet2*, and*Sheet3*. Of course \nthese labels are pretty boring and meaningless and can be changed to something more relevant \n\n \nThe***Insert Worksheet***button here will insert another worksheet into the current workbook \nshould you need it ", - "page_start": 5, - "page_end": 5, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0764.pdf" }, { - "text": "\n\nworksheet tab ", - "page_start": 56, - "page_end": 56, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 262, + "page_end": 262, + "source_file": "00-80T-80.pdf" }, { - "text": "**For Your Reference…**\nTo***group worksheet tabs***: \n\n1. Click on the first worksheet tab \n2. Hold down , then click on the last \n\nworksheet tab ", - "page_start": 15, - "page_end": 15, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 62, + "page_end": 62, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "**Embedded Charts**\n\nCharts that appear within a \nworksheet are known as \nembedded charts. A chart is \nreally an object that sits on \ntop of the worksheet – unlike \nnumbers and letters, charts \nare not actually placed into \nworksheet cells. ", - "page_start": 44, - "page_end": 44, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 262, + "page_end": 262, + "source_file": "00-80T-80.pdf" }, { - "text": "**For Your Reference…**\nTo***freeze panes***in a***worksheet***: \n\n1. Click in the cell below and to the right of the \narea you want to freeze/unfreeze \n\n2. Click on the***VIEW***tab \n3. Click on***Freeze Panes***in the***Window***\ngroup, then select**Freeze Panes**", - "page_start": 16, - "page_end": 16, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 61, + "page_end": 61, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "**Handy to Know…**\n To insert a worksheet between existing \n\nworksheets, right-click on the worksheet tab \nbefore which you want to insert a new sheet, \nthen click on***Insert***to display the***Insert***\ndialog box. Select***Worksheet***and click on \n**[OK]**. ", - "page_start": 10, - "page_end": 10, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 61, + "page_end": 61, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "**Handy to Know…**\n To deselect a group, either click on the tab of \na worksheet that is not in the group, or right- \nclick on a tab and select**Ungroup Sheets**. \n\n Most formatting and text changes done on a \nworksheet in a group will be applied to other \nsheets in that grouping. ", - "page_start": 15, - "page_end": 15, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 262, + "page_end": 262, + "source_file": "00-80T-80.pdf" }, { - "text": "**Handy to Know…**\n You can rename a worksheet by \n\nright-clicking on the worksheet tab to display \nthe shortcut menu and clicking on***Rename***. \n\n A worksheet tab name can contain up to 31 \n\ncharacters including spaces, but it is better to \nkeep it short and succinct. ", - "page_start": 12, - "page_end": 12, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 61, + "page_end": 61, + "source_file": "OTC_NSANY_2004.pdf" } ] }, @@ -13999,70 +13999,70 @@ "target_page": 21, "target_passage": "A group of nodes forming a single flow of text that should be read or searched as a contiguous block of content. Some documents have a single article and others have multiple articles.", "chunk_present": { - "presence": true, - "index": 6 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 307, + "page_end": 307, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 126, + "page_end": 126, + "source_file": "00-80T-80.pdf" }, { - "text": "msodocexStructTypeChart \n\nmsodocexStructTypeDiagram \n\nmsodocexStructTypeBulletText \n\nmsodocexStructTypeTextLine \n\nmsodocexStructTypeDropCap \n\nmsodocexStructTypeSection \n\nmsodocexStructTypeAnnotationBegin \n\nmsodocexStructTypeAnnotationEnd ", - "page_start": 22, - "page_end": 22, - "source_file": "office-pdf.pdf" + "text": "", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "**Type Value** **Description**\n\nmsodocexStructTypeTOC A table of contents. \n\nmsodocexStructTypeTOCI An item in a table of contents. \n\nmsodocexStructTypeExtLink A link to an external resource. \n\nmsodocexStructTypeIntLink A link to an internal resource. \n\nmsodocexStructTypeFootnote A footnote. \n\nmsodocexStructTypeEndnote An endnote. \n\nmsodocexStructTypeTextbox A text box. \n\nmsodocexStructTypeHeader A block of text forming a header. \n\nmsodocexStructTypeFooter A footer. \n\nmsodocexStructInlineShape An inline shape. \n\nmsodocexStructAnnotation An annotation. \n\nmsodocexStructTypeSpanBlock A block of text. \n\nmsodocexStructTypeWorkbook A workbook. \n\nmsodocexStructTypeWorksheet A worksheet. \n\nmsodocexStructTypeMacrosheet A macrosheet. \n\nmsodocexStructTypeChartsheet A chartsheet. \n\nmsodocexStructTypeDialogsheet A dialogsheet. \n\nmsodocexStructTypeSlide A slide. \n\nA chart. \n\nA SmartArt diagram. \n\nBuller text. \n\nA line of text. \n\nA drop cap. \n\nA section. \n\nThe beginning of an annotation. \n\nThe end of an annotation. ", - "page_start": 22, - "page_end": 22, - "source_file": "office-pdf.pdf" + "text": "", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "**Type Value** **Description**\n\nmsodocexStructTypeParaRTLAttr \n\nA block of text within an article with right-to-left \nlayout. \n\nmsodocexStructTypeTableRTLAttr A block of text forming a table with right-to-left \n\nlayout. \n\nmsodocexStructTypeHeadingRTLAttr A heading in the text with right-to-left layout. \n\nmsodocexStructTypeListItemRTLAttr \n\nA block of text forming a list item with right-to-left \nlayout. \n\nmsodocexStructTypeParaUnannotatableAttr A block of text within an article that is not \n\nannotatable. \n\nmsodocexStructTypeTHead The header row area in a table. \n\nmsodocexStructTypeTBody The body area in a table, i.e. the portion between \n\nthe THead and TFoot. \n\nmsodocexStructTypeLabel A label. \n\nmsodocexStructTypeEquation An equation. \n\nmsodocexStructTypeIntLinkNoteRef A footnote or endnote reference mark link. \n\nmsodocexStructTypeTFoot The footer row area in a table. ", - "page_start": 23, - "page_end": 23, - "source_file": "office-pdf.pdf" + "text": "", + "page_start": 126, + "page_end": 126, + "source_file": "00-80T-80.pdf" }, { - "text": "**shapeProperty**is for a msodocexStructTypeFigure where the content is a shape, \n\ntext box, or table cell and contains bit fields from the MSODOCEXSHAPEPROPERTY \n\nenumeration. \n\n**tableAttr**is the table cell attributes for a msodocexStructTypeTH or \n\nmsodocexStructTypeTD. \n\n**idTableHeader**is the unique id for an msodocexStructTypeTH or \n\nmsodocexStructTypeTD. \n\n**iTargetParentId**is the id of the node to reparent an msodocexStructTypeDiagram \n\nto. \n\nTable 3. Enumerated values of MSODOCEXLINEBREAKTYPE ", - "page_start": 10, - "page_end": 10, - "source_file": "office-pdf.pdf" + "text": "", + "page_start": 126, + "page_end": 126, + "source_file": "00-80T-80.pdf" }, { - "text": "**Type Value** **Description**\n\nmsodocexStructTypePara \n\nA block of text within an article. Its parent node \nmust be an article. \n\nmsodocexStructTypeFigure \n\nA graphical element (for example, an image or \ncollection of shapes) that has a textual \n\nrepresentation. The textual representation is the \nalternate text used for reading or searching the \n\ndocument. \n\nmsodocexStructTypeArticle \n\nA group of nodes forming a single flow of text that \nshould be read or searched as a contiguous block \n\nof content. Some documents have a single article \nand others have multiple articles. \n\nmsodocexStructTypeHeading A heading in the text. \n\nmsodocexStructTypeTable A block of text forming a table. \n\nmsodocexStructTypeTR A block of text forming a single row of a table. \n\nmsodocexStructTypeTD A block of text forming a single cell in a table row. \n\nmsodocexStructTypeTH A block of text forming a single header cell in a \n\ntable row. \n\nmsodocexStructTypeList A block of text forming a list. \n\nmsodocexStructTypeListItem A block of text forming a list item. ", - "page_start": 21, - "page_end": 21, - "source_file": "office-pdf.pdf" + "text": "", + "page_start": 126, + "page_end": 126, + "source_file": "00-80T-80.pdf" }, { - "text": "The**idNode**member specifies the ID of the node being passed in the call to \n\n**HrBeginStructNode**. This member may not have a value of**0**. A value of**-1**indicates that \n\nchild nodes do not use the*idNodeParent*parameter to specify this node as their parent. \n\nInstead, this node can be a parent only by enclosing child nodes in the EMF. Multiple \n\nnodes can have an ID of**-1**. If the ID is not**-1**, the value is unique across the document. \n\nThe embedded union at the end of the MSODOCEXSTRUCTNODE is interpreted \n\ndifferently depending on the type of node: \n\n**iHeadingLevel**is the heading level for an msodocexStructTypeHeading. \n\n**idPara**is the paragraph id for a P, TOCI, or ListBody. \n\n**idDropCap**is the id of an msodocexStructTypeDropCap. \n\n**iPage**is the page number for an msodocexStructTypePage. \n\n**bt**is the line break type for an msodocexStructTypeTextLine. \n\n**iListLevel**is the list level for an msodocexStructTypeList or \n\nmsodocexStructTypeListItem. \n\n**listType**is the list type for an msodocexStructTypeListItem. \n\n**idAtn**is the id of an msodocexStructTypeAnnotationBegin or \n\nmsodocexStructTypeAnnotationEnd. \n\n**cpLim**is used to determine the nesting order of tables within tables for an \n\nmsodocexStructTypeTable, msodocexStructTypeTOC, or \n\nmsodocexStructTypeListBody. ", - "page_start": 9, - "page_end": 9, - "source_file": "office-pdf.pdf" + "text": "", + "page_start": 36, + "page_end": 36, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "**Value** **Description**\n\nmsodocexListTypeNone No bullets or numbering. \n\nmsodocexListTypeBulletDisc Disc-shaped bullets. \n\nmsodocexListTypeBulletCircle Circle-shaped bullets. \n\nmsodocexListTypeBulletSquare Square-shaped bullets. \n\nmsodocexListTypeBulletDecimal Decimal numbering. \n\nmsodocexListTypeUpperRoman Uppercase Roman numeral numbering. \n\nmsodocexListTypeLowerRoman Lowercase Roman numberal numbering. \n\nmsodocexListTypeUpperAlpha Uppercase alphabetic numbering. \n\nmsodocexListTypeLowerAlpha Lowercase alphabetic numbering. ", - "page_start": 10, - "page_end": 10, - "source_file": "office-pdf.pdf" + "text": "", + "page_start": 126, + "page_end": 126, + "source_file": "00-80T-80.pdf" }, { - "text": "typedef struct_MsoDocexStructNode \n{ \n int idNode; \n MSODOCEXSTRUCTTYPE nodetype; \n WCHAR*pwchAltText; \n union \n { \n int iHeadingLevel; \n ULONG idPara; \n ULONG idDropCap; \n int iPage; \n WCHAR*pwchActualText; \n MSODOCEXLINEBREAKTYPE bt; \n int iListLevel; \n MSODOCEXLISTTYPE listType; \n ULONG idAtn; \n long cpLim; \n int shapeProperty; \n MsoDocexTableAttr tableAttr; \n WCHAR*idTableHeader; \n int iTargetParentId; \n }; \n} MSODOCEXSTRUCTNODE; ", - "page_start": 9, - "page_end": 9, - "source_file": "office-pdf.pdf" + "text": "", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_SMFG_2011.pdf" } ] }, @@ -14073,70 +14073,70 @@ "target_page": 29, "target_passage": "Vector colors are any COLORREF values that the add-in receives from Publisher.", "chunk_present": { - "presence": true, - "index": 4 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 421, + "page_end": 421, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "**Extended Color Support**\n\nTo support extended color spaces in Publisher, additional EMF semantic records and \n\ninterfaces are needed because EMF only supports RGB (red-green-black) colors. \n\nExtended color spaces include CMYK (cyan-magenta-yellow-black) and spot color space, \n\nwhich are commonly used in commercial printing. \n\nPublisher uses color mapping to represent extended colors in the document EMF. \n\nPublisher builds a color table for all colors used in the document and replaces actual \n\ncolors with color IDs in the EMF. The type for the color ID is**COLORREF**, which is the ", - "page_start": 28, - "page_end": 28, - "source_file": "office-pdf.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "| \u0007 | | |\n|---|---|---|\n| \u0007 | | |\n| | # Create AIF object | |\n| | | |\n| | aif = init_aif( | |\n| | A::Vector{Array{T, N}}, # A-matrices | |\n| | B::Vector{Array{T, N}}; # B-matrices | |\n| | C::Vector{Array{Real}}, # C-matrices (optional) | |\n| | D::Vector{Vector{Real}}, # D-matrices (optional) | |\n| | E::Vector{T}, # E-vector (optional) | |\n| | pA::Union{Vector{Array{T, N}}, Nothing}, # Dirichlet priors for A-matrices (optional) | |\n| | pB::Union{Vector{Array{T, N}}, Nothing}, # Dirichlet priors for B-matrices (optional) | |\n| | pD::Union{Vector{Array{Real}}, Nothing}, # Dirichlet priors for D-vectors (optional) | |\n| | parameters::Dict{String, Real}, # Dictionary containing other parameters (optional) | |\n| | settings::Dict{String, Any} # Dictionary containing settings (optional) | |\n| | ) | |\n| | | |\n", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed7_cc4.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "**Vector Color and Recolored Images**\n\nVector colors are any**COLORREF**values that the add-in receives from Publisher. For \n\nexample, text color, line stroke color, and color for metafile recolor. When color \n\nmapping is enabled, Publisher uses a color ID for**COLORREF**rather than a real RGB \n\ncolor value. If Publisher provides the add-in an**IMsoDocExporterSite**interface pointer \n\nby calling the**SetDocExporterSite**method of the**IMsoDocExporter**interface, the add-in \n\nshould always call the**IMsoDocExporterSite::HrResolveColor**method to convert the \n\n**COLORREF**to an extended color, which the add-in receives through the methods in the \n\n**IDOCEXCOLOR**interface. \n\nTo support vector color mapping, the add-in needs to do the following: \n\nImplement class support for an**IDOCEXCOLOR**interface. The methods in this \n\ninterface enable Publisher to pass extended color back to the add-in. \n\nCache the following color state values from the semantic records in the EMF. \n\nSet foreground color for recoloring. This is set through the \n\n**DocExComment_ColorInfo**structure. \n\nSet background color for recoloring. This is set through the \n\n**DocExComment_ColorInfo**structure. ", - "page_start": 29, - "page_end": 29, - "source_file": "office-pdf.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "Determine when color mapping is enabled. This is set through the \n\n**DocExComment_ColorEnable**structure. \n\nFor a vector color, create an**IDOCEXCOLOR**interface with the color ID, so that \n\n**IDOCEXCOLOR::GetUnresolvedRGB**returns the color ID. The add-in should call the \n\n**IMsoDocExporterSite::HrResolveColor**method with the**IDOCEXCOLOR**interface \n\nand cached color states. Publisher calls the**IDOCEXCOLOR**interface methods with \n\nthe final color, which can be RGB, CMYK, spot, or registration tint. ", - "page_start": 29, - "page_end": 29, - "source_file": "office-pdf.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "same type that is used for RGB color. For information about the COLORREF structure, \n\nsee COLORREF. \n\nTo resolve color IDs in the EMF back to the extend color space, the add-in calls back to \n\nPublisher through the**HrResolveColor**method of the**IMsoDocExporterSite**interface. \n\nThe add-in passes Publisher an interface pointer to an**IDOCEXCOLOR**interface as one \n\nof the parameters to**HrResolveColor**. Publisher takes the color IDs, also specified in the \n\ncall to**HrResolveColor**, converts them to extended color (RGB, CMYK, or spot color), and \n\npasses them back to the add-in through the methods in the**IDOCEXCOLOR**interface. ", - "page_start": 29, - "page_end": 29, - "source_file": "office-pdf.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "30 \n\n25 \n\n) \n. \ng \ne \nd \n( \n\n20 \n\n15 \n*x*\n*a*\n*m*\n*,*\n*z*\n10 \n*Q*\n\n5 \n\n0 \n0 40 \n*T*(K) \n\nFIG. 8: (color online) Qz, position of the maximum of S(~q), \nvs. temperature for thickness n = 8. Inset: magnetic vector \n(mx \nl ) profile for some temperatures for L = 64. Colors \nand symbols as in Fig. 2. FIG. 7: (color online) ∆ϕl(T ) vs. temperature for the surface \nplanes, l = 1 (triangles), l = 2 (squares), l = 3 (diamonds), \nl = 4 (circles). Straight lines and full symbols: n = 8. Dashed \nlines and open symbols: n = 16. \nl , my ", - "page_start": 6, - "page_end": 6, - "source_file": "1001.0510.pdf" + "text": "", + "page_start": 103, + "page_end": 103, + "source_file": "00-80T-80.pdf" }, { - "text": "**Color from EPS Files**\n\nEncapsulated Postscript (EPS) is a metafile type that supports extended color spaces. \n\nUser who embed EPS images in a Publisher document expect the color information to \n\nbe used in the fixed-format output. Inside Publisher, the EPS is converted to an EMF with \n\nEPS-related semantic records. This EMF is then embedded in the page EMF file that the \n\napplication passes to the add-in. \n\nTo support color in EPS files, the add-in needs to do the following: \n\nCall the**IMsoDocExporterSite::SetEPSInfo**method for**DocExComment_EPSColor**\n\nrecords encountered in the EMF. \n\nExtract the CMYK image from the**DocExComment_EPSColorCMYKJPEG**record in \n\nthe EMF. This record contains a binary object that is the actual CMYK JPEG file \n\nstream. Use it to replace the RGB image specified in the subsequent call to the \n\n**StretchDIBits**function. \n\nThe**DocExComment_EPSColorSpotImage**record provides spot color information \n\nfor the subsequent RGB image, which is always an index image. The add-in needs \n\nto convert the spot image to the target color space. \n\nThe add-in can optionally call the**IMsoDocExporterSite:: HrGetSpotRecolorInfo**\n\nmethod to obtain the document's target color from Publisher. Then the add-in can \n\nrecolor the subsequent RGB image by mapping colors from the palette of the RGB \n\nimage to**flTintMin**and**flTintMax**tints specified in the \n\n**DoxExComment_EPSColorSpotImage**record. The luminosity for each color of the \n\npalette is used for the mapping. ", - "page_start": 30, - "page_end": 30, - "source_file": "office-pdf.pdf" + "text": "", + "page_start": 250, + "page_end": 250, + "source_file": "00-80T-80.pdf" }, { - "text": "Figure 3 V-JEPA. Training operates on a video clip of T frames with spatial resolution H × W , flattened into a sequence \nof L tokens. (Left to right): We first obtain the input of the x-encoder by dropping tokens from the video clip. The \nx-encoder then processes the masked video sequence, and outputs an embedding vector for each input token. Next, the \noutputs of the x-encoder are concatenated with a set of learnable mask tokens containing positional embeddings of the masked \nspatio-temporal patches. The predictor network processes the combined token sequence, and outputs an embedding vector for \neach mask token. The outputs of the predictor are then regressed to the prediction targets using an L1 loss. The prediction \ntargets correspond to the output of the y-encoder. ", - "page_start": 4, - "page_end": 4, - "source_file": "arxiv3.pdf" + "text": "", + "page_start": 27, + "page_end": 27, + "source_file": "NYSE_CHK_2010.pdf" } ] }, @@ -14147,70 +14147,70 @@ "target_page": 35, "target_passage": "Miscellaneous comments relevant to the document.", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 22, + "page_end": 22, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 177, + "page_end": 177, + "source_file": "00-80T-80.pdf" }, { - "text": "**Value** **Description**\n\nmsodocexMetadataTitle The title of the document. \n\nmsodocexMetadataAuthor The author of the document \n\nmsodocexMetadataSubject \n\nString that describes the subject matter of the document (for \nexample, business or science). \n\nmsodocexMetadataKeywords Keyword relevant to the document content. \n\nmsodocexMetadataCreator The creator of the document, possibly distinct from the author. \n\nmsodocexMetadataProducer The producer of the document, possibly distinct from the author \n\nor creator. \n\nmsodocexMetadataCategory String that describes the type of document (for example, memo, \n\narticle, or book). \n\nmsodocexMetadataStatus Status of the document. This field can reflect where the \n\ndocument is in the publication process (for example, draft or \nfinal). \n\nmsodocexMetadataComments Miscellaneous comments relevant to the document. ", - "page_start": 35, - "page_end": 35, - "source_file": "office-pdf.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "The members of the**DocExComment_EndStructNode**structure are as follows: \n\n**ident**Specifies the constant value, msodocexsignature, which identifies this EMF \n\ncomment as containing semantic information. \n\n**iComment**Specifies the MSODOCEXCOMMENT value, \n\nmsodocexcommentEndStructNode. ", - "page_start": 24, - "page_end": 24, - "source_file": "office-pdf.pdf" + "text": "", + "page_start": 27, + "page_end": 27, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "The*metadatatype*parameter specifies the type of metadata represented by the string. \n\nThe*metadatatype*parameter must be one of the following values from the \n\nMSODOCEXMETADATA enumeration type. \n\nTable 8. Enumerated values of MSODOCEXMETADATA ", - "page_start": 35, - "page_end": 35, - "source_file": "office-pdf.pdf" + "text": "", + "page_start": 26, + "page_end": 26, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "", + "page_start": 176, + "page_end": 176, + "source_file": "00-80T-80.pdf" }, { - "text": "The*metadatatype*parameter specifies the type of metadata represented by the \n\n**FILETIME**structure. The*metadatatype*parameter must be one of the following values \n\nfrom the MSODOCEXMETADATA enumeration type. \n\nTable 9. Enumerated values of MSODOCEXMETADATA ", - "page_start": 36, - "page_end": 36, - "source_file": "office-pdf.pdf" + "text": "", + "page_start": 24, + "page_end": 24, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "The members of the**DocExComment_EPSColorCMYKJPEG**structure are as follows: \n\n**ident**Specifies the constant value, msodocexsignature, which identifies this EMF \n\ncomment as containing semantic information. \n\n**iComment**Specifies the MSODOCEXCOMMENT value, \n\nmsodocexcommentEPSCMYKJPEG; ", - "page_start": 27, - "page_end": 27, - "source_file": "office-pdf.pdf" + "text": "", + "page_start": 23, + "page_end": 23, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "msodocexStructTypeChart \n\nmsodocexStructTypeDiagram \n\nmsodocexStructTypeBulletText \n\nmsodocexStructTypeTextLine \n\nmsodocexStructTypeDropCap \n\nmsodocexStructTypeSection \n\nmsodocexStructTypeAnnotationBegin \n\nmsodocexStructTypeAnnotationEnd ", + "text": "", "page_start": 22, "page_end": 22, - "source_file": "office-pdf.pdf" - }, - { - "text": "**Comment Value** **Structure Type**\n\nmsodocexcommentExternalHyperlink DocExComment_ExternalHyperlink \n\nmsodocexcommentExternalHyperlinkRctfv DocExComment_ExternalHyperlink \n\nmsodocexcommentInternalHyperlink DocExComment_InternalHyperlink \n\nmsodocexcommentInternalHyperlinkRctfv DocExComment_InternalHyperlink \n\nmsodocexcommentColorInfo DocExComment_ColorInfo \n\nmsodocexcommentColorMapEnable DocExComment_ColorEnable \n\nmsodocexcommentBeginTextRun DocExComment_BeginTextRun \n\nmsodocexcommentBeginTextRunRTL DocExComment_BeginTextRun \n\nmsodocexcommentEndTextRun DocExComment_EndTextRun \n\nmsodocexcommentBeginStructNode DocExComment_BeginStructNode \n\nmsodocexcommentEndStructNode DocExComment_EndStructNode \n\nmsodocexcommentUnicodeForNextTextOut DocExComment_UnicodeForNextTextOut \n\nmsodocexcommentUnicodeForNextTextOutRTL DocExComment_UnicodeForNextTextOut \n\nmsodocexcommentEPSColor DocExComment_EPSColor \n\nmsodocexcommentEPSCMYKJPEG DocExComment_EPSColorCMYKJPEG \n\nDocExComment_EPSColorSpotImage \n\nDocExComment_EPSStart \n\nDocExComment_PageName \n\nDocExComment_Transparent ", - "page_start": 15, - "page_end": 15, - "source_file": "office-pdf.pdf" + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "**shapeProperty**is for a msodocexStructTypeFigure where the content is a shape, \n\ntext box, or table cell and contains bit fields from the MSODOCEXSHAPEPROPERTY \n\nenumeration. \n\n**tableAttr**is the table cell attributes for a msodocexStructTypeTH or \n\nmsodocexStructTypeTD. \n\n**idTableHeader**is the unique id for an msodocexStructTypeTH or \n\nmsodocexStructTypeTD. \n\n**iTargetParentId**is the id of the node to reparent an msodocexStructTypeDiagram \n\nto. \n\nTable 3. Enumerated values of MSODOCEXLINEBREAKTYPE ", - "page_start": 10, - "page_end": 10, - "source_file": "office-pdf.pdf" + "text": "", + "page_start": 176, + "page_end": 176, + "source_file": "00-80T-80.pdf" } ] }, @@ -14227,64 +14227,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 307, + "page_end": 307, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 413, + "page_end": 413, + "source_file": "00-80T-80.pdf" }, { - "text": "The Foundation’s liquidity management includes a policy of structuring its financial assets to be available to \nmeet its general expenditures, liabilities, grant-making, and other obligations as they come due. Cash and \ncash equivalents as reported on the consolidated balance sheet at June 30, 2024 and 2023, are the \nprimary liquid resources used by the Foundation to meet these obligations. Financial assets invested in the \nshort-term and long-term investments can be liquidated at any time as needed. \n\n**(10) Related Party Transactions**\n\nThe Wikimedia Endowment began operations as a standalone tax-exempt 501(c)(3) organization on \nSeptember 30, 2023, with the mission to act as a permanent fund that can support in perpetuity the \noperations and activities of current and future Wikimedia projects, which are projects that are approved by \nand advance the purposes of the Foundation or its successor if the Foundation ceases to exist. The \nFoundation does not have control or controlling financial interest in the Wikimedia Endowment and the \nWikimedia Endowment has a separate Board of Directors, but the Wikimedia Endowment is considered a \nrelated party to the Foundation because Wikimedia Endowment management is also management at the \nFoundation. \n\nDuring the fiscal year ended June 30, 2024, the Foundation recognized revenue of $2,063,195 related to \nservices provided to the Wikimedia Endowment, primarily for fundraising and general and administrative \nsupport under the terms of a cost sharing agreement. These costs are included within the Foundation's \nexpenses based on the nature of the cost. The revenue from the Wikimedia Endowment reimbursing the \ncosts is recorded within other income, net. ", - "page_start": 19, - "page_end": 19, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + "text": "", + "page_start": 414, + "page_end": 414, + "source_file": "00-80T-80.pdf" }, { - "text": "The Foundation also receives donations on behalf of the Wikimedia Endowment as well as transfers \nadditional Foundation donations to the Endowment monthly. Donations that are donor-specified for the \nWikimedia Endowment are not recognized as revenue to the Foundation, whereas donations that are not \ndonor-specified for the Wikimedia Endowment are recognized both as contributions revenue and awards \nand grants expense to the Foundation. The Foundation transferred $10,706,812 donor-designated gifts and \n$624,137 Foundation gifts to the Wikimedia Endowment during the year ended June 30, 2024. As of \nJune 30, 2024, the Foundation owed the Wikimedia Endowment $525,607 for donations to be transferred \nto the Wikimedia Endowment for the month of June 2024. \n\nDuring the fiscal year ended June 30, 2024, the Wikimedia Endowment also provided the Foundation with \ngrants of $1,500,000 for MediaWiki improvements, $600,000 for the Abstract Wikipedia project, and \n$500,000 for exploring strategies for expanding beyond the Foundation’s existing audiences of consumers \nand contributors. The grants are recorded as contributions with donor restrictions and within net assets with \ndonor restrictions as of June 30, 2024. ", - "page_start": 20, - "page_end": 20, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + "text": "", + "page_start": 414, + "page_end": 414, + "source_file": "00-80T-80.pdf" }, { - "text": "**(6) Functional Allocation of Expenses**\n\nCosts of providing the Foundation’s activities have been summarized below on a functional basis. \nPrograms comprise various initiatives that focus on (1) building the technological and operating platform \nthat enables the Foundation to function sustainably as a top global internet organization, (2) strengthening, \ngrowing, and increasing diversity of the Wikimedia communities, and (3) accelerating impact by investing in \nkey geographic areas, mobile application development, and bottom-up innovation, all of which support \nWikipedia and other wiki-based projects. This also includes costs related to the Wikimedia Endowment for \nwhich the Foundation is reimbursed. The allocation between programs, general and administrative, and \nfundraising expenses is based on personnel and related costs and other operating expenses such as rent \nand office expenses using estimates of time spent or percentage of utilization by headcounts, as well as ", - "page_start": 16, - "page_end": 16, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + "text": "", + "page_start": 414, + "page_end": 414, + "source_file": "00-80T-80.pdf" }, { - "text": "***(n) Leases***\n\nLeases consist of a lease liability for the Foundation’s headquarters in San Francisco. The liability is \nequal to the present value of lease payments, which are fixed. The present value is calculated using a \nrisk-free discount rate, determined using a period comparable with that of the lease term. The lease \nterm in accordance with ASC 842 does not include options to extend as it is not reasonably certain that \nthe option will be exercised. The Foundation determined during the year ended June 30, 2024 not to \nrenew the lease. \n\n***(o) Collaborative Arrangement***\n\nThe Foundation has a collaborative arrangement with Wikimedia Deutschland to mutually develop the \nWikibase software to support the Wikidata project, which acts as central storage for the structured data \nof its Wikimedia sister projects including Wikipedia, Wikivoyage, Wiktionary, Wikisource, and others. \nBoth the Foundation and Wikimedia Deutschland do work for the Wikidata project, and the Foundation \nalso grants Wikimedia Deutschland funding to support Wikimedia Deutschland's work in developing the \nWikibase software. Since the project is part of the Foundation's mission to make knowledge accessible \n\n10 (Continued) ", - "page_start": 12, - "page_end": 12, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + "text": "", + "page_start": 414, + "page_end": 414, + "source_file": "00-80T-80.pdf" }, { - "text": "For example (unaudited): \n\n• Wikipedia and the other projects operated by the Foundation receive more than 19.4 billion pageviews \n\nper month, making them one of the most popular Web properties worldwide. Wikipedia is available in \nmore than 332 languages and contains more than 63 million articles contributed by a global volunteer \ncommunity. \n\n• For the year ended June 30, 2024, the educational content of the Foundation’s largest project, \nWikipedia, grew by approximately 1.9 million articles to approximately 63.4 million articles. \n\n• For the year ended June 30, 2024, volunteers added approximately 12.2 million images, movies, and \nsound files to the Foundation’s multimedia repository, making the total 106.7 million files. \n\n• Volunteers also contribute in several ways to the Foundation’s wiki software: volunteer software \n\ndevelopers add new functionality to the code base, and volunteer language specialists add to the code \nbase by translating the wiki interface into different languages. During the year ended June 30, 2024, \nthere were 47,773 commits merged, through the efforts of approximately 511 authors/contributors, of \nwhich 8,161 commits were through the efforts of approximately 244 volunteers. ", - "page_start": 18, - "page_end": 18, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + "text": "", + "page_start": 414, + "page_end": 414, + "source_file": "00-80T-80.pdf" }, { - "text": "**(1) Organization and Summary of Significant Accounting Policies**\n\n***(a) Organization and Purpose***\n\nThe accompanying consolidated financial statements present the financial position, change in net \nassets and cash flows of the Wikimedia Foundation, Inc. (the Foundation) and Wikimedia, LLC. \n\nThe Foundation is the nonprofit organization that operates Wikipedia, a free online encyclopedia. \nBased in San Francisco, California, the Foundation is a 501(c)(3) charity that is funded primarily \nthrough donations and contributions. \n\nThe Foundation also operates Wikimedia, LLC, a Delaware Limited Liability Company, with the \nFoundation as its Sole Member. The Wikimedia, LLC is organized and operated exclusively for \ncharitable and educational purposes within the meaning of section 501(c)(3) of the Internal Revenue \nCode and is a disregarded entity for tax purposes. \n\n***(b) Risks and Uncertainties***\n\nThe Foundation’s operations are funded primarily by public donations from individuals as well as gifts \nfrom foundations and corporations. External factors such as global geopolitics, recession, and currency \nmarkets may impact our ability to raise funds. As of the date of this report, the Foundation has not \nexperienced an adverse impact on its business operations. \n\n***(c) Income Taxes***\n\nThe Foundation is exempt from federal income tax under Section 501(c)(3) of the Internal Revenue \nCode and from state income tax under Chapter 220.13 of the Florida Statutes and Sections 23701d of \nRevenue and Taxation Code of the State of California. The Internal Revenue Service has determined \nthat the Foundation is not a private foundation and contributions to it qualify as charitable contributions. ", - "page_start": 8, - "page_end": 8, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + "text": "", + "page_start": 414, + "page_end": 414, + "source_file": "00-80T-80.pdf" }, { - "text": "Contributed service revenue and expenses recorded in the consolidated statements of activities consist \nof contributed legal services, engineering services, subscription services, and internet hosting services \nand bandwidth. The amounts of specialized contributed legal services as revenue and expenses are \n$82,638 and $493,315 for the years ended June 30, 2024 and 2023, respectively. The value of \nspecialized engineering services as revenue and expenses are $0 and $498,800 for the years ended \nJune 30, 2024 and 2023, respectively. The value of donated subscription services as revenue and \nexpenses was $124,738 and $0 for the years ended June 30, 2024 and 2023, respectively. The \namounts of contributed internet hosting services and bandwidth for the years ended June 30, 2024 and \n2023 is $56,100 and $48,338, respectively. Included in the 2024 and 2023 amounts are donated \nhosting services and bandwidth from the following companies: (1) FiberRing, (2) Tele2, (3) Datahop, \n(4) LibertyGlobal, (5) Init7, and (6) Arelion. \n\n***(m) Revenue Recognition – Contracts With Customers***\n\nThe Foundation recognizes revenue from contracts with customers related to Wikimedia, LLC under \nAccounting Standards Codification Topic 606, Revenue from Contracts with Customers, which \nestablishes a principle that revenue is recognized upon transfer of control of promised products and \nservices to customers in an amount that reflects the consideration the Foundation expects to receive in \nexchange for those products or services. ", - "page_start": 11, - "page_end": 11, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + "text": "", + "page_start": 414, + "page_end": 414, + "source_file": "00-80T-80.pdf" }, { - "text": "The Foundation incurs software development costs related to internal use software. Qualifying costs \nincurred during the application development stage are capitalized. These costs primarily consist of \ninternal labor and third-party development costs and are amortized using the straight-line method over \nthe estimated useful life of the software, which is generally three years. These assets are reviewed for \nimpairment whenever events or changes in circumstances occur that could impact their recoverability. \nExternal use software is expensed as incurred since there is generally no passage of time between \nachievement of technological feasibility and the availability for general release. \n\n***(j) Other Operating Expenses***\n\nOther operating expenses primarily include facility expenses, staff related expenses, insurance and \npersonal property tax expenses, and other general administrative expenses. \n\n***(k) Contributions of Cash and Other Financial Assets***\n\nUnconditional promises to give are recognized as revenue when the underlying promises are received \nby the Foundation. Contributions that are conditional are not recorded until the condition is substantially \nmet. Conditional contributions must include both (1) one or more barriers that need to be overcome \nbefore the Foundation is entitled to the contribution, and (2) a right of return or a right of release from \nthe donor’s obligation to provide the contribution. ", - "page_start": 10, - "page_end": 10, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + "text": "", + "page_start": 413, + "page_end": 413, + "source_file": "00-80T-80.pdf" } ] }, @@ -14295,70 +14295,70 @@ "target_page": 8, "target_passage": "External factors such as global geopolitics, recession, and currency markets may impact our ability to raise funds.", "chunk_present": { - "presence": true, - "index": 4 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 350, + "page_end": 350, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 322, + "page_end": 322, + "source_file": "00-80T-80.pdf" }, { - "text": "The Foundation’s liquidity management includes a policy of structuring its financial assets to be available to \nmeet its general expenditures, liabilities, grant-making, and other obligations as they come due. Cash and \ncash equivalents as reported on the consolidated balance sheet at June 30, 2024 and 2023, are the \nprimary liquid resources used by the Foundation to meet these obligations. Financial assets invested in the \nshort-term and long-term investments can be liquidated at any time as needed. \n\n**(10) Related Party Transactions**\n\nThe Wikimedia Endowment began operations as a standalone tax-exempt 501(c)(3) organization on \nSeptember 30, 2023, with the mission to act as a permanent fund that can support in perpetuity the \noperations and activities of current and future Wikimedia projects, which are projects that are approved by \nand advance the purposes of the Foundation or its successor if the Foundation ceases to exist. The \nFoundation does not have control or controlling financial interest in the Wikimedia Endowment and the \nWikimedia Endowment has a separate Board of Directors, but the Wikimedia Endowment is considered a \nrelated party to the Foundation because Wikimedia Endowment management is also management at the \nFoundation. \n\nDuring the fiscal year ended June 30, 2024, the Foundation recognized revenue of $2,063,195 related to \nservices provided to the Wikimedia Endowment, primarily for fundraising and general and administrative \nsupport under the terms of a cost sharing agreement. These costs are included within the Foundation's \nexpenses based on the nature of the cost. The revenue from the Wikimedia Endowment reimbursing the \ncosts is recorded within other income, net. ", - "page_start": 19, - "page_end": 19, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + "text": "", + "page_start": 324, + "page_end": 324, + "source_file": "00-80T-80.pdf" }, { - "text": "The Foundation also receives donations on behalf of the Wikimedia Endowment as well as transfers \nadditional Foundation donations to the Endowment monthly. Donations that are donor-specified for the \nWikimedia Endowment are not recognized as revenue to the Foundation, whereas donations that are not \ndonor-specified for the Wikimedia Endowment are recognized both as contributions revenue and awards \nand grants expense to the Foundation. The Foundation transferred $10,706,812 donor-designated gifts and \n$624,137 Foundation gifts to the Wikimedia Endowment during the year ended June 30, 2024. As of \nJune 30, 2024, the Foundation owed the Wikimedia Endowment $525,607 for donations to be transferred \nto the Wikimedia Endowment for the month of June 2024. \n\nDuring the fiscal year ended June 30, 2024, the Wikimedia Endowment also provided the Foundation with \ngrants of $1,500,000 for MediaWiki improvements, $600,000 for the Abstract Wikipedia project, and \n$500,000 for exploring strategies for expanding beyond the Foundation’s existing audiences of consumers \nand contributors. The grants are recorded as contributions with donor restrictions and within net assets with \ndonor restrictions as of June 30, 2024. ", - "page_start": 20, - "page_end": 20, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + "text": "", + "page_start": 323, + "page_end": 323, + "source_file": "00-80T-80.pdf" }, { - "text": "**(1) Organization and Summary of Significant Accounting Policies**\n\n***(a) Organization and Purpose***\n\nThe accompanying consolidated financial statements present the financial position, change in net \nassets and cash flows of the Wikimedia Foundation, Inc. (the Foundation) and Wikimedia, LLC. \n\nThe Foundation is the nonprofit organization that operates Wikipedia, a free online encyclopedia. \nBased in San Francisco, California, the Foundation is a 501(c)(3) charity that is funded primarily \nthrough donations and contributions. \n\nThe Foundation also operates Wikimedia, LLC, a Delaware Limited Liability Company, with the \nFoundation as its Sole Member. The Wikimedia, LLC is organized and operated exclusively for \ncharitable and educational purposes within the meaning of section 501(c)(3) of the Internal Revenue \nCode and is a disregarded entity for tax purposes. \n\n***(b) Risks and Uncertainties***\n\nThe Foundation’s operations are funded primarily by public donations from individuals as well as gifts \nfrom foundations and corporations. External factors such as global geopolitics, recession, and currency \nmarkets may impact our ability to raise funds. As of the date of this report, the Foundation has not \nexperienced an adverse impact on its business operations. \n\n***(c) Income Taxes***\n\nThe Foundation is exempt from federal income tax under Section 501(c)(3) of the Internal Revenue \nCode and from state income tax under Chapter 220.13 of the Florida Statutes and Sections 23701d of \nRevenue and Taxation Code of the State of California. The Internal Revenue Service has determined \nthat the Foundation is not a private foundation and contributions to it qualify as charitable contributions. ", - "page_start": 8, - "page_end": 8, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + "text": "", + "page_start": 323, + "page_end": 323, + "source_file": "00-80T-80.pdf" }, { - "text": "***(n) Leases***\n\nLeases consist of a lease liability for the Foundation’s headquarters in San Francisco. The liability is \nequal to the present value of lease payments, which are fixed. The present value is calculated using a \nrisk-free discount rate, determined using a period comparable with that of the lease term. The lease \nterm in accordance with ASC 842 does not include options to extend as it is not reasonably certain that \nthe option will be exercised. The Foundation determined during the year ended June 30, 2024 not to \nrenew the lease. \n\n***(o) Collaborative Arrangement***\n\nThe Foundation has a collaborative arrangement with Wikimedia Deutschland to mutually develop the \nWikibase software to support the Wikidata project, which acts as central storage for the structured data \nof its Wikimedia sister projects including Wikipedia, Wikivoyage, Wiktionary, Wikisource, and others. \nBoth the Foundation and Wikimedia Deutschland do work for the Wikidata project, and the Foundation \nalso grants Wikimedia Deutschland funding to support Wikimedia Deutschland's work in developing the \nWikibase software. Since the project is part of the Foundation's mission to make knowledge accessible \n\n10 (Continued) ", - "page_start": 12, - "page_end": 12, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + "text": "", + "page_start": 323, + "page_end": 323, + "source_file": "00-80T-80.pdf" }, { - "text": "**(6) Functional Allocation of Expenses**\n\nCosts of providing the Foundation’s activities have been summarized below on a functional basis. \nPrograms comprise various initiatives that focus on (1) building the technological and operating platform \nthat enables the Foundation to function sustainably as a top global internet organization, (2) strengthening, \ngrowing, and increasing diversity of the Wikimedia communities, and (3) accelerating impact by investing in \nkey geographic areas, mobile application development, and bottom-up innovation, all of which support \nWikipedia and other wiki-based projects. This also includes costs related to the Wikimedia Endowment for \nwhich the Foundation is reimbursed. The allocation between programs, general and administrative, and \nfundraising expenses is based on personnel and related costs and other operating expenses such as rent \nand office expenses using estimates of time spent or percentage of utilization by headcounts, as well as ", - "page_start": 16, - "page_end": 16, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + "text": "", + "page_start": 323, + "page_end": 323, + "source_file": "00-80T-80.pdf" }, { - "text": " For examples of gated access to AI models, see https://huggingface.co/docs/hub/en/models-gated. \n39 \n\n As an analogy, consider for instance Wikimedia Enterprise, which “build[s] services for high-volume \n40 \ncommercial reusers of Wikimedia content” and charges for that access. https://meta.wikimedia.org/ \nwiki/Wikimedia_Enterprise. ", - "page_start": 19, - "page_end": 19, - "source_file": "creative_common_ai.pdf" + "text": "", + "page_start": 323, + "page_end": 323, + "source_file": "00-80T-80.pdf" }, { - "text": "The Foundation has evaluated the financial statement impact of positions taken or expected to be \ntaken in its tax returns. The Foundation is subject to income taxes on any net income that is derived \nfrom a trade or business, regularly carried on, and not in furtherance of the purposes for which it was \ngranted exemption. Net income from any unrelated trade or business, in the opinion of management, is \nnot material to the consolidated financial statements taken as a whole. \n\n***(d) Financial Statement Presentation***\n\nNet assets, support and revenue, expenses, gains, and losses are classified based on the existence or \nabsence of donor-imposed restrictions in accordance with Accounting Standards Codification \n(ASC) Topic 958,*Not-for-Profit Entities*. \n\nNet assets without donor restrictions represent unrestricted resources available to support operations \nand also include previously temporarily restricted resources, which have become available for use by \nthe Foundation in accordance with the intentions of donors. \n\nNet assets with donor restrictions represent contributions that are limited in use by the Foundation in \naccordance with donor-imposed stipulations. The stipulations may expire with time or may be satisfied \nand removed by the actions of the Foundation according to the terms of the contribution by the donor. ", - "page_start": 8, - "page_end": 8, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + "text": "", + "page_start": 323, + "page_end": 323, + "source_file": "00-80T-80.pdf" }, { - "text": "In the past, SMBC also worked to provide \nIn the past, SMBC also worked to provide \n\nfunding to the support creation of platforms \nfunding to the support creation of platforms \n\nfor growth in Japan. Now, working through \nfor growth in Japan. Now, working through \n\nthe Bank of Japan’s “Fund-supply measure \nthe Bank of Japan’s “Fund-supply measure \n\nto support strengthening the foundations \nto support strengthening the foundations \n\nfor economic growth” loan program, it \nfor economic growth” loan program, it \n\nhas established the Environmentally \nhas established the Environmentally \n\nResponsible Company Support Fund and \nResponsible Company Support Fund and \n\nthe Environmental Facilities Suppor t \nthe Environmental Facilities Suppor t \n\nFund, in suppor t of companies with \nFund, in suppor t of companies with \n\nenvironmentally-conscious managements, \nenvironmentally-conscious managements, \n\nand which invest in environmental facilities. \nand which invest in environmental facilities. \n\nGiven the wave of Japanese companies \nGiven the wave of Japanese companies \n\ns fast-growing \nsetting up operations in China’s fast-growing \nsetting up operations in China \n\nmarket, the bank has also established a China \nmarket, the bank has also established a China \n\nBusiness Support Fund to meet the funding \nBusiness Support Fund to meet the funding ", - "page_start": 9, - "page_end": 9, - "source_file": "NYSE_SMFG_2011.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" } ] }, @@ -14375,64 +14375,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 23, + "page_end": 23, + "source_file": "basic-english-language-skills.PDF" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 264, + "page_end": 264, + "source_file": "00-80T-80.pdf" }, { - "text": "The Foundation’s liquidity management includes a policy of structuring its financial assets to be available to \nmeet its general expenditures, liabilities, grant-making, and other obligations as they come due. Cash and \ncash equivalents as reported on the consolidated balance sheet at June 30, 2024 and 2023, are the \nprimary liquid resources used by the Foundation to meet these obligations. Financial assets invested in the \nshort-term and long-term investments can be liquidated at any time as needed. \n\n**(10) Related Party Transactions**\n\nThe Wikimedia Endowment began operations as a standalone tax-exempt 501(c)(3) organization on \nSeptember 30, 2023, with the mission to act as a permanent fund that can support in perpetuity the \noperations and activities of current and future Wikimedia projects, which are projects that are approved by \nand advance the purposes of the Foundation or its successor if the Foundation ceases to exist. The \nFoundation does not have control or controlling financial interest in the Wikimedia Endowment and the \nWikimedia Endowment has a separate Board of Directors, but the Wikimedia Endowment is considered a \nrelated party to the Foundation because Wikimedia Endowment management is also management at the \nFoundation. \n\nDuring the fiscal year ended June 30, 2024, the Foundation recognized revenue of $2,063,195 related to \nservices provided to the Wikimedia Endowment, primarily for fundraising and general and administrative \nsupport under the terms of a cost sharing agreement. These costs are included within the Foundation's \nexpenses based on the nature of the cost. The revenue from the Wikimedia Endowment reimbursing the \ncosts is recorded within other income, net. ", - "page_start": 19, - "page_end": 19, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + "text": "", + "page_start": 265, + "page_end": 265, + "source_file": "00-80T-80.pdf" }, { - "text": "Once such stipulations are satisfied, the associated net assets are released from net assets with donor \nrestrictions and recognized as net assets without donor restrictions. \n\nContributions received are recorded as net assets without donor restriction or net assets with donor \nrestrictions depending on the existence and/or nature of any donor restrictions. \n\n***(e) Cash and Cash Equivalents***\n\nThe Foundation manages its cash through major financial institutions. At June 30, 2024 and 2023, the \ncarrying amount of the Foundation’s general ledger cash held primarily in nationally recognized \nfinancial institutions is $60.0 million and $63.9 million, respectively. Cash balances are insured by the \nFederal Deposit Insurance Corporation (FDIC) up to the applicable limits. Cash balances held in these \nfinancial institutions at June 30, 2024 and 2023 exceed the applicable FDIC insurance limits. The \nFoundation’s current practice is to maintain at least four months of cash and cash equivalents to \nsupport a combination of operating cash and a current reserve fund. The Foundation considers all \nhighly liquid investments with an original maturity of three months or less when purchased to be cash \nequivalents. Cash equivalents of $22.8 million and $12.0 million as of June 30, 2024 and 2023, \nrespectively, are considered Level 1 under ASC Topic 820,*Fair Value Measurement*. ", - "page_start": 9, - "page_end": 9, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + "text": "", + "page_start": 264, + "page_end": 264, + "source_file": "00-80T-80.pdf" }, { - "text": "Cash flows from operating activities: \n\nIncrease in net assets \nAdjustments to reconcile increase in net assets to net cash \n\nprovided by operating activities: \n\nDepreciation and amortization \nLoss on disposal of equipment \nUnrealized and realized gains on investments, net \nRight of use asset - operating lease, net \nChanges in operating assets and liabilities: \n\nContributions receivable \nPrepaid expenses and other current assets \nAccounts payable \nAccrued expenses \nLease liability \nDonations payable to Wikimedia Endowment \nOther liabilities \n\nNet cash provided by operating activities \n\nCash flows from investing activities: \n\nPurchase of computer equipment and office furniture \nDevelopment of internal use software \nPurchase of investments \nProceeds from sales and maturities of investments \n\nNet cash provided by (used in) investing activities \n\nNet increase in cash, cash equivalents, and \n\nrestricted cash \n\nCash, cash equivalents, and restricted cash at beginning of year \n\nCash, cash equivalents, and restricted cash at end of year \n\nSupplemental cash flow disclosure: \n\nNoncash changes in exchange rate \nInitial recognition of right of use asset - operating lease \nInitial recognition of lease liability ", - "page_start": 7, - "page_end": 7, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + "text": "", + "page_start": 409, + "page_end": 409, + "source_file": "00-80T-80.pdf" }, { - "text": "The Foundation also receives donations on behalf of the Wikimedia Endowment as well as transfers \nadditional Foundation donations to the Endowment monthly. Donations that are donor-specified for the \nWikimedia Endowment are not recognized as revenue to the Foundation, whereas donations that are not \ndonor-specified for the Wikimedia Endowment are recognized both as contributions revenue and awards \nand grants expense to the Foundation. The Foundation transferred $10,706,812 donor-designated gifts and \n$624,137 Foundation gifts to the Wikimedia Endowment during the year ended June 30, 2024. As of \nJune 30, 2024, the Foundation owed the Wikimedia Endowment $525,607 for donations to be transferred \nto the Wikimedia Endowment for the month of June 2024. \n\nDuring the fiscal year ended June 30, 2024, the Wikimedia Endowment also provided the Foundation with \ngrants of $1,500,000 for MediaWiki improvements, $600,000 for the Abstract Wikipedia project, and \n$500,000 for exploring strategies for expanding beyond the Foundation’s existing audiences of consumers \nand contributors. The grants are recorded as contributions with donor restrictions and within net assets with \ndonor restrictions as of June 30, 2024. ", - "page_start": 20, - "page_end": 20, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + "text": "", + "page_start": 264, + "page_end": 264, + "source_file": "00-80T-80.pdf" }, { - "text": "Managing Our Liquidity and Financial Resources \n\nSOURCES AND USES OF CASH \n\nCONSOLIDATED STATEMENTS OF CASH FLOWS \n\n(In millions of dollars) \n\n**CASH FROM OPERATIONS**\nNet income for the period \nDepreciation and amortization \nImpairment of assets \nFinance costs \nIncome tax expense \nGain on sale of TVtropolis \nGain on spectrum distribution \nOther \n\nCash provided by operations before changes in non-cash operating items \nChange in non-cash operating working capital items \n\nIncome taxes paid \nInterest paid \n\n**Cash provided by operating activities**\n\n**CASH USED IN INVESTING**\nAdditions to property, plant and equipment \nChange in non-cash working capital items related to property, plant and equipment \nAcquisitions and strategic initiatives \nOther \n\n**Cash used in investing activities**\n\n**CASH FROM FINANCING**\nIssuance of long-term debt, net of transaction costs \nRepayment of long-term debt and net settlement of derivatives on termination \nProceeds on short-term borrowings \nDividends paid and repurchase/issuance of Class B Non-Voting shares \n\n**Cash provided by (used in) financing activities**\n\n**Increase in cash and cash equivalents**\n\nCash and cash equivalents, end of period ", - "page_start": 62, - "page_end": 62, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 264, + "page_end": 264, + "source_file": "00-80T-80.pdf" }, { - "text": "Net cash used in investing activities \n\nCash flows from financing activities: \n\nProceeds of stock issuances \nAcquisition of treasury stock \nCash dividends paid \n\n Net cash used in financing activities \n\nNet increase (decrease) in cash and cash equivalents \n\nCash and cash equivalents, beginning of year \n\nCash and cash equivalents, end of year ", - "page_start": 92, - "page_end": 92, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 264, + "page_end": 264, + "source_file": "00-80T-80.pdf" }, { - "text": "***(n) Leases***\n\nLeases consist of a lease liability for the Foundation’s headquarters in San Francisco. The liability is \nequal to the present value of lease payments, which are fixed. The present value is calculated using a \nrisk-free discount rate, determined using a period comparable with that of the lease term. The lease \nterm in accordance with ASC 842 does not include options to extend as it is not reasonably certain that \nthe option will be exercised. The Foundation determined during the year ended June 30, 2024 not to \nrenew the lease. \n\n***(o) Collaborative Arrangement***\n\nThe Foundation has a collaborative arrangement with Wikimedia Deutschland to mutually develop the \nWikibase software to support the Wikidata project, which acts as central storage for the structured data \nof its Wikimedia sister projects including Wikipedia, Wikivoyage, Wiktionary, Wikisource, and others. \nBoth the Foundation and Wikimedia Deutschland do work for the Wikidata project, and the Foundation \nalso grants Wikimedia Deutschland funding to support Wikimedia Deutschland's work in developing the \nWikibase software. Since the project is part of the Foundation's mission to make knowledge accessible \n\n10 (Continued) ", - "page_start": 12, - "page_end": 12, - "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + "text": "", + "page_start": 409, + "page_end": 409, + "source_file": "00-80T-80.pdf" }, { - "text": "Net increase (decrease) in cash and cash equivalents and restricted cash \n\nCash and cash equivalents and restricted cash, beginning of period \n\nCash and cash equivalents and restricted cash, end of period \n\nSupplemental Non-Cash Investing and Financing Activities \nAcquisitions of property and equipment included in liabilities \nLeased assets obtained in exchange for finance lease liabilities \nLeased assets obtained in exchange for operating lease liabilities ", - "page_start": 12, - "page_end": 12, - "source_file": "tesla_form_10q.pdf" + "text": "", + "page_start": 409, + "page_end": 409, + "source_file": "00-80T-80.pdf" } ] }, @@ -14449,64 +14449,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 317, + "page_end": 317, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 204, + "page_end": 204, + "source_file": "00-80T-80.pdf" }, { - "text": "(2) The coronavirus exception applies where it is not reasonably practicable for the local \nauthority to meet the requirement specified in regulation 11(2)(a) for a reason relating to the \nincidence or transmission of coronavirus.”. \n\n**Amendment of the Special Educational Needs and Disability (Detained Persons) Regulations**\n**2015**\n\n**18.**The Special Educational Needs and Disability (Detained Persons) Regulations 2015(**a**) are \n\namended as follows. \n\n**19.**In regulation 2(1) (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**20.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time periods due to coronavirus exception**", - "page_start": 4, - "page_end": 4, - "source_file": "uksi_20200471_en.pdf" + "text": "", + "page_start": 332, + "page_end": 332, + "source_file": "00-80T-80.pdf" }, { - "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations replace the Health Protection (Coronavirus, International Travel) (England) \nRegulations 2020 (“the International Travel Regulations”), the Health Protection (Coronavirus, \nPublic Health Information for International Passengers) (England) Regulations 2020 and the \nHealth Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England) \n(Amendment) Regulations 2021. \n\nThey impose requirements on certain categories of person to provide information upon arrival in \nEngland, to take coronavirus tests before and after arrival and to self-isolate in order to prevent the \nspread of infection or contamination from coronavirus or coronavirus disease. They also impose \nobligations on operators to ensure that passengers receive information and comply with the \nrequirements. \n\nAn impact assessment has not been produced for this instrument. An explanatory memorandum \nhas been published alongside this instrument at www.legislation.gov.uk. ", - "page_start": 91, - "page_end": 91, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 332, + "page_end": 332, + "source_file": "00-80T-80.pdf" }, { - "text": "**27.**In regulation 30(7)(c) (unopposed appeals), after “10(4)(a)” insert “or (d)”. \n\n**Amendment of the Special Educational Needs and Disability (First-tier Tribunal**\n**Recommendations Power) Regulations 2017**\n\n**28.**The Special Educational Needs and Disability (First-tier Tribunal Recommendations Power) \n\nRegulations 2017(**a**) are amended as follows. \n\n**29.**In regulation 2 (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**30.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time periods due to coronavirus exception**\n\n**2A.**—(1) Where the coronavirus exception applies, any requirement in any of the \nregulations specified in paragraph (3) for action to be taken within a specified period of \ntime or by a certain day is to be read instead as a requirement for such action to be taken as \nsoon as reasonably practicable. \n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person \nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or \ntransmission of coronavirus. \n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)— \n\n(a) regulation 6(3) and (6) (responding to health care recommendations); and \n\n(b) regulation 7(1) and (4) (responding to social care recommendations).”. ", - "page_start": 5, - "page_end": 5, - "source_file": "uksi_20200471_en.pdf" + "text": "", + "page_start": 332, + "page_end": 332, + "source_file": "00-80T-80.pdf" }, { - "text": "**2.**—(1) The Health Protection (Coronavirus, Restrictions) (Self-Isolation) (England) Regulations \n2020(**a**) are amended as follows. \n\n(2) In regulation 2D(1)(c), for “regulation 4 of the Health Protection (Coronavirus, International \nTravel) (England) Regulations 2020” substitute “regulation 9 of the Health Protection \n(Coronavirus, International Travel and Operator Liability) (England) Regulations 2021”. \n\n(3) In regulation 6(1)— \n\n(a) in the definitions of “designated place”, “isolation requirements” and “self-isolating \nworker”, for “regulation 4” substitute “regulation 9”; \n\n(b) in the definition of “International Travel Regulations”, for “the Health Protection \n(Coronavirus, International Travel) (England) Regulations 2020” substitute “the Health \nProtection (Coronavirus, International Travel and Operator Liability) (England) \nRegulations 2021”. ", - "page_start": 89, - "page_end": 89, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 332, + "page_end": 332, + "source_file": "00-80T-80.pdf" }, { - "text": "**1.**—(1) The Health Protection (Notification) Regulations 2010(**a**) are amended as follows. \n(2) In regulation 4(3D)(b), for “regulation 3B of the Health Protection (Coronavirus, \nInternational Travel) (England) Regulations 2020” substitute “regulation 6 of the Health \nProtection (Coronavirus, International Travel and Operator Liability) (England) Regulations \n2021”. ", - "page_start": 88, - "page_end": 88, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 332, + "page_end": 332, + "source_file": "00-80T-80.pdf" }, { - "text": "(3) In regulation 4ZA— \n\n(a) in the heading, for “the Health Protection (Coronavirus, International Travel) (England) \nRegulations 2020” substitute “the Health Protection (Coronavirus, International Travel \nand Operator Liability) (England) Regulations 2021”; \n\n(b) in paragraph (1)(a), for “regulation 3B of the Health Protection (Coronavirus, \nInternational Travel) (England) Regulations 2020 (“the 2020 Regulations”)” substitute \n“regulation 6 of the Health Protection (Coronavirus, International Travel and Operator \nLiability) (England) Regulations 2021 (“the International Travel and Operator Liability \nRegulations”)”; \n\n(c) in paragraph (1)(c), for “paragraph 7(1)(f) of Schedule 2C to the 2020 Regulations” \nsubstitute “paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator \nLiability Regulations”; \n\n(d) in paragraph (3), for “paragraph 7(1)(f) of Schedule 2C to the Health Protection \n(Coronavirus, International Travel) (England) Regulations 2020” substitute “paragraph \n7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations”. ", - "page_start": 89, - "page_end": 89, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 332, + "page_end": 332, + "source_file": "00-80T-80.pdf" }, { - "text": "**13.**In regulation 27(3) (amending or replacing an EHC plan following a re-assessment)— \n\n(a) at the end of sub-paragraph (c) omit “or”; and \n(b) at the end of sub-paragraph (d) insert�� \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**14.**In regulation 45 (unopposed appeals), after paragraph (7) insert— \n\n“(8) The local authority need not comply with the time limits specified in paragraph (3A) \nif it is impractical to do so because the circumstances referred to in regulation 10(4)(e) \napply.”. \n\n**Amendment of the Special Educational Needs (Personal Budgets) Regulations 2014**\n\n**15.**The Special Educational Needs (Personal Budgets) Regulations 2014(**a**) are amended as \n\nfollows. \n\n**16.**In regulation 2 (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**17.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time period due to coronavirus exception**", - "page_start": 3, - "page_end": 3, - "source_file": "uksi_20200471_en.pdf" + "text": "", + "page_start": 332, + "page_end": 332, + "source_file": "00-80T-80.pdf" }, { - "text": "(i) these Regulations, or \n(ii) an enactment which, in Scotland, Wales or Northern Ireland, has the effect of \nrequiring the isolation or quarantine of persons who have been outside the common \ntravel area, for any of the purposes described in sub-paragraph (b); \n\n(b) for the purpose of— \n\n(i) preventing danger to public health as a result of the spread of infection or \n\ncontamination with coronavirus or coronavirus disease, \n\n(ii) monitoring the spread of infection or contamination with coronavirus or coronavirus \n\ndisease, or \n\n(iii) giving effect to any international agreement or arrangement relating to the spread of \n\ninfection or contamination with coronavirus or coronavirus disease; or ", - "page_start": 29, - "page_end": 29, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 332, + "page_end": 332, + "source_file": "00-80T-80.pdf" } ] }, @@ -14523,64 +14523,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 170, + "page_end": 170, + "source_file": "00-80T-80.pdf" }, { - "text": "(2) The coronavirus exception applies where it is not reasonably practicable for the local \nauthority to meet the requirement specified in regulation 11(2)(a) for a reason relating to the \nincidence or transmission of coronavirus.”. \n\n**Amendment of the Special Educational Needs and Disability (Detained Persons) Regulations**\n**2015**\n\n**18.**The Special Educational Needs and Disability (Detained Persons) Regulations 2015(**a**) are \n\namended as follows. \n\n**19.**In regulation 2(1) (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**20.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time periods due to coronavirus exception**", - "page_start": 4, - "page_end": 4, - "source_file": "uksi_20200471_en.pdf" + "text": "", + "page_start": 305, + "page_end": 305, + "source_file": "00-80T-80.pdf" }, { - "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations replace the Health Protection (Coronavirus, International Travel) (England) \nRegulations 2020 (“the International Travel Regulations”), the Health Protection (Coronavirus, \nPublic Health Information for International Passengers) (England) Regulations 2020 and the \nHealth Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England) \n(Amendment) Regulations 2021. \n\nThey impose requirements on certain categories of person to provide information upon arrival in \nEngland, to take coronavirus tests before and after arrival and to self-isolate in order to prevent the \nspread of infection or contamination from coronavirus or coronavirus disease. They also impose \nobligations on operators to ensure that passengers receive information and comply with the \nrequirements. \n\nAn impact assessment has not been produced for this instrument. An explanatory memorandum \nhas been published alongside this instrument at www.legislation.gov.uk. ", - "page_start": 91, - "page_end": 91, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 169, + "page_end": 169, + "source_file": "00-80T-80.pdf" }, { - "text": "**27.**In regulation 30(7)(c) (unopposed appeals), after “10(4)(a)” insert “or (d)”. \n\n**Amendment of the Special Educational Needs and Disability (First-tier Tribunal**\n**Recommendations Power) Regulations 2017**\n\n**28.**The Special Educational Needs and Disability (First-tier Tribunal Recommendations Power) \n\nRegulations 2017(**a**) are amended as follows. \n\n**29.**In regulation 2 (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**30.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time periods due to coronavirus exception**\n\n**2A.**—(1) Where the coronavirus exception applies, any requirement in any of the \nregulations specified in paragraph (3) for action to be taken within a specified period of \ntime or by a certain day is to be read instead as a requirement for such action to be taken as \nsoon as reasonably practicable. \n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person \nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or \ntransmission of coronavirus. \n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)— \n\n(a) regulation 6(3) and (6) (responding to health care recommendations); and \n\n(b) regulation 7(1) and (4) (responding to social care recommendations).”. ", - "page_start": 5, - "page_end": 5, - "source_file": "uksi_20200471_en.pdf" + "text": "", + "page_start": 169, + "page_end": 169, + "source_file": "00-80T-80.pdf" }, { - "text": "**2.**—(1) The Health Protection (Coronavirus, Restrictions) (Self-Isolation) (England) Regulations \n2020(**a**) are amended as follows. \n\n(2) In regulation 2D(1)(c), for “regulation 4 of the Health Protection (Coronavirus, International \nTravel) (England) Regulations 2020” substitute “regulation 9 of the Health Protection \n(Coronavirus, International Travel and Operator Liability) (England) Regulations 2021”. \n\n(3) In regulation 6(1)— \n\n(a) in the definitions of “designated place”, “isolation requirements” and “self-isolating \nworker”, for “regulation 4” substitute “regulation 9”; \n\n(b) in the definition of “International Travel Regulations”, for “the Health Protection \n(Coronavirus, International Travel) (England) Regulations 2020” substitute “the Health \nProtection (Coronavirus, International Travel and Operator Liability) (England) \nRegulations 2021”. ", - "page_start": 89, - "page_end": 89, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 305, + "page_end": 305, + "source_file": "00-80T-80.pdf" }, { - "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations make amendments to secondary legislation relating to special educational \nneeds and disability in order to provide exceptions to time limits set out in that legislation where \nthey cannot be met because of a reason relating to the incidence or transmission of coronavirus. \n\nRegulation 2 contains review and expiry provisions. The Secretary of State is required to review \nthe effectiveness of the Regulations during the period in which they have effect. The Regulations \ncease to have effect on 25th September 2020. \n\nRegulations 3 to 14 amend the Special Educational Needs and Disability Regulations 2014 (‘the \nSEND Regulations 2014’). \n\nRegulation 5 inserts a glossing provision into the SEND Regulations 2014 which relaxes certain \nrequirements in those Regulations for actions to be taken within specified time limits where it is \nnot reasonably practicable for a person to meet those requirements for a reason relating to the \nincidence or transmission of coronavirus. Instead, any such requirement is to be read as a \nrequirement for such action to be taken as soon as reasonably practicable. \n\nRegulations 6 to 14 make textual amendments to the SEND Regulations 2014 to relax time limits. ", - "page_start": 6, - "page_end": 6, - "source_file": "uksi_20200471_en.pdf" + "text": "", + "page_start": 169, + "page_end": 169, + "source_file": "00-80T-80.pdf" }, { - "text": "**1.**—(1) The Health Protection (Notification) Regulations 2010(**a**) are amended as follows. \n(2) In regulation 4(3D)(b), for “regulation 3B of the Health Protection (Coronavirus, \nInternational Travel) (England) Regulations 2020” substitute “regulation 6 of the Health \nProtection (Coronavirus, International Travel and Operator Liability) (England) Regulations \n2021”. ", - "page_start": 88, - "page_end": 88, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 169, + "page_end": 169, + "source_file": "00-80T-80.pdf" }, { - "text": "(3) In regulation 4ZA— \n\n(a) in the heading, for “the Health Protection (Coronavirus, International Travel) (England) \nRegulations 2020” substitute “the Health Protection (Coronavirus, International Travel \nand Operator Liability) (England) Regulations 2021”; \n\n(b) in paragraph (1)(a), for “regulation 3B of the Health Protection (Coronavirus, \nInternational Travel) (England) Regulations 2020 (“the 2020 Regulations”)” substitute \n“regulation 6 of the Health Protection (Coronavirus, International Travel and Operator \nLiability) (England) Regulations 2021 (“the International Travel and Operator Liability \nRegulations”)”; \n\n(c) in paragraph (1)(c), for “paragraph 7(1)(f) of Schedule 2C to the 2020 Regulations” \nsubstitute “paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator \nLiability Regulations”; \n\n(d) in paragraph (3), for “paragraph 7(1)(f) of Schedule 2C to the Health Protection \n(Coronavirus, International Travel) (England) Regulations 2020” substitute “paragraph \n7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations”. ", - "page_start": 89, - "page_end": 89, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 170, + "page_end": 170, + "source_file": "00-80T-80.pdf" }, { - "text": "(i) these Regulations, or \n(ii) an enactment which, in Scotland, Wales or Northern Ireland, has the effect of \nrequiring the isolation or quarantine of persons who have been outside the common \ntravel area, for any of the purposes described in sub-paragraph (b); \n\n(b) for the purpose of— \n\n(i) preventing danger to public health as a result of the spread of infection or \n\ncontamination with coronavirus or coronavirus disease, \n\n(ii) monitoring the spread of infection or contamination with coronavirus or coronavirus \n\ndisease, or \n\n(iii) giving effect to any international agreement or arrangement relating to the spread of \n\ninfection or contamination with coronavirus or coronavirus disease; or ", - "page_start": 29, - "page_end": 29, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 170, + "page_end": 170, + "source_file": "00-80T-80.pdf" } ] }, @@ -14597,64 +14597,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 412, + "page_end": 412, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 296, + "page_end": 296, + "source_file": "00-80T-80.pdf" }, { - "text": "**Red Hat OpenShift and IBM Cloud**\n**Paks on IBM Power Systems**\n**Volume 1**\n\nDino Quintero Sudipto Pal \n\nRicardo Dobelin Barros Bogdan Savu \n\nDaniel Casali Richard Wale \n\nLuis Ferreira \n\nAlain Fisher \n\nFederico Fros \n\nLuis Daniel Gonzalez \n\nMiguel Gomez Gonzalez \n\nMahesh Gurugunti \n\nRogelio Rivera Gutierrez \n\nNicolas Joly \n\nBoris Litichevsky \n\nIsmael Solis Moreno \n\nGabriel Padilla ", - "page_start": 1, - "page_end": 1, - "source_file": "sg248459.pdf" + "text": "", + "page_start": 297, + "page_end": 297, + "source_file": "00-80T-80.pdf" }, { - "text": "Quadra-FireTM, while Fireside Hearth & Home distributes, ser- season porch into a year-round porch.” \n\nvices, and sells fireplace systems. “We all went to the Eagan store to purchase our fourth \n\nHeat-N-Glo® fireplace. Once we were walking around the store, What are we up to with all our great brands? We are \n\nmeeting a broad range of customer needs, particularly by sell- taking in the lifestyle environments that are set up and dreaming \n\ning both to consumers and builders through a network of about what our house could look and feel like, we realized we \n\nindependent and company-owned, stand-alone, or gallery- wanted more! We saw an amazing stone surround setting in one of \n\nstyle design and installation centers. These Fireside Hearth & the store displays — and before you knew it, we had bought the \n\nHome design centers — visually impressive and aspirational whole wall. Not only does our new fireplace now have a beautiful \n\nin setting — manifest our proprietary concept of elevating the aesthetic and terrific functionality, but so does our porch. Because \n\nhearth retail, installation, and distribution experience to a new the surround wall installation was so surprisingly easy and clean, ", - "page_start": 27, - "page_end": 27, - "source_file": "NYSE_HNI_2003.pdf" + "text": "", + "page_start": 384, + "page_end": 384, + "source_file": "sg246915.pdf" }, { - "text": "[25] Tom B. Brown, Benjamin Mann, Nick Ryder, Melanie Subbiah, Jared Kaplan, \nPrafulla Dhariwal, Arvind Neelakantan, Pranav Shyam, Girish Sastry, Amanda \nAskell, Sandhini Agarwal, Ariel Herbert-Voss, Gretchen Krueger, Tom Henighan, \nRewon Child, Aditya Ramesh, Daniel M. Ziegler, Jeffrey Wu, Clemens Winter, \nChristopher Hesse, Mark Chen, Eric Sigler, Mateusz Litwin, Scott Gray, Benjamin \nChess, Jack Clark, Christopher Berner, Sam McCandlish, Alec Radford, Ilya \nSutskever, and Dario Amodei. 2020. Language Models are Few-Shot Learners. \nIn Advances in Neural Information Processing Systems 33: Annual Conference on \nNeural Information Processing Systems 2020, NeurIPS 2020, December 6-12, 2020, \nvirtual, Hugo Larochelle, Marc’Aurelio Ranzato, Raia Hadsell, Maria-Florina \nBalcan, and Hsuan-Tien Lin (Eds.). https://proceedings.neurips.cc/paper/2020/ \nhash/1457c0d6bfcb4967418bfb8ac142f64a-Abstract.html ", - "page_start": 11, - "page_end": 11, - "source_file": "arxiv5_ccby4license.pdf" + "text": "", + "page_start": 297, + "page_end": 297, + "source_file": "00-80T-80.pdf" }, { - "text": "With four brand names under the Hearth & Home Technologies Our newest store in Eagan, Minnesota, for example, is \n\numbrella, we are collectively the world’s largest fireplace manu- living proof that we’re succeeding in growing core product \n\nfacturer, the country’s premier fireplace brands, the most rec- share by getting closer to consumers. One customer, a St. Paul, \n\nognized name in the industry, and the preferred brands among Minnesota veterinarian, recently had a typically dynamic retail \n\nhome builders. As the leading provider of hearth and home prod- experience at the Eagan store. He’s among a large group of \n\nucts and services, we make houses feel more like homes. people who own at least one of our hearth products — and \n\nIn addition to our commanding leadership position in who comes back for more. He explains: “When we moved into \n\nmanufacturing the two strongest hearth and home product our house, there were three fireplaces built into the family \n\nbrand names — Heatilator® and Heat-N-Glo® — we also offer room, living room, and kitchen. Since we used them every day \n\ninnovative wood fuel technology, fireplaces, and stoves through and liked them so much, we decided to convert our three- ", - "page_start": 27, - "page_end": 27, - "source_file": "NYSE_HNI_2003.pdf" + "text": "", + "page_start": 296, + "page_end": 296, + "source_file": "00-80T-80.pdf" }, { - "text": "Data contamination issues Bias may exist for \nmodels that use the training sets of the provided \nevaluation datasets for their training. It consider- \nably improves their performance on the benchmark, \nfavouring them over other models. This is particu- \nlarly worrying for models that do not communicate \nabout the datasets used during training, such as pro- \nprietary models. Generally speaking, it would be \ninteresting to calculate the similarity between the \ndatasets used to train the models and those used to \ntest them to check that they are far enough apart to \ndraw general conclusions. \n\nEneko Agirre, Carmen Banea, Daniel Cer, Mona Diab, \nAitor Gonzalez-Agirre, Rada Mihalcea, German \nRigau, and Janyce Wiebe. 2016. SemEval-2016 \ntask 1: Semantic textual similarity, monolingual \nand cross-lingual evaluation. In Proceedings of the \n10th International Workshop on Semantic Evaluation \n(SemEval-2016), pages 497–511, San Diego, Califor- \nnia. Association for Computational Linguistics. \n\nArthur Barbosa, Máverick Ferreira, Rafael Fer- \nreira Mello, Rafael Dueire Lins, and Dragan Ga- \nsevic. 2021. The impact of automatic text transla- \ntion on classification of online discussions for social \nand cognitive presences. In LAK21: 11th Interna- \ntional Learning Analytics and Knowledge Confer- \nence, LAK21, page 77–87, New York, NY, USA. \nAssociation for Computing Machinery. ", - "page_start": 9, - "page_end": 9, - "source_file": "arxiv4.pdf" + "text": "", + "page_start": 296, + "page_end": 296, + "source_file": "00-80T-80.pdf" }, { - "text": "The existence of the hard problem is disputed. It has been accepted by some philosophers of mind such as \nJoseph Levine,[10] Colin McGinn,[11] and Ned Block[12] and cognitive neuroscientists such as Francisco \nVarela,[13] Giulio Tononi,[14][15] and Christof Koch.[14][15] On the other hand, its existence is denied by \nother philosophers of mind, such as Daniel Dennett,[16] Massimo Pigliucci,[17] Thomas Metzinger, \nPatricia Churchland,[18] and Keith Frankish,[19] and by cognitive neuroscientists such as Stanislas \nDehaene,[20] Bernard Baars,[21] Anil Seth,[22] and Antonio Damasio.[23] Clinical neurologist and skeptic ", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia2.pdf" + "text": "", + "page_start": 381, + "page_end": 381, + "source_file": "sg246915.pdf" }, { - "text": "Hearth & Home Technologies, you warm our \n\nhearts by making a powerful impact on our \n\nlives; you are the ones who transform our \n\nhouses into homes. First, you warmed up \n\nour living rooms and family rooms with style, \n\nelegance, and comfort. Now, you’re heating \n\nup our porches and our kitchens … and find- \n\ning creative and innovative ways to make our \n\nbedrooms, bathrooms, dens, guest rooms, \n\nand kids’ rooms all toasty with your beautiful \n\nglow. The home fires are burning brighter and \n\nhotter than ever, now that you’ve come into \n\nour lives. ", - "page_start": 25, - "page_end": 25, - "source_file": "NYSE_HNI_2003.pdf" + "text": "", + "page_start": 380, + "page_end": 380, + "source_file": "sg246915.pdf" }, { - "text": "Haoran Li, Abhinav Arora, Shuohui Chen, Anchit \nGupta, Sonal Gupta, and Yashar Mehdad. 2021. \nMTOP: A comprehensive multilingual task-oriented \nsemantic parsing benchmark. In Proceedings of the \n16th Conference of the European Chapter of the Asso- \nciation for Computational Linguistics: Main Volume, \npages 2950–2962, Online. Association for Computa- \ntional Linguistics. \nAlexander R Fabbri, Wojciech Kry´sci´nski, Bryan Mc- \nCann, Caiming Xiong, Richard Socher, and Dragomir \nRadev. 2021. Summeval: Re-evaluating summariza- \ntion evaluation. Transactions of the Association for \nComputational Linguistics, 9:391–409. \n\nManuel Faysse, Patrick Fernandes, Nuno M. Guerreiro, \nAntónio Loison, Duarte M. Alves, Caio Corro, Nico- \nlas Boizard, João Alves, Ricardo Rei, Pedro H. Mar- \ntins, Antoni Bigata Casademunt, François Yvon, An- \ndré F. T. Martins, Gautier Viaud, Céline Hudelot, \nand Pierre Colombo. 2024. Croissantllm: A truly \nbilingual french-english language model. ", - "page_start": 10, - "page_end": 10, - "source_file": "arxiv4.pdf" + "text": "", + "page_start": 150, + "page_end": 150, + "source_file": "00-80T-80.pdf" } ] }, @@ -14665,70 +14665,70 @@ "target_page": 20, "target_passage": " On July 9th, 2019, IBM closed its acquisition of Red Hat, a leader in enterprise Linux and open source technology", "chunk_present": { - "presence": true, - "index": 3 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 56, + "page_end": 56, + "source_file": "ASX_MRM_2000.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 240, + "page_end": 240, + "source_file": "00-80T-80.pdf" }, { - "text": "This publication describes how Red Hat and IBM can advance your cloud journey and speed \ngrowth and innovation for your business by using Red Hat OpenShift on IBM Power Systems. \n\n**Note:**Red Hat joins IBM as a distinct unit, preserving the independence and neutrality of \nRed Hat’s open source development heritage and unique development culture. Red Hat’s \nunwavering commitment to open source remains unchanged and it continues to offer \ncustomers choice and flexibility. ", - "page_start": 21, - "page_end": 21, - "source_file": "sg248459.pdf" + "text": "", + "page_start": 48, + "page_end": 48, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "**1.2 Red Hat and IBM**\n\nOn July 9th, 2019, IBM closed its acquisition of Red Hat, a leader in enterprise Linux and \nopen source technology. \n\nThis acquisition puts Red Hat and IBM in a unique position to unlock the true value of hybrid \ncloud for your business. By combining the power and flexibility of Red Hat’s open hybrid cloud \ntechnologies with the scale and depth of IBM innovation and industry expertise, you now have \nthe tools to accelerate your cloud journey. \n\nIBM and Red Hat worked together for more than 20 years in making open source a \ncompetitive advantage for businesses on x86, IBM Power Systems, and IBM z Systems®. \nTogether, we are both on a mission to improve open source technology and help your \ncompanies capture the business value of the cloud. ", - "page_start": 20, - "page_end": 20, - "source_file": "sg248459.pdf" + "text": "", + "page_start": 400, + "page_end": 400, + "source_file": "00-80T-80.pdf" }, { - "text": "**subscription-manager refresh**\nAll local data refreshed \n**subscription-manager list --available --matches '*OpenShift*'**\nSubscription Name:**Red Hat OpenShift Container Platform for Power, LE Business Partner**\n**NFR, Self-Supported**\nProvides: Red Hat Enterprise Linux for Power, little endian - Extended Update \nSupport \n Red Hat Enterprise Linux Fast Datapath Beta for Power, little \nendian \n Red Hat Enterprise Linux for Power, little endian \n Red Hat Ansible Engine \n Red Hat OpenShift Enterprise Application Node \n Red Hat Enterprise Linux for Power 9 \n Red Hat Software Collections (for RHEL Server for IBM Power LE) \n Red Hat OpenShift Container Platform for Power \n Red Hat Software Collections Beta (for RHEL Server for IBM Power \nLE) \n RHEL for SAP HANA for Power, little endian - Extended Update \nSupport \n Red Hat Beta \n Red Hat OpenShift Container Platform Client Tools for Power \n Red Hat Enterprise Linux Fast Datapath (for RHEL Server for IBM \nPower LE) \n RHEL for SAP for Power, little endian - Extended Update Support \n Red Hat Enterprise Linux for Power, little endian Beta \n Red Hat Container Native Virtualization \n Red Hat CodeReady Linux Builder for Power, little endian - Extended \nUpdate Support \nSKU: 111111111 \nContract: 111111111 \nPool ID: \nProvides Management: No \nAvailable: Unlimited \nSuggested: 1 \nService Level: Standard \nService Type: L1-L3 \nSubscription Type: Stackable \nStarts: 05/31/2019 \nEnds: 05/31/2020 \nSystem Type: Virtual ", - "page_start": 122, - "page_end": 122, - "source_file": "sg248459.pdf" + "text": "", + "page_start": 48, + "page_end": 48, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "4. Attach to the Red Hat subscription Pool: \n\n**ansible -i nodes -a 'subscription-manager attach**\n**--pool={{POOL_ID}}'**\n... \nOutput truncated \n... \nwkrnode03.domain.example.com | SUCCESS | rc=0 >> \nSuccessfully attached a subscription for: Red Hat OpenShift Container Platform for \nPower, LE Business Partner NFR, Self-Supported \n\n5. Enable Red Hat repositories for IBM POWER9: ", - "page_start": 145, - "page_end": 145, - "source_file": "sg248459.pdf" + "text": "", + "page_start": 241, + "page_end": 241, + "source_file": "00-80T-80.pdf" }, { - "text": "**1.1 Introduction**\n\nMost companies started or are contemplating their journey to cloud. Although in recent years \nthe adoption of cloud became much more common place, the scope of what a cloud is or can \nbe also increased. This broadening of possibilities unfortunately added confusion and can \nresult in companies being unsure of how their existing application estate can change to \nintegrate with the cloud model. \n\nAs such, doubts still exist around how to start and progress on this journey. It is also true that \nalthough people understand traditional enterprise applications and more modern \ncloud-hosted applications, the integration or co-existence of both can prove equally confusing \nand contradicting. \n\nRecent industry trends, combined with the new partnership between Red Hat and IBM, seek \nto bring some clarity to the landscape while providing new modernization opportunities for \nexisting enterprise applications and familiar environments. \n\nThe main focus of this IBM Redbooks publication relates to IBM Cloud Paks and Red Hat \nOpenShift, which is hosted on IBM Power Systems. Although individually much can be written \nabout either topic, the relationship this publication highlights is between Red Hat OpenShift \nand IBM Power Systems. \n\nWe show what Red Hat OpenShift brings to the IBM Power Systems platform specifically \ndiscuss how it can be deployed and added into existing familiar Power System environments, \nand the benefits that integration and co-existence can provide from an existing enterprise \napplication viewpoint. ", - "page_start": 20, - "page_end": 20, - "source_file": "sg248459.pdf" + "text": "", + "page_start": 35, + "page_end": 35, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "**IBM Redbooks**\n\nThe IBM Redbooks publication IBM PowerVM Best Practices, SG24-8062, provides more \ninformation about the topic in this document. Note that this publication might be available in \nsoftcopy only. \n\nYou can search for, view, download or order this documents and other Redbooks, Redpapers, \nWeb Docs, draft, and other materials, at the following website: \n\n**ibm.com**/redbooks ", - "page_start": 265, - "page_end": 265, - "source_file": "sg248459.pdf" + "text": "", + "page_start": 35, + "page_end": 35, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "**IBM Redbooks**\n\nThe following IBM Redbooks publications provide more information about the topic in \nthis document (note that some publications referenced in this list might be available in \nsoftcopy only): \n\n(cid:2) IBM b-type Gen 5 16 Gbps Switches and Network Advisor, SG24-8186 \n\n(cid:2) IBM System Storage SAN Volume Controller and Storwize V7000 Best Practices and \nPerformance Guidelines, SG24-7521 \n\n(cid:2) Implementing the IBM Storwize V5000 Gen2 (including the Storwize V5010, V5020, and \nV5030), SG24-8162 \n\n(cid:2) Implementing the IBM System Storage SAN Volume Controller with IBM Spectrum \nVirtualize V7.8, SG24-7933 \n\nYou can search for, view, download, or order these documents and other Redbooks, \nRedpapers, Web Docs, draft and additional materials, at the following website: \n\n**ibm.com**/redbooks \n\nThe following IBM Redbooks publication web pages that are related to this book are also \nuseful resources: \n\n(cid:2) IBM Storage Networking Redbooks: \n\nhttp://www.redbooks.ibm.com/Redbooks.nsf/domains/san \n\n(cid:2) IBM Flash Storage Redbooks: \n\nhttp://www.redbooks.ibm.com/Redbooks.nsf/domains/flash \n\n(cid:2) IBM Software Defined Storage Redbooks: \n\nhttp://www.redbooks.ibm.com/Redbooks.nsf/domains/sds \n\n(cid:2) IBM Disk Storage Redbooks: \n\nhttp://www.redbooks.ibm.com/Redbooks.nsf/domains/disk \n\n(cid:2) IBM Storage Solutions Redbooks: \n\nhttp://www.redbooks.ibm.com/Redbooks.nsf/domains/storagesolutions \n\n(cid:2) IBM Tape storage Redbooks: \n\nhttp://www.redbooks.ibm.com/Redbooks.nsf/domains/tape ", - "page_start": 811, - "page_end": 811, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 34, + "page_end": 34, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "This publication is a first volume in a planned multi-volume publication over the next 12 - 18 \nmonths. Within this initial volume, we explain the fundamental perspective (which is accurate \nas of the time of this writing) while providing pointers to future direction that will be discussed \nin future volumes. \n\n**Note:**This initial publication relates to Red Hat OpenShift 3.11, because this release was \nthe current OpenShift Container Platform (OCP) release for IBM Power Systems at the \ntime of this writing. IBM and Red Hat intend to deliver Red Hat OpenShift 4 for IBM \nPOWER® to accelerate agility for enterprise clients through integrated tooling and a \nfeature-rich Kubernetes container platform for cloud-native development on POWER9 and \nIBM POWER8® processor-based servers. ", - "page_start": 20, - "page_end": 20, - "source_file": "sg248459.pdf" + "text": "", + "page_start": 241, + "page_end": 241, + "source_file": "00-80T-80.pdf" } ] }, @@ -14745,64 +14745,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 184, + "page_end": 184, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**Manually assigning an external IP to a service**\nA Kubernetes service serves as an internal load balancer. It identifies a set of replicated pods \nto proxy the connections it receives to them. Backing pods can be added to or removed from \na service arbitrarily, although the service remains consistently available, which enables \nanything that depends on the service to refer to it at a consistent address. ", - "page_start": 82, - "page_end": 82, - "source_file": "sg248459.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "• For a step-by-step guide to account types and login management, see Signing in to the AWS \n\nManagement Console. \n\n• AWS Identity and Access Management (IAM) is the service to manage entities and resources \n\nauthorized to use services and service resources. ", - "page_start": 14, - "page_end": 14, - "source_file": "serverless-core.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**What is Identity and Access Management?**\n\nAWS provides and uses a service called Identity and Access Management (IAM) for authentication \n\nand authorization. IAM is used to manage developer accounts and secure the interaction between \nservices and resources. \n\n| | | |\n|---|---|---|\n| | | |\n| | Warning Security is an important, complex, and broad topic. Large organizations generally have specific operational procedures that developers need to follow. This guide will explain only essential concepts necessary to get started with AWS services. If in doubt, consult your IT department or the official security documentation. | |\n| | | |\n", - "page_start": 40, - "page_end": 40, - "source_file": "serverless-core.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "There are many well-established, common patterns in distributed architectures that you can build \n\nyourself or implement using AWS services. For most customers, there is little commercial value in \n\ninvesting time to develop these patterns from scratch. When your application needs one of these \n\npatterns, use the corresponding AWS service: \n\n**Common patterns and corresponding AWS services**\n\n| Pattern | AWS service |\n|---|---|\n| Pattern | AWS service |\n| Queue | Amazon SQS |\n| Event bus | EventBridge |\n| Publish/subscribe (fan-out) | Amazon SNS |\n", - "page_start": 23, - "page_end": 23, - "source_file": "serverless-core.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "(4) In this regulation— \n\n“authorised person” means— \n(a) a constable, \n(b) the Civil Aviation Authority, \n(c) the Secretary of State, or \n(d) a person authorised by the Civil Aviation Authority or the Secretary of State under the \nAir Navigation Order 2016(**a**); \n\n“operator” has the meaning given in article 4 of the Air Navigation Order 2016; \n\n“pilot in command” and “private aircraft” have the meanings given in the Air Navigation \nOrder 2016 (see Schedule 1 to that Order); \n\n“relevant transport service”, in relation to an operator, means a transport service provided by \nor on behalf of that operator; \n\n“transport service” means— \n(a) a relevant service, \n(b) a shuttle service, \n(c) a service (other than a relevant service) which— \n\n(i) is carrying passengers travelling to England from outside the common travel area \n\n(whether for payment or valuable consideration or otherwise), and \n(ii) is provided by means of an aircraft (other than a private aircraft), or \n\n(d) a flight which— \n\n(i) is carrying passengers travelling to England from outside the common travel area \n(whether for payment or valuable consideration or otherwise), and \n\n(ii) is provided by means of a private aircraft. ", - "page_start": 23, - "page_end": 23, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Our residential collection operations involve the curbside collection of refuse from small containers into \ncollection vehicles for transport to transfer stations or directly to landÑlls. Residential solid waste collection \nservices are typically performed under contracts with municipalities, which we generally secure by competitive \nbid and which give our company exclusive rights to service all or a portion of the homes in their respective \njurisdictions. These contracts or franchises usually range in duration from one to Ñve years, although some of \nour exclusive franchises are for signiÑcantly longer periods. Residential solid waste collection services may also \nbe performed on a subscription basis, in which individual households contract directly with our company. The \nfees received for subscription residential collection are based primarily on market factors, frequency and type \nof service, the distance to the disposal facility and cost of disposal. In general, subscription residential \ncollection fees are paid quarterly in advance by the residential customers receiving the service. \n\nIn our commercial and industrial collection operations, we supply our customers with waste containers of \nvarying sizes. We also rent compactors to large waste generators. Commercial collection services are generally \nperformed under one- to three-year service agreements, and fees are determined by such considerations as: \n\n‚ market factors, \n\n‚ collection frequency, ", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_RSG_2004.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\nEFFECT OF OVERSTRESS ON SERVICE \n\nLIFE ", - "page_start": 362, - "page_end": 362, - "source_file": "00-80T-80.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "A loose analogy for IAM roles are that of professional uniforms: a surgeon's scrubs, a firefighter's \n\nhardhat, or a startup CTO's favorite hoodie. Many people can*assume the role*of a surgeon, \n\nfirefighter, and startup CTO, which identifies them with a certain job function. \n\nOne of the most useful things about IAM roles is they can be associated not only with human \n\nentities, but also with AWS services. These types of roles are known as*service roles*. This means you \n\ncan assign an IAM role directly to a service. With an IAM role assigned to the service instance, you \ncan then associate specific IAM policies with the instance role, so that the service instance itself can \n\naccess other AWS services. This is extremely useful for automation. \n\n**Authorization - PARC**\n\nSo far we've been talking about principals. Principals represent the**authentication**component. For \nauthorization, you will attach JSON documents called*IAM policies*to principals. \n\n**Principals**\n\nAs mentioned,*principals*are the entities that are allowed or denied access. \n\n**Actions**\n\n*Actions*are the type of access that is allowed or denied. Actions are commonly AWS service API \n\ncalls that represent create, read, describe, list, update, and delete semantics. ", - "page_start": 44, - "page_end": 44, - "source_file": "serverless-core.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" } ] }, @@ -14813,70 +14813,70 @@ "target_page": 1, "target_passage": "Creative Commons supports two distinct public domain tools, the CC0 Public Domain Dedication and the Public Domain Mark.", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 26, + "page_end": 26, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 393, + "page_end": 393, + "source_file": "00-80T-80.pdf" }, { - "text": "Public domain works are valuable because anyone \ncan freely build upon, enhance, and reuse them for \nany purposes without restriction under copyright \nor database law. \n\nThat’s why it’s important for creators to have a clear and \nlegally robust way to place their works in the public domain as \ncompletely as possible, and it’s also important for publishers \nand archives to have a standardized way to identify works that \nare already in the public domain. \n\nCreative Commons supports two distinct public domain tools, \nthe CC0 Public Domain Dedication and the Public Domain \nMark. Creative Commons copyright licenses help authors \nmanage their copyright on terms they choose. Conversely, CC0 \nenables authors and copyright owners who want to dedicate \ntheir works to the worldwide public domain to do so, and PDM \nfacilitates the labeling and discovery of works that are already \nfree of known copyright restrictions. \n\nWhere public domain tools fit in the copyright spectrum \n\nCC0 \nPublic \ndomain \nSome rights \nreserved All rights \nreserved \n\nPDM \nNo known \ncopyright ", - "page_start": 1, - "page_end": 1, - "source_file": "Publicdomain.pdf" + "text": "", + "page_start": 396, + "page_end": 396, + "source_file": "00-80T-80.pdf" }, { - "text": "This is a frame from “Twenty Years of Creative Commons (in Sixty Seconds)” by Ryan Junell and Glenn \nOtis Brown for Creative Commons licensed under CC BY 4.0. It includes adaptations of multiple open \nand public domain works. View full licensing and attribution information about all works included in the \nvideo on Flickr. ", - "page_start": 12, - "page_end": 12, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + "text": "", + "page_start": 396, + "page_end": 396, + "source_file": "00-80T-80.pdf" }, { - "text": "What Is Creative Commons? \nCreative Commons is a global nonprofit organization \ndedicated to supporting an open and accessible Internet \nthat is enriched with free knowledge and creative resources \nfor people around the world to use, share, and cultivate. \n\nOur easy-to-use licenses provide a simple, standardized way \nto give the public permission to share and use your creative \nwork — on conditions of your choice. CC licenses let you \nchange your copyright terms from the default of “all rights \nreserved” to “some rights reserved.” \n\nMillions of people use CC licenses on some of the world’s \nmost popular platforms for user-generated content. When \nyou use a CC license to share your photos, videos, or blog, \nyour creation joins a globally accessible pool of resources \nthat includes the work of artists, educators, scientists, and \ngovernments. ", - "page_start": 1, - "page_end": 1, - "source_file": "Publicdomain.pdf" + "text": "", + "page_start": 396, + "page_end": 396, + "source_file": "00-80T-80.pdf" }, { - "text": "**Publisher’s note**Springer Nature remains neutral with regard to jurisdictional claims in \npublished maps and institutional affiliations. \n\n**Open Access**This article is licensed under a Creative Commons Attribution \n4.0 International License, which permits use, sharing, adaptation, distribution \nand reproduction in any medium or format, as long as you give appropriate \n\ncredit to the original author(s) and the source, provide a link to the Creative Commons licence, \nand indicate if changes were made. The images or other third party material in this article are \nincluded in the article’s Creative Commons licence, unless indicated otherwise in a credit line \nto the material. If material is not included in the article’s Creative Commons licence and your \nintended use is not permitted by statutory regulation or exceeds the permitted use, you will \nneed to obtain permission directly from the copyright holder. To view a copy of this licence, \nvisit http://creativecommons.org/licenses/by/4.0/. genome-wide genealogies. Preprint at*bioRxiv*https://doi.org/10.1101/2021.07.13.452277 \n(2021). \n41. Coop, G. Genetic similarity versus genetic ancestry groups as sample descriptors in \nhuman genetics. Preprint at https://arxiv.org/abs/2207.11595 (2022). \n© The Author(s) 2025 ", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed3.pdf" + "text": "", + "page_start": 396, + "page_end": 396, + "source_file": "00-80T-80.pdf" }, { - "text": "Creative Commons (CC) is the global nonprofit organization behind the CC \nLicenses and public domain tools, which power open sharing on popular \nplatforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. \nSince 2002, the CC Licenses have served as an alternative to traditional \ncopyright, providing a simple, standardized, and legal way for individuals and \ninstitutions to freely share images, music, research, educational resources, and \ncultural artifacts. \n\n**Chief Executive Officer**\nAnna Tumadóttir \n\n**General Counsel**\nKat Walsh ", - "page_start": 2, - "page_end": 2, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + "text": "", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": " In this way, we do not use “commons” in the narrow sense of permissively licensed. What’s more, this \n4 \nresource could also be governed as more of a data “trust,” and, indeed, we discuss extensively the work \nof HathiTrust as a relevant project in this domain. However, our use of the word “commons” is not \nmeant to preclude this or other arrangements. \n\n There are, of course, a range of other types of texts that are not on the web and/or not digital at all - \n5 \ne.g., periodicals, journals, government documents. These are out of scope for this paper, but also worthy \nof further analysis. ", - "page_start": 3, - "page_end": 3, - "source_file": "creative_common_ai.pdf" + "text": "", + "page_start": 396, + "page_end": 396, + "source_file": "00-80T-80.pdf" }, { - "text": "© The Author(s) 2023. Published by Oxford University Press. \nThis is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which \npermits unrestricted reuse, distribution, and reproduction in any medium, provided the original work is properly cited. ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed1.pdf" + "text": "", + "page_start": 395, + "page_end": 395, + "source_file": "00-80T-80.pdf" }, { - "text": "**Copyright:**© 2025 by the authors. \nLicensee MDPI, Basel, Switzerland. \nThis article is an open access article \ndistributed under the terms and \nconditions of the Creative Commons \nAttribution (CC BY) license \n(https://creativecommons.org/ \nlicenses/by/4.0/). ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed7_cc4.pdf" + "text": "", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_RCI_2013.pdf" } ] }, @@ -14887,70 +14887,70 @@ "target_page": 1, "target_passage": " Creative Commons is a global nonprofit organization dedicated to supporting an open and accessible Internet that is enriched with free knowledge and creative resources for people around the world to use, share, and cultivate.", "chunk_present": { - "presence": true, - "index": 3 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 276, + "page_end": 276, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "This is a frame from “Twenty Years of Creative Commons (in Sixty Seconds)” by Ryan Junell and Glenn \nOtis Brown for Creative Commons licensed under CC BY 4.0. It includes adaptations of multiple open \nand public domain works. View full licensing and attribution information about all works included in the \nvideo on Flickr. ", - "page_start": 12, - "page_end": 12, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + "text": "", + "page_start": 338, + "page_end": 338, + "source_file": "00-80T-80.pdf" }, { - "text": "What Is Creative Commons? \nCreative Commons is a global nonprofit organization \ndedicated to supporting an open and accessible Internet \nthat is enriched with free knowledge and creative resources \nfor people around the world to use, share, and cultivate. \n\nOur easy-to-use licenses provide a simple, standardized way \nto give the public permission to share and use your creative \nwork — on conditions of your choice. CC licenses let you \nchange your copyright terms from the default of “all rights \nreserved” to “some rights reserved.” \n\nMillions of people use CC licenses on some of the world’s \nmost popular platforms for user-generated content. When \nyou use a CC license to share your photos, videos, or blog, \nyour creation joins a globally accessible pool of resources \nthat includes the work of artists, educators, scientists, and \ngovernments. ", - "page_start": 1, - "page_end": 1, - "source_file": "Publicdomain.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "© The Author(s) 2023. Published by Oxford University Press. \nThis is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which \npermits unrestricted reuse, distribution, and reproduction in any medium, provided the original work is properly cited. ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed1.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "**Publisher’s note**Springer Nature remains neutral with regard to jurisdictional claims in \npublished maps and institutional affiliations. \n\n**Open Access**This article is licensed under a Creative Commons Attribution \n4.0 International License, which permits use, sharing, adaptation, distribution \nand reproduction in any medium or format, as long as you give appropriate \n\ncredit to the original author(s) and the source, provide a link to the Creative Commons licence, \nand indicate if changes were made. The images or other third party material in this article are \nincluded in the article’s Creative Commons licence, unless indicated otherwise in a credit line \nto the material. If material is not included in the article’s Creative Commons licence and your \nintended use is not permitted by statutory regulation or exceeds the permitted use, you will \nneed to obtain permission directly from the copyright holder. To view a copy of this licence, \nvisit http://creativecommons.org/licenses/by/4.0/. genome-wide genealogies. Preprint at*bioRxiv*https://doi.org/10.1101/2021.07.13.452277 \n(2021). \n41. Coop, G. Genetic similarity versus genetic ancestry groups as sample descriptors in \nhuman genetics. Preprint at https://arxiv.org/abs/2207.11595 (2022). \n© The Author(s) 2025 ", - "page_start": 9, - "page_end": 9, - "source_file": "pubmed3.pdf" + "text": "", + "page_start": 338, + "page_end": 338, + "source_file": "00-80T-80.pdf" }, { - "text": "© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access \narticle distributed under the terms and conditions of the Creative Commons Attribution \n(CC BY) license (http://creativecommons.org/licenses/by/4.0/). ", - "page_start": 22, - "page_end": 22, - "source_file": "pubmed10.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "**Copyright:**© 2025 by the authors. \nLicensee MDPI, Basel, Switzerland. \nThis article is an open access article \ndistributed under the terms and \nconditions of the Creative Commons \nAttribution (CC BY) license \n(https://creativecommons.org/ \nlicenses/by/4.0/). ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed7_cc4.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "Creative Commons (CC) is the global nonprofit organization behind the CC \nLicenses and public domain tools, which power open sharing on popular \nplatforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. \nSince 2002, the CC Licenses have served as an alternative to traditional \ncopyright, providing a simple, standardized, and legal way for individuals and \ninstitutions to freely share images, music, research, educational resources, and \ncultural artifacts. \n\n**Chief Executive Officer**\nAnna Tumadóttir \n\n**General Counsel**\nKat Walsh ", - "page_start": 2, - "page_end": 2, - "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "**Funding**\nFunding was provided by the National Key Research and Development program of China (Grant Nos. \n2019YFA0607403 and 2017YFD0300301) and National Natural Science Foundation of China (Grant Nos. \n41961124007 and 41871026). \n\n**Competing interests**\nThe authors declare no competing interests. \n\n**Additional information**\n**Correspondence**and requests for materials should be addressed to K.L. \n\n**Reprints and permissions information**is available at www.nature.com/reprints. \n\n**Publisher’s note**Springer Nature remains neutral with regard to jurisdictional claims in published maps and \ninstitutional affiliations. \n\n**Open Access**This article is licensed under a Creative Commons Attribution 4.0 International \nLicense, which permits use, sharing, adaptation, distribution and reproduction in any medium or \nformat, as long as you give appropriate credit to the original author(s) and the source, provide a link to the \nCreative Commons licence, and indicate if changes were made. The images or other third party material in this \narticle are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the \nmaterial. If material is not included in the article’s Creative Commons licence and your intended use is not \npermitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from \nthe copyright holder. To view a copy of this licence, visit http:// creat iveco mmons. org/ licen ses/ by/4. 0/. ", - "page_start": 14, - "page_end": 14, - "source_file": "pubmed9.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_SMFG_2011.pdf" } ] }, @@ -14961,70 +14961,70 @@ "target_page": 1, "target_passage": "Simply visit the PDM chooser (http://creativecommons.org/choose/mark) which will lead you through the proces. When completed, you will be provided with the HTML code that you can copy and paste into your website.", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 191, + "page_end": 191, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 281, + "page_end": 281, + "source_file": "00-80T-80.pdf" }, { - "text": "Works marked with the Public Domain Mark have been \nidentified as being free of known restrictions under copyright \nlaw, including all related and neighboring rights. Anyone can \ncopy, modify, distribute, and perform such works, even for \ncommercial purposes, all without asking permission. \n\nApplying the PDM to a work is easy. Simply visit the PDM \nchooser (http://creativecommons.org/choose/mark) which \nwill lead you through the proces. When completed, you will be \nprovided with the HTML code that you can copy and paste into \nyour website. \n\nCreative Commons does not recommend this tool for works that \nare restricted by copyright laws in one or more jurisdictions. \nConsult with your legal advisor if you are unsure whether you \nshould use the PDM for a certain work. ", - "page_start": 1, - "page_end": 1, - "source_file": "Publicdomain.pdf" + "text": "", + "page_start": 280, + "page_end": 280, + "source_file": "00-80T-80.pdf" }, { - "text": "**10.6 Submit inventory (PM)**\n\nThis section describes on how the PM submits the inventory by selecting tables for the general submission after \nbeing approved by the NFP (See section 10.5). \n\n**10.6.1 Submit select tables for preparing the general submission**\n\n1. Log in as PM. \n2. Click on “View Inventories Progress” under sub menu “Submission Management”. \n3. The “View Inventories Progress” screen appears. \n4. Select the appropriate inventory by clicking the box under column “Working inventory” (figure 68, a). \n***Note: The selected inventory year to be submitted should be in status “approved” (figure 68, b). \n5. Click on “Work on Inventories” under Submission Management (figure 68, c). \nThis opens the Submit Inventory initial screen (figure 69). \n\n6. Click the inventory year to be submitted (figure 69, a). \n7. Press the “Generate Official Submission” button (figure 69, c). \n\n***Figure 68. View Inventories Progress screen – select inventory for the preparation for the general submission***", - "page_start": 42, - "page_end": 42, - "source_file": "maiis-user-manual.pdf" + "text": "", + "page_start": 280, + "page_end": 280, + "source_file": "00-80T-80.pdf" }, { - "text": "**10 Submission management**\n\n**10.1 Workflow**\n\nCreating and preparing an inventory, generating tables for checking by the NFP and approving and/or rejecting \nsubmission, follows a number of steps known collectively as a workflow. This chapter describes the workflow relating \nto the submission of the GHG inventory/(ies), which users should follow to create, prepare, and send GHG \ninventories for internal checking, and approval/rejection of the submission by the NFP, within the NAIIS web \napplication (figure 52). ", - "page_start": 35, - "page_end": 35, - "source_file": "maiis-user-manual.pdf" + "text": "", + "page_start": 280, + "page_end": 280, + "source_file": "00-80T-80.pdf" }, { - "text": "**10.2 Start of inventory/submission (NFP or PM)**\n\nThis procedure allows the NFP or PM to start a new (created) inventory. The existing data for the inventory year \nidentified will be made available in the new inventory/submission. \n\nThese are the steps to start a new inventory: \n\n1. Click on “View Inventories Progress” under sub menu “Submission Management” (figure 53). ", - "page_start": 35, - "page_end": 35, - "source_file": "maiis-user-manual.pdf" + "text": "", + "page_start": 280, + "page_end": 280, + "source_file": "00-80T-80.pdf" }, { - "text": "**10.3 Send for checking (PM)**\n\nOnce the SE’s/or PM’s have prepared the national GHG inventory, by entering data into the sectoral grids and the \nPM of the Party has checked the complete GHG inventory for consistency and correctness, the following steps allows \nthe PM to send the inventory for checking: \n\n1. Log in as PM. \n2. Click on “View Inventories Progress” under sub menu “Submission Management”. \n3. The “View Inventories Progress” screen appears. \n4. Select the appropriate inventory by clicking the Inventory name under column “Name” (figure 58, a). \n5. Press the “Send for Checking by NFP” button to send it to the NFP for his review and approval (figure 58, b). \n***Note: A notification email will be sent to the NFP email address, and the status changed to “check” \n(figure 59). ", - "page_start": 37, - "page_end": 37, - "source_file": "maiis-user-manual.pdf" + "text": "", + "page_start": 280, + "page_end": 280, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\nRATE OF \nDESCENT, \nFPM \n\nCLEAN CONFIGURATION ", - "page_start": 388, - "page_end": 388, + "text": "", + "page_start": 280, + "page_end": 280, "source_file": "00-80T-80.pdf" }, { - "text": "• For a step-by-step guide to account types and login management, see Signing in to the AWS \n\nManagement Console. \n\n• AWS Identity and Access Management (IAM) is the service to manage entities and resources \n\nauthorized to use services and service resources. ", - "page_start": 14, - "page_end": 14, - "source_file": "serverless-core.pdf" + "text": "", + "page_start": 281, + "page_end": 281, + "source_file": "00-80T-80.pdf" }, { - "text": "(cid:2) Use PowerVC to manage the LPM feature to migrate VMs from one host to another. The \nLPM is important for frame evacuation during maintenance operations. It is recommended \nto include a dedicated Network interface for VIO management. \n\nFigure 5-9 shows how LPM is working with HMC configuration. ", - "page_start": 106, - "page_end": 106, - "source_file": "sg248459.pdf" + "text": "", + "page_start": 281, + "page_end": 281, + "source_file": "00-80T-80.pdf" } ] }, @@ -15035,70 +15035,70 @@ "target_page": 1, "target_passage": "It is located at the confluence of the rivers Rhône and Saône, ", "chunk_present": { - "presence": true, - "index": 3 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 298, + "page_end": 298, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 303, + "page_end": 303, + "source_file": "00-80T-80.pdf" }, { - "text": "The capital of the Gauls during the Roman Empire, Lyon is the seat of \nan archbishopric whose holder bears the title of Primate of the Gauls. \nLyon became a major economic hub during the Renaissance. The city is \nrecognised for its cuisine and gastronomy, as well as historical and \narchitectural landmarks; as such, the districts of Old Lyon, the Fourvière \nhill, the Presqu'île and the slopes of the Croix-Rousse are inscribed on \nthe UNESCO World Heritage List. Lyon was historically an important \narea for the production and weaving of silk. Lyon played a significant \nrole in the history of cinema since Auguste and Louis Lumière invented \nthe cinematograph there. The city is also known for its light festival, the \nFête des lumières, which begins every 8 December and lasts for four \ndays, earning Lyon the title of \"Capital of Lights\". \n\nis a major centre for banking, chemical, \nEconomically, Lyon \npharmaceutical and biotech industries. The city contains a significant \nsoftware industry with a particular focus on video games; in recent years \nit has fostered a growing local start-up sector.[17] The home of renowned \nuniversities and higher education schools, Lyon is the second-largest \nstudent city in France, with a university population of nearly 200,000 \nstudents within the Metropolis of Lyon.[18] Lyon hosts the international \nheadquarters of Interpol, the International Agency for Research on \nCancer, as well as Euronews. According to the Globalization and World \nRankings Research Institute, Lyon is considered a Beta city, as of \n2018.[19] It ranked second in France and 40th globally in Mercer's 2019 \nliveability rankings.[20] ", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia4.pdf" + "text": "", + "page_start": 302, + "page_end": 302, + "source_file": "00-80T-80.pdf" }, { - "text": "**Lyon**\n\n**Lyon**[c] (Franco-Provençal:*Liyon*) is the second-largest city in France \nby urban area and the third largest by city limits.[14] It is located at the \nconfluence of the rivers Rhône and Saône, to the northwest of the \nFrench Alps, 391 km (243 mi) southeast of Paris, 278 km (173 mi) north \nof Marseille, 113 km (70 mi) southwest of Geneva, Switzerland, 58 km \n(36 mi) northeast of Saint-Étienne. \n\n**Lyon**\n\n*Liyon*(Arpitan) \n\n**Prefecture and commune**\n\nThe City of Lyon had a population of 522,250 at the Jan. 2021 census \nwithin its small municipal territory of 48 km2 (19 sq mi),[15] but \ntogether with its suburbs and exurbs the Lyon metropolitan area had a \npopulation of 2,308,818 that same year,[7] the second most populated in \nFrance. Lyon and 58 suburban municipalities have formed since 2015 \nthe Metropolis of Lyon, a directly elected metropolitan authority now in \ncharge of most urban issues, with a population of 1,424,069 in 2021.[16] \nLyon is the prefecture of the Auvergne-Rhône-Alpes region and seat of \nthe Departmental Council of Rhône (whose jurisdiction, however, no \nlonger extends over the Metropolis of Lyon since 2015). \n\nSkyline of Lyon in La Part-Dieu ", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia4.pdf" + "text": "", + "page_start": 303, + "page_end": 303, + "source_file": "00-80T-80.pdf" }, { - "text": "**Metropolis**\nSince 2015, the commune of Lyon (48 km2 (19 sq mi) in land area) and 58 suburban communes \nhave formed the Metropolis of Lyon (534 km2 (206 sq mi) in land area), a directly elected \nmetropolitan authority now in charge of most urban issues. The Metropolis of Lyon is the only \nmetropolitan authority in France which is a territorial collectivity, on par with French communes \nand departments. Its metropolitan council was for the first time directly elected by universal \nsuffrage in 2020 within 14 electoral wards, the only directly elected metropolitan council in \nFrance. \n\nThe 14 electoral wards are the following (see map for location): \n\n Lônes et coteaux \n\nMap of the Metropolis of \nLyon and its 59 \ncommunes (the \ncommune of Lyon is in \nred) \n\n Lyon-Centre (Lyon-Centre) \n\n Lyon-Est (Lyon-East) \n Lyon-Nord (Lyon-North) \n\n Lyon-Ouest \n\n Lyon-Sud \n Lyon-Sud-Est \n\n Ouest \n Plateau Nord-Caluire \n\n Porte des Alpes \n\n Portes du Sud \n Rhône Amont \n\n Val de Saône \n\n Villeurbanne \n\nThe six wards with names starting with \"Lyon\" are all located within the commune of Lyon. The Villeurbanne ward is \ncoterminous with the namesake commune. All other seven wards each group various suburban communes. ", - "page_start": 9, - "page_end": 9, - "source_file": "wikipedia4.pdf" + "text": "", + "page_start": 303, + "page_end": 303, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n**Modern Lyon**", - "page_start": 3, - "page_end": 3, - "source_file": "wikipedia4.pdf" + "text": "", + "page_start": 303, + "page_end": 303, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\nif the flow through ", - "page_start": 24, - "page_end": 24, + "text": "", + "page_start": 303, + "page_end": 303, "source_file": "00-80T-80.pdf" }, { - "text": "\nFLOW ", - "page_start": 82, - "page_end": 82, + "text": "", + "page_start": 303, + "page_end": 303, "source_file": "00-80T-80.pdf" }, { - "text": "\n\nflow. As ", - "page_start": 141, - "page_end": 141, + "text": "", + "page_start": 303, + "page_end": 303, "source_file": "00-80T-80.pdf" }, { - "text": "Lyon–Saint-Exupéry Airport, located east of Lyon, serves as a base for domestic and \ninternational flights. It is a key transport facility for the entire Rhône-Alpes region, \nwith coach links to other cities in the area. The in-house train station Gare de Lyon \nSaint-Exupéry connects the airport to the nationwide TGV network. The Rhônexpress \ntram monopoly links the airport with the business quarter of La Part Dieu in less than \n30 minutes, and offers connections with Underground A & B, Tramway T1, T3 & T4, \nand bus lines. Lyon public transport Sytral offers a bus service, Route 47, that links \nthe airport to Meyzieu[75] where passengers can change onto Tram T3. The regular \nprice of public transport is €1.90, as opposed to €15 one way for the Rhonexpress. In \nthe suburb of Bron, the smaller Lyon-Bron Airport provides an alternative for \ndomestic aviation. \n\nIPSA Lyon Campus \n\nPlatform I, Lyon-Part-Dieu train \nstation \n\nLyon has two major railway stations: Lyon-Part-Dieu, which was built to \naccommodate the TGV, and Lyon Perrache, an older station that now provides mostly \nregional service. Smaller railway stations include Gorge-de-Loup, Vaise, Saint-Paul \nand Jean Macé. Lyon was the first city to be connected to Paris by the TGV in \n1981.[76] Since that time the TGV train network has expanded and links Lyon directly \nto Perpignan, Toulouse, Nice, Marseille, Strasbourg, Nantes and Lille. International \ntrains operate directly to Madrid, Barcelona, Milan, Turin, Geneva, Frankfurt, \nLuxembourg, Brussels and London. ", - "page_start": 19, - "page_end": 19, - "source_file": "wikipedia4.pdf" + "text": "", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_JWN_2014.pdf" } ] }, @@ -15115,64 +15115,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 222, + "page_end": 222, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**Lyon**\n\n**Lyon**[c] (Franco-Provençal:*Liyon*) is the second-largest city in France \nby urban area and the third largest by city limits.[14] It is located at the \nconfluence of the rivers Rhône and Saône, to the northwest of the \nFrench Alps, 391 km (243 mi) southeast of Paris, 278 km (173 mi) north \nof Marseille, 113 km (70 mi) southwest of Geneva, Switzerland, 58 km \n(36 mi) northeast of Saint-Étienne. \n\n**Lyon**\n\n*Liyon*(Arpitan) \n\n**Prefecture and commune**\n\nThe City of Lyon had a population of 522,250 at the Jan. 2021 census \nwithin its small municipal territory of 48 km2 (19 sq mi),[15] but \ntogether with its suburbs and exurbs the Lyon metropolitan area had a \npopulation of 2,308,818 that same year,[7] the second most populated in \nFrance. Lyon and 58 suburban municipalities have formed since 2015 \nthe Metropolis of Lyon, a directly elected metropolitan authority now in \ncharge of most urban issues, with a population of 1,424,069 in 2021.[16] \nLyon is the prefecture of the Auvergne-Rhône-Alpes region and seat of \nthe Departmental Council of Rhône (whose jurisdiction, however, no \nlonger extends over the Metropolis of Lyon since 2015). \n\nSkyline of Lyon in La Part-Dieu ", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia4.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**Metropolis**\nSince 2015, the commune of Lyon (48 km2 (19 sq mi) in land area) and 58 suburban communes \nhave formed the Metropolis of Lyon (534 km2 (206 sq mi) in land area), a directly elected \nmetropolitan authority now in charge of most urban issues. The Metropolis of Lyon is the only \nmetropolitan authority in France which is a territorial collectivity, on par with French communes \nand departments. Its metropolitan council was for the first time directly elected by universal \nsuffrage in 2020 within 14 electoral wards, the only directly elected metropolitan council in \nFrance. \n\nThe 14 electoral wards are the following (see map for location): \n\n Lônes et coteaux \n\nMap of the Metropolis of \nLyon and its 59 \ncommunes (the \ncommune of Lyon is in \nred) \n\n Lyon-Centre (Lyon-Centre) \n\n Lyon-Est (Lyon-East) \n Lyon-Nord (Lyon-North) \n\n Lyon-Ouest \n\n Lyon-Sud \n Lyon-Sud-Est \n\n Ouest \n Plateau Nord-Caluire \n\n Porte des Alpes \n\n Portes du Sud \n Rhône Amont \n\n Val de Saône \n\n Villeurbanne \n\nThe six wards with names starting with \"Lyon\" are all located within the commune of Lyon. The Villeurbanne ward is \ncoterminous with the namesake commune. All other seven wards each group various suburban communes. ", - "page_start": 9, - "page_end": 9, - "source_file": "wikipedia4.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "The capital of the Gauls during the Roman Empire, Lyon is the seat of \nan archbishopric whose holder bears the title of Primate of the Gauls. \nLyon became a major economic hub during the Renaissance. The city is \nrecognised for its cuisine and gastronomy, as well as historical and \narchitectural landmarks; as such, the districts of Old Lyon, the Fourvière \nhill, the Presqu'île and the slopes of the Croix-Rousse are inscribed on \nthe UNESCO World Heritage List. Lyon was historically an important \narea for the production and weaving of silk. Lyon played a significant \nrole in the history of cinema since Auguste and Louis Lumière invented \nthe cinematograph there. The city is also known for its light festival, the \nFête des lumières, which begins every 8 December and lasts for four \ndays, earning Lyon the title of \"Capital of Lights\". \n\nis a major centre for banking, chemical, \nEconomically, Lyon \npharmaceutical and biotech industries. The city contains a significant \nsoftware industry with a particular focus on video games; in recent years \nit has fostered a growing local start-up sector.[17] The home of renowned \nuniversities and higher education schools, Lyon is the second-largest \nstudent city in France, with a university population of nearly 200,000 \nstudents within the Metropolis of Lyon.[18] Lyon hosts the international \nheadquarters of Interpol, the International Agency for Research on \nCancer, as well as Euronews. According to the Globalization and World \nRankings Research Institute, Lyon is considered a Beta city, as of \n2018.[19] It ranked second in France and 40th globally in Mercer's 2019 \nliveability rankings.[20] ", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia4.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "École Centrale de Lyon; \nÉcole Normale Supérieure de Lyon \nEM Lyon (École de Management de Lyon); \nECE Lyon (École de Commerce Européenne de Lyon); \nInstitut d'études politiques de Lyon (Sciences Po Lyon); \nCPE Lyon; \nCNSMD (Conservatoire national supérieur de musique et de danse de \nLyon) \nECAM Lyon (École Catholique d'Arts et Métiers de Lyon); \nEPITECH; \nEPITA; \nENTPE (École Nationale des Travaux Publiques de l'État); \nÉcole nationale vétérinaire de Lyon (ENVL); \nESME-Sudria; \nÉcole des Beaux-Arts; \nE-Artsup; \nINSA Lyon (Institut National des Sciences Appliquées de Lyon); \nPolytech Lyon; \nInstitut supérieur européen de gestion group; \nISARA (Institut Supérieur d'Agriculture Rhône Alpes); \nInstitution des Chartreux; \nInstitut polytechnique des sciences avancées; \nUniversité Claude Bernard (Lyon 1); \nUniversité Lumière (Lyon 2); \nUniversité Jean Moulin (Lyon 3); \nIAE (Institut d'Administration des Entreprises de Lyon); \nInstitut Sup'Biotech de Paris; \nCatholic University of Lyon; \nESDES Business School; \nIDRAC (International School of Management); \nWesford Graduate Business School; \nIFAG (Business Management School); \nInstitut supérieur européen de formation par l'action; \nLe Lycée du Parc; \nLa Martinière Lyon; \nWeb@cademie; \nCEESO (Centre Européen d'Enseignement Supérieur de l'Ostéopathie); ", - "page_start": 18, - "page_end": 18, - "source_file": "wikipedia4.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Lyon has a rugby union team, Lyon OU, in the Top 14, which moved into Stade de Gerland full-time in 2017–18. In addition, \nLyon has a rugby league side called Lyon Villeurbanne that plays in the French rugby league championship. The club's home \nis the Stade Georges Lyvet in Villeurbanne. ", - "page_start": 16, - "page_end": 16, - "source_file": "wikipedia4.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "All figures come from population censuses. Figures from 1911 to 1936 (incl.) are computed using the redressed figures for the \ncommune of Lyon calculated by INSEE to correct the overestimated population of Lyon published by the municipal authorities at \nthe time (10,000s of false residents had been added by the municipal authorities to artificially inflate the population figures and \nremain the 2nd largest city of France ahead of Marseille).[68] The 1906 figure is computed using the figure for the commune of \nLyon published by the municipal authorities, probably already inflated, but not corrected by INSEE because the overestimate \nwas smaller than 10,000. \nSource: EHESS[70] and INSEE[71] ", - "page_start": 18, - "page_end": 18, - "source_file": "wikipedia4.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\n**Modern Lyon**", - "page_start": 3, - "page_end": 3, - "source_file": "wikipedia4.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "The GDP of Lyon was 124 billion US dollars in 2019,[d][46] making it the second \nrichest city in France after Paris. Lyon and its region Rhône-Alpes represent one of \nthe most important economies in Europe and, according to Loughborough University, \ncan be compared to Philadelphia, Mumbai or Athens with regard to its international \nposition. The city of Lyon is working in partnership to more easily enable the \nestablishment of new headquarters in the territory (ADERLY, Chambre du commerce \net d'industrie, Grand Lyon...). High-tech industries such as biotechnology, software \ndevelopment, video game (Arkane Studios, Ivory Tower, Eden Games, EA France, \nBandai Namco Entertainment Europe), and internet services are also growing. Other \nimportant sectors include medical research and technology, non-profit institutions, \nand universities. Lyon is home to the P4-Inserm–ean Merieux Laboratory which \nconducts top-level vaccine research.[47] \n\nLa Part-Dieu, the city's central \nbusiness district \n\nThe city is home to the headquarters of many large companies such as Groupe SEB, Sanofi Pasteur, Renault Trucks, Norbert \nDentressangle, LCL S.A., Descours & Cabaud, Merial, Point S, BioMérieux, Iveco Bus, Compagnie Nationale du Rhône, GL \nEvents, April Group, Boiron, Feu Vert, Panzani, Babolat, Lyon Airports, LVL Medical, and inter-governmental agencies \nIARC and Interpol. The specialisation of some sectors of activities has led to the creation of many main business centres: La \nPart-Dieu, located in the 3rd arrondissement is the second biggest business quarter after La Défense in Paris with over ", - "page_start": 14, - "page_end": 14, - "source_file": "wikipedia4.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" } ] }, @@ -15189,64 +15189,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 262, + "page_end": 262, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "The capital of the Gauls during the Roman Empire, Lyon is the seat of \nan archbishopric whose holder bears the title of Primate of the Gauls. \nLyon became a major economic hub during the Renaissance. The city is \nrecognised for its cuisine and gastronomy, as well as historical and \narchitectural landmarks; as such, the districts of Old Lyon, the Fourvière \nhill, the Presqu'île and the slopes of the Croix-Rousse are inscribed on \nthe UNESCO World Heritage List. Lyon was historically an important \narea for the production and weaving of silk. Lyon played a significant \nrole in the history of cinema since Auguste and Louis Lumière invented \nthe cinematograph there. The city is also known for its light festival, the \nFête des lumières, which begins every 8 December and lasts for four \ndays, earning Lyon the title of \"Capital of Lights\". \n\nis a major centre for banking, chemical, \nEconomically, Lyon \npharmaceutical and biotech industries. The city contains a significant \nsoftware industry with a particular focus on video games; in recent years \nit has fostered a growing local start-up sector.[17] The home of renowned \nuniversities and higher education schools, Lyon is the second-largest \nstudent city in France, with a university population of nearly 200,000 \nstudents within the Metropolis of Lyon.[18] Lyon hosts the international \nheadquarters of Interpol, the International Agency for Research on \nCancer, as well as Euronews. According to the Globalization and World \nRankings Research Institute, Lyon is considered a Beta city, as of \n2018.[19] It ranked second in France and 40th globally in Mercer's 2019 \nliveability rankings.[20] ", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia4.pdf" + "text": "", + "page_start": 328, + "page_end": 328, + "source_file": "00-80T-80.pdf" }, { - "text": "**Metropolis**\nSince 2015, the commune of Lyon (48 km2 (19 sq mi) in land area) and 58 suburban communes \nhave formed the Metropolis of Lyon (534 km2 (206 sq mi) in land area), a directly elected \nmetropolitan authority now in charge of most urban issues. The Metropolis of Lyon is the only \nmetropolitan authority in France which is a territorial collectivity, on par with French communes \nand departments. Its metropolitan council was for the first time directly elected by universal \nsuffrage in 2020 within 14 electoral wards, the only directly elected metropolitan council in \nFrance. \n\nThe 14 electoral wards are the following (see map for location): \n\n Lônes et coteaux \n\nMap of the Metropolis of \nLyon and its 59 \ncommunes (the \ncommune of Lyon is in \nred) \n\n Lyon-Centre (Lyon-Centre) \n\n Lyon-Est (Lyon-East) \n Lyon-Nord (Lyon-North) \n\n Lyon-Ouest \n\n Lyon-Sud \n Lyon-Sud-Est \n\n Ouest \n Plateau Nord-Caluire \n\n Porte des Alpes \n\n Portes du Sud \n Rhône Amont \n\n Val de Saône \n\n Villeurbanne \n\nThe six wards with names starting with \"Lyon\" are all located within the commune of Lyon. The Villeurbanne ward is \ncoterminous with the namesake commune. All other seven wards each group various suburban communes. ", - "page_start": 9, - "page_end": 9, - "source_file": "wikipedia4.pdf" + "text": "", + "page_start": 174, + "page_end": 174, + "source_file": "00-80T-80.pdf" }, { - "text": "**Lyon**\n\n**Lyon**[c] (Franco-Provençal:*Liyon*) is the second-largest city in France \nby urban area and the third largest by city limits.[14] It is located at the \nconfluence of the rivers Rhône and Saône, to the northwest of the \nFrench Alps, 391 km (243 mi) southeast of Paris, 278 km (173 mi) north \nof Marseille, 113 km (70 mi) southwest of Geneva, Switzerland, 58 km \n(36 mi) northeast of Saint-Étienne. \n\n**Lyon**\n\n*Liyon*(Arpitan) \n\n**Prefecture and commune**\n\nThe City of Lyon had a population of 522,250 at the Jan. 2021 census \nwithin its small municipal territory of 48 km2 (19 sq mi),[15] but \ntogether with its suburbs and exurbs the Lyon metropolitan area had a \npopulation of 2,308,818 that same year,[7] the second most populated in \nFrance. Lyon and 58 suburban municipalities have formed since 2015 \nthe Metropolis of Lyon, a directly elected metropolitan authority now in \ncharge of most urban issues, with a population of 1,424,069 in 2021.[16] \nLyon is the prefecture of the Auvergne-Rhône-Alpes region and seat of \nthe Departmental Council of Rhône (whose jurisdiction, however, no \nlonger extends over the Metropolis of Lyon since 2015). \n\nSkyline of Lyon in La Part-Dieu ", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia4.pdf" + "text": "", + "page_start": 173, + "page_end": 173, + "source_file": "00-80T-80.pdf" }, { - "text": "École Centrale de Lyon; \nÉcole Normale Supérieure de Lyon \nEM Lyon (École de Management de Lyon); \nECE Lyon (École de Commerce Européenne de Lyon); \nInstitut d'études politiques de Lyon (Sciences Po Lyon); \nCPE Lyon; \nCNSMD (Conservatoire national supérieur de musique et de danse de \nLyon) \nECAM Lyon (École Catholique d'Arts et Métiers de Lyon); \nEPITECH; \nEPITA; \nENTPE (École Nationale des Travaux Publiques de l'État); \nÉcole nationale vétérinaire de Lyon (ENVL); \nESME-Sudria; \nÉcole des Beaux-Arts; \nE-Artsup; \nINSA Lyon (Institut National des Sciences Appliquées de Lyon); \nPolytech Lyon; \nInstitut supérieur européen de gestion group; \nISARA (Institut Supérieur d'Agriculture Rhône Alpes); \nInstitution des Chartreux; \nInstitut polytechnique des sciences avancées; \nUniversité Claude Bernard (Lyon 1); \nUniversité Lumière (Lyon 2); \nUniversité Jean Moulin (Lyon 3); \nIAE (Institut d'Administration des Entreprises de Lyon); \nInstitut Sup'Biotech de Paris; \nCatholic University of Lyon; \nESDES Business School; \nIDRAC (International School of Management); \nWesford Graduate Business School; \nIFAG (Business Management School); \nInstitut supérieur européen de formation par l'action; \nLe Lycée du Parc; \nLa Martinière Lyon; \nWeb@cademie; \nCEESO (Centre Européen d'Enseignement Supérieur de l'Ostéopathie); ", - "page_start": 18, - "page_end": 18, - "source_file": "wikipedia4.pdf" + "text": "", + "page_start": 6, + "page_end": 6, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "Lyon–Saint-Exupéry Airport, located east of Lyon, serves as a base for domestic and \ninternational flights. It is a key transport facility for the entire Rhône-Alpes region, \nwith coach links to other cities in the area. The in-house train station Gare de Lyon \nSaint-Exupéry connects the airport to the nationwide TGV network. The Rhônexpress \ntram monopoly links the airport with the business quarter of La Part Dieu in less than \n30 minutes, and offers connections with Underground A & B, Tramway T1, T3 & T4, \nand bus lines. Lyon public transport Sytral offers a bus service, Route 47, that links \nthe airport to Meyzieu[75] where passengers can change onto Tram T3. The regular \nprice of public transport is €1.90, as opposed to €15 one way for the Rhonexpress. In \nthe suburb of Bron, the smaller Lyon-Bron Airport provides an alternative for \ndomestic aviation. \n\nIPSA Lyon Campus \n\nPlatform I, Lyon-Part-Dieu train \nstation \n\nLyon has two major railway stations: Lyon-Part-Dieu, which was built to \naccommodate the TGV, and Lyon Perrache, an older station that now provides mostly \nregional service. Smaller railway stations include Gorge-de-Loup, Vaise, Saint-Paul \nand Jean Macé. Lyon was the first city to be connected to Paris by the TGV in \n1981.[76] Since that time the TGV train network has expanded and links Lyon directly \nto Perpignan, Toulouse, Nice, Marseille, Strasbourg, Nantes and Lille. International \ntrains operate directly to Madrid, Barcelona, Milan, Turin, Geneva, Frankfurt, \nLuxembourg, Brussels and London. ", - "page_start": 19, - "page_end": 19, - "source_file": "wikipedia4.pdf" + "text": "", + "page_start": 173, + "page_end": 173, + "source_file": "00-80T-80.pdf" }, { - "text": "**External links**\n\nOfficial website (http://www.lyon.fr)(in French) \nVisit Lyon, the official website for tourism in France (https://en.visiterlyon.com/) \nLyon’s English Language News and Information (https://thisislyon.fr/) \nRues de Lyon (https://www.ruesdelyon.net/) Streets, Places, Monuments (in French) \n\nOld maps of Lyon (http://historic-cities.huji.ac.il/france/lyon/lyon.html) Archived (https://web.archive.org/we \nb/20210116220537/http://historic-cities.huji.ac.il/france/lyon/lyon.html) 16 January 2021 at the Wayback \nMachine, Historic cities site (http://historic-cities.huji.ac.il/historic_cities.html) Archived (https://web.archive. \norg/web/20220325051637/http://historic-cities.huji.ac.il/historic_cities.html) 25 March 2022 at the Wayback \nMachine, The National Library of Israel \n\nRetrieved from \"https://en.wikipedia.org/w/index.php?title=Lyon&oldid=1267625203\" ", - "page_start": 25, - "page_end": 25, - "source_file": "wikipedia4.pdf" + "text": "", + "page_start": 173, + "page_end": 173, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n**Modern Lyon**", - "page_start": 3, - "page_end": 3, - "source_file": "wikipedia4.pdf" + "text": "", + "page_start": 173, + "page_end": 173, + "source_file": "00-80T-80.pdf" }, { - "text": "Lyon has a rugby union team, Lyon OU, in the Top 14, which moved into Stade de Gerland full-time in 2017–18. In addition, \nLyon has a rugby league side called Lyon Villeurbanne that plays in the French rugby league championship. The club's home \nis the Stade Georges Lyvet in Villeurbanne. ", - "page_start": 16, - "page_end": 16, - "source_file": "wikipedia4.pdf" + "text": "", + "page_start": 173, + "page_end": 173, + "source_file": "00-80T-80.pdf" } ] }, @@ -15257,70 +15257,70 @@ "target_page": 2, "target_passage": "ensure that the register is kept in that church or chapel, and (b) do everything that is reasonably practicable to ensure that the register is protected against theft, loss or damage.", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 209, + "page_end": 209, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 155, + "page_end": 155, + "source_file": "00-80T-80.pdf" }, { - "text": "**Requirements about the keeping of registers of marriage services**\n\n**4.**—(1) The rector, vicar or curate in charge of a church or chapel to which a register of marriage \n\nservices has been provided under regulation 2(1) must— \n\n(a) ensure that the register is kept in that church or chapel, and \n(b) do everything that is reasonably practicable to ensure that the register is protected against \n\ntheft, loss or damage. \n\n(2) Where there is no rector, vicar or curate in charge of a church or chapel to which a register of \nmarriage services has been provided under regulation 2(1), the obligations under paragraph (1) in \nrespect of that register fall on the churchwardens of the parish in which the church or chapel is \nsituated. ", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20210538_en.pdf" + "text": "", + "page_start": 155, + "page_end": 155, + "source_file": "00-80T-80.pdf" }, { - "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations provide for records of marriages to be kept in churches and chapels of the \nChurch of England and the Church in Wales, other than chapels to which Part 5 of the Marriage \nAct 1949 applies (naval, military and air force chapels). \n\nRegulation 2 requires parochial church councils to provide books known as “registers of marriage \nservices” to churches and chapels in their parish in which banns of matrimony may be published, \nfor the purposes of keeping the records required by regulation 3. Regulation 2 also imposes \nrequirements relating to the durability and pre-printed content of these registers, and provides that \nthey belong to the parochial church council. \n\nRegulation 3 requires specified information to be recorded in a register of marriage services when \na marriage has been solemnized on or after 4th May 2021 according to the rites of the Church of \nEngland or Church in Wales in a church or chapel in which banns of matrimony may be \npublished. The record must be made and signed by the member of the clergy by whom the \nmarriage was solemnized. ", - "page_start": 3, - "page_end": 3, - "source_file": "uksi_20210538_en.pdf" + "text": "", + "page_start": 155, + "page_end": 155, + "source_file": "00-80T-80.pdf" }, { - "text": "**Duty to record information about marriages solemnized according to the rites of the Church**\n**of England or Church in Wales**\n\n**3.**—(1) Paragraphs (2), (3) and (4) apply where a marriage has been solemnized according to the \nrites of the Church of England in a church or chapel in which banns of matrimony may be \npublished. \n\n(2) As soon as practicable after the marriage has been solemnized, the clergyman by whom the \nmarriage was solemnized must make a record of the following information in relation to that \nmarriage in a register of marriage services provided to the church or chapel under regulation \n2(1)— \n\n(a) the date and place of the marriage; \n(b) the name and surname of each party; \n(c) the date of birth of each party; \n(d) the occupation (if any) of each party; \n(e) the address of each party at the time of the marriage; \n(f) \n\nthe names and surnames of each party’s parents, so far as those names and surnames are \nknown to the clergyman who solemnized the marriage; \n\n(g) the name and surname of each of the witnesses in whose presence the marriage was \nsolemnized; \n\n(h) the name and surname of the clergyman by whom the marriage was solemnized. \n\n(3) The clergyman must record the information required by paragraph (2) in English, and may \nalso record information required by that paragraph in Welsh where the church or chapel is situated \nin Wales. \n\n(4) After making a record under paragraph (2) the clergyman must sign it. \n(5) This regulation does not apply in relation to a marriage solemnized before 4th May 2021. ", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20210538_en.pdf" + "text": "", + "page_start": 155, + "page_end": 155, + "source_file": "00-80T-80.pdf" }, { - "text": "*Made* *-* *-* *-* *-* *29th April 2021*\n\n*Coming into force -* *-* *4th May 2021*\n\nThe Registrar General makes these Regulations with the approval of the Secretary of State in \nexercise of the powers conferred by section 74(1)(c)(v), (1A)(a) and (3) of the Marriage Act \n1949(**a**). \n\n**Citation, commencement, extent and interpretation**\n\n**1.**—(1) These Regulations may be cited as the Marriage (Keeping of Records in Churches and \n\nChapels) Regulations 2021. \n\n(2) These Regulations come into force on 4th May 2021. \n(3) These Regulations extend to England and Wales. \n(4) In these Regulations, “chapel” does not include a chapel to which Part 5 of the Marriage Act \n1949 (marriages in naval, military and air force chapels) applies(**b**). \n\n**Duty of parochial church councils to provide registers of marriage services**\n\n**2.**—(1) The parochial church council of a parish must provide books for the purpose of making \nrecords under regulation 3 to each church and chapel of the Church of England(**c**) in that parish in \nwhich banns of matrimony may be published. \n\n(2) Books provided under paragraph (1) are to be known as “registers of marriage services”. \n(3) A register of marriage services provided under paragraph (1) must meet the requirements of \nparagraphs (4) and (5). \n\n(4) The register must be made of durable material. \n(5) For the purposes of enabling a record to be made in the register under regulation 3 in respect \n\nof a marriage, the register must be printed in such a way that it— ", - "page_start": 1, - "page_end": 1, - "source_file": "uksi_20210538_en.pdf" + "text": "", + "page_start": 291, + "page_end": 291, + "source_file": "00-80T-80.pdf" }, { - "text": "(a) indicates the descriptions of information required by each of sub-paragraphs (a) to (h) of \nregulation 3(2) in relation to the marriage, and \n\n(b) provides corresponding spaces for recording information required by each of those sub- \n\nparagraphs in relation to the marriage. \n\n(6) A register of marriage services provided under paragraph (1) by a parochial church council \nbelongs to that parochial church council. ", - "page_start": 2, - "page_end": 2, - "source_file": "uksi_20210538_en.pdf" + "text": "", + "page_start": 291, + "page_end": 291, + "source_file": "00-80T-80.pdf" }, { - "text": "**Piety and religion**\n\nLouis was a pious and devout king who saw himself as the head and protector of the \nCatholic Church in France. He made his devotions daily regardless of where he was, \nfollowing the liturgical calendar regularly.[107] Under the influence of his very religious \nsecond wife, he became much stronger in the practice of his Catholic faith.[108] This \nincluded banning opera and comedy performances during Lent.[108] \n\nTowards the middle and the end of his reign, the centre for the King's religious \nobservances was usually \nthe Chapelle Royale at Versailles. Ostentation was a \ndistinguishing feature of daily Mass, annual celebrations, such as those of Holy Week, and \nspecial ceremonies.[109] Louis established the Paris Foreign Missions Society, but his \nfor undermining \ninformal alliance with \nChristendom.[110] \n\nthe Ottoman Empire was criticised ", - "page_start": 16, - "page_end": 16, - "source_file": "wikipedia5.pdf" + "text": "", + "page_start": 291, + "page_end": 291, + "source_file": "00-80T-80.pdf" }, { - "text": "upon the expiration of his or her term of office, such gratuity as may be prescribed by \nresolution of the National Assembly, which shall be a charge on the Consolidated Fund. \n**41. Protection of President in respect of legal proceedings**\n\n(1) Whilst any person holds or performs the functions of the office of President no \n\ncriminal proceedings shall be instituted or continued against him or her in respect of \nanything done or omitted to be done by him or her either in his or her official capacity or \nin his or her private capacity and no civil proceedings shall be instituted or continued in \nrespect of which relief is claimed against him or her in respect of anything done or \nomitted to be done in his or her private capacity. \n\n(2) Where provision is made by law limiting the time within which proceedings of \nany description may be brought against any person, the term of any person in the office \nof President shall not be taken into account in calculating any period of time prescribed \nby that law which determines whether any such proceedings as are mentioned in \nsubsection (1) of this section may be brought against that person. \n\n**PART II**\n**The Cabinet (ss 42-46)**\n\n**42. Ministers and Assistant Ministers**\n\n(1) There shall be such offices of Minister of the Government (not exceeding six ", - "page_start": 22, - "page_end": 22, - "source_file": "Botswana-constitution.pdf" + "text": "", + "page_start": 292, + "page_end": 292, + "source_file": "00-80T-80.pdf" }, { - "text": "***Dawn Sager***\n\nThere aren’t many corners of Wakeman’s Grove Church of the Brethren that \n\nGary Shipe, who has worked as an installer repairman for Shentel since 1986, \ndoesn’t know. At Wakeman’s Grove he serves on the executive committee, teaches \nSunday school and sings in the choir. He does whatever is necessary to keep this \ntight-knit country church in good shape. Gary believes it is important to not just sit \nin the pew on Sunday. ", - "page_start": 7, - "page_end": 7, - "source_file": "NASDAQ_SHEN_2003.pdf" + "text": "", + "page_start": 292, + "page_end": 292, + "source_file": "00-80T-80.pdf" } ] }, @@ -15337,64 +15337,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 384, + "page_end": 384, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 335, + "page_end": 335, + "source_file": "00-80T-80.pdf" }, { - "text": "On June 4, 2018, a purported Tesla stockholder filed a putative class and derivative action in the Delaware Court of \nChancery against Elon Musk and the members of Tesla’s board of directors as then constituted, alleging corporate waste, unjust \nenrichment and that such board members breached their fiduciary duties by approving the stock-based compensation plan \nawarded to Elon Musk in 2018 (the “2018 CEO Performance Award”). Trial was held November 14-18, 2022. On January 30, \n2024, the Court issued an opinion finding that the 2018 CEO Performance Award should be rescinded. Plaintiff’s counsel filed \na brief seeking a fee award of 29,402,900 Tesla shares, plus expenses of $1,120,115.50. Tesla opposed the fee request on June \n7, 2024, and a hearing was held on July 8, 2024. At Tesla’s 2024 Annual Meeting of Stockholders, 72% of the disinterested \nvoting shares of Tesla, excluding shares owned by Mr. Musk and Kimbal Musk, voted to ratify the 2018 CEO Performance \nAward. On June 28, 2024, because Tesla’s disinterested stockholders voted to ratify the 2018 CEO Performance Award, Mr. \nMusk and the other director defendants, joined by Tesla, filed a brief seeking to revise the Court’s January 30, 2024 opinion, \nand a hearing was held on August 2, 2024. ", - "page_start": 27, - "page_end": 27, - "source_file": "tesla_form_10q.pdf" + "text": "", + "page_start": 335, + "page_end": 335, + "source_file": "00-80T-80.pdf" }, { - "text": "Tesla, Inc. \n\nNotes to Consolidated Financial Statements \n\n(unaudited) \n\nNote 1 – Overview & Summary of Significant Accounting Policies \n\nOverview \n\nTesla, Inc. (“Tesla”, the “Company”, “we”, “us” or “our”) was incorporated in the State of Delaware on July 1, 2003 and \nconverted to a Texas corporation on June 13, 2024. ", - "page_start": 13, - "page_end": 13, - "source_file": "tesla_form_10q.pdf" + "text": "", + "page_start": 335, + "page_end": 335, + "source_file": "00-80T-80.pdf" }, { - "text": "On February 27, 2023, a proposed class action was filed in the U.S. District Court for the Northern District of California \n\nagainst Tesla, Inc., Elon Musk and certain current and former Company executives. The complaint alleges that the defendants \nmade material misrepresentations and omissions about the Company’s Autopilot and FSD Capability technologies and seeks \nmoney damages and other relief on behalf of persons who purchased Tesla stock between February 19, 2019, and February 17, \n2023. An amended complaint was filed on September 5, 2023, naming only Tesla, Inc. and Elon Musk as defendants. On \nNovember 6, 2023, Tesla moved to dismiss the amended complaint. On September 30, 2024, the Court granted Tesla’s motion \nto dismiss without prejudice. \n\nOn March 14, 2023, a proposed class action was filed against Tesla, Inc. in the U.S. District Court for the Northern \n\nDistrict of California. Several similar complaints were also filed in the same court and these cases have now all been \nconsolidated. These complaints allege that Tesla violates federal antitrust and warranty laws through its repair, service, and \nmaintenance practices and seeks, among other relief, damages for persons who paid Tesla for repairs services or Tesla \ncompatible replacement parts from March 2019 to March 2023. On July 17, 2023, these plaintiffs filed a consolidated amended \ncomplaint. On September 27, 2023, the court granted Tesla’s motion to compel arbitration as to three of the plaintiffs, and on \nNovember 17, 2023, the court granted Tesla’s motion to dismiss without prejudice. The plaintiffs filed a Consolidated Second \nAmended Complaint on December 12, 2023, which Tesla moved to dismiss. Plaintiffs also appealed the court’s arbitration \norder, which was denied. On June 17, 2024, the Court granted in part and denied in part Tesla’s motion to dismiss the \nConsolidated Second Amended Complaint. ", - "page_start": 29, - "page_end": 29, - "source_file": "tesla_form_10q.pdf" + "text": "", + "page_start": 335, + "page_end": 335, + "source_file": "00-80T-80.pdf" }, { - "text": "Deferred revenue is equivalent to the total transaction price allocated to the performance obligations that are unsatisfied, \n\nor partially unsatisfied, as of the balance sheet date. Revenue recognized from the deferred revenue balances as of \nDecember 31, 2023 and 2022 was $711 million and $360 million for the nine months ended September 30, 2024 and 2023, \nrespectively. Of the total deferred revenue balance as of September 30, 2024, we expect to recognize $821 million of revenue in \nthe next 12 months. The remaining balance will be recognized at the time of transfer of control of the product or over the \nperformance period. \n\nWe have financing receivables on our consolidated balance sheets related to loans we provide for financing our \nautomotive deliveries. As of September 30, 2024 and December 31, 2023, we had current net financing receivables of $245 \nmillion and $242 million, respectively, in Accounts receivable, net, and $868 million and $1.04 billion, respectively, in Other \nnon-current assets for the long-term portion. \n\nWe offer resale value guarantees to our commercial banking partners in connection with certain vehicle leasing \n\nprograms. Under these programs, we originate the lease with our end customer and immediately transfer the lease and the \nunderlying vehicle to our commercial banking partner, with the transaction being accounted for as a sale under ASC 606, \nRevenue from Contracts with Customers. We estimate a guarantee liability in accordance with ASC 460, Guarantees and record \nit within other liabilities on our consolidated balance sheet. On a quarterly basis, we assess the estimated market value of \nvehicles sold under this program to determine whether there have been changes to the amount of expected resale value \nguarantee liabilities. The total recorded guarantee liabilities on vehicles sold under this program were immaterial as of \nSeptember 30, 2024 and December 31, 2023. Our maximum exposure on the guarantees we provide if they are unable to sell \nthe vehicle at or above the vehicle’s contractual residual value at the end of the lease term was $1.04 billion and $166 million as \nof September 30, 2024 and December 31, 2023, respectively. ", - "page_start": 15, - "page_end": 15, - "source_file": "tesla_form_10q.pdf" + "text": "", + "page_start": 335, + "page_end": 335, + "source_file": "00-80T-80.pdf" }, { - "text": "(1) \n\nThere are no restrictions on draw-down or use for general corporate purposes with respect to any available committed \nfunds under our RCF Credit Agreement, except certain specified conditions prior to draw-down. Refer to the notes to the \nconsolidated financial statements included in our reporting on Form 10-K for the year ended December 31, 2023 for the \nterms of the facility. \n\n(2) \n\nThe contractual maturity date of the China Working Capital Facility is April 2025, renewable until March 2026 at our \ndiscretion. As we have the intent and ability to refinance the loan on a long-term basis, we recorded it in Debt and \nfinance leases, net of current portion in the consolidated balance sheet. \n\nRecourse debt refers to debt that is recourse to our general assets. Non-recourse debt refers to debt that is recourse to \nonly assets of our subsidiaries. The differences between the unpaid principal balances and the net carrying values are due to \ndebt discounts or deferred issuance costs. As of September 30, 2024, we were in material compliance with all financial debt \ncovenants. \n\n2024 Notes \n\nDuring the second quarter of 2024, the 2024 Notes reached maturity and were fully settled. Additionally, during the third \nquarter of 2024, we settled the warrants entered into in connection with the issuance of the 2024 Notes, resulting in the issuance \nof 8.5 million shares of our common stock. The remaining warrants were settled in October 2024. ", - "page_start": 25, - "page_end": 25, - "source_file": "tesla_form_10q.pdf" + "text": "", + "page_start": 335, + "page_end": 335, + "source_file": "00-80T-80.pdf" }, { - "text": "Certain Derivative Lawsuits in Delaware \n\nBefore converting from a Delaware to Texas corporation on June 13, 2024, three separate derivative actions brought by \npurported Tesla stockholders were filed in the Delaware Court of Chancery on May 24, June 10 and June 13, 2024, purportedly \non behalf of Tesla, against current and former directors regarding topics involving Elon Musk and others, X Corp. (formerly \nTwitter) and x.AI. These suits assert various claims, including breach of fiduciary duty and breach of contract, and seek \nunspecified damages and other relief. On August 6, 2024, the plaintiffs in these three actions moved to consolidate the matters \ninto a single case, and a hearing on that motion is scheduled for November 18, 2024. \n\nLitigation and Investigations Relating to Alleged Discrimination and Harassment \n\nOn February 9, 2022, the California Civil Rights Department (“CRD,” formerly “DFEH”) filed a civil complaint against \n\nTesla in Alameda County, California Superior Court, alleging systemic race discrimination, hostile work environment and pay \nequity claims, among others. CRD’s amended complaint seeks monetary damages and injunctive relief. The case is currently in \ndiscovery. Trial is scheduled for September 15, 2025. ", - "page_start": 28, - "page_end": 28, - "source_file": "tesla_form_10q.pdf" + "text": "", + "page_start": 335, + "page_end": 335, + "source_file": "00-80T-80.pdf" }, { - "text": "Assets \n\nCurrent assets \n\nCash and cash equivalents \n\nShort-term investments \n\nAccounts receivable, net \n\nInventory \n\nPrepaid expenses and other current assets \n\nTotal current assets \n\nOperating lease vehicles, net \n\nSolar energy systems, net \n\nProperty, plant and equipment, net \n\nOperating lease right-of-use assets \n\nDigital assets, net \n\nIntangible assets, net \n\nGoodwill \n\nDeferred tax assets \n\nOther non-current assets \n\nTotal assets \n\nLiabilities \n\nCurrent liabilities \n\nAccounts payable \n\nAccrued liabilities and other \n\nDeferred revenue \n\nCurrent portion of debt and finance leases \n\nTotal current liabilities \n\nDebt and finance leases, net of current portion \n\nDeferred revenue, net of current portion \n\nOther long-term liabilities \n\nTotal liabilities \n\nCommitments and contingencies (Note 10) \n\nRedeemable noncontrolling interests in subsidiaries \n\nEquity \n\nStockholders’ equity \n\nPreferred stock; $0.001 par value; 100 shares authorized; no shares issued and outstanding \n\nCommon stock; $0.001 par value; 6,000 shares authorized; 3,207 and 3,185 shares issued and \noutstanding as of September 30, 2024 and December 31, 2023, respectively \n\nAdditional paid-in capital \n\nAccumulated other comprehensive loss ", - "page_start": 5, - "page_end": 5, - "source_file": "tesla_form_10q.pdf" + "text": "", + "page_start": 335, + "page_end": 335, + "source_file": "00-80T-80.pdf" }, { - "text": "Note 11 – Variable Interest Entity Arrangements \n\nThe aggregate carrying values of the variable interest entities’ assets and liabilities, after elimination of any \nintercompany transactions and balances, in the consolidated balance sheets were as follows (in millions): \n\nSeptember 30, \n2024 December 31, \n2023 \n\nAssets \n\nCurrent assets \n\nCash and cash equivalents $ \n\nAccounts receivable, net \n\nPrepaid expenses and other current assets \n\nTotal current assets \n\nOperating lease vehicles, net \n\nSolar energy systems, net \n\nOther non-current assets \n\nTotal assets \n\nLiabilities \n\nCurrent liabilities \n\nAccrued liabilities and other \n\nDeferred revenue \n\nCurrent portion of debt and finance leases \n\nTotal current liabilities \n\nDeferred revenue, net of current portion \n\nDebt and finance leases, net of current portion \n\nTotal liabilities ", - "page_start": 30, - "page_end": 30, - "source_file": "tesla_form_10q.pdf" + "text": "", + "page_start": 335, + "page_end": 335, + "source_file": "00-80T-80.pdf" } ] }, @@ -15405,70 +15405,70 @@ "target_page": 13, "target_passage": "State of Delaware", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 24, + "page_end": 24, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Tesla, Inc. \n\nNotes to Consolidated Financial Statements \n\n(unaudited) \n\nNote 1 – Overview & Summary of Significant Accounting Policies \n\nOverview \n\nTesla, Inc. (“Tesla”, the “Company”, “we”, “us” or “our”) was incorporated in the State of Delaware on July 1, 2003 and \nconverted to a Texas corporation on June 13, 2024. ", - "page_start": 13, - "page_end": 13, - "source_file": "tesla_form_10q.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "On February 27, 2023, a proposed class action was filed in the U.S. District Court for the Northern District of California \n\nagainst Tesla, Inc., Elon Musk and certain current and former Company executives. The complaint alleges that the defendants \nmade material misrepresentations and omissions about the Company’s Autopilot and FSD Capability technologies and seeks \nmoney damages and other relief on behalf of persons who purchased Tesla stock between February 19, 2019, and February 17, \n2023. An amended complaint was filed on September 5, 2023, naming only Tesla, Inc. and Elon Musk as defendants. On \nNovember 6, 2023, Tesla moved to dismiss the amended complaint. On September 30, 2024, the Court granted Tesla’s motion \nto dismiss without prejudice. \n\nOn March 14, 2023, a proposed class action was filed against Tesla, Inc. in the U.S. District Court for the Northern \n\nDistrict of California. Several similar complaints were also filed in the same court and these cases have now all been \nconsolidated. These complaints allege that Tesla violates federal antitrust and warranty laws through its repair, service, and \nmaintenance practices and seeks, among other relief, damages for persons who paid Tesla for repairs services or Tesla \ncompatible replacement parts from March 2019 to March 2023. On July 17, 2023, these plaintiffs filed a consolidated amended \ncomplaint. On September 27, 2023, the court granted Tesla’s motion to compel arbitration as to three of the plaintiffs, and on \nNovember 17, 2023, the court granted Tesla’s motion to dismiss without prejudice. The plaintiffs filed a Consolidated Second \nAmended Complaint on December 12, 2023, which Tesla moved to dismiss. Plaintiffs also appealed the court’s arbitration \norder, which was denied. On June 17, 2024, the Court granted in part and denied in part Tesla’s motion to dismiss the \nConsolidated Second Amended Complaint. ", - "page_start": 29, - "page_end": 29, - "source_file": "tesla_form_10q.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "On June 4, 2018, a purported Tesla stockholder filed a putative class and derivative action in the Delaware Court of \nChancery against Elon Musk and the members of Tesla’s board of directors as then constituted, alleging corporate waste, unjust \nenrichment and that such board members breached their fiduciary duties by approving the stock-based compensation plan \nawarded to Elon Musk in 2018 (the “2018 CEO Performance Award”). Trial was held November 14-18, 2022. On January 30, \n2024, the Court issued an opinion finding that the 2018 CEO Performance Award should be rescinded. Plaintiff’s counsel filed \na brief seeking a fee award of 29,402,900 Tesla shares, plus expenses of $1,120,115.50. Tesla opposed the fee request on June \n7, 2024, and a hearing was held on July 8, 2024. At Tesla’s 2024 Annual Meeting of Stockholders, 72% of the disinterested \nvoting shares of Tesla, excluding shares owned by Mr. Musk and Kimbal Musk, voted to ratify the 2018 CEO Performance \nAward. On June 28, 2024, because Tesla’s disinterested stockholders voted to ratify the 2018 CEO Performance Award, Mr. \nMusk and the other director defendants, joined by Tesla, filed a brief seeking to revise the Court’s January 30, 2024 opinion, \nand a hearing was held on August 2, 2024. ", - "page_start": 27, - "page_end": 27, - "source_file": "tesla_form_10q.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Between October 17, 2018 and March 8, 2021, seven derivative lawsuits were filed in the Delaware Court of Chancery, \n\npurportedly on behalf of Tesla, against Mr. Musk and the members of Tesla’s board of directors, as constituted at relevant \ntimes, in relation to statements made and actions connected to a potential going private transaction, with certain of the lawsuits \nchallenging additional Twitter posts by Mr. Musk, among other things. Several of those actions were consolidated, and all have \nbeen stayed. In addition to these cases, two derivative lawsuits were filed on October 25, 2018 and February 11, 2019 in the \nU.S. District Court for the District of Delaware, purportedly on behalf of Tesla, against Mr. Musk and the members of the Tesla \nboard of directors as then constituted. Those cases have also been consolidated and stayed pending resolution of the appeal in \nthe above-referenced consolidated purported stockholder class action. ", - "page_start": 27, - "page_end": 27, - "source_file": "tesla_form_10q.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "class actions and other consumer claims that allege, among other things, purported defects and misrepresentations related to our \nproducts and services. For example, on September 14, 2022, a proposed class action was filed against Tesla, Inc. and related \nentities in the U.S. District Court for the Northern District of California, alleging various claims about the Company’s driver \nassistance technology systems under state and federal law. This case was later consolidated with several other proposed class \nactions, and a Consolidated Amended Complaint was filed on October 28, 2022, which seeks damages and other relief on \nbehalf of all persons who purchased or leased from Tesla between January 1, 2016, to the present. On October 5, 2022, a \nproposed class action complaint was filed in the U.S. District Court for the Eastern District of New York asserting similar state \nand federal law claims against the same defendants. On September 30, 2023, the Court dismissed this action with leave to \namend the complaint. On November 20, 2023, the plaintiff moved to amend the complaint, which Tesla opposed. On August 8, \n2024, the Court denied the plaintiff’s motion for leave to file an amended complaint and entered judgment for Tesla. On \nSeptember 5, 2024, the plaintiff filed a notice of appeal to United States Court of Appeals for the Second Circuit. On March 22, \n2023, the plaintiffs in the Northern District of California consolidated action filed a motion for a preliminary injunction to order \nTesla to (1) cease using the term “Full Self-Driving Capability” (FSD Capability), (2) cease the sale and activation of FSD \nCapability and deactivate FSD Capability on Tesla vehicles, and (3) provide certain notices to consumers about proposed court- \nfindings about the accuracy of the use of the terms Autopilot and FSD Capability. Tesla opposed the motion. On September 30, \n2023, the Court denied the request for a preliminary injunction, compelled four of five plaintiffs to arbitration, and dismissed \nthe claims of the fifth plaintiff with leave to amend the complaint. On October 31, 2023, the remaining plaintiff in the Northern \nDistrict of California action filed an amended complaint, which Tesla moved to dismiss, and on May 15, 2024, the Court \ngranted in part and denied in part Tesla’s motion. On October 2, 2023, a similar proposed class action was filed in San Diego \nCounty Superior Court in California. Tesla subsequently removed the San Diego County case to federal court and on January 8, \n2024, the federal court granted Tesla’s motion to transfer the case to the U.S. District Court for the Northern District of \nCalifornia. Tesla moved to compel arbitration, which the plaintiff did not oppose, and on June 27, 2024, the Court stayed the \ncase pending arbitration. ", - "page_start": 29, - "page_end": 29, - "source_file": "tesla_form_10q.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "New York alleging breach of a stock warrant agreement that was entered into as part of a convertible notes offering in 2014. In \n2018, JP Morgan informed Tesla that it had adjusted the strike price based upon Mr. Musk’s August 7, 2018 Twitter post that he \nwas considering taking Tesla private. Tesla disputed JP Morgan’s adjustment as a violation of the parties’ agreement. In 2021, \nTesla delivered shares to JP Morgan per the agreement, which they duly accepted. JP Morgan now alleges that it is owed \napproximately $162 million as the value of additional shares that it claims should have been delivered as a result of the \nadjustment to the strike price in 2018. On January 24, 2022, Tesla filed multiple counterclaims as part of its answer to the \nunderlying lawsuit, asserting among other points that JP Morgan should have terminated the stock warrant agreement in 2018 \nrather than make an adjustment to the strike price that it should have known would lead to a commercially unreasonable result. \nTesla believes that the adjustments made by JP Morgan were neither proper nor commercially reasonable, as required under the \nstock warrant agreements. JP Morgan filed a motion for judgment on the pleadings, which Tesla opposed, and on September \n12, 2024, the Court denied JP Morgan’s motion. ", - "page_start": 28, - "page_end": 28, - "source_file": "tesla_form_10q.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "On June 16, 2022, two Tesla stockholders filed separate derivative actions in the U.S. District Court for the Western \nDistrict of Texas, purportedly on behalf of Tesla, against certain of Tesla’s current and former directors. Both suits assert claims \nfor breach of fiduciary duty, unjust enrichment, and violation of the federal securities laws in connection with alleged race and \ngender discrimination and sexual harassment. Among other things, plaintiffs seek declaratory and injunctive relief, unspecified \ndamages payable to Tesla, and attorneys’ fees. On July 22, 2022, the Court consolidated the two cases and on September 6, \n2022, plaintiffs filed a consolidated complaint. On November 7, 2022, the defendants filed a motion to dismiss the case and on \nSeptember 15, 2023, the Court dismissed the action but granted plaintiffs leave to file an amended complaint. On November 2, \n2023, plaintiff filed an amended complaint purportedly on behalf of Tesla, against Elon Musk. On December 19, 2023, the \ndefendants moved to dismiss the amended complaint, which the Court granted on April 12, 2024, with leave for plaintiffs to \namend. On May 15, 2024, plaintiffs filed a second amended consolidated complaint purportedly on behalf of Tesla, against Mr. \nMusk. On July 1, 2024, the defendants moved to dismiss the second amended consolidated complaint. ", - "page_start": 28, - "page_end": 28, - "source_file": "tesla_form_10q.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Additionally, on June 1, 2022 the Equal Employment Opportunity Commission (“EEOC”) issued a cause finding against \nTesla that closely parallels the CRD’s allegations. On September 28, 2023, the EEOC filed a civil complaint against Tesla in the \nUnited States District Court for the Northern District of California asserting claims for race harassment and retaliation and \nseeking, among other things, monetary and injunctive relief. ", - "page_start": 28, - "page_end": 28, - "source_file": "tesla_form_10q.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" } ] }, @@ -15479,70 +15479,70 @@ "target_page": 26, "target_passage": " increase in our effective tax rate is primarily due to the impact of releasing the valuation allowance on our U.S. deferred tax assets in the fourth quarter of 2023 and changes in the mix of our jurisdictional earnings", "chunk_present": { - "presence": true, - "index": 6 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 302, + "page_end": 302, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 316, + "page_end": 316, + "source_file": "00-80T-80.pdf" }, { - "text": "On June 4, 2018, a purported Tesla stockholder filed a putative class and derivative action in the Delaware Court of \nChancery against Elon Musk and the members of Tesla’s board of directors as then constituted, alleging corporate waste, unjust \nenrichment and that such board members breached their fiduciary duties by approving the stock-based compensation plan \nawarded to Elon Musk in 2018 (the “2018 CEO Performance Award”). Trial was held November 14-18, 2022. On January 30, \n2024, the Court issued an opinion finding that the 2018 CEO Performance Award should be rescinded. Plaintiff’s counsel filed \na brief seeking a fee award of 29,402,900 Tesla shares, plus expenses of $1,120,115.50. Tesla opposed the fee request on June \n7, 2024, and a hearing was held on July 8, 2024. At Tesla’s 2024 Annual Meeting of Stockholders, 72% of the disinterested \nvoting shares of Tesla, excluding shares owned by Mr. Musk and Kimbal Musk, voted to ratify the 2018 CEO Performance \nAward. On June 28, 2024, because Tesla’s disinterested stockholders voted to ratify the 2018 CEO Performance Award, Mr. \nMusk and the other director defendants, joined by Tesla, filed a brief seeking to revise the Court’s January 30, 2024 opinion, \nand a hearing was held on August 2, 2024. ", - "page_start": 27, - "page_end": 27, - "source_file": "tesla_form_10q.pdf" + "text": "", + "page_start": 316, + "page_end": 316, + "source_file": "00-80T-80.pdf" }, { - "text": "Research and Development Expense \n\nThree Months Ended \nSeptember 30, Nine Months Ended \nSeptember 30, Change \n\n2024 2023 $ % 2024 2023 \n\n$ 1,039 $ 1,161 $ (122) (11)% $ 3,264 $ 2,875 $ 389 \n\n4 % 5 % 5 % 4 % \n\nResearch and development (“R&D”) expenses decreased $122 million, or 11%, in the three months ended September 30, \n\n2024 as compared to the three months ended September 30, 2023 primarily due to a decrease in vehicle programs, partially \noffset by an increase in AI related costs year over year. R&D expenses as a percentage of revenue decreased from 5% to 4% in \nthe three months ended September 30, 2024 as compared to the three months ended September 30, 2023 primarily due to lower \nR&D expenses in the current period. \n\nR&D expenses increased $389 million, or 14%, in the nine months ended September 30, 2024 as compared to the nine \n\nmonths ended September 30, 2023. The overall increases were primarily driven by additional costs year over year related to AI \nprograms. R&D expenses as a percentage of revenue increased from 4% to 5% in the nine months ended September 30, 2024 \nas compared to the nine months ended September 30, 2023 as we continue to expand our product roadmap and technologies. ", - "page_start": 40, - "page_end": 40, - "source_file": "tesla_form_10q.pdf" + "text": "", + "page_start": 316, + "page_end": 316, + "source_file": "00-80T-80.pdf" }, { - "text": "Due \ndate \n\n2013 \n2014 \n2014 \n2015 \n2015 \n2016 \n2017 \n2018 \n2019 \n2020 \n2021 \n2022 \n2023 \n2023 \n2032 \n2038 \n2039 \n2040 \n2041 \n2043 \n2043 ", - "page_start": 115, - "page_end": 115, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 316, + "page_end": 316, + "source_file": "00-80T-80.pdf" }, { - "text": "ww.nytimes.com/2023/07/05/business/artificial-intelligence-power-data-centers.html).*The*\n*New York Times*. Archived (https://web.archive.org/web/20240708214644/https://www.nytim \nes.com/2023/07/05/business/artificial-intelligence-power-data-centers.html) from the original \non 8 July 2024. Retrieved 5 October 2024. \n\n203. \"Electricity 2024 – Analysis\" (https://www.iea.org/reports/electricity-2024).*IEA*. 24 January \n\n2024. Retrieved 13 July 2024. \n\n204. Calvert, Brian (28 March 2024). \"AI already uses as much energy as a small country. It's \n\nonly the beginning\" (https://www.vox.com/climate/2024/3/28/24111721/ai-uses-a-lot-of-ener \ngy-experts-expect-it-to-double-in-just-a-few-years).*Vox*. New York, New York. Archived (http \ns://web.archive.org/web/20240703080555/https://www.vox.com/climate/2024/3/28/2411172 \n1/ai-uses-a-lot-of-energy-experts-expect-it-to-double-in-just-a-few-years) from the original \non 3 July 2024. Retrieved 5 October 2024. ", - "page_start": 42, - "page_end": 42, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 316, + "page_end": 316, + "source_file": "00-80T-80.pdf" }, { - "text": "Note 9 – Income Taxes \n\nOur effective tax rate was 22% and 23% for the three and nine months ended September 30, 2024, respectively, \ncompared to 8% and 10% for the three and nine months ended September 30, 2023, respectively. The increase in our effective \ntax rate is primarily due to the impact of releasing the valuation allowance on our U.S. deferred tax assets in the fourth quarter \nof 2023 and changes in the mix of our jurisdictional earnings. \n\nOur effective tax rates for the three and nine months of 2024 and 2023 as compared to the U.S. federal statutory rate of \n\n21% were primarily impacted by the mix of our jurisdictional earnings subject to different tax rates, valuation allowances on \nour deferred tax assets and benefits from our U.S. tax credits and the Inflation Reduction Act of 2022 (“IRA”) manufacturing \ncredits. \n\nWe are subject to tax examinations in the U.S. federal, state and foreign jurisdictions. Given the uncertainty in timing \n\nand outcome of our tax examinations, an estimate of the range of the reasonably possible change in gross unrecognized tax \nbenefits within twelve months cannot be made at this time. \n\nNote 10 – Commitments and Contingencies ", - "page_start": 26, - "page_end": 26, - "source_file": "tesla_form_10q.pdf" + "text": "", + "page_start": 316, + "page_end": 316, + "source_file": "00-80T-80.pdf" }, { - "text": "Three Months Ended \nSeptember 30, Nine Months Ended \nSeptember 30, Change \n\n2024 2023 $ % 2024 2023 \n\n$ 601 $ 167 $ 434 260% $ 1,403 $ 751 $ 652 87% \n\n22 % 8 % 23 % 10 % ", - "page_start": 42, - "page_end": 42, - "source_file": "tesla_form_10q.pdf" + "text": "", + "page_start": 316, + "page_end": 316, + "source_file": "00-80T-80.pdf" }, { - "text": "Financing Receivables \n\nAs of September 30, 2024 and December 31, 2023, the vast majority of our financing receivables were at current status \n\nwith an immaterial balance being past due. As of September 30, 2024 and December 31, 2023, the majority of our financing \nreceivables, excluding MyPower notes receivable, were originated in 2023 and 2022. \n\n13 ", - "page_start": 17, - "page_end": 17, - "source_file": "tesla_form_10q.pdf" + "text": "", + "page_start": 316, + "page_end": 316, + "source_file": "00-80T-80.pdf" }, { - "text": "Our provision for income taxes increased by $434 million in the three months ended September 30, 2024 and increased \nby $652 million in the nine months ended September 30, 2024 as compared to the three and nine months ended September 30, \n2023, respectively. Our effective tax rate increased from 8% to 22% in the three months ended September 30, 2024 and \nincreased from 10% to 23% in the nine months ended September 30, 2024 as compared to the three and nine months ended \nSeptember 30, 2023, respectively. These increases are primarily due to the impact of releasing the valuation allowance on our \nU.S. deferred tax assets in the fourth quarter of 2023 and changes in mix of jurisdictional earnings. \n\nSee Note 9, Income Taxes, to the consolidated financial statements included elsewhere in this Quarterly Report on Form \n10-Q for further details. \n\nLiquidity and Capital Resources \n\nWe expect to continue to generate net positive operating cash flow as we have done in the last five fiscal years. The cash \n\nwe generate from our core operations enables us to fund ongoing operations and production, our research and development \nprojects for new products and technologies including our proprietary battery cells, additional manufacturing ramps at existing \nmanufacturing facilities, the construction of future factories, and the continued expansion of our retail and service locations, \nbody shops, Mobile Service fleet, Supercharger, including to support NACS, energy product installation capabilities and \nautonomy and other artificial intelligence enabled products. ", - "page_start": 43, - "page_end": 43, - "source_file": "tesla_form_10q.pdf" + "text": "", + "page_start": 316, + "page_end": 316, + "source_file": "00-80T-80.pdf" } ] }, @@ -15553,70 +15553,70 @@ "target_page": 6, "target_passage": "The primary candidate for such mode is an optical phonon", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 151, + "page_end": 151, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "approximation is that the self-energy can be computed \nanalytically. The full self-energy obtained with the lat- \ntice dispersion is more involved and can only be obtained \nnumerically, but its structure is quite similar to the one \nobtained with a constant DOS. \nThe self-energy for a constant DOS is given by \n\ni \n2π \n(13) \n\nZ \nwhere \n\nω2 \n0 \nω2 \n0 − (iΩ)2 \n\nand λn is a dimensionless electron-boson coupling. Inte- \ngrating and transforming to real frequencies, we obtain \n\nπ \n2 \n\nWe next consider the case of electrons interacting with \na single boson mode which by itself is not affected by su- \nperconductivity. The primary candidate for such mode is \nan optical phonon. The imaginary part of the NS self en- \nergy has been discussed numerous times in the literature. \nWe make one simplifying assumption – approximate the \nDOS by a constant in calculating fermionic self-energy. \nWe will, however, keep the full lattice dispersion in the \ncalculations of the optical integral. The advantage of this \n(ω + ωo)2 − ∆2 ! ", - "page_start": 6, - "page_end": 6, - "source_file": "1001.0764.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "is imposed on the minimal U(1)B L model, the symmetry breaking scale appears to be the \n− \n\nTeV scale naturally. If this is the case, all new particles, the Z ′ gauge boson, the B L \n\n− \nL gauge Higgs boson H and the RH neutrinos appear at the TeV scale unless the U(1)B \n− \n\ncoupling is extremely small, and they can be discovered at Large Hadron Collider [5–8]. \n\nThen we may be able to understand the relation between the gauge symmetry breaking and \n\nthe origin of neutrino masses. \n\nAlthough such a TeV scale model is interesting and appealing, one might think that the \n\nabsence of dark matter (DM) candidate is a shortcoming of this model. A sterile RH neutrino \n\nwith mass of the order of MeV is one possibility [9]. In this paper, we propose a very simple \n\nidea to introduce the DM candidate in the minimal gauged U(1)B L model. We introduce \n− \n\nthe Z2 parity into the model and impose one of three RH neutrinos to be odd, while the \n\nothers even. In this way, the Z2-odd RH neutrino becomes stable and the DM candidate. ", - "page_start": 2, - "page_end": 2, - "source_file": "1002.2525.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "We now turn to a more microscopic model- the CB \nmodel. The model describes fermions interacting by ex- \nchanging soft, overdamped collective bosons in a partic- \nular, near-critical, spin or charge channel31,44,45. This \ninteraction is responsible for the normal state self-energy \nand also gives rise to a superconductivity. A peculiar \nfeature of the CB model is that the propagator of a col- \nlective boson changes below Tc because this boson is not \nan independent degree of freedom (as in EB model) but \nis made out of low-energy fermions which are affected by \nsuperconductivity32. \n\n0 \n\nFIG. 15: Top – σ(ω) in the NS and the SCS in the ‘corrected’ \nMFLI model with the feedback from SC on the quasiparticle \n√−ω2+∆2 . In the SCS σ \ndamping: iΓ term transforms into \nnow begins at Ω = 2∆. The parameters are same as in Fig. \n10. Bottom – the behavior of Kubo sum with Γ. Observe \nthat W (ωc) in the NS is larger than in the SCS. \n\nΓ ", - "page_start": 10, - "page_end": 10, - "source_file": "1001.0764.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "integral in the SCS at T = 0 and in the NS extrapolated \nto T = 0 and compare the cut off effect ∆f (ωc) to ∆WK \nterm. We also analyze the sign of ∆W (ωc) at large fre- \nquencies and discuss under what conditions theoretical \nW (∞) increases in the SCS. \n\nWe perform calculations for four models. First is a \nconventional BCS model with impurities (BCSI model). \nSecond is an Einstein boson (EB) model of fermions in- \nteracting with a single Einstein boson whose propaga- \ntor does not change between NS and SCS. These two \ncases will illustrate a conventional idea of the spectral \nweight in SCS being less than in NS. Then we con- \nsider two more sophisticated models: a phenomenological \n“marginal Fermi liquid with impurities” (MFLI) model \nof Norman and P´epin30, and a microscopic collective bo- \nson (CB) model31 in which in the NS fermions interact \nwith a gapless continuum of bosonic excitations, but in a \nd−wave SCS a gapless continuum splits into a resonance \nand a gaped continuum. This model describes, in par- \nticular, interaction of fermions with their own collective \nspin fluctuations32 via ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0764.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "The purpose of this work is to investigate the role of the lattice in the optical Kubo sum rule in \nthe cuprates. We compute conductivities, optical integrals W , and ∆W between superconducting \nand normal states for 2-D systems with lattice dispersion typical of the cuprates for four different \nmodels – a dirty BCS model, a single Einstein boson model, a marginal Fermi liquid model, and a \ncollective boson model with a feedback from superconductivity on a collective boson. The goal of \nthe paper is two-fold. First, we analyze the dependence of W on the upper cut-off (ωc) placed on \nthe optical integral because in experiments W is measured up to frequencies of order bandwidth. \nFor a BCS model, the Kubo sum rule is almost fully reproduced at ωc equal to the bandwidth. But \nfor other models only 70%-80% of Kubo sum rule is obtained up to this scale and even less so for \n∆W , implying that the Kubo sum rule has to be applied with caution. Second, we analyze the sign \nof ∆W . In all models we studied ∆W is positive at small ωc, then crosses zero and approaches a \nnegative value at large ωc, i.e. the optical integral in a superconductor is smaller than in a normal \nstate. The point of zero crossing, however, increases with the interaction strength and in a collective \nboson model becomes comparable to the bandwidth at strong coupling. We argue that this model \nexhibits the behavior consistent with that in the cuprates. ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0764.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "We have proposed a scenario of the RH neutrino dark matter in the context of the minimal \n\ngauged U(1)B L model. We have introduced a discrete Z2 parity in the model, so that one \n− \n\nRH neutrino assigned as Z2-odd can be stable and, hence, the DM candidate, while the other \n\ntwo RH neutrinos account for neutrino masses and mixings through the seesaw mechanism. \n\nNo additional degrees of freedom are necessary to be added. We have evaluated the relic \n\ndensity of the dark matter particle. The dominant annihilation modes are via the Higgs \n\nboson exchange processes in the s-channel and thus, our model can be called Higgs portal \n\nDM model. It has been found that the relic density consistent with the current observation \n\n8 ", - "page_start": 8, - "page_end": 8, - "source_file": "1002.2525.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "The most relevant point for our discussion is that this \nmodel contains the physics which we identified above as \na source of a potential sign change of ∆WK . Namely, \nat strong coupling the fermionic self-energy in the NS \nis large because there exists strong scattering between \nlow-energy fermions mediated by low-energy collective \nbosons. In the SCS, the density of low-energy fermions \ndrops and a continuum collective excitations becomes \ngaped. Both effects reduce fermionic damping and lead \nto the increase of WK in a SCS. If this increase exceeds a \nconventional loss of WK due to a gap opening, the total \n∆WK may become positive. \n\nThe CB model has been applied numerous times to the \ncuprates, most often under the assumption that near- \ncritical collective excitations are spin fluctuations with \nmomenta near Q = (π, π). This version of a CB bo- \nson is commonly known as a spin-fermion model. This \nmodel yields dx2 \ny2 superconductivity and explains in a \nquantitative way a number of measured electronic fea- \ntures of the cuprates, in particular the near-absence of \nthe quasiparticle peak in the NS of optimally doped and \nunderdoped cuprates39 and the peak-dip-hump structure \nin the ARPES profile in the SCS31,32,46,47. In our analy- \nsis we assume that a CB is a spin fluctuation. ", - "page_start": 10, - "page_end": 10, - "source_file": "1001.0764.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "can be achieved only when the annihilation processes are enhanced by Higgs resonances. \n\nTherefore, the mass of the RH neutrino DM should be around a half of Higgs boson masses. \n\nWe have also calculated the elastic scattering cross section between the DM particle and a \n\nproton and found it within the reach of future experiments for the direct DM search. ", - "page_start": 9, - "page_end": 9, - "source_file": "1002.2525.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_MGM_2004.pdf" } ] }, @@ -15627,70 +15627,70 @@ "target_page": 8, "target_passage": "a phenomenological model for the self energy which fits normal state scattering rate measure- ments by ARPES", "chunk_present": { - "presence": true, - "index": 6 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 421, + "page_end": 421, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "addressing the issue of the optical sum rule in the c−axis7 \nand in-plane conductivities 8–16 in overdoped, optimally \ndoped, and underdoped cuprates. The experimental re- \nsults demonstrated, above all, outstanding achievements \nof experimental abilities as these groups managed to de- \ntect the value of the optical integral with the accuracy \nof a fraction of a percent. The analysis of the change \nof the optical integral between normal and SCS is even \nmore complex because one has to (i) extend NS data to \nT < Tc and (ii) measure superfluid density with the same \naccuracy as the optical integral itself. \n\nThe analysis of the optical integral showed that in over- \ndoped cuprates it definitely decreases below Tc, in con- \nsistency with the expectations at weak coupling11. For \nunderdoped cuprates, all experimental groups agree that \na relative change of the optical integral below Tc gets \nmuch smaller. There is no agreement yet about the sign \nof the change of the optical integral : Molegraaf et al.8 \nand Santander-Syro et al.9 argued that the optical inte- \ngral increases below Tc, while Boris et al.10 argued that \nit decreases. ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0764.pdf" + "text": "", + "page_start": 152, + "page_end": 152, + "source_file": "00-80T-80.pdf" }, { - "text": "**Optical platters**\nWhen you work with optical platters, check and adjust the values for the following parameters \nin SYS1.PARMLIB(CBROAMxx): \n\n(cid:2)**MOUNTWAITTIME**: Specifies the amount of time (in minutes) that can pass while a volume \nwaits to be mounted on an operator-accessible drive within an optical library. After this \ntime expires, message CBR4426D is issued to allow the operator to try again or to cancel \nthe volume mount request. This value can be any numeric value 1 - 9999. If the operator \nretries the mount request, the value that is specified in the**MOUNTWAITTIME**parameter is \nused for the retry. The default value of this parameter is 5 minutes. \n\n(cid:2)**OPTICALDISPATCHERDELAY**: Specifies the number of seconds that the OAM optical \n\ndispatcher delays the processing of certain requests to minimize the flipping of optical disk \ncartridges in an automated optical storage library that expects that another read request \nfor the currently mounted optical disk volume will arrive within this delay interval. \n\nThe OAM optical dispatcher delays processing of a unit of work for a specific period, when \n*all*of the following conditions are true: ", - "page_start": 136, - "page_end": 136, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 152, + "page_end": 152, + "source_file": "00-80T-80.pdf" }, { - "text": "The second graph of figure 1.34 shows that \n\nand G can approximate the the sum of CD, \n\ne \nactual airplane CD through a large range of lift \ncoefficients. For airplanes of moderate aspect \nratio, this representation of the airplane total \ndrag is quite accurate in the ordinary range of \nlift coefficients up to near 70 percent of CL,,. \nthe proced- \nAt high lift coefficients near CL-, \n\n-mm ", - "page_start": 107, - "page_end": 107, + "text": "", + "page_start": 152, + "page_end": 152, "source_file": "00-80T-80.pdf" }, { - "text": "*Figure 5-18 Content Manager OnDemand for i disk pool definition*\n\n**Optical storage group**\n*Optical storage groups*are used by Content Manager OnDemand to group sets of optical \nvolumes for the storage of related data. Optical storage groups are used to group physical \noptical volumes and virtual optical volumes. Each optical storage group must contain only one \ntype (physical or virtual). By using a specific storage group in the migration policy, the \nadministrator can control the sets of reports that are stored on a particular set of optical \nvolumes. Use IBM Navigator for i to define the optical storage group (Figure 5-19). ", - "page_start": 145, - "page_end": 145, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 153, + "page_end": 153, + "source_file": "00-80T-80.pdf" }, { - "text": "For their analysis of the optical integral, Norman and \nP´epin30 introduced a phenomenological model for the self \nenergy which fits normal state scattering rate measure- \nments by ARPES41. \n(ω) out \nof two contributions - impurity scattering and electron- \nelectron scattering which they approximated phenomeno- \nlogically by the marginal Fermi liquid form of αω at small \nfrequencies6 (MFLI model). The total Σ \n\n120 \n0 ′′ \nIt constructs the NS Σ \n\nFIG. 10: Top –the conductivities in the NS and SCS in the \noriginal MFLI model of Ref.30. We set Γ = 70 meV , α = 0.75, \n∆ = 32 meV , ω1 = 71 meV . Note that σ \n(ω) in the SCS \nbegins at Ω = ∆ + ω1. Bottom – the behavior of WK with Γ. \nis \n\nω \nωsat (cid:19) \nwhere ωsat is about ∼ 1 \n2 of the bandwidth, and f (x) ≈ 1 \nfor x < 1 and decreases for x > 1. In Ref 30 f (x) was \nassumed to scale as 1/x at large x such that Σ′′ is flat at \nlarge ω. The real part of Σ(ω) is obtained from Kramers- \nKr¨onig relations. For the superconducting state, they \nobtained Σ \nby cutting off the NS expression on the lower \nend at some frequency ω1 (the analog of ω0 + ∆ that we \nhad for EB model): ", - "page_start": 8, - "page_end": 8, - "source_file": "1001.0764.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "0 \n1 \n0 \n2 \n\nn \na \nJ \n\n5 \n1 \n\n*Introduction:*Since the invention of the separated-field \ntechnique [1], it has played an important role in the field of \nprecision spectroscopy due to its linewidth narrowing effect \nvia multiple coherent interaction. Atomic clocks based on \nthis technique have greatly extended our ability for frequency \nmeasurement, further, almost all the atom interferometers are \nbased on this technique [2]. \n\ncus on the stimulated emission spectrum via multiple coher- \nent interactions inside the cavity. We find this Ramsey laser \ncan provide a stimulated-emission spectrum with a linewidth \nmuch narrower than that of any conventional optical Ramsey \nseperated-field spectroscopy, which is commonly applied in \noptical atomic clock. Our results also show that a subnatural \nlinewidth spectroscopy, superior to any other available subnat- \nural spectroscopy technique at present [3–10], can be reached \nby this kind of laser, if a suitable atomic level structure is cho- \nsen. Thus, this method can provide an effective subnatural \nspectroscopy, and the possibilities for the new optical clock \nscheme [15] and atom interferometers [2]. \n\n] \nh \np \n- \nt \nn \na \nu \nq \n[ \n\n1 \nv \n0 \n7 \n6 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.2670.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "f. See AI winter § Machine translation and the ALPAC report of 1966 \ng. Compared with symbolic logic, formal Bayesian inference is computationally expensive. For \n\ninference to be tractable, most observations must be conditionally independent of one \nanother. AdSense uses a Bayesian network with over 300 million edges to learn which ads \nto serve.[93] \n\nh. Expectation–maximization, one of the most popular algorithms in machine learning, allows \n\nclustering in the presence of unknown latent variables.[95] \n\ni. Some form of deep neural networks (without a specific learning algorithm) were described \n\nby: Warren S. McCulloch and Walter Pitts (1943)[115] Alan Turing (1948);[116] Karl Steinbuch \nand Roger David Joseph (1961).[117] Deep or recurrent networks that learned (or used \ngradient descent) were developed by: Frank Rosenblatt(1957);[116] Oliver Selfridge \n(1959);[117] Alexey Ivakhnenko and Valentin Lapa (1965);[118] Kaoru Nakano (1971);[119] \nShun-Ichi Amari (1972);[119] John Joseph Hopfield (1982).[119] Precursors to \nbackpropagation were developed by: Henry J. Kelley (1960);[116] Arthur E. Bryson \n(1962);[116] Stuart Dreyfus (1962);[116] Arthur E. Bryson and Yu-Chi Ho (1969);[116] \nBackpropagation was independently developed by: Seppo Linnainmaa (1970);[120] Paul \nWerbos (1974).[116] ", - "page_start": 29, - "page_end": 29, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 153, + "page_end": 153, + "source_file": "00-80T-80.pdf" }, { - "text": "ω \nc ω \nc \n\n(4). The \nFIG. 1: Schematic behavior of ∆W vs ωc, Eq. \nis ∆WK given by Eq. (3) \nlimiting value of ∆W at ωc = \nDepending on the value of ∆WK, there can be either one sign \nchange of ∆W (panels a and c), or no sign changes (panel b), \nor two sign changes (panel d). \n\n∞ \n\nIn our work, we perform direct numerical calculations \nof optical integrals at T = 0 for a lattice dispersion ex- \ntracted from ARPES of the cuprates. The goal of our \nwork is two-fold. First, we perform calculations of the \noptical integral in the NS and analyze how rapidly W (ωc) \napproaches WK , in other words we check how much of \nthe Kubo sum is recovered up to the scale of the band- \nwidth. Second, we analyze the difference between optical ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0764.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" } ] }, @@ -15701,70 +15701,70 @@ "target_page": 1, "target_passage": "the redistribution of the spectral weight between normal and superconducting state", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 297, + "page_end": 297, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 50, + "page_end": 50, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "One particular case, studied in detail for conventional \nsuperconductors, \nis the redistribution of the spectral \nweight between normal and superconducting states. This \nis known as Ferrel-Glover-Tinkham (FGT) sum rule:2,3 \n\nπnse2 \n2m \n\n∞ \nRe σN S(Ω) = (2) \n0+ 0+ \nZ Z \n\nIn reality, as already pointed out by Hirsch, there is no \ntrue violation as the change of the total spectral weight where ns is the superfluid density, and πnse2/(2m) is ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0764.pdf" + "text": "", + "page_start": 46, + "page_end": 46, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "1 R. Kubo, J. Phys. Soc. Jpn 12, 570(1957). \n2 R.A. Ferrrel and R.E. Glover, Phys. Rev.109, 1398 (1958). \n3 M. Tinkham and R.A. Ferrrel, Phys. Rev. Lett. 2, 331 \n(1959), M. Tinkham, Introduction to Superconductivity \n(McGraw-Hill, New York, 1975). \n\nand Phys. Rev. B 62, 15131 (2000). \n\n24 A. Toschi, M. Capone, M. Ortolani, P. Calvani, S. Lupi \nand C. Castellani, Phys. Rev. Lett. 95, 097002 (2005). \n25 F. Marsiglio, F. Carbone, A. Kuzmenko and D. van der \nMarel, Phys. Rev. B 74, 174516 (2006). \n26 L. Benfatto, S. G. Sharapov, N. Andrenacci and H. Beck, \nPhys. Rev. B 71, 104511 (2005). ", - "page_start": 15, - "page_end": 15, - "source_file": "1001.0764.pdf" + "text": "", + "page_start": 304, + "page_end": 304, + "source_file": "00-80T-80.pdf" }, { - "text": "Marlena Terrana \nCarlos Terrazas \nFrederick Terrell \nAdam Terry \nJacob Terry \nMelanie Terry \nRick Thacker \nBrittany Thomas \nChristopher Thomas \nDanny Thomas \nJim Thomas \nJosh Thomas \nKimberly Thomas \nLevi Thomas \nTodd Thomas \nTravis Thomas \nBen Thompson \nBrad Thompson \nCameron R. Thompson \nChase Thompson \nGavin Thompson \nHolly Thompson \nJack Thompson III \nJeff D. Thompson \nJoe Thompson \nKim Thompson \nNathan Thompson \nPaul Thompson \nRichard G. Thompson \nRobbie Thompson \nRonald Thompson II \nRobert Thoms \nKen Thorne \nJoey Thornton \nScott Throckmorton \nScott Tidwell \nTodd Tidwell \nJustin Tikhonoff \nTodd Tilford \nVernon Tillery Jr. \nAllen Timmons \nAubrey Timmons \nMichael Tinline \nAllen Tinsley \nLou Tinucci \nJesse Tippitt \nBrent Tipton \nVearl Tolbert Jr. \nDavid Tollison \nJohn M. Tomascik Jr. \nJohn M. Tomascik III \nAngel Torres \nAntonio Torres \nRolando Torres \nAngelo Torrey \nLin Tovar \nDarren Townley \nBill Townson Jr. \nScotty Trahan \nStephen Trahan \nJamye Trammell \nTyler Trammell \nAndy Travis \nJames Travis \nNick Traylor \nCorey Treadway \nThomas Treece \nEddie Trevino \nJuan Trevino \nVictor Trigo \nPaul Trimble \nAaron Tripi \nBrandon Triplett \nJoshua Triplett \nStephen Trosclair \nBilly Trout \nCortney Trumbly \nBrian Tschider \nValerie Tubbs \nKody Tucker \nAlan Tullius \nZack Turlington \nBrian Turner \nDonald Turner \nEric Turner \nHeather Turner \nMichele Turner \nNicole Turner \nPatricia Turner \nTodd Turner ", - "page_start": 46, - "page_end": 46, - "source_file": "NYSE_CHK_2010.pdf" + "text": "", + "page_start": 304, + "page_end": 304, + "source_file": "00-80T-80.pdf" }, { - "text": "Statistic type for inference \n\n(See Eklund et al. 2016) \n\nCorrection FDR-correction \n\nModels & analysis \n\n| /a | Inv |\n|---|---|\n| /a | Inv |\n| | |\n| | |\n| | |\n| | |\n| | |\n\n\nMultivariate modeling and predictive analysis Multivariate regression analyses was used to explore brain structure in relation to gestation. Regional, \n\nnetwork, and summary brain measures (dependent variables) were examined in relation to gestation week \n(independent variable). In follow-up statistical analyses (noted in Methods), various quality control metrics \nand global brain volume were included into the model to account for variables of non-interest (e.g., motion) \nand to identify highly impacted brain areas (e.g., controlling for total GMV). ", - "page_start": 18, - "page_end": 18, - "source_file": "pubmed4.pdf" + "text": "", + "page_start": 46, + "page_end": 46, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "**Note 3. Securities and Investments (Continued)**\n\n| | 2003 2002 2001 | | | | | | | |\n|---|---|---|---|---|---|---|---|---|\n| | (in thousands) | | | | | | | |\n| | | | $ $ | (7) | | $ 68 | | |\n| | | 48 | | | | (75) | | 5,615 |\n| | | - | | | - | | (14,700) | |\n| | | 41 | | | | (7) | | 68 |\n| | | 15 | | | | (3) | | 26 |\n| | | | $ $ | 26 | | $ (4) | | |\n\n\nAvailable-for-sale securities: \nBeginning Balance \nUnrealized holding gains (losses) during the year, net \nReclassification of recognized (gains) during the year, net \n\nDeferred tax effect related to net unrealized gains \nEnding Balance \n\n| AAss o of fD Deecceemmbbeer r3 311, ,o oththeer ri ninvveesstmtmeenntsts, ,c | coommpprirsiseedd o of fe eqquuitiyty s |\n|---|---|\n| AAss o of fD Deecceemmbbeer r3 311, ,o oththeer ri ninvveesstmtmeenntsts, ,c | coommpprirsiseedd o of fe eqquuitiyty s |\n| fsaeicr uvrailtuieess,, wcohnicshis dt oo fn tohte h faovlleo rweiandgil:y det | erminable |\n| fair values, consist of the following: | |\n", - "page_start": 27, - "page_end": 27, - "source_file": "NASDAQ_SHEN_2003.pdf" + "text": "", + "page_start": 46, + "page_end": 46, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "Angela Fan, Edouard Grave, and Armand Joulin. \n2019. Reducing Transformer Depth on Demand \nwith Structured Dropout. In International Con- \nference on Learning Representations. \n\nSaurabh Goyal, Anamitra Roy Choudhary, Venkate- \nsan Chakaravarthy, Saurabh ManishRaje, Yogish \nSabharwal, and Ashish Verma. 2020. Power- \nbert: Accelerating BERT inference for classifi- \ncation tasks. arXiv preprint arXiv:2001.08950. \n\nMaxwell Forbes, Ari Holtzman, and Yejin Choi. \n2019. Do Neural Language Representations \nLearn Physical Commonsense? In Proceedings \nof the 41st Annual Conference of the Cognitive \nScience Society (CogSci 2019), page 7. \n\nFu-Ming Guo, Sijia Liu, Finlay S. Mungall, Xue \nLin, and Yanzhi Wang. 2019. Reweighted Prox- \nimal Pruning for Large-Scale Language Repre- \nsentation. arXiv:1909.12486 [cs, stat]. ", - "page_start": 15, - "page_end": 15, - "source_file": "arxiv2_taclccby4_license.pdf" + "text": "", + "page_start": 46, + "page_end": 46, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "Although the layer subtraction does not seem to mod- \nify TC (n), the onset of helical arrangement is observed to \nshift at lower temperatures as n decreases. The chirality \nκ defined in Eq. (4) is reported in Fig 4b for n = 8. As the \ntemperature decreases, around T ∼ 80 K we can identify \na finite-size behaviour of κ which, at variance with the \nprevious one, can be easily recognized as typical of an \neffective phase transition. Such conclusion is confirmed \nby the analysis of the chiral susceptibility χκ (Fig. 4c), \nwhich for the largest L has a maximum at T = 85 K. As- \nsuming that the order parameter (4) is the relevant one \nto single out the onset of the fan arrangement, we can \nget a more accurate estimate of TN (8) by looking at the \nBinder cumulant u4(κ), reported in Fig. 4d. By making \nuse of the MH technique, we locate the crossing point at \nTN (8) = 92(2) K. Finally, it is worthwhile to observe as \nthe specific heat does not show any anomaly at TN (8), \nbeing the entropy substantially removed at TC (8). ", - "page_start": 5, - "page_end": 5, - "source_file": "1001.0510.pdf" + "text": "", + "page_start": 45, + "page_end": 45, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "Similar behavior is observed for bilayer samples con- \ntaining a 10 nm or 50 nm (Ga,Mn)As layer, with a \nbias field which is approximately inversely proportional \nto the thickness d of the ferromagnetic semiconductor \nlayer (Fig. 1, inset). This 1/d dependence of HE was \nfound previously for MnAs/(Ga,Mn)As bilayers4, and \nis generally observed in exchanged-biased thin films12. \nFrom this dependence it is possible to describe the ex- \nchange bias in terms of an interface energy per unit area, \n∆E = MF SHEd = 0.003 erg/cm2. This value is rather \nsmall compared to typical exchange bias systems12, re- \nflecting the low moment density MF S of the diluted \nFM semiconductor layer. However, the bias field for a \ngiven (Ga,Mn)As thickness is larger than is observed for \nMnO/(Ga,Mn)As structures13, while the reproducibility \nand flexibility of the present structures is much higher \ndue to the single-crystalline ferromagnetic nature of the \nFe layer. ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2449.pdf" + "text": "", + "page_start": 45, + "page_end": 45, + "source_file": "OTC_NSANY_2004.pdf" } ] }, @@ -15781,64 +15781,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 283, + "page_end": 283, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 333, + "page_end": 333, + "source_file": "00-80T-80.pdf" }, { - "text": "However, in the original Kitaev model and its later \ngeneralizations in the form of spin models, spin rotation \nsymmetry is explicitly broken. This makes them harder \nto realize in solid state systems. There are many pro- \nposals to realized the Kitaev model in more controllable \nin cold atom optical lattices17,18, or in \nsituations, e.g. \nsuperconducting circuits19. But it is still desirable for \ntheoretical curiosity and practical purposes to realize the \nKitaev-type models in spin rotation invariant systems. \n\ntion III the Kitaev model will be explicitly constructed \nusing this formalism, and some properties of this con- \nstruction will be discussed. In Section IV we will discuss \ntwo possible ways to generate the high order spin in- \nteractions involved in the construction of Section III by \nperturbative expansions. Conclusions and outlook will \nbe summarized in Section V. \n\nIn this paper we realize the Kitaev honeycomb lattice \nmodel as the low energy Hamiltonian for a spin rotation \ninvariant system. The trick is not to use the physical spin \nas the spin in the Kitaev model, instead the spin-1/2 in \nKitaev model is from some emergent two-fold degener- \nate low energy states in the elementary unit of physical \nsystem. This type of idea has been explored recently by \nJackeli and Khaliullin20, in which the spin-1/2 in the Ki- \ntaev model is the low energy Kramers doublet created by \nstrong spin-orbit coupling of t2g orbitals. In the model \npresented below, the Hilbert space of spin-1/2 in the Ki- \ntaev model is actually the two dimensional spin singlet \nsector of four antiferromagnetically coupled spin-1/2 mo- \nments, and the role of spin-1/2 operators(Pauli matrices) \nin the Kitaev model is replaced by certain combinations \nSℓ)] between the \nof Sj · \nfour spins. \n\nII. FORMULATION OF THE PSEUDO-SPIN-1/2 \nFROM FOUR-SPIN CLUSTER. ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0266.pdf" + "text": "", + "page_start": 332, + "page_end": 332, + "source_file": "00-80T-80.pdf" }, { - "text": "The exactly solvable Kitaev honeycomb lattice model is realized as the low energy effect Hamil- \ntonian of a spin-1/2 model with spin rotation and time-reversal symmetry. The mapping to low \nenergy effective Hamiltonian is exact, without truncation errors in traditional perturbation series \nexpansions. This model consists of a honeycomb lattice of clusters of four spin-1/2 moments, and \ncontains short-range interactions up to six-spin(or eight-spin) terms. The spin in the Kitaev model \nis represented not as these spin-1/2 moments, but as pseudo-spin of the two-dimensional spin singlet \nsector of the four antiferromagnetically coupled spin-1/2 moments within each cluster. Spin corre- \nlations in the Kitaev model are mapped to dimer correlations or spin-chirality correlations in this \nmodel. This exact construction is quite general and can be used to make other interesting spin-1/2 \nmodels from spin rotation invariant Hamiltonians. We discuss two possible routes to generate the \nhigh order spin interactions from more natural couplings, which involves perturbative expansions \nthus breaks the exact mapping, although in a controlled manner. ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0266.pdf" + "text": "", + "page_start": 332, + "page_end": 332, + "source_file": "00-80T-80.pdf" }, { - "text": "We constructed the exactly solvable Kitaev honeycomb \nmodel1 as the exact low energy effective Hamiltonian of \na spin-1/2 model [equations (8) or (9)] with spin-rotation \nand time reversal symmetry. The spin in Kitaev model is \nrepresented as the pseudo-spin in the two-fold degenerate \nspin singlet subspace of a cluster of four antiferromag- \nnetically coupled spin-1/2 moments. The physical spin \nmodel is a honeycomb lattice of such four-spin clusters, \nwith certain inter-cluster interactions. The machinery \nfor the exact mapping to pseudo-spin Hamiltonian was \ndeveloped (see e.g. TABLE I), which is quite general \nand can be used to construct other interesting (exactly \nsolvable) spin-1/2 models from spin rotation invariant \nsystems. \n\nThe generic couplings in (A1) [second term] can be \nconverted to couplings to these orthogonal modes, \n\nwhere Q are generalized coordinates of the corresponding \nmodes, functions f can be read off from TABLE 1.2 of \nRef.35. For the A mode, δrℓm = 2/3QA, so f A is \np \n\nf A = ", - "page_start": 8, - "page_end": 8, - "source_file": "1001.0266.pdf" + "text": "", + "page_start": 332, + "page_end": 332, + "source_file": "00-80T-80.pdf" }, { - "text": "I. INTRODUCTION. \n\nKitaev’s exactly solvable spin-1/2 honeycomb lattice \nmodel1 (noted as the Kitaev model hereafter) has in- \nspired great interest since its debut, due to its exact \nsolvability, fractionalized excitations, and the potential ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0266.pdf" + "text": "", + "page_start": 332, + "page_end": 332, + "source_file": "00-80T-80.pdf" }, { - "text": "In this Section we will construct the pseudo-spin-1/2 \nfrom a cluster of four physical spins, and map the phys- \nical spin operators to pseudo-spin operators. The map- \nping constructed here will be used in later Sections to \nconstruct the effective Kitaev model. In this Section we \nwill work entirely within the four-spin cluster, all unspec- \nified physical spin subscripts take values 1, . . . , 4. \n\nSk [or the spin-chirality Sj · (Sk × \n\nConsider a cluster of four spin-1/2 moments(called \nphysical spins hereafter), \nlabeled by S1,...,4, antiferro- \nmagnetically coupled to each other (see the right bot- \ntom part of FIG. 2). The Hamiltonian within the clus- \nter(up to a constant) is simply the Heisenberg antiferro- \nmagnetic(AFM) interactions, \n\nOne major drawback of the model to be presented is \nthat it contains high order spin interactions(involves up \nto six or eight spins), thus is still unnatural. However it \nopens the possibility to realize exotic (exactly solvable) \nmodels from spin-1/2 Hamiltonian with spin rotation in- \nvariant interactions. We will discuss two possible routes \nto reduce this artificialness through controlled perturba- \ntive expansions, by coupling to optical phonons or by \nmagnetic couplings between the elementary units. ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0266.pdf" + "text": "", + "page_start": 332, + "page_end": 332, + "source_file": "00-80T-80.pdf" }, { - "text": "τ z = χ234/(√3/4) = (4/√3)S2 (S3 S4) (6) \n\n− \nThe above representations of τ x,y,z are all invariant under \nglobal spin rotation of the physical spins. \n\n− · × \n\nWith the machinery of equations (4), (5), and (6), it \nwill be straightforward to construct various pseudo-spin- \n1/2 Hamiltonians on various lattices, of the Kitaev vari- \nety and beyond, as the exact low energy effective Hamil- \ntonian of certain spin-1/2 models with spin-rotation sym- \nmetry. In these constructions a pseudo-spin lattice site \nactually represents a cluster of four spin-1/2 moments. It is simpler to consider the permutation operators \nSk + 1/2, which just exchange the states \n= k). \nPjk ≡ \nof the two physical spin-1/2 moments j and k (j \nAs an example we consider the action of P34, \n\n2Sj · \n\nIII. REALIZATION OF THE KITAEV MODEL. \n+ ω2 + ω \n| ↓↑↑↓i | ↓↑↓↑i \n\n+ ω2 \n| ↑↓↑↓i(cid:17) ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0266.pdf" + "text": "", + "page_start": 333, + "page_end": 333, + "source_file": "00-80T-80.pdf" }, { - "text": "of the two clusters can generate at lowest order the de- \nsired high order spin interactions. In Subsection IV B we \nwill introduce certain magnetic, e.g. Heisenberg-type, in- \nteractions between physical spins of different clusters, at \nlowest order(second order) of perturbation theory the de- \nsired high order spin interactions can be achieved. These \napproaches involve truncation errors in the perturbation \nseries, thus the mapping to low energy effect Hamilto- \nnian will no longer be exact. However the error intro- \nduced may be controlled by small expansion parameters. \nIn this Section we denote the physical spins on cluster \nj(k) as j1, . . . , j4 (k1, . . . , k4), and denote pseudo-spins \non cluster j(k) as ~τj (~τk). \n\nIt is tempting to call this as an exactly solved spin liq- \nuid with spin gap ( \nJcluster), an extremely short-range \nresonating valence bond(RVB) state, from a model with \nspin rotation and time reversal symmetry. However it \nshould be noted that the unit cell of this model contains \nan even number of spin-1/2 moments (so does the orig- \ninal Kitaev model) which does not satisfy the stringent \ndefinition of spin liquid requiring odd number of elec- \ntrons per unit cell. Several parent Hamiltonians of spin \nliquids have already been constructed. See for example, \nRef.24–27. \n\n∼ ", - "page_start": 5, - "page_end": 5, - "source_file": "1001.0266.pdf" + "text": "", + "page_start": 333, + "page_end": 333, + "source_file": "00-80T-80.pdf" }, { - "text": "] \nl \ne \n- \nr \nt \ns \n. \nt \na \nm \n- \nd \nn \no \nc \n[ \n\nContents \n\nIII. Realization of the Kitaev Model. \n\nIV. Generate the High Order Physical Spin \nInteractions by Perturbative Expansion. \nA. Generate the High Order Terms by Coupling \n\n2 \nv \n6 \n6 \n2 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nto Optical Phonon. 5 \n\nB. Generate the High Order Terms by Magnetic \nInteractions between Clusters. 7 \n\nB. Derivation of the Terms Generated by \n\nGreat efforts have been invested to better understand \nthe properties of the Kitaev model. For example, sev- \neral groups have pointed out that the fractionalized Ma- \njorana fermion excitations may be understood from the \nmore familiar Jordan-Wigner transformation of 1D spin \nsystems2,3. The analogy between the non-Abelian Ising \nvortices and vortices in p + ip superconductors has been \nraised in serveral works4–7. Exact diagonalization has \nbeen used to study the Kitaev model on small lattices8. \nAnd perturbative expansion methods have been devel- \noped to study the gapped phases of the Kitaev-type \nmodels9. \n\nSecond Order Perturbation of Inter-cluster \nMagnetic Interactions 9 ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0266.pdf" + "text": "", + "page_start": 333, + "page_end": 333, + "source_file": "00-80T-80.pdf" } ] }, @@ -15855,64 +15855,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_GLW_2002.pdf" }, { - "text": "The most relevant point for our discussion is that this \nmodel contains the physics which we identified above as \na source of a potential sign change of ∆WK . Namely, \nat strong coupling the fermionic self-energy in the NS \nis large because there exists strong scattering between \nlow-energy fermions mediated by low-energy collective \nbosons. In the SCS, the density of low-energy fermions \ndrops and a continuum collective excitations becomes \ngaped. Both effects reduce fermionic damping and lead \nto the increase of WK in a SCS. If this increase exceeds a \nconventional loss of WK due to a gap opening, the total \n∆WK may become positive. \n\nThe CB model has been applied numerous times to the \ncuprates, most often under the assumption that near- \ncritical collective excitations are spin fluctuations with \nmomenta near Q = (π, π). This version of a CB bo- \nson is commonly known as a spin-fermion model. This \nmodel yields dx2 \ny2 superconductivity and explains in a \nquantitative way a number of measured electronic fea- \ntures of the cuprates, in particular the near-absence of \nthe quasiparticle peak in the NS of optimally doped and \nunderdoped cuprates39 and the peak-dip-hump structure \nin the ARPES profile in the SCS31,32,46,47. In our analy- \nsis we assume that a CB is a spin fluctuation. ", - "page_start": 10, - "page_end": 10, - "source_file": "1001.0764.pdf" + "text": "", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "", + "page_start": 160, + "page_end": 160, + "source_file": "00-80T-80.pdf" }, { - "text": "where τ x,y,z are Pauli matrices, and x, y, z-links are de- \nfined in FIG. 1. It was shown by Kitaev1 that this spin- \n1/2 model can be mapped to a model with one Majo- \nrana fermion per site coupled to Ising gauge fields on the \nlinks. And as the Ising gauge flux has no fluctuation, the \nmodel can be regarded as, under each gauge flux config- \nuration, a free Majorana fermion problem. The ground \nstate is achieved in the sector of zero gauge flux through \neach hexagon. The Majorana fermions in this sector have \nDirac-like gapless dispersion resembling that of graphene, \nas long as \nsatisfy the triangular rela- \nJz| \ntion, sum of any two of them is greater than the third \none1. It was further proposed by Kitaev1 that opening of \nfermion gap by magnetic field can give the Ising vortices \nnon-Abelian anyonic statistics, because the Ising vortex \nwill carry a zero-energy Majorana mode, although mag- \nnetic field destroys the exact solvability. \n\nJx| \n, \nJy| \n, and \n| | | ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0266.pdf" + "text": "", + "page_start": 160, + "page_end": 160, + "source_file": "00-80T-80.pdf" }, { - "text": "χ0 \n4∆2 \nΩ D( 4∆2 \n\nΩ2 ) + iΩK2(1 − 4∆2 \nΩ2 ) \n(cid:1) \n\n# \n\nfor Ω >> 2∆ (23) \n\nIn the SCS fermionic excitations acquire a gap. This \ngap affects fermionic self-energy in two ways: directly, via \nthe change of the dispersion of an intermediate boson in \nthe exchange process involving a CB, and indirectly, via \nthe change of the propagator of a CB. We remind our- \nselves that the dynamics of a CB comes from a particle- \nhole bubble which is indeed affected by ∆. \n\nSubstituting Eq 6 for χ(q, Ω) into the formula for the \nself-energy one obtains Σ′′(ω) in a SCS state as a sum of \ntwo terms31 The effect of a d−wave pairing gap on a CB has been \ndiscussed in a number of papers, most recently in31. In ", - "page_start": 11, - "page_end": 11, - "source_file": "1001.0764.pdf" + "text": "", + "page_start": 160, + "page_end": 160, + "source_file": "00-80T-80.pdf" }, { - "text": "integral in the SCS at T = 0 and in the NS extrapolated \nto T = 0 and compare the cut off effect ∆f (ωc) to ∆WK \nterm. We also analyze the sign of ∆W (ωc) at large fre- \nquencies and discuss under what conditions theoretical \nW (∞) increases in the SCS. \n\nWe perform calculations for four models. First is a \nconventional BCS model with impurities (BCSI model). \nSecond is an Einstein boson (EB) model of fermions in- \nteracting with a single Einstein boson whose propaga- \ntor does not change between NS and SCS. These two \ncases will illustrate a conventional idea of the spectral \nweight in SCS being less than in NS. Then we con- \nsider two more sophisticated models: a phenomenological \n“marginal Fermi liquid with impurities” (MFLI) model \nof Norman and P´epin30, and a microscopic collective bo- \nson (CB) model31 in which in the NS fermions interact \nwith a gapless continuum of bosonic excitations, but in a \nd−wave SCS a gapless continuum splits into a resonance \nand a gaped continuum. This model describes, in par- \nticular, interaction of fermions with their own collective \nspin fluctuations32 via ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0764.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_GLW_2002.pdf" }, { - "text": "We now turn to a more microscopic model- the CB \nmodel. The model describes fermions interacting by ex- \nchanging soft, overdamped collective bosons in a partic- \nular, near-critical, spin or charge channel31,44,45. This \ninteraction is responsible for the normal state self-energy \nand also gives rise to a superconductivity. A peculiar \nfeature of the CB model is that the propagator of a col- \nlective boson changes below Tc because this boson is not \nan independent degree of freedom (as in EB model) but \nis made out of low-energy fermions which are affected by \nsuperconductivity32. \n\n0 \n\nFIG. 15: Top ��� σ(ω) in the NS and the SCS in the ‘corrected’ \nMFLI model with the feedback from SC on the quasiparticle \n√−ω2+∆2 . In the SCS σ \ndamping: iΓ term transforms into \nnow begins at Ω = 2∆. The parameters are same as in Fig. \n10. Bottom – the behavior of Kubo sum with Γ. Observe \nthat W (ωc) in the NS is larger than in the SCS. \n\nΓ ", - "page_start": 10, - "page_end": 10, - "source_file": "1001.0764.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_GLW_2002.pdf" }, { - "text": "In this construction the pseudo-spin correlations in the \nKitaev model will be mapped to dimer or spin-chirality \ncorrelations in the physical spin system. The correspond- \ning picture of the fractionalized Majorana fermion exci- \ntations and Ising vortices still remain to be clarified. ", + "text": "", "page_start": 8, "page_end": 8, - "source_file": "1001.0266.pdf" - }, - { - "text": "where Π is evaluated by adding up the bubbles made \nout of two normal and two anomalous Green’s functions. \nBelow 2∆, Π(Ω) is real (∼ Ω2/∆ for small Ω), and the \nresonance emerges at Ω = ω0 at which Π(ω0) = ωsf . At \nfrequencies larger than 2∆, Π(Ω) has an imaginary part, \nand this gives rise to a gaped continuum in χ(Ω). \n\n(19) \n\nwhere λn is the spin-fermion coupling constant, and ωsf \nis a typical spin relaxation frequency of overdamped spin \ncollective excitations with a propagator \nThe imaginary part of the spin susceptibility around \n\nthe resonance frequency ω0 is31 \n\nχQ \n1 − i Ω \nωsf \nχ(q ∼ Q, Ω) = (20) \n\nπZoω0 \n2 \n\n′′ \nχ (q, Ω) = δ(Ω − ω0) (22) \n\nwhere χQ is the uniform static susceptibility. If we use \nOrnstein-Zernike form of χ(q) and use either Eliashberg \n45 or FLEX computational schemes48, we get rather sim- \nilar behavior of Σ as a function of frequency and rather \nsimilar behavior of optical integrals. ", - "page_start": 11, - "page_end": 11, - "source_file": "1001.0764.pdf" + "source_file": "NYSE_GLW_2002.pdf" }, { - "text": "approximation is that the self-energy can be computed \nanalytically. The full self-energy obtained with the lat- \ntice dispersion is more involved and can only be obtained \nnumerically, but its structure is quite similar to the one \nobtained with a constant DOS. \nThe self-energy for a constant DOS is given by \n\ni \n2π \n(13) \n\nZ \nwhere \n\nω2 \n0 \nω2 \n0 − (iΩ)2 \n\nand λn is a dimensionless electron-boson coupling. Inte- \ngrating and transforming to real frequencies, we obtain \n\nπ \n2 \n\nWe next consider the case of electrons interacting with \na single boson mode which by itself is not affected by su- \nperconductivity. The primary candidate for such mode is \nan optical phonon. The imaginary part of the NS self en- \nergy has been discussed numerous times in the literature. \nWe make one simplifying assumption – approximate the \nDOS by a constant in calculating fermionic self-energy. \nWe will, however, keep the full lattice dispersion in the \ncalculations of the optical integral. The advantage of this \n(ω + ωo)2 − ∆2 ! ", - "page_start": 6, - "page_end": 6, - "source_file": "1001.0764.pdf" + "text": "", + "page_start": 160, + "page_end": 160, + "source_file": "00-80T-80.pdf" } ] }, @@ -15923,70 +15923,70 @@ "target_page": 2, "target_passage": "makes them harder to realize in solid state systems", "chunk_present": { - "presence": true, - "index": 9 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 311, + "page_end": 311, + "source_file": "sg246915.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "The exactly solvable Kitaev honeycomb lattice model is realized as the low energy effect Hamil- \ntonian of a spin-1/2 model with spin rotation and time-reversal symmetry. The mapping to low \nenergy effective Hamiltonian is exact, without truncation errors in traditional perturbation series \nexpansions. This model consists of a honeycomb lattice of clusters of four spin-1/2 moments, and \ncontains short-range interactions up to six-spin(or eight-spin) terms. The spin in the Kitaev model \nis represented not as these spin-1/2 moments, but as pseudo-spin of the two-dimensional spin singlet \nsector of the four antiferromagnetically coupled spin-1/2 moments within each cluster. Spin corre- \nlations in the Kitaev model are mapped to dimer correlations or spin-chirality correlations in this \nmodel. This exact construction is quite general and can be used to make other interesting spin-1/2 \nmodels from spin rotation invariant Hamiltonians. We discuss two possible routes to generate the \nhigh order spin interactions from more natural couplings, which involves perturbative expansions \nthus breaks the exact mapping, although in a controlled manner. ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0266.pdf" + "text": "", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "in terms of physical spins S, has full \nspin rotation symmetry and time-reversal symmetry. A \npseudo-magnetic field term \n~τj term can also be \nincluded under this mapping, however the resulting Ki- \ntaev model with magnetic field is not exactly solvable. \nIt is quite curious that such a formidably looking Hamil- \ntonian (8), with biquadratic and six-spin(or eight-spin) \nterms, has an exactly solvable low energy sector. \n\nThis model, \n\n~h \nPj · ", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0266.pdf" + "text": "", + "page_start": 345, + "page_end": 345, + "source_file": "00-80T-80.pdf" }, { - "text": "We constructed the exactly solvable Kitaev honeycomb \nmodel1 as the exact low energy effective Hamiltonian of \na spin-1/2 model [equations (8) or (9)] with spin-rotation \nand time reversal symmetry. The spin in Kitaev model is \nrepresented as the pseudo-spin in the two-fold degenerate \nspin singlet subspace of a cluster of four antiferromag- \nnetically coupled spin-1/2 moments. The physical spin \nmodel is a honeycomb lattice of such four-spin clusters, \nwith certain inter-cluster interactions. The machinery \nfor the exact mapping to pseudo-spin Hamiltonian was \ndeveloped (see e.g. TABLE I), which is quite general \nand can be used to construct other interesting (exactly \nsolvable) spin-1/2 models from spin rotation invariant \nsystems. \n\nThe generic couplings in (A1) [second term] can be \nconverted to couplings to these orthogonal modes, \n\nwhere Q are generalized coordinates of the corresponding \nmodes, functions f can be read off from TABLE 1.2 of \nRef.35. For the A mode, δrℓm = 2/3QA, so f A is \np \n\nf A = ", - "page_start": 8, - "page_end": 8, - "source_file": "1001.0266.pdf" + "text": "", + "page_start": 345, + "page_end": 345, + "source_file": "00-80T-80.pdf" }, { - "text": "\nRELATIVE - \nWIND COMPONENT \nDUE TO ROTATION \nROTATION ", - "page_start": 419, - "page_end": 419, + "text": "", + "page_start": 346, + "page_end": 346, "source_file": "00-80T-80.pdf" }, { - "text": "In (16), we have been able to reduce the four spin in- \nteractions in (8) to inter-cluster Heisenberg interactions, \nand the six-spin interactions in (8) to inter-cluster spin- \nchirality interactions. The inter-cluster Heisenberg cou- \nplings in Hperturbation x,y may be easier to arrange. The inter-cluster spin-chirality coupling in Hperturbation z ex- \nplicitly breaks time reversal symmetry and is probably \nharder to implement in solid state systems. However \nspin-chirality order may have important consequences \nin frustrated magnets36,37, and a realization of spin- ", + "text": "", "page_start": 7, "page_end": 7, - "source_file": "1001.0266.pdf" + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "In this Section we will construct the pseudo-spin-1/2 \nfrom a cluster of four physical spins, and map the phys- \nical spin operators to pseudo-spin operators. The map- \nping constructed here will be used in later Sections to \nconstruct the effective Kitaev model. In this Section we \nwill work entirely within the four-spin cluster, all unspec- \nified physical spin subscripts take values 1, . . . , 4. \n\nSk [or the spin-chirality Sj · (Sk × \n\nConsider a cluster of four spin-1/2 moments(called \nphysical spins hereafter), \nlabeled by S1,...,4, antiferro- \nmagnetically coupled to each other (see the right bot- \ntom part of FIG. 2). The Hamiltonian within the clus- \nter(up to a constant) is simply the Heisenberg antiferro- \nmagnetic(AFM) interactions, \n\nOne major drawback of the model to be presented is \nthat it contains high order spin interactions(involves up \nto six or eight spins), thus is still unnatural. However it \nopens the possibility to realize exotic (exactly solvable) \nmodels from spin-1/2 Hamiltonian with spin rotation in- \nvariant interactions. We will discuss two possible routes \nto reduce this artificialness through controlled perturba- \ntive expansions, by coupling to optical phonons or by \nmagnetic couplings between the elementary units. ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0266.pdf" + "text": "", + "page_start": 346, + "page_end": 346, + "source_file": "00-80T-80.pdf" }, { - "text": "I. INTRODUCTION \n\nfrustrated magnetic \nsystems1 still raises great interest, both in consequence \nof theoretical aspects, related to their peculiar criti- \ncal properties2, and in view of possible technological \napplications3. Indeed, beside conventional ferromagnetic \nor antiferromagnetic phase transitions, in many new ma- \nterials other nontrivial and unconventional forms of or- \ndering have been observed4,5. A quantity of particular \ninterest in this context is the spin chirality, an order pa- \nrameter which turned out to be extremely relevant in, \ne.g., magnetoelectric materials6, itinerant MnSi7, binary \ncompounds as FeGe8, glass transition of spins9, and XY \nhelimagnets, as Holmium, Terbium or Dysprosium10. In \nthe latter case, a new universality class was predicted be- \ncause a Z2 × SO(2) symmetry is spontaneously broken \nin the ordered phase2: In fact, when dealing with such \nsystems, in addition to the SO(2) symmetry of the spin \ndegrees of freedom ~Si, one has to consider also the Z2 \nsymmetry of the spin chirality κij ∝ \n\nThe study of low dimensional ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0510.pdf" + "text": "", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "However, in the original Kitaev model and its later \ngeneralizations in the form of spin models, spin rotation \nsymmetry is explicitly broken. This makes them harder \nto realize in solid state systems. There are many pro- \nposals to realized the Kitaev model in more controllable \nin cold atom optical lattices17,18, or in \nsituations, e.g. \nsuperconducting circuits19. But it is still desirable for \ntheoretical curiosity and practical purposes to realize the \nKitaev-type models in spin rotation invariant systems. \n\ntion III the Kitaev model will be explicitly constructed \nusing this formalism, and some properties of this con- \nstruction will be discussed. In Section IV we will discuss \ntwo possible ways to generate the high order spin in- \nteractions involved in the construction of Section III by \nperturbative expansions. Conclusions and outlook will \nbe summarized in Section V. \n\nIn this paper we realize the Kitaev honeycomb lattice \nmodel as the low energy Hamiltonian for a spin rotation \ninvariant system. The trick is not to use the physical spin \nas the spin in the Kitaev model, instead the spin-1/2 in \nKitaev model is from some emergent two-fold degener- \nate low energy states in the elementary unit of physical \nsystem. This type of idea has been explored recently by \nJackeli and Khaliullin20, in which the spin-1/2 in the Ki- \ntaev model is the low energy Kramers doublet created by \nstrong spin-orbit coupling of t2g orbitals. In the model \npresented below, the Hilbert space of spin-1/2 in the Ki- \ntaev model is actually the two dimensional spin singlet \nsector of four antiferromagnetically coupled spin-1/2 mo- \nments, and the role of spin-1/2 operators(Pauli matrices) \nin the Kitaev model is replaced by certain combinations \nSℓ)] between the \nof Sj · \nfour spins. \n\nII. FORMULATION OF THE PSEUDO-SPIN-1/2 \nFROM FOUR-SPIN CLUSTER. ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0266.pdf" + "text": "", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_SMFG_2011.pdf" } ] }, @@ -16003,64 +16003,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 316, + "page_end": 316, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 425, + "page_end": 425, + "source_file": "00-80T-80.pdf" }, { - "text": "SEND YOUR REGISTRATION FORM \n\nSend your registration form to the \nregistrations office at Oxbridge Academy via \none of the following channels: \n\nFax: \nPost: \nE-mail: registrar@oxbridgeacademy.co.za \n086 262 5550 \nPO Box 12723, Die Boord, 7613 ", - "page_start": 27, - "page_end": 27, - "source_file": "basic-english-language-skills.PDF" + "text": "", + "page_start": 422, + "page_end": 422, + "source_file": "00-80T-80.pdf" }, { - "text": "If you are an Oxbridge Academy student, we’d like you to know \nthat we are here to help you every step of the way, and that we will \ngive you the opportunity to resubmit your assignments if you don’t \nachieve a pass mark the first time around. ", - "page_start": 37, - "page_end": 37, - "source_file": "basic-english-language-skills.PDF" + "text": "", + "page_start": 421, + "page_end": 421, + "source_file": "00-80T-80.pdf" }, { - "text": "We are registered with the Department of Higher Education and Training as a Private College in terms of Section \n31(6)(a) of the Continuing Education and Training Act, 2006 (Act No. 16 of 2006). Registration No. 2009/FE07/070. \n\n*Developed for Oxbridge Academy*", - "page_start": 59, - "page_end": 59, - "source_file": "basic-english-language-skills.PDF" + "text": "", + "page_start": 421, + "page_end": 421, + "source_file": "00-80T-80.pdf" }, { - "text": "To make the college registration process easier for you, we’ve compiled a \ncomprehensive guide on how to register at Oxbridge Academy \n(www.oxbridgeacademy.co.za/enrol-now/). The guide also includes general \ntips that will be relevant to the application and registration processes at \nother colleges. \n\n**There are 4 steps you need to follow when you want to**\n**register as a student at Oxbridge Academy:**\n\n**1.**Select Your Course \n\n**2.** Fill in Your Student Details \n\n**3.**Select Your Delivery Option \n\n**4.** Pay Your Registration Fee and Send in Your Form ", - "page_start": 21, - "page_end": 21, - "source_file": "basic-english-language-skills.PDF" + "text": "", + "page_start": 421, + "page_end": 421, + "source_file": "00-80T-80.pdf" }, { - "text": "Incorrect word choice in an exam or assignment may cause you to lose \nmarks, while using the wrong word in a business letter may create a bad \nfirst impression. \n(www.oxbridgeacademy.co.za/find-a-course/business-administration-courses/) ", - "page_start": 15, - "page_end": 15, - "source_file": "basic-english-language-skills.PDF" + "text": "", + "page_start": 421, + "page_end": 421, + "source_file": "00-80T-80.pdf" }, { - "text": "Applying for college (www.oxbridgeacademy.co.za/enrol-now/) can be a \ndaunting experience. Not only do you need to choose a course, but you \nalso need to make sure that you: \n• meet the entry requirements \n• meet the deadlines \n• \n• \n• fill in the forms correctly \nsend the forms to the right address \ninclude all the necessary attachments ", - "page_start": 21, - "page_end": 21, - "source_file": "basic-english-language-skills.PDF" + "text": "", + "page_start": 421, + "page_end": 421, + "source_file": "00-80T-80.pdf" }, { - "text": "And if you are studying via distance learning (www.oxbridgeacademy.co. \nza/distance-learning/), where you don’t have any face-to-face interac- \ntion with lecturers, you will need to rely on your tutors for the necessary \nacademic support. ", - "page_start": 33, - "page_end": 33, - "source_file": "basic-english-language-skills.PDF" + "text": "", + "page_start": 421, + "page_end": 421, + "source_file": "00-80T-80.pdf" }, { - "text": "Please make sure to check the accreditation status of your chosen course. \nSome of our courses are non-credit bearing skills development courses, \nwhich are neither accredited by external bodies nor registered on the NQF. \nPlease go to our website:*oxbridgeacademy.co.za*for more \nabout our skills development courses. \n\ninformation ", - "page_start": 22, - "page_end": 22, - "source_file": "basic-english-language-skills.PDF" + "text": "", + "page_start": 421, + "page_end": 421, + "source_file": "00-80T-80.pdf" } ] }, @@ -16077,64 +16077,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 48, + "page_end": 48, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 26, + "page_end": 26, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Figure 3-4 Overview of four-path host zoning \n\nWhen possible, use the minimum number of paths that are necessary to achieve a sufficient \nlevel of redundancy. For the Storwize V7000 environment, no more than four paths per I/O \nGroup are required to accomplish this layout. \n\nAll paths must be managed by the multipath driver on the host side. Make sure that the \nmultipath driver on each server can handle the number of paths required to access all \nvolumes mapped to the host. \n\nFor hosts that use four HBAs/ports with eight connections to an I/O Group, use the zoning \nschema that is shown in Figure 3-5 on page 57. You can combine this schema with the \nprevious four-path zoning schema. ", - "page_start": 78, - "page_end": 78, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 26, + "page_end": 26, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "When configuring multiple masters, the cluster installation process supports the native HA \nmethod. This method uses the native HA master capabilities that are built into OpenShift \nContainer Platform and can be combined with any Load Balancing solution. \n\nIf a host is defined in the [lb] section of the inventory file, Ansible installs and configures \nHAProxy automatically as the load balancing solution. If no host is defined, it is assumed that \nyou pre-configured an external load balancing solution of your choice to balance the master \nAPI (port 8443) on all master hosts. \n\n**Note:**The HAProxy Load Balancer is intended to demonstrate the API server’s HA mode \nand is not recommended for production environments. If you are deploying to a cloud \nprovider, Red Hat recommends deploying a cloud-native TCP-based Load Balancer or \ntake other steps to provide a highly available load balancer. \n\n**DNS**\nDNS service is an important component in the Red Hat OpenShift Container Platform \nenvironment. Regardless of the provider of DNS, an organization is required to have certain \nrecords in place to serve the various Red Hat OpenShift Container Platform components. \n\nConsidering the Load Balancer values for the Red Hat OpenShift Container Platform master \nservice and infrastructure nodes running router Pods are known beforehand, entries must be \nconfigured into the DNS before starting the deployment procedure. ", - "page_start": 110, - "page_end": 110, - "source_file": "sg248459.pdf" + "text": "", + "page_start": 268, + "page_end": 268, + "source_file": "00-80T-80.pdf" }, { - "text": "Figure 13-21 Update process paused for host path recovery \n\n11.After a 30-minute pause, a node failover occurs and you temporarily lose connection to the \n\nGUI to ensure that multipathing recovered on all attached hosts. A warning window \ndisplays, prompting you to refresh the current session, as shown in Figure 13-22 on \npage 694. ", - "page_start": 715, - "page_end": 715, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 268, + "page_end": 268, + "source_file": "00-80T-80.pdf" }, { - "text": "Hosts that connect to the Storwize V7000 system with iSCSI protocol must be configured \ncorrectly, as described in Chapter 3, “Planning” on page 43. \n\n**Note:**Certain host operating systems can be directly connected to the Storwize V7000 \nsystem without the need for FC fabric switches. For more information, see this page of the \nIBM System Storage Interoperation Center (SSIC). \n\nFor load balancing and access redundancy on the host side, the use of a host multipathing \ndriver is required in the following situations: \n\n(cid:2) Protection from fabric link failures, including port failures on the IBM Spectrum Virtualize \nsystem nodes \n\n(cid:2) Protection from a host HBA failure (if two HBAs are in use) \n\n(cid:2) Protection from fabric failures if the host is connected through two HBAs to two separate \nfabrics \n\n(cid:2) Provide load balancing across the host HBAs \n\nFor more information about various host operating systems and versions that are supported \nby IBM Storwize V7000, see this page of the IBM System Storage Interoperation Center \n(SSIC). \n\nFor more information about how to attach various supported host operating systems to IBM \nStorwize V7000, see IBM Knowledge Center. ", - "page_start": 340, - "page_end": 340, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 26, + "page_end": 26, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Or, if the data source is on a remote system, you also can upload the data to the specified \nContent Manager OnDemand server through FTP and then load the data on the selected \nContent Manager OnDemand system. \n\n(cid:2) For Multiplatforms and z/OS, all file systems must be dedicated file systems that are \nmounted on their own mount points. \n\n(cid:2) For z/OS, when you load PDF reports (by using the PDF Indexer), placing the input report \nin the HFS or zFS causes the load to run nearly 50 times faster that compared to the input \nreport that is placed in a VSAM file. \n\n**13.2.3 Load testing**\n\nThe goal of load testing is to verify that, under stressful system conditions, the required \namount of data can be loaded into the Content Manager OnDemand system within a time \nwindow. \n\nA general approach to load testing a system is described: \n\n(cid:2) Parallel loads: Run a single load and measure the load throughput. If the throughput does \nnot meet the requirements, run two loads in parallel and measure the throughput. While \nthe loads are run, collect system statistics to determine the system resources that are \nbeing used and any potential bottlenecks. Tune or acquire additional system resources as \nneeded. Progressively increase the number of parallel loads until the required throughput \nis met. ", - "page_start": 327, - "page_end": 327, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 25, + "page_end": 25, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**Load balancers**\nThis guide uses an external load balancer that is running HAproxy to offer a single entry point \nfor the many Red Hat OpenShift Container Platform components. Organizations can provide \ntheir own deployed load balancers if the service exists. \n\nThe Red Hat OpenShift Container Platform console, which is provided by the Red Hat \nOpenShift Container Platform master nodes, can be spread across multiple instances to \nprovide load balancing and HA properties. \n\nApplication traffic passes through the Red Hat OpenShift Container Platform Router on its \nway to the container processes. The Red Hat OpenShift Container Platform Router is a \nreverse proxy service container that multiplexes the traffic to multiple containers that make up \na scaled application that is running inside Red Hat OpenShift Container Platform. The load \nbalancer that is used by infrastructure nodes acts as the public view for the Red Hat \nOpenShift Container Platform applications. \n\nThe destination for the master and application traffic must be set in the load balancer \nconfiguration after each instance is created, the floating IP address is assigned, and before \nthe installation. A single HAproxy Load Balancer can forward both sets of traffic to different \ndestinations. ", - "page_start": 109, - "page_end": 109, - "source_file": "sg248459.pdf" + "text": "", + "page_start": 25, + "page_end": 25, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Host groups (availability zones) include the following features: \n\n(cid:2) Every host must be in a host group \n\nAny hosts that do not belong to a user-defined host group are members of the default host \ngroup. The default host group cannot be deleted. \n\n(cid:2) Virtual machines are kept within the host group \n\nA virtual machine can be deployed to a specific host or to a host group. After deployment, \nthat virtual machine must always be migrated or remote restarted within the host group. \n\n(cid:2) Placement policies are associated with host groups \n\nEvery host within a host group is subject to the host group’s placement policy. The default \nplacement policy is striping. \n\n(cid:2) Automated Remote Restart \n\nIf enabled, the PowerVC monitors hosts for failure by using the Platform Resource \nScheduler (PRS) HA service. If a host fails, PowerVC automatically remote restarts the \nVMs from the failed host to another host within a host group. \n\n(cid:2) Dynamic Resource Optimizer (DRO) \n\nIf enabled, DRO continuously monitors your cloud environment’s usage. You can specify \nthat DRO monitors CPU usage or available memory. When a host is found to be overused, \nthe DRO attempts to correct the situation by performing the action that you specified. It \ncan migrate VMs to another host within a host group or, when applicable, work with \nCapacity on Demand (CoD) to activate mobile cores. ", - "page_start": 97, - "page_end": 97, - "source_file": "sg248459.pdf" + "text": "", + "page_start": 25, + "page_end": 25, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**8.3 N-Port Virtualization ID support**\n\nThe usage model for the Storwize V7000 is based on a two-way active/active node model. \nThis is a pair of distinct control modules that share active/active access for any specific \nvolume. These nodes each have their own Fibre Channel worldwide node name (WWNN). \nTherefore, ports that are presented from each node have a set of worldwide port names \n(WWPNs) that are presented to the fabric. \n\nTraditionally, if one node fails or is removed for some reason, the paths that are presented for \nvolumes from that node go offline. In this case, it is up to the native O/S multipathing software \nto fail over from using both sets of WWPN to only those that remain online. Although this \nprocess is what multipathing software is designed to do, occasionally it can be problematic, \nparticularly if paths are not seen as coming back online for some reason. \n\nStarting with Storwize V7000 V7.7, the system can be enabled into N_Port ID Virtualization \n(NPIV) mode. When NPIV mode is enabled on the Storwize V7000 system, ports do not \ncome online until they are ready to service I/O, which improves host behavior around node \nunpends. In addition, path failures because of an offline node are masked from hosts and \ntheir multipathing driver do not need to perform any path recovery. ", - "page_start": 341, - "page_end": 341, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 25, + "page_end": 25, + "source_file": "NYSE_MGM_2004.pdf" } ] }, @@ -16145,70 +16145,70 @@ "target_page": 1, "target_passage": "Gamma ray Burst Monitor", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 166, + "page_end": 166, + "source_file": "00-80T-80.pdf" }, { - "text": "The NaI and BGO detectors on the Gamma ray Burst Monitor (GBM) on Fermi are now being \nused for long term monitoring of the hard X-ray/low energy gamma ray sky. Using the Earth \noccultation technique demonstrated previously by the BATSE instrument on the Compton Gamma \nRay Observatory, GBM produces multiband light curves and spectra for known sources and transient \noutbursts in the 8 keV - 1 MeV band with its NaI detectors and up to 40 MeV with its BGO. Coverage \nof the entire sky is obtained every two orbits, with sensitivity exceeding that of BATSE at energies \nbelow ∼ 25 keV and above ∼ 1.5 MeV. We describe the technique and present preliminary results \nafter the first ∼ 17 months of observations at energies above 100 keV. Seven sources are detected: \nthe Crab, Cyg X-1, Swift J1753.5-0127, 1E 1740-29, Cen A, GRS 1915+105, and the transient source \nXTE J1752-223. ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0955.pdf" + "text": "", + "page_start": 165, + "page_end": 165, + "source_file": "00-80T-80.pdf" }, { - "text": "sists of 12 NaI detectors 5(cid:48)(cid:48) in diameter by 0.5(cid:48)(cid:48) thick \nmounted on the corners of the spacecraft and oriented \nsuch that they view the entire sky not occulted by the \nEarth. GBM also contains 2 BGO detectors 5(cid:48)(cid:48) in di- \nameter by 5(cid:48)(cid:48) thick located on opposite sides of the \nspacecraft. None of the GBM detectors have direct \nimaging capability. \n\nI. INTRODUCTION \n\nThe Gamma ray Burst Monitor (GBM) on Fermi is \ncurrently the only instrument in orbit providing nearly \ncontinuous full sky coverage in the hard X-ray/low \nenergy gamma ray energy range. The Earth occul- \ntation technique, used very successfully on BATSE, \nhas been adapted to GBM. An initial catalog of 64 \nsources is currently being monitored and continuously \naugmented. At energies above 100 keV, six steady \nsources (the Crab, Cyg X-1, Swift J1753.5-0127, 1E \n1740-29, Cen A, GRS 1915+105) and one transient \nsource (XTE J1752-223) have been detected in the \nfirst year of observation. We describe the instrument, \noutline the technique, and present light curves for the \nseven sources. ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0955.pdf" + "text": "", + "page_start": 27, + "page_end": 27, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "Known sources of gamma ray emission can be mon- \nitored with non-imaging detectors using the Earth oc- \ncultation technique, as was successfully demonstrated \nwith BATSE [3, 4]. When a source of gamma rays \nis occulted by the Earth, the count rate measured by \nthe detector will drop, producing a step-like feature. \nWhen the source reappears from behind the Earths \nlimb, the count rate will increase, producing another \nstep. The diameter of the Earth seen from Fermi is \n∼ 140◦, so roughly 30% of the sky is occulted by the \nEarth at any one time. Coupled with the ±35◦ slew- \ning of the pointing direction every orbit, this means \nthat the entire sky is occulted every two orbits. With \nan altitude of 565 km, a period of 96 minutes, and \nan orbital inclination of 26.5◦, individual occultation \nsteps last for ∼10 seconds (Fig. 1). \n\nII. GBM AND THE EARTH OCCULTATION \nOBSERVATIONAL TECHNIQUE \n\nThe Gamma ray Burst Monitor is the secondary \ninstrument onboard the Fermi satellite [1, 2]. It con- ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0955.pdf" + "text": "", + "page_start": 26, + "page_end": 26, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "to observe these breaks, GBM is able to see significant \nemission above 300 keV, consistent with the canonical \nhard spectrum. \n\nCen A (Fig. 3) is a Sy 2 galaxy that is the brightest \nAGN in hard x-rays/low energy gamma rays. It has \na hard spectrum (Γ = 1.8) and has been observed at \nenergies > 1 MeV [9]. The GBM results are consis- \ntent with this hard spectrum, though GBM does not \nhave the sensitivity to determine if the hard spectrum \ncontinues beyond 300 keV or if the spectrum cuts off. \nCyg X-1 (Fig. 4) is a HMXB and one of the \nfirst systems determined to contain a black hole. It \nhas been observed to emit significant emission above \n100 keV including a power law tail extending out to \ngreater than 1 MeV [10, 11]. The GBM results show \nsignificant emission above 300 keV, consistent with \nthe power law tail observed when Cyg X-1 is in its \nhard state. ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0955.pdf" + "text": "", + "page_start": 165, + "page_end": 165, + "source_file": "00-80T-80.pdf" }, { - "text": "four 12-m \natmospheric-Cherenkov telescopes located in Arizona, \nis used to study VHE γ-rays from a variety of astro- \nphysical sources [4]. VERITAS began scientific obser- \nvations with a partial array in September 2006 and has \nroutinely observed with the full array since Septem- \nber 2007. The performance metrics of VERITAS in- \nclude an energy threshold of ∼100 GeV, an energy \nresolution of ∼15%, an angular resolution of ∼0.1◦, \nand a sensitivity yielding a 5σ detection of a 1% Crab \nNebula flux object in <30 hours1. VERITAS has an \nactive maintenance program (e.g. frequent mirror re- \ncoating and alignment) to ensure its continued high \nperformance over time, and an upgrade improving \nboth the camera (higher quantum-efficiency PMTs) \nand the trigger system has been proposed to the fund- \ning agencies. \n\nVERITAS, a stereoscopic array of \n\nVHE blazars have double-humped spectral energy \ndistributions (SEDs), with one peak at UV/X-ray en- \nergies and another at GeV/TeV energies. The ori- \ngin of the lower-energy peak is commonly explained \nas synchrotron emission from the relativistic electrons \nin the blazar jets. The origin of the higher-energy \npeak is controversial, but is widely believed to be the \nresult of inverse-Compton scattering of seed photons \noff the same relativistic electrons. The origin of the \nseed photons in these leptonic scenarios could be the \nsynchrotron photons themselves, or photons from an \nexternal source. Hadronic scenarios are also plausible \nexplanations for the VHE emission, but generally are \nnot favored. ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" + "text": "", + "page_start": 165, + "page_end": 165, + "source_file": "00-80T-80.pdf" }, { - "text": "Figure 5: Ratio of γ-ray luminosity to submillimeter luminosity in the 1mm band. The location of an object in this \nplot should be directly correlated with its blazar “state”, with FSRQs occupying the upper right and BL Lacs the lower \nleft. Flat-spectrum radio quasar 3C 454.3 is the object with the highest submillimeter luminosity in this plot. ", - "page_start": 5, - "page_end": 5, - "source_file": "1001.0806.pdf" + "text": "", + "page_start": 166, + "page_end": 166, + "source_file": "00-80T-80.pdf" }, { - "text": "In general, we find that in the submillimeter, we \nare observing these blazars at or near the peak of the \nsynchrotron component (αS ∼ 0), but that Fermi - \ndetected sources have more negative energy spectral \nindices overall than Fermi -nondetected sources. \nIn \nFigure 4, we see that while the majority of Fermi \nblazars are observed on the rising part of the syn- \nchrotron component (at lower energies than the peak), \nall of the objects have very steeply falling γ-ray energy \nspectral indexes, putting the γ-ray peak at lower en- \nergies than the observed Fermi band. Knowing that \nwe are not observing the synchrotron and γ-ray com- \nponents at analagous points in the spectrum may al- \nlow us to better understand the magnetic field in the \nparsec-scale jet region and the population of external \nphotons that is being upscattered to γ-rays. \n\nThis method yielded some surprising results. \nIn \nFigure 3, we see that the BL Lacs and FSRQs exhibit \nvirtually no difference in characteristic timescale, with ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0806.pdf" + "text": "", + "page_start": 24, + "page_end": 24, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "We present multi-epoch observations from the Submillimeter Array (SMA) for a sample of 171 bright blazars, \n43 of which were detected by Fermi during the first three months of observations. We explore the correlation \nbetween their gamma-ray properties and submillimeter observations of their parsec-scale jets, with a special \nemphasis on spectral index in both bands and the variability of the synchrotron component. Subclass is de- \ntermined using a combination of Fermi designation and the Candidate Gamma-Ray Blazar Survey (CGRaBS), \nresulting in 35 BL Lac objects and 136 flat-spectrum radio quasars (FSRQs) in our total sample. We calculate \nsubmillimeter energy spectral indices using contemporaneous observations in the 1 mm and 850 micron bands \nduring the months August–October 2008. The submillimeter light curves are modeled as first-order continuous \nautoregressive processes, from which we derive characteristic timescales. Our blazar sample exhibits no differ- \nences in submillimeter variability amplitude or characteristic timescale as a function of subclass or luminosity. \nAll of the the light curves are consistent with being produced by a single process that accounts for both low \nand high states, and there is additional evidence that objects may be transitioning between blazar class during \nflaring epochs. ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0806.pdf" + "text": "", + "page_start": 23, + "page_end": 23, + "source_file": "NYSE_HIG_2001.pdf" } ] }, @@ -16219,70 +16219,70 @@ "target_page": 3, "target_passage": "is a HMXB and one of the first systems determined to contain a black hole", "chunk_present": { - "presence": true, - "index": 7 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 242, + "page_end": 242, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "\n4 \nSTABLE, POSITIVE CyAC ", - "page_start": 273, - "page_end": 273, - "source_file": "00-80T-80.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "In thermodynamic equilibrium [27], the coverage of the ac- \ntive sites follows from \n\nK[X]C[X] \nΘ[X] = , (4) \n1 + (cid:80) \nY K[Y ]C[Y ] \n\nwhere K = k+/k− is the ratio of forward and backward rate \nconstants for the adsorption reaction, \n\n(cid:20) (cid:21) \n\nEads[X] + T S[X] \nkBT \n\nThe adsorption energies for N2, O2, H2O, CO, NH3, and \nH2S on the metallic site of the doped (6,6) CNTs are shown in \nFig. 2(a). The adsorption energy of a molecule X is defined \nby \n\nK[X] = exp − . (5) \n\nIn these expressions C[X] is the concentration of species X, \nS[X] is its gas phase entropy and T is the temperature. Ex- \nperimental values for the gas phase entropies have been taken \nfrom Ref. [28]. Eads[X@M@VC] = E[X@M@VC] − E[X] − E[M@VC], \n(3) ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2538.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "Table 7 Summary of consistent individual predictors for each utilization outcome*\nUtilization outcome \nDependent variable \n\nAny care Opioids Injection Surgery Diagnostic tests or imaging \n\nAge \n\nInsurance \n\nComorbidities (CCI) X X \n\nBaseline disability X X X X \n\nBaseline pain X \n\nChange in pain X X X \n\nChange in disability X \n\nChange in 10-item OSPRO-YF X \n\nCCI Charlson comorbidity index, OSPRO-YF Pain-related psychological distress screening tool \n*Significant predictors (p < .05) for each dependent variable denoted with “X” ", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed5.pdf" + "text": "", + "page_start": 286, + "page_end": 286, + "source_file": "00-80T-80.pdf" }, { - "text": "x x \ny y \nz z z \nx x x x \ny y y \nz z z z \nx x x x \ny y y \nz z z z \nx x x \ny y y \n\nFIG. 1: The honeycomb lattice for the Kitaev model. Filled \nand open circles indicate two sublattices. x, y, z label the links \nalong three different directions used in (1). ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0266.pdf" + "text": "", + "page_start": 286, + "page_end": 286, + "source_file": "00-80T-80.pdf" }, { - "text": "to realize non-Abelian anyons. The model simply reads \n\nJyτ y \nj τ y \nJxτ x \nj τ x \nHKitaev = \nk − X \nk \n− X \nx−links y−links \n\nJzτ z j τ z \nk \n− X \nz−links \n\n(1) ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0266.pdf" + "text": "", + "page_start": 31, + "page_end": 31, + "source_file": "ASX_MRM_2000.pdf" }, { - "text": "to observe these breaks, GBM is able to see significant \nemission above 300 keV, consistent with the canonical \nhard spectrum. \n\nCen A (Fig. 3) is a Sy 2 galaxy that is the brightest \nAGN in hard x-rays/low energy gamma rays. It has \na hard spectrum (Γ = 1.8) and has been observed at \nenergies > 1 MeV [9]. The GBM results are consis- \ntent with this hard spectrum, though GBM does not \nhave the sensitivity to determine if the hard spectrum \ncontinues beyond 300 keV or if the spectrum cuts off. \nCyg X-1 (Fig. 4) is a HMXB and one of the \nfirst systems determined to contain a black hole. It \nhas been observed to emit significant emission above \n100 keV including a power law tail extending out to \ngreater than 1 MeV [10, 11]. The GBM results show \nsignificant emission above 300 keV, consistent with \nthe power law tail observed when Cyg X-1 is in its \nhard state. ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0955.pdf" + "text": "", + "page_start": 31, + "page_end": 31, + "source_file": "ASX_MRM_2000.pdf" }, { - "text": "\n\nPoli cy D omai n ", - "page_start": 115, - "page_end": 115, - "source_file": "sg246915.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "FIG. 3: Cen A light curve. Horizontal scale is in modified \nJulian days. FIG. 4: Cyg X-1 light curve. Horizontal scale is in modi- \nfied Julian days. ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0955.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_SMFG_2011.pdf" } ] }, @@ -16293,70 +16293,70 @@ "target_page": 1, "target_passage": " Fermi satellite", "chunk_present": { - "presence": true, - "index": 3 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 370, + "page_end": 370, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 120, + "page_end": 120, + "source_file": "00-80T-80.pdf" }, { - "text": "The NaI and BGO detectors on the Gamma ray Burst Monitor (GBM) on Fermi are now being \nused for long term monitoring of the hard X-ray/low energy gamma ray sky. Using the Earth \noccultation technique demonstrated previously by the BATSE instrument on the Compton Gamma \nRay Observatory, GBM produces multiband light curves and spectra for known sources and transient \noutbursts in the 8 keV - 1 MeV band with its NaI detectors and up to 40 MeV with its BGO. Coverage \nof the entire sky is obtained every two orbits, with sensitivity exceeding that of BATSE at energies \nbelow ∼ 25 keV and above ∼ 1.5 MeV. We describe the technique and present preliminary results \nafter the first ∼ 17 months of observations at energies above 100 keV. Seven sources are detected: \nthe Crab, Cyg X-1, Swift J1753.5-0127, 1E 1740-29, Cen A, GRS 1915+105, and the transient source \nXTE J1752-223. ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0955.pdf" + "text": "", + "page_start": 267, + "page_end": 267, + "source_file": "00-80T-80.pdf" }, { - "text": "Known sources of gamma ray emission can be mon- \nitored with non-imaging detectors using the Earth oc- \ncultation technique, as was successfully demonstrated \nwith BATSE [3, 4]. When a source of gamma rays \nis occulted by the Earth, the count rate measured by \nthe detector will drop, producing a step-like feature. \nWhen the source reappears from behind the Earths \nlimb, the count rate will increase, producing another \nstep. The diameter of the Earth seen from Fermi is \n∼ 140◦, so roughly 30% of the sky is occulted by the \nEarth at any one time. Coupled with the ±35◦ slew- \ning of the pointing direction every orbit, this means \nthat the entire sky is occulted every two orbits. With \nan altitude of 565 km, a period of 96 minutes, and \nan orbital inclination of 26.5◦, individual occultation \nsteps last for ∼10 seconds (Fig. 1). \n\nII. GBM AND THE EARTH OCCULTATION \nOBSERVATIONAL TECHNIQUE \n\nThe Gamma ray Burst Monitor is the secondary \ninstrument onboard the Fermi satellite [1, 2]. It con- ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0955.pdf" + "text": "", + "page_start": 120, + "page_end": 120, + "source_file": "00-80T-80.pdf" }, { - "text": "four 12-m \natmospheric-Cherenkov telescopes located in Arizona, \nis used to study VHE γ-rays from a variety of astro- \nphysical sources [4]. VERITAS began scientific obser- \nvations with a partial array in September 2006 and has \nroutinely observed with the full array since Septem- \nber 2007. The performance metrics of VERITAS in- \nclude an energy threshold of ∼100 GeV, an energy \nresolution of ∼15%, an angular resolution of ∼0.1◦, \nand a sensitivity yielding a 5σ detection of a 1% Crab \nNebula flux object in <30 hours1. VERITAS has an \nactive maintenance program (e.g. frequent mirror re- \ncoating and alignment) to ensure its continued high \nperformance over time, and an upgrade improving \nboth the camera (higher quantum-efficiency PMTs) \nand the trigger system has been proposed to the fund- \ning agencies. \n\nVERITAS, a stereoscopic array of \n\nVHE blazars have double-humped spectral energy \ndistributions (SEDs), with one peak at UV/X-ray en- \nergies and another at GeV/TeV energies. The ori- \ngin of the lower-energy peak is commonly explained \nas synchrotron emission from the relativistic electrons \nin the blazar jets. The origin of the higher-energy \npeak is controversial, but is widely believed to be the \nresult of inverse-Compton scattering of seed photons \noff the same relativistic electrons. The origin of the \nseed photons in these leptonic scenarios could be the \nsynchrotron photons themselves, or photons from an \nexternal source. Hadronic scenarios are also plausible \nexplanations for the VHE emission, but generally are \nnot favored. ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" + "text": "", + "page_start": 120, + "page_end": 120, + "source_file": "00-80T-80.pdf" }, { - "text": "The VERITAS array of four 12-m diameter imaging atmospheric-Cherenkov telescopes in southern Arizona is \nused to study very high energy (VHE; E>100 GeV) γ-ray emission from astrophysical objects. VERITAS is \ncurrently the most sensitive VHE γ-ray observatory in the world and one of the VERITAS collaboration’s Key \nScience Projects (KSP) is the study of blazars. These active galactic nuclei (AGN) are the most numerous class \nof identified VHE sources, with ∼30 known to emit VHE photons. More than 70 AGN, almost all of which \nare blazars, have been observed with the VERITAS array since 2007, in most cases with the deepest-ever VHE \nexposure. These observations have resulted in the detection of VHE γ-rays from 16 AGN (15 blazars), including \n8 for the first time at these energies. The VERITAS blazar KSP is summarized in this proceeding and selected \nresults are presented. \n0 \n1 \n0 \n2 \n\nn \na \nJ \n**1. Introduction**\n\n5 \n\n] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0770.pdf" + "text": "", + "page_start": 45, + "page_end": 45, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "sists of 12 NaI detectors 5(cid:48)(cid:48) in diameter by 0.5(cid:48)(cid:48) thick \nmounted on the corners of the spacecraft and oriented \nsuch that they view the entire sky not occulted by the \nEarth. GBM also contains 2 BGO detectors 5(cid:48)(cid:48) in di- \nameter by 5(cid:48)(cid:48) thick located on opposite sides of the \nspacecraft. None of the GBM detectors have direct \nimaging capability. \n\nI. INTRODUCTION \n\nThe Gamma ray Burst Monitor (GBM) on Fermi is \ncurrently the only instrument in orbit providing nearly \ncontinuous full sky coverage in the hard X-ray/low \nenergy gamma ray energy range. The Earth occul- \ntation technique, used very successfully on BATSE, \nhas been adapted to GBM. An initial catalog of 64 \nsources is currently being monitored and continuously \naugmented. At energies above 100 keV, six steady \nsources (the Crab, Cyg X-1, Swift J1753.5-0127, 1E \n1740-29, Cen A, GRS 1915+105) and one transient \nsource (XTE J1752-223) have been detected in the \nfirst year of observation. We describe the instrument, \noutline the technique, and present light curves for the \nseven sources. ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0955.pdf" + "text": "", + "page_start": 45, + "page_end": 45, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "We present multi-epoch observations from the Submillimeter Array (SMA) for a sample of 171 bright blazars, \n43 of which were detected by Fermi during the first three months of observations. We explore the correlation \nbetween their gamma-ray properties and submillimeter observations of their parsec-scale jets, with a special \nemphasis on spectral index in both bands and the variability of the synchrotron component. Subclass is de- \ntermined using a combination of Fermi designation and the Candidate Gamma-Ray Blazar Survey (CGRaBS), \nresulting in 35 BL Lac objects and 136 flat-spectrum radio quasars (FSRQs) in our total sample. We calculate \nsubmillimeter energy spectral indices using contemporaneous observations in the 1 mm and 850 micron bands \nduring the months August–October 2008. The submillimeter light curves are modeled as first-order continuous \nautoregressive processes, from which we derive characteristic timescales. Our blazar sample exhibits no differ- \nences in submillimeter variability amplitude or characteristic timescale as a function of subclass or luminosity. \nAll of the the light curves are consistent with being produced by a single process that accounts for both low \nand high states, and there is additional evidence that objects may be transitioning between blazar class during \nflaring epochs. ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0806.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "In general, we find that in the submillimeter, we \nare observing these blazars at or near the peak of the \nsynchrotron component (αS ∼ 0), but that Fermi - \ndetected sources have more negative energy spectral \nindices overall than Fermi -nondetected sources. \nIn \nFigure 4, we see that while the majority of Fermi \nblazars are observed on the rising part of the syn- \nchrotron component (at lower energies than the peak), \nall of the objects have very steeply falling γ-ray energy \nspectral indexes, putting the γ-ray peak at lower en- \nergies than the observed Fermi band. Knowing that \nwe are not observing the synchrotron and γ-ray com- \nponents at analagous points in the spectrum may al- \nlow us to better understand the magnetic field in the \nparsec-scale jet region and the population of external \nphotons that is being upscattered to γ-rays. \n\nThis method yielded some surprising results. \nIn \nFigure 3, we see that the BL Lacs and FSRQs exhibit \nvirtually no difference in characteristic timescale, with ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0806.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "EBL a few objects having a large (z > 0.3) are also \nincluded in the target list. The target list includes: \n\nVERITAS observes for ∼750 h and ∼250 h each \nyear during periods of astronomical darkness and par- \ntial moonlight, respectively. The moonlight observa- \ntions are almost exclusively used for a blazar discovery \nprogram, and a large fraction of the dark time is used \nfor the blazar KSP, which consists of: \n\n• Four distant (z > 0.3) BL Lac objects recom- \n\n• A VHE blazar discovery program (∼200 h / yr): \nEach year ∼10 targets are selected to receive \n∼10 h of observations each during astronomi- \ncal darkness. These data are supplemented by \ndiscovery observations during periods of partial \nmoonlight. \n\nmended by [5, 10]. \n\nEGRET [12]. \n\n• A target-of-opportunity (ToO) observation pro- \ngram (∼50 h / yr): VERITAS blazar obser- \nvations can be triggered by either a VERI- \nTAS blazar discovery, a VHE flaring alert (>2 \nCrab) from the blazar monitoring program of \nthe Whipple 10-m telescope or from another \nVHE instrument, or a lower-energy flaring alert \n(optical, X-ray or Fermi-LAT). Should the guar- \nanteed allocation be exhausted, further time can \nbe requested from a pool of director’s discre- \ntionary time. \n\n• Multi-wavelength (MWL) \n\nstudies of VHE \nblazars (∼50 h / yr + ToO): Each year one \nblazar receives a deep exposure in a pre-planned \ncampaign of extensive, simultaneous MWL (X- \nray, optical, radio) measurements. ToO observa- \ntion proposals for MWL measurements are also \nsubmitted to lower-energy observatories (e.g. \nSwift) and are triggered by a VERITAS discov- \nery or flaring alert. \n\n**5. VERITAS AGN Detections**\n\nVERITAS has detected VHE γ-ray emission from \n16 AGN (15 blazars), including 8 VHE discoveries. \nThese AGN are shown in Table I, and each has been \ndetected by the Large Area Telescope (LAT) instru- \nment aboard the Fermi Gamma-ray Space Telescope. \nEvery blazar discovered by VERITAS was the sub- \nject of ToO MWL observations to enable modeling of \nits simultaneously-measured SED. The known VHE \nblazars detected by VERITAS were similarly the tar- \ngets of MWL observations. \n\n• Distant VHE blazar studies to constrain the ex- \ntragalactic background light (EBL): Here dis- \ntant targets are given a higher priority in the \nblazar discovery program, as well as for the \nMWL observations of known VHE blazars, par- \nticularly those with hard VHE spectra. \n**5.1. Recent VERITAS Blazar Discoveries**", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0770.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "Excel Training Manual 1.pdf" } ] }, @@ -16367,70 +16367,70 @@ "target_page": 3, "target_passage": "in the Middle to Late Bronze Age (1500 bce to 1000 bce), we observe a clear shift away from preceding ancestry originally associated with Corded Ware cultures", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 24, + "page_end": 24, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 396, + "page_end": 396, + "source_file": "00-80T-80.pdf" }, { - "text": "**Expansions of Scandinavian-like ancestry**\nWe assembled time transects using available aDNA data across several \ngeographical regions in Europe, and infer their ancestry using a model \nwith the EIA or Roman Iron Age sources previously defined (shown in \nFig. 2a). Our modelling provides direct evidence of individuals with \nancestry originating in northern Germany or Scandinavia appearing \nacross Europe as early as the first century ce (Figs. 2b,c and 3 and Sup- \nplementary Table 3). \n\nIn the region of present-day Poland, our analysis suggests several \nclear shifts in ancestry. First, in the Middle to Late Bronze Age (1500 bce \nto 1000 bce), we observe a clear shift away from preceding ancestry \noriginally associated with Corded Ware cultures55 (Fig. 3a). Second, \nin the first to fifth century ce, individuals associated with Wielbark \nculture5,12 show an additional strong shift away from the preceding \nBronze Age groups, and can only be modelled with a >75% component \nattributed to the EIA Scandinavian Peninsula. Multiple individuals, \nespecially from earlier Wielbark cemeteries, have approximately 100% ", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed3.pdf" + "text": "", + "page_start": 159, + "page_end": 159, + "source_file": "sg246915.pdf" }, { - "text": "medieval individuals (*P*≪ 1 × 10−32). Instead, the majority of individuals \nfrom medieval Poland can be modelled only as a mixture of ancestries \nrelated to Roman Iron Age Lithuania, which is similar to ancestries of \nindividuals from middle to late Bronze Age Poland (44%, 95% confidence \ninterval 36–51%), an ancestry component related to Hungarian Scyth- \nians or Slovakian La Tène individuals (49%, 95% confidence interval \n41–57%) and potentially a minority component of ancestry related to \nSarmatians from the Caucasus (*P*= 0.13) (Fig. 2c). Four out of twelve \nindividuals from medieval Poland, three of whom are from the late \nViking Age6, carried detectable Scandinavian-related ancestry. Some \nof the ancestry detected in individuals from later medieval Poland may \nhave persisted during the late first millennium ce in the cremating \nportion of the population, but regardless, this points to large-scale \nancestry transformation in medieval Poland (Fig. 3a). Future data could \nshed light on the extent to which this reflects the influence of groups \nspeaking Slavic languages in the region. \n\nIn present-day Slovakia, individuals associated with the Iron \nAge La Tène period appear close to Hungarian Scythians in the two \ndimensions of our MDS analysis, and are modelled as a mixture of \ncentral and eastern European ancestry. However, a first-century ce \nburial of a 50–60-year-old woman from Zohor is modelled only with \nScandinavian-related ancestry, providing evidence of ancestry related \nto the Scandinavian EIA appearing southwest of the range of the Wiel- \nbark archaeological complex5,57 (Fig. 3b). Later early medieval individu- \nals from Slovakia have partial Scandinavian-related ancestry, providing \nevidence for the integration between expanding and local groups. ", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed3.pdf" + "text": "", + "page_start": 159, + "page_end": 159, + "source_file": "sg246915.pdf" }, { - "text": "Poland_Middle_Ages(I) \nPoland_Middle_Ages(II) \nPoland_Wielbark(I) \nPoland_Wielbark(II) \nPoland_Wielbark(III) \nPolandUkraine_MLBA(I) \nPolandUkraine_MLBA(II) \nPortugal.lronRoman \nRussia_Sarmatian \nSaami ", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed3.pdf" + "text": "", + "page_start": 159, + "page_end": 159, + "source_file": "sg246915.pdf" }, { - "text": "In southern Germany, the genetic ancestry of individuals from \nearly medieval Bavaria probably associated with the historical \nGermanic-language-speaking Baiuvarii59 cannot be modelled as deriv- \ning ancestry solely from earlier groups in Iron Age central Germany \n(*P*≪ 1 × 10−36). The Baiuvarii probably appeared in the region in the \nfifth century ce59, but their origins remain unresolved. Our current \nbest model indicates a mixture with ancestry derived from EIA Pen- \ninsular Scandinavia and central Europe, suggesting an expansion of \nScandinavian-related ancestry producing a regional ancestry shift \n(Figs. 2c and 3c). \n\nIn Italy, southward expansions of northern and central European ances- \ntries appear by the Late Antiquity (approximately fourth century ce), \nwhere a clear diversification of ancestry can be observed compared \nwith preceding time periods (Fig. 3d). However, no individuals with \nnear 100% Scandinavian ancestry can be observed in the sampling \ndata available so far. \n\nIn Britain, the ancestries of Iron Age and Roman individuals form a \ntight cluster in our MDS analysis (Fig. 3e), shifted relative to available \npreceding Bronze Age individuals from Ireland and Orkney, and adja- \ncent to, but distinct from, available individuals in Iron Age and Roman \ncentral Europe. However, two first- to second-century ce burials from a \nRoman military fortress site in Austria (Klosterneuburg)5 carry ancestry \nthat is currently indistinguishable from Iron Age or Roman popula- \ntions of Britain, to the exclusion of other groups (qpWave cladality \n*P*= 0.11). One option is that they had ancestry from Britain; alternatively, \ncurrently unsampled populations from western continental Europe \ncarried ancestries similar to Iron Age southern Britain. ", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed3.pdf" + "text": "", + "page_start": 159, + "page_end": 159, + "source_file": "sg246915.pdf" }, { - "text": "Ancient genome sequencing has revolutionized our ability to recon- \nstruct expansions, migrations and admixture events in the ancient past \nand understand their impact on human genetic variation today. How- \never, tracing history using genetic ancestry has remained challenging, \nparticularly in historical periods for which the richest comparative \ninformation from history and archaeology often exists. This is because \nancestries in many geographical regions are often so similar as to be \nstatistically indistinguishable with current approaches. One example is \nnorthern and central Europe since the start of the Iron Age around 500 \nbce, a period for which many long-standing questions remain, such as \nthe nature of large-scale patterns of human migration during the fourth \nto sixth centuries ce, their impact on the Mediterranean world and later \npatterns of human mobility during the Viking Age (around 750–1050 ce). \nSeveral recent studies have documented substantial mobility and \ngenetic diversity in these time periods, suggesting stable population \nstructure despite high mobility5, and have revealed genetic variation \nin Viking Age Scandinavia6–8, early medieval England3,9, early medieval \nHungary10,11 and Iron Age and medieval Poland12. However, previous \nstudies mostly used large modern cohorts to study ancestry change \nthrough time and space. This is because the differentiation between \nIron Age groups in central and northern Europe is an order of magnitude \nlower (fixation index (*F*ST) = 0.1–0.7%; Extended Data Fig. 1) than, for \nexample, the more commonly studied hunter-gatherer, early farmer \nand steppe-pastoralist groups that shaped the ancestry landscape of ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed3.pdf" + "text": "", + "page_start": 159, + "page_end": 159, + "source_file": "sg246915.pdf" }, { - "text": "Many known and unknown historical events have remained below detection thresholds \nof genetic studies because subtle ancestry changes are challenging to reconstruct. \nMethods based on shared haplotypes1,2 and rare variants3,4 improve power but are not \nexplicitly temporal and have not been possible to adopt in unbiased ancestry models. \nHere we develop Twigstats, an approach of time-stratified ancestry analysis that can \nimprove statistical power by an order of magnitude by focusing on coalescences in \nrecent times, while remaining unbiased by population-specific drift. We apply this \nframework to 1,556 available ancient whole genomes from Europe in the historical \nperiod. We are able to model individual-level ancestry using preceding genomes to \nprovide high resolution. During the first half of the first millennium ce, we observe \nat least two different streams of Scandinavian-related ancestry expanding across \nwestern, central and eastern Europe. By contrast, during the second half of the first \nmillennium ce, ancestry patterns suggest the regional disappearance or substantial \nadmixture of these ancestries. In Scandinavia, we document a major ancestry influx \nby approximately 800 ce, when a large proportion of Viking Age individuals carried \nancestry from groups related to central Europe not seen in individuals from the early \nIron Age. Our findings suggest that time-stratified ancestry analysis can provide a \nhigher-resolution lens for genetic history. ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed3.pdf" + "text": "", + "page_start": 159, + "page_end": 159, + "source_file": "sg246915.pdf" }, { - "text": "The figure below illustrates country differences, based on data from the EWCS 2015: the values of \nIreland (green), the EU28 level (blue) with numbers, and the values of Poland (orange). Poland had a \nrelatively high share of employment in industry of 24%, for which Ireland has a share of 12%. The impact \non working conditions can be seen in the share of workers reporting exposures to vibrations (Poland \n27%, Ireland 16%) and loud noise (Poland 35%, Ireland 25%). ", - "page_start": 42, - "page_end": 42, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 159, + "page_end": 159, + "source_file": "sg246915.pdf" }, { - "text": "The mode age of initiation has shifted from around 18 to around 25 and there is an older age \nprofile throughout. Rises in average age of initiation have also been reported recently in cohorts \nof Australian injecting drug users (Horyniak et al., 2015). There appear to be two possible \nexplanations. \n\n There is a genuine shift towards new initiates being older, and for them to present to \n\ntreatment much faster than in previous years. \n\n There is a consistent, but small number of individuals who mis-report their age of onset \n\nwhen attending treatment i.e. who report that they have only been using opiates/crack for \na short period when in fact they have been using for a far longer period, and that this is \nstarting to really bias the numbers for recent cohorts because attendees from the original \nepidemic are becoming smaller. \n\nIt is possible then that the flattening we observe in the incidence trend is due to a small in-flux of \nolder initiates, although mis-reporting may also explain that phenomenon. Either way though, as \nthis analysis has made clear throughout, absolute numbers of new OCUs appear to be small – \nprobably fewer than 10,000 per annum and the numbers of those involved with crime will be \nsmaller still. In addition, despite a flattening in the probable trend in new users, there is currently \nno sign that it is likely to tip upwards. If anything, the data suggest the downward trend is set to \nresume, though clearly it remains important to monitor the situation. ", - "page_start": 29, - "page_end": 29, - "source_file": "legal2_opengouvernementlicense.pdf" + "text": "", + "page_start": 159, + "page_end": 159, + "source_file": "sg246915.pdf" } ] }, @@ -16441,70 +16441,70 @@ "target_page": 12, "target_passage": "This approach results in two clusters in the Scandinavian Penin- sula, approximately separating northern from southern Scandinavia", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 25, + "page_end": 25, + "source_file": "00-80T-80.pdf" }, { - "text": "This approach results in two clusters in the Scandinavian Penin- \nsula, approximately separating northern from southern Scandinavia, \nthree clusters in Poland and Ukraine that separate samples tempo- \nrally between the early and later Bronze Age, a cluster combining the \nHungarian Scythian and Slovakian La Tène-associated individuals, \nand a cluster each for Iron and Roman Age Portugal, Italy and Lithu- \nania. In present-day Austria, Germany and France, this approach \nidentifies three clusters, with each cluster spanning multiple archae- \nological sites in different countries, indicating genetic diversity in \nthis region in the first millennium ce. Encouragingly, these clusters \nseparate in our non-parametric MDS analysis (Fig. 2a), indicating that \nwe are capturing real genetic differences between groups using this \napproach. \n\n74. The 1000 Genomes Project Consortium. A global reference for human genetic variation. \n*Nature***526**, 68–74 (2015). \n75. Mallick, S. et al. The Simons Genome Diversity Project: 300 genomes from 142 diverse \npopulations.*Nature***538**, 201–206 (2016). \n76. Speidel, L. leospeidel/twigstats: Twigstats v1.0.1.*Zenodo*https://doi.org/10.5281/zenodo. \n13833119 (2024). \n77. Skoglund, P. et al. Genetic evidence for two founding populations of the Americas.*Nature*\n**525**, 104–108 (2015). \n78. Prüfer, K. et al. The complete genome sequence of a Neanderthal from the Altai Mountains. \n*Nature***505**, 43–49 (2014). \n79. Prüfer, K. et al. A high-coverage Neandertal genome from Vindija Cave in Croatia.*Science*\n**358**, 655–658 (2017). \n\n**Fine-scale structure in Neolithic Europe.**To quantify fine-scale struc- \nture in Neolithic Europe (Extended Data Fig. 5b), we aimed to select \nindividuals in Neolithic Europe who have not yet been affected by the \narrival of Steppe ancestry and do not show excess hunter-gatherer \nancestry. We infer distal ancestry sources using Balkan_N, Yamnaya and \nWestern Hunter-gatherers as source groups and reference groups \naccording to a previously proposed qpAdm setup46 (Supplementary \nTable 1). For this analysis, we infer ancestry using qpAdm applied to \n1.2 million SNP sites of imputed genomes. We retain only Neolithic \nindividuals with*P*> 0.01,*z*< 2 for Yamnaya ancestry, and*z*< 2 or \nproportion <0.25 for Western Hunter-gatherer ancestry. \n\n**Acknowledgements**L.S. was supported by a Sir Henry Wellcome Fellowship (220457/Z/20/Z). \nP.S. was supported by the European Molecular Biology Organization, the Vallee Foundation, \nthe European Research Council (852558), the Wellcome Trust (217223/Z/19/Z) and Francis \nCrick Institute core funding (FC001595) from Cancer Research UK, the UK Medical Research \nCouncil and the Wellcome Trust. B.R. was supported by the Swedish Research Council \n(2021-03333). \n\n**Author contributions**P.S. supervised the study. L.S. and P.S. developed the method. L.S, M.S. \nand P.S. curated the dataset. L.S. and P.S. analysed the data and wrote the manuscript. L.S., \nM.S., T.B., B.R., K.A., C.B., A.G., P.H. and P.S. interpreted the results and edited the manuscript. \n\n**Funding**Open Access funding provided by The Francis Crick Institute. ", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed3.pdf" + "text": "", + "page_start": 39, + "page_end": 39, + "source_file": "NYSE_AIT_2012.pdf" }, { - "text": "These patterns are consistent with northward expansion of ancestry, \npotentially starting before the Viking Age, into the Jutland peninsula \nand Zealand island towards southern Sweden. The geographical ori- \ngin of this ancestry is currently difficult to discern, as the available \nsamples from Iron Age central Europe remain sparse. The timing \nof this expansion is constrained only by the samples available: this \nancestry is not observed in individuals from the Copenhagen area of \nDenmark (around 100 ce–300 ce)6, an individual from the southern tip \nof Sweden (around 500 ce)16, individuals from the Sandby Borg mas- \nsacre site on Öland in present-day Sweden (around 500 ce)7 and 31 indi- \nviduals from the mid-eighth century Salme ship burials in present-day \nEstonia (Extended Data Fig. 9), who probably originated in central \nSweden6. Therefore, this ancestry transformation most likely post- \ndated these individuals in each particular region and mostly occurred \nin the second half of the first millennium ce. \n\nTo assess the full extent of the impact of this ancestry influx into \nScandinavia, we next aimed to understand the ancestry of individu- \nals in Scandinavia during the Viking Age. Previous studies have sug- \ngested that there was a diversity of ancestries in Scandinavia during this \nperiod6,7,65, due to increased maritime mobility, but have not reported \nper-individual ancestry estimates based on preceding ancestry. We \nanalysed each individual’s ancestry using a rotational qpAdm scheme \n(Fig. 4a, Extended Data Fig. 9 and Supplementary Table 4), which \nshowed increased power in distinguishing models when restricted \nto recent coalescences with Twigstats (more than 80% of accepted \none-source models in Twigstats were also accepted one-source models \nusing all SNPs, compared with less than 17% for the inverse). ", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed3.pdf" + "text": "", + "page_start": 196, + "page_end": 196, + "source_file": "00-80T-80.pdf" }, { - "text": "| Extended Data Fig. 7 | Ancestry estimates stratified by genetic sex. a, Map\nshowing ancestry carried by each Scandinavian Viking age individual. b, Ancestry\nproportions across individuals grouped by Latitude and genetic sex. c, Odds\nratio and p-values calculated using a two-sided Fisher’s exact test on the number\nof males and females carrying each ancestry in Viking Age Denmark, Sweden,\nNorway, Iceland, and Gotland. d, F values of the form f(Scandinavian_Peninsula_\n4 4\nEIA(I), alternative source group, males in Viking group, females in Viking group)\ncomputed using all SNPs and Twigstats. A significantly positive value is | | |\n|---|---|---|\n| Extended Data Fig. 7 | Ancestry estimates stratified by genetic sex. a, Map showing ancestry carried by each Scandinavian Viking age individual. b, Ancestry proportions across individuals grouped by Latitude and genetic sex. c, Odds ratio and p-values calculated using a two-sided Fisher’s exact test on the number of males and females carrying each ancestry in Viking Age Denmark, Sweden, Norway, Iceland, and Gotland. d, F values of the form f(Scandinavian_Peninsula_ 4 4 EIA(I), alternative source group, males in Viking group, females in Viking group) computed using all SNPs and Twigstats. A significantly positive value is | | |\n| | | evidence of attraction of females with pop2 or males with Scandinavian_ Peninsula_EIA(I). Number of males and females is shown in each facet title and we restrict to groups with at least four males and females. We plot one standar |\n| | | error. e, Map showing ‘farflung’ Viking individuals grouped by ancestry and genetic sex. In contrast to Fig. 4a and d where we showed results for the ‘best’ qpAdm model, here in panels a, b, c, and e, an individual is assigned an ancest group, if it has any accepted model (p > 0.01) where that ancestry features. |\n| | | |\n| | | |\n", - "page_start": 19, - "page_end": 19, - "source_file": "pubmed3.pdf" + "text": "", + "page_start": 196, + "page_end": 196, + "source_file": "00-80T-80.pdf" }, { - "text": "| andinavian Peninsula EIA Central Europe Iron Roman Britain Iron Roman Southern Europe\nc\n1.00\nDenmark_EVA(3) Funen_VA(12) Jutland_VA(13) Langeland_VA(18) ancestry\n1 2 1 2 1 2 1 2 1\n0.75 1.0\nContinental-related proportion\n0.5\n0.50\n0\n3.1 3.2\n0.25 1.0 Ancestry\n0.5\n0 0 1 0.72 0.73 0.74 17.0 1.7 15.7 6.1 20.8 17.5\n87Srf/86Sr\nScandinavian Peninsula Central Europe Britain f\nGree\n0 0.25 0.50 0.75 1.00 0 0.25 0.50 0.75 1.00 0 0.25 0.50 0.75 1.00\nProportion of ancestry\nNorway_VA Sweden_VA\nScandinavian Peninsula EIA Scandinavian Peninsula EIA\nBritain Britain\nEastern Europe Eastern Europe\nCentral Central Icela\nEurope Europe\nSouthern Europe Southern Europe\nenmark_VA Farfung_VA\nScandinavian Peninsula EIA Scandinavian Peninsula EIA\nBritain Britain\nEastern Europe Eastern Europe\nCentral Central\nEurope Europe\nSouthern Europe Southern Europe\nncestry in the Viking world. a, Map showing ancestry carried by around the regression line.\nvian Viking Age individuals as inferred using the best-fitting qpAdm groups using qpAdm on all S\nhese are chosen by either choosing the one-source model with largest all two-source models with P\nnd P > 0.01 or the two-source model with the largest P value and P > 0.01. is shown under the plot. Sam\nd Data Fig. 7 shows the same map with all accepted models. b, Stable d, The ancestry proportion | Eastern Europe\nZealand_VA(7)\n2\nAll SNPs\n1.6\nTwigstats 1,000\nFaroes\nnland Ireland\nIsle of Man\nOrkney_VA\nOxford_VA\nnd\nDorset_VA\nc, The ancestry shift observe\nNPs or Twigstats. We show t\n> 0.05. For models with P <\nple sizes for each group are\nacross Viking Age individua | Anatolia EBA\nAustria_Klosterneu\nBaiuvarii_EMED\nBritain.lronRoma\nCentraIEurope.lro\nCentraIEurope.lro\nCentraIEurope.Ir\nCordedWare_EBA\nCroatia.lronRoman\nDenmark_BA\nDenmark_EVA\nDenmark_IA\nEngland_Saxon_hi\nEngland_Saxon_lo\nEngland_Saxon_m\nEngland.Roman.G\nHungary_EM(I)\nHungary_EM(II)\nHungarySlovakia.\nIrelandOrkney_BA\nItaly.lmperial(l)\nltaly.lmperial(lI)\nltaly.lronRepublic\nKyrgyzstan_Tian\nLithuania.lronRo\nLongobard_EMED\nLongobard_EMED\nMontenegro_EM\nNetherlands_Friesl\nPoland_BA\nPoland_Middle_Ag\nPoland_Middle_Ag\nPoland_Wielbark(I)\nPoland_Wielbark(II\nPoland_Wielbark(II\nPolandUkraine_M\nPolandUkraine_M\nPortugal.lronRoma\nRussia_Sarmatian\nSaami\nScandinavian_Pen\nScandinavian_Pen\nSlovakia_Zohor_G\nSlovakia.Migration\nSlovenia.lronRoma\nSlovenia.Roman.o |\n|---|---|---|\n| andinavian Peninsula EIA Central Europe Iron Roman Britain Iron Roman Southern Europe c 1.00 Denmark_EVA(3) Funen_VA(12) Jutland_VA(13) Langeland_VA(18) ancestry 1 2 1 2 1 2 1 2 1 0.75 1.0 Continental-related proportion 0.5 0.50 0 3.1 3.2 0.25 1.0 Ancestry 0.5 0 0 1 0.72 0.73 0.74 17.0 1.7 15.7 6.1 20.8 17.5 87Srf/86Sr Scandinavian Peninsula Central Europe Britain f Gree 0 0.25 0.50 0.75 1.00 0 0.25 0.50 0.75 1.00 0 0.25 0.50 0.75 1.00 Proportion of ancestry Norway_VA Sweden_VA Scandinavian Peninsula EIA Scandinavian Peninsula EIA Britain Britain Eastern Europe Eastern Europe Central Central Icela Europe Europe Southern Europe Southern Europe enmark_VA Farfung_VA Scandinavian Peninsula EIA Scandinavian Peninsula EIA Britain Britain Eastern Europe Eastern Europe Central Central Europe Europe Southern Europe Southern Europe ncestry in the Viking world. a, Map showing ancestry carried by around the regression line. vian Viking Age individuals as inferred using the best-fitting qpAdm groups using qpAdm on all S hese are chosen by either choosing the one-source model with largest all two-source models with P nd P > 0.01 or the two-source model with the largest P value and P > 0.01. is shown under the plot. Sam d Data Fig. 7 shows the same map with all accepted models. b, Stable d, The ancestry proportion | Eastern Europe Zealand_VA(7) 2 All SNPs 1.6 Twigstats 1,000 Faroes nland Ireland Isle of Man Orkney_VA Oxford_VA nd Dorset_VA c, The ancestry shift observe NPs or Twigstats. We show t > 0.05. For models with P < ple sizes for each group are across Viking Age individua | Anatolia EBA Austria_Klosterneu Baiuvarii_EMED Britain.lronRoma CentraIEurope.lro CentraIEurope.lro CentraIEurope.Ir CordedWare_EBA Croatia.lronRoman Denmark_BA Denmark_EVA Denmark_IA England_Saxon_hi England_Saxon_lo England_Saxon_m England.Roman.G Hungary_EM(I) Hungary_EM(II) HungarySlovakia. IrelandOrkney_BA Italy.lmperial(l) ltaly.lmperial(lI) ltaly.lronRepublic Kyrgyzstan_Tian Lithuania.lronRo Longobard_EMED Longobard_EMED Montenegro_EM Netherlands_Friesl Poland_BA Poland_Middle_Ag Poland_Middle_Ag Poland_Wielbark(I) Poland_Wielbark(II Poland_Wielbark(II PolandUkraine_M PolandUkraine_M Portugal.lronRoma Russia_Sarmatian Saami Scandinavian_Pen Scandinavian_Pen Slovakia_Zohor_G Slovakia.Migration Slovenia.lronRoma Slovenia.Roman.o |\n| | | d in Viking he best one 0.05, the −l shown in b ls in Denma |\n", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed3.pdf" + "text": "", + "page_start": 197, + "page_end": 197, + "source_file": "00-80T-80.pdf" }, { - "text": "**Influx into pre-Viking Age Scandinavia**\nIn EIA Scandinavia (<500 ce), we find evidence for broad genetic homo- \ngeneity. Specifically, individuals from Denmark (100 ce–300 ce) were \nindistinguishable from contemporary people in the Scandinavian Pen- \ninsula (Fig. 2c). However, we observe a clear shift in genetic ancestry \nalready in the eighth century ce (Late Iron Age/early Viking Age) on \nZealand (present-day Denmark) for which a 100% EIA ancestry model \nis rejected (*P*= 1 × 10−17 using Twigstats;*P*= 7.5 × 10−4 without). This \nshift in ancestry persists among later Viking Age groups in Denmark, \nwhere all groups are modelled with varying proportions of ancestry \nrelated to Iron Age continental groups in central Europe (Figs. 3f \nand 4c). A non-parametric MDS of Viking Age individuals suggests \nthat variation between individuals forms a cline spanning from the \nEIA Scandinavian Peninsula individuals to ancestry characteristic of \ncentral Europe (Fig. 4e). The observed shift in ancestry in Denmark \ncannot be confounded by potentially earlier unknown gene flow into \nIron Age source groups in Austria, France and Germany, but such gene \nflow could affect the exact ancestry proportions. ", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed3.pdf" + "text": "", + "page_start": 26, + "page_end": 26, + "source_file": "00-80T-80.pdf" }, { - "text": "Interestingly, we detect ancestry from Bronze and Iron Age sources \nfrom Eastern Europe (present-day Lithuania and Poland), concentrated \nin southeastern parts of Sweden, particularly the island of Gotland \n(14 individuals; Fig. 4a). This is consistent with previous genetic \nstudies6,7. We find that this ancestry is enriched in male individuals \n(Extended Data Fig. 7d), suggesting male-biased mobility and/or burial. \nThe closest match tends to be Roman Iron Age Lithuanian genomes \nassociated with Balts, which would be consistent with mobility across \nthe Baltic Sea, but we caution that the geographical representation of \navailable genomes is still limited. \n\n**Online content**\nAny methods, additional references, Nature Portfolio reporting summa- \nries, source data, extended data, supplementary information, acknowl- \nedgements, peer review information; details of author contributions \nand competing interests; and statements of data and code availability \nare available at https://doi.org/10.1038/s41586-024-08275-2. \n\n**Viking Age expansion from Scandinavia**\nTraditionally, historical perspectives on what is now often referred \nto as the Viking diaspora placed an emphasis on the movements and \nsettlements of population groups from various parts of Scandinavia67. \nOur explorative MDS analysis again indicates mixed ancestries related \nto the Scandinavian EIA, with regional differences that point to varied \nlocal admixture (Fig. 4e and Extended Data Fig. 10). ", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed3.pdf" + "text": "", + "page_start": 197, + "page_end": 197, + "source_file": "00-80T-80.pdf" }, { - "text": "Scandinavia \n\n", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed3.pdf" + "text": "", + "page_start": 197, + "page_end": 197, + "source_file": "00-80T-80.pdf" }, { - "text": "ancestry related to EIA Scandinavian Peninsula (Fig. 2c). The Wielbark \narchaeological complex has been linked to the later Chernyakhov cul- \nture to the southeast and to early Goths, an historical Germanic group \nthat flourished in the second to fifth centuries ce56. Our modelling \nsupports the idea that some groups that probably spoke Germanic \nlanguages from Scandinavia expanded south across the Baltic into \nthe area between the Oder and Vistula rivers in the early centuries ce, \nalthough whether these expansions can be linked specifically with \nhistorical Goths is still debatable. Moreover, since a considerable \n\nproportion of Wielbark burials during this period were cremations, \nthe possible presence of individuals with other ancestries cannot be \nstrictly rejected if they were exclusively cremated (and are therefore \ninvisible in the aDNA record). \n\nA previous study could not reject continuity in ancestry from the \nWielbark-associated individuals to later medieval individuals from \na similar region12. With the improved power of Twigstats, models of \ncontinuity are strongly rejected, with no one-source model of any pre- \nceding Iron Age or Bronze Age group providing a reasonable fit for the ", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed3.pdf" + "text": "", + "page_start": 26, + "page_end": 26, + "source_file": "00-80T-80.pdf" } ] }, @@ -16515,70 +16515,70 @@ "target_page": 4, "target_passage": "linked to the later Chernyakhov cul- ture to the southeast and to early Goths", "chunk_present": { - "presence": true, - "index": 3 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 258, + "page_end": 258, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 191, + "page_end": 191, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\nARTS & \nCULTURE ", - "page_start": 20, - "page_end": 20, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 191, + "page_end": 191, + "source_file": "00-80T-80.pdf" }, { - "text": "ancestry related to EIA Scandinavian Peninsula (Fig. 2c). The Wielbark \narchaeological complex has been linked to the later Chernyakhov cul- \nture to the southeast and to early Goths, an historical Germanic group \nthat flourished in the second to fifth centuries ce56. Our modelling \nsupports the idea that some groups that probably spoke Germanic \nlanguages from Scandinavia expanded south across the Baltic into \nthe area between the Oder and Vistula rivers in the early centuries ce, \nalthough whether these expansions can be linked specifically with \nhistorical Goths is still debatable. Moreover, since a considerable \n\nproportion of Wielbark burials during this period were cremations, \nthe possible presence of individuals with other ancestries cannot be \nstrictly rejected if they were exclusively cremated (and are therefore \ninvisible in the aDNA record). \n\nA previous study could not reject continuity in ancestry from the \nWielbark-associated individuals to later medieval individuals from \na similar region12. With the improved power of Twigstats, models of \ncontinuity are strongly rejected, with no one-source model of any pre- \nceding Iron Age or Bronze Age group providing a reasonable fit for the ", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed3.pdf" + "text": "", + "page_start": 191, + "page_end": 191, + "source_file": "00-80T-80.pdf" }, { - "text": "**Expansions of Scandinavian-like ancestry**\nWe assembled time transects using available aDNA data across several \ngeographical regions in Europe, and infer their ancestry using a model \nwith the EIA or Roman Iron Age sources previously defined (shown in \nFig. 2a). Our modelling provides direct evidence of individuals with \nancestry originating in northern Germany or Scandinavia appearing \nacross Europe as early as the first century ce (Figs. 2b,c and 3 and Sup- \nplementary Table 3). \n\nIn the region of present-day Poland, our analysis suggests several \nclear shifts in ancestry. First, in the Middle to Late Bronze Age (1500 bce \nto 1000 bce), we observe a clear shift away from preceding ancestry \noriginally associated with Corded Ware cultures55 (Fig. 3a). Second, \nin the first to fifth century ce, individuals associated with Wielbark \nculture5,12 show an additional strong shift away from the preceding \nBronze Age groups, and can only be modelled with a >75% component \nattributed to the EIA Scandinavian Peninsula. Multiple individuals, \nespecially from earlier Wielbark cemeteries, have approximately 100% ", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed3.pdf" + "text": "", + "page_start": 191, + "page_end": 191, + "source_file": "00-80T-80.pdf" }, { - "text": "Poland_Middle_Ages(I) \nPoland_Middle_Ages(II) \nPoland_Wielbark(I) \nPoland_Wielbark(II) \nPoland_Wielbark(III) \nPolandUkraine_MLBA(I) \nPolandUkraine_MLBA(II) \nPortugal.lronRoman \nRussia_Sarmatian \nSaami ", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed3.pdf" + "text": "", + "page_start": 16, + "page_end": 16, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**The \"soft-wired view\"**\n\nSome consciousness researchers have argued that the hard problem is a cultural artifact, unique to \ncontemporary Western Culture. This is similar to Type-B Materialism, but it makes the further claim that \nthe psychological facts that cause us to intuit the hard problem are not innate, but culturally conditioned. \nNotable researchers who hold this view include Anna Wierzbicka,[96] Hakwan Lau and Matthias \nMichel.[97] \n\nWierzbicka (who is a linguist) argues that the vocabulary used by consciousness researchers (including \nwords like*experience*and*consciousness*) are not universally translatable, and are \"parochially \nEnglish.\"[96] Weirzbicka calls David Chalmers out by name for using these words, arguing that if ", - "page_start": 11, - "page_end": 11, - "source_file": "wikipedia2.pdf" + "text": "", + "page_start": 16, + "page_end": 16, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "medieval individuals (*P*≪ 1 × 10−32). Instead, the majority of individuals \nfrom medieval Poland can be modelled only as a mixture of ancestries \nrelated to Roman Iron Age Lithuania, which is similar to ancestries of \nindividuals from middle to late Bronze Age Poland (44%, 95% confidence \ninterval 36–51%), an ancestry component related to Hungarian Scyth- \nians or Slovakian La Tène individuals (49%, 95% confidence interval \n41–57%) and potentially a minority component of ancestry related to \nSarmatians from the Caucasus (*P*= 0.13) (Fig. 2c). Four out of twelve \nindividuals from medieval Poland, three of whom are from the late \nViking Age6, carried detectable Scandinavian-related ancestry. Some \nof the ancestry detected in individuals from later medieval Poland may \nhave persisted during the late first millennium ce in the cremating \nportion of the population, but regardless, this points to large-scale \nancestry transformation in medieval Poland (Fig. 3a). Future data could \nshed light on the extent to which this reflects the influence of groups \nspeaking Slavic languages in the region. \n\nIn present-day Slovakia, individuals associated with the Iron \nAge La Tène period appear close to Hungarian Scythians in the two \ndimensions of our MDS analysis, and are modelled as a mixture of \ncentral and eastern European ancestry. However, a first-century ce \nburial of a 50–60-year-old woman from Zohor is modelled only with \nScandinavian-related ancestry, providing evidence of ancestry related \nto the Scandinavian EIA appearing southwest of the range of the Wiel- \nbark archaeological complex5,57 (Fig. 3b). Later early medieval individu- \nals from Slovakia have partial Scandinavian-related ancestry, providing \nevidence for the integration between expanding and local groups. ", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed3.pdf" + "text": "", + "page_start": 191, + "page_end": 191, + "source_file": "00-80T-80.pdf" }, { - "text": "In southern Germany, the genetic ancestry of individuals from \nearly medieval Bavaria probably associated with the historical \nGermanic-language-speaking Baiuvarii59 cannot be modelled as deriv- \ning ancestry solely from earlier groups in Iron Age central Germany \n(*P*≪ 1 × 10−36). The Baiuvarii probably appeared in the region in the \nfifth century ce59, but their origins remain unresolved. Our current \nbest model indicates a mixture with ancestry derived from EIA Pen- \ninsular Scandinavia and central Europe, suggesting an expansion of \nScandinavian-related ancestry producing a regional ancestry shift \n(Figs. 2c and 3c). \n\nIn Italy, southward expansions of northern and central European ances- \ntries appear by the Late Antiquity (approximately fourth century ce), \nwhere a clear diversification of ancestry can be observed compared \nwith preceding time periods (Fig. 3d). However, no individuals with \nnear 100% Scandinavian ancestry can be observed in the sampling \ndata available so far. \n\nIn Britain, the ancestries of Iron Age and Roman individuals form a \ntight cluster in our MDS analysis (Fig. 3e), shifted relative to available \npreceding Bronze Age individuals from Ireland and Orkney, and adja- \ncent to, but distinct from, available individuals in Iron Age and Roman \ncentral Europe. However, two first- to second-century ce burials from a \nRoman military fortress site in Austria (Klosterneuburg)5 carry ancestry \nthat is currently indistinguishable from Iron Age or Roman popula- \ntions of Britain, to the exclusion of other groups (qpWave cladality \n*P*= 0.11). One option is that they had ancestry from Britain; alternatively, \ncurrently unsampled populations from western continental Europe \ncarried ancestries similar to Iron Age southern Britain. ", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed3.pdf" + "text": "", + "page_start": 16, + "page_end": 16, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "a \nTime \n\n| 3000 BCE 2000 BCE 1000 BCE 0 1000 CE | | |\n|---|---|---|\n| Poland EBA MLBA Wielbark Middle | | |\n| | EBA | |\n| | | |\n| Southeastern Europe | | |\n| | | |\n\n\nb \n\nc \n2000 BCE \n2000 BCE 0 3000 BCE 1000 BCE 1000 CE \nCentral Europe \n\nBell Beaker/EBA Iron Roman Early Medieval \n\nBaiuvarii ", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed3.pdf" + "text": "", + "page_start": 16, + "page_end": 16, + "source_file": "NYSE_MGM_2004.pdf" } ] }, @@ -16589,70 +16589,70 @@ "target_page": 1, "target_passage": "that much of the en- ergy is being produced deep within the jet on small, sub-parsec scales", "chunk_present": { - "presence": true, - "index": 6 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 21, + "page_end": 21, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 337, + "page_end": 337, + "source_file": "00-80T-80.pdf" }, { - "text": "The Fermi-LAT is already having a significant im- \npact on the blazar KSP. In future seasons, the VER- \nITAS blazar discovery program will focus its dis- \ncovery program on hard-spectrum blazars detected \nby Fermi-LAT, and will likely have a greater focus \non high-risk/high-reward objects at larger redshifts \n(0.3 < z < 0.7). \nIn addition, the number of VHE \nblazars studied in pre-planned MWL campaigns will \nincrease as data from the Fermi-LAT will be publicly \navailable. \nIn particular, the extensive pre-planned \nMWL campaigns will focus on objects that are note- \nworthy for the impact their data may have on under- \nstanding the EBL. The simultaneous observations of \nblazars by VERITAS and Fermi-LAT will completely \nresolve the higher-energy SED peak, often for the first \ntime, enabling unprecedented constraints on the un- \nderlying blazar phenomena to be derived. ", - "page_start": 5, - "page_end": 5, - "source_file": "1001.0770.pdf" + "text": "", + "page_start": 230, + "page_end": 230, + "source_file": "00-80T-80.pdf" }, { - "text": "• BL Lacs and FSRQs do not exhibit significant \ndifferences in amplitude of submillimeter vari- \nability or characteristic timescale, but our sam- \nple of BL Lacs may be dominated by high- \npeaked BL Lacs (HBLs), which exhibit obser- \nvational similarities with FSRQs. \n\nLacs and FSRQs. One avenue for exploring this dif- \nference is to monitor changing submillimeter energy \nspectral index and the ratio of γ-ray to submillime- \nter luminosity as functions of time. The full mean- \ning of the results of our autoregressive method is not \nyet clear, and will require better-sampled blazar light \ncurves and the comparison between τrest with physical \ntimescales such as the synchrotron cooling timescale. \nThese analyses would allow us to place constraints \non the processes occurring near the base of the jet in \nblazars and further understand the intimate connec- \ntion between them. \n\n• Blazar submillimeter light curves are consistent \nwith being produced by a single process that ac- \ncounts for both high and low states, with char- \nacteristic timescales 10 < τrest < 500 days. \n\n• The blazars detected by Fermi have synchrotron \npeaks at higher frequencies, regardless of sub- \nmillimeter luminosity. ", - "page_start": 5, - "page_end": 5, - "source_file": "1001.0806.pdf" + "text": "", + "page_start": 338, + "page_end": 338, + "source_file": "00-80T-80.pdf" }, { - "text": "The motivation for observing blazars in the sub- \nmillimeter is to study behavior close to the central \nengine, where the jet material is presumably still be- \ning accelerated. The separate emission processes that \ncontribute to overall SED may present differently in \nBL Lacs and FSRQs, allowing us to understand the \nsimilarities and differences between blazar types. We \nhave investigated these differences between objects in \nterms of submillimeter behavior and, in conclusion, \nfind that \n\n• The SMA blazars exhibit submillimeter energy \nindexes that follow the spectral se- \nspectral \nquence interpretation of blazars. ", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0806.pdf" + "text": "", + "page_start": 337, + "page_end": 337, + "source_file": "00-80T-80.pdf" }, { - "text": "EBL a few objects having a large (z > 0.3) are also \nincluded in the target list. The target list includes: \n\nVERITAS observes for ∼750 h and ∼250 h each \nyear during periods of astronomical darkness and par- \ntial moonlight, respectively. The moonlight observa- \ntions are almost exclusively used for a blazar discovery \nprogram, and a large fraction of the dark time is used \nfor the blazar KSP, which consists of: \n\n• Four distant (z > 0.3) BL Lac objects recom- \n\n• A VHE blazar discovery program (∼200 h / yr): \nEach year ∼10 targets are selected to receive \n∼10 h of observations each during astronomi- \ncal darkness. These data are supplemented by \ndiscovery observations during periods of partial \nmoonlight. \n\nmended by [5, 10]. \n\nEGRET [12]. \n\n• A target-of-opportunity (ToO) observation pro- \ngram (∼50 h / yr): VERITAS blazar obser- \nvations can be triggered by either a VERI- \nTAS blazar discovery, a VHE flaring alert (>2 \nCrab) from the blazar monitoring program of \nthe Whipple 10-m telescope or from another \nVHE instrument, or a lower-energy flaring alert \n(optical, X-ray or Fermi-LAT). Should the guar- \nanteed allocation be exhausted, further time can \nbe requested from a pool of director’s discre- \ntionary time. \n\n• Multi-wavelength (MWL) \n\nstudies of VHE \nblazars (∼50 h / yr + ToO): Each year one \nblazar receives a deep exposure in a pre-planned \ncampaign of extensive, simultaneous MWL (X- \nray, optical, radio) measurements. ToO observa- \ntion proposals for MWL measurements are also \nsubmitted to lower-energy observatories (e.g. \nSwift) and are triggered by a VERITAS discov- \nery or flaring alert. \n\n**5. VERITAS AGN Detections**\n\nVERITAS has detected VHE γ-ray emission from \n16 AGN (15 blazars), including 8 VHE discoveries. \nThese AGN are shown in Table I, and each has been \ndetected by the Large Area Telescope (LAT) instru- \nment aboard the Fermi Gamma-ray Space Telescope. \nEvery blazar discovered by VERITAS was the sub- \nject of ToO MWL observations to enable modeling of \nits simultaneously-measured SED. The known VHE \nblazars detected by VERITAS were similarly the tar- \ngets of MWL observations. \n\n• Distant VHE blazar studies to constrain the ex- \ntragalactic background light (EBL): Here dis- \ntant targets are given a higher priority in the \nblazar discovery program, as well as for the \nMWL observations of known VHE blazars, par- \nticularly those with hard VHE spectra. \n**5.1. Recent VERITAS Blazar Discoveries**", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0770.pdf" + "text": "", + "page_start": 337, + "page_end": 337, + "source_file": "00-80T-80.pdf" }, { - "text": "] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ \n\n**1. INTRODUCTION**\n\nThe timescales on which high-amplitude flaring \nevents occur in blazars indicate that much of the en- \nergy is being produced deep within the jet on small, \nsub-parsec scales [1, 2]. Understanding if/how emis- \nsion differs between blazar subclasses (i.e., BL Lacs \nobjects and flat-spectrum radio quasars (FSRQs)) \nmay offer important insight into the similarity be- \nfurthermore, can provide con- \ntween blazars and, \nstraints on the formation and acceleration of the jets \nthemselves. \n\n**2. SMA BLAZARS**\n\nThe Submillimeter Array [4] consists of eight 6 m \nantennas located near the summit of Mauna Kea. The \nSMA is used in a variety of baseline configurations \nand typically operates in the 1mm and 850µm win- \ndows, achieving spatial resolution as fine as 0.25” at \n850µm. The sources used as phase calibrators for the \narray are compiled in a database known as the SMA \nCalibrator List2 [5]. Essentially a collection of bright \nobjects (stronger than 750 mJy at 230 GHz and 1 Jy \nat 345 GHz), these sources are monitored regularly, \nboth during science observations and dedicated ob- \nserving tracks. ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0806.pdf" + "text": "", + "page_start": 337, + "page_end": 337, + "source_file": "00-80T-80.pdf" }, { - "text": "Prior to the launch of Fermi VERITAS had discov- \nered VHE emission from 2 blazars. These included \nthe first VHE-detected IBL, W Comae [14, 15], and \nthe HBL 1ES 0806+524 [16]. VERITAS has discov- \nered 6 VHE blazars since the launch of Fermi. Three \nof these were initially observed by VERITAS prior to \nthe release of Fermi-LAT results, due to the X-ray \nbrightness of the synchrotron peaks of their SEDs. \n\n**4. Blazar Discovery Program**\n\nThe blazars observed in the discovery program are \nlargely high-frequency-peaked BL Lac objects. How- \never, the program also includes IBLs (intermediate- \npeaked) and LBLs (low-peaked), as well as flat spec- \ntrum radio quasars (FSRQs), in an attempt to in- \ncrease the types of blazars known to emit VHE γ-rays. \nThe observed targets are drawn from a target list con- \ntaining objects visible to the telescopes at reasonable \nzenith angles (−8◦ < δ < 72◦), without a previously \npublished VHE limit below 1.5% Crab, and with a \nmeasured redshift z < 0.3. To further the study of the ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0770.pdf" + "text": "", + "page_start": 230, + "page_end": 230, + "source_file": "00-80T-80.pdf" }, { - "text": "We present multi-epoch observations from the Submillimeter Array (SMA) for a sample of 171 bright blazars, \n43 of which were detected by Fermi during the first three months of observations. We explore the correlation \nbetween their gamma-ray properties and submillimeter observations of their parsec-scale jets, with a special \nemphasis on spectral index in both bands and the variability of the synchrotron component. Subclass is de- \ntermined using a combination of Fermi designation and the Candidate Gamma-Ray Blazar Survey (CGRaBS), \nresulting in 35 BL Lac objects and 136 flat-spectrum radio quasars (FSRQs) in our total sample. We calculate \nsubmillimeter energy spectral indices using contemporaneous observations in the 1 mm and 850 micron bands \nduring the months August–October 2008. The submillimeter light curves are modeled as first-order continuous \nautoregressive processes, from which we derive characteristic timescales. Our blazar sample exhibits no differ- \nences in submillimeter variability amplitude or characteristic timescale as a function of subclass or luminosity. \nAll of the the light curves are consistent with being produced by a single process that accounts for both low \nand high states, and there is additional evidence that objects may be transitioning between blazar class during \nflaring epochs. ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0806.pdf" + "text": "", + "page_start": 230, + "page_end": 230, + "source_file": "00-80T-80.pdf" }, { - "text": "Figure 4: The γ-ray index versus submillimeter index plane. The blazars fall more steeply in the γ-rays than in the \nsubmillimeter band, where most are, in fact, rising. This LAT-detected sample contrasts with the full SMA sample, \nwhere the blazars are more distributed around αS ∼ 0. ", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0806.pdf" + "text": "", + "page_start": 336, + "page_end": 336, + "source_file": "00-80T-80.pdf" } ] }, @@ -16669,64 +16669,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 255, + "page_end": 255, + "source_file": "00-80T-80.pdf" }, - { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + { + "text": "", + "page_start": 234, + "page_end": 234, + "source_file": "00-80T-80.pdf" }, { - "text": "We present multi-epoch observations from the Submillimeter Array (SMA) for a sample of 171 bright blazars, \n43 of which were detected by Fermi during the first three months of observations. We explore the correlation \nbetween their gamma-ray properties and submillimeter observations of their parsec-scale jets, with a special \nemphasis on spectral index in both bands and the variability of the synchrotron component. Subclass is de- \ntermined using a combination of Fermi designation and the Candidate Gamma-Ray Blazar Survey (CGRaBS), \nresulting in 35 BL Lac objects and 136 flat-spectrum radio quasars (FSRQs) in our total sample. We calculate \nsubmillimeter energy spectral indices using contemporaneous observations in the 1 mm and 850 micron bands \nduring the months August–October 2008. The submillimeter light curves are modeled as first-order continuous \nautoregressive processes, from which we derive characteristic timescales. Our blazar sample exhibits no differ- \nences in submillimeter variability amplitude or characteristic timescale as a function of subclass or luminosity. \nAll of the the light curves are consistent with being produced by a single process that accounts for both low \nand high states, and there is additional evidence that objects may be transitioning between blazar class during \nflaring epochs. ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0806.pdf" + "text": "", + "page_start": 394, + "page_end": 394, + "source_file": "00-80T-80.pdf" }, { - "text": "A systematic study of the submillimeter properties \nof the entire sample of Fermi blazars has yet to be con- \nducted and is one of the primary goals of our work. We \npresent here preliminary analysis of the submillimeter \nproperties of Fermi blazars detected by the Submil- \n1The Submillimeter Array is a joint project between the \nSmithsonian Astrophysical Observatory and the Academia \nSinica Institute of Astronomy and Astrophysics and is funded \nby the Smithsonian Institution and the Academia Sinica. \n2http://sma1.sma.hawaii.edu/callist/callist.html \n\neConf C091122 ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0806.pdf" + "text": "", + "page_start": 235, + "page_end": 235, + "source_file": "00-80T-80.pdf" }, { - "text": "Figure 4: The γ-ray index versus submillimeter index plane. The blazars fall more steeply in the γ-rays than in the \nsubmillimeter band, where most are, in fact, rising. This LAT-detected sample contrasts with the full SMA sample, \nwhere the blazars are more distributed around αS ∼ 0. ", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0806.pdf" + "text": "", + "page_start": 235, + "page_end": 235, + "source_file": "00-80T-80.pdf" }, { - "text": "limeter Array 1 (SMA) at 1mm and 850µm, including \nan investigation of variable behavior and the deter- \nmination of submillimeter energy spectral indices. In \naddition, we consider the connection to the observed \nγ-ray indices and luminosities. ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0806.pdf" + "text": "", + "page_start": 235, + "page_end": 235, + "source_file": "00-80T-80.pdf" }, { - "text": "Figure 5: Ratio of γ-ray luminosity to submillimeter luminosity in the 1mm band. The location of an object in this \nplot should be directly correlated with its blazar “state”, with FSRQs occupying the upper right and BL Lacs the lower \nleft. Flat-spectrum radio quasar 3C 454.3 is the object with the highest submillimeter luminosity in this plot. ", - "page_start": 5, - "page_end": 5, - "source_file": "1001.0806.pdf" + "text": "", + "page_start": 394, + "page_end": 394, + "source_file": "00-80T-80.pdf" }, { - "text": "1 \nv \n6 \n0 \n8 \n0 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nFor the synchrotron component of blazar spectra, \nthe low-frequency spectral break due to synchrotron \nself-absorption moves to higher frequencies as one \nmeasures closer to the base of the jet [2]. This of- \nten places the peak of the spectrum in the millime- \nter and submillimeter bands, where the emission is \noptically-thin and originates on parsec and sub-parsec \nscales [3], allowing direct observation of the most com- \npact regions near the central engine. The high en- \nergy γ-ray emission originates as a Compton process, \ntypically a combination of synchrotron-self-Compton \n(SSC) and external-radiation-Compton (ERC). De- \npending on the source properties, the synchrotron \nphotons or external photons are upscattered by the \nsame population of electrons that emit the millimeter \nand submillimeter spectra. Therefore the submillime- \nter and γ-ray emission are closely linked and give the \nfull information about the source emission. ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0806.pdf" + "text": "", + "page_start": 234, + "page_end": 234, + "source_file": "00-80T-80.pdf" }, { - "text": "• BL Lacs and FSRQs do not exhibit significant \ndifferences in amplitude of submillimeter vari- \nability or characteristic timescale, but our sam- \nple of BL Lacs may be dominated by high- \npeaked BL Lacs (HBLs), which exhibit obser- \nvational similarities with FSRQs. \n\nLacs and FSRQs. One avenue for exploring this dif- \nference is to monitor changing submillimeter energy \nspectral index and the ratio of γ-ray to submillime- \nter luminosity as functions of time. The full mean- \ning of the results of our autoregressive method is not \nyet clear, and will require better-sampled blazar light \ncurves and the comparison between τrest with physical \ntimescales such as the synchrotron cooling timescale. \nThese analyses would allow us to place constraints \non the processes occurring near the base of the jet in \nblazars and further understand the intimate connec- \ntion between them. \n\n• Blazar submillimeter light curves are consistent \nwith being produced by a single process that ac- \ncounts for both high and low states, with char- \nacteristic timescales 10 < τrest < 500 days. \n\n• The blazars detected by Fermi have synchrotron \npeaks at higher frequencies, regardless of sub- \nmillimeter luminosity. ", - "page_start": 5, - "page_end": 5, - "source_file": "1001.0806.pdf" + "text": "", + "page_start": 395, + "page_end": 395, + "source_file": "00-80T-80.pdf" }, { - "text": "**2.1. Submillimeter Properties**\n\n**3. VARIABILITY ANALYSIS**\n\nSubmillimeter Luminosities. Since we are pri- \nmarily concerned with comparisons to Fermi observa- \ntions, we note that only 129 of the SMA blazars (23 BL \nLacs and 106 FSRQs) were observed by the SMA in \neither band during the three months August-October \n2008. For these objects, submillimeter luminosities \nare calculated in the standard way: \n\n**3.1. Variability Index**\n\nWe roughly characterize the level of variability of \neach source using the variability index from Hovatta \net al. [8]: \n\n(Fmax − σFmax) − (Fmin + σFmin) \n(Fmax − σFmax) + (Fmin + σFmin) \nνobsFobs \n1 + z \nV = (2) \n\nwhere DL is the luminosity distance, νobs is the fre- \nquency of the observed band, and Fobs is the average Figure 2 shows the distribution for the SMA blazars. \nObjects with V ≤ 0 are typically unsuitable for more \n\neConf C091122 ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0806.pdf" + "text": "", + "page_start": 234, + "page_end": 234, + "source_file": "00-80T-80.pdf" } ] }, @@ -16743,64 +16743,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 201, + "page_end": 201, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "The motivation for observing blazars in the sub- \nmillimeter is to study behavior close to the central \nengine, where the jet material is presumably still be- \ning accelerated. The separate emission processes that \ncontribute to overall SED may present differently in \nBL Lacs and FSRQs, allowing us to understand the \nsimilarities and differences between blazar types. We \nhave investigated these differences between objects in \nterms of submillimeter behavior and, in conclusion, \nfind that \n\n• The SMA blazars exhibit submillimeter energy \nindexes that follow the spectral se- \nspectral \nquence interpretation of blazars. ", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0806.pdf" + "text": "", + "page_start": 318, + "page_end": 318, + "source_file": "sg246915.pdf" }, { - "text": "Figure 4: The γ-ray index versus submillimeter index plane. The blazars fall more steeply in the γ-rays than in the \nsubmillimeter band, where most are, in fact, rising. This LAT-detected sample contrasts with the full SMA sample, \nwhere the blazars are more distributed around αS ∼ 0. ", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0806.pdf" + "text": "", + "page_start": 102, + "page_end": 102, + "source_file": "00-80T-80.pdf" }, { - "text": "] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ \n\n**1. INTRODUCTION**\n\nThe timescales on which high-amplitude flaring \nevents occur in blazars indicate that much of the en- \nergy is being produced deep within the jet on small, \nsub-parsec scales [1, 2]. Understanding if/how emis- \nsion differs between blazar subclasses (i.e., BL Lacs \nobjects and flat-spectrum radio quasars (FSRQs)) \nmay offer important insight into the similarity be- \nfurthermore, can provide con- \ntween blazars and, \nstraints on the formation and acceleration of the jets \nthemselves. \n\n**2. SMA BLAZARS**\n\nThe Submillimeter Array [4] consists of eight 6 m \nantennas located near the summit of Mauna Kea. The \nSMA is used in a variety of baseline configurations \nand typically operates in the 1mm and 850µm win- \ndows, achieving spatial resolution as fine as 0.25” at \n850µm. The sources used as phase calibrators for the \narray are compiled in a database known as the SMA \nCalibrator List2 [5]. Essentially a collection of bright \nobjects (stronger than 750 mJy at 230 GHz and 1 Jy \nat 345 GHz), these sources are monitored regularly, \nboth during science observations and dedicated ob- \nserving tracks. ", - "page_start": 1, - "page_end": 1, - "source_file": "1001.0806.pdf" + "text": "", + "page_start": 318, + "page_end": 318, + "source_file": "sg246915.pdf" }, { - "text": "The Fermi-LAT is already having a significant im- \npact on the blazar KSP. In future seasons, the VER- \nITAS blazar discovery program will focus its dis- \ncovery program on hard-spectrum blazars detected \nby Fermi-LAT, and will likely have a greater focus \non high-risk/high-reward objects at larger redshifts \n(0.3 < z < 0.7). \nIn addition, the number of VHE \nblazars studied in pre-planned MWL campaigns will \nincrease as data from the Fermi-LAT will be publicly \navailable. \nIn particular, the extensive pre-planned \nMWL campaigns will focus on objects that are note- \nworthy for the impact their data may have on under- \nstanding the EBL. The simultaneous observations of \nblazars by VERITAS and Fermi-LAT will completely \nresolve the higher-energy SED peak, often for the first \ntime, enabling unprecedented constraints on the un- \nderlying blazar phenomena to be derived. ", - "page_start": 5, - "page_end": 5, - "source_file": "1001.0770.pdf" + "text": "", + "page_start": 27, + "page_end": 27, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "The first two years of the VERITAS blazar KSP \nwere highly successful. Highlights include the detec- \ntion of more than a 16 VHE blazars with the obser- \nvations almost always having contemporaneous MWL \ndata. Among these detections are 8 VHE blazar dis- \ncoveries, including the first three IBLs known to emit \nVHE γ-rays. All but a handful of the blazars on the \ninitial VERITAS discovery target list were observed, \nand the flux limits generated for those not VHE de- \ntected are generally the most-constraining ever. The \nexcess seen in the stacked blazar analysis suggests \nthat the initial direction of the VERITAS discovery \nprogram was well justified, and that follow-up obser- \nvations of many of these initial targets will result in \nVHE discoveries. In addition, the Fermi-LAT is iden- \ntifying many new compelling targets for the VERITAS \nblazar discovery program. These new candidates have \nalready resulted in 3 VHE blazar discoveries. The \nfuture of the VERITAS blazar discovery program is \nclearly very bright. ", - "page_start": 4, - "page_end": 4, - "source_file": "1001.0770.pdf" + "text": "", + "page_start": 27, + "page_end": 27, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "EBL a few objects having a large (z > 0.3) are also \nincluded in the target list. The target list includes: \n\nVERITAS observes for ∼750 h and ∼250 h each \nyear during periods of astronomical darkness and par- \ntial moonlight, respectively. The moonlight observa- \ntions are almost exclusively used for a blazar discovery \nprogram, and a large fraction of the dark time is used \nfor the blazar KSP, which consists of: \n\n• Four distant (z > 0.3) BL Lac objects recom- \n\n• A VHE blazar discovery program (∼200 h / yr): \nEach year ∼10 targets are selected to receive \n∼10 h of observations each during astronomi- \ncal darkness. These data are supplemented by \ndiscovery observations during periods of partial \nmoonlight. \n\nmended by [5, 10]. \n\nEGRET [12]. \n\n• A target-of-opportunity (ToO) observation pro- \ngram (∼50 h / yr): VERITAS blazar obser- \nvations can be triggered by either a VERI- \nTAS blazar discovery, a VHE flaring alert (>2 \nCrab) from the blazar monitoring program of \nthe Whipple 10-m telescope or from another \nVHE instrument, or a lower-energy flaring alert \n(optical, X-ray or Fermi-LAT). Should the guar- \nanteed allocation be exhausted, further time can \nbe requested from a pool of director’s discre- \ntionary time. \n\n• Multi-wavelength (MWL) \n\nstudies of VHE \nblazars (∼50 h / yr + ToO): Each year one \nblazar receives a deep exposure in a pre-planned \ncampaign of extensive, simultaneous MWL (X- \nray, optical, radio) measurements. ToO observa- \ntion proposals for MWL measurements are also \nsubmitted to lower-energy observatories (e.g. \nSwift) and are triggered by a VERITAS discov- \nery or flaring alert. \n\n**5. VERITAS AGN Detections**\n\nVERITAS has detected VHE γ-ray emission from \n16 AGN (15 blazars), including 8 VHE discoveries. \nThese AGN are shown in Table I, and each has been \ndetected by the Large Area Telescope (LAT) instru- \nment aboard the Fermi Gamma-ray Space Telescope. \nEvery blazar discovered by VERITAS was the sub- \nject of ToO MWL observations to enable modeling of \nits simultaneously-measured SED. The known VHE \nblazars detected by VERITAS were similarly the tar- \ngets of MWL observations. \n\n• Distant VHE blazar studies to constrain the ex- \ntragalactic background light (EBL): Here dis- \ntant targets are given a higher priority in the \nblazar discovery program, as well as for the \nMWL observations of known VHE blazars, par- \nticularly those with hard VHE spectra. \n**5.1. Recent VERITAS Blazar Discoveries**", - "page_start": 2, - "page_end": 2, - "source_file": "1001.0770.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "**5.2. Discoveries Motivated by Fermi-LAT**\n\nThe successful VHE discovery observations by \nVERITAS of three blazars was motivated primarily \nby results from the first year of LAT data taking. In \nparticular, the VHE detections of PKS 1424+240 [21] \nand 1ES 0502+675 [22] were the result of VERITAS \nobservations triggered by the inclusion of these objects \nin the Fermi-LAT Bright AGN List [13]. The former \nis only the third IBL known to emit VHE gamma- \nrays, and the latter is the most distant BL Lac object \n\n**7. Multi-wavelength Studies of VHE**\n**Blazars**\n\nDuring the first three seasons of VERITAS obser- \nvations, pre-planned extensive MWL campaigns were \norganized for three blazars 1ES 2344+514 (2007-08), \n1ES 1218+304 (2008-09) and 1ES 0229+200 (2009- \n10 - ongoing). \nIn addition, numerous ToO MWL- \nobservation campaigns were performed. These include \ncampaigns for every blazar/AGN discovered by VER- \nITAS, and all include Swift (XRT and UVOT) data. \nAll MWL campaigns on the VHE blazars discovered 2RBS 0413 was observed further by VERITAS in Fall 2009. \n\neConf C091122 ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0770.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "More than 50 VHE blazar candidates were observed \nby VERITAS between September 2007 and June 2009. \nThe total exposure on the 49 non-detected candi- \ndates is ∼305 h live time (average of 6.2 h per can- \ndidate). Approximately 55% of the total exposure is \nsplit amongst the 27 observed HBL. The remainder is \ndivided amongst the 8 IBL (26%), 5 LBL (6%), and 9 \nFSRQ (13%). There are no clear indications of signifi- \ncant VHE γ-ray emission from any of these 49 blazars \n[25]. However, the observed significance distribution is \nclearly skewed towards positive values (see Figure 1). \nA stacking analysis performed on the entire data sam- \nple shows an overall excess of 430 γ-rays, correspond- \ning to a statistical significance of 4.8σ, observed from \nthe directions of the candidate blazars. The IBL and \nHBL targets make up 96% of the observed excess. Ob- \nservations of these objects also comprise ∼80% of the \ntotal exposure. An identical stacked analysis of all \nthe extragalactic non-blazar targets observed, but not \nclearly detected (>5σ), by VERITAS does not show \na significant excess (∼120 h exposure). The stacked \nexcess persists using alternate methods for estimating \nthe background at each blazar location, and with dif- \nferent event selection criteria (e.g. soft cuts optimized \nfor sources with ΓVHE > 4). The distribution of VHE \nflux upper limits is shown in Figure 1. These 49 VHE \nflux upper limits are generally the most-constraining \never reported for these objects. ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0770.pdf" + "text": "", + "page_start": 314, + "page_end": 314, + "source_file": "sg246915.pdf" } ] }, @@ -16811,70 +16811,70 @@ "target_page": 12, "target_passage": "Mermaid operates a fleet of fifteen (15) tugs, workboats and barges, undertaking all forms of offshore activity", "chunk_present": { - "presence": true, - "index": 4 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 111, + "page_end": 111, + "source_file": "00-80T-80.pdf" }, { - "text": "Captain Jim Carver, Mermaid’s founder continues to play a significant role in Mermaid’s operations, \n\npaying particular attention to our business at sea. Under 20 years of Jim’s leadership, Mermaid \n\ndeveloped an enviable reputation as a “can do” company, and in our drive for new engineering \n\nexpertise and professionalism, we have no intention of allowing that attitude to be lost. ", - "page_start": 9, - "page_end": 9, - "source_file": "ASX_MRM_2000.pdf" + "text": "", + "page_start": 27, + "page_end": 27, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "Derrice took a leading role in the listing of Mermaid Marine in 1999 and has since headed up \n\naccounting, systems and administration. As Chairman of the Board of Management she plays a \n\nsenior role in Mermaid’s operations. ", - "page_start": 31, - "page_end": 31, - "source_file": "ASX_MRM_2000.pdf" + "text": "", + "page_start": 27, + "page_end": 27, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "Mermaid operates a fleet of fifteen (15) tugs, workboats and barges, S E A G O I N G O P E R A T I O N S \n\nundertaking all forms of offshore activity including exploration support, supply, survey and berthing \n\nassist. Lower vessel utilisation during the period allowed an acceleration of scheduled maintenance. \n\nTwo tugs, Mermaid Commando and Mermaid Chieftan received extensive refits. In both cases the \n\nwork increased productivity through enhanced bollard pull and consequent earnings. ", - "page_start": 12, - "page_end": 12, - "source_file": "ASX_MRM_2000.pdf" + "text": "", + "page_start": 27, + "page_end": 27, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "vessels engaged in routine offshore logistics tasks operate fully laden with 7.4 m draft which \n\nmeans there will be very few occasions when the largest vessels in the industry have to make a \n\ntide dependent entry or departure through the Mermaid channel. Further the Mermaid Base will \n\nnot suffer operational disadvantages experienced by the adjacent Woodshed Base or nearby \n\nDamper Public Wharf in terms of entry and departure draft restrictions. ", - "page_start": 15, - "page_end": 15, - "source_file": "ASX_MRM_2000.pdf" + "text": "", + "page_start": 26, + "page_end": 26, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "Trading for the period commencing 1 July 1999 to 30 June 2000 for Mermaid Marine O V E R V I E W \n\nAustralia Ltd (“Company”) and its controlled entities, experienced a 43% turnover reduction \n\nfrom last year. The result was almost entirely due to a heavy fall in oil prices, which reached their \n\nlow of US$10 in February 1999, leading to the lowest level of offshore activity for many years. \n\nIn September 1999 Mermaid exercised its option to acquire the utility vessel “Mermaid \n\nAchiever” for $3,250,000. Previously the Achiever operated under a bare boat charter. ", - "page_start": 11, - "page_end": 11, - "source_file": "ASX_MRM_2000.pdf" + "text": "", + "page_start": 25, + "page_end": 25, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "Bare boat charters, although useful for the busy times encountered in 1998 exposed the \n\nCompany to a high level of fixed costs. The vessels were valuable earners and the transfer of the \n\nMermaid Achiever, Mermaid Eagle and Mermaid Reunion to Company ownership has proved \n\nto be the right decision for all market conditions. Although there have been no contracts yet let \n\nfor work of any significance by producers on the North West Shelf, underlying day to day activity \n\nhas returned. Expressions of interest for major project work have been issued and as an indication \n\nof better trading conditions, an unaudited profit of $496,721 has been recorded for the two \n\nmonths to 31st August 2000. The trend has continued in September. ", - "page_start": 11, - "page_end": 11, - "source_file": "ASX_MRM_2000.pdf" + "text": "", + "page_start": 22, + "page_end": 22, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "Our ambitions for the support of the oil and gas industry now go beyond bases and vessels. Early \n\nin the current financial year, Mermaid acquired 50% of the OIS MOC Joint Venture Pty Ltd, to \n\nbe paid for by the issue of 800,000 Mermaid shares. OIS MOC owns the highly successful labour \n\nhire business operated by Kevin Ponga and Rick De Franck. Kevin Ponga is now General \n\nManager of Mermaid Labour & Management Pty Limited and Mr De Franck becomes a Director. \n\nWith their reputation and talent added to Mermaid’s experienced team, this labour hire \n\ncompany has become a significant force and can be expected to be in the final when major \n\nlabour hire contracts are let. ", - "page_start": 9, - "page_end": 9, - "source_file": "ASX_MRM_2000.pdf" + "text": "", + "page_start": 22, + "page_end": 22, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "Regardless of industry trends, Mermaid has a need for a Darwin Base to service and care for \n\nMermaid vessels working in the area. Too often vessels have been demobilised to Dampier at the \n\nconclusion of a contract then being required to return to Darwin within days or weeks for \n\nanother assignment. ", - "page_start": 23, - "page_end": 23, - "source_file": "ASX_MRM_2000.pdf" + "text": "", + "page_start": 22, + "page_end": 22, + "source_file": "NYSE_CHK_2010.pdf" } ] }, @@ -16891,64 +16891,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 173, + "page_end": 173, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 0, + "page_end": 0, + "source_file": "Microscope Manual.pdf" }, { - "text": "In February 2000 Mermaid received approval in principle from the Western Australian Minister \n\nfor the Environment for the development of a supply and engineering base at Dampier (Dampier \n\nBase). Since that time a detailed environmental management system has been produced for final \n\napproval and as a guide to daily environmental management and compliance. Refinements to \n\nthe design have proceeded, together with the preparation of bid packages and negotiations with \n\nBanks for project finance. ", - "page_start": 11, - "page_end": 11, - "source_file": "ASX_MRM_2000.pdf" + "text": "", + "page_start": 214, + "page_end": 214, + "source_file": "00-80T-80.pdf" }, { - "text": "The offshore waters and islands adjacent to Dampier, host in excess of 50% of all D A M P I E R B A S E \n\nexploration and development budgets of Australia’s offshore oil and gas industry. The Burrup \n\nPeninsular where the Base is located is the intended site of major new oil, gas, petrochemical and \n\nindustrial mineral processing plants. The Port of Dampier is Australia’s largest Port as measured by \n\ntonnage, but as identified in the 1997 WA Department of Commerce and Trade report, there \n\nremains an urgent need for additional marine support infrastructure. Mermaid is now well advanced \n\nin our plan to satisfy those needs and onshore work was announced to start on the 9th October 2000. ", - "page_start": 12, - "page_end": 12, - "source_file": "ASX_MRM_2000.pdf" + "text": "", + "page_start": 214, + "page_end": 214, + "source_file": "00-80T-80.pdf" }, { - "text": "Providing marine support for such expansion has been our principle source of earnings, but \n\nMermaid will enjoy a larger and more diversified income stream once development of the Base \n\nat Dampier is completed. The project, demonstrated in more detail later in this report, will \n\nrevolutionise our Company and drive significant changes in the way offshore producers are \n\nserviced in the North West of Australia. ", - "page_start": 8, - "page_end": 8, - "source_file": "ASX_MRM_2000.pdf" + "text": "", + "page_start": 214, + "page_end": 214, + "source_file": "00-80T-80.pdf" }, { - "text": "***The foreshore of King Bay will be redeveloped as part of the Mermaid Marine Dampier Base Expansion works.***\n\nleased facilities to seven third party vessels and protection for three of our own vessels using this \n\ntechnique by the cyclone season in 2001. ", - "page_start": 17, - "page_end": 17, - "source_file": "ASX_MRM_2000.pdf" + "text": "", + "page_start": 155, + "page_end": 155, + "source_file": "sg246915.pdf" }, { - "text": "*Base Salary*\nBase salaries for executives recognize their qualifications, experience and responsibilities as well as their unique value and \nhistorical contributions to Sundance. In addition to being important to attracting and retaining executives, setting base salaries \nat appropriate levels motivates employees to aspire to and accept enlarged opportunities. We do not consider base salaries to \nbe part of performance-based remuneration. In setting the amount, the individuals' performance is considered as well as the \nlength of time in their current position without a salary increase. ", - "page_start": 35, - "page_end": 35, - "source_file": "ASX_SEA_2014.pdf" + "text": "", + "page_start": 375, + "page_end": 375, + "source_file": "00-80T-80.pdf" }, { - "text": "Regardless of industry trends, Mermaid has a need for a Darwin Base to service and care for \n\nMermaid vessels working in the area. Too often vessels have been demobilised to Dampier at the \n\nconclusion of a contract then being required to return to Darwin within days or weeks for \n\nanother assignment. ", - "page_start": 23, - "page_end": 23, - "source_file": "ASX_MRM_2000.pdf" + "text": "", + "page_start": 155, + "page_end": 155, + "source_file": "sg246915.pdf" }, { - "text": "To date there have been three options available to vessel owners when a cyclone approaches:. \n\n• Run to sea \n\n• Take refuge with crew onboard, on a mooring in the most sheltered location available such \n\nas the Dampier Archipelago or the Monte Bello Islands. \n\n• Construct a cyclone shelter. ", - "page_start": 16, - "page_end": 16, - "source_file": "ASX_MRM_2000.pdf" + "text": "", + "page_start": 375, + "page_end": 375, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\nL TIME TO DAMP TO \nHALF AMPLITUDE \n\nTIME \nLb-- \n\n/ \n/ \n\n-6.HORT PERIOD - ", - "page_start": 298, - "page_end": 298, - "source_file": "00-80T-80.pdf" + "text": "", + "page_start": 155, + "page_end": 155, + "source_file": "sg246915.pdf" } ] }, @@ -16959,70 +16959,70 @@ "target_page": 22, "target_passage": "1 February 2000", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "", "page_start": 42, "page_end": 42, "source_file": "Excel Training Manual 1.pdf" }, { - "text": "\n\n ", + "text": "", "page_start": 43, "page_end": 43, "source_file": "Excel Training Manual 1.pdf" }, { - "text": "Mermaid Marine services base at the Port of Broome (Broome Base) B R O O M E S U P P LY B A S E \n\ncommenced operations on 1 February 2000 when the first ship containing drill pipe for Inpex \n\nBrowse Ltd arrived from Japan. ", - "page_start": 22, - "page_end": 22, - "source_file": "ASX_MRM_2000.pdf" - }, - { - "text": "vessels engaged in routine offshore logistics tasks operate fully laden with 7.4 m draft which \n\nmeans there will be very few occasions when the largest vessels in the industry have to make a \n\ntide dependent entry or departure through the Mermaid channel. Further the Mermaid Base will \n\nnot suffer operational disadvantages experienced by the adjacent Woodshed Base or nearby \n\nDamper Public Wharf in terms of entry and departure draft restrictions. ", - "page_start": 15, - "page_end": 15, - "source_file": "ASX_MRM_2000.pdf" + "text": "", + "page_start": 43, + "page_end": 43, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "***The foreshore of King Bay will be redeveloped as part of the Mermaid Marine Dampier Base Expansion works.***\n\nleased facilities to seven third party vessels and protection for three of our own vessels using this \n\ntechnique by the cyclone season in 2001. ", - "page_start": 17, - "page_end": 17, - "source_file": "ASX_MRM_2000.pdf" + "text": "", + "page_start": 43, + "page_end": 43, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "Derrice took a leading role in the listing of Mermaid Marine in 1999 and has since headed up \n\naccounting, systems and administration. As Chairman of the Board of Management she plays a \n\nsenior role in Mermaid’s operations. ", - "page_start": 31, - "page_end": 31, - "source_file": "ASX_MRM_2000.pdf" + "text": "", + "page_start": 43, + "page_end": 43, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "Captain Jim Carver, Mermaid’s founder continues to play a significant role in Mermaid’s operations, \n\npaying particular attention to our business at sea. Under 20 years of Jim’s leadership, Mermaid \n\ndeveloped an enviable reputation as a “can do” company, and in our drive for new engineering \n\nexpertise and professionalism, we have no intention of allowing that attitude to be lost. ", - "page_start": 9, - "page_end": 9, - "source_file": "ASX_MRM_2000.pdf" + "text": "", + "page_start": 42, + "page_end": 42, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "Perkins Shipping, established in the 1950s is the major coastal shipping service provider in \n\nAustralia’s north, linking Darwin to mining and aboriginal committees from the Kimberly to \n\nGulf of Carpenteria. Additionally Perkins operate services to East Timor, mining operations in \n\nIndonesia, as well as Singapore and East Malaysia. The Perkins and Mermaid businesses are \n\ndifferent, but complementary, offering benefits to both. The arrangement with Perkins will give \n\nMermaid well placed office facilities, open storage and waterfront access. ", - "page_start": 23, - "page_end": 23, - "source_file": "ASX_MRM_2000.pdf" + "text": "", + "page_start": 108, + "page_end": 108, + "source_file": "00-80T-80.pdf" }, { - "text": "Mermaid operates a fleet of fifteen (15) tugs, workboats and barges, S E A G O I N G O P E R A T I O N S \n\nundertaking all forms of offshore activity including exploration support, supply, survey and berthing \n\nassist. Lower vessel utilisation during the period allowed an acceleration of scheduled maintenance. \n\nTwo tugs, Mermaid Commando and Mermaid Chieftan received extensive refits. In both cases the \n\nwork increased productivity through enhanced bollard pull and consequent earnings. ", - "page_start": 12, - "page_end": 12, - "source_file": "ASX_MRM_2000.pdf" + "text": "", + "page_start": 42, + "page_end": 42, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "**C. QUAY WALL (BERTH 2)**\n\nThe inner berth, Berth 2 has a minimum depth alongside of 5.0 m allowing unrestricted \n\noperation of all the Mermaid fleet, and the majority of other vessels servicing the offshore oil/gas \n\nindustry and mineral ports. This berth will offer excellent weather protection for small and \n\nmedium size vessels. ", - "page_start": 15, - "page_end": 15, - "source_file": "ASX_MRM_2000.pdf" + "text": "", + "page_start": 42, + "page_end": 42, + "source_file": "Excel Training Manual 1.pdf" } ] }, @@ -17033,70 +17033,70 @@ "target_page": 2, "target_passage": "Just select File > New", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 25, + "page_end": 25, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "Create something \n\nBegin with a**Blank document**to get right to work. Or start with a template to save \nyourself time and steps. Just select**File**>**New**, and then select or search for the \ntemplate you want. ", - "page_start": 2, - "page_end": 2, - "source_file": "Word QS.pdf" + "text": "", + "page_start": 135, + "page_end": 135, + "source_file": "00-80T-80.pdf" }, { - "text": "**Summary**\n\nAuthors can ensure that their Word documents are accessible to people with disabilities \n\neven when distributing them in PDF format using the following approach: \n\n1. First, they should follow the practices in Make your Word documents accessible to \n\npeople with disabilities . \n\n2. Next, they should follow the steps in Create accessible PDFs to preserve the \n\naccessibility of the document in PDF format. \n\nThis article provides details about the information Word includes in the PDF to make it \n\naccessible. \n\n1. PDF/UA tags are included to provide semantic information about the content in \n\nthe document. \n\n2. Decorative content does not need to be read, so it is marked as in the \n\nContent Tree in the PDF and no PDF/UA tags are included. \n\n3. Bookmarks for each section and slide are included to make it easier to navigate the \n\ncontent. ", - "page_start": 56, - "page_end": 56, - "source_file": "office-pdf.pdf" + "text": "", + "page_start": 135, + "page_end": 135, + "source_file": "00-80T-80.pdf" }, { - "text": "With this document saved in OneDrive, you can share it with others. They don’t even need Word \nto open it. \n\nTry it: Select Share, and send a link to this document. (keyboard shortcut – Alt+F+Z or Alt+Z+S) \n\nYou can send the link by typing someone’s email address or by copying the link and pasting it \ninto a message or chat. If you want them to read the document but not edit it, set their \npermission to view-only. \n\nIf they don’t have Word, the document will open in their web browser, in Word Online. ", - "page_start": 3, - "page_end": 3, - "source_file": "welcome_to_word_template.pdf" + "text": "", + "page_start": 22, + "page_end": 22, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "Try it: Select File > Save As, and then select OneDrive and give this document a name. \n\nIf you sign in to Office 365 on another device, this document will be in your list of recent files. \nYou can pick up where you left off… even if you left the document open on the computer you’re \nusing now. ", - "page_start": 2, - "page_end": 2, - "source_file": "welcome_to_word_template.pdf" + "text": "", + "page_start": 22, + "page_end": 22, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "Publisher calls the**HrCreateDoc**method at the beginning of the fixed-format export \n\nprocess to specify the creation of an empty fixed-format document. The*wzDocExFile*\n\nparameter specifies a name for the output file to which to write the fixed-format \n\ndocument. \n\nFor an add-in implementation, Publisher calls**HrCreateDoc**with the file name that the \n\nadd-in provided in the call to the**ExportToFixedFormat**method in the Microsoft Office \n\nobject model. However, because add-ins typically provide configuration UI to allow the \n\nuser to specify an output file name, the add-in could disregard this file name during the \n\nexport process. \n\nFor Microsoft Office applications that require the add-in to paginate the document, \n\n**HrCreateDoc**is called twice, once at the start of the pagination-calling sequence, and \n\nagain after the add-in has paginated the document. For more information, see the \n\ndescriptions for the HrSetPageHeightForPagination method and the HrGetPageBreaks \n\nmethod. ", - "page_start": 13, - "page_end": 13, - "source_file": "office-pdf.pdf" + "text": "", + "page_start": 21, + "page_end": 21, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "**1** **Introduction**\n\n**1.1 Purpose of the Document**\n\nThe main purpose of this document is to present a User Manual for the main user functionalities of \nthe**Portal Version 4.3**, launched in production in May 2019. This document consists of an update of \nthe User Manual for the Portal Version 3.0 published in November 2017[4]. ", - "page_start": 4, - "page_end": 4, - "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + "text": "", + "page_start": 135, + "page_end": 135, + "source_file": "00-80T-80.pdf" }, { - "text": "To test the migration from on-premises to the cloud, create another document. Click the \n**Documents**tab (see Figure 7-13 on page 187). Then, click**Insert**to add the document, as \nshown in Figure 7-14. ", - "page_start": 204, - "page_end": 204, - "source_file": "sg248459.pdf" + "text": "", + "page_start": 21, + "page_end": 21, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": " Click the “+” sign (figure 19a) creates a new user (figure 20 new User). \n Double click on the cell of the newly created user name and enter a new user name (must be unique and contain at \n\nleast 3 characters). \nOnce done, press the enter key and the new user name will be saved in the respective table of the NAIIS database. \n\nNote: New user name(s) will be generated by the system as default [Non-Annex I Party name] + “newUser” \n(e.g. UgandanewUser, PhilippinesnewUser, ArgentinanewUser) ", - "page_start": 14, - "page_end": 14, - "source_file": "maiis-user-manual.pdf" + "text": "", + "page_start": 136, + "page_end": 136, + "source_file": "00-80T-80.pdf" } ] }, @@ -17113,64 +17113,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 261, + "page_end": 261, + "source_file": "sg246915.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 335, + "page_end": 335, + "source_file": "00-80T-80.pdf" }, { - "text": "**Welcome to Microsoft Teams**\n\nMicrosoft Teams is the app that brings your conversations, meetings, and files together in one place. This guide will help \nyou get started with Teams, learn the basics, get tips to practice on your own, and discover ways to engage your team. ", - "page_start": 1, - "page_end": 1, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + "text": "", + "page_start": 335, + "page_end": 335, + "source_file": "00-80T-80.pdf" }, { - "text": "**1**\n\n*You can also use the Quick Analysis tool that appears at the*\n*bottom right corner of a selected range to create a quick chart.*\n*However, this method will not allow you to preview a wide*\n*variety of charts.*", - "page_start": 46, - "page_end": 46, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 335, + "page_end": 335, + "source_file": "00-80T-80.pdf" }, { - "text": "**Summary:**Create a COM add-in for Office 2024, Office LTSC 2024, and Microsoft 365 \n\nVersion 2408 and later applications with your own logic for exporting to PDF format. The \n\ntechnique described requires knowledge of C++ and COM. \n\n**Applies to:**Excel, OneNote, PowerPoint, Publisher, Visio, and Word in Office 2024, Office \n\nLTSC 2024, Microsoft 365 Version 2408 and later. ", - "page_start": 3, - "page_end": 3, - "source_file": "office-pdf.pdf" + "text": "", + "page_start": 335, + "page_end": 335, + "source_file": "00-80T-80.pdf" }, { - "text": "Serverless \n\n• Getting Started Resource Center - Choosing an AWS database service - Choosing the right \n\ndatabase requires you to make a series of decisions based on your organizational needs. This \ndecision guide will help you ask the right questions, provide a clear path for implementation, and \n\nhelp you migrate from your existing database. ", - "page_start": 88, - "page_end": 88, - "source_file": "serverless-core.pdf" + "text": "", + "page_start": 335, + "page_end": 335, + "source_file": "00-80T-80.pdf" }, { - "text": "**Test meetings**\n\n**Keep learning**\n1. \n\nUse the Meet now button in the \nCalendar tab \n\nNo matter how you like to learn and practice, we've got \nresources to support and inspire you: \n\nThen select “Start meeting” 2. \n\n3. And then \"Join now” \n\n• \n\nVirtual classes: We have instructors to answer your \nquestions and walk you through all the details. \n\nHere you can try to share your screen, \nstart a whiteboard or even record \nyourself while you are practicing a \npresentation. This is your safe space \nto test everything out! \n\n• \n\nSupport articles and step-by-step guides: To get answers to \nyour most common questions. ", - "page_start": 6, - "page_end": 6, - "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + "text": "", + "page_start": 335, + "page_end": 335, + "source_file": "00-80T-80.pdf" }, { - "text": "There are a number of vendors emerging who are using the technology in very productive ways and are \nproviding the foundation for federated knowledge graphs that can scale to hundreds of millions of triples \nor more and provide a framework for all corporate data. I’ve listed several in the bibliography but those \nare only the ones I’ve had some experience with. I’m sure there are many others. One of the products I’ve \nhad the best experience with is the AllegroGraph triplestore and the Gruff visualization tool from Franz \nInc. Although Allegro is a commercial tool, the free version supports most of the core capabilities of the \ncommercial version. I’ve found the Allegro triplestore easy to use on a Windows PC with the Docker tool \nto emulate a Linux server. \n\nI first started working with classification-based languages when I worked at the Information Sciences \nInstitute (ISI) and used the Loom language [Macgregor 91] to develop B2B systems for the US \nDepartment of Defense and their contractors. Since then, I’ve followed the progress of the technology, \nespecially the DARPA knowledge sharing initiative [Neches 91] and always thought there was great \npromise in the technology. When I first discovered Protégé it was a great experience. It is one of the best \nsupported and most usable free tools I’ve ever seen, and it always surprised me that there weren’t more \ncorporate users leveraging it in major ways. I think we are finally starting to see this happen and I hope \nthis tutorial helps in a small way to accelerate the adoption of this powerful and robust tool. ", - "page_start": 89, - "page_end": 89, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 335, + "page_end": 335, + "source_file": "00-80T-80.pdf" }, { - "text": "Next steps with Word \n\n**See what’s new in Office**\nExplore the new and improved features in Word and the other Office apps. \nVisit**https://go.microsoft.com/fwlink/?linkid=871117**for \nmore information. \n\n**Get free training, tutorials, and videos for Office**\nReady to dig deeper into the capabilities that Word has to offer? Visit \n**https://go.microsoft.com/fwlink/?linkid=871123**to explore our free \ntraining options. \n\n**Send us your feedback**\nLove Word? Got an idea for improvement to share with us? On the**File**menu, \nselect**Feedback**and then follow the prompts to send your suggestions directly to \nthe Word product team. Thank you! ", - "page_start": 4, - "page_end": 4, - "source_file": "Word QS.pdf" + "text": "", + "page_start": 335, + "page_end": 335, + "source_file": "00-80T-80.pdf" }, { - "text": "Figure 6-36 Adding storage to a pool \n\nThis action starts the configuration wizard that is shown in Figure 6-37. If any of the drives are \nfound with*Unused*role, it is suggested that you reconfigure them as*Candidates*to be \nincluded into configuration. \n\nIf**Internal**or**Internal Custom**is chosen, then the system guides you through array MDisk \ncreation. If**External**is selected, the system guides you through the selection of external \nstorage. ", - "page_start": 240, - "page_end": 240, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 335, + "page_end": 335, + "source_file": "00-80T-80.pdf" } ] }, @@ -17181,70 +17181,70 @@ "target_page": 2, "target_passage": " Click File > Account to sign in with your Microsoft account", "chunk_present": { - "presence": true, - "index": 3 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 145, + "page_end": 145, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "you will be prompted to create a user ID (your email address) and a password. Once you do that you \nshould have a fresh Web Protégé workspace. Figure 12.1 shows what my Web Protégé workspace \ncurrently looks like. Most of the projects are owned by me although note that the CODO project is owned \nby my colleague Biswanath Dutta. However, I still have complete access to that ontology due to the way \nBiswanath has configured my access as being able to both view and edit the ontology. \n\nTo upload the Pizza ontology, select the large Create New Project button. This will bring up the window \nshown in figure 12.2. Fill out the project name and description, then select the Choose File button and \nnavigate to where you have the latest version of the Pizza tutorial with data. Note that in the figure I have \nalready done this navigation so there is a value for the file to load. You can leave the Language field \nblank. Once you have all the fields set up similar to figure 12.2 click the Create New Project button on \nthis dialog (note this is a different button than the one you started from). ", - "page_start": 85, - "page_end": 85, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "Access files anywhere \n\nNeed to work on the go and across different devices? Click**File**>**Account**to sign \nin with your Microsoft account and access your recently used files anywhere, on \nany device, through seamless integration between Office, OneDrive, OneDrive for \nBusiness, and SharePoint. ", - "page_start": 2, - "page_end": 2, - "source_file": "Word QS.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "Word works with Bing to give you access to thousands of pictures you can use in your \ndocuments. \n\nTry it: Hit enter after this line to make a blank line: \n\n1. With your cursor in the blank space above, go to the Insert tab, select Online Pictures, \n\nand then search for something, like puppy clip art. \n\n2. Select the picture you want, and select Insert. ", - "page_start": 3, - "page_end": 3, - "source_file": "welcome_to_word_template.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "Figure 13-59 Support wizard access choice \n\n4. After completing the remote support setup, you can view the status of any remote \n\nconnection, start a new session, test the connection to IBM, and reconfigure the setup. As \nshown in Figure 13-60, we successfully tested the connection. Click**Start New Session**\nto open a tunnel through which IBM Support can connect. ", - "page_start": 743, - "page_end": 743, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "**4.3 System setup**\n\nThis section provides instructions about how to define the basic settings of the system with \nthe system setup wizard, and how to add nodes and optional expansion enclosures. \n\n**4.3.1 System setup wizard**\n\nWhether you are redirected from your PC or notebook after completing system initialization or \nyou browse to the management IP address manually, you must complete the system setup \nwizard to define the basic settings of the system. \n\n**Note:**The first time that you connect to the management GUI, you are prompted to accept \nuntrusted certificates because the system certificates are self-signed. \n\nYou can install certificates that are signed by a trusted certificate authority after you \ncomplete system setup. For more information about how to perform this task, see 4.5, \n“Configuring secure communications” on page 117. ", - "page_start": 114, - "page_end": 114, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "**5.1.1 Access to GUI**\n\nTo access the IBM Storwize V7000 GUI, enter into the address line of your web browser the \nIP address that was set during the initial setup process. You can connect from any \nworkstation that can communicate with the system. The login window opens (see Figure 5-1). ", - "page_start": 154, - "page_end": 154, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "Share your work with others \n\nTo invite others to view or edit your documents, select the**Share**button in the \ntop right corner of the app window. Then, you can choose to share a link to your \ndocument or send invitations directly to specific people. If someone doesn't have \nWord, they can use the free Word for the Web app to edit and comment. ", - "page_start": 4, - "page_end": 4, - "source_file": "Word QS.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "With this document saved in OneDrive, you can share it with others. They don’t even need Word \nto open it. \n\nTry it: Select Share, and send a link to this document. (keyboard shortcut – Alt+F+Z or Alt+Z+S) \n\nYou can send the link by typing someone’s email address or by copying the link and pasting it \ninto a message or chat. If you want them to read the document but not edit it, set their \npermission to view-only. \n\nIf they don’t have Word, the document will open in their web browser, in Word Online. ", - "page_start": 3, - "page_end": 3, - "source_file": "welcome_to_word_template.pdf" + "text": "", + "page_start": 168, + "page_end": 168, + "source_file": "00-80T-80.pdf" } ] }, @@ -17255,70 +17255,70 @@ "target_page": 4, "target_passage": "meat and other food product", "chunk_present": { - "presence": true, - "index": 6 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 281, + "page_end": 281, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 26, + "page_end": 26, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**PART I**\n\n**Item 1.*BUSINESS***\n\n**Available Information**\n\nThe Company makes available, free of charge on its website at*www.hormel.com*, its annual report on Form 10-K, quarterly reports on Form 10-Q, \ncurrent reports on Form 8-K, and amendments to those reports filed or furnished pursuant to Section 13(a) or 15(d) of the Securities Exchange Act of \n1934. These reports are accessible under the \"Investor\" caption of the Company's website and are available as soon as reasonably practicable after such \nmaterial is electronically filed with or furnished to the Securities and Exchange Commission, which is within 24 hours. \n\nThe Company has adopted a Code of Ethical Business Conduct that covers its officers and directors, which is available on the Company's website, free \nof charge, under the caption \"Corporate.\" The Company also adopted Corporate Governance Guidelines, which are available on the Company's website, \nfree of charge, under the caption \"Investor.\" \n\n**(a)*General Development of Business***\n\nHormel Foods Corporation, a Delaware corporation, was founded by George A. Hormel in 1891 in Austin, Minnesota, as George A. Hormel & Company. \nThe Company started as a processor of meat and food products and continues in this line of business. The Company name was changed to Hormel \nFoods Corporation on January 31, 1995. The Company is primarily engaged in the production of a variety of meat and food products and the marketing of \nthose products throughout the United States. Although pork and turkey remain the major raw materials for Hormel products, the Company has \nemphasized for several years the manufacture and distribution of branded, consumer packaged items rather than the commodity fresh meat business. ", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_HRL_2004.pdf" + "text": "", + "page_start": 288, + "page_end": 288, + "source_file": "00-80T-80.pdf" }, { - "text": "Use these links to rapidly review the document \nHORMEL FOODS CORPORATION TABLE OF CONTENTS \n\n**ANNUAL REPORT ON FORM 10-K**\n\n**HORMEL FOODS CORPORATION**\n\n**OCTOBER 25, 2003**", - "page_start": 2, - "page_end": 2, - "source_file": "NYSE_HRL_2004.pdf" + "text": "", + "page_start": 288, + "page_end": 288, + "source_file": "00-80T-80.pdf" }, { - "text": "**Customers and Backlog Orders**\n\nDuring fiscal year 2003, no customer accounted for more than 10 percent of total Company sales. The five largest customers in each segment make up \napproximately the following percentage of segment sales: 39 percent of Grocery Products, 39 percent of Refrigerated Foods, 35 percent of JOTS, \n51 percent of Specialty Foods, and 27 percent of All Other. The loss of one or more of the top customers in any of these segments could have a material \nadverse effect on the results of such segment. Backlog orders are not significant due to the perishable nature of a large portion of the products. Orders \nare accepted and shipped on a current basis. \n\n**Competition**\n\nThe production and sale of meat and food products in the United States and internationally are highly competitive. The Company competes with \nmanufacturers of pork and turkey products, as well as national and regional producers of other meat and protein sources, such as beef, chicken and fish. \nThe Company believes that its largest domestic competitors for its Refrigerated Foods segment in 2003 were Tyson Foods, Smithfield Foods and \nConAgra Foods; for its Grocery Products segment, ConAgra Foods, Dial Corp. and Campbell Soup Co.; and for JOTS, ConAgra Foods and Cargill, Inc. ", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_HRL_2004.pdf" + "text": "", + "page_start": 289, + "page_end": 289, + "source_file": "00-80T-80.pdf" }, { - "text": "markets its turkey products through its own sales force and independent brokers. \n\nThe acquisitions of Diamond Crystal Brands Nutritional Products in fiscal 2001 and the Century Foods International business in July of fiscal 2003 \nstrengthened the Company's presence in the nutritional food products and supplements market. The Company currently operates as one of the largest \ncompanies providing nutritional products to the U.S. healthcare industry. \n\nThe Company acquired the Diamond Crystal Brands business from Imperial Sugar Co. in December of fiscal 2003. Diamond Crystal Brands packages \nand sells various sugar, sugar substitute, salt and pepper products, savory products, drink mixes and dessert mixes to retail and foodservice customers. \n\nInternationally, the Company markets its products through Hormel Foods International Corporation (HFIC), a wholly owned subsidiary. HFIC has a \npresence in the international marketplace through joint ventures and placement of personnel in strategic foreign locations such as China, Spain, and the \nPhilippines. HFIC also has a global presence with minority positions in food companies in Spain (Campofrio Alimentacion S.A., 15% holding) and the \nPhilippines (Purefoods-Hormel, 40% holding). ", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_HRL_2004.pdf" + "text": "", + "page_start": 289, + "page_end": 289, + "source_file": "00-80T-80.pdf" }, { - "text": "Reporting of revenues from external customers is based on similarity of products, as the same or similar products are sold across multiple distribution \nchannels such as retail, foodservice or international. Revenues reported are based on financial information used to produce the Company's general- \npurpose financial statements. \n\nPerishable meat includes fresh meats, sausages, hams, wieners and bacon (excluding JOTS products.) Nonperishable meat includes canned luncheon \nmeats, shelf stable microwaveable entrees, stews, chilies, hash, meat spreads and other items that do not require refrigeration as well as frozen \nprocessed products. The Poultry category is composed primarily of JOTS products. The Other category primarily consists of nutritional food products and \nsupplements, sugar and sugar substitutes, salt and pepper products, dessert mixes, food packaging (casings for dry sausage), and industrial gelatin \nproducts. The Other category has increased over the past two years primarily due to the following acquisitions: Century Foods International (July 2003), \nDiamond Crystal Brands (December 2002), and Diamond Crystal Brands Nutritional Products (April 2001). \n\nNo new product in fiscal 2003 required a material investment of Company assets. \n\nDomestically, the Company sells its products in all 50 states. Hormel products are sold through Company sales personnel, operating in assigned \nterritories coordinated from district sales offices located in most of the larger U.S. cities, as well as independent brokers and distributors. As of \nOctober 25, 2003, the Company had approximately 600 sales personnel engaged in selling its products. Distribution of products to customers is by \ncommon carrier. ", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_HRL_2004.pdf" + "text": "", + "page_start": 289, + "page_end": 289, + "source_file": "00-80T-80.pdf" }, { - "text": "The Company's branding strategy led to the development of a joint venture between Hormel Foods Corporation and Excel Corporation, a wholly owned \nsubsidiary of Cargill Incorporated. This joint venture began marketing and selling nationally branded fresh case ready beef and pork under the existing \nHORMEL ALWAYS TENDER brand name in fiscal year 2003. This 50 percent owned joint venture, named Precept Foods LLC, is based in Austin, Minn. \n\nIn fiscal 2001, the Jennie-O Turkey Store (JOTS) business was formed as a result of merging the Company's existing Jennie-O Foods, Inc. business with \nthe operations of The Turkey Store Company, which was acquired in the second quarter of fiscal 2001. The Turkey Store Company was a turkey \nprocessing business headquartered in Barron, Wisconsin. The merged JOTS operation is currently the largest turkey processor in the world. JOTS ", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_HRL_2004.pdf" + "text": "", + "page_start": 289, + "page_end": 289, + "source_file": "00-80T-80.pdf" }, { - "text": "**HORMEL FOODS CORPORATION**\n\n| 2.1 | (1) | Agreement and Plan of Merger and Plan of Reorganization dated January 22, 2001, by and among Hormel, Badger Acquisition\nCorporation, Jerome Foods, Inc. and Jerome K. Jerome. (Incorporated by reference to Hormel's Current Report on Form 8-K\ndated March 9, 2001, File No. 001-02402.) |\n|---|---|---|\n| 2.1 | (1) | Agreement and Plan of Merger and Plan of Reorganization dated January 22, 2001, by and among Hormel, Badger Acquisition Corporation, Jerome Foods, Inc. and Jerome K. Jerome. (Incorporated by reference to Hormel's Current Report on Form 8-K dated March 9, 2001, File No. 001-02402.) |\n| 3.1 | (1) | Certificate of Incorporation as amended to date. (Incorporated by reference to Exhibit 3A-1 to Hormel's Annual Report on Form 10- K/A for the fiscal year ended October 28, 2000, File No. 001-02402.) |\n", - "page_start": 12, - "page_end": 12, - "source_file": "NYSE_HRL_2004.pdf" + "text": "", + "page_start": 26, + "page_end": 26, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "The Company has not been involved in any bankruptcy, receivership or similar proceedings during its history. Substantially all of the assets of the \nCompany have been acquired in the ordinary course of business. \n\nThe Company had no significant change in the type of products produced or services rendered, nor in the markets or methods of distribution since the \nbeginning of the fiscal year. \n\n**(b)*Industry Segment***\n\nThe Company's business is reported in five segments: Grocery Products, Refrigerated Foods, Jennie-O Turkey Store, Specialty Foods, and All Other. \nThe contributions of each segment to net sales to unaffiliated customers and operating profit, and the presentation of certain other financial information by \nsegment are reported in Note K of the Notes to Consolidated Financial Statements and in the Management's Discussion and Analysis of the Annual \nStockholder's Report for the year ended October 25, 2003, incorporated herein by reference. \n\n**(c)*Description of Business***\n\n**Products and Distribution**\n\nThe Company's products primarily consist of meat and other food products. The meat products are sold fresh, frozen, cured, smoked, cooked and \ncanned. The percentages of total revenues contributed by classes of similar products for the last three fiscal years of the Company are as follows: ", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_HRL_2004.pdf" + "text": "", + "page_start": 26, + "page_end": 26, + "source_file": "NYSE_MGM_2004.pdf" } ] }, @@ -17335,64 +17335,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 17, + "page_end": 17, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Use these links to rapidly review the document \nHORMEL FOODS CORPORATION TABLE OF CONTENTS \n\n**ANNUAL REPORT ON FORM 10-K**\n\n**HORMEL FOODS CORPORATION**\n\n**OCTOBER 25, 2003**", - "page_start": 2, - "page_end": 2, - "source_file": "NYSE_HRL_2004.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**PART I**\n\n**Item 1.*BUSINESS***\n\n**Available Information**\n\nThe Company makes available, free of charge on its website at*www.hormel.com*, its annual report on Form 10-K, quarterly reports on Form 10-Q, \ncurrent reports on Form 8-K, and amendments to those reports filed or furnished pursuant to Section 13(a) or 15(d) of the Securities Exchange Act of \n1934. These reports are accessible under the \"Investor\" caption of the Company's website and are available as soon as reasonably practicable after such \nmaterial is electronically filed with or furnished to the Securities and Exchange Commission, which is within 24 hours. \n\nThe Company has adopted a Code of Ethical Business Conduct that covers its officers and directors, which is available on the Company's website, free \nof charge, under the caption \"Corporate.\" The Company also adopted Corporate Governance Guidelines, which are available on the Company's website, \nfree of charge, under the caption \"Investor.\" \n\n**(a)*General Development of Business***\n\nHormel Foods Corporation, a Delaware corporation, was founded by George A. Hormel in 1891 in Austin, Minnesota, as George A. Hormel & Company. \nThe Company started as a processor of meat and food products and continues in this line of business. The Company name was changed to Hormel \nFoods Corporation on January 31, 1995. The Company is primarily engaged in the production of a variety of meat and food products and the marketing of \nthose products throughout the United States. Although pork and turkey remain the major raw materials for Hormel products, the Company has \nemphasized for several years the manufacture and distribution of branded, consumer packaged items rather than the commodity fresh meat business. ", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_HRL_2004.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "The Company's branding strategy led to the development of a joint venture between Hormel Foods Corporation and Excel Corporation, a wholly owned \nsubsidiary of Cargill Incorporated. This joint venture began marketing and selling nationally branded fresh case ready beef and pork under the existing \nHORMEL ALWAYS TENDER brand name in fiscal year 2003. This 50 percent owned joint venture, named Precept Foods LLC, is based in Austin, Minn. \n\nIn fiscal 2001, the Jennie-O Turkey Store (JOTS) business was formed as a result of merging the Company's existing Jennie-O Foods, Inc. business with \nthe operations of The Turkey Store Company, which was acquired in the second quarter of fiscal 2001. The Turkey Store Company was a turkey \nprocessing business headquartered in Barron, Wisconsin. The merged JOTS operation is currently the largest turkey processor in the world. JOTS ", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_HRL_2004.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**HORMEL FOODS CORPORATION**\n\n| 2.1 | (1) | Agreement and Plan of Merger and Plan of Reorganization dated January 22, 2001, by and among Hormel, Badger Acquisition\nCorporation, Jerome Foods, Inc. and Jerome K. Jerome. (Incorporated by reference to Hormel's Current Report on Form 8-K\ndated March 9, 2001, File No. 001-02402.) |\n|---|---|---|\n| 2.1 | (1) | Agreement and Plan of Merger and Plan of Reorganization dated January 22, 2001, by and among Hormel, Badger Acquisition Corporation, Jerome Foods, Inc. and Jerome K. Jerome. (Incorporated by reference to Hormel's Current Report on Form 8-K dated March 9, 2001, File No. 001-02402.) |\n| 3.1 | (1) | Certificate of Incorporation as amended to date. (Incorporated by reference to Exhibit 3A-1 to Hormel's Annual Report on Form 10- K/A for the fiscal year ended October 28, 2000, File No. 001-02402.) |\n", - "page_start": 12, - "page_end": 12, - "source_file": "NYSE_HRL_2004.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**Customers and Backlog Orders**\n\nDuring fiscal year 2003, no customer accounted for more than 10 percent of total Company sales. The five largest customers in each segment make up \napproximately the following percentage of segment sales: 39 percent of Grocery Products, 39 percent of Refrigerated Foods, 35 percent of JOTS, \n51 percent of Specialty Foods, and 27 percent of All Other. The loss of one or more of the top customers in any of these segments could have a material \nadverse effect on the results of such segment. Backlog orders are not significant due to the perishable nature of a large portion of the products. Orders \nare accepted and shipped on a current basis. \n\n**Competition**\n\nThe production and sale of meat and food products in the United States and internationally are highly competitive. The Company competes with \nmanufacturers of pork and turkey products, as well as national and regional producers of other meat and protein sources, such as beef, chicken and fish. \nThe Company believes that its largest domestic competitors for its Refrigerated Foods segment in 2003 were Tyson Foods, Smithfield Foods and \nConAgra Foods; for its Grocery Products segment, ConAgra Foods, Dial Corp. and Campbell Soup Co.; and for JOTS, ConAgra Foods and Cargill, Inc. ", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_HRL_2004.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "markets its turkey products through its own sales force and independent brokers. \n\nThe acquisitions of Diamond Crystal Brands Nutritional Products in fiscal 2001 and the Century Foods International business in July of fiscal 2003 \nstrengthened the Company's presence in the nutritional food products and supplements market. The Company currently operates as one of the largest \ncompanies providing nutritional products to the U.S. healthcare industry. \n\nThe Company acquired the Diamond Crystal Brands business from Imperial Sugar Co. in December of fiscal 2003. Diamond Crystal Brands packages \nand sells various sugar, sugar substitute, salt and pepper products, savory products, drink mixes and dessert mixes to retail and foodservice customers. \n\nInternationally, the Company markets its products through Hormel Foods International Corporation (HFIC), a wholly owned subsidiary. HFIC has a \npresence in the international marketplace through joint ventures and placement of personnel in strategic foreign locations such as China, Spain, and the \nPhilippines. HFIC also has a global presence with minority positions in food companies in Spain (Campofrio Alimentacion S.A., 15% holding) and the \nPhilippines (Purefoods-Hormel, 40% holding). ", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_HRL_2004.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Logistics, Inc., based in St. Charles, Illinois, operates distribution centers for the Company in Dayton, Ohio, and Osceola, Iowa. \n\nThe Company's turkey slaughter and processing operations are located in Barron, Wisconsin; Faribault, Minnesota; Melrose, Minnesota; Montevideo, \nMinnesota; Pelican Rapids, Minnesota; and Willmar, Minnesota. \n\n**Patents and Trademarks**\n\nThere are numerous patents and trademarks that are important to the Company's business. The Company holds seven foreign and 47 U.S. issued \npatents. Some of the trademarks are registered and some are not. In recognition of the importance of these assets, the Company created a subsidiary, \nHormel Foods, LLC, in 1998 to create, own, maintain and protect most of the Company's trademarks and patents. Some of the more significant owned or \nlicensed trademarks used in the Company's segments are: \n\nHORMEL, ALWAYS TENDER, AMERICAN CLASSICS, AUSTIN BLUES, BLACK LABEL, CARAPELLI, CHI-CHI'S, CURE 81, CUREMASTER, DAN'S \nPRIZE, DIAMOND CRYSTAL, DI LUSSO, DINTY MOORE, DUBUQUE, EL TORITO, FAST 'N EASY, HERB-OX, HERDEZ, HOMELAND, HOUSE OF \nTSANG, JENNIE-O TURKEY STORE, KID'S KITCHEN, LAYOUT, LITTLE SIZZLERS, MARRAKESH EXPRESS, MARY KITCHEN, OLD \nSMOKEHOUSE, PATAK'S, PELOPONNESE, PILLOW PACK, QUICK MEAL, RANGE BRAND, ROSA GRANDE, SANDWICH MAKER, SPAM, STAGG, \nSWEET THING, THICK & EASY and WRANGLERS. ", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_HRL_2004.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Reporting of revenues from external customers is based on similarity of products, as the same or similar products are sold across multiple distribution \nchannels such as retail, foodservice or international. Revenues reported are based on financial information used to produce the Company's general- \npurpose financial statements. \n\nPerishable meat includes fresh meats, sausages, hams, wieners and bacon (excluding JOTS products.) Nonperishable meat includes canned luncheon \nmeats, shelf stable microwaveable entrees, stews, chilies, hash, meat spreads and other items that do not require refrigeration as well as frozen \nprocessed products. The Poultry category is composed primarily of JOTS products. The Other category primarily consists of nutritional food products and \nsupplements, sugar and sugar substitutes, salt and pepper products, dessert mixes, food packaging (casings for dry sausage), and industrial gelatin \nproducts. The Other category has increased over the past two years primarily due to the following acquisitions: Century Foods International (July 2003), \nDiamond Crystal Brands (December 2002), and Diamond Crystal Brands Nutritional Products (April 2001). \n\nNo new product in fiscal 2003 required a material investment of Company assets. \n\nDomestically, the Company sells its products in all 50 states. Hormel products are sold through Company sales personnel, operating in assigned \nterritories coordinated from district sales offices located in most of the larger U.S. cities, as well as independent brokers and distributors. As of \nOctober 25, 2003, the Company had approximately 600 sales personnel engaged in selling its products. Distribution of products to customers is by \ncommon carrier. ", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_HRL_2004.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" } ] }, @@ -17409,64 +17409,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 95, + "page_end": 95, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 103, + "page_end": 103, + "source_file": "00-80T-80.pdf" }, { - "text": "**PART I**\n\n**Item 1.*BUSINESS***\n\n**Available Information**\n\nThe Company makes available, free of charge on its website at*www.hormel.com*, its annual report on Form 10-K, quarterly reports on Form 10-Q, \ncurrent reports on Form 8-K, and amendments to those reports filed or furnished pursuant to Section 13(a) or 15(d) of the Securities Exchange Act of \n1934. These reports are accessible under the \"Investor\" caption of the Company's website and are available as soon as reasonably practicable after such \nmaterial is electronically filed with or furnished to the Securities and Exchange Commission, which is within 24 hours. \n\nThe Company has adopted a Code of Ethical Business Conduct that covers its officers and directors, which is available on the Company's website, free \nof charge, under the caption \"Corporate.\" The Company also adopted Corporate Governance Guidelines, which are available on the Company's website, \nfree of charge, under the caption \"Investor.\" \n\n**(a)*General Development of Business***\n\nHormel Foods Corporation, a Delaware corporation, was founded by George A. Hormel in 1891 in Austin, Minnesota, as George A. Hormel & Company. \nThe Company started as a processor of meat and food products and continues in this line of business. The Company name was changed to Hormel \nFoods Corporation on January 31, 1995. The Company is primarily engaged in the production of a variety of meat and food products and the marketing of \nthose products throughout the United States. Although pork and turkey remain the major raw materials for Hormel products, the Company has \nemphasized for several years the manufacture and distribution of branded, consumer packaged items rather than the commodity fresh meat business. ", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_HRL_2004.pdf" + "text": "", + "page_start": 103, + "page_end": 103, + "source_file": "00-80T-80.pdf" }, { - "text": "Use these links to rapidly review the document \nHORMEL FOODS CORPORATION TABLE OF CONTENTS \n\n**ANNUAL REPORT ON FORM 10-K**\n\n**HORMEL FOODS CORPORATION**\n\n**OCTOBER 25, 2003**", - "page_start": 2, - "page_end": 2, - "source_file": "NYSE_HRL_2004.pdf" + "text": "", + "page_start": 16, + "page_end": 16, + "source_file": "ASX_STO_2004.pdf" }, { - "text": "The Company's branding strategy led to the development of a joint venture between Hormel Foods Corporation and Excel Corporation, a wholly owned \nsubsidiary of Cargill Incorporated. This joint venture began marketing and selling nationally branded fresh case ready beef and pork under the existing \nHORMEL ALWAYS TENDER brand name in fiscal year 2003. This 50 percent owned joint venture, named Precept Foods LLC, is based in Austin, Minn. \n\nIn fiscal 2001, the Jennie-O Turkey Store (JOTS) business was formed as a result of merging the Company's existing Jennie-O Foods, Inc. business with \nthe operations of The Turkey Store Company, which was acquired in the second quarter of fiscal 2001. The Turkey Store Company was a turkey \nprocessing business headquartered in Barron, Wisconsin. The merged JOTS operation is currently the largest turkey processor in the world. JOTS ", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_HRL_2004.pdf" + "text": "", + "page_start": 14, + "page_end": 14, + "source_file": "ASX_STO_2004.pdf" }, { - "text": "markets its turkey products through its own sales force and independent brokers. \n\nThe acquisitions of Diamond Crystal Brands Nutritional Products in fiscal 2001 and the Century Foods International business in July of fiscal 2003 \nstrengthened the Company's presence in the nutritional food products and supplements market. The Company currently operates as one of the largest \ncompanies providing nutritional products to the U.S. healthcare industry. \n\nThe Company acquired the Diamond Crystal Brands business from Imperial Sugar Co. in December of fiscal 2003. Diamond Crystal Brands packages \nand sells various sugar, sugar substitute, salt and pepper products, savory products, drink mixes and dessert mixes to retail and foodservice customers. \n\nInternationally, the Company markets its products through Hormel Foods International Corporation (HFIC), a wholly owned subsidiary. HFIC has a \npresence in the international marketplace through joint ventures and placement of personnel in strategic foreign locations such as China, Spain, and the \nPhilippines. HFIC also has a global presence with minority positions in food companies in Spain (Campofrio Alimentacion S.A., 15% holding) and the \nPhilippines (Purefoods-Hormel, 40% holding). ", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_HRL_2004.pdf" + "text": "", + "page_start": 14, + "page_end": 14, + "source_file": "ASX_STO_2004.pdf" }, { - "text": "Reporting of revenues from external customers is based on similarity of products, as the same or similar products are sold across multiple distribution \nchannels such as retail, foodservice or international. Revenues reported are based on financial information used to produce the Company's general- \npurpose financial statements. \n\nPerishable meat includes fresh meats, sausages, hams, wieners and bacon (excluding JOTS products.) Nonperishable meat includes canned luncheon \nmeats, shelf stable microwaveable entrees, stews, chilies, hash, meat spreads and other items that do not require refrigeration as well as frozen \nprocessed products. The Poultry category is composed primarily of JOTS products. The Other category primarily consists of nutritional food products and \nsupplements, sugar and sugar substitutes, salt and pepper products, dessert mixes, food packaging (casings for dry sausage), and industrial gelatin \nproducts. The Other category has increased over the past two years primarily due to the following acquisitions: Century Foods International (July 2003), \nDiamond Crystal Brands (December 2002), and Diamond Crystal Brands Nutritional Products (April 2001). \n\nNo new product in fiscal 2003 required a material investment of Company assets. \n\nDomestically, the Company sells its products in all 50 states. Hormel products are sold through Company sales personnel, operating in assigned \nterritories coordinated from district sales offices located in most of the larger U.S. cities, as well as independent brokers and distributors. As of \nOctober 25, 2003, the Company had approximately 600 sales personnel engaged in selling its products. Distribution of products to customers is by \ncommon carrier. ", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_HRL_2004.pdf" + "text": "", + "page_start": 103, + "page_end": 103, + "source_file": "00-80T-80.pdf" }, { - "text": "**HORMEL FOODS CORPORATION**\n\n| 2.1 | (1) | Agreement and Plan of Merger and Plan of Reorganization dated January 22, 2001, by and among Hormel, Badger Acquisition\nCorporation, Jerome Foods, Inc. and Jerome K. Jerome. (Incorporated by reference to Hormel's Current Report on Form 8-K\ndated March 9, 2001, File No. 001-02402.) |\n|---|---|---|\n| 2.1 | (1) | Agreement and Plan of Merger and Plan of Reorganization dated January 22, 2001, by and among Hormel, Badger Acquisition Corporation, Jerome Foods, Inc. and Jerome K. Jerome. (Incorporated by reference to Hormel's Current Report on Form 8-K dated March 9, 2001, File No. 001-02402.) |\n| 3.1 | (1) | Certificate of Incorporation as amended to date. (Incorporated by reference to Exhibit 3A-1 to Hormel's Annual Report on Form 10- K/A for the fiscal year ended October 28, 2000, File No. 001-02402.) |\n", - "page_start": 12, - "page_end": 12, - "source_file": "NYSE_HRL_2004.pdf" + "text": "", + "page_start": 103, + "page_end": 103, + "source_file": "00-80T-80.pdf" }, { - "text": "Through HFIC, the Company markets its products in various locations throughout the world. Some of the larger markets include Australia, Canada, \nChina, England, Japan, Mexico and Micronesia. The distribution of export sales to customers is by common carrier, while the China operations own and \noperate their own delivery system. The Company, through HFIC, has licensed companies to manufacture various Hormel products internationally on a \nroyalty basis, with the primary licensees being Tulip International of Denmark and CJ Corp. of South Korea. \n\n**Raw Materials**\n\nThe Company has, for the past several years, been concentrating on processed branded products for consumers with year-round demand to minimize \nthe seasonal variation experienced with commodity type products. Pork continues to be the primary raw material for Company products. Although hog \nproducers are moving toward larger, more efficient year-round confinement operations and supply contracts are becoming increasingly prevalent in the \nindustry, there is still a seasonal variation in the supply of fresh pork materials. The Company's expanding line of processed items has reduced but not \neliminated the sensitivity of Company results to raw material supply and price fluctuations. ", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_HRL_2004.pdf" + "text": "", + "page_start": 162, + "page_end": 162, + "source_file": "00-80T-80.pdf" }, { - "text": "Logistics, Inc., based in St. Charles, Illinois, operates distribution centers for the Company in Dayton, Ohio, and Osceola, Iowa. \n\nThe Company's turkey slaughter and processing operations are located in Barron, Wisconsin; Faribault, Minnesota; Melrose, Minnesota; Montevideo, \nMinnesota; Pelican Rapids, Minnesota; and Willmar, Minnesota. \n\n**Patents and Trademarks**\n\nThere are numerous patents and trademarks that are important to the Company's business. The Company holds seven foreign and 47 U.S. issued \npatents. Some of the trademarks are registered and some are not. In recognition of the importance of these assets, the Company created a subsidiary, \nHormel Foods, LLC, in 1998 to create, own, maintain and protect most of the Company's trademarks and patents. Some of the more significant owned or \nlicensed trademarks used in the Company's segments are: \n\nHORMEL, ALWAYS TENDER, AMERICAN CLASSICS, AUSTIN BLUES, BLACK LABEL, CARAPELLI, CHI-CHI'S, CURE 81, CUREMASTER, DAN'S \nPRIZE, DIAMOND CRYSTAL, DI LUSSO, DINTY MOORE, DUBUQUE, EL TORITO, FAST 'N EASY, HERB-OX, HERDEZ, HOMELAND, HOUSE OF \nTSANG, JENNIE-O TURKEY STORE, KID'S KITCHEN, LAYOUT, LITTLE SIZZLERS, MARRAKESH EXPRESS, MARY KITCHEN, OLD \nSMOKEHOUSE, PATAK'S, PELOPONNESE, PILLOW PACK, QUICK MEAL, RANGE BRAND, ROSA GRANDE, SANDWICH MAKER, SPAM, STAGG, \nSWEET THING, THICK & EASY and WRANGLERS. ", - "page_start": 5, - "page_end": 5, - "source_file": "NYSE_HRL_2004.pdf" + "text": "", + "page_start": 102, + "page_end": 102, + "source_file": "00-80T-80.pdf" } ] }, @@ -17477,70 +17477,70 @@ "target_page": 9, "target_passage": "an online tool to analyze how the federal government allocates those subsidies", "chunk_present": { - "presence": true, - "index": 5 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 336, + "page_end": 336, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 0, + "page_end": 0, + "source_file": "Microscope Manual.pdf" }, { - "text": "To support the long-term sustainability of both nature and farming, this strategy will \nwork in tandem with the new**Farm to Fork Strategy**and the**new Common**\n**Agricultural Policy (CAP)**, including by promoting eco-schemes and result-based \npayment schemes. In implementing the Biodiversity and the Farm to Fork Strategies, the \nCommission will closely monitor progress and improvements in terms of food security \nand farmers income. The Commission will ensure that the CAP Strategic plans are \nassessed against robust climate and environmental criteria, and that Member States set \nexplicit national values for the relevant targets set in this strategy, as well as in the Farm \nto Fork Strategy. These plans should lead to sustainable practices such as precision \nagriculture, organic farming, agro-ecology, agro-forestry, low-intensive permanent \ngrassland, and stricter animal welfare standards. ", - "page_start": 8, - "page_end": 8, - "source_file": "legal5_eubiodiversity_cc4.pdf" + "text": "", + "page_start": 312, + "page_end": 312, + "source_file": "00-80T-80.pdf" }, { - "text": "progress towards the target will be under constant review, and adjustment if needed, to \nfarmers’ \nmitigate against undue \ncompetitiveness. \n\nimpact on biodiversity, food security and \n\nAgroecology can provide healthy food while maintaining productivity, increase soil \nfertility and biodiversity, and reduce the footprint of food production. Organic farming in \nparticular holds great potential for farmers and consumers alike. The sector creates jobs \nand attracts young farmers. Organic farming also provides 10-20 % more jobs per hectare \nthan conventional farms, and creates added value for agricultural products32. To make the \nmost of this potential, at least**25% of the EU’s agricultural land must be organically**\n**farmed by 2030**. In addition to CAP measures, the Commission will put forward an \nAction Plan on organic farming, helping Member States stimulate both supply and \ndemand of organic products. It will also ensure consumer’s trust through promotion \ncampaigns and green public procurement. In the implementation of the EU-wide agro- \necological targets set out in this strategy and in the Farm to Fork Strategy, the different \nstarting points and differences in progress already made in Member States will be taken \ninto account. \n\nThe uptake of agroforestry support measures under rural development should be \nincreased as it has great potential to provide multiple benefits for biodiversity, people and \nclimate. ", - "page_start": 9, - "page_end": 9, - "source_file": "legal5_eubiodiversity_cc4.pdf" + "text": "", + "page_start": 1, + "page_end": 1, + "source_file": "Microscope Manual.pdf" }, { - "text": "**43.**—(1) A person who has an offer of employment for seasonal work to carry out specified \n\nactivities in edible horticulture on a specified farm. \n\n(2) For the purposes of sub-paragraph (1)— \n\n(a) “seasonal work” is employment which fluctuates or is restricted due to the season or time \n\nof the year; \n\n(b) “edible horticulture” means growing— \n\n(i) protected vegetables grown in glasshouse systems, \n(ii) field vegetables grown outdoors, including vegetables, herbs, leafy salads and \npotatoes, \n\n(iii) soft fruit grown outdoors or under cover, \n(iv) trees that bear fruit, \n(v) vines and bines, \n(vi) mushrooms; \n\n(c) “specified farm” means the farm named in that person’s passenger information; \n\n(d) “specified activities” means— \n(i) crop maintenance, \n(ii) crop harvesting, \n(iii) tunnel construction and dismantling, \n(iv) irrigation installation and maintaining, \n(v) crop husbandry, \n(vi) packing and processing of crops on employer’s premises, \n(vii) preparing and dismantling growing areas and media, \n(viii) general primary production work in edible horticulture, \n(ix) activities relating to supervising teams of horticulture workers. ", - "page_start": 46, - "page_end": 46, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 312, + "page_end": 312, + "source_file": "00-80T-80.pdf" }, { - "text": "information has not been updated in years, or omits key data like (in the case of budget reports) \n\n*\"descriptions of how the money was spent\"*. \n\nEven with these difficulties, the Latin America Open Data/Civic Information landscape is active \n\nand definitely worthwhile following. The list of interesting Civic Information projects in Latin \n\nAmerica include (from Sasaki's Access to Information: Is Mexico a Model for the Rest of the \n\nWorld?: \n\n• Mexico \n\n• Mexican Farm Subsidies - an online tool to analyze how the federal government \n\nallocates those subsidies \n\n• Compare Your School : compares aggregate test results from any school with the \n\nmunicipal, regional, and national averages \n\n• Rebellion of the Sick built for patients with chronic diseases whose expenses are not \n\ncovered by the government subsidized health coverage. \n\n• Argentina: Public Spending in Bahía analyzes how public funds are used. \n\n• Colombia: Visible Congress monitors the actions of the Colombian congress \n\n• Brazil \n\n• Eleitor 2010 : a website to submit reports of electoral fraud during the Brazil 2010 \n\n*9/34*\n\n*Copyright 2011 LEM, Scuola Superiore Sant'Anna. This work is released under a Creative Commons attribution license (http://creativecommons.org/licenses/by/3.0/)*", - "page_start": 9, - "page_end": 9, - "source_file": "Open_Data_Report.pdf" + "text": "", + "page_start": 1, + "page_end": 1, + "source_file": "Microscope Manual.pdf" }, { - "text": "Farmland birds and insects, particularly pollinators, are key indicators of the health of \nagroecosystems and are vital for agricultural production and food security. Their \nalarming decline must be reversed. As set out in the Farm to Fork Strategy, the \nCommission will take action to reduce by**50% the overall use of – and risk from –**\n**chemical pesticides by 2030**and reduce by 50% the use of more hazardous pesticides \nby 2030. This must be supported by the full implementation of the EU Pollinators \ninitiative31. By the end of 2020, the Commission will review the initiative and propose \nadditional measures if necessary. To provide space for wild animals, plants, pollinators \nand natural pest regulators, there is an urgent need to bring back**at least 10% of**\n**agricultural area under high-diversity landscape features**. These include,*inter alia*, \nbuffer strips, rotational or non-rotational fallow land, hedges, non-productive trees, \nterrace walls, and ponds. These help enhance carbon sequestration, prevent soil erosion \nand depletion, filter air and water, and support climate adaptation. In addition, more \nbiodiversity often helps lead to more agricultural production. Member States will need to \ntranslate the 10% EU target to a lower geographical scale to ensure connectivity among \nhabitats, especially through the CAP instruments and CAP Strategic Plans, in line with \nthe Farm to Fork Strategy, and through the implementation of the Habitats Directive. The ", - "page_start": 8, - "page_end": 8, - "source_file": "legal5_eubiodiversity_cc4.pdf" + "text": "", + "page_start": 312, + "page_end": 312, + "source_file": "00-80T-80.pdf" }, { - "text": "currently in favourable status are in that category or show a strong positive trend. \nThe Commission and the European Environmental Agency will provide guidance \nto Member States in 2020 on how to select and prioritise species and habitats. \n\n*2.2.2. Bringing nature back to agricultural land*\n\nAs guardians of our land, farmers play a vital role in preserving biodiversity. They are \namong the first to feel the consequences when biodiversity is lost but also among the first \nto reap the benefits when it is restored. Biodiversity enables them to provide us with**safe,**\n**sustainable, nutritious and affordable food**and provides them with the income they \nneed to thrive and develop. European farmers are an essential part of the EU’s future and \nmust continue to be the social and economic hub of many communities across our Union. \n\nAt the same time, certain agricultural practices are a key driver of biodiversity decline. \nThis is why it is important to work with farmers to**support and incentivise the**\n**transition to fully sustainable practices**. Improving the condition and diversity of \nagroecosystems will increase the sector’s resilience to climate change, environmental \nrisks and socioeconomic shocks, while creating new jobs, for example in organic \nfarming, rural tourism or recreation. ", - "page_start": 8, - "page_end": 8, - "source_file": "legal5_eubiodiversity_cc4.pdf" + "text": "", + "page_start": 312, + "page_end": 312, + "source_file": "00-80T-80.pdf" }, { - "text": "Second, our sectoral aggregation scheme for GTAP ensures that all the competing and complimenting sectors \nfor maize are present in the most disaggregated form. For example, for maize, other crops compete for inputs of \nproduction and both livestock and households are major users of maize. For regional aggregation, we kept the \ndetails for all the main producing, consuming, and trading regions, for maize. ", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed9.pdf" + "text": "", + "page_start": 41, + "page_end": 41, + "source_file": "ASX_MRM_2000.pdf" }, { - "text": "According to statistics in 2018, the gross maize yield in the top 5 countries is almost 80% of the total maize \nyield of the whole world. The United States accounts for more than 32%; China accounts for about 24%; Brazil, \nArgentina and Mexico account for about 23%. The fluctuation of maize production in these five top countries will \nhave a significant impact on the global maize trade. Based on the simulation results, comparing to 1986–2005, \nthe maize yield in China, Brazil and Argentina would decrease under global warming by 1.5 °C; the yield loss \nrate would reach more than 20% in Brazil; Argentina would decrease by 14.7%; China would decrease by 3.7%. \nHowever, there would be increasing trends in the United States and Mexico; the change in the United States \nwould not be significant and the maize yield would increase by 0.5%; the yield increasing rate would exceed 50% \nin Mexico. Overall, the gross maize yield in the top 5 countries would decrease by 2% under global warming \n\nhttps://doi.org/10.1038/s41598-022-22228-7 8 ", - "page_start": 8, - "page_end": 8, - "source_file": "pubmed9.pdf" + "text": "", + "page_start": 312, + "page_end": 312, + "source_file": "00-80T-80.pdf" } ] }, @@ -17557,64 +17557,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, + "text": "", + "page_start": 52, + "page_end": 52, "source_file": "Excel Training Manual 1.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 352, + "page_end": 352, + "source_file": "00-80T-80.pdf" }, { - "text": "13.Linee guida UK sull'opendata \n\n14.MSc dissertation on Open Government Data in the UK \n\n15.Open Data (2): Effective Data Use . \n\n16.Open Data: quali prospettive per la pianificazione? \n\n17.Open Knowledge Foundation Blog \" Blog Archive \" Keeping Open Government Data \n\nOpen? \n\n18.Open data, democracy and public sector reform \n\n19.Pubblicato Camere Aperte 2011 - blog - OpenParlamento \n\n20.Reasons for not releasing data in government \n\n21.The impact of open data: first evidence ", - "page_start": 33, - "page_end": 33, - "source_file": "Open_Data_Report.pdf" + "text": "", + "page_start": 9, + "page_end": 9, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "**3. Emerging trends and issues related to Open**\n**Data**\nOne of the most common activities for Open Data activists in this moment is the creation of \n\ncountry-wide catalogs of all data sources, to facilitate individuation and correlation of independent \n\ndata sets. Normally, all initiatives of this type are announced on the Open Knowledge Foundation \n\nblog and/or its data hub CKAN. Another relevant development is the publication of an Open Data \n\nManual that*\"can be used by anyone but is especially designed for those seeking to open up data,*\n\n*since it discusses why to go open, what open is, and the how to 'Open' Data.\"*Activists in several \n\nEuropean countries have already published local versions of the manual, or equivalent documents. \n\nOn this background, several interesting issues, some of which were anticipated in the Open Data, \n\nOpen Society report, are coming in full light. They are presented, one at a time, in the following \n\nsections of this chapter. ", - "page_start": 11, - "page_end": 11, - "source_file": "Open_Data_Report.pdf" + "text": "", + "page_start": 352, + "page_end": 352, + "source_file": "00-80T-80.pdf" }, { - "text": "**1. Introduction**\nThis report is the final deliverable of the Open Data, Open Society research project. It follows the \n\npublication of the Open Data, Open Society report, finished in late October 2010 and published in \n\nearly January 2011. That first report focused on explaining the critical importance of digital data in \n\ncontemporary society and business activities; defining Open Data; giving examples on their \n\npotential, especially at the local level, on transparency and economics activities; finally, defining \n\nsummarizing some general best practices. \n\nThis second report looks at what happened in the Open Data arena after October 2010. After some \n\nconsiderations on the general social and political background in late 2010/early 2011, it is divided \n\nin two main parts. The first describes some emerging trends and issues related to Open Data, that \n\ngot minor or no coverage in the first report. The second part discusses some practices and actions to \n\nfollow to deal with those trends and issues. ", - "page_start": 3, - "page_end": 3, - "source_file": "Open_Data_Report.pdf" + "text": "", + "page_start": 352, + "page_end": 352, + "source_file": "00-80T-80.pdf" }, { - "text": "**3.6.1. Data alterations and financial sustainability**\n\nSome concerns about the limits of Open Data are about what may happen, or stop to happen,*before*\n\nthey are published online. The most common concerns of this type are (from Open Public Data: \n\nThen What? - Part 1): \n\n1. Opening up PSI causes those data to not be produced anymore, or to be only produced as \n\nprivate property by private corporations, because the public agencies whose job was to \n\nproduce those data, can't sell them anymore. \n\n2. total accessibility of data provides more incentives to tinker with them, at the risk of \n\nreducing trust in institutions and inhibiting decision-making even more than today. \n\nData manipulation is the topic of the next paragraph. Speaking of costs, a point to take into account \n\nis that, once data are open, routinely used and monitored by as many independent users as possible, \n\neven the cost of keeping them up to date may be sensibly reduced: in other words, in the \n\nmedium/long term Open Data may reduce the need to periodically perform complete, that is very \n\nexpensive, studies and surveys to update a whole corpus of data in one run. \n\nBesides, and above all, even if opening data always destroyed any source of income for the public ", - "page_start": 17, - "page_end": 17, - "source_file": "Open_Data_Report.pdf" + "text": "", + "page_start": 352, + "page_end": 352, + "source_file": "00-80T-80.pdf" }, { - "text": "22.Thinking About Africa's Open Data \n\n23.Towards EU Benchmarking 2.0 - Transparency and Open Data on Structural Funds in \n\nEurope \n\n24.UK Open Government Licence removes barriers to re-use of public sector information \n\n25.Western Europe: A journey through tech for transparency projects \n\n26.What open data means to marginalized communities \n\n27.What's in a Name? Open Gov and Good Gov \n\n28.WikiLeaks Relationship With the Media \n\n29.WikiLeaks, Open Information and Effective Use: Exploring the Limits of Open Government ", - "page_start": 34, - "page_end": 34, - "source_file": "Open_Data_Report.pdf" + "text": "", + "page_start": 352, + "page_end": 352, + "source_file": "00-80T-80.pdf" }, { - "text": "**3.6.2. Real impact of data manipulation or misunderstanding**\n\nThe fix for the risk that data is manipulated is to not only open government data and procedures, but \n\nto simplify the latter (which eventually also greatly reduces cost) as much as possible. Abundance \n\nof occasions to secretly play with data and how they are managed is a symptom of excessive, or \n\npeak complexity: again, problems and risks with Open Data are a symptom of a [pre- ", - "page_start": 17, - "page_end": 17, - "source_file": "Open_Data_Report.pdf" + "text": "", + "page_start": 352, + "page_end": 352, + "source_file": "00-80T-80.pdf" }, { - "text": "by David Osimo in EU eGov action plan published: the good, the bad and the unknown, are the \n\nactions on Open Data (a EU portal and a revision of the EU PSI directive), and on citizens control \n\nover their data. However the Action Plan contains no reference to the need for a more open and \n\ncollaborative governance. \n\nIn the case of European Structural Funds, as Luigi Reggi reported in March 2011: \n\nthere is no single point of access to the data. Hundreds of Managing Authorities are \nfollowing different paths and implementing different information strategies when \nopening up their data. \n\nMany databases (often simple PDF lists) [...show...] huge variation not only in \nthe way they can be accessed but also in content and quality of data provided. \n\n... [...The results of...] an independent web-based survey on the overall \nquality of data published by each Managing Authority responsible for the 434 \nOperational Programmes approved in July 2009... can be summarized as follows: \n\nThe use of open, machine-processable and linked-data formats have unexpected \nadvantages in terms of transparency and re-use of the data by the public and private \nsector. The application of these technical principles does not need extra budget or major \nchanges in government organization and information management; nor does it require \nthe update of existing software and infrastructures. What is needed today is the \npromotion among national and local authorities of the culture of transparency and the \nraising of awareness of the benefits that could derive from opening up existing data and \ninformation in a re-usable way. ", - "page_start": 7, - "page_end": 7, - "source_file": "Open_Data_Report.pdf" + "text": "", + "page_start": 352, + "page_end": 352, + "source_file": "00-80T-80.pdf" }, { - "text": "thing to do is to*create*data, normally through outsourcing and crowd sourcing. \n\nOther issues, that will be discussed in detail in other sections of the report because they are also \n\npresent in Europe in different forms, are related to lack of equal opportunities for access to data and \n\nserious fears (sometimes, concrete, sometimes caused by confusion about what should be open and \n\nhow) that data will be used*against*citizens. A commenter to Gurstein's Open Data: Empowering \n\nthe Empowered or Effective Data Use for Everyone? said: \n\n*in Delhi and Mumbai, mobs and rioters managed to get information about particular*\n*identity groups through voter rolls: openness is, in certain situations, a precarious*\n*virtue. It is almost certain that Open Data would be used to rig election but here again*\n*openness is not the issue, they would find it anyway...*\n\nSo far, the main interest about Open Data in Asian countries seems limited, so to speak, to its \n\neffects on transparency in politics. At a two-weeks programming contest held at the end of 2010 in \n\nThailand, for example, one of the most appreciated entries was a software scraper of the Thailand's \n\nMember of House of Representative Website, that made it possible for everybody to create ", - "page_start": 8, - "page_end": 8, - "source_file": "Open_Data_Report.pdf" + "text": "", + "page_start": 347, + "page_end": 347, + "source_file": "00-80T-80.pdf" } ] }, @@ -17625,70 +17625,70 @@ "target_page": 28, "target_passage": "The first reasons for Steinberg's concern is that asking for everything as soon as possible would \"stress the system too much, by spreading thin the finite amount of good will, money and political capital\". The second is that many existing old data and data archival systems are, in practice, so uninteresting that it wouldn't make sense to spend resources in opening them", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 16, + "page_end": 16, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**4.3. Keep past and future separate**\nFor the same reason why it is important to always distinguishes between political and economical \n\nadvantages (or disadvantages) of Open Data, it is necessary to keep decisions about*future*data \n\n(those that will arrive in the future, due to new contracts, public services and so on) separate from \n\nthose about data that already exist. At the end of 2010, T. Steinberg wrote that the idea that \n\nGovernment should publish everything non-private it can**now**is \"rather dangerous\", and that it \n\nwould be much better to release nothing until someone actually asked for it, and at that point doing \n\nit right, that is with an open license and so on. The first reasons for Steinberg's concern is that \n\nasking for everything as soon as possible would*\"stress the system too much, by spreading thin the*\n\n*finite amount of good will, money and political capital\"*. The second is that many existing old data \n\nand data archival systems are, in practice, so uninteresting that it wouldn't make sense to spend \n\nresources in opening them. \n\nEven if these concerns were always true, it is important to realize that they apply (especially the \n\nsecond) to already existing data, not to future ones. The two classes of data have, or can have, very ", - "page_start": 28, - "page_end": 28, - "source_file": "Open_Data_Report.pdf" + "text": "", + "page_start": 16, + "page_end": 16, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**4.1. Properly define and explain both Open Data and Public**\n**Data**\nJust because Open Data is becoming more popular (and, we may say, more and more necessary \n\nevery year), it is essential to intensify efforts to explain, both to the general public and to public \n\nadministrators, that \n\n1.**Privacy issues are almost always a non-issue.**Quoting from What \"open data\" means - \n\nand what it doesn't):*Privacy and/or security concerns with putting all the government's data*\n\n*out there are a separate issue that shouldn't be confused with Open Data. Whether data*\n\n*should be made publicly available is where privacy concerns come into play. Once it has*\n\n*been determined that government data should be made public, then it should be done*\n\n*openly.*\n\n2. Defining as Public and consequently opening them in the right way,*much more data*than \n\nthose born and stored*inside*Public Administration is an urgent task that is in the best \n\ninterest of all citizens and businesses ", - "page_start": 27, - "page_end": 27, - "source_file": "Open_Data_Report.pdf" + "text": "", + "page_start": 16, + "page_end": 16, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**3.6.1. Data alterations and financial sustainability**\n\nSome concerns about the limits of Open Data are about what may happen, or stop to happen,*before*\n\nthey are published online. The most common concerns of this type are (from Open Public Data: \n\nThen What? - Part 1): \n\n1. Opening up PSI causes those data to not be produced anymore, or to be only produced as \n\nprivate property by private corporations, because the public agencies whose job was to \n\nproduce those data, can't sell them anymore. \n\n2. total accessibility of data provides more incentives to tinker with them, at the risk of \n\nreducing trust in institutions and inhibiting decision-making even more than today. \n\nData manipulation is the topic of the next paragraph. Speaking of costs, a point to take into account \n\nis that, once data are open, routinely used and monitored by as many independent users as possible, \n\neven the cost of keeping them up to date may be sensibly reduced: in other words, in the \n\nmedium/long term Open Data may reduce the need to periodically perform complete, that is very \n\nexpensive, studies and surveys to update a whole corpus of data in one run. \n\nBesides, and above all, even if opening data always destroyed any source of income for the public ", - "page_start": 17, - "page_end": 17, - "source_file": "Open_Data_Report.pdf" + "text": "", + "page_start": 248, + "page_end": 248, + "source_file": "00-80T-80.pdf" }, { - "text": "**4.4. Impose proper licensing and streamline procurement**\nAs with the first report prepared for this project, we will not delve into the details of*how*to license \n\ndata because this topic continues to be followed and debated in all details by LAPSI and other \n\nprojects or researchers. We will simply confirm the importance of establishing a proper license, at \n\nthe national level, for all Public Data, that makes them Open in the right way and makes sure that \n\nwhat is opened stays open and that don't demand what isn't possible to enforce (e.g. attribution), \n\nbecause, quoting again Eaves,*\"no government should waste precious resources by paying someone*\n\n*to scour the Internet to find websites and apps that don't attribute\"*. \n\nWe want, however, to spend a few words about another legal/administrative side of the issue, that is \n\nprocurement. Traditional procurement laws are very likely not flexible enough, in most countries, to \n\nhandle the implementation of data-based public services. Here's why. \n\nWe know that if Public Data are Open, everybody, from volunteer activists to hired professionals, \n\ncan very quickly write or maintain simple software applications that help to visualize and use them \n\nin all possible ways. Paradoxically, this is a problem when an Administration either wants to set up ", - "page_start": 29, - "page_end": 29, - "source_file": "Open_Data_Report.pdf" + "text": "", + "page_start": 16, + "page_end": 16, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "by David Osimo in EU eGov action plan published: the good, the bad and the unknown, are the \n\nactions on Open Data (a EU portal and a revision of the EU PSI directive), and on citizens control \n\nover their data. However the Action Plan contains no reference to the need for a more open and \n\ncollaborative governance. \n\nIn the case of European Structural Funds, as Luigi Reggi reported in March 2011: \n\nthere is no single point of access to the data. Hundreds of Managing Authorities are \nfollowing different paths and implementing different information strategies when \nopening up their data. \n\nMany databases (often simple PDF lists) [...show...] huge variation not only in \nthe way they can be accessed but also in content and quality of data provided. \n\n... [...The results of...] an independent web-based survey on the overall \nquality of data published by each Managing Authority responsible for the 434 \nOperational Programmes approved in July 2009... can be summarized as follows: \n\nThe use of open, machine-processable and linked-data formats have unexpected \nadvantages in terms of transparency and re-use of the data by the public and private \nsector. The application of these technical principles does not need extra budget or major \nchanges in government organization and information management; nor does it require \nthe update of existing software and infrastructures. What is needed today is the \npromotion among national and local authorities of the culture of transparency and the \nraising of awareness of the benefits that could derive from opening up existing data and \ninformation in a re-usable way. ", - "page_start": 7, - "page_end": 7, - "source_file": "Open_Data_Report.pdf" + "text": "", + "page_start": 16, + "page_end": 16, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "happening in the very same period in which*\" we are observing a worldwide diffusion of access to*\n\n*information laws that empower citizens to hold government agencies accountable.\"*\n\nIn such a context, \"Public Data\"is critical just because it is a much bigger set of data than what \n\nconstitutes traditional, official PSI. \"Public Data\" includes all that information*plus*the much bigger \n\namount of data describing and measuring all the activities of private companies, from bus \n\ntimetables to packaged food ingredients, aqueducts performances and composition of fumes \n\nreleased in the atmosphere, that have a*direct impact*on the health and rights of all citizens of the \n\ncommunities affected by the activities of those companies. \n\nAre such data \"Public\" today, in the sense defined at the beginning of this paragraph, that is \n\nsomething every citizen has the right to know without intermediaries or delegates, or not? Should \n\nthey be public? If yes, shouldn't law mandate that all such data be Open (that is, published online as \n\nsoon as possible, in machine readable format with an open license etc...) just like, for example, the \n\nbudget of some Ministry? Answering these questions may be one of the biggest challenges for the \n\nOpen Data community, and for society as a whole, in the next years. ", - "page_start": 24, - "page_end": 24, - "source_file": "Open_Data_Report.pdf" + "text": "", + "page_start": 16, + "page_end": 16, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**3.3. Legal issues remain crucial**\nProper licensing of Public data is essential. The more Open Data activities continue, the clearer this \n\nrule becomes. What distinguishes Open Data from \"mere\" transparency is reuse. Paraphrasing \n\nEaves, until a government get the licensing issue right, Open Data cannot bring all the possible \n\nbenefits in that country. If there are no guarantees that public data can be used without restriction, \n\nvery little happens in practice, and when it happens it may be something against the public interest. \n\nCanadian Company Public Engines Inc, that is paid by local police departments to collect, process \n\nand analyze official crime data, also publishes online, with a proprietary license, anonymized \n\nsummaries of those data. When in 2010 another company, Report See Inc, scraped those data from \n\ntheir website to reuse them, Public Engines sued. \n\nReporting this, D. Eaves rightly points out that*both*companies are right: one is trying to protect its \n\ninvestment, the other is simply trying to reuse what IS public data, by getting it from the ONLY \n\nplace where it's available. This is what happens when public officials leave the ownership of*public*\n\ndata to the third parties hired to collect them. Please note that, in practice, it makes very little ", - "page_start": 13, - "page_end": 13, - "source_file": "Open_Data_Report.pdf" + "text": "", + "page_start": 16, + "page_end": 16, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "difference whether those third parties are private, for-profit corporations or even other Public \n\nAdministrations. Unless, of course, there are national laws already in place that define in advance \n\nwhat is the license of all present and future Public Data,*no matter how they were generated and by*\n\n*whom*, those data can be lost in any moment for society. In all other cases, the legal status of data \n\nwill be either officially closed and locked, or uncertain enough to prevent most or all reuses. In \n\nFebruary 2011, the news came that, even if they weren't the original copyright holders, Public \n\nEngines had been able to put together enough legal claims to convince Report See to give up. \n\nDisputes like this should not happen and would not happen if all contracts regarding collection and \n\nmanagement of PSI clearly specified that all the resulting data either go directly into the public \n\ndomain (after being anonymized if necessary, of course) or remain exclusive property of the ", - "page_start": 13, - "page_end": 13, - "source_file": "Open_Data_Report.pdf" + "text": "", + "page_start": 16, + "page_end": 16, + "source_file": "NYSE_MGM_2004.pdf" } ] }, @@ -17699,70 +17699,70 @@ "target_page": 2, "target_passage": "Serum hormone concentrations increased significantly over the course of pregnancy and dropped precipitously postpartum", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 27, + "page_end": 27, + "source_file": "NYSE_HIG_2001.pdf" }, { - "text": "\n\n��� ", - "page_start": 43, - "page_end": 43, + "text": "", + "page_start": 17, + "page_end": 17, "source_file": "Excel Training Manual 1.pdf" }, { - "text": "In contrast, GMV within regions of the default mode (subnetwork \nC), limbic (subnetworks A and B) and visual peripheral networks buck \nthe global trend by slightly increasing (for example, temporal poles), \nremaining constant (for example, orbitofrontal cortex) or reducing at \na much slower rate (for example, extrastriate cortex) than total GMV \n(Fig. 2a,b and Supplementary Tables 1 and 2). CT changes in these \nregions exhibit similar patterns (Supplementary Fig. 3 and Supple- \nmentary Tables 4 and 5). \n\n**Results**\n**Serological evaluations**\nSerological evaluations captured canonical hormone fluctuations \ncharacteristic of the prenatal, perinatal and postnatal periods (Fig. 1b). \nSerum hormone concentrations increased significantly over the course \nof pregnancy and dropped precipitously postpartum (preconcep- \ntion, estradiol (E) = 3.42 pg ml−1 and progesterone (P) = 0.84 ng ml−1; \n3 weeks preparturition, E = 12,400 pg ml−1 and P = 103 ng ml−1; 3 months \npostparturition, E = 11.50 pg ml−1 and P = 0.04 ng ml−1). ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed4.pdf" + "text": "", + "page_start": 18, + "page_end": 18, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "Worldwide, nearly 85% of women experience one or more pregnancies \nin their lifetime1, with 140 million women becoming pregnant each \nyear. Over an approximately 40-week gestational window, the maternal \nbody undergoes profound physiological adaptations to support the \ndevelopment of the fetus, including increases in plasma volume, meta- \nbolic rate, oxygen consumption and immune regulation2. These rapid \nadaptations are initiated by 100-fold to 1,000-fold increases in hormone \nproduction, including estrogen and progesterone. These neuromodu- \nlatory hormones also drive significant reorganization of the central \nnervous system. Evidence from animal models and human studies con- \nverge on pregnancy as a period of remarkable neuroplasticity3–10 (see \nref. 10 for one of the earliest known observations). Gestational increases \nin steroid hormone synthesis drive neurogenesis, dendritic spine \ngrowth, microglial proliferation, myelination and astrocyte remodeling \n(for review, see ref. 11). These cellular changes are pronounced in brain \ncircuits that promote maternal behavior. For example, Ammari et al. \nrecently discovered that steroid hormones can fine-tune the response \nproperties of galanin neurons in the rodent medial preoptic area of \nthe hypothalamus (mPOA), leading to enhanced sensitivity in dams \nto sensory cues from newborn pups12. ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed4.pdf" + "text": "", + "page_start": 18, + "page_end": 18, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "Similar precision imaging studies have captured dynamic brain \nreorganization across other neuroendocrine transitions, such as the \nmenstrual cycle (see review in ref. 28), underscoring the powerful \nrole steroid hormones have in shaping the mammalian brain29. Endo- \ncrine changes across pregnancy dwarf those that occur across the \nmenstrual cycle, which highlights the critical need to map the brain’s \nresponse to this unique hormonal state. Broad physiological changes \noccur in tandem with the rise in steroid hormones, including changes \nin body mass composition, water retention, immune function and The neuroanatomical changes that unfold during matrescence \nmay have broad implications for understanding individual differences \nin parental behavior13,24,30,31, vulnerability to mental health disorders32,33 \nand patterns of brain aging18,19,34–36. Decreases in GMV may reflect \n‘fine-tuning’ of the brain by neuromodulatory hormones in prepara- \ntion for parenthood26. For example, in rodents, steroid hormones \npromote parental behavior by remodeling specific neural circuits in the \nmedial preoptic area of the hypothalamus. These behavioral adapta- \ntions are critical to the dam’s ability to meet the demands of caring for ", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed4.pdf" + "text": "", + "page_start": 18, + "page_end": 18, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "| es | Birth |\n|---|---|\n| | R2 adj = 0.50, P = 0.007 |\n| 0 | 50 100 150 R2 adj = 0.77, P < 0.001 |\n| 0 | 50 100 150 R2 adj = 0.79, P < 0.001 |\n\n\n. \nt \nn \na \nu \nq \n0.44 \n\ny \np \no \nr \nt \no \ns \ni \nn \na \nl \na \nb \no \nG \n0.38 \nl \n\n24,500 \n0 50 100 150 \nWeeks since conception \n\ncolors denote pregnancy stage. The participant underwent IVF to achieve \npregnancy, allowing for precise mapping of ovulation, conception and gestation \nweek.**d**, Summary (that is, total) of brain measures throughout the experiment. \nGeneralized additive models revealed GMV, CT and total brain volume decreased \nthroughout pregnancy (see Methods for validation with cubic regression), with \na slight recovery postpartum. Global QA, lateral ventricle and CSF volumes \ndisplayed nonlinear increases across gestation, with a notable rise in the second \nand third trimesters before dropping sharply postpartum. Shaded regions \nrepresent 95% confidence bands; solid lines indicate model fit; dashed line \nindicates parturition. ", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed4.pdf" + "text": "", + "page_start": 18, + "page_end": 18, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "d \n\n| | Summary Birth |\n|---|---|\n| | R2 adj = 0.91, P < 0.001 |\n| 0 | 50 100 150 R2 adj = 0.75, P < 0.001 |\n| 0 | 50 100 150 R2 adj = 0.90, P < 0.001 |\n\n\n4.80 \n) \n3 \nm \nm \nV \nM \nG \n5 \n0 \n1 \n× \n( \n4.60 \n\n1.80 \n) \nm \nm \nT \nC \n6 \n0 \n1 \n× \n( \n1.60 \n\n) \n1.29 \n3 l \nm \nm \n\no \nv \nn \na \nr \nB \ni \n\n6 \n0 \n1 \n× \n( \n1.27 \n\n0 50 100 150 \nWeeks since conception \n\n**Fig. 1 | Precision imaging reveals neuroanatomical changes throughout**\n**gestation. a**, Standard medical demarcations for pregnancy stages (that is, \ntrimesters) by gestation week (the image is created with BioRender.com). \n**b**, Steroid hormones increased significantly throughout pregnancy and dropped \nprecipitously postpartum, as is characteristic of the prenatal and postnatal \nperiods.**c**, A healthy 38-year-old primiparous woman underwent 26 scanning \nsessions from 3 weeks preconception through 2 years postpartum. Scans were \ndistributed throughout preconception (four scans), first trimester (four scans), \nsecond trimester (six scans), third trimester (five scans) and postpartum \n(seven scans); tick marks indicate when major measures were collected and ", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed4.pdf" + "text": "", + "page_start": 18, + "page_end": 18, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "We focused on adolescence as a potentially critical period for \nNSSI, given that it is associated with high levels of uncertainty \nabout several central domains in human life. However, there \nare other (gender-related) developmental periods in which bod- \nily changes might be coupled with increased levels of uncertainty \n(e.g. in physiology, in the sense of self, in the social role) and vulner- \nability. Pregnancy and transition to menopause, e.g. are periods of \nendocrine and hormonal upheavals that might impact a woman’s \naffective life and well-being. These physiological changes are cou- \npled with a fundamental developmental transition that requires a \nredefinition of personal identity and narrative integration (McLean \nand Lilgendahl 2019), with increased uncertainty of one’s inter- \nnal states and role in the social context. Taking into account \nthe perimenopausal and menopausal transition, the physiologi- \ncal, psychological, and affective experiences associated with it are \nvery heterogeneous. Some women might experience it as a new \nbeginning, whereas for others, it may be more critical (Deeks 2003). \nIn some cases, e.g. the menopause transition might perturb the \ncontinuity of one’s sense of self, inducing discrepancies in inter- \nnal self-coherence (e.g. the end of childbearing years, the aging \nprocess), which might increase the level of distress (Barca and De \nMarchis 2018). ", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed1.pdf" + "text": "", + "page_start": 18, + "page_end": 18, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "This precision imaging study mapped neuroanatomical changes \nacross pregnancy in a single individual, precluding our ability to gen- \neralize to the broader population. To benchmark our findings, we com- \npared the magnitude of GMV changes observed throughout pregnancy \nagainst data from nonpregnant individuals sampled over a similar time \ncourse. Doing so provided compelling evidence that pregnancy-related \nneuroanatomical shifts far exceed normative day-to-day brain variabil- \nity and measurement error. Evidence suggests that white matter micro- \nstructure remains fairly stable over a six-month period42, but more \nstudies are needed to compare the degree of white matter changes \nobserved during pregnancy to normative change over time. Further, \nsampling larger cohorts of women will generate much-needed norma- \ntive models of brain change (akin to ref. 43) throughout pregnancy to \nestablish what constitutes a typical degree of neuroanatomical change \nexpected during gestation and postpartum recovery. \n12. Ammari, R. et al. Hormone-mediated neural remodeling \n\norchestrates parenting onset during pregnancy.*Science***382**, \n76–81 (2023). \n\n13. Hoekzema, E. et al. Pregnancy leads to long-lasting changes in \nhuman brain structure.*Nat. Neurosci.***20**, 287–296 (2017). \n14. Hoekzema, E. et al. Mapping the effects of pregnancy on ", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed4.pdf" + "text": "", + "page_start": 18, + "page_end": 18, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "above). A linear regression model was most appropriate for PHC (AICdiff < 3), whereas a quadratic model performed best for \nCA1 and CA2/3. As a control, we repeated the analyses with MTL subregion volumes after proportional volume correction of \ntotal gray matter volume calculated by ASHS. Finally, we evaluated the relationship between endogenous sex hormones \n(estrogen and progesterone) and subregion volumes using linear regression. Relationships were considered significant only if \nthey met FDR correction at q < .05. ", + "text": "", "page_start": 18, "page_end": 18, - "source_file": "pubmed4.pdf" + "source_file": "Excel Training Manual 1.pdf" } ] }, @@ -17779,64 +17779,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 60, + "page_end": 60, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 202, + "page_end": 202, + "source_file": "00-80T-80.pdf" }, { - "text": "**Cortical volume and thickness changes tied to gestation**\nWe then narrowed the aperture to capture changes unfolding within \ngestation itself (baseline—36 weeks pregnant, 19 scans). Relationships \nbetween summary brain metrics were evident over the gestational \nperiod as follows: total brain volume, GMV and CT were positively asso- \nciated with one another, whereas lateral ventricles, CSF and global QA \ndemonstrated negative relationships with GMV (Supplementary Fig. 1). \nChanges in GMV were near-ubiquitous across the cortical mantle \n(Fig. 2a). Most large-scale brain networks exhibited decreases in GMV \n(Fig. 2b and Supplementary Table 1); indeed, 80% of the 400 regions of \ninterest (ROI) demonstrated negative relationships between GMV and \ngestation week (Fig. 2a and Supplementary Table 2). Together, these \nresults provide evidence of a global decrease in cortical volume across \npregnancy. Several sensory and attention subnetworks were particu- \nlarly sensitive to gestation, including the control (subnetwork B), sali- \nence/ventral attention (subnetwork A), dorsal attention (subnetwork \nB), default (subnetwork A) and somatomotor (subnetworks A and B) \nnetworks (Supplementary Table 1). Regions driving these network-level \nchanges include the bilateral inferior parietal lobe, postcentral gyri, \ninsulae, prefrontal cortex, posterior cingulate and somatosensory \ncortex (Fig. 2c, Supplementary Table 2 and validation of findings using \nalternate pipeline in Supplementary Tables 1 and 3). These regions and ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed4.pdf" + "text": "", + "page_start": 202, + "page_end": 202, + "source_file": "00-80T-80.pdf" }, { - "text": "sleep patterns11. These factors could have a role in the brain changes \nobserved here, with some driving neurobiological changes and others, \nlike water retention, potentially affecting MRI-based measurements. \nNote that, although cortical reductions in GMV over gestation were \nstable across analyses, accounting for QC measures influenced the \nmagnitude and location of these results. These metrics all fell within \nthe standard range, but there may be meaningful reductions in signal \nthat accompany volumetric reductions (for example, increased CSF \nand decreased GM)—a methodological nuance that goes beyond the \nscope of this resource study. Ultimately, identifying the shared and \nunique contributions of these factors to the neuroanatomical changes \nthat unfold across gestation warrants further investigation. Deeply \nphenotyping a large and diverse cohort of women across pregnancy will \nopen up new avenues of exploration, for example, allowing research- \ners to link blood-based proteomic signatures to pregnancy outcomes; \ndeploying wearable devices to monitor changes in sleep, cognition and \nmood; and probing the broader social and environmental determinants \nof maternal health27. overlook the full range of changes that unfold within the gestational \nwindow, and underrepresent the brain’s metamorphosis during preg- \nnancy. Furthermore, although observed changes were largely global, \nsome regions displayed notable stability (for example, extrastriate cor- \ntex). The subcortical region that displayed the strongest relationship \nwith gestation week was the ventral diencephalon, which encompasses \nthe hypothalamus and subsequent medial preoptic area and paraven- \ntricular nucleus—structures critical for inducing maternal behavior12,16. \nThe hippocampus exhibited a reduction in volume across gestation, \nand with higher spatial resolution, this reduction was revealed to be \ndriven by changes in CA1 and CA2/CA3 subfield volumes, while other \nhippocampal subfields remained stable. Adjacent PHC within the \nMTL also exhibited volume reduction across gestation. While our hip- \npocampal findings are consistent with pre/post studies of pregnancy13, \nthe precision lens applied within gestation revealed the nonlinear \nnature of this reduction. Recapitulating and clarifying these region- \nally specific patterns of volume change throughout the MTL merits \nfurther investigation. ", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed4.pdf" + "text": "", + "page_start": 202, + "page_end": 202, + "source_file": "00-80T-80.pdf" }, { - "text": "In humans, reductions in gray matter volume (GMV) have \nbeen observed postpartum13–16, particularly in regions central to \ntheory-of-mind processing13. These GMV changes persist at 6 years \npostpartum17 and are traceable decades later18,19, underscoring the \npermanence of this major remodeling event. And yet the changes that \noccur within the maternal brain during gestation itself are virtually \nunknown (see ref. 20 for early neuroimaging insight). A recent study by \nPaternina-Die et al. offers intriguing clues21. Women were scanned once \nin the third trimester and again in the postpartum period, revealing a \nreduction of cortical volume observable in the late pregnancy scan. \nThese findings suggest that pregnancy is a highly dynamic period for \nneural remodeling, yet neuroscientists lack a detailed map of how the \nhuman brain changes throughout the gestational period. \n\nHere we conducted a precision imaging study of pregnancy in \nwhich a healthy 38-year-old primiparous woman underwent 26 mag- \nnetic resonance imaging (MRI) scans and venipuncture beginning \n3 weeks preconception through 2 years postpartum. We observed \nwidespread reductions in cortical GMV and cortical thickness (CT) \noccurring in step with advancing gestational week and the dramatic \nrise in sex hormone production. Remodeling was also evident within ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed4.pdf" + "text": "", + "page_start": 202, + "page_end": 202, + "source_file": "00-80T-80.pdf" }, { - "text": "Worldwide, nearly 85% of women experience one or more pregnancies \nin their lifetime1, with 140 million women becoming pregnant each \nyear. Over an approximately 40-week gestational window, the maternal \nbody undergoes profound physiological adaptations to support the \ndevelopment of the fetus, including increases in plasma volume, meta- \nbolic rate, oxygen consumption and immune regulation2. These rapid \nadaptations are initiated by 100-fold to 1,000-fold increases in hormone \nproduction, including estrogen and progesterone. These neuromodu- \nlatory hormones also drive significant reorganization of the central \nnervous system. Evidence from animal models and human studies con- \nverge on pregnancy as a period of remarkable neuroplasticity3–10 (see \nref. 10 for one of the earliest known observations). Gestational increases \nin steroid hormone synthesis drive neurogenesis, dendritic spine \ngrowth, microglial proliferation, myelination and astrocyte remodeling \n(for review, see ref. 11). These cellular changes are pronounced in brain \ncircuits that promote maternal behavior. For example, Ammari et al. \nrecently discovered that steroid hormones can fine-tune the response \nproperties of galanin neurons in the rodent medial preoptic area of \nthe hypothalamus (mPOA), leading to enhanced sensitivity in dams \nto sensory cues from newborn pups12. ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed4.pdf" + "text": "", + "page_start": 202, + "page_end": 202, + "source_file": "00-80T-80.pdf" }, { - "text": "outstanding questions. This study and corresponding open-access \ndataset offer neuroscientists a detailed map of the human brain across \ngestation, a resource for which a wide range of previously unattainable \nneurobiological questions can now be explored. \n\nor neuron number, synaptic density and myelination (for review on \nthe latter, see ref. 4). Future studies of the relationship between fluid \ndynamics and volumetric changes will help clarify the factors that drive \nglobal neural changes during pregnancy; such insights will have broad \nimplications for maternal health (for example, neurological effects tied \nto pre-eclampsia or edema). \n\nOur findings from this precision imaging study show that preg- \nnancy is characterized by reductions in GMV, cortical thinning and \nenhanced white matter microstructural integrity that unfold week by \nweek. These changes were also tied to the significant rise in steroid hor- \nmone concentrations over pregnancy. Some of these changes persist \nat 2 years postpartum (for example, global reductions in GMV and CT), \nwhile others, including markers of white matter integrity, appear to be \ntransient. Ventricular expansion and contraction parallel these cortical \nchanges. These widespread patterns, and the notable increase in CSF \nvolume across gestation, could reflect increased water retention and \nsubsequent compression of cortical tissue. However, the persistence \nof these changes at 2 years postpartum and regional variation in GMV, \nCT and QA, hint at cellular underpinnings, such as alterations in glia ", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed4.pdf" + "text": "", + "page_start": 202, + "page_end": 202, + "source_file": "00-80T-80.pdf" }, { - "text": "Figure 1. A schematic illustration of a hierarchical active inference model. This model links (exteroceptive, interoceptive, and proprioceptive) \nsensations at lower levels with multimodal models of hidden bodily states, such as fatigue and hunger, at intermediate levels, and finally with \ntemporally extended, integrative models of the embodied self at the higher hierarchical level. In this schematic, following predictive coding (Rao and \nBallard 1999, Friston 2005), black and red circles represent neural units that encode predictions and prediction errors, respectively. The levels are \nreciprocally connected, so predictions are propagated from the top-down (black edges) and prediction errors from the bottom-up (red edges). Finally, \nthe pink triangles indicate a mechanism of precision gating (or gain control) of prediction error units, which determines their relative influence on \nunits encoding predictions. At a neurobiological level, prediction and prediction error units could be mapped to deep and superficial pyramidal cells in \ncortical hierarchies, whereas expected precision could be linked to neuromodulatory input. The elements of the generative model shown do not need \nto map one-to-one to specific brain areas or networks but are plausibly distributed across many of them. However, as a first approximation, the lower \nand intermediate layers of the generative model could be linked to brain networks that process unimodal information (e.g. sensory cortices for \nexteroceptive information) and multimodal association areas, respectively. The highest level of the generative model could be linked to brain networks \nthat process information about the self, such as the insular cortex, the anterior cingulate cortex, and the medial prefrontal cortex. See Parr et al. \n(2022) for details about hierarchical generative models supporting adaptive regulation and allostasis and Barrett and Simmons (2015) for their \nputative neuronal underpinnings. See online article for colored version of this figure. ", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed1.pdf" + "text": "", + "page_start": 202, + "page_end": 202, + "source_file": "00-80T-80.pdf" }, { - "text": "Predicting global, network, and regional volumetric change (GMV, CT, MTL subregion, microstructure) by pregnancy-related \nindicators (gestation week, estrogen, progesterone). \n\nWhole brain ROI-based Both \n\nGlobal measures of gray matter volume, cortical thickness, and cerebrospinal fluid were computed by \nANTs and validated with FreeSurfer. A whole-brain probabilistic atlas (e.g., Schaefer 400-region \nparcellation) was used for ROI analysis of cortical thickness and volume and the Yeo/Schaefer 17-network \nscheme was used for network-level analyses. The 'aseg' segmentation was used for ROI analysis of \nsubcortical gray matter volume. The Princeton Young Adult 3T ASHS Atlas Template was used to examine \nvolume among 7 MTL subfields: CA1, CA 2/3, dentate gyrus, subiculum, entorhinal cortex, perirhinal \ncortex, and the parahippocampal gyrus. Whole-brain white matter structure was assessed for the \ndiffusion imaging analysis, wherein every tract and bundle was evaluated. \n\nAnatomical location(s) \n\nN/A; s and diffusion MRI only. ", - "page_start": 18, - "page_end": 18, - "source_file": "pubmed4.pdf" + "text": "", + "page_start": 202, + "page_end": 202, + "source_file": "00-80T-80.pdf" }, { - "text": "Learning algorithms for neural networks use local search to \nchoose the weights that will get the right output for each input \nduring training. The most common training technique is the \nbackpropagation algorithm.[105] Neural networks learn to model \ncomplex relationships between inputs and outputs and find \npatterns in data. In theory, a neural network can learn any \nfunction.[106] \n\nIn feedforward neural networks the signal passes in only one \ndirection.[107] Recurrent neural networks feed the output signal \nback into the input, which allows short-term memories of previous \ninput events. Long short term memory is the most successful \nnetwork architecture for recurrent networks.[108] Perceptrons[109] \nuse only a single layer of neurons; deep learning[110] uses multiple \nlayers. Convolutional neural networks strengthen the connection \nbetween neurons that are \"close\" to each other—this is especially important in image processing, where a \nlocal set of neurons must identify an \"edge\" before the network can identify an object.[111] \n\nA neural network is an \ninterconnected group of nodes, akin \nto the vast network of neurons in the \nhuman brain. ", - "page_start": 8, - "page_end": 8, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 202, + "page_end": 202, + "source_file": "00-80T-80.pdf" } ] }, @@ -17853,64 +17853,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 324, + "page_end": 324, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 60, + "page_end": 60, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "\n\nto decrease the ", - "page_start": 104, - "page_end": 104, - "source_file": "00-80T-80.pdf" + "text": "", + "page_start": 60, + "page_end": 60, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "Gray Matter Volume & Cortical Thickness: \nWe first computed Pearson’s product-moment correlation matrices between the following variables (n = 19 pregnancy \nscans): gestation week, estradiol, progesterone, total GMV, and the 17 network-level average GMV values. We then ran a \nmultivariate regression analysis predicting ROI-level GMV changes by gestation week. To identify which regions were \nchanging at a rate different from the global decrease, we then re-ran the analyses to include total GMV as a variable of non- \ninterest in the regression model. A similar statistical approach was taken for T1w-derived subcortical volume estimates. We \nran a multivariate regression analysis predicting GMV changes over gestation in 28 regions-of-interest by gestation week \n(FDR-corrected at q < 0.05). \n\nT2-weighted MTL scans: \nTo evaluate the relationship between gestation week and medial temporal lobe (MTL) subregion volume over pregnancy (n = \n7 bilateral subregions; n = 18 MTL scans), we used a combination of linear and non-linear models based on individual \nsubregion data patterns. Models were compared for best fit with each subregion via AIC from the GLM output (as described ", - "page_start": 17, - "page_end": 17, - "source_file": "pubmed4.pdf" + "text": "", + "page_start": 366, + "page_end": 366, + "source_file": "00-80T-80.pdf" }, { - "text": "In humans, reductions in gray matter volume (GMV) have \nbeen observed postpartum13–16, particularly in regions central to \ntheory-of-mind processing13. These GMV changes persist at 6 years \npostpartum17 and are traceable decades later18,19, underscoring the \npermanence of this major remodeling event. And yet the changes that \noccur within the maternal brain during gestation itself are virtually \nunknown (see ref. 20 for early neuroimaging insight). A recent study by \nPaternina-Die et al. offers intriguing clues21. Women were scanned once \nin the third trimester and again in the postpartum period, revealing a \nreduction of cortical volume observable in the late pregnancy scan. \nThese findings suggest that pregnancy is a highly dynamic period for \nneural remodeling, yet neuroscientists lack a detailed map of how the \nhuman brain changes throughout the gestational period. \n\nHere we conducted a precision imaging study of pregnancy in \nwhich a healthy 38-year-old primiparous woman underwent 26 mag- \nnetic resonance imaging (MRI) scans and venipuncture beginning \n3 weeks preconception through 2 years postpartum. We observed \nwidespread reductions in cortical GMV and cortical thickness (CT) \noccurring in step with advancing gestational week and the dramatic \nrise in sex hormone production. Remodeling was also evident within ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed4.pdf" + "text": "", + "page_start": 59, + "page_end": 59, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "outstanding questions. This study and corresponding open-access \ndataset offer neuroscientists a detailed map of the human brain across \ngestation, a resource for which a wide range of previously unattainable \nneurobiological questions can now be explored. \n\nor neuron number, synaptic density and myelination (for review on \nthe latter, see ref. 4). Future studies of the relationship between fluid \ndynamics and volumetric changes will help clarify the factors that drive \nglobal neural changes during pregnancy; such insights will have broad \nimplications for maternal health (for example, neurological effects tied \nto pre-eclampsia or edema). \n\nOur findings from this precision imaging study show that preg- \nnancy is characterized by reductions in GMV, cortical thinning and \nenhanced white matter microstructural integrity that unfold week by \nweek. These changes were also tied to the significant rise in steroid hor- \nmone concentrations over pregnancy. Some of these changes persist \nat 2 years postpartum (for example, global reductions in GMV and CT), \nwhile others, including markers of white matter integrity, appear to be \ntransient. Ventricular expansion and contraction parallel these cortical \nchanges. These widespread patterns, and the notable increase in CSF \nvolume across gestation, could reflect increased water retention and \nsubsequent compression of cortical tissue. However, the persistence \nof these changes at 2 years postpartum and regional variation in GMV, \nCT and QA, hint at cellular underpinnings, such as alterations in glia ", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed4.pdf" + "text": "", + "page_start": 59, + "page_end": 59, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "Figure 11-94 Metro Mirror or Global Mirror mapping state diagram \n\nWhen the MM/GM relationship is created, you can specify whether the auxiliary volume is \nalready in sync with the master volume, and the background copy process is then skipped. \nThis capability is useful when MM/GM relationships are established for volumes that were \ncreated with the format option. \n\nThe following step identifiers are shown in Figure 11-94: \n\n(cid:2) Step 1: \n\na. The MM/GM relationship is created with the**-sync**option, and the MM/GM relationship \n\nenters the ConsistentStopped state. \n\nb. The MM/GM relationship is created without specifying that the master and auxiliary \nvolumes are in sync, and the MM/GM relationship enters the InconsistentStopped \nstate. ", - "page_start": 556, - "page_end": 556, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 59, + "page_end": 59, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "sleep patterns11. These factors could have a role in the brain changes \nobserved here, with some driving neurobiological changes and others, \nlike water retention, potentially affecting MRI-based measurements. \nNote that, although cortical reductions in GMV over gestation were \nstable across analyses, accounting for QC measures influenced the \nmagnitude and location of these results. These metrics all fell within \nthe standard range, but there may be meaningful reductions in signal \nthat accompany volumetric reductions (for example, increased CSF \nand decreased GM)—a methodological nuance that goes beyond the \nscope of this resource study. Ultimately, identifying the shared and \nunique contributions of these factors to the neuroanatomical changes \nthat unfold across gestation warrants further investigation. Deeply \nphenotyping a large and diverse cohort of women across pregnancy will \nopen up new avenues of exploration, for example, allowing research- \ners to link blood-based proteomic signatures to pregnancy outcomes; \ndeploying wearable devices to monitor changes in sleep, cognition and \nmood; and probing the broader social and environmental determinants \nof maternal health27. overlook the full range of changes that unfold within the gestational \nwindow, and underrepresent the brain’s metamorphosis during preg- \nnancy. Furthermore, although observed changes were largely global, \nsome regions displayed notable stability (for example, extrastriate cor- \ntex). The subcortical region that displayed the strongest relationship \nwith gestation week was the ventral diencephalon, which encompasses \nthe hypothalamus and subsequent medial preoptic area and paraven- \ntricular nucleus—structures critical for inducing maternal behavior12,16. \nThe hippocampus exhibited a reduction in volume across gestation, \nand with higher spatial resolution, this reduction was revealed to be \ndriven by changes in CA1 and CA2/CA3 subfield volumes, while other \nhippocampal subfields remained stable. Adjacent PHC within the \nMTL also exhibited volume reduction across gestation. While our hip- \npocampal findings are consistent with pre/post studies of pregnancy13, \nthe precision lens applied within gestation revealed the nonlinear \nnature of this reduction. Recapitulating and clarifying these region- \nally specific patterns of volume change throughout the MTL merits \nfurther investigation. ", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed4.pdf" + "text": "", + "page_start": 58, + "page_end": 58, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "However, if GM operations experience degraded response times from the secondary system \nfor an extended period, I/O operations begin to queue at the primary system. This queue \nresults in an extended response time to application hosts. In this situation, the \n**gmlinktolerance**feature stops GM relationships, and the application host’s response time \nreturns to normal. \n\nAfter a 1920 event occurs, the GM auxiliary volumes are no longer in the \nconsistent_synchronized state. Fix the cause of the event and restart your GM relationships. \nFor this reason, ensure that you monitor the system to track when these 1920 events occur. \n\nYou can disable the**gmlinktolerance**feature by setting the**gmlinktolerance**value to 0 \n(zero). However, the**gmlinktolerance**feature cannot protect applications from extended \nresponse times if it is disabled. It might be appropriate to disable the**gmlinktolerance**feature \nunder the following circumstances: \n\n(cid:2) During SAN maintenance windows in which degraded performance is expected from SAN \ncomponents, and application hosts can stand extended response times from GM volumes. \n\n(cid:2) During periods when application hosts can tolerate extended response times and it is \n\nexpected that the**gmlinktolerance**feature might stop the GM relationships. For example, \nif you test by using an I/O generator that is configured to stress the back-end storage, the \n**gmlinktolerance**feature might detect the high latency and stop the GM relationships. \n\nDisabling the**gmlinktolerance**feature prevents this result at the risk of exposing the test \nhost to extended response times. ", - "page_start": 565, - "page_end": 565, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 366, + "page_end": 366, + "source_file": "00-80T-80.pdf" }, { - "text": "**White matter microstructure changes tied to gestation**\nIn contrast to decreasing global GMV, correlational tractography of \nwhite matter, which tests for linear trends in the data, revealed increas- \ning microstructural integrity across the whole brain during gestation \n(Fig. 4a), concomitant with the rise in 17β-estradiol and progesterone \n(all*q*< 0.001; Supplementary Fig. 9). Tracts displaying robust corre- \nlations with gestational week included the corpus callosum, arcuate \nfasciculus, inferior fronto-occipital fasciculus and inferior longitudinal \nfasciculus (Fig. 4b), as well as the cingulum bundle, middle and superior \nlongitudinal fasciculus, corticostriatal, corticospinal and corticopon- \ntine tracts (see Supplementary Table 9 for complete list). \n\n**Comparing brain changes across pregnancy against controls**\nWe then compared the changes in GMV across gestation to that of typi- \ncal variability over time, derived from eight densely-sampled controls23. \nThe GMV changes we see across pregnancy far exceed normative brain \nvariability (Supplementary Fig. 11). On average, change in cortical GMV \nwas nearly three times higher than controls scanned over a similar \nduration (Supplementary Fig. 11a,b). This extends to MTL subfields, \nwherein change in volume was three to four times greater across gesta- \ntion than normative brain variability (Supplementary Fig. 11c,d). We \ncontextualized these findings further by comparing gestational GMV \nchange against our participant’s preconception brain volumes; average \nGMV change during pregnancy was six times (cortical) and three times \n(MTL) higher than the variability observed between baseline sessions. ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed4.pdf" + "text": "", + "page_start": 58, + "page_end": 58, + "source_file": "OTC_NSANY_2004.pdf" } ] }, @@ -17921,70 +17921,70 @@ "target_page": 2, "target_passage": "Up button: Short press to light up or turn off the screen", "chunk_present": { - "presence": true, - "index": 5 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 298, + "page_end": 298, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 376, + "page_end": 376, + "source_file": "00-80T-80.pdf" }, { - "text": "Sports smart watch \nUser Manual \nDT3 Mate \n\n", - "page_start": 1, - "page_end": 1, - "source_file": "6126797.pdf" + "text": "", + "page_start": 375, + "page_end": 375, + "source_file": "00-80T-80.pdf" }, { - "text": "smart watch, and click \"Forget this device\". The “About” of the watch has an “Unbind” \n\nbutton, click it to unbind or do it in the APP. For the safety of users’ data, the watch will implement a \n\nfactory reset after that. ", - "page_start": 8, - "page_end": 8, - "source_file": "6126797.pdf" + "text": "", + "page_start": 375, + "page_end": 375, + "source_file": "00-80T-80.pdf" }, { - "text": "3) Swipe to the right when the watch is in the dial interface, you can find time/date/week/the latest \nmessage (enter to view multiple messages)/some of the recently used menu functions, and turn on \nor off audio Bluetooth for calls. \n4) Swipe up the screen when the watch is in the dial interface to enter the menu interface, and \nscroll up and down to find the corresponding function. \n5) Long press the watch face interface and swipe to right or left to switch the watch face, select \none of them and set it with one-click. \n\n**1.2 App notification**\n\n1) When the watch is bound to the APP, and you allow the watch to display notifications on the \nwatch, the new messages received in your mobile phone will be pushed to the watch, and a total of \n10 messages can be saved. The messages received after 10 messages will be overwritten one by \none. \n2) Swipe to the bottom to click the delete icon to clear all message records. \n\n**1.3 Drop-down menu**\n\nScroll down the screen when the watch is in the dial interface to enter the drop-down menu \ninterface. \n1) Bluetooth connection status; time; power left; \n2) About, where you can check the firmware version of watch and the address of the Bluetooth \n3) Setting, where you can enter it to set part of the functions; \n4) Brightness adjustment; where you can adjust the brightness of the screen; \n5) Alipay. Download the app Alipay in your mobile phone and bind it with your watch to realize \noffline payment. ", - "page_start": 3, - "page_end": 3, - "source_file": "6126797.pdf" + "text": "", + "page_start": 375, + "page_end": 375, + "source_file": "00-80T-80.pdf" }, { - "text": "**Up button:**\n\nShort press to light up or turn off the screen; one press to go back the dial interface; long press to \nreactivate the watch. \n\n**Button down:**\n\nShort press to enter multi-sport mode. \nIn addition, when the watch is in the off-screen state, you can light up the screen by pressing any \nbuttons. \n\n**Charging instructions:**\n\nWireless charging, as shown in the picture below. ", - "page_start": 2, - "page_end": 2, - "source_file": "6126797.pdf" + "text": "", + "page_start": 375, + "page_end": 375, + "source_file": "00-80T-80.pdf" }, { - "text": "and view content on demand. They can search content and control their \nPVR remotely from their smartphone. They can stream programming to \ntheir tablet anywhere in their home. A single Rogers Nextbox serves as \na master PVR for the entire home enabling simultaneous viewing and \nrecording of up to eight separate shows and storage of over 250 hours \nof high-definition programming. And customers can access television \nand movie content on-demand from anywhere by laptop, tablet or \nsmartphone using the Rogers Anyplace TV app. \n\namong their computer, home phone and wireless device without \ninterruption; manage e-mails; text messages and voicemail; hold live \nvideo chats; and combine and sync contacts from across multiple devices. \n\nWhen they’re not at home, more and more customers also rely on \nRogers Smart Home Monitoring, a complete monitoring, automation \nand security solution that includes the most innovative technology and \nfeatures available. Smart Home Monitoring lets customers monitor, \ncontrol and receive alerts by smartphone or online, staying connected \nto their home from almost anywhere, and enjoying the peace of mind \nthat comes with having the most reliable monitoring solution available. \nSmart Home Monitoring also gives customers the ability to automate \nlights, appliances, thermostats and more, so they know their homes are \nnot only secure but more energy-efficient and convenient, also. ", - "page_start": 13, - "page_end": 13, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 375, + "page_end": 375, + "source_file": "00-80T-80.pdf" }, { - "text": "Enable the SMS notification in the app. When one or more SMS messages are received on the \nmobile phone, the watch will receive one or more SMS reminders at the same time. \n1.5.3. Other application message notifications: \nTurn on the corresponding application message notification in the app, such as WeChat, QQ, \nOutlook, Facebook and other applications. When the mobile phone receives one/multiple \napplication message notifications, the watch will receive one/multiple corresponding message \nreminders at the same time. \n\n**1.6 Frequently used contacts**\n\nThe watch binds to the app, and you allow the watch to access to the phone book of your mobile \nphone, then you can synchronize you contacts of your mobile phone to the smartwatch. \n\n**1.7 Fitness data**\n\nFitness data is turned on by default. When you enter the fitness data interface, scroll up the \nscreen, the smartwatch will display the current data of steps, distance, and calories. The data will \nbe wiped out at 00:00 every day in the morning. \n\n**1.8 Sports modes**(walking, running, cycling, rope skipping, badminton, \n\nbasketball, football) \n\n1.8.1 Select the corresponding exercise mode, click the “Start” button on the screen to start the \nexercise; click the “Start” button again to pause the recording of the exercise; click the “End” \nbutton to end the recording, and save to the data. \n1.8.2 The data can only be saved when the recording of the exercise is more than 1 minute; If the \nrecording time is less than 1 minute, the smartwatch will remind you that the data is too little to be \nsaved. ", - "page_start": 4, - "page_end": 4, - "source_file": "6126797.pdf" + "text": "", + "page_start": 375, + "page_end": 375, + "source_file": "00-80T-80.pdf" }, { - "text": "**2.3 stopwatch**\n\nClick the stopwatch to enter the timing interface, and you can record the time once. \n\n**2.4 Weather**\n\nAfter the smartwatch is connected to the app and the data is synchronized, tap Weather on the \nwatch to display the weather information for the day. \n\n**2.5 Find mobile phone**\n\nAfter the watch is bound to the app WearPro, tap this function to find the mobile phone, and the \nmobile phone will vibrate or emit a ringtone. \n\n**2.6 Meteorology**\n\nClick on “Meteorology” on the watch to display the ultraviolet (UV) and air pressure conditions of \nthe day. \n\n**2.7 Massager**\n\nTap the green button to start the massage, and the watch is in a vibrating state, tap the red button \nto end the massage state. \n\n**3.0 Menu style**\n\nThere are a variety of menu styles for users to choose. \n\n**3.1 Settings**\n\n1) You can select the watch language on the settings of the watch, or the watch language can be \nsynchronized with your mobile phone language after the watch successfully binds to the APP. \n2) Switch the watch face, swipe to the right to view the next watch face, select a watch face, and \nclick it to set the watch face. \n3) Set screen time; a variety of screen time lengths can be selected. \n4) Vibration intensity; set reminder vibration intensity. \n5) Password; a 4-digit password can be set (if you forget the password, please enter 8762 to \ndecrypt the previous password). \n6) Restore factory settings; click √ to enable the factory reset, and click X to cancel the factory \nreset. ", - "page_start": 5, - "page_end": 5, - "source_file": "6126797.pdf" + "text": "", + "page_start": 376, + "page_end": 376, + "source_file": "00-80T-80.pdf" }, { - "text": "2.1 Unconnected to the APP state: \n\nAfter the watch is turned on, the Bluetooth will be in the state of being searched. After open the \nAPK/APP, go to Devices > Add Device > click to start searching, select and click the \ncorresponding watch device name, and the watch will be successfully bound to the app. ", - "page_start": 6, - "page_end": 6, - "source_file": "6126797.pdf" + "text": "", + "page_start": 376, + "page_end": 376, + "source_file": "00-80T-80.pdf" } ] }, @@ -17995,70 +17995,70 @@ "target_page": 4, "target_passage": "Fitness data is turned on by default.", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 216, + "page_end": 216, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 2, + "page_end": 2, + "source_file": "NYSE_RSG_2004.pdf" }, { - "text": "Enable the SMS notification in the app. When one or more SMS messages are received on the \nmobile phone, the watch will receive one or more SMS reminders at the same time. \n1.5.3. Other application message notifications: \nTurn on the corresponding application message notification in the app, such as WeChat, QQ, \nOutlook, Facebook and other applications. When the mobile phone receives one/multiple \napplication message notifications, the watch will receive one/multiple corresponding message \nreminders at the same time. \n\n**1.6 Frequently used contacts**\n\nThe watch binds to the app, and you allow the watch to access to the phone book of your mobile \nphone, then you can synchronize you contacts of your mobile phone to the smartwatch. \n\n**1.7 Fitness data**\n\nFitness data is turned on by default. When you enter the fitness data interface, scroll up the \nscreen, the smartwatch will display the current data of steps, distance, and calories. The data will \nbe wiped out at 00:00 every day in the morning. \n\n**1.8 Sports modes**(walking, running, cycling, rope skipping, badminton, \n\nbasketball, football) \n\n1.8.1 Select the corresponding exercise mode, click the “Start” button on the screen to start the \nexercise; click the “Start” button again to pause the recording of the exercise; click the “End” \nbutton to end the recording, and save to the data. \n1.8.2 The data can only be saved when the recording of the exercise is more than 1 minute; If the \nrecording time is less than 1 minute, the smartwatch will remind you that the data is too little to be \nsaved. ", - "page_start": 4, - "page_end": 4, - "source_file": "6126797.pdf" + "text": "", + "page_start": 297, + "page_end": 297, + "source_file": "00-80T-80.pdf" }, { - "text": "Sports smart watch \nUser Manual \nDT3 Mate \n\n", - "page_start": 1, - "page_end": 1, - "source_file": "6126797.pdf" + "text": "", + "page_start": 297, + "page_end": 297, + "source_file": "00-80T-80.pdf" }, { - "text": "3) Swipe to the right when the watch is in the dial interface, you can find time/date/week/the latest \nmessage (enter to view multiple messages)/some of the recently used menu functions, and turn on \nor off audio Bluetooth for calls. \n4) Swipe up the screen when the watch is in the dial interface to enter the menu interface, and \nscroll up and down to find the corresponding function. \n5) Long press the watch face interface and swipe to right or left to switch the watch face, select \none of them and set it with one-click. \n\n**1.2 App notification**\n\n1) When the watch is bound to the APP, and you allow the watch to display notifications on the \nwatch, the new messages received in your mobile phone will be pushed to the watch, and a total of \n10 messages can be saved. The messages received after 10 messages will be overwritten one by \none. \n2) Swipe to the bottom to click the delete icon to clear all message records. \n\n**1.3 Drop-down menu**\n\nScroll down the screen when the watch is in the dial interface to enter the drop-down menu \ninterface. \n1) Bluetooth connection status; time; power left; \n2) About, where you can check the firmware version of watch and the address of the Bluetooth \n3) Setting, where you can enter it to set part of the functions; \n4) Brightness adjustment; where you can adjust the brightness of the screen; \n5) Alipay. Download the app Alipay in your mobile phone and bind it with your watch to realize \noffline payment. ", - "page_start": 3, - "page_end": 3, - "source_file": "6126797.pdf" + "text": "", + "page_start": 297, + "page_end": 297, + "source_file": "00-80T-80.pdf" }, { - "text": "**2.3 stopwatch**\n\nClick the stopwatch to enter the timing interface, and you can record the time once. \n\n**2.4 Weather**\n\nAfter the smartwatch is connected to the app and the data is synchronized, tap Weather on the \nwatch to display the weather information for the day. \n\n**2.5 Find mobile phone**\n\nAfter the watch is bound to the app WearPro, tap this function to find the mobile phone, and the \nmobile phone will vibrate or emit a ringtone. \n\n**2.6 Meteorology**\n\nClick on “Meteorology” on the watch to display the ultraviolet (UV) and air pressure conditions of \nthe day. \n\n**2.7 Massager**\n\nTap the green button to start the massage, and the watch is in a vibrating state, tap the red button \nto end the massage state. \n\n**3.0 Menu style**\n\nThere are a variety of menu styles for users to choose. \n\n**3.1 Settings**\n\n1) You can select the watch language on the settings of the watch, or the watch language can be \nsynchronized with your mobile phone language after the watch successfully binds to the APP. \n2) Switch the watch face, swipe to the right to view the next watch face, select a watch face, and \nclick it to set the watch face. \n3) Set screen time; a variety of screen time lengths can be selected. \n4) Vibration intensity; set reminder vibration intensity. \n5) Password; a 4-digit password can be set (if you forget the password, please enter 8762 to \ndecrypt the previous password). \n6) Restore factory settings; click √ to enable the factory reset, and click X to cancel the factory \nreset. ", - "page_start": 5, - "page_end": 5, - "source_file": "6126797.pdf" + "text": "", + "page_start": 297, + "page_end": 297, + "source_file": "00-80T-80.pdf" }, { - "text": "smart watch, and click \"Forget this device\". The “About” of the watch has an “Unbind” \n\nbutton, click it to unbind or do it in the APP. For the safety of users’ data, the watch will implement a \n\nfactory reset after that. ", - "page_start": 8, - "page_end": 8, - "source_file": "6126797.pdf" + "text": "", + "page_start": 11, + "page_end": 11, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "**1.4 Phone/Call History**\n\n1. Swipe to the left when the watch is in the watch interface, click the calling icon to turn on/off \nthe calling Bluetooth. Turn on the calling Bluetooth, you will find the name of the calling \nBluetooth, then go to the Bluetooth settings of your mobile phone, and bind the Bluetooth in the \nname of the calling Bluetooth of your watch. You can use the watch to make phone calls when \nthey are successfully bound. \n2. Call records, which can save the records of incoming and dialed calls. (It can save more than 50 \ncall records, and it will be automatically overwritten when 128 records are full. Click any call \nrecord to call back) \n3. Dial the keyboard, you can enter the phone number to make a call. \n\n**1.5 message**\n\nWhen the watch is successfully bound to the app, and you approve notifications of corresponding \napps in your mobile phone system, and switch on these apps or callings notifications functions on \nyour watch, the notifications on your mobile phone can synchronize to your watch. \n1.5.1. Incoming call notification: \nTurn on the incoming call reminder in the app. When the phone has a incoming call, the watch \nwill light up or vibrate. \n1.5.2. SMS notification: ", - "page_start": 3, - "page_end": 3, - "source_file": "6126797.pdf" + "text": "", + "page_start": 298, + "page_end": 298, + "source_file": "00-80T-80.pdf" }, { - "text": "**Streaming**\n\nStreaming data lets you to gather analytical insights from your application and process them in \n\nreal-time. Streaming typically presents a unique set of design and architectural challenges. \n\nLambda and Amazon Kinesis can process real-time streaming data for application activity tracking, \n\ntransaction order processing, click-stream analysis, data cleansing, log filtering, indexing, social \n\nmedia analysis, Internet of Things (IoT) device data telemetry, and metering. \n\n•**Data and analytics**— Suppose you are building an analytics application and storing raw data \nin a DynamoDB table. When you write, update, or delete items in a table, DynamoDB streams \n\ncan publish item update events to a stream associated with the table. In this case, the event data \n\nprovides the item key, event name (such as insert, update, and delete), and other relevant details. \n\nYou can write a Lambda function to generate custom metrics by aggregating raw data. \n\n•**Monitoring metrics**— Amazon Prime Video monitors metrics from devices worldwide to \n\nensure quality-of-service. The team chose Amazon Kinesis Data Streams to deliver video stream ", - "page_start": 10, - "page_end": 10, - "source_file": "serverless-core.pdf" + "text": "", + "page_start": 298, + "page_end": 298, + "source_file": "00-80T-80.pdf" }, { - "text": "2.1 Unconnected to the APP state: \n\nAfter the watch is turned on, the Bluetooth will be in the state of being searched. After open the \nAPK/APP, go to Devices > Add Device > click to start searching, select and click the \ncorresponding watch device name, and the watch will be successfully bound to the app. ", - "page_start": 6, - "page_end": 6, - "source_file": "6126797.pdf" + "text": "", + "page_start": 298, + "page_end": 298, + "source_file": "00-80T-80.pdf" } ] }, @@ -18075,64 +18075,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 274, + "page_end": 274, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 338, + "page_end": 338, + "source_file": "00-80T-80.pdf" }, { - "text": "Enable the SMS notification in the app. When one or more SMS messages are received on the \nmobile phone, the watch will receive one or more SMS reminders at the same time. \n1.5.3. Other application message notifications: \nTurn on the corresponding application message notification in the app, such as WeChat, QQ, \nOutlook, Facebook and other applications. When the mobile phone receives one/multiple \napplication message notifications, the watch will receive one/multiple corresponding message \nreminders at the same time. \n\n**1.6 Frequently used contacts**\n\nThe watch binds to the app, and you allow the watch to access to the phone book of your mobile \nphone, then you can synchronize you contacts of your mobile phone to the smartwatch. \n\n**1.7 Fitness data**\n\nFitness data is turned on by default. When you enter the fitness data interface, scroll up the \nscreen, the smartwatch will display the current data of steps, distance, and calories. The data will \nbe wiped out at 00:00 every day in the morning. \n\n**1.8 Sports modes**(walking, running, cycling, rope skipping, badminton, \n\nbasketball, football) \n\n1.8.1 Select the corresponding exercise mode, click the “Start” button on the screen to start the \nexercise; click the “Start” button again to pause the recording of the exercise; click the “End” \nbutton to end the recording, and save to the data. \n1.8.2 The data can only be saved when the recording of the exercise is more than 1 minute; If the \nrecording time is less than 1 minute, the smartwatch will remind you that the data is too little to be \nsaved. ", - "page_start": 4, - "page_end": 4, - "source_file": "6126797.pdf" + "text": "", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "**2.3 stopwatch**\n\nClick the stopwatch to enter the timing interface, and you can record the time once. \n\n**2.4 Weather**\n\nAfter the smartwatch is connected to the app and the data is synchronized, tap Weather on the \nwatch to display the weather information for the day. \n\n**2.5 Find mobile phone**\n\nAfter the watch is bound to the app WearPro, tap this function to find the mobile phone, and the \nmobile phone will vibrate or emit a ringtone. \n\n**2.6 Meteorology**\n\nClick on “Meteorology” on the watch to display the ultraviolet (UV) and air pressure conditions of \nthe day. \n\n**2.7 Massager**\n\nTap the green button to start the massage, and the watch is in a vibrating state, tap the red button \nto end the massage state. \n\n**3.0 Menu style**\n\nThere are a variety of menu styles for users to choose. \n\n**3.1 Settings**\n\n1) You can select the watch language on the settings of the watch, or the watch language can be \nsynchronized with your mobile phone language after the watch successfully binds to the APP. \n2) Switch the watch face, swipe to the right to view the next watch face, select a watch face, and \nclick it to set the watch face. \n3) Set screen time; a variety of screen time lengths can be selected. \n4) Vibration intensity; set reminder vibration intensity. \n5) Password; a 4-digit password can be set (if you forget the password, please enter 8762 to \ndecrypt the previous password). \n6) Restore factory settings; click √ to enable the factory reset, and click X to cancel the factory \nreset. ", + "text": "", "page_start": 5, "page_end": 5, - "source_file": "6126797.pdf" + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "3) Swipe to the right when the watch is in the dial interface, you can find time/date/week/the latest \nmessage (enter to view multiple messages)/some of the recently used menu functions, and turn on \nor off audio Bluetooth for calls. \n4) Swipe up the screen when the watch is in the dial interface to enter the menu interface, and \nscroll up and down to find the corresponding function. \n5) Long press the watch face interface and swipe to right or left to switch the watch face, select \none of them and set it with one-click. \n\n**1.2 App notification**\n\n1) When the watch is bound to the APP, and you allow the watch to display notifications on the \nwatch, the new messages received in your mobile phone will be pushed to the watch, and a total of \n10 messages can be saved. The messages received after 10 messages will be overwritten one by \none. \n2) Swipe to the bottom to click the delete icon to clear all message records. \n\n**1.3 Drop-down menu**\n\nScroll down the screen when the watch is in the dial interface to enter the drop-down menu \ninterface. \n1) Bluetooth connection status; time; power left; \n2) About, where you can check the firmware version of watch and the address of the Bluetooth \n3) Setting, where you can enter it to set part of the functions; \n4) Brightness adjustment; where you can adjust the brightness of the screen; \n5) Alipay. Download the app Alipay in your mobile phone and bind it with your watch to realize \noffline payment. ", - "page_start": 3, - "page_end": 3, - "source_file": "6126797.pdf" + "text": "", + "page_start": 337, + "page_end": 337, + "source_file": "00-80T-80.pdf" }, { - "text": "smart watch, and click \"Forget this device\". The “About” of the watch has an “Unbind” \n\nbutton, click it to unbind or do it in the APP. For the safety of users’ data, the watch will implement a \n\nfactory reset after that. ", - "page_start": 8, - "page_end": 8, - "source_file": "6126797.pdf" + "text": "", + "page_start": 337, + "page_end": 337, + "source_file": "00-80T-80.pdf" }, { - "text": "2.1 Unconnected to the APP state: \n\nAfter the watch is turned on, the Bluetooth will be in the state of being searched. After open the \nAPK/APP, go to Devices > Add Device > click to start searching, select and click the \ncorresponding watch device name, and the watch will be successfully bound to the app. ", - "page_start": 6, - "page_end": 6, - "source_file": "6126797.pdf" + "text": "", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "**1.4 Phone/Call History**\n\n1. Swipe to the left when the watch is in the watch interface, click the calling icon to turn on/off \nthe calling Bluetooth. Turn on the calling Bluetooth, you will find the name of the calling \nBluetooth, then go to the Bluetooth settings of your mobile phone, and bind the Bluetooth in the \nname of the calling Bluetooth of your watch. You can use the watch to make phone calls when \nthey are successfully bound. \n2. Call records, which can save the records of incoming and dialed calls. (It can save more than 50 \ncall records, and it will be automatically overwritten when 128 records are full. Click any call \nrecord to call back) \n3. Dial the keyboard, you can enter the phone number to make a call. \n\n**1.5 message**\n\nWhen the watch is successfully bound to the app, and you approve notifications of corresponding \napps in your mobile phone system, and switch on these apps or callings notifications functions on \nyour watch, the notifications on your mobile phone can synchronize to your watch. \n1.5.1. Incoming call notification: \nTurn on the incoming call reminder in the app. When the phone has a incoming call, the watch \nwill light up or vibrate. \n1.5.2. SMS notification: ", - "page_start": 3, - "page_end": 3, - "source_file": "6126797.pdf" + "text": "", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "**7. Do not disturb mode**\n\nIn the APP, tap “Device” > “More” > “Do not disturb mode”, set the start to end time, such as \n12:00 to 14:00, then you won’t receive phone calls and apps notifications on the watch during this \nperiod. \n\n**8. Daily alarm clock**\n\nIn the APP in the APP Device>More, set the start and the end time, the alarm can be set only once \nor repeatedly on the date (week) setting, and the alarm can be turned on/off. \n\n**9. Sedentary reminder**\n\nSet the start and the end time of the sedentary reminder, and the time interval (minutes) in the \nAPP. You can set the reminder for once or to repeat regularly by entering the repeating setting. \nWhen the sedentary time is reached, the watch will vibrate and display a sedentary icon on the \nscreen. \n\n**10. Drink water reminder**\n\nSet the reminder frequency (minutes) and the time period of the start and the end in a day in the \nAPP. You can set the reminder for once or to repeat regularly by entering the repeating setting \nand selecting the date (week) of the water reminder. When the time of drink water reminder is \nreached, the watch will vibrate and there will be a water icon on the screen. ", - "page_start": 7, - "page_end": 7, - "source_file": "6126797.pdf" + "text": "", + "page_start": 337, + "page_end": 337, + "source_file": "00-80T-80.pdf" }, { - "text": "Sports smart watch \nUser Manual \nDT3 Mate \n\n", - "page_start": 1, - "page_end": 1, - "source_file": "6126797.pdf" + "text": "", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_SMFG_2011.pdf" } ] }, @@ -18149,64 +18149,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 358, + "page_end": 358, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 356, + "page_end": 356, + "source_file": "sg246915.pdf" }, { - "text": "information, both good and bad, so the level and rate of \n\ninformation from dealers and consumers have gone up \n\naccordingly. Meanwhile, even prices for used Nissan \n\nvehicles are improving steadily, a major indication that the \n\nNissan brand is recognized and valued. \n\nOur home market is of prime importance to Nissan. \n\nJapan is a major contributor to our total profit, and we will \n\ncontinue to make the upgrades in quality, products and \n\nservice needed to drive sales and profit higher.” ", - "page_start": 62, - "page_end": 62, - "source_file": "OTC_NSANY_2004.pdf" + "text": "", + "page_start": 360, + "page_end": 360, + "source_file": "sg246915.pdf" }, { - "text": "Europe \n\nNissan Europe S.A.S. \n\nNissan International Finance \n(Netherlands) B.V. \n\nNissan France S.A. \n\nNissan Motor (GB) Ltd. \n\nNissan Holding (UK) Ltd. \n\nNissan Italia S.p.A. \n\nNissan Motor Manufacturing \n(UK) Ltd. \n\nNissan Technical Center \nEurope Ltd. \n\nNissan Forklift Europe B.V. \n\nNissan Motor Iberica, S.A. \n\nNissan Motor Espana, S.A. \n\nNissan Forklift Espana, S.A. \n\nAustralia \n\nNissan Motor Co. (Australia) Pty. Ltd. Dandenong, Victoria \n\nNew Zealand \n\nNissan New Zealand Ltd. Auckland ", - "page_start": 109, - "page_end": 109, - "source_file": "OTC_NSANY_2004.pdf" + "text": "", + "page_start": 360, + "page_end": 360, + "source_file": "sg246915.pdf" }, { - "text": "NISSAN HAS A GLOBAL PRESENCE. BORN IN JAPAN, WE ARE PERFECTLY \n\nAT HOME IN THE U.S., THE UK, SPAIN, THAILAND, CHINA, EGYPT, BRAZIL \n\nAND WELL OVER 150 OTHER NATIONS WHERE NISSAN CARS AND \n\nTHEIR COMPONENT PARTS ARE PRODUCED, SOLD AND DRIVEN. \n\nWITH NISSAN, DRIVING PLEASURE IS A SENSATION THAT KNOWS NO BORDERS. \n\nTHIS IS THE NISSAN SHIFT_", - "page_start": 60, - "page_end": 60, - "source_file": "OTC_NSANY_2004.pdf" + "text": "", + "page_start": 360, + "page_end": 360, + "source_file": "sg246915.pdf" }, { - "text": "Nissan Real Estate Development \nCorporation \n\nNissan Finance Co., Ltd. Tokyo \n\nAichi Nissan Motor Co., Ltd. Nagoya, Aichi \n\nTokyo Nissan Motor Sales Co., Ltd. Tokyo \n\nNissan Prince Tokyo Motor Sales \nCo., Ltd. \nTokyo \n\nNissan Chuo Parts Sales Co., Ltd. Yokohama, Kanagawa \n\nUS \n\nNissan North America, Inc. \n\nNissan Motor Acceptance Corporation Torrance California \n\nNissan Motor Corporation \nin Hawaii, Ltd. \nHonolulu, Hawaii \n\nNissan Capital of America, Inc. Torrance, California \n\nNissan Technical Center \nNorth America, Inc. Farmington Hills \nMichigan \n\nNissan Motor Insurance Corporation Honolulu, Hawaii \n\nNissan Forklift Co., North America Marengo, Illinois \n\nCanada \n\nNissan Canada, Inc. Mississauga, Ontario \n\nMexico \n\nNissan Mexicana, S.A. de C.V. Mexico D.F. ", - "page_start": 108, - "page_end": 108, - "source_file": "OTC_NSANY_2004.pdf" + "text": "", + "page_start": 360, + "page_end": 360, + "source_file": "sg246915.pdf" }, { - "text": "“The evolution that took place in Nissan’s purchasing \n\nactivities during the Nissan Revival Plan, or NRP, and \n\ncontinued through NISSAN 180, will stretch even further \n\nduring NISSAN Value-Up. Why evolution and not \n\nrevolution? Because the shift in purchasing that started \n\nsix years ago was not a single action, it was a mindset \n\nchange that continues to drive all our activities. \n\nPurchasing represents the single largest area of \n\ncost for Nissan. Through the NISSAN Value-Up \n\nbusiness plan, we are determined to drive greater \n\nvalue from our purchasing activities and maintain the \n\nmomentum built over the last six years. \n\nDuring the Nissan Revival Plan years, our focus \n\nwas on catching up with the rest of the industry. \n\nNISSAN 180 was focused on reaching the \n\nbenchmarks set during NRP and now as we enter the \n\nNISSAN Value-Up period, that focus evolves towards \n\nbeing the global cost leader. \n\nOne of the key breakthrough strategies of \n\nNISSAN Value-Up is the focus on new and emerging \n\nmarkets. On the sales side, markets like China, India, \n\nRussia and ASEAN represent significant opportunities \n\nfor Nissan. On the purchasing side, we look at the ", - "page_start": 50, - "page_end": 50, - "source_file": "OTC_NSANY_2004.pdf" + "text": "", + "page_start": 6, + "page_end": 6, + "source_file": "NASDAQ_FFIN_2002.pdf" }, { - "text": "**Share Performance in Fiscal 2004**\n\nNissan’s share price began at ¥1,143 at the beginning \n\nof fiscal 2004 and ended the fiscal year at ¥1,099, \n\ngenerating a negative return of 3.85 percent. Total \n\nshareholder return (TSR) was -1.67 percent, while the \n\ndividend yield came to 2.18 percent (¥24 per share dividend, \n\ndivided by the ¥1,099 closing price). Adverse movements \n\nin foreign exchange rates and commodity price hikes \n\nadversely affected Nissan’s profitability, which was reflected \n\nin the share price. In addition, specific events relating \n\ndirectly to the company also had a negative impact. Later in \n\nthis report, corporate officers will explain what actions \n\nNissan has undertaken to ensure better performance. \n\n**Payout Policy**\n\nNissan announced its NISSAN Value-Up three-year dividend \n\npolicy, covering the period from fiscal 2005 to fiscal 2007, at \n\nthe annual general meeting of shareholders on June 23, \n\n2004. Nissan proposes a long-term dividend policy to \n\nprovide more visibility and improve transparency into the \n\nways in which Nissan rewards its shareholders. Nissan \n\nbelieves that a long-term dividend policy reduces uncertainty \n\nfor investors who already own or are considering acquiring \n\nNissan stock. ", - "page_start": 17, - "page_end": 17, - "source_file": "OTC_NSANY_2004.pdf" + "text": "", + "page_start": 356, + "page_end": 356, + "source_file": "sg246915.pdf" }, { - "text": "Due to changes in government regulations, information on risks \ninvolved in business operations has been disclosed in the \nYukashoken-Houkokusho for the year ended March 31,2005 \nas follows: \nand that the outcome may be significantly different from that anticipated. \nAs a result, any such verdict or settlement could adversely affect Nissan’s \nfinancial position and operating results. \n\nGovernment Regulations \nThe automobile industry worldwide is influenced by a broad spectrum of \nregulations governing the emission levels of exhaust fumes, fuel economy \nguidelines, noise level limitations and safety standards, and Nissan expects \nthese regulations to become increasingly stringent. In order to ensure \ncompliance, it may be necessary for Nissan to make significant ongoing \ninvestments in these areas which would have an impact on its financial \nposition and results of operations. \n\nEconomic Factors \nThe demand for products manufactured by Nissan is affected by the \neconomic conditions in each country or market in which they are offered \nfor sale. Nissan conducts its operations all over the world and, in particular, \nin the major markets of North America, Europe, and Asia, to say nothing of \nJapan. While Nissan strives to develop a comprehensive and integrated \nprojection of the global economic outlook, any greater-than-anticipated \ndownturn in one of these markets may have a significant effect on Nissan \nfinancial position and results of operations. \n\nInternational Activities and Overseas Expansion \nNissan’s manufacturing and marketing activities outside Japan are \nconducted in the United States, in Europe, and in the developing and \nemerging markets of Asia. Nissan forecasts and evaluates a wide variety of \nrisks inherent in doing business in such overseas markets including the \nfollowing factors, each of which entails a greater-than-anticipated level of \nrisk: ", - "page_start": 73, - "page_end": 73, - "source_file": "OTC_NSANY_2004.pdf" + "text": "", + "page_start": 356, + "page_end": 356, + "source_file": "sg246915.pdf" }, { - "text": "Derivatives \nNissan utilizes derivatives transactions for the purpose of hedging its \nexposure to fluctuation in foreign exchange rates, interest rates and \ncommodity prices. While Nissan can hedge against these risks by using \nderivatives transactions, Nissan, by so doing, may miss the potential gains \nwhich could result from seizing the market opportunities to profit from such \nfluctuation in exchange rates and interest rates. \nIn addition, Nissan manages its exposure to credit risk by limiting its \ncounterparties to financial institutions with high credit ratings. However, a \ndefault by any one of these counterparties could have an adverse effect on \nNissan’s financial position and operating results. \n\nPurchase of raw materials and parts \nNissan purchases raw materials and parts from many suppliers. Market \nconditions that Nissan can’t control and whether or not the suppliers can \nprocure raw materials and parts continuously may adversely affect Nissan’s \nfinancial position and results of operations. \n\nLawsuits and Claims \nWith respect to various lawsuits and claims which Nissan encounters, the \npossibility exists that the position defended by Nissan will not be accepted \n\nNissan Annual Report 2004**71**", - "page_start": 73, - "page_end": 73, - "source_file": "OTC_NSANY_2004.pdf" + "text": "", + "page_start": 328, + "page_end": 328, + "source_file": "00-80T-80.pdf" } ] }, @@ -18223,64 +18223,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 47, + "page_end": 47, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 367, + "page_end": 367, + "source_file": "00-80T-80.pdf" }, { - "text": "Illumination \nControls \n**Model AY11230**\n\n**MICROSCOPE USAGE**\n\nBARSKA Model AY11230 and Model AY11234 are trinocular \nmicroscopes designed for biological studies such as specimen \nexamination. They can also be used for examining bacteria and for \ngeneral clinical and medical studies. Simple design and use and the \nvertical tube make them is useful for school classroom instruction. ", - "page_start": 6, - "page_end": 6, - "source_file": "Microscope Manual.pdf" + "text": "", + "page_start": 367, + "page_end": 367, + "source_file": "00-80T-80.pdf" }, { - "text": "**Fig. 1 - Objective Parts**\n\n10. If the image is in focus with the 10x objective, you can select \n other objectives and observe the specimen even if the fine \n adjustment knob has not been used by using the following \n method (See Fig. 1): \nAperture of \nDiaphragm \n\n1. Unscrew the 40x or 100x objective and remove from \n turret. \n2. Remove the mark sleeve. \n3. Turn the ring on the objective to adjust its parfocal \n distance. \n4. Re-insert the objective and compare with the 10x. \n5. Adjust until the 40x and 100x objectives image is clear. \n\n**Fig. 2 - Condenser Diaphram Aperture**\n\n**TROUBLESHOOTING**\n\n**USING THE CEDAR OIL**\n\n1. Drop some cedar oil on to the top of the 100x objective when the \n 100x objective is being used. NOTE: To maintain a good quality \n image, rotate the turret right and left several times to eliminate \n bubbles in the cedar oil. \n2. After finishing the observation, wipe off the cedar oil. \n3. Do not use the 40x objective until you have wiped off all of the \n cedar oil. ", - "page_start": 10, - "page_end": 10, - "source_file": "Microscope Manual.pdf" + "text": "", + "page_start": 367, + "page_end": 367, + "source_file": "00-80T-80.pdf" }, { - "text": "**MODEL AY11240/AY11238**\n\nEyepiece \n\nEyepiece Monocular Tube \n\nEyepiece \nSet Screw \n\nRotating Head \n\nStage Height \nLimit Adjustment \nBarrel \n\nRevolving \nTurret \n\nCoarse \nAdjustment \nKnob \nStand \nRevolving Turret \n\nObjectives \n\nObjectives \nSpring \nClips \nCoarse \nAdjustment \nKnob Fine \nAdjustment \nKnob \nSpring Clips \n\n**IMPORTANT NOTES**\nStage \nStand \n\n5-Hole \nDiaphragm \nand Condenser \nFine \nAdjustment \nKnob \nStage \n\nCongratulations on your purchase of this high quality BARSKA \nmicroscope. With proper care, this microscope will provide many \nyears of use. Please read the following instructions before \noperating this instrument. \n1. Do not attempt to disassemble the instrument. This product has \n been carefully assembled at the factory and should only be \n examined by a factory-trained technician. \n2. This instrument should only be used in an environment with an \n indoor temperature range of 32oF to 104oF. \n3. Do not use this instrument in an environment with a lot of dust. \n**Cover the instrument when not in use.**\n4. Do not subject the instrument to shock. \n\n5-Hole \nDiaphragm \nand Condenser \nConcave \nMirror \nPower \nCord Lamp \n\nLamp \nOn/Off \nSwitch \n\n**Model AY11240** **Model AY11238**\n\n**MICROSCOPE USAGE**", - "page_start": 2, - "page_end": 2, - "source_file": "Microscope Manual.pdf" + "text": "", + "page_start": 78, + "page_end": 78, + "source_file": "00-80T-80.pdf" }, { - "text": "**Model AY11236**\n\n**MICROSCOPE USAGE**\n\nBARSKA Model AY11236 is a powerful fixed power compound \nmicroscope designed for biological studies such as specimen \nexamination. It can also be used for examining bacteria and \nfor general clinical and medical studies and other scientific uses. \n\n**CHANGING THE BULB**\n1. Disconnect the power cord. \n2. When the bulb is cool, remove the \n oblique illuminator cap and remove \n the halogen bulb with cap. \n3. Replace with a new halogen bulb. \n4. Open the window in the base plate and \n replace the halogen lamp or \n fluorescent lamp of transmitted \n illuminator. \n\n**CONSTRUCTION**\n\nBARSKA Model AY11236 is a fixed power compound microscope. \nIt is constructed with two optical paths at the same angle. It is \nequipped with transmitted illumination. By using this instrument, \nthe user can observe specimens at magnification from 40x to \n1000x by selecting the desired objective lens. Coarse and fine \nfocus adjustments provide accuracy and image detail. The rotating \nhead allows the user to position the eyepieces for maximum \nviewing comfort and easy access to all adjustment knobs. ", - "page_start": 8, - "page_end": 8, - "source_file": "Microscope Manual.pdf" + "text": "", + "page_start": 78, + "page_end": 78, + "source_file": "00-80T-80.pdf" }, - { - "text": "\n**Model AY11234**", - "page_start": 6, - "page_end": 6, - "source_file": "Microscope Manual.pdf" + { + "text": "", + "page_start": 367, + "page_end": 367, + "source_file": "00-80T-80.pdf" }, { - "text": "| Problem | Possible Cause | Solution |\n|---|---|---|\n| Problem | Possible Cause | Solution |\n| 1. Image not clear. | 1.Specimen is in incorrect position. 2. Lens is dirty. 3. Cedar oil not placed on immersion objective. 4. Bubbles in Cedar oil. 5. Cedar oil on 40x objective. 6. Iris diaphragm open too wide. | 1. Re-position specimen. 2. Clean lens. 3. Put a drop of Cedar oil on immersion objective. 4. Rotate turret several times to eliminate bubbles. 5. Clean 40x objective. 6. Reduce size of iris diaphragm. |\n| 2. Poor illumination. | 1. Condenser position is incorrect. 2. Lens is dirty. 3. Specimen is not placed level. | 1. Re-position condenser. 2. Clean lens. 3. Re-position specimen so it is level. |\n| 3. Illumination not bright. | 1. Iris diaphragm opening too small. 2. Position of condenser too low. 3. Lens is dirty. | 1. Open iris diaphragm wider. 2. Raise condenser. 3. Clean lens. |\n| 4. Cannot focus at high magnification. | 1. Specimen is in incorrect position. | 1. Re-position specimen. |\n| 5. Objective lenses touch specimen. | 1. Stage is too high. | 1. Re-position stage. |\n", - "page_start": 10, - "page_end": 10, - "source_file": "Microscope Manual.pdf" + "text": "", + "page_start": 78, + "page_end": 78, + "source_file": "00-80T-80.pdf" }, { - "text": "**OPERATION (cont.)** **MODEL AY11236**\n\nInterpupillary Slide Adjustment \n**Model AY11230** **Model AY11234**\n\n**SELECTING OBJECTIVE**\n**MAGNIFICATION**\n1. There are two objectives. The lower \n magnification objective has a greater \n depth of field and view. \n2. In order to observe the specimen \n easily use the lower magnification \n objective first. Then, by rotating the \n case, the magnification can be \n changed. \n\n**FOCUSING**\n1. Turn the focusing knob away or toward \n you until a clear image is viewed. \n2. If the image is unclear, adjust the \n height of the elevator up or down, \n then turn the focusing knob again. \n\nRotating Head \n\nRevolving Turret \n\n**ZOOM MAGNIFICATION**\n1. Turn the zoom magnification knob to \n the desired magnification and field of \n view. \n2. In most situations, it is recommended \n that you focus at the lowest \n magnification, then move to a higher \n magnification and re-focus as \n necessary. \n3. If the image is not clear to both eyes \n at the same time, the diopter ring may \n need adjustment. \n\nObjectives \n\nStage \n\nCondenser \nFocusing \nKnob \n\nLamp \nOn/Off \nSwitch ", - "page_start": 8, - "page_end": 8, - "source_file": "Microscope Manual.pdf" + "text": "", + "page_start": 78, + "page_end": 78, + "source_file": "00-80T-80.pdf" }, { - "text": "**OPERATION (cont.)** **MODEL AY11230/AY11234**\n\n**Model AY11228** **Model AY11232**\nVertical \nTube Vertical \nTube \nDiopter \nAdjustment \n\n**SELECTING OBJECTIVE**\n**MAGNIFICATION**\n1. There are two objectives. The lower \n magnification objective has a greater \n depth of field and view. \n2. In order to observe the specimen \n easily use the lower magnification \n objective first. Then, by rotating the \n case, the magnification can be \n changed. \n\n**FOCUSING**\n1. Turn the focusing knob away or toward \n you until a clear image is viewed. \n2. If the image is unclear, adjust the \n height of the elevator up or down, \n then turn the focusing knob again. \n\nDiopter \nAdjustment Eyepiece \nEyepiece \n\nPrism \nCap \n\nPrism \nCap \nFocus \nKnob \n\n**ZOOM MAGNIFICATION**\n1. Turn the zoom magnification knob to \n the desired magnification and field of \n view. \n2. In most situations, it is recommended \n that you focus at the lowest \n magnification, then move to a higher \n magnification and re-focus as \n necessary. \n3. If the image is not clear to both eyes \n at the same time, the diopter ring may \n need adjustment. \n\nMagnification \nAdjustment \nKnob \n\nRotary \nCase \nFocus \nKnob \nLens \nHousing \n\nOblique \nIlluminator \nLens \n\nTightening \nKnob Oblique \nIlluminator \nSpring \nClips \n\nSpring \nClips \nStage \nIllumination \nControls \nStage ", - "page_start": 6, - "page_end": 6, - "source_file": "Microscope Manual.pdf" + "text": "", + "page_start": 78, + "page_end": 78, + "source_file": "00-80T-80.pdf" } ] }, @@ -18291,70 +18291,70 @@ "target_page": 7, "target_passage": "Model AY11230 1. Interpupillary Adjustment: 55mm - 75mm", "chunk_present": { - "presence": true, - "index": 7 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 175, + "page_end": 175, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 67, + "page_end": 67, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "**CHANGING THE INTERPUPILLARY**\n**DISTANCE**\n1. The distance between the observer's \n pupils is the interpupillary distance. \n2. To adjust the interpupillary distance \n rotate the prism caps until both eyes \n coincide with the image in the \n eyepiece. ", - "page_start": 8, - "page_end": 8, - "source_file": "Microscope Manual.pdf" + "text": "", + "page_start": 259, + "page_end": 259, + "source_file": "00-80T-80.pdf" }, { - "text": "**CHANGING THE INTERPUPILLARY**\n**DISTANCE**\n1. The distance between the observer's \n pupils is the interpupillary distance. \n2. To adjust the interpupillary distance \n rotate the prism caps until both eyes \n coincide with the image in the \n eyepiece. ", - "page_start": 6, - "page_end": 6, - "source_file": "Microscope Manual.pdf" + "text": "", + "page_start": 69, + "page_end": 69, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "**Model AY11230**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Tighten the knob on the stand to \n prevent the elevator from sliding \n down. \n3. Fix the binocular body on the stand \n with the tightening screw. \n4. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment Knobs \n change the oblique or transmitted light \n independently. The transmitted \n illuminator fluorescent lamp cannot be \n adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting of \n the sample. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment knobs \n change the oblique or transmitted \n light independently. The transmitted \n illuminator fluorescent lamp cannot \n be adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting \n of the sample. \n\n**CHANGING THE INTERPUPILLARY**\n**DISTANCE**\n1. The distance between the observer's \n pupils is the interpupillary distance. \n2. To adjust the interpupillary distance \n rotate the prism caps until both eyes \n coincide with the image in the \n eyepiece. ", - "page_start": 7, - "page_end": 7, - "source_file": "Microscope Manual.pdf" + "text": "", + "page_start": 259, + "page_end": 259, + "source_file": "00-80T-80.pdf" }, { - "text": "**Model AY11228**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Tighten the knob on the stand to \n prevent the elevator from sliding \n down. \n3. Fix the binocular body on the stand \n with the tightening screw. \n4. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment Knobs \n change the oblique or transmitted light \n independently. The transmitted \n illuminator fluorescent lamp cannot be \n adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting of \n the sample. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment knobs \n change the oblique or transmitted \n light independently. The transmitted \n illuminator fluorescent lamp cannot \n be adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting \n of the sample. \n\n**CHANGING THE INTERPUPILLARY**\n**DISTANCE**\n1. The distance between the observer's \n pupils is the interpupillary distance. \n2. To adjust the interpupillary distance \n rotate the prism caps until both eyes \n coincide with the image in the \n eyepiece. ", - "page_start": 5, - "page_end": 5, - "source_file": "Microscope Manual.pdf" + "text": "", + "page_start": 259, + "page_end": 259, + "source_file": "00-80T-80.pdf" }, { - "text": "**MODEL AY11240/AY11238**\n\nEyepiece \n\nEyepiece Monocular Tube \n\nEyepiece \nSet Screw \n\nRotating Head \n\nStage Height \nLimit Adjustment \nBarrel \n\nRevolving \nTurret \n\nCoarse \nAdjustment \nKnob \nStand \nRevolving Turret \n\nObjectives \n\nObjectives \nSpring \nClips \nCoarse \nAdjustment \nKnob Fine \nAdjustment \nKnob \nSpring Clips \n\n**IMPORTANT NOTES**\nStage \nStand \n\n5-Hole \nDiaphragm \nand Condenser \nFine \nAdjustment \nKnob \nStage \n\nCongratulations on your purchase of this high quality BARSKA \nmicroscope. With proper care, this microscope will provide many \nyears of use. Please read the following instructions before \noperating this instrument. \n1. Do not attempt to disassemble the instrument. This product has \n been carefully assembled at the factory and should only be \n examined by a factory-trained technician. \n2. This instrument should only be used in an environment with an \n indoor temperature range of 32oF to 104oF. \n3. Do not use this instrument in an environment with a lot of dust. \n**Cover the instrument when not in use.**\n4. Do not subject the instrument to shock. \n\n5-Hole \nDiaphragm \nand Condenser \nConcave \nMirror \nPower \nCord Lamp \n\nLamp \nOn/Off \nSwitch \n\n**Model AY11240** **Model AY11238**\n\n**MICROSCOPE USAGE**", - "page_start": 2, - "page_end": 2, - "source_file": "Microscope Manual.pdf" + "text": "", + "page_start": 259, + "page_end": 259, + "source_file": "00-80T-80.pdf" }, { - "text": "**Model AY11230**\n1. Interpupillary Adjustment: 55mm - 75mm \n2. Working Stage Diameter: 95mm \n3. Focus Knob Adjustment Range: 60mm \n4. Elevator Adjustment Range: 110mm \n5. Right Diopter Adjustment Range: +4 to -6 dopters \n6. Illumination: \n Input Voltage: 110V AC or 220V \n Output: Oblique illumination: 12V 10W Halogen Lamp \n\n**Model AY11234**\n1. Interpupillary Adjustment: 55mm - 75mm \n2. Working Stage Diameter: 95mm \n3. Focus Knob Adjustment Range: >50mm \n4. Elevator Adjustment Range: 110mm \n5. Diopter Adjustment Range: +/- 5 diopters \n6. Illumination: \n Input Voltage: 110V AC or 220V \n Output: Oblique Illumination: 12V 10W Halogen Lamp \n Transmitted Illumination: 12V 10W Halogen Lamp ", - "page_start": 7, - "page_end": 7, - "source_file": "Microscope Manual.pdf" + "text": "", + "page_start": 68, + "page_end": 68, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "**Model AY11228**\n1. Interpupillary Adjustment: 55mm - 75mm \n2. Working Stage Diameter: 95mm \n3. Focus Knob Adjustment Range: 60mm \n4. Elevator Adjustment Range: 110mm \n5. Right Diopter Adjustment Range: +4 to -6 dopters \n6. Illumination: \n Input Voltage: 110V AC or 220V \n Output: Oblique illumination: 12V 10W Halogen Lamp \n\n**Model AY11232**\n1. Interpupillary Adjustment: 55mm - 75mm \n2. Working Stage Diameter: 95mm \n3. Focus Knob Adjustment Range: >50mm \n4. Elevator Adjustment Range: 110mm \n5. Diopter Adjustment Range: +/- 5 diopters \n6. Illumination: \n Input Voltage: 110V AC or 220V \n Output: Oblique Illumination: 12V 10W Halogen Lamp \n Transmitted Illumination: 12V 10W Halogen Lamp ", - "page_start": 5, - "page_end": 5, - "source_file": "Microscope Manual.pdf" + "text": "", + "page_start": 259, + "page_end": 259, + "source_file": "00-80T-80.pdf" }, { - "text": "Illumination \nControls \n**Model AY11230**\n\n**MICROSCOPE USAGE**\n\nBARSKA Model AY11230 and Model AY11234 are trinocular \nmicroscopes designed for biological studies such as specimen \nexamination. They can also be used for examining bacteria and for \ngeneral clinical and medical studies. Simple design and use and the \nvertical tube make them is useful for school classroom instruction. ", - "page_start": 6, - "page_end": 6, - "source_file": "Microscope Manual.pdf" + "text": "", + "page_start": 67, + "page_end": 67, + "source_file": "OTC_NSANY_2004.pdf" } ] }, @@ -18371,64 +18371,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 25, + "page_end": 25, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 324, + "page_end": 324, + "source_file": "00-80T-80.pdf" }, { - "text": "Illumination \nControls \n**Model AY11230**\n\n**MICROSCOPE USAGE**\n\nBARSKA Model AY11230 and Model AY11234 are trinocular \nmicroscopes designed for biological studies such as specimen \nexamination. They can also be used for examining bacteria and for \ngeneral clinical and medical studies. Simple design and use and the \nvertical tube make them is useful for school classroom instruction. ", - "page_start": 6, - "page_end": 6, - "source_file": "Microscope Manual.pdf" + "text": "", + "page_start": 325, + "page_end": 325, + "source_file": "00-80T-80.pdf" }, { - "text": "**Model AY11236**\n\n**MICROSCOPE USAGE**\n\nBARSKA Model AY11236 is a powerful fixed power compound \nmicroscope designed for biological studies such as specimen \nexamination. It can also be used for examining bacteria and \nfor general clinical and medical studies and other scientific uses. \n\n**CHANGING THE BULB**\n1. Disconnect the power cord. \n2. When the bulb is cool, remove the \n oblique illuminator cap and remove \n the halogen bulb with cap. \n3. Replace with a new halogen bulb. \n4. Open the window in the base plate and \n replace the halogen lamp or \n fluorescent lamp of transmitted \n illuminator. \n\n**CONSTRUCTION**\n\nBARSKA Model AY11236 is a fixed power compound microscope. \nIt is constructed with two optical paths at the same angle. It is \nequipped with transmitted illumination. By using this instrument, \nthe user can observe specimens at magnification from 40x to \n1000x by selecting the desired objective lens. Coarse and fine \nfocus adjustments provide accuracy and image detail. The rotating \nhead allows the user to position the eyepieces for maximum \nviewing comfort and easy access to all adjustment knobs. ", - "page_start": 8, - "page_end": 8, - "source_file": "Microscope Manual.pdf" + "text": "", + "page_start": 324, + "page_end": 324, + "source_file": "00-80T-80.pdf" }, { - "text": "BARSKA Model AY11230 is a fixed power trinocular stereo \nmicroscope. It is constructed with two optical paths at the same \nangle. It is equipped with transmitted illumination and oblique \nillumination. By using this instrument, the user can observe and \nenlarge the right side stereo image. BARSKA Model AY11234 is a \nzoom trinocular stereo microscope. The object being viewed is \nenlarged through two identical sized sets of right and left eye \nlenses. The zoom provides different magnification and features an \ninversion system which allows the image to be viewed normally \nand right side up. \n\n**10**", - "page_start": 6, - "page_end": 6, - "source_file": "Microscope Manual.pdf" + "text": "", + "page_start": 324, + "page_end": 324, + "source_file": "00-80T-80.pdf" }, { - "text": "\n**Model AY11234**", - "page_start": 6, - "page_end": 6, - "source_file": "Microscope Manual.pdf" + "text": "", + "page_start": 324, + "page_end": 324, + "source_file": "00-80T-80.pdf" }, { - "text": "**MODEL AY11240/AY11238**\n\nEyepiece \n\nEyepiece Monocular Tube \n\nEyepiece \nSet Screw \n\nRotating Head \n\nStage Height \nLimit Adjustment \nBarrel \n\nRevolving \nTurret \n\nCoarse \nAdjustment \nKnob \nStand \nRevolving Turret \n\nObjectives \n\nObjectives \nSpring \nClips \nCoarse \nAdjustment \nKnob Fine \nAdjustment \nKnob \nSpring Clips \n\n**IMPORTANT NOTES**\nStage \nStand \n\n5-Hole \nDiaphragm \nand Condenser \nFine \nAdjustment \nKnob \nStage \n\nCongratulations on your purchase of this high quality BARSKA \nmicroscope. With proper care, this microscope will provide many \nyears of use. Please read the following instructions before \noperating this instrument. \n1. Do not attempt to disassemble the instrument. This product has \n been carefully assembled at the factory and should only be \n examined by a factory-trained technician. \n2. This instrument should only be used in an environment with an \n indoor temperature range of 32oF to 104oF. \n3. Do not use this instrument in an environment with a lot of dust. \n**Cover the instrument when not in use.**\n4. Do not subject the instrument to shock. \n\n5-Hole \nDiaphragm \nand Condenser \nConcave \nMirror \nPower \nCord Lamp \n\nLamp \nOn/Off \nSwitch \n\n**Model AY11240** **Model AY11238**\n\n**MICROSCOPE USAGE**", - "page_start": 2, - "page_end": 2, - "source_file": "Microscope Manual.pdf" + "text": "", + "page_start": 324, + "page_end": 324, + "source_file": "00-80T-80.pdf" }, { - "text": "BARSKA Model AY11228 is a fixed power stereo microscope. It is \nconstructed with two optical paths at the same angle. It is \nequipped with transmitted illumination and oblique illumination. \nBy using this instrument, the user can observe and enlarge the \nright side stereo image. BARSKA Model AY11232 is a zoom stereo \nmicroscope. The object being viewed is enlarged through two \nidentical sized sets of right and left eye lenses. The zoom provides \ndifferent magnification and features an inversion system which \nallows the image to be viewed normally and right side up. \n\nHeavy-Light \nAdjustment Nut \n\n**Fig. 1- Coarse Adjustment Knob**\n\n**6**", - "page_start": 4, - "page_end": 4, - "source_file": "Microscope Manual.pdf" + "text": "", + "page_start": 324, + "page_end": 324, + "source_file": "00-80T-80.pdf" }, { - "text": "**COARSE KNOB ADJUSTMENT - Model AY11240**\n**MICROSCOPE USAGE**\n\n1. The coarse adjustment knob has an adjustable heavy-light nut \n (See Fig.1). \n2. To adjust the knob loosen or tighten the nut. \n NOTE: Adjusting the nut too tight will make focusing difficult. \n Adjusting the nut too loose will cause the tube to slide. \n\nBARSKA Model AY11228 and Model AY11232 are designed for \nbiological studies such as specimen examination. They can also \nbe used for examining bacteria and for general clinical and medical \nstudies. Simple design and use is especially useful for school \nclassroom instruction. ", - "page_start": 4, - "page_end": 4, - "source_file": "Microscope Manual.pdf" + "text": "", + "page_start": 22, + "page_end": 22, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": "**Model AY11230**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Tighten the knob on the stand to \n prevent the elevator from sliding \n down. \n3. Fix the binocular body on the stand \n with the tightening screw. \n4. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment Knobs \n change the oblique or transmitted light \n independently. The transmitted \n illuminator fluorescent lamp cannot be \n adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting of \n the sample. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment knobs \n change the oblique or transmitted \n light independently. The transmitted \n illuminator fluorescent lamp cannot \n be adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting \n of the sample. \n\n**CHANGING THE INTERPUPILLARY**\n**DISTANCE**\n1. The distance between the observer's \n pupils is the interpupillary distance. \n2. To adjust the interpupillary distance \n rotate the prism caps until both eyes \n coincide with the image in the \n eyepiece. ", - "page_start": 7, - "page_end": 7, - "source_file": "Microscope Manual.pdf" + "text": "", + "page_start": 22, + "page_end": 22, + "source_file": "NYSE_RCI_2013.pdf" } ] }, @@ -18445,64 +18445,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 225, + "page_end": 225, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 200, + "page_end": 200, + "source_file": "00-80T-80.pdf" }, { - "text": "**Narrow vs. general AI**\n\nAI researchers are divided as to whether to pursue the goals of artificial general intelligence and \nsuperintelligence directly or to solve as many specific problems as possible (narrow AI) in hopes these \nsolutions will lead indirectly to the field's long-term goals.[378][379] General intelligence is difficult to \ndefine and difficult to measure, and modern AI has had more verifiable successes by focusing on specific \nproblems with specific solutions. The sub-field of artificial general intelligence studies this area \nexclusively. ", - "page_start": 26, - "page_end": 26, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 199, + "page_end": 199, + "source_file": "00-80T-80.pdf" }, { - "text": "**Artificial intelligence**\n\n**Artificial intelligence**(**AI**), in its broadest sense, is intelligence exhibited by machines, particularly \ncomputer systems. It is a field of research in computer science that develops and studies methods and \nsoftware that enable machines to perceive their environment and use learning and intelligence to take \nactions that maximize their chances of achieving defined goals.[1] Such machines may be called AIs. \n\nHigh-profile applications of AI include advanced web search engines (e.g., Google Search); \nrecommendation systems (used by YouTube, Amazon, and Netflix); virtual assistants (e.g., Google \nAssistant, Siri, and Alexa); autonomous vehicles (e.g., Waymo); generative and creative tools (e.g., \nChatGPT and AI art); and superhuman play and analysis in strategy games (e.g., chess and Go). However, \nmany AI applications are not perceived as AI: \"A lot of cutting edge AI has filtered into general \napplications, often without being called AI because once something becomes useful enough and common \nenough it's not labeled AI anymore.\"[2][3] \n\nVarious subfields of AI research are centered around particular goals and the use of particular tools. The \ntraditional goals of AI research include reasoning, knowledge representation, planning, learning, natural \nlanguage processing, perception, and support for robotics.[a] General intelligence—the ability to complete \nany task performed by a human on an at least equal level—is among the field's long-term goals.[4] To \nreach these goals, AI researchers have adapted and integrated a wide range of techniques, including \nsearch and mathematical optimization, formal logic, artificial neural networks, and methods based on \nstatistics, operations research, and economics.[b] AI also draws upon psychology, linguistics, philosophy, \nneuroscience, and other fields.[5] ", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 95, + "page_end": 95, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "Several works use AI to force us to confront the fundamental question of what makes us human, showing \nus artificial beings that have the ability to feel, and thus to suffer. This appears in Karel Čapek's*R.U.R.*, \nthe films*A.I. Artificial Intelligence*and*Ex Machina*, as well as the novel*Do Androids Dream of Electric*\n*Sheep?*, by Philip K. Dick. Dick considers the idea that our understanding of human subjectivity is altered \nby technology created with artificial intelligence.[404] ", - "page_start": 28, - "page_end": 28, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 199, + "page_end": 199, + "source_file": "00-80T-80.pdf" }, { - "text": "Artificial intelligence was founded as an academic discipline in 1956,[6] and the field went through \nmultiple cycles of optimism throughout its history,[7][8] followed by periods of disappointment and loss of \nfunding, known as AI winters.[9][10] Funding and interest vastly increased after 2012 when deep learning \noutperformed previous AI techniques.[11] This growth accelerated further after 2017 with the transformer \narchitecture,[12] and by the early 2020s many billions of dollars were being invested in AI and the field \nexperienced rapid ongoing progress in what has become known as the AI boom. The emergence of \nadvanced generative AI in the midst of the AI boom and its ability to create and modify content exposed \nseveral unintended consequences and harms in the present and raised concerns about the risks of AI and \nits long-term effects in the future, prompting discussions about regulatory policies to ensure the safety \nand benefits of the technology. ", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 200, + "page_end": 200, + "source_file": "00-80T-80.pdf" }, { - "text": "The Turing test can provide some \nevidence of intelligence, but it \npenalizes non-human intelligent \nbehavior.[361] \n\nMcCarthy defines intelligence as \"the computational part of the \nability to achieve goals in the world\".[364] Another AI founder, \nMarvin Minsky similarly describes it as \"the ability to solve hard \nproblems\".[365] The leading AI textbook defines it as the study of \nagents that perceive their environment and take actions that maximize their chances of achieving defined \ngoals.[1] These definitions view intelligence in terms of well-defined problems with well-defined \nsolutions, where both the difficulty of the problem and the performance of the program are direct \nmeasures of the \"intelligence\" of the machine—and no other philosophical discussion is required, or may \nnot even be possible. \n\nAnother definition has been adopted by Google,[366] a major practitioner in the field of AI. This definition \nstipulates the ability of systems to synthesize information as the manifestation of intelligence, similar to \nthe way it is defined in biological intelligence. ", - "page_start": 24, - "page_end": 24, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 95, + "page_end": 95, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "Glossary of artificial intelligence – List of definitions of terms and concepts commonly used \nin the study of artificial intelligence \nIntelligence amplification – Use of information technology to augment human intelligence \nIntelligent agent – Software agent which acts autonomously \nMind uploading – Hypothetical process of digitally emulating a brain \nOrganoid intelligence – Use of brain cells and brain organoids for intelligent computing \nRobotic process automation – Form of business process automation technology \nWetware computer – Computer composed of organic material ", - "page_start": 29, - "page_end": 29, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 200, + "page_end": 200, + "source_file": "00-80T-80.pdf" }, { - "text": "**Symbolic AI and its limits**\nSymbolic AI (or \"GOFAI\")[370] simulated the high-level conscious reasoning that people use when they \nsolve puzzles, express legal reasoning and do mathematics. They were highly successful at \"intelligent\" \ntasks such as algebra or IQ tests. In the 1960s, Newell and Simon proposed the physical symbol systems \nhypothesis: \"A physical symbol system has the necessary and sufficient means of general intelligent \naction.\"[371] \n\nHowever, the symbolic approach failed on many tasks that humans solve easily, such as learning, \nrecognizing an object or commonsense reasoning. Moravec's paradox is the discovery that high-level \n\"intelligent\" tasks were easy for AI, but low level \"instinctive\" tasks were extremely difficult.[372] \nPhilosopher Hubert Dreyfus had argued since the 1960s that human expertise depends on unconscious \ninstinct rather than conscious symbol manipulation, and on having a \"feel\" for the situation, rather than \nexplicit symbolic knowledge.[373] Although his arguments had been ridiculed and ignored when they \nwere first presented, eventually, AI research came to agree with him.[ab][16] \n\nThe issue is not resolved: sub-symbolic reasoning can make many of the same inscrutable mistakes that \nhuman intuition does, such as algorithmic bias. Critics such as Noam Chomsky argue continuing research \ninto symbolic AI will still be necessary to attain general intelligence,[375][376] in part because sub- \nsymbolic AI is a move away from explainable AI: it can be difficult or impossible to understand why a \nmodern statistical AI program made a particular decision. The emerging field of neuro-symbolic artificial \nintelligence attempts to bridge the two approaches. ", - "page_start": 25, - "page_end": 25, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 200, + "page_end": 200, + "source_file": "00-80T-80.pdf" }, { - "text": "**Defining artificial intelligence**\nAlan Turing wrote in 1950 \"I propose to consider the question 'can machines think'?\"[359] He advised \nchanging the question from whether a machine \"thinks\", to \"whether or not it is possible for machinery to \nshow intelligent behaviour\".[359] He devised the Turing test, which measures the ability of a machine to \nsimulate human conversation.[323] Since we can only observe the behavior of the machine, it does not \nmatter if it is \"actually\" thinking or literally has a \"mind\". Turing notes that we can not determine these \nthings about other people but \"it is usual to have a polite convention that everyone thinks.\"[360] \n\nRussell and Norvig agree with Turing that intelligence must be \ndefined in terms of external behavior, not internal structure.[1] \nHowever, they are critical that the test requires the machine to \nimitate humans. \"Aeronautical engineering texts\", they wrote, \"do \nnot define the goal of their field as making 'machines that fly so \nexactly like pigeons that they can fool other pigeons.' \"[362] AI \nfounder \nthat \"Artificial \nintelligence \nis not, by definition, simulation of human \nintelligence\".[363] \n\nJohn McCarthy agreed, writing ", - "page_start": 24, - "page_end": 24, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_MGM_2004.pdf" } ] }, @@ -18513,70 +18513,70 @@ "target_page": 27, "target_passage": "possess intelligence far surpassing that of the brightest and most gifted human mind.", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 8, + "page_end": 8, + "source_file": "NYSE_GLW_2002.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 83, + "page_end": 83, + "source_file": "00-80T-80.pdf" }, { - "text": "**Superintelligence and the singularity**\n\nA superintelligence is a hypothetical agent that would possess intelligence far surpassing that of the \nbrightest and most gifted human mind.[379] If research into artificial general intelligence produced \nsufficiently intelligent software, it might be able to reprogram and improve itself. The improved software \nwould be even better at improving itself, leading to what I. J. Good called an \"intelligence explosion\" and \nVernor Vinge called a \"singularity\".[395] \n\nHowever, technologies cannot improve exponentially indefinitely, and typically follow an S-shaped \ncurve, slowing when they reach the physical limits of what the technology can do.[396] ", - "page_start": 27, - "page_end": 27, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 83, + "page_end": 83, + "source_file": "00-80T-80.pdf" }, { - "text": "Superintelligence\" (https://openai.com/blog/governance-of-superintelligence).*openai.com*. \nArchived (https://web.archive.org/web/20230527061619/https://openai.com/blog/governanc \ne-of-superintelligence) from the original on 27 May 2023. Retrieved 27 May 2023. \n\nAnderson, Susan Leigh (2008). \"Asimov's \"three laws of robotics\" and machine metaethics\".*AI*\n*& Society*.**22**(4): 477–493. doi:10.1007/s00146-007-0094-5 (https://doi.org/10.1007%2Fs0 \n0146-007-0094-5). S2CID 1809459 (https://api.semanticscholar.org/CorpusID:1809459). \n\nAnderson, Michael; Anderson, Susan Leigh (2011).*Machine Ethics*. Cambridge University \n\nPress. \n\nArntz, Melanie; Gregory, Terry; Zierahn, Ulrich (2016), \"The risk of automation for jobs in OECD \ncountries: A comparative analysis\",*OECD Social, Employment, and Migration Working*\n*Papers 189*", - "page_start": 53, - "page_end": 53, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 10, + "page_end": 10, + "source_file": "00-80T-80.pdf" }, { - "text": "**Narrow vs. general AI**\n\nAI researchers are divided as to whether to pursue the goals of artificial general intelligence and \nsuperintelligence directly or to solve as many specific problems as possible (narrow AI) in hopes these \nsolutions will lead indirectly to the field's long-term goals.[378][379] General intelligence is difficult to \ndefine and difficult to measure, and modern AI has had more verifiable successes by focusing on specific \nproblems with specific solutions. The sub-field of artificial general intelligence studies this area \nexclusively. ", - "page_start": 26, - "page_end": 26, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 83, + "page_end": 83, + "source_file": "00-80T-80.pdf" }, { - "text": "the future to warrant research or that humans will be valuable from the perspective of a superintelligent \nmachine.[282] However, after 2016, the study of current and future risks and possible solutions became a \nserious area of research.[283] ", - "page_start": 20, - "page_end": 20, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 83, + "page_end": 83, + "source_file": "00-80T-80.pdf" }, { - "text": "The Turing test can provide some \nevidence of intelligence, but it \npenalizes non-human intelligent \nbehavior.[361] \n\nMcCarthy defines intelligence as \"the computational part of the \nability to achieve goals in the world\".[364] Another AI founder, \nMarvin Minsky similarly describes it as \"the ability to solve hard \nproblems\".[365] The leading AI textbook defines it as the study of \nagents that perceive their environment and take actions that maximize their chances of achieving defined \ngoals.[1] These definitions view intelligence in terms of well-defined problems with well-defined \nsolutions, where both the difficulty of the problem and the performance of the program are direct \nmeasures of the \"intelligence\" of the machine—and no other philosophical discussion is required, or may \nnot even be possible. \n\nAnother definition has been adopted by Google,[366] a major practitioner in the field of AI. This definition \nstipulates the ability of systems to synthesize information as the manifestation of intelligence, similar to \nthe way it is defined in biological intelligence. ", - "page_start": 24, - "page_end": 24, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 47, + "page_end": 47, + "source_file": "basic-english-language-skills.PDF" }, { - "text": "Second, Yuval Noah Harari argues that AI does not require a robot body or physical control to pose an \nexistential risk. The essential parts of civilization are not physical. Things like ideologies, law, \ngovernment, money and the economy are built on language; they exist because there are stories that \nbillions of people believe. The current prevalence of misinformation suggests that an AI could use \nlanguage to convince people to believe anything, even to take actions that are destructive.[270] \n\nThe opinions amongst experts and industry insiders are mixed, with sizable fractions both concerned and \nunconcerned by risk from eventual superintelligent AI.[271] Personalities such as Stephen Hawking, Bill \nGates, and Elon Musk,[272] as well as AI pioneers such as Yoshua Bengio, Stuart Russell, Demis \nHassabis, and Sam Altman, have expressed concerns about existential risk from AI. \n\nIn May 2023, Geoffrey Hinton announced his resignation from Google in order to be able to \"freely speak \nout about the risks of AI\" without \"considering how this impacts Google.\"[273] He notably mentioned \nrisks of an AI takeover,[274] and stressed that in order to avoid the worst outcomes, establishing safety \nguidelines will require cooperation among those competing in use of AI.[275] ", - "page_start": 19, - "page_end": 19, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 83, + "page_end": 83, + "source_file": "00-80T-80.pdf" }, { - "text": "factor \nthe turbojet \naffecting the specific range of \nairplane. Any operation below the optimum \naltitude will have a noticeable effect on the \nrange capability and proper consideration \nmust be given to the loss of range. \nIn addi- \ntion, turbojet airplanes designed specifically for \nlong range will have a large percent of the \ngross weight as fuel. The large changes in \ngross weight during cruise will require partic- \nular methods of cruise control to extract the \nmaximum flight range. A variation from the \noptimum flight path of cruise (constant Mach \n\nAltitude is the one most important ", - "page_start": 193, - "page_end": 193, + "text": "", + "page_start": 83, + "page_end": 83, "source_file": "00-80T-80.pdf" }, { - "text": "**Exercise 18: Make Subclasses of NamedPizza Disjoint**\n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___\n\n1. We want to make these subclasses of NamedPizza disjoint from each other. I.e., any individual can \nbelong to at most one of these classes. To do that first select MargheritaPizza (or any other subclass of \nNamedPizza). \n\n2. Click on the (+) sign next to Disjoint With near the bottom of the Description view. This will bring up \na Class hierarchy view. Use this to navigate to the subclasses of NamedPizza and use to select all of the other sibling classes to the one you selected. Then select OK. You should now \nsee the appropriate disjoint axioms showing up on each subclass of NamedPizza. Synchronize the \nreasoner. Your UI should look similar to figure 4.19 now. ", - "page_start": 37, - "page_end": 37, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 44, + "page_end": 44, + "source_file": "basic-english-language-skills.PDF" } ] }, @@ -18593,64 +18593,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 154, + "page_end": 154, + "source_file": "00-80T-80.pdf" }, { - "text": "It is obvious that**better technical and organisational prevention at work**contributed to more safety \nand the evident strong reduction in accidents.**Prominent fields and examples**of such improvements \nare: technically safer design of moving vehicles (e.g. for fork lifts or heavy trucks and machines, light \nand noise warning signals for moving vehicles); safer design of machines like automatic shutdowns or \ndisconnections, two-hand operating of machines (e.g. for pressing and punching), safer cranes including \nbetter technologies for communication between co-workers, coverage of moving parts, safer company \ncars (e.g. safety belts and airbags), safer tools (e.g. for drilling or cutting); improved personal protective \nequipment like air-supplied breathing apparatus, steel mesh gloves for meat workers, trousers for forest \nworkers that resist a chainsaw; minimum safety requirements for buildings (e.g. forms and size of stairs \nand handrails, fire exits and fire alarms, safer ladders and scaffolds), emergency equipment like eye \nwash and emergency showers; better monitoring of acute hazards (e.g. in sewage water systems), \nexhaust and ventilation technologies to avoid fumes, dusts, chemicals or contact with hazardous \nbiological agents; strong safety obligations for work in confined spaces, or for work at height and work \nin trenches; introduction of explosion zones and of non-sparking tools, a comprehensive system of \nwarning signals, warning signals for slippery floors and unsafe grounds, better warning systems and \nequipment in particularly dangerous work environments like road maintenance, combined with better \norganisational measures; quality systems that promote continuous repair and maintenance of tools; \nregular instructions by safety representatives and safety coordinators, and guarantee of minimum safety \nstandards of machines and products by European standards like CE (‘European Conformity’). ", - "page_start": 14, - "page_end": 14, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 8, + "page_end": 8, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "In the decade between 2000 and 2010, the development of the resources of labour inspections show a \nmixed picture,**some countries extended the capacities of labour inspections, others cut**\n**resources**. 369 For the period between 2010 and 2020, the European Trade Union Institute (ETUI) \ncounted a decrease of labour inspectors and inspections in 20 of 27 Member States, a drop of 7% for \ninspectors and of 18% for inspections. 370 Again, the picture between Member States differs but, in \ngeneral, budget or staff cuts dominate. ESENER findings show that there was a significant decline \nbetween 2014 and 2019 regarding the number of visits by Labour Inspectorates.371 \n\nAlthough labour inspections are at the core of supervision of working conditions,**other state authorities**\n**have similar or related tasks**, for example, regarding the control of undeclared work, checking \nminimum wages and social insurance contributions, and performing control of environmental or hygiene \nstandards, of fire safety, or technical control of particularly dangerous production sites or equipment. \n\nThe**shift in working conditions towards psychosocial risks**generates new challenges for state \nsupervision. SLIC recommends in its labour inspectors’ guide for assessing the quality of risk \nassessments and risk management measures with regard to prevention of psychosocial risks:372 ", - "page_start": 123, - "page_end": 123, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "**13.6.1 Managing event log**\n\nRegularly check the status of the system using the management GUI. If you suspect a \nproblem, first use the management GUI to diagnose and resolve the problem. \n\nUse the views that are available in the management GUI to verify the status of the system, the \nhardware devices, the physical storage, and the available volumes by completing the \nfollowing steps: \n1. Click**Monitoring**→**Events**to see all problems that exist on the system (see Figure 13-34 \non page 704). ", - "page_start": 725, - "page_end": 725, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 153, + "page_end": 153, + "source_file": "00-80T-80.pdf" }, { - "text": "Find more up-to-date information and data on occupational safety and health in Europe in the**OSH**\n**Barometer data visualisation tool**: https://visualisation.osha.europa.eu/osh-barometer \n\nThe tool informs on a large range of OSH indicators, such as work-related accidents, diseases and \nwellbeing as well as working conditions and prevention. It also presents the national OSH authorities \nand strategies, economic and sector information, and enforcement capacity. \n\nYou can visualise and compare country data, generate graphics and download a report of all data per \ncountry. The OSH Barometer is updated regularly with new indicators, data, publications and features. ", - "page_start": 9, - "page_end": 9, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 154, + "page_end": 154, + "source_file": "00-80T-80.pdf" }, { - "text": "measures that help us find personal evaluations of \n\nperceived quality or design. Our job is to evaluate these \n\nresearch companies and their output, and to develop the \n\nbest methodology for our issues. We are always refining \n\nthe tools we have and looking for new ones that will boost \n\nour accuracy. Our strong ties with outside experts are a \n\nsource of competitive advantage for Nissan. \n\nAgain, it all goes back to being customer-oriented. \n\nConfirming that customer-oriented stance will create value \n\nfor Nissan. Market Intelligence must be a dedicated \n\nevangelist for this change.” ", - "page_start": 42, - "page_end": 42, - "source_file": "OTC_NSANY_2004.pdf" + "text": "", + "page_start": 6, + "page_end": 6, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "particularly dangerous work environments like road maintenance, combined with better organisational \nmeasures; quality systems that promote continuous repair and maintenance of tools; regular instructions \nby safety representatives and safety coordinators, and guarantee of minimum safety standards of \nmachines and products by European standards like CE and CEE. ", - "page_start": 63, - "page_end": 63, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 154, + "page_end": 154, + "source_file": "00-80T-80.pdf" }, { - "text": "**To the Board of Directors and Stockholders of MGM MIRAGE**\n\nWe have audited management’s assessment, included in the accompanying “Management’s Annual Report on Internal Control Over Financial Reporting”, that MGM MIRAGE \n(a Delaware corporation) and subsidiaries (the “Company”) maintained effective internal control over financial reporting as of December 31, 2004, based on criteria \nestablished in Internal Control—Integrated Framework issued by the Committee of Sponsoring Organizations of the Treadway Commission. The Company’s management is \nresponsible for maintaining effective internal control over financial reporting and for its assessment of the effectiveness of internal control over financial reporting. Our respon- \nsibility is to express an opinion on management’s assessment and an opinion on the effectiveness of the Company’s internal control over financial reporting based on our audit. \n\nWe conducted our audit in accordance with the standards of the Public Company Accounting Oversight Board (United States). Those standards require that we plan and \nperform the audit to obtain reasonable assurance about whether effective internal control over financial reporting was maintained in all material respects. Our audit included \nobtaining an understanding of internal control over financial reporting, evaluating management’s assessment, testing and evaluating the design and operating effectiveness of \ninternal control, and performing such other procedures as we considered necessary in the circumstances. We believe that our audit provides a reasonable basis for our opinions. ", - "page_start": 50, - "page_end": 50, - "source_file": "NYSE_MGM_2004.pdf" + "text": "", + "page_start": 154, + "page_end": 154, + "source_file": "00-80T-80.pdf" }, { - "text": "**Technical safer design**of moving vehicles, for example, fork lifts, heavy trucks and machines, light \nand noise warning signals for moving vehicles; safer design of machines like automatic shutdowns or \ndisconnections, two-hand operating of machines, for example, for pressing and punching, safer cranes \nincluding better technologies for communication between co-workers, coverage of moving parts, safer \ncompany cars, for example, safety belts, safer tools, for example, for drilling or cutting; improved PPE \nlike air-supplied breathing apparatus, steel-made gloves for meat workers, trousers that resist a \nchainsaw; minimum requirements for buildings, for example, forms and size of stairs and handrails, fire \nexits and fire alarms, safer ladders and scaffolds, 126 emergency equipment like eye wash and \nemergency shower; better monitoring of acute hazards, for example, in sewage water systems, exhaust \nand ventilation technologies, to avoid fumes, dusts, chemicals or contact with hazardous biological \nagents; strong safety obligations for work in confined spaces, work at height and work in trenches; \nintroduction of explosion zones and of non-sparking tools, a comprehensive system of warning signals, \nwarning signals for slippery floors and unsafe grounds, better warning systems and equipment in ", - "page_start": 62, - "page_end": 62, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 154, + "page_end": 154, + "source_file": "00-80T-80.pdf" } ] }, @@ -18661,70 +18661,70 @@ "target_page": 9, "target_passage": "mplying that most of these individuals were in their mid-to-late teens during the crime peak of the mid-1990s", "chunk_present": { - "presence": true, - "index": 8 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 23, + "page_end": 23, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 202, + "page_end": 202, + "source_file": "00-80T-80.pdf" }, { - "text": "may be even lower. The number of arrestees testing positive for the first time for opiates \n(or for both opiates and crack-cocaine) dropped from 14,750 in 2006 to 4,281 in the first \n11 months of 2013, a fall of around 70 per cent2. Furthermore, of the new positive testers \nin 2013, only 721 were aged 18–24.3 Though this arrestee data will capture only a \nproportion of the true population, it does suggest that the number of new, young initiates \ninvolved with crime – those who have the potential to inflict most societal harm – has \ndecreased markedly, probably just to a few thousand per year; and that this group now \nmake up a small minority of the total number of opiate/crack-cocaine users (estimated to \nbe 294,000 in 2011/12), most of whom are older, longer-term users. \nIn terms of trends in new opiate/crack-cocaine users, all available data suggest that \nfigures have dipped by at least a fifth since 2005 and have dropped hugely since the late \n1980s and early 1990s when the opiate/crack-cocaine population in the UK grew very \nrapidly. The current estimate works out at a rate of 0.18 per 1,000 population. During the \nepidemic years, published estimates of new opiate/crack-cocaine users in Manchester \nand Bolton show rates more than 11 times larger. ", - "page_start": 3, - "page_end": 3, - "source_file": "legal2_opengouvernementlicense.pdf" + "text": "", + "page_start": 201, + "page_end": 201, + "source_file": "00-80T-80.pdf" }, { - "text": "involved opiate/crack users will quit (or die) before being arrested and tested; 3) DIP’s geographical coverage is not 100 per \ncent; 4) Some may evade arrest through the entire series; and 5) Evidence suggests OCUs cycle in and out of periods of \nregular use and offending rather than offend at a high rate continuously. But clearly the gradual capture of the pre-existing \npopulation creates a big enough bias such that we cannot read the figures for new positive testers simply as an incidence \ntrend for crime-involved opiate/crack users. \n\nNew opiate and crack-cocaine users: characteristics and trends 17 ", - "page_start": 17, - "page_end": 17, - "source_file": "legal2_opengouvernementlicense.pdf" + "text": "", + "page_start": 201, + "page_end": 201, + "source_file": "00-80T-80.pdf" }, { - "text": "initiated use at an older age. Currently it is not possible to determine whether this is a \nreporting issue or a genuine shift in the age profile of new opiate/crack-cocaine users. \n\n The report has several important policy implications. Even though numbers of new \ninitiates involved with crime have dropped to the low thousands, putting downward \npressure on crime, identification and early diversion to treatment remains paramount. \nFrontier Economics have estimated that the average4 lifetime crime cost of an injecting \ndrug user is £445,000, so the potential for social harm – even from a small number of \nindividuals – remains large and potentially long-lasting. This means local areas need to \nmanage both the (relatively large) stock of current users, and the (much smaller) flow of \nnew initiates, whose treatment needs may be different. There is no evidence of any new \nepidemic in this country, but given the impact of the epidemic of the 80s and early 90s on \ncrime, ongoing monitoring of recent trends is required to spot early signs of any emerging \nproblems. \n\n**Aims and Methodology**\n\nPrevious Home Office research has demonstrated the importance of opiate/crack-cocaine use \nin driving aggregate trends in acquisitive crime (Morgan, 2014). While established estimates \nexist of the total number of opiate/crack-cocaine users (OCUs) in England (Hay et al., 2013), \nthere are no estimates for the number of new OCUs each year (throughout this paper the \nnumber of new OCUs is also referred to as**‘incidence’**). This is important for three main \nreasons. ", - "page_start": 4, - "page_end": 4, - "source_file": "legal2_opengouvernementlicense.pdf" + "text": "", + "page_start": 201, + "page_end": 201, + "source_file": "00-80T-80.pdf" }, { - "text": "4 The average is useful, but hides the fact that offending within the opiate/crack population is highly skewed with a few \n\nindividuals responsible for the majority of crime and many individuals manage to use heroin and crack without resorting to \nacquisitive crime at all (Morgan, 2014). \n\n5 Though regular national-level estimates have not been attempted, studies have estimated incidence at various times and at \nvarious different levels of geography, see for example: De Angelis et al., 2004, Millar et al., 2001 and Hickman et al., 2001. \n\nNew opiate and crack-cocaine users: characteristics and trends 4 ", - "page_start": 4, - "page_end": 4, - "source_file": "legal2_opengouvernementlicense.pdf" + "text": "", + "page_start": 201, + "page_end": 201, + "source_file": "00-80T-80.pdf" }, { - "text": " However, the findings also suggest that between 2011 and early 2014, the number of \n\nnew opiate/crack-cocaine users stopped decreasing and instead stabilised at a \n(historically) low level. Further analysis was conducted to try and determine whether this \nwas a precursor to a new rise in initiates. Though the data are not totally conclusive, the \nresults suggest that a marked increase in new opiate/crack-cocaine users in the near \nfuture is unlikely. If anything, findings suggested that the downward trend may be set to \nresume. \n\n Analysis also revealed some possible changes in characteristics of the new opiate/crack- \ncocaine initiates. There is a trend in the treatment data towards new initiates coming to \ntreatment earlier in their drug-using careers than previous cohorts and also to have ", - "page_start": 3, - "page_end": 3, - "source_file": "legal2_opengouvernementlicense.pdf" + "text": "", + "page_start": 201, + "page_end": 201, + "source_file": "00-80T-80.pdf" }, { - "text": "Figure 10 shows that, rather than increasing in the current year, new presentations for \nopiate/crack use have actually fallen slightly from 48,154 in 2013/14 to 47,241 in 2014/15, a \ndecrease of 1.9%. However, given that the early signs of previous opiate/crack use epidemics \nhave been missed before (see Morgan, 2014), and the potential social harm that a fresh \nincrease in new OCUs could cause, further analysis was conducted on the most recent data to \ntry and determine whether the apparent flattening in trends was actually caused by the early \nstages of a significant surge in new users. \n\nThe treatment data was broken down by age to check whether the slight fall in total new \npresentations in 2014/15 masked an increase in younger treatment presentations. This showed \ninstead that opiate/crack presentations by those aged 18-24 had fallen from 3,579 in 2013/14 to \n3,021 in 2014/15, a fall of 15.6%. In other words, younger new presentations have fallen at a \nfaster rate over the last year than for those aged over-25. Furthermore, separate statistics \nproduced for those in treatment aged 18-and-under also show a fall in aggregate numbers in \ntreatment for opiates and crack. ", - "page_start": 27, - "page_end": 27, - "source_file": "legal2_opengouvernementlicense.pdf" + "text": "", + "page_start": 201, + "page_end": 201, + "source_file": "00-80T-80.pdf" }, { - "text": "The mean age at test is 32 and the mean year of birth is 1977, implying that most of these \nindividuals were in their mid-to-late teens during the crime peak of the mid-1990s.9 Given \nevidence suggesting that the average age of initiation for opiate/crack use is around 18–20 \n(Millar et al., 2001), this age profile would tentatively suggest that OCU incidence also peaked in \nthe 1990s and that this created a large cohort of users who would be approaching 40 today. \n\nThe minimum and maximum years of birth are fixed by construction, because anyone born ", - "page_start": 9, - "page_end": 9, - "source_file": "legal2_opengouvernementlicense.pdf" + "text": "", + "page_start": 201, + "page_end": 201, + "source_file": "00-80T-80.pdf" }, { - "text": "23 This shift does not appear to be related to the reduction in heroin supply occurring around 2010/11. As Appendix 1 \ndemonstrates, the pattern emerges far earlier. \n\nNew opiate and crack-cocaine users: characteristics and trends ", - "page_start": 28, - "page_end": 28, - "source_file": "legal2_opengouvernementlicense.pdf" + "text": "", + "page_start": 202, + "page_end": 202, + "source_file": "00-80T-80.pdf" } ] }, @@ -18735,70 +18735,70 @@ "target_page": 22, "target_passage": " Only 52,829 individuals said they had an opiate/crack initiation date between 2005 and 2014", "chunk_present": { - "presence": true, - "index": 3 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "ASX_MRM_2000.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "This section uses treatment data from the National Database Treatment Monitoring System \n(NDTMS) to estimate the number of new OCUs annually. The NDTMS captures data on the \nnumbers of people presenting to services with problem drug misuse and information about the \ndrug treatment they receive. All drug treatment agencies in England provide a basic level of \ninformation to the NDTMS on their activities each month. The data for this report included all \nunique individuals presenting to treatment with opiates or crack-cocaine listed as their primary \ndrug between 2005 and 2014. All individuals whose age of first use was listed as below ten or \nbefore 2005 were then excluded. Excluding individuals who started using opiates/crack before \n2005 resulted in a large number of records being left out, due to the fact that the majority of the \ntreatment population, even in 2013/14, initiated in the 1980s and 1990s when heroin and crack \nuse surged in the UK. However, this exclusion is necessary for the incidence methodology, as \nexplained later in this section. The remaining dataset included 52,829 individuals, as shown in \nTable 10. ", - "page_start": 22, - "page_end": 22, - "source_file": "legal2_opengouvernementlicense.pdf" + "text": "", + "page_start": 399, + "page_end": 399, + "source_file": "00-80T-80.pdf" }, { - "text": "The majority of those presenting for treatment between 2005 and 2014 started using \nopiates/crack before 2005 (around four in five). Only 52,829 individuals said they had an \nopiate/crack initiation date between 2005 and 2014. This suggests an average of just under \n5,000 new starters per year during this period. But this would be an under-estimate of incidence \nbecause it is likely that some of those who began use between 2005 and 2014 would not yet \nhave come to treatment during that period. \n\nTo correct for this, we use two variants of a methodology employed by researchers in Millar et \nal. (2001) and Hickman et al. (2001). These papers discuss the methodology in detail. \n\nIn brief, the method uses the lag-to-treatment distribution for the sample coupled with the \nnumber of new treatment presentations in a given year to estimate OCU incidence in that year. \nSo, when presenting to treatment, all individuals are asked to provide the year in which they first \nbegan using their primary drug, which for this analysis was limited to opiates and/or crack- \nNew opiate and crack-cocaine users: characteristics and trends 22 ", - "page_start": 22, - "page_end": 22, - "source_file": "legal2_opengouvernementlicense.pdf" + "text": "", + "page_start": 148, + "page_end": 148, + "source_file": "00-80T-80.pdf" }, { - "text": "**Executive summary**\n\nThis paper uses a range of datasets and methodologies to: \n\n obtain working estimates for the number of individuals in England who started using \n\nopiates/crack from 2005 to 2013;1 \n\n examine the characteristics of these individuals. \n\nThe main findings of the paper are as follows. \n\n \n\nIt is estimated that around 5,000 to 8,000 individuals started using opiates or crack- \ncocaine in 2013. There is a high degree of uncertainty around this figure due to the \nsparse data on this population, but sense-checks based on treatment and criminal justice \nsystem data suggest the true figure is unlikely to be much larger than 10,000. \n\n Data also suggest that the number of current opiate/crack initiates involved with crime ", - "page_start": 3, - "page_end": 3, - "source_file": "legal2_opengouvernementlicense.pdf" + "text": "", + "page_start": 21, + "page_end": 21, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "may be even lower. The number of arrestees testing positive for the first time for opiates \n(or for both opiates and crack-cocaine) dropped from 14,750 in 2006 to 4,281 in the first \n11 months of 2013, a fall of around 70 per cent2. Furthermore, of the new positive testers \nin 2013, only 721 were aged 18–24.3 Though this arrestee data will capture only a \nproportion of the true population, it does suggest that the number of new, young initiates \ninvolved with crime – those who have the potential to inflict most societal harm – has \ndecreased markedly, probably just to a few thousand per year; and that this group now \nmake up a small minority of the total number of opiate/crack-cocaine users (estimated to \nbe 294,000 in 2011/12), most of whom are older, longer-term users. \nIn terms of trends in new opiate/crack-cocaine users, all available data suggest that \nfigures have dipped by at least a fifth since 2005 and have dropped hugely since the late \n1980s and early 1990s when the opiate/crack-cocaine population in the UK grew very \nrapidly. The current estimate works out at a rate of 0.18 per 1,000 population. During the \nepidemic years, published estimates of new opiate/crack-cocaine users in Manchester \nand Bolton show rates more than 11 times larger. ", - "page_start": 3, - "page_end": 3, - "source_file": "legal2_opengouvernementlicense.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "before 1960 was removed and because DIP tests are only administered to those aged 18 and \nover, so only using data to 2013 means it would not be possible for anyone to be born in 1996 \nor afterwards to be included. Even so, it is clear from the year-of-birth distribution (Figure 2) that \npositive opiate tests drop off sharply for those born after 1982. This is in line with other evidence \nsuggesting that the number of new users of opiates decreased sharply in the 2000s. This needs \nto be considered when interpreting the analysis that follows. When DIP and the NDTMS \ntreatment system began in the mid-2000s, there already existed a cohort of around 320,000 \nOCUs, according to available estimates by Hay et al., (2013). And most of these individuals \nbegan using opiates/crack during the epidemic years of the 1980s and 1990s. In terms of data \ncapture this means it is hard to separate the gradual inclusion of more and more individuals \nfrom this original cohort from genuinely new users of these drugs. ", - "page_start": 10, - "page_end": 10, - "source_file": "legal2_opengouvernementlicense.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**Figure 10: New treatment presentations for opiate/crack use.**\n\n", - "page_start": 27, - "page_end": 27, - "source_file": "legal2_opengouvernementlicense.pdf" + "text": "", + "page_start": 399, + "page_end": 399, + "source_file": "00-80T-80.pdf" }, { - "text": "Reading down the year columns, the table shows that of the 6,449 people who presented for \nopiate/crack treatment for the first time in 2013, 376 said they had begun using in 2005. Another \n470 said they started using in 2006, and so on. \n\nReading across the table shows that of all those who said they began using opiates/crack in \n2005 (8,960), 1,305 also presented to treatment for the first time in that year (which is 15 per \ncent of the observed cohort from Table 11 and 12 per cent of our estimated total cohort from \nTable 12). Another 1,508 presented for the first time a year later, and so on. The first number in \nthe totals column (8,960) therefore represents all individuals who said they began using in 2005. \nIt is therefore the ‘observed’ incidence level. The column to the right of this is the cumulative \npercentages from the estimated lag-to-treatment distribution in Table 12. This shows the ", - "page_start": 24, - "page_end": 24, - "source_file": "legal2_opengouvernementlicense.pdf" + "text": "", + "page_start": 148, + "page_end": 148, + "source_file": "00-80T-80.pdf" }, { - "text": "methods for calculating incidence are complicated and imperfect. It should be acknowledged in \nadvance that this paper does not fully resolve these issues. It is merely intended as a first step, \nto obtain workable estimates upon which to base policy until more sophisticated methods are \ndeveloped. That said, every effort is made in this analysis to sense-check the results against \nother available datasets. The datasets used and the structure of the paper is as follows. \n\ni)**Drug Interventions Programme (DIP) data.**In part one, we produce general \n\ndescriptive statistics from these data, which capture individuals who test positive for \nopiates/crack-cocaine following arrest or charge. Due to the limitations in coverage of \nthese data over time, we draw only broad conclusions, some of which act as a sense- \ncheck for the main results from part two. \n\nii)**Data on presentations to treatment from the National Drug Treatment Monitoring**\n**System (NDTMS).**In part two, we use two models based on previous research papers \nto calculate OCU incidence at the national level between 2005 and 2013. Most of the \nmain conclusions come from this section. ", - "page_start": 5, - "page_end": 5, - "source_file": "legal2_opengouvernementlicense.pdf" + "text": "", + "page_start": 148, + "page_end": 148, + "source_file": "00-80T-80.pdf" } ] }, @@ -18809,70 +18809,70 @@ "target_page": 18, "target_passage": "Nearly ten per cent (8.9%) of individuals who tested positive for opiates at charge in 2004 also tested positive nearly a decade later in 2013 (on arrest)", "chunk_present": { - "presence": true, - "index": 3 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 102, + "page_end": 102, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 103, + "page_end": 103, + "source_file": "00-80T-80.pdf" }, { - "text": "The age and year of birth distributions are also similar and are shown in the Appendix. Thus, for \nthe majority of the analysis that follows, tests with no PNC number were excluded.10 \n\nThe charts and tables above use data from all positive tests, so will include cases where the \nsame individual has tested positively on more than one occasion. The following data look just at \nthe first test for each individual testing positive for opiates-only or positive-for-both. \n\n**Table 4: Descriptive statistics on first positive opiate-only/positive-for-both tests.**\n\n| First positive opiate/opiate+cocaine tests (unique individuals) | | | |\n|---|---|---|---|\n| First positive opiate/opiate+cocaine tests (unique individuals) | | | |\n| Age | | Year of birth | |\n| Number of tests | 104,817 | Number of tests | 104,817 |\n| Mean | 31 | Mean | 1977 |\n| Median | 30 | Median | 1977 |\n| Mode | 27 | Mode | 1980 |\n| Minimum | 18 | Minimum | 1960 |\n| Maximum | 53 | Maximum | 1995 |\n", - "page_start": 12, - "page_end": 12, - "source_file": "legal2_opengouvernementlicense.pdf" + "text": "", + "page_start": 103, + "page_end": 103, + "source_file": "00-80T-80.pdf" }, { - "text": "There are several observations to be drawn from these tables. First, it is clear that a proportion \nof opiate-using offenders offend over long periods of time. Nearly ten per cent (8.9%) of \nindividuals who tested positive for opiates at charge in 2004 also tested positive nearly a \ndecade later in 2013 (on arrest). And reading vertically, of the 12,253 individuals testing positive \nin 2013, 1,092 (8.9%) had also tested positive almost a decade earlier. \n\nSecond, in relation to incidence, these numbers also allow for some back-of-the-envelope \nmodelling to address the extent to which the figure of 4,281 individuals, who are new positive \ntesters in 2013, is an under- or over-estimate of the number of new OCUs in total. Taking the \nfigures for 2008, when DIP was fully up and running, we know that around 25,000 unique \nindividuals had positive tests that year. This can be combined with available estimates of the \ntotal OCU population (Hay et al., 2013) and the proportion who are likely to be offending \n(Gossop et al., 2003; Morgan, 2014) to give an approximate arrest rate. i.e. if there were about \n150,000 crime-involved OCUs through the period, this implies an arrest rate of about 17 per \nNew opiate and crack-cocaine users: characteristics and trends 18 ", - "page_start": 18, - "page_end": 18, - "source_file": "legal2_opengouvernementlicense.pdf" + "text": "", + "page_start": 301, + "page_end": 301, + "source_file": "00-80T-80.pdf" }, { - "text": "may be even lower. The number of arrestees testing positive for the first time for opiates \n(or for both opiates and crack-cocaine) dropped from 14,750 in 2006 to 4,281 in the first \n11 months of 2013, a fall of around 70 per cent2. Furthermore, of the new positive testers \nin 2013, only 721 were aged 18–24.3 Though this arrestee data will capture only a \nproportion of the true population, it does suggest that the number of new, young initiates \ninvolved with crime – those who have the potential to inflict most societal harm – has \ndecreased markedly, probably just to a few thousand per year; and that this group now \nmake up a small minority of the total number of opiate/crack-cocaine users (estimated to \nbe 294,000 in 2011/12), most of whom are older, longer-term users. \nIn terms of trends in new opiate/crack-cocaine users, all available data suggest that \nfigures have dipped by at least a fifth since 2005 and have dropped hugely since the late \n1980s and early 1990s when the opiate/crack-cocaine population in the UK grew very \nrapidly. The current estimate works out at a rate of 0.18 per 1,000 population. During the \nepidemic years, published estimates of new opiate/crack-cocaine users in Manchester \nand Bolton show rates more than 11 times larger. ", - "page_start": 3, - "page_end": 3, - "source_file": "legal2_opengouvernementlicense.pdf" + "text": "", + "page_start": 301, + "page_end": 301, + "source_file": "00-80T-80.pdf" }, { - "text": "The fifth row in Table 1 shows that the total number of opiate and opiate/cocaine tests over the \nperiod was 364,537. Table 2 shows descriptive statistics for the individuals providing these tests \n(noting that the same individual may be included several times if they gave multiple positive \ntests). ", - "page_start": 9, - "page_end": 9, - "source_file": "legal2_opengouvernementlicense.pdf" + "text": "", + "page_start": 301, + "page_end": 301, + "source_file": "00-80T-80.pdf" }, { - "text": "**Figure 3: Distribution of tester’s age at positive test for all opiate-only/positive-for-both tests.**\n\n", - "page_start": 11, - "page_end": 11, - "source_file": "legal2_opengouvernementlicense.pdf" + "text": "", + "page_start": 103, + "page_end": 103, + "source_file": "00-80T-80.pdf" }, { - "text": "**Figure 2: Year of birth distribution for all opiate-only/positive-for-both tests.**\n\n", - "page_start": 10, - "page_end": 10, - "source_file": "legal2_opengouvernementlicense.pdf" + "text": "", + "page_start": 301, + "page_end": 301, + "source_file": "00-80T-80.pdf" }, { - "text": "**Supplementary DIP charts, showing age and year-of-birth distributions for the 296,008 PNC**\n**cases with positive opiate/opiate + cocaine tests.**\n\n", - "page_start": 41, - "page_end": 41, - "source_file": "legal2_opengouvernementlicense.pdf" + "text": "", + "page_start": 103, + "page_end": 103, + "source_file": "00-80T-80.pdf" }, { - "text": "There were just over 100,000 unique individuals who tested positive for opiates-only or positive- \nfor-both between 2004 and 2013. The distribution of the 296,008 positive tests these individuals \ngave, shows that the vast majority (55%) were only tested once (see Figure 4), which is likely to \nbe why the age statistics are quite similar between Table 3 and Table 4. However, within this ", - "page_start": 12, - "page_end": 12, - "source_file": "legal2_opengouvernementlicense.pdf" + "text": "", + "page_start": 103, + "page_end": 103, + "source_file": "00-80T-80.pdf" } ] }, @@ -18889,64 +18889,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 391, + "page_end": 391, + "source_file": "sg246915.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Just as the first*Fronde*(the*Fronde parlementaire*of 1648–1649) ended, a second one (the \n*Fronde des princes*of 1650–1653) began. Unlike that which preceded it, tales of sordid \nintrigue and half-hearted warfare characterized this second phase of upper-class \ninsurrection. To the aristocracy, this rebellion represented a protest for the reversal of their \npolitical demotion from vassals to courtiers. It was headed by the highest-ranking French \nnobles, among them Louis's uncle Gaston, Duke of Orléans and first cousin Anne Marie Louise d'Orléans, Duchess of \nMontpensier, known as*la Grande Mademoiselle*; Princes of the Blood such as Condé, his brother Armand de Bourbon, Prince of \nConti, and their sister the Duchess of Longueville; dukes of legitimised royal descent, such as Henri, Duke of Longueville, and \nFrançois, Duke of Beaufort; so-called \"foreign princes\" such as Frédéric Maurice, Duke of Bouillon, his brother Marshal Turenne, \nand Marie de Rohan, Duchess of Chevreuse; and scions of France's oldest families, such as François de La Rochefoucauld. \n\nPortrait by Justus van Egmont \nbetween the years 1649–1652. ", - "page_start": 4, - "page_end": 4, - "source_file": "wikipedia5.pdf" + "text": "", + "page_start": 283, + "page_end": 283, + "source_file": "00-80T-80.pdf" }, { - "text": "All these events were witnessed by Louis and \nlargely explained his later distrust of Paris and the higher aristocracy.[27] \"In one sense, \nLouis's childhood came to an end with the outbreak of the Fronde. It was not only that life \nbecame insecure and unpleasant – a fate meted out to many children in all ages – but that \nLouis had to be taken into the confidence of his mother and Mazarin on political and \nmilitary matters of which he could have no deep understanding\".[28] \"The family home \nbecame at times a near-prison when Paris had to be abandoned, not in carefree outings to \nother chateaux but in humiliating flights\".[28] The royal family was driven out of Paris \ntwice in this manner, and at one point Louis XIV and Anne were held under virtual arrest \nin the royal palace in Paris. The Fronde years planted in Louis a hatred of Paris and a \nconsequent determination to move out of the ancient capital as soon as possible, never to \nreturn.[29] ", - "page_start": 4, - "page_end": 4, - "source_file": "wikipedia5.pdf" + "text": "", + "page_start": 283, + "page_end": 283, + "source_file": "00-80T-80.pdf" }, { - "text": "The*Frondeurs*, political heirs of the disaffected feudal aristocracy, sought to protect their \nincreasingly centralized royal government. \ntraditional feudal privileges from \nFurthermore, they believed their traditional influence and authority was being usurped by \nthe recently ennobled bureaucrats (the*Noblesse de Robe*, or \"nobility of the robe\"), who \nadministered the kingdom and on whom the monarchy increasingly began to rely. This \nbelief intensified the nobles' resentment. \n\nthe \n\nIn 1648, Anne and Mazarin attempted to tax members of the*Parlement de Paris*. The \nmembers refused to comply and ordered all of the king's earlier financial edicts burned. \nBuoyed by the victory of*Louis, duc d'Enghien*(later known as*le Grand Condé*) at the \nBattle of Lens, Mazarin, on Queen Anne's insistence, arrested certain members in a show \nof force.[24] The most important arrest, from Anne's point of view, concerned Pierre \nBroussel, one of the most important leaders in the*Parlement de Paris*. \nLouis XIV in 1643, by Claude Deruet \n\nPeople in France were complaining about the expansion of royal authority, the high rate of \ntaxation, and the reduction of the authority of the Parlement de Paris and other regional \nrepresentative entities. Paris erupted in rioting as a result, and Anne was forced, under \nintense pressure, to free Broussel. Moreover, on the night of 9–10 February 1651, when \nLouis was twelve, a mob of angry Parisians broke into the royal palace and demanded to \nsee their king. Led into the royal bed-chamber, they gazed upon Louis, who was feigning \nsleep, were appeased, and then quietly departed.[25] The threat to the royal family \nprompted Anne to flee Paris with the king and his courtiers. ", - "page_start": 3, - "page_end": 3, - "source_file": "wikipedia5.pdf" + "text": "", + "page_start": 283, + "page_end": 283, + "source_file": "00-80T-80.pdf" }, { - "text": "experiences during the*Fronde*, when men of high birth readily took up the rebel cause against their king, who was actually the \nkinsman of some. This victory over the nobility may thus have ensured the end of major civil wars in France until the French \nRevolution about a century later. ", - "page_start": 10, - "page_end": 10, - "source_file": "wikipedia5.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Condé, attacked the rebels in Paris; the rebels were under the political control of Anne's \nold friend Marie de Rohan. Beaufort, who had escaped from the prison where Anne had \nincarcerated him five years before, was the military leader in Paris, under the nominal \ncontrol of Conti. After a few battles, a political compromise was reached; the Peace of \nRueil was signed, and the court returned to Paris. \n\nUnfortunately for Anne, her partial victory depended on Condé, who wanted to control the \nqueen and destroy Mazarin's influence. It was Condé's sister who pushed him to turn \nagainst the queen. After striking a deal with her old friend Marie de Rohan, who was able \nto impose the nomination of*Charles de l'Aubespine, marquis de Châteauneuf*as minister \nof justice, Anne arrested Condé, his brother Armand de Bourbon, Prince of Conti, and the \nhusband of their sister Anne Genevieve de Bourbon, duchess of Longueville. This situation \ndid not last long, and Mazarin's unpopularity led to the creation of a coalition headed \nmainly by Marie de Rohan and the duchess of Longueville. This aristocratic coalition was \nstrong enough to liberate the princes, exile Mazarin, and impose a condition of virtual \nhouse arrest on Queen Anne. \n1655 portrait of Louis, the Victor of \nthe Fronde, portrayed as the god \nJupiter ", - "page_start": 4, - "page_end": 4, - "source_file": "wikipedia5.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Queen Anne played the most important role in defeating the Fronde because she wanted to transfer absolute authority to her son. \nIn addition, most of the princes refused to deal with Mazarin, who went into exile for a number of years. The*Frondeurs*claimed \nto act on Louis's behalf, and in his real interest, against his mother and Mazarin. \n\nQueen Anne had a very close relationship with the Cardinal, and many observers believed that Mazarin became Louis XIV's \nstepfather by a secret marriage to Queen Anne.[30] However, Louis's coming-of-age and subsequent coronation deprived them of \nthe*Frondeurs*' pretext for revolt. The*Fronde*thus gradually lost steam and ended in 1653, when Mazarin returned triumphantly \nfrom exile. From that time until his death, Mazarin was in charge of foreign and financial policy without the daily supervision of \nAnne, who was no longer regent.[31] \n\nDuring this period, Louis fell in love with Mazarin's niece Marie Mancini, but Anne and Mazarin ended the king's infatuation by \nsending Mancini away from court to be married in Italy. While Mazarin might have been tempted for a short time to marry his \nniece to the King of France, Queen Anne was absolutely against this; she wanted to marry her son to the daughter of her brother, \nPhilip IV of Spain, for both dynastic and political reasons. Mazarin soon supported the Queen's position because he knew that her \nsupport for his power and his foreign policy depended on making peace with Spain from a strong position and on the Spanish \nmarriage. Additionally, Mazarin's relations with Marie Mancini were not good, and he did not trust her to support his position. All \nof Louis's tears and his supplications to his mother did not make her change her mind. The Spanish marriage would be very ", - "page_start": 4, - "page_end": 4, - "source_file": "wikipedia5.pdf" + "text": "", + "page_start": 283, + "page_end": 283, + "source_file": "00-80T-80.pdf" }, { - "text": "famous throughout Europe. Composers and musicians such as Jean-Baptiste Lully, Jacques \nChampion de Chambonnières, and François Couperin thrived. In 1661, Louis founded the \nAcadémie Royale de Danse, and in 1669, the Académie d'Opéra, important driving events \nin the evolution of ballet. He also attracted, supported and patronized such artists as André \nCharles Boulle, who revolutionised marquetry with his art of inlay, today known as \n\"Boulle work\". Always on the lookout for new talent, the king launched music \ncompetitions: in 1683, Michel-Richard de Lalande thus became deputy master of the Royal \nChapel, composing his*Symphonies for the Soupers du Roy*along with 77 large scale \n*Grand Motets*. \n\nOver the course of four building campaigns, Louis converted a hunting lodge \ncommissioned by Louis XIII into the spectacular Palace of Versailles. Except for the \ncurrent Royal Chapel (built near the end of his reign), the palace achieved much of its \ncurrent appearance after the third building campaign, which was followed by an official \nmove of the royal court to Versailles on 6 May 1682. Versailles became a dazzling, awe- \ninspiring setting for state affairs and the reception of foreign dignitaries. At Versailles, the \nking alone commanded attention. ", - "page_start": 17, - "page_end": 17, - "source_file": "wikipedia5.pdf" + "text": "", + "page_start": 283, + "page_end": 283, + "source_file": "00-80T-80.pdf" }, { - "text": "The French were nevertheless forced to retreat from most of the Dutch Republic, which deeply shocked Louis; he retreated to St \nGermain for a time, where no one, except a few intimates, was allowed to disturb him.[47] French military advantages allowed \nthem however to hold their ground in Alsace and the Spanish Netherlands while retaking Franche-Comté. By 1678, mutual \nexhaustion led to the Treaty of Nijmegen, which was generally settled in France's favour and allowed Louis to intervene in the \nScanian War. Despite the military defeat, his ally Sweden regained much of what it had lost under the 1679 treaties of Saint- \nGermain-en-Laye, Fontainebleau and Lund imposed on Denmark–Norway and Brandenburg.[48] Yet Louis's two primary goals, \nthe destruction of the Dutch Republic and the conquest of the Spanish Netherlands, had failed.[49] \n\nLouis was at the height of his power, but at the cost of uniting his opponents; this increased as he continued his expansion. In \n1679, he dismissed his foreign minister Simon Arnauld, marquis de Pomponne, because he was seen as having compromised too \nmuch with the allies. Louis maintained the strength of his army, but in his next series of territorial claims avoided using military \nforce alone. Rather, he combined it with legal pretexts in his efforts to augment the boundaries of his kingdom. Contemporary \ntreaties were intentionally phrased ambiguously. Louis established the Chambers of Reunion to determine the full extent of his \nrights and obligations under those treaties. ", - "page_start": 8, - "page_end": 8, - "source_file": "wikipedia5.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_MGM_2004.pdf" } ] }, @@ -18963,64 +18963,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 97, + "page_end": 97, + "source_file": "sg248459.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 348, + "page_end": 348, + "source_file": "00-80T-80.pdf" }, { - "text": "Annales School ISBN 0631211969 \n\nLewis, W. H.*The Splendid Century: Life in the France of Louis XIV*(1953) ISBN 0881339210 \nMitford, Nancy (1966).*The Sun King: Louis XIV at Versailles*(2012 ed.). New York Review of Books. ISBN 978-1- \n5901-7491-3. \n\nPrest, Julia, and Guy Rowlands, eds.*The Third Reign of Louis XIV, c. 1682–1715*(Taylor & Francis, 2016). \nRothkrug, Lionel.*Opposition to Louis XIV: The Political and Social Origins of French Enlightenment*(Princeton \nUniversity Press, 2015). \n\nRowlands, Guy.*The Dynastic State and the Army under Louis XIV: Royal Service and Private Interest, 1661–1701*\n(2002) \n\nRubin, David Lee, ed.*Sun King: The Ascendancy of French Culture during the Reign of Louis XIV*. Washington: \nFolger Books and Cranbury: Associated University Presses, 1992. \n\nRule, John C.,*Louis XIV and the craft of kingship*1969. \nShennan, J. H.*Louis XIV*(1993) \nThompson, Ian.*The Sun King's Garden: Louis XIV, André Le Nôtre And the Creation of the Gardens of Versailles*. ", - "page_start": 34, - "page_end": 34, - "source_file": "wikipedia5.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**Louis XIV**\n\n**Louis XIV**(Louis-Dieudonné; 5 September 1638 – 1 September 1715), also \nknown as**Louis the Great**(*Louis le Grand*) or the**Sun King**(*le Roi Soleil*), \nwas King of France from 1643 until his death in 1715. His verified reign of 72 \nyears and 110 days is the longest of any sovereign.[1][a] An emblematic \ncharacter of the Age of Absolutism in Europe,[3] Louis XIV's legacy is widely \ncharacterized by French colonial expansion, the conclusion of Eighty Years' \nWar involving the Habsburgs, and his architectural bequest, marked by \ncommissioned works of art and buildings. His pageantry, opulent lifestyle and \nornate cultivated image earned him enduring admiration. Louis XIV raised \nFrance to be the exemplar nation-state of the early modern period, and \nestablished a cultural prestige which lasted through the subsequent centuries, \nand continues today. \n\n**Louis XIV**", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia5.pdf" + "text": "", + "page_start": 349, + "page_end": 349, + "source_file": "00-80T-80.pdf" }, { - "text": "an irresistible combination of marriage market, employment agency and \nentertainment capital of aristocratic Europe, boasting the best theatre, opera, \nmusic, gambling, sex and (most important) hunting.[60] \n\nLouis receiving the Doge of Genoa \nat Versailles on 15 May 1685, \nfollowing the Bombardment of \nGenoa. (*Reparation faite à*\n*Louis XIV par le Doge de Gênes. 15*\n*mai 1685*by Claude Guy Halle, \nVersailles.) \n\nApartments were built to house those willing to pay court to the king.[61] However, the \npensions and privileges necessary to live in a style appropriate to their rank were only \npossible by waiting constantly on Louis.[62] For this purpose, an elaborate court ritual was \ncreated wherein the king became the centre of attention and was observed throughout the \nday by the public. With his excellent memory, Louis could then see who attended him at \ncourt and who was absent, facilitating the subsequent distribution of favours and positions. \nAnother tool Louis used to control his nobility was censorship, which often involved the opening of letters to discern their \nauthor's opinion of the government and king.[61] Moreover, by entertaining, impressing, and domesticating them with extravagant \nluxury and other distractions, Louis not only cultivated public opinion of him, but he also ensured the aristocracy remained under \nhis scrutiny. ", - "page_start": 9, - "page_end": 9, - "source_file": "wikipedia5.pdf" + "text": "", + "page_start": 349, + "page_end": 349, + "source_file": "00-80T-80.pdf" }, { - "text": "Campbell, Peter Robert.*Louis XIV, 1661–1715*(London, 1993) \nChurch, William F., ed.*The Greatness of Louis XIV*. (1972). \nCowart, Georgia J.*The Triumph of Pleasure: Louis XIV and the Politics of Spectacle*University of Chicago Press, \n2008. ISBN 978-0-2261-1638-9 \n\nCronin, Vincent.*Louis XIV*. London: HarperCollins, 1996. ISBN 978-1-8604-6092-0 ", - "page_start": 33, - "page_end": 33, - "source_file": "wikipedia5.pdf" + "text": "", + "page_start": 349, + "page_end": 349, + "source_file": "00-80T-80.pdf" }, { - "text": "Louis XIV was born on 5 September 1638 in the Château de Saint-Germain-en- \nLaye, to Louis XIII and Anne of Austria. He was named Louis Dieudonné \n(Louis the God-given)[7] and bore the traditional title of French heirs apparent: \n*Dauphin*.[8] At the time of his birth, his parents had been married for 23 years. \nHis mother had experienced four stillbirths between 1619 and 1631. Leading \ncontemporaries thus regarded him as a divine gift and his birth a miracle of \nGod.[9] \n\n**Issue**\n*more...*\n\nLouis's relationship with his mother was uncommonly affectionate for the time. \nContemporaries and eyewitnesses claimed that the Queen would spend all her \ntime with Louis.[10] Both were greatly interested in food and theatre, and it is \nhighly likely that Louis developed these interests through his close relationship \nwith his mother. This long-lasting and loving relationship can be evidenced by \nexcerpts in Louis's journal entries, such as: \n\n\"Nature was responsible for the first knots which tied me to my \nmother. But attachments formed later by shared qualities of the \nspirit are far more difficult to break than those formed merely by \nblood.\"[11] ", - "page_start": 2, - "page_end": 2, - "source_file": "wikipedia5.pdf" + "text": "", + "page_start": 348, + "page_end": 348, + "source_file": "00-80T-80.pdf" }, { - "text": "**See also**\n\nCharles de Lorme, personal medical doctor to Louis XIV \nFundamental laws of the Kingdom of France \nHouse of France \nLevée (ceremony) \nList of French monarchs \nOutline of France \nLouis XIV style \nNicolas Fouquet \nFrench forestry Ordinance of 1669 \nPotager du Roi ", - "page_start": 26, - "page_end": 26, - "source_file": "wikipedia5.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Siamese court, which granted Mergui as a naval base to France. However, the death of \nNarai, King of Ayutthaya, the execution of his pro-French minister Constantine Phaulkon, \nand the siege of Bangkok in 1688 ended this era of French influence.[55] \n\nFrance also attempted to participate actively in Jesuit missions to China. To break the \nPortuguese dominance there, Louis sent Jesuit missionaries to the court of the Kangxi \nEmperor in 1685: Jean de Fontaney, Joachim Bouvet, Jean-François Gerbillon, Louis Le \nComte, and Claude de Visdelou.[56] Louis also received a Chinese Jesuit, Michael Shen \nFu-Tsung, at Versailles in 1684.[57] Furthermore, Louis's librarian and translator Arcadio \nHuang was Chinese.[58][59] \n\nSiamese embassy of King Narai to \nLouis XIV in 1686, led by Kosa Pan. \nEngraving by Nicolas Larmessin. \n**Height of power**", - "page_start": 9, - "page_end": 9, - "source_file": "wikipedia5.pdf" + "text": "", + "page_start": 348, + "page_end": 348, + "source_file": "00-80T-80.pdf" }, { - "text": "Some historians point out that it was a customary demonstration of piety in those days to \nexaggerate one's sins. Thus they do not place much emphasis on Louis's deathbed \ndeclarations in assessing his accomplishments. Rather, they focus on military and \ndiplomatic successes, such as how he placed a French prince on the Spanish throne. This, \nthey contend, ended the threat of an aggressive Spain that historically interfered in \ndomestic French politics. These historians also emphasise the effect of Louis's wars in \nexpanding France's boundaries and creating more defensible frontiers that preserved \nFrance from invasion until the Revolution.[132] \n\nTerritorial expansion of France \nunder Louis XIV (1643–1715) is \ndepicted in orange. \n\nArguably, Louis also applied himself indirectly to \"the alleviation of the burdens of [his] \nsubjects.\" For example, he patronised the arts, encouraged industry, fostered trade and \ncommerce, and sponsored the founding of an overseas empire. Moreover, the significant \nreduction in civil wars and aristocratic rebellions during his reign are seen by these \nhistorians as the result of Louis's consolidation of royal authority over feudal elites. In their analysis, his early reforms centralised \nFrance and marked the birth of the modern French state. They regard the political and military victories as well as numerous \ncultural achievements as how Louis helped raise France to a preeminent position in Europe.[133] Europe came to admire France \nfor its military and cultural successes, power, and sophistication. Europeans generally began to emulate French manners, values, \ngoods, and deportment. French became the universal language of the European elite. ", - "page_start": 21, - "page_end": 21, - "source_file": "wikipedia5.pdf" + "text": "", + "page_start": 348, + "page_end": 348, + "source_file": "00-80T-80.pdf" } ] }, @@ -19037,64 +19037,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 8, + "page_end": 8, + "source_file": "NASDAQ_SHEN_2003.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 294, + "page_end": 294, + "source_file": "00-80T-80.pdf" }, { - "text": "**Chief ministers*See list***\n\nDuring Louis's long reign, France emerged as the leading European power and \nregularly made war. A conflict with Spain marked his entire childhood, while \nduring his personal rule, Louis fought three major continental conflicts, each \nagainst powerful foreign alliances: the Franco-Dutch War, the Nine Years' War, \nand the War of the Spanish Succession. In addition, France contested shorter \nwars such as the War of Devolution and the War of the Reunions. Warfare \ndefined Louis's foreign policy, impelled by his personal ambition for glory and \npower: \"a mix of commerce, revenge, and pique\".[5] His wars strained France's \nresources to the utmost, while in peacetime he concentrated on preparing for \nthe next war. He taught his diplomats that their job was to create tactical and \nstrategic advantages for the French military.[6] Upon his death in 1715, \nLouis XIV left his great-grandson and successor, Louis XV, a powerful but \nwar-weary kingdom, in major debt after the War of the Spanish Succession that \nhad raged on since 1701. \n**Died**\n\n1 September 1715 (aged 76) \nPalace of Versailles, \nVersailles, France ", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia5.pdf" + "text": "", + "page_start": 295, + "page_end": 295, + "source_file": "00-80T-80.pdf" }, { - "text": "**Line of succession in 1715**\n\nLine of succession to the French throne upon the death of Louis XIV in 1715. Louis XIV's only surviving legitimate grandson, \nPhilip V, was not included in the line of succession due to having renounced the French throne after the war of the Spanish \nSuccession, which lasted for 13 years after the death of Charles II of Spain in 1700.[131] \n\n*Louis XIII (1601–1643)*\n\n**Louis XIV***(1638–1715)*\n*Louis, Grand Dauphin (1661–1711)*\n\n*Louis, Duke of Burgundy (1682–1712)*\n*Louis, Duke of Brittany (1707–1712)*\n**(1)**Louis, Duke of Anjou (1710–1774) \n\nPhilip V of Spain (1683–1746) \n*Charles, Duke of Berry (1686–1714)*\n*Philippe I, Duke of Orléans (1640–1701)*\n\n**(2)**Philippe II, Duke of Orléans (1674–1723) \n**(3)**Louis, Duke of Chartres (1703–1752) \n\nFurther down the French line of succession in 1715 was the House of Condé, followed by the House of Conti (a cadet branch of \nthe House of Condé). Both of these royal houses were descended in the male line from Henri II, Prince of Condé, a second cousin \nof French King Louis XIII (the father of Louis XIV) in the male line. ", - "page_start": 21, - "page_end": 21, - "source_file": "wikipedia5.pdf" + "text": "", + "page_start": 295, + "page_end": 295, + "source_file": "00-80T-80.pdf" }, { - "text": "**France as the pivot of warfare**\n\nUnder Louis, France was the leading European power, and most wars pivoted around its \naggressiveness. No European state exceeded it in population, and no one could match its \nwealth, central location, and very strong professional army. It had largely avoided the \ndevastation of the Thirty Years' War. Its weaknesses included an inefficient financial \nsystem that was hard-pressed to pay for its military adventures, and the tendency of most \nother powers to gang up against it. \n\nDuring Louis's reign, France fought three major wars: the Franco-Dutch War, the Nine \nYears' War, and the War of the Spanish Succession. There were also two lesser conflicts: \nthe War of Devolution and the War of the Reunions.[64] The wars were very expensive but \ndefined Louis XIV's foreign policy, and his personality shaped his approach. Impelled \"by \na mix of commerce, revenge, and pique\", Louis sensed that war was the ideal way to \nenhance his glory. In peacetime, he concentrated on preparing for the next war. He taught \nhis diplomats that their job was to create tactical and strategic advantages for the French \nmilitary.[6] By 1695, France retained much of its dominance but had lost control of the seas \nto England and Holland, and most countries, both Protestant and Catholic, were in alliance \nagainst it. Sébastien Le Prestre de Vauban, France's leading military strategist, warned \nLouis in 1689 that a hostile \"Alliance\" was too powerful at sea. He recommended that \nFrance fight back by licensing French merchant ships to privateer and seize enemy \nmerchant ships while avoiding its navies: \n\nLouis XIV ", - "page_start": 10, - "page_end": 10, - "source_file": "wikipedia5.pdf" + "text": "", + "page_start": 295, + "page_end": 295, + "source_file": "00-80T-80.pdf" }, { - "text": "Most European rulers accepted Philip as king, some reluctantly. Depending on one's views of the war's inevitability, Louis acted \nreasonably or arrogantly.[95] He confirmed that Philip V retained his French rights despite his new Spanish position. Admittedly, \nhe may only have been hypothesising a theoretical eventuality and not attempting a Franco-Spanish union. But his actions were \ncertainly not read as disinterested. Moreover, Louis sent troops to the Spanish Netherlands to evict Dutch garrisons and secure \nDutch recognition of Philip V. In 1701, Philip transferred the*asiento*(the right to supply slaves to Spanish colonies) to France, as \na sign of the two nations' growing connections. As tensions mounted, Louis decided to acknowledge James Stuart, the son of \nJames II, as King of England, Scotland and Ireland on the latter's death, infuriating William III. These actions enraged Britain and \nthe Dutch Republic.[96] With the Holy Roman Emperor and the petty German states, they formed another Grand Alliance and \ndeclared war on France in 1702. French diplomacy secured Bavaria, Portugal, and Savoy as Franco-Spanish allies.[97] ", - "page_start": 14, - "page_end": 14, - "source_file": "wikipedia5.pdf" + "text": "", + "page_start": 295, + "page_end": 295, + "source_file": "00-80T-80.pdf" }, { - "text": "Annales School ISBN 0631211969 \n\nLewis, W. H.*The Splendid Century: Life in the France of Louis XIV*(1953) ISBN 0881339210 \nMitford, Nancy (1966).*The Sun King: Louis XIV at Versailles*(2012 ed.). New York Review of Books. ISBN 978-1- \n5901-7491-3. \n\nPrest, Julia, and Guy Rowlands, eds.*The Third Reign of Louis XIV, c. 1682–1715*(Taylor & Francis, 2016). \nRothkrug, Lionel.*Opposition to Louis XIV: The Political and Social Origins of French Enlightenment*(Princeton \nUniversity Press, 2015). \n\nRowlands, Guy.*The Dynastic State and the Army under Louis XIV: Royal Service and Private Interest, 1661–1701*\n(2002) \n\nRubin, David Lee, ed.*Sun King: The Ascendancy of French Culture during the Reign of Louis XIV*. Washington: \nFolger Books and Cranbury: Associated University Presses, 1992. \n\nRule, John C.,*Louis XIV and the craft of kingship*1969. \nShennan, J. H.*Louis XIV*(1993) \nThompson, Ian.*The Sun King's Garden: Louis XIV, André Le Nôtre And the Creation of the Gardens of Versailles*. ", - "page_start": 34, - "page_end": 34, - "source_file": "wikipedia5.pdf" + "text": "", + "page_start": 295, + "page_end": 295, + "source_file": "00-80T-80.pdf" }, { - "text": "**Louis XIV**\n\n**Louis XIV**(Louis-Dieudonné; 5 September 1638 – 1 September 1715), also \nknown as**Louis the Great**(*Louis le Grand*) or the**Sun King**(*le Roi Soleil*), \nwas King of France from 1643 until his death in 1715. His verified reign of 72 \nyears and 110 days is the longest of any sovereign.[1][a] An emblematic \ncharacter of the Age of Absolutism in Europe,[3] Louis XIV's legacy is widely \ncharacterized by French colonial expansion, the conclusion of Eighty Years' \nWar involving the Habsburgs, and his architectural bequest, marked by \ncommissioned works of art and buildings. His pageantry, opulent lifestyle and \nornate cultivated image earned him enduring admiration. Louis XIV raised \nFrance to be the exemplar nation-state of the early modern period, and \nestablished a cultural prestige which lasted through the subsequent centuries, \nand continues today. \n\n**Louis XIV**", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia5.pdf" + "text": "", + "page_start": 295, + "page_end": 295, + "source_file": "00-80T-80.pdf" }, { - "text": "Cities and territories, such as Luxembourg and Casale, were prized for their strategic \npositions on the frontier and access to important waterways. Louis also sought \nStrasbourg, an important strategic crossing on the left bank of the Rhine and theretofore \na Free Imperial City of the Holy Roman Empire, annexing it and other territories in \n1681. Although a part of Alsace, Strasbourg was not part of Habsburg-ruled Alsace and \nwas thus not ceded to France in the Peace of Westphalia. \n\n| Silver coin of Louis XIV, dated\n1674 | |\n|---|---|\n| Silver coin of Louis XIV, dated 1674 | |\n| | |\n| | |\n| Obverse. The Latin inscription is LVDOVICVS XIIII D[EI] GRA[TIA] (\"Louis XIV, by the grace of God\"). | Reverse. The Latin inscription is FRAN[CIÆ] ET NAVARRÆ REX 1674 (\"King of France and of Navarre, 1674\"). |\n\n\nFollowing these annexations, Spain declared war, precipitating the War of the Reunions. \nHowever, the Spanish were rapidly defeated because the Emperor (distracted by the \nGreat Turkish War) abandoned them, and the Dutch only supported them minimally. By \nthe Truce of Ratisbon, in 1684, Spain was forced to acquiesce in the French occupation \nof most of the conquered territories, for 20 years.[50] ", - "page_start": 8, - "page_end": 8, - "source_file": "wikipedia5.pdf" + "text": "", + "page_start": 294, + "page_end": 294, + "source_file": "00-80T-80.pdf" }, { - "text": "**Acceptance of the will of Charles II and consequences**\n\nOn his deathbed in 1700, Charles II of Spain \nunexpectedly \nclear \ndemonstration of French military superiority for \nmany decades before this time, the pro-French \nfaction at the court of Spain, and even Pope \nInnocent XII convinced him that France was more likely to preserve his empire intact. He \nthus offered the entire empire to the Dauphin's second son Philip, Duke of Anjou, provided \nit remained undivided. Anjou was not in the direct line of French succession, thus his \naccession would not cause a Franco-Spanish union.[92] If Anjou refused, the throne would \nbe offered to his younger brother Charles, Duke of Berry. If the Duke of Berry declined it, \nit would go to Archduke Charles, then to the distantly related House of Savoy if Charles \ndeclined it.[93] \n\nchanged his will. The \n\nPhilip V of Spain \n\nLouis was confronted with a difficult choice. He could agree to a partition of the Spanish \npossessions and avoid a general war, or accept Charles II's will and alienate much of \nEurope. He may initially have been inclined to abide by the partition treaties, but the \nDauphin's insistence persuaded him otherwise.[94] Moreover, Louis's foreign minister, \nJean-Baptiste Colbert, marquis de Torcy, pointed out that war with the Emperor would \nalmost certainly ensue whether Louis accepted the partition treaties or Charles II's will. He \nemphasised that, should it come to war, William III was unlikely to stand by France since \nhe \"made a treaty to avoid war and did not intend to go to war to implement the treaty\".[91] Indeed, in the event of war, it might be \npreferable to be already in control of the disputed lands. Eventually, therefore, Louis decided to accept Charles II's will. Philip, \nDuke of Anjou, thus became Philip V, King of Spain. \n\nLouis in 1701 ", - "page_start": 14, - "page_end": 14, - "source_file": "wikipedia5.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" } ] }, @@ -19105,70 +19105,70 @@ "target_page": 5, "target_passage": "Both SNItrans (Fig. 2C) and SNIcrush (Fig. 2D) injuries resulted in a rightward shift in population distributions of the cross-sectional area of nucleated, FB-labelled DRG neurons when compared with contralateral DRG, consistent with a loss of small afferents post–nerve injury.", "chunk_present": { - "presence": true, - "index": 4 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 299, + "page_end": 299, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 155, + "page_end": 155, + "source_file": "sg246915.pdf" }, { - "text": "There are many anatomical sites within the somatosensory \nnervous system where differential \nloss of sensory neuron \npopulations could impact neurobiology. For example, loss of \ncutaneous afferents may afford more opportunity for plasticity in \nreinnervation patterns, such as collateral sprouting of uninjured or \nsurviving afferents, and the types of nerve endings made by \ndifferent molecular subpopulations.17,27 It also seems likely that the \ndeath of many neurons within a DRG could contribute to the \nexpansion and activation of immune cell types, which are known to \nplay a major role in neuropathic pain.30,69 Finally, under normal \nconditions, peripheral sensory input is integrated into the dorsal \nhorn of the spinal cord by complex interneuron circuitry. Many \nspinal circuits are engaged by convergent input from different \nafferent types.9,41,70 Therefore, selective loss of input from discrete \nafferent types could undoubtedly impact the normal processing of \nremaining afferent signals.34 Experimentally abrogating neuronal \nloss may be a fruitful approach to assess the contribution to \nnervous system plasticity (adaptive or maladaptive) following injury. \nIn this regard, our in vitro readout would be a useful experimental ", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed2.pdf" + "text": "", + "page_start": 159, + "page_end": 159, + "source_file": "sg246915.pdf" }, { - "text": "3. Results \n\n3.1. Peripheral nerve injury induces a loss of small neurons \nfrom the dorsal root ganglion \n\nTogether, our data derived from several different experimental \napproaches show that a population of small-diameter afferents \nare lost following peripheral nerve injury. \n\n3.2. Spared nerve crush or transection results in death of \nMrgprd-expressing neurons \n\nTo date, determining cell \nloss among specific populations of \nafferent neurons has proved challenging due to the down- \nregulation of subpopulation-specific marker genes following \ntransection.37,44 To overcome this issue, we took \naxonal \nadvantage of \ntransgenic strategies to label populations in \na manner that persisted after injury. Owing to the bias for the \nloss of small neurons and the known loss of IB4-binding central \nterminals postinjury,36 we initially focused on nonpeptidergic \nnociceptive neurons. We used MrgDChR2-YFP mice to identify \nneurons belonging to the largest of \nthe 3 classes of non- \npeptidergic nociceptors, NP1.55,59 To determine whether these \nneurons are lost following nerve injury, we used a stereological \nmethod to quantify L4 DRG MrgD-YFP1 (yellow fluorescent ", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed2.pdf" + "text": "", + "page_start": 159, + "page_end": 159, + "source_file": "sg246915.pdf" }, { - "text": "SNItrans resulted in a mixed population of axotomized and intact \nafferents within the L4 DRG. Therefore, we developed an approach \nto restrict our analysis to axotomized afferents, without relying on \ntransgenic labelling, and used this as a complementary approach to \nconfirm our findings. We injected the neuronal tracer FB into the \nglabrous, tibial innervation territory of both hindpaws 1 week before \ncommon peroneal and tibial transection (SNItrans) or crush (SNIcrush) \nsurgeries (Figs. 2A and B). FastBlue-uptake was complete across \nneurons of all sizes by 1 week (Fig. S3, http://links.lww.com/PAIN/ \nC84), so this approach allowed us to profile a sample of the \naxotomized afferents. Both SNItrans (Fig. 2C) and SNIcrush (Fig. 2D) \ninjuries resulted in a rightward shift in population distributions of the \ncross-sectional area of nucleated, FB-labelled DRG neurons when \ncompared with contralateral DRG, consistent with a loss of small \nafferents post–nerve injury. ", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed2.pdf" + "text": "", + "page_start": 379, + "page_end": 379, + "source_file": "00-80T-80.pdf" }, { - "text": "| Abstract\nThere is a rich literature describing the loss of dorsal root ganglion (DRG) neurons following peripheral axotomy, but the vulnera | bility |\n|---|---|\n| Abstract There is a rich literature describing the loss of dorsal root ganglion (DRG) neurons following peripheral axotomy, but the vulnera | bility |\n| of discrete subpopulations has not yet been characterised. Furthermore, the extent or even presence of neuron loss following i has recently been challenged. In this study, we have used a range of transgenic recombinase driver mouse lines to genetically molecularly defined subpopulations of DRG neurons and track their survival following traumatic nerve injury. We find that sp nerve injury leads to a marked loss of cells containing DRG volume and a concomitant loss of small-diameter DRG neurons. Ne loss occurs unequally across subpopulations and is particularly prevalent in nonpeptidergic nociceptors, marked by expressi Mrgprd. We show that this subpopulation is almost entirely lost following spared nerve injury and severely depleted (by roughly following sciatic nerve crush. Finally, we used an in vitro model of DRG neuron survival to demonstrate that nonpeptid nociceptor loss is likely dependent on the absence of neurotrophic support. Together, these results profile the extent to which neuron subpopulations can survive axotomy, with implications for our understanding of nerve injury–induced plasticity and p Keywords: Sensory neuron, Neuron death, Transgenic reporter line, Neuropathic pain, Nerve injury | njury label ared uron on of 50%) ergic DRG ain. |\n", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed2.pdf" + "text": "", + "page_start": 159, + "page_end": 159, + "source_file": "sg246915.pdf" }, { - "text": "[55] Usoskin D, Furlan A, Islam S, Abdo H, Lonnerberg P, Lou D, Hjerling- \nLeffler J, Haeggstrom J, Kharchenko O, Kharchenko PV, Linnarsson S, \nErnfors P. Unbiased classification of sensory neuron types by large-scale \nsingle-cell RNA sequencing. Nat Neurosci 2015;18:145–53. [34] McCoy ES, Taylor-Blake B, Street SE, Pribisko AL, Zheng J, Zylka MJ. \nPeptidergic CGRPa primary sensory neurons encode heat and itch and \ntonically suppress sensitivity to cold. Neuron 2013;78:138–51. \n\n[56] Vestergaard S, Tandrup T, Jakobsen J. Effect of permanent axotomy on \nnumber and volume of dorsal root ganglion cell bodies. J Comp Neurol \n1997;388:307–12. \n\n[35] McKay Hart A, Brannstrom T, Wiberg M, Terenghi G. Primary sensory \nneurons and satellite cells after peripheral axotomy in the adult rat: \ntimecourse of cell death and elimination. Exp Brain Res 2002;142:308–18. \n[36] Molander C, Wang H, Rivero-Meli ´an C, Grant G. Early decline and late \nrestoration of spinal cord binding and transganglionic transport of \nisolectin B4 from Griffonia simplicifolia I after peripheral nerve \ntransection or crush. Restor Neurol Neurosci 1996;10:123–33. \n\n[57] Wall PD, Gutnick M. Properties of afferent nerve impulses originating from \na neuroma. Nature 1974;248:740–43. ", - "page_start": 14, - "page_end": 14, - "source_file": "pubmed2.pdf" + "text": "", + "page_start": 379, + "page_end": 379, + "source_file": "00-80T-80.pdf" }, { - "text": "observed 7809 6 153 neurons per DRG; this was not significantly \ndifferent to the number of neurons in the contralateral DRG \n(7917 6 349), whereas cell number approximately halved by \n8 weeks postinjury to 3963 6 410 neurons per DRG (Fig. 1C). \nSeparating analysis into intact vs axotomized afferents revealed \nthat only axotomized afferents were lost, with no difference \nobserved in numbers of intact afferents (Fig. 1D). Between 1 and \n8 weeks after injury, we observed a 61.0 6 7.0% decrease in the \nnumber of GFP1 neurons. This loss of injured afferents resulted \nin a loss of neuron-containing (ie, excluding white matter regions) \nDRG volume (Fig. 1E), but not neuron density (Fig. 1F). Cell loss \npredominantly occurred between 1 and 2 weeks postinjury and \nstabilized after this timepoint. Population distributions of the \ncross-sectional area of nucleated, \ntdTomato-expressing cell \nprofiles were not significantly different at 1 vs 8 weeks post- \nSNItrans, in contrast to GFP-expressing/injured afferents, in which \na loss of a population of small afferents at 8 weeks postinjury was \nobserved (Fig. 1G). ", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed2.pdf" + "text": "", + "page_start": 158, + "page_end": 158, + "source_file": "sg246915.pdf" }, { - "text": "dorsal \nNeuroreport 2018;29:779–85. \n\n[49] Schulte A, Lohner H, Degenbeck J, Segebarth D, Rittner HL, Blum R, Aue \nA. Unbiased analysis of the dorsal root ganglion after peripheral nerve \ninjury: no neuronal loss, no gliosis, but satellite glial cell plasticity. PAIN \n2023;164:728–40. [69] Yu X, Liu H, Hamel KA, Morvan MG, Yu S, Leff J, Guan Z, Braz JM, Basbaum \nAI. Dorsal root ganglion macrophages contribute to both the initiation and \npersistence of neuropathic pain. Nat Commun 2020;11:264. \n\n[50] Shi TJS, Tandrup T, Bergman E, Xu ZQD, Ulfhake B, H ¨okfelt T. Effect of \nperipheral nerve injury on dorsal root ganglion neurons in the C57 BL/6J \n[70] Zheng J, Lu Y, Perl ER. Inhibitory neurones of the spinal substantia \ngelatinosa mediate interaction of signals from primary afferents. J Physiol \n2010;588:2065–75. ", - "page_start": 14, - "page_end": 14, - "source_file": "pubmed2.pdf" + "text": "", + "page_start": 379, + "page_end": 379, + "source_file": "00-80T-80.pdf" }, { - "text": "Neuronal \nloss has been proposed as a key contributor to poor \nfunctional recovery following nerve injury,54 and biased survival of \ntypes might be expected to contribute to \ndifferent afferent \nmodality-specific sensory deficits. Beyond loss of function, does \nDRG neuron loss contribute to chronic pain, in either an adaptive or \nmaladaptive manner? Intrathecal delivery of GDNF is neuro- \nprotective and reverses the reduction in the number of IB4-binding \nDRG neurons and central terminals seen following transection.5 \nTreatment is concurrently analgesic and abrogates pain-related \nbehaviors.7,60 However, the pleiotropic nature of GDNF makes it \nimpossible to directly attribute the analgesic effects to the reversal \nof neuron loss. Indeed, it is possible that GDNF exerts its effect by \nactions on intact nonpeptidergic nociceptive afferents,52 activation \nof which is known to drive aversive behaviors in the neuropathic \nstate.62 These data leave the contribution of nonpeptidergic \nnociceptor loss to behavior in the GDNF treatment paradigm \nambiguous. Other pharmacological approaches have been found \neffective at reversing a neuronal \nloss in rodent models, but the \nimpact on pain behavior was not studied.21,22 ", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed2.pdf" + "text": "", + "page_start": 158, + "page_end": 158, + "source_file": "sg246915.pdf" } ] }, @@ -19185,64 +19185,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 169, + "page_end": 169, + "source_file": "00-80T-80.pdf" }, { - "text": "The Commission will aim to agree the criteria and guidance for additional designations \nwith Member States by the end of 2021. Member States will then have until the end of \n2023 to demonstrate significant progress in legally designating new protected areas and \nintegrating ecological corridors. On this basis, the Commission will assess by 2024 \nwhether the EU is on track to meet its 2030 targets or whether stronger actions, including \nEU legislation, are needed. \n\nFinally, the**Overseas Countries and Territories**also host important biodiversity \nhotspots, not governed by EU environmental rules. The Commission encourages relevant \nMember States to consider promoting equal or equivalent rules in these countries and \nterritories. \n\n**Nature protection: key commitments by 2030**\n\n1. Legally protect a minimum of 30% of the EU’s land area and 30% of the EU’s sea \narea and integrate ecological corridors, as part of a true Trans-European Nature \nNetwork. \n\n2. Strictly protect at least a third of the EU’s protected areas, including all remaining EU \n\nprimary and old-growth forests. \n\n3. Effectively manage all protected areas, defining clear conservation objectives and \n\nmeasures, and monitoring them appropriately. ", - "page_start": 6, - "page_end": 6, - "source_file": "legal5_eubiodiversity_cc4.pdf" + "text": "", + "page_start": 169, + "page_end": 169, + "source_file": "00-80T-80.pdf" }, { - "text": "With this strategy, the Commission proposes ambitious commitments for the EU to bring \nto the table. The EU should also support governments and stakeholders across the globe \nto significantly step up their ambition and their action. \n\nThe Commission proposes that the EU ensures that the post-2020 global framework \nincludes, at a minimum, the elements outlined below: \n\n Overarching global goals for biodiversity for 2050, in line with the United \nNations 2030 Agenda for Sustainable Development and the vision of ‘living in \nharmony with nature’. The ambition should be that,**by 2050, all of the world’s**\n**ecosystems are restored, resilient, and adequately protected.**The world \nshould commit to the net-gain principle to give nature back more than it takes. \nThe world should commit to no human-induced extinction of species, at \nminimum where avoidable. \n\n Ambitious**global 2030 targets in line with EU commitments**in this strategy. \nThese should clearly address the drivers of biodiversity loss and be specific, \nmeasurable, actionable, relevant and time-bound. \n\n A much**stronger implementation, monitoring and review**process. Parties \nshould revise their National Biodiversity Strategies and Action Plans by the end \nof 2021, or as a minimum, submit national commitments for the most important \ntargets. There should be a**regular review cycle**to look at progress towards the ", - "page_start": 20, - "page_end": 20, - "source_file": "legal5_eubiodiversity_cc4.pdf" + "text": "", + "page_start": 169, + "page_end": 169, + "source_file": "00-80T-80.pdf" }, { - "text": "policies. In addition, by integrating policy coherence for sustainable development in all \nits policies, the EU will reduce the pressure on biodiversity worldwide. In all of its \ninternational cooperation, the EU should promote sustainable agricultural and fisheries \npractices and actions to protect and restore the world’s forests. Particular attention will \nalso be paid to sustainable water resource management, the restoration of degraded land, \nand the protection and restoration of biodiverse areas with high ecosystem services and \nclimate mitigation potential. A better protection of natural ecosystems, coupled with \nefforts to reduce wildlife trade and consumption, will also help prevent and build up \nresilience to possible future diseases and pandemics. The EU will enhance its support to \nglobal efforts to apply the**One Health approach**83, which recognises the intrinsic \nconnection between human health, animal health and healthy resilient nature. \n\nThe EU will step up support to partner countries across the world to achieve the new \nglobal targets, fight environmental crime, and tackle the drivers of biodiversity loss. In \nAfrica, the EU will launch the**NaturAfrica**initiative to protect wildlife and key \necosystems while offering opportunities in green sectors for local populations. Similar \nprojects will be developed in other regions. The EU will also support the Western \nBalkans and EU Neighbourhood countries in their efforts to protect biodiversity. ", - "page_start": 23, - "page_end": 23, - "source_file": "legal5_eubiodiversity_cc4.pdf" + "text": "", + "page_start": 40, + "page_end": 40, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "build on the headline ambition to ensure that by 2050**all of the world’s ecosystems are**\n**restored, resilient, and adequately protected.**The world should commit to the net-gain \nprinciple to give nature back more than it takes. As part of this, the world should commit \nto no human-induced extinction of species, at minimum where avoidable. \n\nThis strategy sets out how Europe can help make this happen. As a milestone, it aims to \nensure that**Europe's biodiversity will be on the path to recovery by 2030**for the \nbenefit of people, the planet, the climate and our economy, in line with the 2030 Agenda \nfor Sustainable Development and with the objectives of the Paris Agreement on Climate \nChange. It addresses the five main drivers of biodiversity loss, sets out an enhanced \ngovernance framework to fill remaining gaps, ensures the full implementation of EU \nlegislation, and pulls together all existing efforts. This strategy is enterprising and \nincentivising in spirit and action. It reflects the fact that**protecting and restoring nature**\n**will need more than regulation alone**. It will require action by citizens, businesses, \nsocial partners and the research and knowledge community, as well as strong \npartnerships between local, regional, national and European level. This strategy is in line \nwith the ambitions and commitment set out in President von der Leyen’s Political \nGuidelines and in the European Green Deal. ", - "page_start": 4, - "page_end": 4, - "source_file": "legal5_eubiodiversity_cc4.pdf" + "text": "", + "page_start": 169, + "page_end": 169, + "source_file": "00-80T-80.pdf" }, { - "text": "69 See Common framework and guidance documents for biodiversity proofing of the EU budget. \n70 The cost estimate is based on the 2018 Impact Assessment of the LIFE Regulation (SWD(2018) 292), a \nStudy on the costs of implementing the Target 2 of the EU Biodiversity Strategy to 2020 and data \nsubmitted by 16 Member States under Article 8(1) of the Habitats Directive. The Commission will \nupdate the estimate, notably based on Member States’ Prioritised Action Frameworks under the \nHabitats Directive. \n71 Including the Common Agricultural Policy, Cohesion Policy funds, Horizon Europe, the European \nMaritime and Fisheries Fund, LIFE and external action funds. \n\n72 See EU taxonomy for sustainable activities. \n73 World Wildlife Fund (2019), The Nature of Risk – A Framework for Understanding Nature-Related \nRisk to Business. \n\n17 ", - "page_start": 18, - "page_end": 18, - "source_file": "legal5_eubiodiversity_cc4.pdf" + "text": "", + "page_start": 169, + "page_end": 169, + "source_file": "00-80T-80.pdf" }, { - "text": "The implementation of the**EU Invasive Alien Species Regulation**58 and other relevant \nlegislation and international agreements must also be stepped up**.**This should aim to \nminimise, and where possible eliminate, the introduction and establishment of alien \nspecies in the EU environment. The aim will be to manage established invasive alien \nspecies and**decrease the number of Red List species they threaten by 50%**59. \n\n**EU Nature Restoration Plan: key commitments by 2030**\n\n1. Legally binding EU nature restoration targets to be proposed in 2021, subject to an \nimpact assessment. By 2030, significant areas of degraded and carbon-rich \necosystems are restored; habitats and species show no deterioration in conservation \ntrends and status; and at least 30% reach favourable conservation status or at least \nshow a positive trend. \n\n2. The decline in pollinators is reversed. \n3. The risk and use of chemical pesticides is reduced by 50% and the use of more \n\nhazardous pesticides is reduced by 50%. \n\n4. At least 10% of agricultural area is under high-diversity landscape features. \n5. At least 25% of agricultural land is under organic farming management, and the \n\nuptake of agro-ecological practices is significantly increased. \n\n6. Three billion new trees are planted in the EU, in full respect of ecological principles. \n7. Significant progress has been made in the remediation of contaminated soil sites. \n8. At least 25,000 km of free-flowing rivers are restored. ", - "page_start": 15, - "page_end": 15, - "source_file": "legal5_eubiodiversity_cc4.pdf" + "text": "", + "page_start": 169, + "page_end": 169, + "source_file": "00-80T-80.pdf" }, { - "text": "In all of its work, the EU will strengthen the links between**biodiversity protection and**\n**human rights**, gender, health, education, conflict sensitivity, the rights-based approach, \nland tenure and the role of indigenous peoples and local communities. \n\nAs part of its global efforts, the EU will promote biodiversity coalitions with partners and \ncivil society around the world. For example, in March 2020, the Commission launched \nthe**Global Biodiversity Coalition**of national parks, aquariums, botanic gardens, zoos, \nnatural history and sciencemuseums to help raise awareness around the world on the need \nto protect and nurture biodiversity. The Commission will consider launching or joining \nother High Ambition Coalitions to help develop the post-2020 framework. \n\n**5. CONCLUSION**\n\nProtecting and restoring biodiversity is the only way to preserve the quality and \ncontinuity of human life on Earth. The commitments proposed in this strategy pave the \nway for ambitious and necessary changes – changes that will ensure the wellbeing and \neconomic prosperity of present and future generations in a healthy environment. The \nimplementation of these commitments will take into account the diversity of challenges \nacross sectors, regions and Member States, recognise the need to ensure social justice, \nfairness and inclusiveness in line with the European Pillar of Social Rights, and will \nrequire a sense of responsibility and strong joint efforts from the EU, its Member States, \nstakeholders and citizens. ", - "page_start": 23, - "page_end": 23, - "source_file": "legal5_eubiodiversity_cc4.pdf" + "text": "", + "page_start": 169, + "page_end": 169, + "source_file": "00-80T-80.pdf" }, { - "text": "*3.3.2. Investments, pricing and taxation*\n\nTackling biodiversity loss and restoring ecosystems will require significant public and \nprivate investments at national and European level. This will mean making the most of \nall relevant EU programmes and financing instruments. The Commission will strengthen \nits**biodiversity proofing framework**69,*inter alia*by using in an appropriate way the \ncriteria established under the EU taxonomy, to ensure that EU funding supports \nbiodiversity-friendly investments. \n\nTo meet the needs of this strategy, including investment priorities for Natura 2000 and \ngreen infrastructure,**at least €20 billion a year70 should be unlocked for spending on**\n**nature**. This will require mobilising private and public funding at national and EU \nlevel71, including through a range of different programmes in the next long-term EU \nbudget. Moreover, as nature restoration will make a major contribution to climate \nobjectives, a significant proportion of the 25% of the EU budget dedicated to climate \naction will be invested on biodiversity and nature-based solutions. ", - "page_start": 18, - "page_end": 18, - "source_file": "legal5_eubiodiversity_cc4.pdf" + "text": "", + "page_start": 169, + "page_end": 169, + "source_file": "00-80T-80.pdf" } ] }, @@ -19253,70 +19253,70 @@ "target_page": 16, "target_passage": "In the EU, there is currently no comprehensive governance framework to steer the implementation of biodiversity commitments agreed at national, European or international level. To address the gap, the Commission will put in place a new European biodiversity governance framework. ", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 148, + "page_end": 148, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 258, + "page_end": 258, + "source_file": "00-80T-80.pdf" }, { - "text": "**3. ENABLING TRANSFORMATIVE CHANGE**\n\n**3.1. A new governance framework**\n\nIn the EU, there is currently no comprehensive governance framework to steer the \nimplementation of biodiversity commitments agreed at national, European or \ninternational level. To address the gap, the Commission will put in place**a new**\n**European biodiversity governance framework**. This will help map obligations and \ncommitments and set out a roadmap to guide their implementation. \n\nAs part of this new framework, the Commission will put in place a monitoring and \nreview mechanism. This will include a**clear set of agreed indicators**and will enable \nregular progress assessment and set out corrective action if necessary. This mechanism \nwill feed the Environmental Implementation Review and contribute to the European \nSemester. \n\nThe new governance framework will ensure co-responsibility and co-ownership by all \nrelevant actors in meeting the EU’s biodiversity commitments. It will support \nadministrative capacity building, transparency, stakeholder dialogue, and participatory \ngovernance at different levels. \n\nThe Commission will assess the progress and suitability of this approach in 2023, and \nconsider whether a legally binding approach to governance is needed. \n\n**3.2.**\n\n**Stepping up**\n**environmental legislation**\n\n**implementation and enforcement of EU**\n\nAll environmental legislation relies on proper implementation and enforcement. Over the \nlast 30 years, the EU has put in place a solid legislative framework to protect and restore \nits natural capital. However, recent evaluations show that although legislation is fit for \npurpose, implementation on the ground is lagging behind60. This is having dramatic \nconsequences on biodiversity and comes with a substantial economic cost61.**The full**\n**implementation and enforcement of EU environmental legislation is therefore at the**\n**heart of this strategy**, for which political support and financial and human resources \nwill need to be prioritised. ", - "page_start": 16, - "page_end": 16, - "source_file": "legal5_eubiodiversity_cc4.pdf" + "text": "", + "page_start": 258, + "page_end": 258, + "source_file": "00-80T-80.pdf" }, { - "text": "69 See Common framework and guidance documents for biodiversity proofing of the EU budget. \n70 The cost estimate is based on the 2018 Impact Assessment of the LIFE Regulation (SWD(2018) 292), a \nStudy on the costs of implementing the Target 2 of the EU Biodiversity Strategy to 2020 and data \nsubmitted by 16 Member States under Article 8(1) of the Habitats Directive. The Commission will \nupdate the estimate, notably based on Member States’ Prioritised Action Frameworks under the \nHabitats Directive. \n71 Including the Common Agricultural Policy, Cohesion Policy funds, Horizon Europe, the European \nMaritime and Fisheries Fund, LIFE and external action funds. \n\n72 See EU taxonomy for sustainable activities. \n73 World Wildlife Fund (2019), The Nature of Risk – A Framework for Understanding Nature-Related \nRisk to Business. \n\n17 ", - "page_start": 18, - "page_end": 18, - "source_file": "legal5_eubiodiversity_cc4.pdf" + "text": "", + "page_start": 17, + "page_end": 17, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "The Commission will aim to agree the criteria and guidance for additional designations \nwith Member States by the end of 2021. Member States will then have until the end of \n2023 to demonstrate significant progress in legally designating new protected areas and \nintegrating ecological corridors. On this basis, the Commission will assess by 2024 \nwhether the EU is on track to meet its 2030 targets or whether stronger actions, including \nEU legislation, are needed. \n\nFinally, the**Overseas Countries and Territories**also host important biodiversity \nhotspots, not governed by EU environmental rules. The Commission encourages relevant \nMember States to consider promoting equal or equivalent rules in these countries and \nterritories. \n\n**Nature protection: key commitments by 2030**\n\n1. Legally protect a minimum of 30% of the EU’s land area and 30% of the EU’s sea \narea and integrate ecological corridors, as part of a true Trans-European Nature \nNetwork. \n\n2. Strictly protect at least a third of the EU’s protected areas, including all remaining EU \n\nprimary and old-growth forests. \n\n3. Effectively manage all protected areas, defining clear conservation objectives and \n\nmeasures, and monitoring them appropriately. ", - "page_start": 6, - "page_end": 6, - "source_file": "legal5_eubiodiversity_cc4.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "*3.3.2. Investments, pricing and taxation*\n\nTackling biodiversity loss and restoring ecosystems will require significant public and \nprivate investments at national and European level. This will mean making the most of \nall relevant EU programmes and financing instruments. The Commission will strengthen \nits**biodiversity proofing framework**69,*inter alia*by using in an appropriate way the \ncriteria established under the EU taxonomy, to ensure that EU funding supports \nbiodiversity-friendly investments. \n\nTo meet the needs of this strategy, including investment priorities for Natura 2000 and \ngreen infrastructure,**at least €20 billion a year70 should be unlocked for spending on**\n**nature**. This will require mobilising private and public funding at national and EU \nlevel71, including through a range of different programmes in the next long-term EU \nbudget. Moreover, as nature restoration will make a major contribution to climate \nobjectives, a significant proportion of the 25% of the EU budget dedicated to climate \naction will be invested on biodiversity and nature-based solutions. ", - "page_start": 18, - "page_end": 18, - "source_file": "legal5_eubiodiversity_cc4.pdf" + "text": "", + "page_start": 17, + "page_end": 17, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "41 Article 29 of the EU Renewable Energy Directive 2018/2001. \n42 See for example Intergovernmental Panel on Climate Change (2019), Special Report on the Ocean and \nthe Cryosphere in a Changing Climate. \n43 The Common Fisheries Policy, the Marine Strategy Framework Directive (2008/56/EC) and the \nMaritime Spatial Planning Directive (2014/89/EU). \n44 The Commission will report on the implementation of the Maritime Spatial Planning Directive by \nMarch 2022 at the latest, including the application of ecosystem-based management. \n45 Protected by international and EU law. \n\n11 ", - "page_start": 12, - "page_end": 12, - "source_file": "legal5_eubiodiversity_cc4.pdf" + "text": "", + "page_start": 17, + "page_end": 17, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": " Firstly, and subject to an impact assessment, the Commission will put forward a \nproposal for legally binding**EU nature restoration targets**in 2021 to restore \ndegraded ecosystems, in particular those with the most potential to capture and \nstore carbon and to prevent and reduce the impact of natural disasters. This will \nidentify the conditions in which the targets must be met, as well as the most \neffective measures to reach them. The impact assessment will also look at the \npossibility of an EU-wide methodology to map, assess and achieve good \ncondition of ecosystems so they can deliver benefits such as climate regulation, \nwater regulation, soil health, pollination and disaster prevention and protection. \n\n \n\nIn that context, the Commission will request and support Member States to raise \nthe level of implementation of existing legislation within clear deadlines. It will \nin particular request Member States to ensure**no deterioration in conservation**\n**trends and status**of all protected habitats and species by 203030. In addition, \nMember States will have to ensure that at least 30% of species and habitats not \n\n28 Notably the EU Birds Directive (2009/147/EC), Habitats Directive (92/43/EEC), Water Framework \nDirective (2000/60/EC), Floods Directive (2007/60/EC) and Marine Strategy Framework Directive \n(2008/56/EC). \n29 See Fitness Check of the EU Nature Legislation (SWD(2016) 472) and Fitness Check of the EU Water \nLegislation (SWD(2019) 439). See also below, Section 3.2. \n30 Habitats and species listed under the Birds and Habitats Directives. ", - "page_start": 7, - "page_end": 7, - "source_file": "legal5_eubiodiversity_cc4.pdf" + "text": "", + "page_start": 17, + "page_end": 17, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "With this in mind, the Commission will revise the EU Action Plan against Wildlife \nTrafficking in 2021 and propose a further**tightening of the rules on EU ivory trade**\nlater this year. It will explore a possible revision of the Environmental Crime Directive, \nincluding by looking at expanding its scope and introducing specific provisions for types \nand levels of criminal sanctions. It will consider strengthening the coordinating and \ninvestigative capacities of the European Anti-Fraud Office (OLAF) to work with \nMember States and non-EU countries to prevent illicit trade and the entry of illicit \nproducts into the Single Market. \n\nThe Commission will continue to engage with partner countries to ensure a smooth and \nfair transition, mobilising in particular Aid for Trade to ensure that partners reap the \nbenefits of biodiversity-friendly trade. \n\n*4.2.3. International cooperation, neighbourhood policy and resource*\n\n*mobilisation*\n\nDelivering an ambitious post-2020 global biodiversity framework will require greater \ncooperation with partners, increased support and financing and phasing out of subsidies \nharmful to biodiversity. In the last decade, the EU and its Member States collectively \nupheld their commitment to**double financial flows to developing countries for**\n**biodiversity**82. The EU is ready to continue working with its partners and further \nincrease its support post-2020. This will be part of its work on biodiversity conservation, \nrestoration, sustainable use and mainstreaming in all development and partnership ", - "page_start": 22, - "page_end": 22, - "source_file": "legal5_eubiodiversity_cc4.pdf" + "text": "", + "page_start": 17, + "page_end": 17, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "In all of its work, the EU will strengthen the links between**biodiversity protection and**\n**human rights**, gender, health, education, conflict sensitivity, the rights-based approach, \nland tenure and the role of indigenous peoples and local communities. \n\nAs part of its global efforts, the EU will promote biodiversity coalitions with partners and \ncivil society around the world. For example, in March 2020, the Commission launched \nthe**Global Biodiversity Coalition**of national parks, aquariums, botanic gardens, zoos, \nnatural history and sciencemuseums to help raise awareness around the world on the need \nto protect and nurture biodiversity. The Commission will consider launching or joining \nother High Ambition Coalitions to help develop the post-2020 framework. \n\n**5. CONCLUSION**\n\nProtecting and restoring biodiversity is the only way to preserve the quality and \ncontinuity of human life on Earth. The commitments proposed in this strategy pave the \nway for ambitious and necessary changes – changes that will ensure the wellbeing and \neconomic prosperity of present and future generations in a healthy environment. The \nimplementation of these commitments will take into account the diversity of challenges \nacross sectors, regions and Member States, recognise the need to ensure social justice, \nfairness and inclusiveness in line with the European Pillar of Social Rights, and will \nrequire a sense of responsibility and strong joint efforts from the EU, its Member States, \nstakeholders and citizens. ", - "page_start": 23, - "page_end": 23, - "source_file": "legal5_eubiodiversity_cc4.pdf" + "text": "", + "page_start": 17, + "page_end": 17, + "source_file": "Excel Training Manual 1.pdf" } ] }, @@ -19327,70 +19327,70 @@ "target_page": 21, "target_passage": "The EU will apply zero tolerance towards illegal, unreported and unregulated fishing", "chunk_present": { - "presence": true, - "index": 3 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 151, + "page_end": 151, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 4, + "page_end": 4, + "source_file": "NASDAQ_EMMS_2004.pdf" }, { - "text": "have been subject to*irregularities*,*fraud*or*breach of obligations*; \n\n6 Regulation (EU, Euratom) 2018/1046 of the European Parliament and of the Council of 18 July 2018 on the \nfinancial rules applicable to the general budget of the Union, amending Regulations (EU) No 1296/2013, (EU) \nNo 1301/2013, (EU) No 1303/2013, (EU) No 1304/2013, (EU) No 1309/2013, (EU) No 1316/2013, (EU) No \n223/2014, (EU) No 283/2014, and Decision No 541/2014/EU and repealing Regulation (EU, Euratom) No \n966/2012, \nhttps://eur-lex.europa.eu/legal- \ncontent/EN/TXT/?uri=uriserv:OJ.L_.2016.119.01.0001.01.ENG \nOJ ", - "page_start": 30, - "page_end": 30, - "source_file": "EN-Draft FWC for services 0142.pdf" + "text": "", + "page_start": 160, + "page_end": 160, + "source_file": "00-80T-80.pdf" }, { - "text": "The EU should also use all of its diplomatic leverage and outreach capacities to help \nbroker agreement on the designation of three vast**Marine Protected Areas in the**\n**Southern Ocean**78, two of which were co-proposed by the EU in East Antarctica and in \nthe Weddell Sea. If agreed, this would constitute one of the biggest acts of nature \nprotection in history. \n\nWork will continue with partner countries and regional organisations to put in place \nmeasures to protect and sustainably use sensitive maritime ecosystems and species, \nincluding in areas beyond national jurisdiction, with a focus on marine biodiversity \nhotspots. The EU should continue supporting Small Island Developing States and other \nrelevant partner countries to participate in meetings of regional and global organisations \nand bodies, and to implement relevant international commitments and regulations. \n\nThe EU will apply**zero tolerance towards illegal, unreported and unregulated**\n**fishing**and will combat overfishing, including through WTO negotiations on a**global**\n**agreement to ban harmful fisheries subsidies**. \n\nIn international negotiations, the EU should advocate that marine minerals in the \ninternational seabed area cannot be exploited before the**effects of deep-sea mining**on \nthe marine environment, biodiversity and human activities have been sufficiently \nresearched, the risks are understood and the technologies and operational practices are \nable to demonstrate no serious harm to the environment, in line with the precautionary ", - "page_start": 21, - "page_end": 21, - "source_file": "legal5_eubiodiversity_cc4.pdf" + "text": "", + "page_start": 284, + "page_end": 284, + "source_file": "00-80T-80.pdf" }, { - "text": "The Commission will aim to agree the criteria and guidance for additional designations \nwith Member States by the end of 2021. Member States will then have until the end of \n2023 to demonstrate significant progress in legally designating new protected areas and \nintegrating ecological corridors. On this basis, the Commission will assess by 2024 \nwhether the EU is on track to meet its 2030 targets or whether stronger actions, including \nEU legislation, are needed. \n\nFinally, the**Overseas Countries and Territories**also host important biodiversity \nhotspots, not governed by EU environmental rules. The Commission encourages relevant \nMember States to consider promoting equal or equivalent rules in these countries and \nterritories. \n\n**Nature protection: key commitments by 2030**\n\n1. Legally protect a minimum of 30% of the EU’s land area and 30% of the EU’s sea \narea and integrate ecological corridors, as part of a true Trans-European Nature \nNetwork. \n\n2. Strictly protect at least a third of the EU’s protected areas, including all remaining EU \n\nprimary and old-growth forests. \n\n3. Effectively manage all protected areas, defining clear conservation objectives and \n\nmeasures, and monitoring them appropriately. ", - "page_start": 6, - "page_end": 6, - "source_file": "legal5_eubiodiversity_cc4.pdf" + "text": "", + "page_start": 3, + "page_end": 3, + "source_file": "NASDAQ_EMMS_2004.pdf" }, { - "text": "The application of an ecosystem-based management approach under EU legislation43 will \nreduce the adverse impacts of fishing, extraction and other human activities, especially \non sensitive species and seabed habitats. To support this,**national maritime spatial**\n**plans**, which Member States have to deliver in 2021, should aim at covering all maritime \nsectors and activities, as well as area-based conservation-management measures.44 The \nCommission will also propose a**new action plan to conserve fisheries resources and**\n**protect marine ecosystems**by 2021. Where necessary, measures will be introduced to \nlimit the use of fishing gear most harmful to biodiversity, including on the seabed. It will \nalso look at how to reconcile the use of bottom-contacting fishing gear with biodiversity \ngoals, given it is now the most damaging activity to the seabed. This must be done in a \nfair and just way for all. The European Maritime and Fisheries Fund should also support \nthe transition to more selective and less damaging fishing techniques. \n\nHealthy fish stocks are key to the long-term prosperity of fishermen and the health of our \noceans and biodiversity. This makes it all the more important to maintain or reduce \nfishing mortality at or under**Maximum Sustainable Yield levels**. This will help achieve \na healthy population age and size distribution for fish stocks. ", - "page_start": 12, - "page_end": 12, - "source_file": "legal5_eubiodiversity_cc4.pdf" + "text": "", + "page_start": 284, + "page_end": 284, + "source_file": "00-80T-80.pdf" }, { - "text": "*453 European Centre for Disease Prevention and Control, https://www.ecdc.europa.eu/en*\n454 European Maritime Safety Agency EMSA (http://www.emsa.europa.eu/ ), Section on Safety and Security \nhttp://www.emsa.europa.eu/we-do/safety.html \n455 Fundamental Rights Agency FRA, https://fra.europa.eu/en, Section on ‘Trafficking and labour exploitation, e.g \nthe report from June 2021 titled: Protecting migrants in an irregular situation from labour exploitation – Role of the \nEmployers Sanctions Directive \n456 European Monitoring Centre for Drugs and Drug Addiction EMCDDA (https://www.emcdda.europa.eu/), \nSection ‘Best practice’, Policy and practice briefings: Work places, https://www.emcdda.europa.eu/best- \npractice/briefings/workplace_en \nQuite unknown and difficult to estimate: between one and nine percent of the employees take so-called neuro \n\nEuropean Agency for Safety and Health at Work – EU-OSHA \n158 ", - "page_start": 158, - "page_end": 158, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 285, + "page_end": 285, + "source_file": "00-80T-80.pdf" }, { - "text": "41 Article 29 of the EU Renewable Energy Directive 2018/2001. \n42 See for example Intergovernmental Panel on Climate Change (2019), Special Report on the Ocean and \nthe Cryosphere in a Changing Climate. \n43 The Common Fisheries Policy, the Marine Strategy Framework Directive (2008/56/EC) and the \nMaritime Spatial Planning Directive (2014/89/EU). \n44 The Commission will report on the implementation of the Maritime Spatial Planning Directive by \nMarch 2022 at the latest, including the application of ecosystem-based management. \n45 Protected by international and EU law. \n\n11 ", - "page_start": 12, - "page_end": 12, - "source_file": "legal5_eubiodiversity_cc4.pdf" + "text": "", + "page_start": 285, + "page_end": 285, + "source_file": "00-80T-80.pdf" }, { - "text": "| Such as the Directives on Environmental Impact Assessment (2014/52/EU), on Strategic Environmental Assessment (2001/42/EC), on Environmental Liability (2004/35/CE) and on Environmental Crime (2008/99/EC). https://ec.europa.eu/environment/aarhus/ Study on due diligence requirements through the supply chain – Final Report. | |\n|---|---|\n| Directive 2014/95/EU amending Directive 2013/34/EU as regards disclosure of non-financial and | |\n| diversity information by certain large undertakings. | |\n", - "page_start": 17, - "page_end": 17, - "source_file": "legal5_eubiodiversity_cc4.pdf" + "text": "", + "page_start": 50, + "page_end": 50, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**energy**41. It will also review in 2021 the data on biofuels with high indirect land-use \nchange risk and establish a trajectory for their gradual phase out by 2030. \n\nThe overall objective is to ensure that EU regulatory framework on bioenergy is in line \nwith the increased ambition set out in the European Green Deal. \n\n*2.2.6. Restoring the good environmental status of marine ecosystems*\n\n**Restored and properly protected marine ecosystems**bring substantial health, social \nand economic benefits to coastal communities and the EU as a whole. The need for \nstronger action is all the more acute as marine and coastal ecosystem biodiversity loss is \nseverely exacerbated by global warming42. \n\nAchieving good environmental status of marine ecosystems, including through strictly \nprotected areas, must involve the restoration of carbon-rich ecosystems as well as \nimportant fish spawning and nursery areas. Some of today’s sea uses endanger food \nsecurity, fishers’ livelihoods, and the fishery and seafood sectors.**Marine resources**\n**must be harvested sustainably and there must be zero-tolerance for illegal practices**. \nIn this regard, the full implementation of the EU’s Common Fisheries Policy, the Marine \nStrategy Framework Directive and the Birds and Habitats Directives is essential. ", - "page_start": 12, - "page_end": 12, - "source_file": "legal5_eubiodiversity_cc4.pdf" + "text": "", + "page_start": 160, + "page_end": 160, + "source_file": "00-80T-80.pdf" } ] }, @@ -19407,64 +19407,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 353, + "page_end": 353, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 274, + "page_end": 274, + "source_file": "00-80T-80.pdf" }, { - "text": "**Structure of Sumitomo Mitsui Financial Group (as of September 30, 2011)**\n\nDaiwa SB Investments \nDaiwa SB Investments \n\n**SMFG SUMITOMO MITSUI FINANCIAL GROUP**\nSumitomo Mitsui Auto Service \nSumitomo Mitsui Auto Service ", - "page_start": 16, - "page_end": 16, - "source_file": "NYSE_SMFG_2011.pdf" + "text": "", + "page_start": 274, + "page_end": 274, + "source_file": "00-80T-80.pdf" }, { - "text": "In the past, the Sumitomo Group \nIn the past, the Sumitomo Group undertook large-scale afforestation \nundertook large-scale afforestation \n\nprograms to solve the problem of \nprograms to solve the problem of pollution around the Besshi copper \npollution around the Besshi copper \n\nmine, while the Mitsui Group set up \nmine, while the Mitsui Group set up the Mitsui Memorial Hospital to \nthe Mitsui Memorial Hospital to \n\ngive the poorest in society access to \ngive the poorest in society access to basic medical care. Based on this \nbasic medical care. Based on this \n\ncorporate social responsibility \ncorporate social responsibility DNA embedded in the business \nDNA embedded in the business \n\nphilosophies of both the Sumitomo \nphilosophies of both the Sumitomo and Mitsui groups over the 400 \nand Mitsui groups over the 400 \n\nyears of their existence, we will \nyears of their existence, we will continue to play our part in solving \ncontinue to play our part in solving \n\nproblems facing the international \nproblems facing the international community through our financial \ncommunity through our financial \n\noperations. \nservice operations. \nservice ", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_SMFG_2011.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "| www.smfg.co.jp/english | | Sumitomo Mitsui Financial Group CSR Report\nDigest version |\n|---|---|---|\n| www.smfg.co.jp/english | | Sumitomo Mitsui Financial Group CSR Report Digest version |\n| | | |\n", - "page_start": 1, - "page_end": 1, - "source_file": "NYSE_SMFG_2011.pdf" + "text": "", + "page_start": 274, + "page_end": 274, + "source_file": "00-80T-80.pdf" }, { - "text": "As part of its core leasing operations, \nAs part of its core leasing operations, \n\nSumitomo Mitsui Finance & Leasing is \nSumitomo Mitsui Finance & Leasing is \n\nhelping reduce customers’ environmental \nhelping reduce customers’ environmental ", - "page_start": 12, - "page_end": 12, - "source_file": "NYSE_SMFG_2011.pdf" + "text": "", + "page_start": 274, + "page_end": 274, + "source_file": "00-80T-80.pdf" }, { - "text": "**Scope of this Report**\n\n(cid:129) Sumitomo Mitsui Financial Group, Inc. \n\n(cid:129) Sumitomo Mitsui Banking Corporation \n\n(cid:129) SMFG Card & Credit, Inc. \n\n(cid:129) Sumitomo Mitsui Card Company, Limited \n\n(cid:129) Cedyna Financial Corporation \n\n(cid:129) Sumitomo Mitsui Finance and Leasing Co., Ltd. \n\n(cid:129) The Japan Research Institute, Limited \n\n(cid:129) SMBC Friend Securities Co., Ltd. \n\n(cid:129) SMBC Nikko Securities Inc. \n\n(cid:129) THE MINATO BANK, LTD. \n\n(cid:129) Kansai Urban Banking Corporation \n\n(cid:129) Other Group companies \n\nCompany name abbreviations and other special terminology \n\nThroughout this report,**“Sumitomo Mitsui Financial Group”**or**“SMFG”**refers to the holding company alone.**“The SMFG Group”**\n\nrefers to the holding company and its primary domestic and international subsidiaries and affiliates. ", - "page_start": 16, - "page_end": 16, - "source_file": "NYSE_SMFG_2011.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "In November 2010, the Sumitomo Mitsui \nIn November 2010, the Sumitomo Mitsui \n\nFinancial Group listed on the New York \nFinancial Group listed on the New York \n\nStock Exchange. This move, we believe, not \nStock Exchange. This move, we believe, not \n\nonly significantly increases convenience for \nonly significantly increases convenience for \n\nour overseas shareholders and investors, \nour overseas shareholders and investors, \n\nbut also broadens our customer base as it \nbut also broadens our customer base as it \n\nfurther increases the transparency of our \nfurther increases the transparency of our \n\nfinancial position. Listing on the New York \nfinancial position. Listing on the New York \n\nStock Exchange as a socially responsible \nStock Exchange as a socially responsible \n\ncorporation accelerates our evolution into a \ncorporation accelerates our evolution into a \n\nglobal player. \nglobal player. ", - "page_start": 10, - "page_end": 10, - "source_file": "NYSE_SMFG_2011.pdf" + "text": "", + "page_start": 274, + "page_end": 274, + "source_file": "00-80T-80.pdf" }, { - "text": "\nAnd today \nAnd today Besshi copper mine in the Meiji era \nBesshi copper mine in the Meiji era \n\nMitsui Charity Hospital at its establishment \nMitsui Charity Hospital at its establishment ", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_SMFG_2011.pdf" + "text": "", + "page_start": 274, + "page_end": 274, + "source_file": "00-80T-80.pdf" }, { - "text": "environmental businesses in the nation. \nenvironmental businesses in the nation. \n\nAt the same time, in April 2011, the bank’s s \nAt the same time, in April 2011, the bank \n\nMalaysia unit Sumitomo Mitsui Banking \nMalaysia unit Sumitomo Mitsui Banking \n\nC orporation Malaysia Berhad began \nC orporation Malaysia Berhad began \n\noperations. This unit is broadening support \noperations. This unit is broadening support \n\nmeasures to contribute to the development \nmeasures to contribute to the development \n\nof environmental businesses in Malaysia. \nof environmental businesses in Malaysia. \n\nMeanwhile, in August 2010, the Japan \nMeanwhile, in August 2010, the Japan ", - "page_start": 13, - "page_end": 13, - "source_file": "NYSE_SMFG_2011.pdf" + "text": "", + "page_start": 274, + "page_end": 274, + "source_file": "00-80T-80.pdf" } ] }, @@ -19481,64 +19481,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 271, + "page_end": 271, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 164, + "page_end": 164, + "source_file": "00-80T-80.pdf" }, { - "text": "**Structure of Sumitomo Mitsui Financial Group (as of September 30, 2011)**\n\nDaiwa SB Investments \nDaiwa SB Investments \n\n**SMFG SUMITOMO MITSUI FINANCIAL GROUP**\nSumitomo Mitsui Auto Service \nSumitomo Mitsui Auto Service ", - "page_start": 16, - "page_end": 16, - "source_file": "NYSE_SMFG_2011.pdf" + "text": "", + "page_start": 305, + "page_end": 305, + "source_file": "00-80T-80.pdf" }, { - "text": "In the past, the Sumitomo Group \nIn the past, the Sumitomo Group undertook large-scale afforestation \nundertook large-scale afforestation \n\nprograms to solve the problem of \nprograms to solve the problem of pollution around the Besshi copper \npollution around the Besshi copper \n\nmine, while the Mitsui Group set up \nmine, while the Mitsui Group set up the Mitsui Memorial Hospital to \nthe Mitsui Memorial Hospital to \n\ngive the poorest in society access to \ngive the poorest in society access to basic medical care. Based on this \nbasic medical care. Based on this \n\ncorporate social responsibility \ncorporate social responsibility DNA embedded in the business \nDNA embedded in the business \n\nphilosophies of both the Sumitomo \nphilosophies of both the Sumitomo and Mitsui groups over the 400 \nand Mitsui groups over the 400 \n\nyears of their existence, we will \nyears of their existence, we will continue to play our part in solving \ncontinue to play our part in solving \n\nproblems facing the international \nproblems facing the international community through our financial \ncommunity through our financial \n\noperations. \nservice operations. \nservice ", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_SMFG_2011.pdf" + "text": "", + "page_start": 165, + "page_end": 165, + "source_file": "00-80T-80.pdf" }, { - "text": "| www.smfg.co.jp/english | | Sumitomo Mitsui Financial Group CSR Report\nDigest version |\n|---|---|---|\n| www.smfg.co.jp/english | | Sumitomo Mitsui Financial Group CSR Report Digest version |\n| | | |\n", - "page_start": 1, - "page_end": 1, - "source_file": "NYSE_SMFG_2011.pdf" + "text": "", + "page_start": 306, + "page_end": 306, + "source_file": "00-80T-80.pdf" }, { - "text": "As part of its core leasing operations, \nAs part of its core leasing operations, \n\nSumitomo Mitsui Finance & Leasing is \nSumitomo Mitsui Finance & Leasing is \n\nhelping reduce customers’ environmental \nhelping reduce customers’ environmental ", - "page_start": 12, - "page_end": 12, - "source_file": "NYSE_SMFG_2011.pdf" + "text": "", + "page_start": 306, + "page_end": 306, + "source_file": "00-80T-80.pdf" }, { - "text": "**Roundtable session: SMBC Food and Agricultural Assessment Loan**\n\nA roundtable session with experts held in August 2011 \nconsidered the role of the new SMBC Food and Agricultural \nAssessment Loan in improving the food supply chain that \nlinks food and fishery producers with food processors and \nconsumers. Opinions were also exchanged on what other \nfuture role the bank might assume in this regard, given \nthe current situation and issues facing the food industry \nand agriculture \nin Japan. \n\n**Key comments of participants**\n\n| | For further details, please see our website. |\n|---|---|\n| | For further details, please see our website. |\n\n\nYasuhiro Nakashima Associate Professor Graduate School of Agricultural and Life Sciences, \nThe University of Tokyo \n“Eating should be something that generates emotion. New potential exists in the world of cuisine.” \nDaisuke Yamamoto, Vice Senior Consultant, Research Department, \nThe Japan Research Institute, Limited \n“As consumer tastes go through a time of great change, I think it is important to \nprioritize ingredients and the attitude of customers toward eating.” \nYoichiro Fukayama, Planning Dept., Deputy Head (with powers of representation) of \nthe Corporate Banking Unit & Middle Market Banking Unit, SMBC \n“An important concept is multilateral dialogue as the number of parties involved in food \nproduction increases throughout the supply chain.” \nModerated by Kenji Sawami, Partner, Ernst & Young ShinNihon LLC ", - "page_start": 8, - "page_end": 8, - "source_file": "NYSE_SMFG_2011.pdf" + "text": "", + "page_start": 306, + "page_end": 306, + "source_file": "00-80T-80.pdf" }, { - "text": "Commitment from the Top \n\nTakeshi Kunibe \n**A Conversation with Tadao Ando, Takeshi Kunibe and Koichi Miyata**\n\nPresident and CEO \nSumitomo Mitsui Banking Corporation \n\n**What can we do now to spur**\n**the reconstruction and revitalization**\n**of Japan, and help**\n**resolve global issues?**\nuntil the country became an economic \nuntil the country became an economic ", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_SMFG_2011.pdf" + "text": "", + "page_start": 306, + "page_end": 306, + "source_file": "00-80T-80.pdf" }, { - "text": "\nAnd today \nAnd today Besshi copper mine in the Meiji era \nBesshi copper mine in the Meiji era \n\nMitsui Charity Hospital at its establishment \nMitsui Charity Hospital at its establishment ", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_SMFG_2011.pdf" + "text": "", + "page_start": 165, + "page_end": 165, + "source_file": "00-80T-80.pdf" }, { - "text": "*Uplifting the nation’s spirits*\n*Uplifting the nation’s spirits*\n\nJapan is now facing a wide variety of problems, ranging from the reconstruction of the Tohoku region (the northeastern region of Japan) \nJapan is now facing a wide variety of problems, ranging from the reconstruction of the Tohoku region (the northeastern region of Japan) \n\nafter the March 11 earthquake and tsunami (“the Great East Japan Earthquake”) to a shrinking and aging population, with falling birth rates \nafter the March 11 earthquake and tsunami (“the Great East Japan Earthquake”) to a shrinking and aging population, with falling birth rates \n\nand increasing numbers of the aged. \nand increasing numbers of the aged. \n\nWe must now find ways for people to coexist in harmony with nature, based on a global perspective. \nWe must now find ways for people to coexist in harmony with nature, based on a global perspective. \n\nSumitomo Mitsui Financial Group (SMFG) invited the world-famous architect Tadao Ando to join in a conversation on the issues facing society \nSumitomo Mitsui Financial Group (SMFG) invited the world-famous architect Tadao Ando to join in a conversation on the issues facing society ", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_SMFG_2011.pdf" + "text": "", + "page_start": 165, + "page_end": 165, + "source_file": "00-80T-80.pdf" } ] }, @@ -19549,70 +19549,70 @@ "target_page": 1, "target_passage": "(NC) Communities in Canada are facing increased flood risks, with 1.5 million homes highly exposed", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 287, + "page_end": 287, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 336, + "page_end": 336, + "source_file": "00-80T-80.pdf" }, { - "text": "| | MENU | SEARCH | ARTICLES | RADIO | VIDEO | EN |\n|---|---|---|---|---|---|---|\n| | MENU | SEARCH | ARTICLES | RADIO | VIDEO | EN |\n| Three ways Canadian communities are reducing flood EDITOR'S PICKS risks (NC) Communities in Canada are facing increased flood risks, with 1.5 million homes highly exposed. There are large-scale programs available across the country providing flood protection measures for communities at risk, such as Intact’s Municipal Climate Resiliency Grants. This program is helping build the resilience of communities and homes through a variety of preventative actions. Have your say! Complete our ISSUE 2025 Media Survey Wetlands can reduce flood risk by absorbing large quantities of water, but they are not typically December 2024 found in cities. In Vancouver, B.C., Environmental Youth Alliance and Strathcona Community  Gardens created a wetland on downtown’s east side, an area historically prone to flooding. Made up of natural elements like ponds and marshes, the wetland reduces the community’s flood risk CATEGORIES  by catching and absorbing rainfall and runoff from surrounding surfaces. Home - Safety Community Affairs Knowing the risks is the first step to protecting homes and communities. In New Brunswick, the  Finance - Insurance City of Fredericton launched a Neighbourhood Flood Risk Tool to provide easy access to online Editor's Picks flood prevention guidance. Residents can input their addresses to see if they are at risk and learn  Retrain your way to a new job tips to reduce the risk of flooding around their properties. The portal launched in the summer of 2023 and was viewed 27,000 times in its first year. FRANÇAIS Rebate programs are a powerful motivation for homeowners to make upgrades that might otherwise be put off. In PEI, the City of Charlottetown offered rebates covering 75 per cent of eligible material and labour costs, up to a maximum of $1,000. More than 90 properties completed upgrades, including installing sump pumps, backup batteries, backwater valves, and water monitors and alarms, to better prepare them for extreme weather events. Communities can learn more about the grant program and how to apply at intactfc.com/mcrg. The top AI-powered tech trends in 2025 Trois façons dont des www.newscanada.com collectivités au Canada Word Count: 281 réduisent leurs risques d’inondation − Media Attachments View + Related Posts + Terms of Use | | | | | | |\n| News Canada and L'édition Nouvelles are either registered trademarks or trademarks of News Canada Inc. All rights reserved. | | | | | | |\n", - "page_start": 1, - "page_end": 1, - "source_file": "news2.pdf" + "text": "", + "page_start": 46, + "page_end": 46, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "ww.nytimes.com/2023/07/05/business/artificial-intelligence-power-data-centers.html).*The*\n*New York Times*. Archived (https://web.archive.org/web/20240708214644/https://www.nytim \nes.com/2023/07/05/business/artificial-intelligence-power-data-centers.html) from the original \non 8 July 2024. Retrieved 5 October 2024. \n\n203. \"Electricity 2024 – Analysis\" (https://www.iea.org/reports/electricity-2024).*IEA*. 24 January \n\n2024. Retrieved 13 July 2024. \n\n204. Calvert, Brian (28 March 2024). \"AI already uses as much energy as a small country. It's \n\nonly the beginning\" (https://www.vox.com/climate/2024/3/28/24111721/ai-uses-a-lot-of-ener \ngy-experts-expect-it-to-double-in-just-a-few-years).*Vox*. New York, New York. Archived (http \ns://web.archive.org/web/20240703080555/https://www.vox.com/climate/2024/3/28/2411172 \n1/ai-uses-a-lot-of-energy-experts-expect-it-to-double-in-just-a-few-years) from the original \non 3 July 2024. Retrieved 5 October 2024. ", - "page_start": 42, - "page_end": 42, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 46, + "page_end": 46, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "Due \ndate \n\n2013 \n2014 \n2014 \n2015 \n2015 \n2016 \n2017 \n2018 \n2019 \n2020 \n2021 \n2022 \n2023 \n2023 \n2032 \n2038 \n2039 \n2040 \n2041 \n2043 \n2043 ", - "page_start": 115, - "page_end": 115, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 46, + "page_end": 46, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "Scenario 1 Central Scenario \n\nIllustrative Scenario 1 estimates that the prison population will rise to 87,100 \nby the end of June 2015 and then fall to 81,400 by the end of June 2020. \n\nIllustrative Scenario 2 estimates that the prison population will rise to 88,900 \nby the end of June 2015 and to 98,900 by the end of June 2020. \n\nThe projected trends reflect the cumulative impacts of the various sentencing, \nlegislative and procedural assumptions that are used to generate the \nprojections. The seasonal pattern reflects the dip in the prison population \nwhich is always seen around the Christmas period. \n\nIn the Central Scenario, the prison population is expected to rise to 90,200 by \nJune 2020. The projected population increase is largely due to the recent \ntrends in case mix where we have seen more serious cases come before the \ncourts. This results in offenders receiving longer custodial sentence lengths, \nwhich in turn places an upward pressure on the prison population. The growth \nin this scenario is largely driven by the rise in the determinate population \nwhich is projected to grow to 60,200 by June 2020. This is partially due to the ", - "page_start": 13, - "page_end": 13, - "source_file": "legal4_opengouvernementlicense.pdf" + "text": "", + "page_start": 45, + "page_end": 45, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "213. Mochizuki, Takashi; Oda, Shoko (18 October 2024). \"エヌビディア出資の⽇本企業、原発近 \nくでAIデータセンター新設検討\" (https://www.bloomberg.co.jp/news/articles/2024-10-18/S \nLHGKKT0AFB400).*Bloomberg*(in Japanese). \n\n214. Naureen S Malik and Will Wade (5 November 2024). \"Nuclear-Hungry AI Campuses Need \n\nNew Plan to Find Power Fast\" (https://www.bloomberg.com/news/articles/2024-11-04/nucle \nar-hungry-ai-campuses-need-new-strategy-to-find-power-fast). Bloomberg. \n\n215. Nicas (2018). \n216. Rainie, Lee; Keeter, Scott; Perrin, Andrew (22 July 2019). \"Trust and Distrust in America\" (ht \ntps://www.pewresearch.org/politics/2019/07/22/trust-and-distrust-in-america).*Pew Research*\n*Center*. Archived (https://web.archive.org/web/20240222000601/https://www.pewresearch.or \ng/politics/2019/07/22/trust-and-distrust-in-america) from the original on 22 February 2024. \n\n217. Williams (2023). \n218. Taylor & Hern (2023). \n219. Samuel, Sigal (19 April 2022). \"Why it's so damn hard to make AI fair and unbiased\" (https:// \nwww.vox.com/future-perfect/22916602/ai-bias-fairness-tradeoffs-artificial-intelligence).*Vox*. \nArchived (https://web.archive.org/web/20241005170153/https://www.vox.com/future-perfect/ \n22916602/ai-bias-fairness-tradeoffs-artificial-intelligence) from the original on 5 October \n2024. Retrieved 24 July 2024. \n\n220. Rose (2023). \n221. CNA (2019). \n222. Goffrey (2008), p. 17. \n223. Berdahl et al. (2023); Goffrey (2008, p. 17); Rose (2023); Russell & Norvig (2021, p. 995) \n224. Christian (2020), p. 25. \n225. Russell & Norvig (2021), p. 995. \n226. Grant & Hill (2023). \n227. Larson & Angwin (2016). \n228. Christian (2020), p. 67–70. \n229. Christian (2020, pp. 67–70); Russell & Norvig (2021, pp. 993–994) \n230. Russell & Norvig (2021, p. 995); Lipartito (2011, p. 36); Goodman & Flaxman (2017, p. 6); \n\n274. Pittis, Don (4 May 2023). \"Canadian artificial intelligence leader Geoffrey Hinton piles on \n\nfears of computer takeover\" (https://www.cbc.ca/news/business/ai-doom-column-don-pittis- \n1.6829302).*CBC*. Archived (https://web.archive.org/web/20240707032135/https://www.cbc. \nca/news/business/ai-doom-column-don-pittis-1.6829302) from the original on 7 July 2024. \nRetrieved 5 October 2024. \n\n275. \" '50–50 chance' that AI outsmarts humanity, Geoffrey Hinton says\" (https://www.bnnbloomb \n\nerg.ca/50-50-chance-that-ai-outsmarts-humanity-geoffrey-hinton-says-1.2085394). \n*Bloomberg BNN*. 14 June 2024. Retrieved 6 July 2024. \n\n276. Valance (2023). \n277. Taylor, Josh (7 May 2023). \"Rise of artificial intelligence is inevitable but should not be \n\nfeared, 'father of AI' says\" (https://www.theguardian.com/technology/2023/may/07/rise-of-arti \nficial-intelligence-is-inevitable-but-should-not-be-feared-father-of-ai-says).*The Guardian*. \nArchived (https://web.archive.org/web/20231023061228/https://www.theguardian.com/techn \nology/2023/may/07/rise-of-artificial-intelligence-is-inevitable-but-should-not-be-feared-father- \nof-ai-says) from the original on 23 October 2023. Retrieved 26 May 2023. ", - "page_start": 43, - "page_end": 43, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 45, + "page_end": 45, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "However, caution needs to be exercised. Not only will this trend be affected by the changing \nlevel of DIP coverage but also DIP only started in 2004 so every new individual who tests \npositive in that year is effectively ‘new’. This means that because the probability of arrest, for \nany offence committed, is less than one (i.e. not everyone gets caught), it is likely that there will \nbe a natural downward bias in the trend for positive first tests. To see this, imagine a population \nof 100 OCUs who commit one crime each year. If the probability of arrest is 20 per cent, 20 \nindividuals will show up in the DIP data as ‘first positive tests’ in the first year. In the second \nyear, 16 will show up from the original cohort (80 x 20%), alongside 20 per cent of any new \ncrime-involved OCUs joining the population that year.12 \n\nSo the sharply falling trend cannot simply be interpreted as a sharp fall in the number of \ngenuinely new crime-involved OCUs, as the figures will also be capturing declining numbers of \nthe original cohort. Looking at the fourth row in Table 5 we can see that it is only in 2012 that the \ntotal number of unique individuals testing positive exceeds 100,000. Given that available \nestimates suggest the total number of OCUs in the mid-2000s was around 300,000 (Hay et al., \n2013), it is clear that plenty of the pre-existing population probably appear as ‘new’ positive \ntesters right the way through the series.13 ", - "page_start": 16, - "page_end": 16, - "source_file": "legal2_opengouvernementlicense.pdf" + "text": "", + "page_start": 45, + "page_end": 45, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "Financing Receivables \n\nAs of September 30, 2024 and December 31, 2023, the vast majority of our financing receivables were at current status \n\nwith an immaterial balance being past due. As of September 30, 2024 and December 31, 2023, the majority of our financing \nreceivables, excluding MyPower notes receivable, were originated in 2023 and 2022. \n\n13 ", - "page_start": 17, - "page_end": 17, - "source_file": "tesla_form_10q.pdf" + "text": "", + "page_start": 336, + "page_end": 336, + "source_file": "00-80T-80.pdf" }, { - "text": "ITEM 1A. RISK FACTORS \n\nOur operations and financial results are subject to various risks and uncertainties, including the factors discussed in Part \n\nI, Item 1A, Risk Factors in our Annual Report on Form 10-K for the year ended December 31, 2023, which could adversely \naffect our business, financial conditions and future results. ", - "page_start": 47, - "page_end": 47, - "source_file": "tesla_form_10q.pdf" + "text": "", + "page_start": 336, + "page_end": 336, + "source_file": "00-80T-80.pdf" } ] }, @@ -19623,70 +19623,70 @@ "target_page": 1, "target_passage": "In Vancouver, B.C., Environmental Youth Alliance and Strathcona Community Gardens created a wetland on downtown’s east side, an area historically prone to flooding. ", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 209, + "page_end": 209, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 111, + "page_end": 111, + "source_file": "00-80T-80.pdf" }, { - "text": "| | MENU | SEARCH | ARTICLES | RADIO | VIDEO | EN |\n|---|---|---|---|---|---|---|\n| | MENU | SEARCH | ARTICLES | RADIO | VIDEO | EN |\n| Three ways Canadian communities are reducing flood EDITOR'S PICKS risks (NC) Communities in Canada are facing increased flood risks, with 1.5 million homes highly exposed. There are large-scale programs available across the country providing flood protection measures for communities at risk, such as Intact’s Municipal Climate Resiliency Grants. This program is helping build the resilience of communities and homes through a variety of preventative actions. Have your say! Complete our ISSUE 2025 Media Survey Wetlands can reduce flood risk by absorbing large quantities of water, but they are not typically December 2024 found in cities. In Vancouver, B.C., Environmental Youth Alliance and Strathcona Community  Gardens created a wetland on downtown’s east side, an area historically prone to flooding. Made up of natural elements like ponds and marshes, the wetland reduces the community’s flood risk CATEGORIES  by catching and absorbing rainfall and runoff from surrounding surfaces. Home - Safety Community Affairs Knowing the risks is the first step to protecting homes and communities. In New Brunswick, the  Finance - Insurance City of Fredericton launched a Neighbourhood Flood Risk Tool to provide easy access to online Editor's Picks flood prevention guidance. Residents can input their addresses to see if they are at risk and learn  Retrain your way to a new job tips to reduce the risk of flooding around their properties. The portal launched in the summer of 2023 and was viewed 27,000 times in its first year. FRANÇAIS Rebate programs are a powerful motivation for homeowners to make upgrades that might otherwise be put off. In PEI, the City of Charlottetown offered rebates covering 75 per cent of eligible material and labour costs, up to a maximum of $1,000. More than 90 properties completed upgrades, including installing sump pumps, backup batteries, backwater valves, and water monitors and alarms, to better prepare them for extreme weather events. Communities can learn more about the grant program and how to apply at intactfc.com/mcrg. The top AI-powered tech trends in 2025 Trois façons dont des www.newscanada.com collectivités au Canada Word Count: 281 r��duisent leurs risques d’inondation − Media Attachments View + Related Posts + Terms of Use | | | | | | |\n| News Canada and L'édition Nouvelles are either registered trademarks or trademarks of News Canada Inc. All rights reserved. | | | | | | |\n", - "page_start": 1, - "page_end": 1, - "source_file": "news2.pdf" + "text": "", + "page_start": 23, + "page_end": 23, + "source_file": "basic-english-language-skills.PDF" }, { - "text": "Overall, large-scale river and floodplain restoration investments50 can provide a major \neconomic boost for the restoration sector and for local socioeconomic activities such as \ntourism and recreation. At the same time, these investments can improve water \nregulation, flood protection, nursery habitats for fish, and the removal of nutrient \npollution. \n\n*2.2.8. Greening urban and peri-urban areas*\n\n**Green urban spaces**, from parks and gardens to green roofs and urban farms, provide a \nwide range of benefits for people. They also provide opportunities for businesses and a \nrefuge for nature. They reduce air, water and noise pollution, provide protection from \nflooding, droughts and heat waves, and maintain a connection between humans and \nnature51. \n\nThe recent lockdowns due to the COVID-19 pandemic have shown us the**value of green**\n**urban spaces for our physical and mental wellbeing**. While protection of some urban ", - "page_start": 13, - "page_end": 13, - "source_file": "legal5_eubiodiversity_cc4.pdf" + "text": "", + "page_start": 111, + "page_end": 111, + "source_file": "00-80T-80.pdf" }, { - "text": "\nWHERE ", - "page_start": 243, - "page_end": 243, + "text": "", + "page_start": 111, + "page_end": 111, "source_file": "00-80T-80.pdf" }, { - "text": "\nwhere ", - "page_start": 107, - "page_end": 107, - "source_file": "00-80T-80.pdf" + "text": "", + "page_start": 23, + "page_end": 23, + "source_file": "basic-english-language-skills.PDF" }, { - "text": "\nwhere ", - "page_start": 84, - "page_end": 84, - "source_file": "00-80T-80.pdf" + "text": "", + "page_start": 24, + "page_end": 24, + "source_file": "basic-english-language-skills.PDF" }, { - "text": "Acknowledgments \nAuthor contributions: S. D. A. and G. A. W. \ncontributed to conception and design. J. B., E. \nG., G. A. W., K. L. V., and S. D. A. \ncontributed to analysis and interpretation. J. \nB., E. G., G. A. W., K. L. V., S. D. A., C. B., C. \nL., L.-P. B., A. C., E. P., S. K. F., S. G., R. A. \nM., I. M., M. B., P. H., M. D. L., M. A., C. J. L., \nT. A., N. E., G. G. A., and S. M. contributed to \ndrafting the manuscript for important \nintellectual content. All authors had access to \nand participated in the interpretation of the \ndata and provided input into the preparation \nand submission of the manuscript. The \nauthors vouch for the accuracy and \ncompleteness of the data. \nRole of sponsors: The sponsor had no role in \nthe design of the study, the collection and \nanalysis of the data, or the preparation of the \nmanuscript. \nOther contributions: We thank the \nfollowing individuals from the Canadian \nstudy sites: Ottawa Hospital Research \nInstitute, Ottawa, Ontario: Taylor Poulin; \nSusan Deveau, RRT; Victoria Thompson; \nMeredith McCleery; Angelina Tohme; Vicky \nPanteleakos, RRT; Geneviève Longtin, RRT; \nJoanne Cassidy, RRT; Amanda Bergeron, \nMSc; Jennifer Biggs, RN; Jessica Bergeron; \nand Elisabet White; Vancouver General \nHospital, Vancouver, British Columbia: \nShelley Abercromby, BSc; Jana Caine; David ", - "page_start": 12, - "page_end": 12, - "source_file": "pubmed6_cc4.pdf" + "text": "", + "page_start": 24, + "page_end": 24, + "source_file": "basic-english-language-skills.PDF" }, { - "text": "(cid:129) Sportsnet 360 was launched, which is comprised of the rebranded \ntheScore assets. The acquisition of theScore received final regulatory \napproval in the first half of this year. \nCABLE \n(cid:129) Acquisition of Mountain Cable, Shaw Communications’ (Shaw) cable \n\n(cid:129) Sportsnet announced a 10-year partnership extension with the \nVancouver Canucks through the 2022-2023 NHL seasons, continuing \na 14-year network tradition as the regional television broadcaster of \nCanucks hockey. The new agreement features a comprehensive suite \nof multimedia rights \nincluding television, online and mobile, \ndelivering up to 60 regular season Vancouver Canucks games each \nseason. Sportsnet is also the official regional television broadcast \nrights holder for the Toronto Maple Leafs, Calgary Flames and \nEdmonton Oilers. \n\nsystem in Hamilton, Ontario was completed. \n\n(cid:129) Next generation TV experience was unveiled with NextBox 3.0 giving \nviewers access to record up to eight HD programs at one time and \nstore up to 240 hours of HD content. The NextBox 3.0 experience \nincludes Whole Home PVR capability and becomes a wireless TV \nexperience allowing viewers to navigate their cable guide, use a \nvirtual remote, set PVR recordings and live stream channels all from a \ntablet or smartphone while at home or away. ", - "page_start": 39, - "page_end": 39, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 25, + "page_end": 25, + "source_file": "basic-english-language-skills.PDF" }, { - "text": "| TABLE 4 Interview guide. | |\n|---|---|\n| Theme | Potential questions |\n| Overall experiences and reflections from participation | Generally, what are your main experiences of participation? |\n| | What did you perceive as meaningful? |\n| | What did you perceive as negative? |\n| Content | How did you experience: |\n| | • The content of the sessions in general • The high-intensity walking/running • The specific exercises • The combination of specific exercises and intervals of running/walking • The exercise intensity |\n| | How did you respond to the exercises? How did you experience getting tired? |\n| | How do you perceive your specific movement impairments (if any) being addressed? |\n| | Please elaborate on situations where you experienced the feeling of mastery/failure. |\n| | If anything: What was challenging? What would you prefer to have been done differently? What did you enjoy? |\n| | What was the value of participating in the indoor exercise group beforehand? |\n| | How did you experience this kind of exercise intervention compared to other type of exercise you may have experience with? |\n| The role of the physiotherapists | What did the physiotherapists do? What was the value of this to you? |\n| The group setting | How did you experience the group setting? |\n| | How did you perceive the atmosphere in the group? |\n| The outdoor environment | How was it to exercise outdoors? |\n| | How did you perceive the city park environment for exercise? |\n| Closing questions | Are there any experiences from participation that you would like to elaborate on? Is anything related to this project that we have not talked about that you would like to say? |\n| | How did you experience this interview? |\n", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed13.pdf" + "text": "", + "page_start": 179, + "page_end": 179, + "source_file": "00-80T-80.pdf" } ] }, @@ -19697,70 +19697,70 @@ "target_page": 1, "target_passage": "New Brunswick, the City of Fredericton launched a Neighbourhood Flood Risk Tool to provide easy access to online flood prevention guidance.", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 173, + "page_end": 173, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 207, + "page_end": 207, + "source_file": "00-80T-80.pdf" }, { - "text": "| | MENU | SEARCH | ARTICLES | RADIO | VIDEO | EN |\n|---|---|---|---|---|---|---|\n| | MENU | SEARCH | ARTICLES | RADIO | VIDEO | EN |\n| Three ways Canadian communities are reducing flood EDITOR'S PICKS risks (NC) Communities in Canada are facing increased flood risks, with 1.5 million homes highly exposed. There are large-scale programs available across the country providing flood protection measures for communities at risk, such as Intact’s Municipal Climate Resiliency Grants. This program is helping build the resilience of communities and homes through a variety of preventative actions. Have your say! Complete our ISSUE 2025 Media Survey Wetlands can reduce flood risk by absorbing large quantities of water, but they are not typically December 2024 found in cities. In Vancouver, B.C., Environmental Youth Alliance and Strathcona Community  Gardens created a wetland on downtown’s east side, an area historically prone to flooding. Made up of natural elements like ponds and marshes, the wetland reduces the community’s flood risk CATEGORIES  by catching and absorbing rainfall and runoff from surrounding surfaces. Home - Safety Community Affairs Knowing the risks is the first step to protecting homes and communities. In New Brunswick, the  Finance - Insurance City of Fredericton launched a Neighbourhood Flood Risk Tool to provide easy access to online Editor's Picks flood prevention guidance. Residents can input their addresses to see if they are at risk and learn  Retrain your way to a new job tips to reduce the risk of flooding around their properties. The portal launched in the summer of 2023 and was viewed 27,000 times in its first year. FRANÇAIS Rebate programs are a powerful motivation for homeowners to make upgrades that might otherwise be put off. In PEI, the City of Charlottetown offered rebates covering 75 per cent of eligible material and labour costs, up to a maximum of $1,000. More than 90 properties completed upgrades, including installing sump pumps, backup batteries, backwater valves, and water monitors and alarms, to better prepare them for extreme weather events. Communities can learn more about the grant program and how to apply at intactfc.com/mcrg. The top AI-powered tech trends in 2025 Trois façons dont des www.newscanada.com collectivités au Canada Word Count: 281 réduisent leurs risques d’inondation − Media Attachments View + Related Posts + Terms of Use | | | | | | |\n| News Canada and L'édition Nouvelles are either registered trademarks or trademarks of News Canada Inc. All rights reserved. | | | | | | |\n", - "page_start": 1, - "page_end": 1, - "source_file": "news2.pdf" + "text": "", + "page_start": 206, + "page_end": 206, + "source_file": "00-80T-80.pdf" }, { - "text": "**Investment in the Urban Centres of New Brunswick and PEI**\n\n26% of Killam’s apartment NOI is currently generated in New Brunswick, split principally between the province’s three major urban centres, \nFredericton, Moncton and Saint John. Fredericton and Moncton both experienced high population growth over the last number of years, \nposting 9.3% and 8.7% growth, respectively, between the 2006 and 2011 Census periods. Fredericton is the provincial capital and home to \nthe province’s largest university. Moncton is the largest city and a transportation and distribution hub for Atlantic Canada. Population growth \nin Moncton in recent years has been driven by urbanization from French communities in Northern New Brunswick. The Saint John market, \nrepresenting 5.6% of Killam’s apartment NOI, is focused on industry and energy. After strong energy investments in the city in the mid‑2000s, \nthe city has seen a reduction in economic projects over the last three years. Home to Irving Oil’s refinery operations, the proposed Energy East \nPipeline project to bring oil from Western Canada to refineries in Quebec and New Brunswick, has potential for strong economic growth for the \ncity and the province. ", - "page_start": 33, - "page_end": 33, - "source_file": "TSX_KMP_2013.pdf" + "text": "", + "page_start": 206, + "page_end": 206, + "source_file": "00-80T-80.pdf" }, { - "text": "2012 \nHalifax, NS \nmoncton, nB \nFredericton, nB \nsaint John, nB \nst. John’s, nl \nCharlottetown, PE \nontario \nOther Atlantic ", - "page_start": 91, - "page_end": 91, - "source_file": "TSX_KMP_2013.pdf" + "text": "", + "page_start": 206, + "page_end": 206, + "source_file": "00-80T-80.pdf" }, { - "text": "**2013**\nHalifax, NS \nmoncton, nB \nFredericton, nB \nsaint John, nB \nst. John’s, nl \nCharlottetown, PE \nontario \nOther Atlantic ", - "page_start": 91, - "page_end": 91, - "source_file": "TSX_KMP_2013.pdf" + "text": "", + "page_start": 207, + "page_end": 207, + "source_file": "00-80T-80.pdf" }, { - "text": "**Apartments**\nHalifax \nmoncton \nFredericton \nsaint John \nst. John’s \nCharlottetown \nontario \nOther Atlantic \n**MHCs**\nontario \nNova Scotia \nnew Brunswick \nnewfoundland and labrador ", - "page_start": 80, - "page_end": 80, - "source_file": "TSX_KMP_2013.pdf" + "text": "", + "page_start": 400, + "page_end": 400, + "source_file": "00-80T-80.pdf" }, { - "text": "more concrete over time is damage control. In a world that produces digital data without \n\ninterruption, uncontrolled and unpredictable data releases are facts of life that are very hard to \n\npredict, practically impossible to avoid and increasingly common. Opening public government data, \n\nthat is providing plenty of officially verified information, becomes therefore also a damage control \n\nsolution, to prevent or at least minimize damages from such uncontrolled releases. Without official \n\nOpen Public Data, individual citizens, political parties or other organizations will start to process \n\nand compare (if they already aren't...) data from unofficial sources anyway, maybe from different \n\ncountries. In such cases, it will be unavoidable not reach sometimes, even in good faith, wrong \n\nconclusions. This is not some theoretical possibility far in the future, as this real world example \n\n(from a comment to an Open Data discussion in an italian blog) proves: \n\n\"*on the*[non italian]*Geonames website you can download geo-referenced data*\n*about... 47000 Italian municipalities. That worries me, because there are only 8094 of*\n*them. Besides, I grabbed a few random data about population, and I can guarantee you*\n*that not one was right. What should be done in such cases?*", - "page_start": 5, - "page_end": 5, - "source_file": "Open_Data_Report.pdf" + "text": "", + "page_start": 207, + "page_end": 207, + "source_file": "00-80T-80.pdf" }, { - "text": "We are committed to continually strengthening our risk management \ncapabilities to protect and enhance shareholder value. The purpose of \nrisk management is not to eliminate risk but to optimize trade-offs \nbetween risk and return to maximize value to the organization. \n\n**Enterprise Risk Management**\nOur Enterprise Risk Management program seeks to ensure we identify, \nassess, manage, monitor and communicate risk consistently throughout \nthe company and that we manage risk in a way that supports our \nstrategic and business goals. This program supports \nthe Audit \nCommittee and the Board’s responsibility for risk by facilitating a formal \nstrategic risk assessment process. \n\n**Risk Governance**\nThe Board has overall responsibility for risk governance and oversees \nmanagement in identifying the principal risks we face in our business \nand implementing appropriate risk assessment processes to manage \nthese risks. It delegates certain duties to the Audit Committee. \n\nWe carry out an annual strategic risk assessment to identify our \nprincipal risks and their potential impact on our ability to achieve our \nstrategic plans. This assessment includes reviewing risk reports, audit \nreports and industry benchmarks, and interviewing key risk owners. We \nalso conduct a formal survey every two years to get management \nfeedback on the key risks facing the organization and identify emerging \nrisks. Then we prioritize the risks using standard risk assessment criteria. \nEnterprise Risk Management reports the results of the strategic risk \nassessment to the Executive Leadership Team and the Audit Committee. ", - "page_start": 76, - "page_end": 76, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 207, + "page_end": 207, + "source_file": "00-80T-80.pdf" }, { - "text": "**4.5. Educate citizens to understand and use data**\nIt is necessary to guarantee the widest possible availability of*all*the pre-requisites for effective use \n\nof Open Data. In other words, it is necessary to provide free and widely accessible training, oriented \n\nto average citizens, on how and why to visualize Public Data and use them to make informed ", - "page_start": 30, - "page_end": 30, - "source_file": "Open_Data_Report.pdf" + "text": "", + "page_start": 207, + "page_end": 207, + "source_file": "00-80T-80.pdf" } ] }, @@ -19777,64 +19777,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 167, + "page_end": 167, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 229, + "page_end": 229, + "source_file": "00-80T-80.pdf" }, { - "text": "dorsal \nNeuroreport 2018;29:779–85. \n\n[49] Schulte A, Lohner H, Degenbeck J, Segebarth D, Rittner HL, Blum R, Aue \nA. Unbiased analysis of the dorsal root ganglion after peripheral nerve \ninjury: no neuronal loss, no gliosis, but satellite glial cell plasticity. PAIN \n2023;164:728–40. [69] Yu X, Liu H, Hamel KA, Morvan MG, Yu S, Leff J, Guan Z, Braz JM, Basbaum \nAI. Dorsal root ganglion macrophages contribute to both the initiation and \npersistence of neuropathic pain. Nat Commun 2020;11:264. \n\n[50] Shi TJS, Tandrup T, Bergman E, Xu ZQD, Ulfhake B, H ¨okfelt T. Effect of \nperipheral nerve injury on dorsal root ganglion neurons in the C57 BL/6J \n[70] Zheng J, Lu Y, Perl ER. Inhibitory neurones of the spinal substantia \ngelatinosa mediate interaction of signals from primary afferents. J Physiol \n2010;588:2065–75. ", - "page_start": 14, - "page_end": 14, - "source_file": "pubmed2.pdf" + "text": "", + "page_start": 228, + "page_end": 228, + "source_file": "00-80T-80.pdf" }, { - "text": "Dorsal root ganglia were dissected from MrgDCreERT2;Ai32 and \nCalcaCreERT2;Ai32 mice .1 week after dosing with tamoxifen and \nenzymatically digested at 37˚˚C for 80 minutes in dispase type II \n(4.7 mg/mL) plus collagenase type II (4 mg/mL) (Worthington \nBiochemical), as described previously.63 Mechanically dissoci- \nated cells were plated onto laminin/poly-D-lysine (R&D Systems, \nMinneapolis, MN) treated coverslips in complete Neurobasal Plus \nmedium (Neurobasal Plus media supplemented with 2% (vol/vol) \nB27 Plus, 1% N2, 1% Glutamax, and 1% antibiotic–antimycotic \n[ThermoFisher Scientific, Waltham, MA]). Mouse nerve growth \nfactor (GF) (50 ng/mL; nerve growth factor (NGF), PeproTech, \nCranbury, NJ) and 10 ng/mL glial-derived neurotrophic factor \n(GDNF, PeproTech) were added to the media under some \nconditions. Cytosine b-D-arabinofuranoside (4 mM) was added to \nthe media for 24 hours the day after plating to reduce the \nproliferation of nonneuronal cells. Media was refreshed 3 times \nper week thereafter. Cultures were fixed for 10 minutes at room \ntemperature with 4% paraformaldehyde and subsequently \nprocessed by immunocytochemistry (described earlier). ", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed2.pdf" + "text": "", + "page_start": 228, + "page_end": 228, + "source_file": "00-80T-80.pdf" }, { - "text": "December 2024· Volume 165· Number 12 \n\ncell death and apoptosis with more than 10 genes were \nexamined. Filtered count data of expressed and nondifferentially \nexpressed genes were used as a background. \n\n2.8. Dorsal root ganglion culture ", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed2.pdf" + "text": "", + "page_start": 228, + "page_end": 228, + "source_file": "00-80T-80.pdf" }, { - "text": "mouse: marked changes both in cell numbers and neuropeptide \nexpression. Neuroscience 2001;105:249–63. \n\n[51] Song H, Yao E, Lin C, Gacayan R, Chen MH, Chuang PT. Functional \ncharacterization of pulmonary neuroendocrine cells in lung development, \ninjury, and tumorigenesis. Proc Natl Acad Sci 2012;109:17531–6. \n[52] Takasu K, Sakai A, Hanawa H, Shimada T, Suzuki H. Overexpression of \nGDNF in the uninjured DRG exerts analgesic effects on neuropathic pain \nfollowing segmental spinal nerve ligation in mice. J Pain 2011;12: \n1130–1139. \n\n[53] Tandrup T, Woolf CJ, Coggeshall RE. Delayed loss of small dorsal root \nganglion cells after transection of the rat sciatic nerve. J Comp Neurol \n2000;422:172–80. \n[54] Terenghi G, Hart A, Wiberg M. The nerve injury and the dying neurons: \ndiagnosis and prevention. J Hand Surg Eur Vol 2011;36:730–4. ", - "page_start": 14, - "page_end": 14, - "source_file": "pubmed2.pdf" + "text": "", + "page_start": 228, + "page_end": 228, + "source_file": "00-80T-80.pdf" }, { - "text": "[55] Usoskin D, Furlan A, Islam S, Abdo H, Lonnerberg P, Lou D, Hjerling- \nLeffler J, Haeggstrom J, Kharchenko O, Kharchenko PV, Linnarsson S, \nErnfors P. Unbiased classification of sensory neuron types by large-scale \nsingle-cell RNA sequencing. Nat Neurosci 2015;18:145–53. [34] McCoy ES, Taylor-Blake B, Street SE, Pribisko AL, Zheng J, Zylka MJ. \nPeptidergic CGRPa primary sensory neurons encode heat and itch and \ntonically suppress sensitivity to cold. Neuron 2013;78:138–51. \n\n[56] Vestergaard S, Tandrup T, Jakobsen J. Effect of permanent axotomy on \nnumber and volume of dorsal root ganglion cell bodies. J Comp Neurol \n1997;388:307–12. \n\n[35] McKay Hart A, Brannstrom T, Wiberg M, Terenghi G. Primary sensory \nneurons and satellite cells after peripheral axotomy in the adult rat: \ntimecourse of cell death and elimination. Exp Brain Res 2002;142:308–18. \n[36] Molander C, Wang H, Rivero-Meli ´an C, Grant G. Early decline and late \nrestoration of spinal cord binding and transganglionic transport of \nisolectin B4 from Griffonia simplicifolia I after peripheral nerve \ntransection or crush. Restor Neurol Neurosci 1996;10:123–33. \n\n[57] Wall PD, Gutnick M. Properties of afferent nerve impulses originating from \na neuroma. Nature 1974;248:740–43. ", - "page_start": 14, - "page_end": 14, - "source_file": "pubmed2.pdf" + "text": "", + "page_start": 229, + "page_end": 229, + "source_file": "00-80T-80.pdf" }, { - "text": "| Abstract\nThere is a rich literature describing the loss of dorsal root ganglion (DRG) neurons following peripheral axotomy, but the vulnera | bility |\n|---|---|\n| Abstract There is a rich literature describing the loss of dorsal root ganglion (DRG) neurons following peripheral axotomy, but the vulnera | bility |\n| of discrete subpopulations has not yet been characterised. Furthermore, the extent or even presence of neuron loss following i has recently been challenged. In this study, we have used a range of transgenic recombinase driver mouse lines to genetically molecularly defined subpopulations of DRG neurons and track their survival following traumatic nerve injury. We find that sp nerve injury leads to a marked loss of cells containing DRG volume and a concomitant loss of small-diameter DRG neurons. Ne loss occurs unequally across subpopulations and is particularly prevalent in nonpeptidergic nociceptors, marked by expressi Mrgprd. We show that this subpopulation is almost entirely lost following spared nerve injury and severely depleted (by roughly following sciatic nerve crush. Finally, we used an in vitro model of DRG neuron survival to demonstrate that nonpeptid nociceptor loss is likely dependent on the absence of neurotrophic support. Together, these results profile the extent to which neuron subpopulations can survive axotomy, with implications for our understanding of nerve injury–induced plasticity and p Keywords: Sensory neuron, Neuron death, Transgenic reporter line, Neuropathic pain, Nerve injury | njury label ared uron on of 50%) ergic DRG ain. |\n", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed2.pdf" + "text": "", + "page_start": 229, + "page_end": 229, + "source_file": "00-80T-80.pdf" }, { - "text": "3. Results \n\n3.1. Peripheral nerve injury induces a loss of small neurons \nfrom the dorsal root ganglion \n\nTogether, our data derived from several different experimental \napproaches show that a population of small-diameter afferents \nare lost following peripheral nerve injury. \n\n3.2. Spared nerve crush or transection results in death of \nMrgprd-expressing neurons \n\nTo date, determining cell \nloss among specific populations of \nafferent neurons has proved challenging due to the down- \nregulation of subpopulation-specific marker genes following \ntransection.37,44 To overcome this issue, we took \naxonal \nadvantage of \ntransgenic strategies to label populations in \na manner that persisted after injury. Owing to the bias for the \nloss of small neurons and the known loss of IB4-binding central \nterminals postinjury,36 we initially focused on nonpeptidergic \nnociceptive neurons. We used MrgDChR2-YFP mice to identify \nneurons belonging to the largest of \nthe 3 classes of non- \npeptidergic nociceptors, NP1.55,59 To determine whether these \nneurons are lost following nerve injury, we used a stereological \nmethod to quantify L4 DRG MrgD-YFP1 (yellow fluorescent ", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed2.pdf" + "text": "", + "page_start": 229, + "page_end": 229, + "source_file": "00-80T-80.pdf" }, { - "text": "[66] West CA, Ljungberg C, Wiberg M, Hart A. Sensory neuron death after \nupper limb nerve injury and protective effect of repair: clinical evaluation \nusing volumetric magnetic resonance imaging of dorsal root ganglia. \nNeurosurgery 2013;73:632–40. \n\nrat. Anat Rec 1987;219:323–9. \n[47] Schmitz C, Hof PR. Design-based stereology in neuroscience. \nNeuroscience 2005;130:813–31. \n\n[67] West SJ, Bonboire D, Bennett DL. StereoMate: 3D stereological \nautomated analysis of biological structures. bioRxiv 2020:648337. \n[68] Wiberg R, Novikova LN, Kingham PJ. Evaluation of apoptotic pathways in \nroot ganglion neurons following peripheral nerve injury. [48] Schulte A, Degenbeck J, Aue A, Schindeh ¨utte M, Schlott F, Schneider M, \nMonoranu CM, Bohnert M, Pham M, Antoniadis G, Blum R, Rittner HL. \nHuman dorsal root ganglia after plexus injury: either preservation or loss of \nthe multicellular unit. bioRxiv 2023.02.06.526934. ", - "page_start": 14, - "page_end": 14, - "source_file": "pubmed2.pdf" + "text": "", + "page_start": 229, + "page_end": 229, + "source_file": "00-80T-80.pdf" } ] }, @@ -19851,64 +19851,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 241, + "page_end": 241, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 328, + "page_end": 328, + "source_file": "00-80T-80.pdf" }, { - "text": "December 2024· Volume 165· Number 12 \n\ncell death and apoptosis with more than 10 genes were \nexamined. Filtered count data of expressed and nondifferentially \nexpressed genes were used as a background. \n\n2.8. Dorsal root ganglion culture ", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed2.pdf" + "text": "", + "page_start": 40, + "page_end": 40, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "| Abstract\nThere is a rich literature describing the loss of dorsal root ganglion (DRG) neurons following peripheral axotomy, but the vulnera | bility |\n|---|---|\n| Abstract There is a rich literature describing the loss of dorsal root ganglion (DRG) neurons following peripheral axotomy, but the vulnera | bility |\n| of discrete subpopulations has not yet been characterised. Furthermore, the extent or even presence of neuron loss following i has recently been challenged. In this study, we have used a range of transgenic recombinase driver mouse lines to genetically molecularly defined subpopulations of DRG neurons and track their survival following traumatic nerve injury. We find that sp nerve injury leads to a marked loss of cells containing DRG volume and a concomitant loss of small-diameter DRG neurons. Ne loss occurs unequally across subpopulations and is particularly prevalent in nonpeptidergic nociceptors, marked by expressi Mrgprd. We show that this subpopulation is almost entirely lost following spared nerve injury and severely depleted (by roughly following sciatic nerve crush. Finally, we used an in vitro model of DRG neuron survival to demonstrate that nonpeptid nociceptor loss is likely dependent on the absence of neurotrophic support. Together, these results profile the extent to which neuron subpopulations can survive axotomy, with implications for our understanding of nerve injury–induced plasticity and p Keywords: Sensory neuron, Neuron death, Transgenic reporter line, Neuropathic pain, Nerve injury | njury label ared uron on of 50%) ergic DRG ain. |\n", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed2.pdf" + "text": "", + "page_start": 40, + "page_end": 40, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "dorsal \nNeuroreport 2018;29:779–85. \n\n[49] Schulte A, Lohner H, Degenbeck J, Segebarth D, Rittner HL, Blum R, Aue \nA. Unbiased analysis of the dorsal root ganglion after peripheral nerve \ninjury: no neuronal loss, no gliosis, but satellite glial cell plasticity. PAIN \n2023;164:728–40. [69] Yu X, Liu H, Hamel KA, Morvan MG, Yu S, Leff J, Guan Z, Braz JM, Basbaum \nAI. Dorsal root ganglion macrophages contribute to both the initiation and \npersistence of neuropathic pain. Nat Commun 2020;11:264. \n\n[50] Shi TJS, Tandrup T, Bergman E, Xu ZQD, Ulfhake B, H ¨okfelt T. Effect of \nperipheral nerve injury on dorsal root ganglion neurons in the C57 BL/6J \n[70] Zheng J, Lu Y, Perl ER. Inhibitory neurones of the spinal substantia \ngelatinosa mediate interaction of signals from primary afferents. J Physiol \n2010;588:2065–75. ", - "page_start": 14, - "page_end": 14, - "source_file": "pubmed2.pdf" + "text": "", + "page_start": 40, + "page_end": 40, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "3. Results \n\n3.1. Peripheral nerve injury induces a loss of small neurons \nfrom the dorsal root ganglion \n\nTogether, our data derived from several different experimental \napproaches show that a population of small-diameter afferents \nare lost following peripheral nerve injury. \n\n3.2. Spared nerve crush or transection results in death of \nMrgprd-expressing neurons \n\nTo date, determining cell \nloss among specific populations of \nafferent neurons has proved challenging due to the down- \nregulation of subpopulation-specific marker genes following \ntransection.37,44 To overcome this issue, we took \naxonal \nadvantage of \ntransgenic strategies to label populations in \na manner that persisted after injury. Owing to the bias for the \nloss of small neurons and the known loss of IB4-binding central \nterminals postinjury,36 we initially focused on nonpeptidergic \nnociceptive neurons. We used MrgDChR2-YFP mice to identify \nneurons belonging to the largest of \nthe 3 classes of non- \npeptidergic nociceptors, NP1.55,59 To determine whether these \nneurons are lost following nerve injury, we used a stereological \nmethod to quantify L4 DRG MrgD-YFP1 (yellow fluorescent ", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed2.pdf" + "text": "", + "page_start": 39, + "page_end": 39, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "2.7. Gene Ontology \n\nGene Ontology term analyses were performed on previously \npublished mouse subtype RNA-seq after SNI (GSE2164443). In \nthis study, subtype-specific bulk RNA-seq was performed on 5 \ntransgenic mouse lines through reporter labelling and fluores- \ncence activated cell sorting. spliced transcripts alignment to \na reference was used to map reads to the GRCm38 (mm10) \nMouse Genome,14 and Samtools was used to sort, index, and \nmerge Binary Alignment Map files in line with published reports.28 \nQuality control was performed as per Barry et al.3 Downstream \nanalyses were performed using DESeq2 on grouped male and \nfemale samples.31 For differentially expressed genes (false \ndiscovery rate) (FDR , 0.05, LFC .1) (log-fold change), GO \nanalyses were performed using the Wallenius method using \ngoSeq (R). In this study, significantly regulated terms related to \n\n2.6. Tissue clearing and 3D volumetric analyses \n\nDorsal root ganglia were extracted from animals 4 weeks post- \nSNItrans for whole DRG analyses. In this study, tissue was extracted ", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed2.pdf" + "text": "", + "page_start": 39, + "page_end": 39, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "1. Introduction \n\nDorsal root ganglion (DRG) neurons represent a molecularly \nand functionally heterogeneous population. Under normal \nconditions, \nthe \nsomatosensory nervous system to detect a myriad of sensory \nstimuli that result in the perceptions of touch, temperature, \nitch, and pain. Following nerve injury, physiological changes in \nDRG neurons lead to hyperexcitability,57 which is a key \npathological driver of neuropathic pain.20,63 Concomitant \nmolecular changes in discrete subpopulations also occur, \nand these have recently been comprehensively described in \nsingle-cell37,44 and subpopulation-specific sequencing stud- \nies.3 These studies describe a transient and generalized \nreduction in the expression of subpopulation-specific genes \nfollowing nerve injury.3,37,44 \n\nthis diversity contributes to the ability of \n\nIn addition to molecular changes, there is a rich literature \ndescribing the frank loss of DRG neurons following traumatic ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed2.pdf" + "text": "", + "page_start": 39, + "page_end": 39, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "[60] Wang R, Guo W, Ossipov MH, Vanderah TW, Porreca F, Lai J. Glial \ncell \nline-derived neurotrophic factor normalizes neurochemical \nchanges in injured dorsal root ganglion neurons and prevents the \nexpression of experimental neuropathic pain. Neuroscience 2003; \n121:815–24. \n\n[40] Plummer NW, Evsyukova IY, Robertson SD, de Marchena J, Tucker CJ, \nJensen P. Expanding the power of recombinase-based labeling to \nuncover cellular diversity. Development 2015;142:4385–93. \n\n[61] Wang X, Archibald ML, Stevens K, Baldridge WH, Chauhan BC. Cyan \nfluorescent protein (CFP) expressing cells in the retina of Thy1-CFP \ntransgenic mice before and after optic nerve injury. Neurosci Lett 2010; \n468:110–4. \n[41] Prescott SA, Ratt ´e S. Pain processing by spinal microcircuits: afferent \ncombinatorics. Curr Opin Neurobiol 2012;22:631–9. ", - "page_start": 14, - "page_end": 14, - "source_file": "pubmed2.pdf" + "text": "", + "page_start": 328, + "page_end": 328, + "source_file": "00-80T-80.pdf" }, { - "text": "mouse: marked changes both in cell numbers and neuropeptide \nexpression. Neuroscience 2001;105:249–63. \n\n[51] Song H, Yao E, Lin C, Gacayan R, Chen MH, Chuang PT. Functional \ncharacterization of pulmonary neuroendocrine cells in lung development, \ninjury, and tumorigenesis. Proc Natl Acad Sci 2012;109:17531–6. \n[52] Takasu K, Sakai A, Hanawa H, Shimada T, Suzuki H. Overexpression of \nGDNF in the uninjured DRG exerts analgesic effects on neuropathic pain \nfollowing segmental spinal nerve ligation in mice. J Pain 2011;12: \n1130–1139. \n\n[53] Tandrup T, Woolf CJ, Coggeshall RE. Delayed loss of small dorsal root \nganglion cells after transection of the rat sciatic nerve. J Comp Neurol \n2000;422:172–80. \n[54] Terenghi G, Hart A, Wiberg M. The nerve injury and the dying neurons: \ndiagnosis and prevention. J Hand Surg Eur Vol 2011;36:730–4. ", - "page_start": 14, - "page_end": 14, - "source_file": "pubmed2.pdf" + "text": "", + "page_start": 328, + "page_end": 328, + "source_file": "00-80T-80.pdf" } ] }, @@ -19919,70 +19919,70 @@ "target_page": 21, "target_passage": "To make the college registration process easier for you, we’ve compiled a comprehensive guide on how to register at Oxbridge Academy (www.oxbridgeacademy.co.za/enrol-now/).", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 60, + "page_end": 60, + "source_file": "sg246915.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 279, + "page_end": 279, + "source_file": "00-80T-80.pdf" }, { - "text": "To make the college registration process easier for you, we’ve compiled a \ncomprehensive guide on how to register at Oxbridge Academy \n(www.oxbridgeacademy.co.za/enrol-now/). The guide also includes general \ntips that will be relevant to the application and registration processes at \nother colleges. \n\n**There are 4 steps you need to follow when you want to**\n**register as a student at Oxbridge Academy:**\n\n**1.**Select Your Course \n\n**2.** Fill in Your Student Details \n\n**3.**Select Your Delivery Option \n\n**4.** Pay Your Registration Fee and Send in Your Form ", - "page_start": 21, - "page_end": 21, - "source_file": "basic-english-language-skills.PDF" + "text": "", + "page_start": 279, + "page_end": 279, + "source_file": "00-80T-80.pdf" }, { - "text": "We are registered with the Department of Higher Education and Training as a Private College in terms of Section \n31(6)(a) of the Continuing Education and Training Act, 2006 (Act No. 16 of 2006). Registration No. 2009/FE07/070. \n\n*Developed for Oxbridge Academy*", - "page_start": 59, - "page_end": 59, - "source_file": "basic-english-language-skills.PDF" + "text": "", + "page_start": 279, + "page_end": 279, + "source_file": "00-80T-80.pdf" }, { - "text": "If you are an Oxbridge Academy student, we’d like you to know \nthat we are here to help you every step of the way, and that we will \ngive you the opportunity to resubmit your assignments if you don’t \nachieve a pass mark the first time around. ", - "page_start": 37, - "page_end": 37, - "source_file": "basic-english-language-skills.PDF" + "text": "", + "page_start": 43, + "page_end": 43, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "SEND YOUR REGISTRATION FORM \n\nSend your registration form to the \nregistrations office at Oxbridge Academy via \none of the following channels: \n\nFax: \nPost: \nE-mail: registrar@oxbridgeacademy.co.za \n086 262 5550 \nPO Box 12723, Die Boord, 7613 ", - "page_start": 27, - "page_end": 27, - "source_file": "basic-english-language-skills.PDF" + "text": "", + "page_start": 43, + "page_end": 43, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "Applying for college (www.oxbridgeacademy.co.za/enrol-now/) can be a \ndaunting experience. Not only do you need to choose a course, but you \nalso need to make sure that you: \n• meet the entry requirements \n• meet the deadlines \n• \n• \n• fill in the forms correctly \nsend the forms to the right address \ninclude all the necessary attachments ", - "page_start": 21, - "page_end": 21, - "source_file": "basic-english-language-skills.PDF" + "text": "", + "page_start": 43, + "page_end": 43, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "And if you are studying via distance learning (www.oxbridgeacademy.co. \nza/distance-learning/), where you don’t have any face-to-face interac- \ntion with lecturers, you will need to rely on your tutors for the necessary \nacademic support. ", - "page_start": 33, - "page_end": 33, - "source_file": "basic-english-language-skills.PDF" + "text": "", + "page_start": 43, + "page_end": 43, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "1. Read (and follow) the instructions carefully. \nIf you are an Oxbridge Academy student, the general assignment \nguidelines will be provided in your “Success” Study Guide. Specific \ninstructions will also be included at the beginning of each of your \nassignments. \n\n2. Read the questions carefully. \nMake sure you understand what is being asked of you, so that you \nfocus on answering the right questions, instead of providing irrelevant \ninformation. \n\n3. Remember that presentation is important. \nNeatness, spelling, and the structure of your assignment will all count \ntoward the mark that you receive for your assignment. \n\n4. \nto the assignment questions. \nBut make sure to use your own words – don’t just copy. You need to show \nthe person marking your assignment that you have developed a sound \nunderstanding of the subject. \n\nUse your course material and other external sources to find answers ", - "page_start": 38, - "page_end": 38, - "source_file": "basic-english-language-skills.PDF" + "text": "", + "page_start": 279, + "page_end": 279, + "source_file": "00-80T-80.pdf" }, { - "text": "If you are under the age of 18, your parent or guardian will need to sign \nthis section of the form to state that they are aware of your registration \nwith Oxbridge Academy, and that they do not have any objections. If you \nare unemployed, you will need a guarantor to sign this section of the \nform. Your parent or guarantor will be held responsible if you miss any of \nyour payments in relation to your course fees. ", - "page_start": 26, - "page_end": 26, - "source_file": "basic-english-language-skills.PDF" + "text": "", + "page_start": 279, + "page_end": 279, + "source_file": "00-80T-80.pdf" } ] }, @@ -19993,70 +19993,70 @@ "target_page": 29, "target_passage": "To make a good summary, you need to: • Keep it brief. • Make sure to use main headings and keywords. • Focus on the main ideas. • Classify and organise the information in a logical manner. • Use your own words where possible. • Include examples. • Remember that your summaries are there to help you", "chunk_present": { - "presence": true, - "index": 5 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, + "text": "", + "page_start": 32, + "page_end": 32, "source_file": "Excel Training Manual 1.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 196, + "page_end": 196, + "source_file": "00-80T-80.pdf" }, { - "text": "\ntechnique \n\nto achieve trouble ", - "page_start": 141, - "page_end": 141, - "source_file": "00-80T-80.pdf" + "text": "", + "page_start": 391, + "page_end": 391, + "source_file": "sg246915.pdf" }, { - "text": "1. General Language Tips to Get You Started \n\n2. Parts of Speech \n\n3. Punctuation \n\n4. Commonly Confused Words and Phrases \n\n5. Tips for Filling in Your College Registration Form \n\n6. Learn How to Summarise Your Study Material \n\n7. How to Ask for Help from Your Tutor \n\n8. Tips for Completing Your Written Assignments \n\n9. Tips for Answering Exam Questions \n\n10. Language Skills at Work – How to Write a Cover Letter \n\n11. Language Skills at Work – How to Write a Resignation Letter \n\n12. Language Skills at Work – Sending E-mails to Your Colleagues ", - "page_start": 3, - "page_end": 3, - "source_file": "basic-english-language-skills.PDF" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "SUMMARIES \n\nGeneral Tips for Making Summaries \n\n• Underline or highlight key points as you work through your study \n\nmaterial, and make notes. \n\n• When you come across a word or concept you don’t understand, \n\nlook it up in a dictionary, or do some research on the concept, and \nadd your own definition to your summary. ", - "page_start": 32, - "page_end": 32, - "source_file": "basic-english-language-skills.PDF" + "text": "", + "page_start": 197, + "page_end": 197, + "source_file": "00-80T-80.pdf" }, { - "text": "To make a good summary, you need to: \n\n• Keep it brief. \n\n• Make sure to use main headings and keywords. \n\n• Focus on the main ideas. \n\n• Classify and organise the information in a logical manner. \n\n• Use your own words where possible. \n\n• Include examples. \n\n• Remember that your summaries are there to help you. ", - "page_start": 29, - "page_end": 29, - "source_file": "basic-english-language-skills.PDF" + "text": "", + "page_start": 196, + "page_end": 196, + "source_file": "00-80T-80.pdf" }, { - "text": "\nTips and suggestions related to using Protégé are presented like this. ", - "page_start": 6, - "page_end": 6, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 196, + "page_end": 196, + "source_file": "00-80T-80.pdf" }, { - "text": "Get writing suggestions \n\nWith**Editor**, bring out your best writing. Editor helps you bring out your best \nwriting by giving you intelligent writing suggestions. It also calculates an Editor \nScore based on the number and types of suggestions you have yet to address. \nSelect an underlined word or phrase to accept or ignore a suggestion. ", - "page_start": 3, - "page_end": 3, - "source_file": "Word QS.pdf" + "text": "", + "page_start": 250, + "page_end": 250, + "source_file": "00-80T-80.pdf" }, { - "text": "Read as much as possible. Reading improves your vocabulary, \nand helps you to become familiar with sentence structure, \nword order, and the correct use of punctuation. \n\n1. \n\nInvest in a good dictionary. When you are unsure of the \nmeaning of a word, or when you come across an unfamiliar \nword, make sure to look it up in your dictionary. \n\n2. \n\nKeep a journal. This will give you an opportunity to practice \nyour writing skills on a regular basis. \n\n3. ", - "page_start": 7, - "page_end": 7, - "source_file": "basic-english-language-skills.PDF" + "text": "", + "page_start": 108, + "page_end": 108, + "source_file": "00-80T-80.pdf" }, { - "text": "9. Use correct grammar and spelling. \n\nThis will contribute to the clarity of your answers, and will prevent the \nperson marking your paper from having to guess what you mean. \n\n10. For longer questions and essay-style questions: plan your answers be- \n\nfore you start writing. \nThis will help you to formulate logical arguments, as well as to structure \nyour answers clearly. In essay questions, you will get marks for using \nthe correct format, which includes making sure that you have an intro- \nduction, sub-headings and paragraphs, and a conclusion. \n\n11. Where relevant, give examples. \n\nThis will help to demonstrate that you understand the topic. \n\n12. If you are writing an open-book exam, keep in mind that you won’t have \n\nenough time to look up all the answers. \nMake sure that you know your work, and that you know where to look \nfor key information. These types of exams are more focused on testing \nyour understanding than on testing your knowledge, which means that \nyou need to have a thorough grasp of the work. \n\n13. If you have to answer multiple-choice questions, make sure that you read \n\nthe questions very carefully. \nTry to think of the correct answer before you read through the options, \nas you are less likely to become confused. When in doubt, go with your \nfirst instinct. If there is more than one correct answer, go with the an- \nswer that appears to be most correct. ", - "page_start": 44, - "page_end": 44, - "source_file": "basic-english-language-skills.PDF" + "text": "", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_GLW_2002.pdf" } ] }, @@ -20067,70 +20067,70 @@ "target_page": 25, "target_passage": "The country data vary significantly. Sweden, Greece and Luxembourg report over two-thirds such exposures, and Germany, Lithuania and Czechia one-third or less.", "chunk_present": { - "presence": true, - "index": 3 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 199, + "page_end": 199, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**Figure 3: ‘Exposure to risk factors adversely affecting mental wellbeing’ – LFS Ad hoc survey 202014**\n\n", - "page_start": 26, - "page_end": 26, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "In 2007, 2013 and 2020,**Eurostat**asked employed persons in its ad hoc surveys to the Labour Force \nSurvey (LFS) whether they had**‘… exposure to risk factors that can adversely affect mental well-**\n**being’**.10 In 2007 and 2013, the questions covered four items (time pressure and overload of work, \nviolence or threat of violence, harassment and bullying, other factors). In the 2020 survey,11 ‘Mental \nwell-being’ was operationalised by an additional four response options, resulting in a total of eight \noptions:12 \n\n*1. Severe time pressure or overload of work;*\n*2. Violence or threat of violence;*\n*3. Harassment or bullying;*\n*4. Poor communication or cooperation within the organisation;*\n*5. Having to deal with difficult customers, patients, pupils etc.;*\n*6. Job insecurity;*\n*7. Lack of autonomy, or lack of influence over the work pace or work processes; and*\n*8. Another significant risk factor for mental well-being.*\n\nForty-five per cent of the employed persons reported being exposed to risk factors that can adversely \naffect mental wellbeing. The country data vary significantly. Sweden, Greece and Luxembourg report \nover two-thirds such exposures, and Germany, Lithuania and Czechia one-third or less.13 ", - "page_start": 25, - "page_end": 25, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**3.6 Conclusions**\nThe exposure**to psychosocial risks**is increasing, with mental health prevalence still emerging. Major \nwork-related exposures have grown in the past 15 to 25 years that is, time pressure, difficult clients, \nlonger working hours and poor communication. There is also some evidence that countries with over- \naverage employment in sectors like health and care or other human and client-oriented services \n(education, social work, tourism, entertainment) suffer from longer working hours and more mental \nburden. The northern countries are at the top of the countries with highest mental burden. The southern \ncountries have a high share of specific psychosocial risks related to work in tourism and entertainment, \ncharacterised by atypical working times and issues with difficult clients. ", - "page_start": 59, - "page_end": 59, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "If**a risk assessment is conducted just for compliance purposes**, and not used appropriately for the \nsuccessful management of OSH and reduction of accidents and occupational diseases, the risk \nassessment may lose its dynamic nature, and findings may be neither implemented nor communicated \nappropriately to employees. \n\nThe**types of risks included in risk assessments**are related to the risk profiles of different sectors, \nfor example, it is likely that risk assessments in heavy industries and manual occupations focus more \non safety risks. However, while sectoral risk profiles will naturally bias the identification of risks, smaller \nestablishments seem to have**less of a focus on MSDs or psychosocial risk factors**, which would \nsuggest that they are less well recognised or understood, in particular for MSEs.415 Establishments also \nreport that psychosocial risk factors are more difficult to manage than other OSH risks, while as business \nsize grows, so does the proportion of respondents who perceive psychosocial risks as more difficult to \nmanage than other OSH risks.416 \n\nESENER 2019 shows that a**reluctance to talk openly**about these issues seems to be the main \ndifficulty for addressing psychosocial risks (60% of establishments in the EU27). This, as with all the \nother difficulties considered (lack of awareness among staff/management and lack of expertise or \nspecialist support), is reported in all enterprise sizes but more frequently as establishment size grows. ", - "page_start": 128, - "page_end": 128, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**3.1 Psychosocial risks at work**\nDuring the last 30 years, the scientific, political and practical discussions on**psychosocial risks**and \npreventive measures against psychosocial risks have gained strong importance. After a period of doubts \nand resistance, today they are regarded as risks of the same severity as the classical physical safety \nand health risks.4 (Chapter 1 covers the psychosocial risk aspect; for the prevalence of mental diseases \nand the burden of mental diseases see Chapter 2.2. 5) \n\nLooking at the steady increase of certain psychosocial risk indicators at workplace level, either the**risks**\n**have increased**and/or the**number of people working in occupations**with higher psychosocial risks \nhas increased.6,7 This is valid, for example, for the indicator time pressure, for example, in delivery \nservices, transport, and often also clerical work; the workforce has grown in sectors where emotional \ndemands from dealing with difficult clients, customers, pupils or patients are common; there are also \nmore workers employed (or self-employed) in interactional occupations, for example, in call centres, or \nin occupations with a high level of emotional tensions, for example, education, health and care. ", - "page_start": 24, - "page_end": 24, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "ILO defines wellbeing at work under the term**‘Workplace Wellbeing’**:*‘Workplace Wellbeing relates to*\n*all aspects of working life, from the quality and safety of the physical environment, to how workers feel*\n*about their work, their working environment, the climate at work and work organization. The aim of*\n*measures for workplace well-being is to complement OSH measures to make sure workers are safe,*\n*healthy, satisfied and engaged at work.’*\n\nA common methodology to collect data on**health status and wellbeing**is**self-reporting and self-**\n**assessment**of risks at work, health risks and health problems, absence, job satisfaction and working \nlife perspectives from a health point of view. This allows insight into the subjective assessment of health \nrisks at work and wellbeing. \n\n**Indicators on wellbeing**and satisfaction at work show similar patterns to health and work accidents. \nSectors with high physical demands and high customer and client orientation and occupations with a \nlower skill level report lower wellbeing and satisfaction levels; they report a good health status but fewer \nexpectations to be able to work in this occupation until the age of 60 years. Concerning the levels of \n**self-reported ‘Health at risk’**, the LFS Ad hoc module on ‘Accidents at work and other work-related \nhealth problems’ suggests that the situation has improved. According to the LFS, in 2007 14.6% of \nemployed persons reported a work-related health problem; this figure decreased in 2013 to 8.8% and \nwent slightly up again — during the pandemic — to 10.3% in 2020 (EU27 level). ", - "page_start": 13, - "page_end": 13, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "7 EU-OSHA, 2007: Expert forecast on emerging psychosocial risks related to occupational safety and health \n8 Eurofound, 2017: Sixth European Working Conditions Survey – Overview report (2017 Update) (p. 48). Raw \ndata for 2015: Eurofound: European Working Conditions Survey - Data Visualisation; Data for 2005: Eurofound: \nFourth European Working Conditions Survey \n9 EU-OSHA: ESENER Data visualisation, Comparisons 2014-2019. \n10 Due to the change of possible response items, the data for the three surveys cannot be compared; the number \nof mental risk factors increased from three in 2007 and 2013 to eight in 2020. \n11 Eurostat, 2021: EU labour force survey 2020 module on accidents at work and other work-related health \nproblems : assessment report : 2021 edition \n\n*12 Eurostat: Persons reporting exposure to risk factors that can adversely affect mental well-being by sex, age and*\n*factor, data here and explanatory metadata here*\n13 It has to be noted that in 2007 and 2013 the interviews were done face-to-face. In 2020 the interviews were \nconducted either face-to-face or by phone, depending on the public health measures in each country. The \nresponses were influenced by work under conditions of the pandemic. ", - "page_start": 141, - "page_end": 141, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "50 Koranyi et al., 2018: Precarious employment and occupational accidents and injuries – a systematic review \n51 ILO Indicator description: Occupational injuries \n52 See the diagrams and country data in the OSH Barometer under: https://visualisation.osha.europa.eu/osh- \nbarometer/ \n53 Tynes et al., 2017: Physical working conditions as covered in European monitoring questionnaires \n54 EU-OSHA: Third European Survey of Enterprises on New and Emerging Risks (ESENER 3) – first findings, \n2019, p. 3 and ESENER Data visualisation, section ‘Comparisons 2014-2019’, section ‘Risk factors present in the \nestablishment’, Export data \n55 EU-OSHA calculations based on EWCS raw data. \n56 Eurostat, LFS Ad hoc modules: Persons reporting exposure to risk factors that can adversely affect physical \nhealth by sex, age and factor \n57 In the LFS-survey the respondents had to decide which of 11 possible risk factors is the most ‘serious one’. \nQuote:*‘Eurostat proposed to implement the exposure to risk factors for physical health at work by using one*\n*question that strictly reflects the variable or twelve questions asking for the presence of any of the eleven risk*\n*factors and then ask for the most serious one.’*\nIn the EWCS and ESENER all reported risk factors were registered. ", - "page_start": 143, - "page_end": 143, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" } ] }, @@ -20147,64 +20147,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 307, + "page_end": 307, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 144, + "page_end": 144, + "source_file": "00-80T-80.pdf" }, { - "text": "22 Eurostat Data for 2019: Average number of usual weekly hours of work in main job, by sex, professional status, \nfull-time/part-time and economic activity (from 2008 onwards, NACE Rev. 2). here Filter: Employees, Full-time, All \nNACE, EU27 2019 Q4. \nEurostat Data for 2006: Average number of usual weekly hours of work in main job, by sex, professional status, \nfull-time/part-time and economic activity (1998-2008, NACE Rev. 1.1), here Filter: Employees, Full-time, All \nNACE, EU27 2019 Q4. \n23 Eurostat definition of atypical work: The atypical work distinguishes between “evening or night work”, “Saturday \nor Sunday working”, and “shift work”. \n24 All data were retried from tables in: Labour market > Employment and unemployment (Labour force survey) M \n> LFS series - detailed annual survey results M > Population in employment working during unsocial hours - LFS \nseries \n25 Eurostat: Employed persons working at nights as a percentage of the total employment, by sex, age and \nprofessional status (%) \n26 Eurostat: Employed persons working on Sundays as a percentage of the total employment, by sex, age and \nprofessional status (%) \n27 Fiz Perez et al., 2019: Shift and night work management in European companies \n28 OSHWiki, 2022: Psychosocial issues – the changing world of work \n29 Eurofound, 2003: Time and work: Work intensity \nEurofound, 2009: Working conditions in the European Union: Working time and work intensity \n30 Eurofound, 2017: Sixth European Working Conditions Survey – Overview report (2017 Update) (p. 48). ", - "page_start": 142, - "page_end": 142, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 145, + "page_end": 145, + "source_file": "00-80T-80.pdf" }, { - "text": "**Figure 9: Average working time and work during unsocial hours – Eurostat LFS**\n\nTwo country examples might illustrate these developments (all data for 2019): Slovakia, a country with \na high share of process-based industries, reports that 15.0% of its workforce is working at night and 29% \nin shifts; for the EU27 this rate is 5.2% respectively and 18.3%.25 Regarding work on Sundays three \nother countries are at the top of the EU27, the Netherlands, Ireland and Spain; they report between 18% \nand 21% (EU27 average = 13.5%); all three countries have an above-average share of sectors like \ntransport, tourism and agriculture.26 \n\nFor all these types of work it should be take into account that other groups of**workers under non-**\n**standard types of employment contracts**(self-employed, agency workers, students, pensioners, \nundeclared workers) might have taken over work at these atypical working times. \n\nConcluding, it can be stated that there is a**slight trend towards a reduction of weekly working hours**\n**for regularly employed**workers, including a stable commuting time. Working hours at atypical times \nshow a mixed picture. Looking at most types of employees,**atypical working time decreased, except**\n**work on Sundays**. For self-employed with employees, the working time at atypical hours is in general \nat a higher level. The number of employees in night work is decreasing. More employees in service and \nclient-related occupations at night or in shifts but also here the atypical times are slightly decreasing. ", - "page_start": 32, - "page_end": 32, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 145, + "page_end": 145, + "source_file": "00-80T-80.pdf" }, { - "text": "***3.1.1 Working time in hours and at atypical times***\n\n**Too many hours of working time and/or working hours at atypical or unsocial times**can put**the**\n**mental**and**the physical health**of humans at risk. It is also regarded as a major**contributing factor**\n**to work accidents**, due to fatigue or exhaustion.16 \n\nThe main indicator to describe working time is the**number of the weekly average working hours**of \nfull-time employees. However, regarding its impact on health and safety,**other aspects of working**\n**time are of the same relevance**: \n\n• How long is the average working day? \n• At which times and days is this work done (typical, atypical times)? \n• How often do long working hours take place? \n• \n• How flexible are start and end? \n• How intense is the work during this time (breaks, deadlines)? \n• Which groups of workers have standard working times and which do not (e.g. depending on the \n\nIs the work split between two jobs? \n\nsector or the type of contract, e.g. sub-contracted workers or self-employed)? \n\nThere is a**slight trend towards fewer working hours**for full-time**employees**(not ‘Employed persons’) \nin the EU27; between 2006 and 2019 the average weekly working time dropped from 40.2 to 39.9 hours, \na decrease of approximately 15 minutes.17 ", - "page_start": 29, - "page_end": 29, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 145, + "page_end": 145, + "source_file": "00-80T-80.pdf" }, { - "text": "During the past decades, and especially after 1990, a much**greater variety of such contractual**\n**relations**has emerged. However, in 2019 the conventional employment contract (part- or full-time) still \naccounts for around 86% of the workforce (EU27), they are employees. Seventeen per cent of these \nemployed persons have a part-time contract, 13% of the employees have a temporary contract, or both \ncombined. Nine per cent are self-employed without employees. The remaining 4% are self-employed \nwith employees (employers) and 1% are contributing family workers. The number of self-employed in \nagriculture halved between 2005 and 2019, which is the biggest factor in the reduction of contributing \nfamily workers and the stagnation of the number of self-employed. ", - "page_start": 46, - "page_end": 46, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 145, + "page_end": 145, + "source_file": "00-80T-80.pdf" }, { - "text": "37 Eurostat, 2019: Persons in employment by frequency of working under time pressure, educational attainment \nlevel and professional status, 20-64 years, percentages calculated from numerical data \n\n38 Kelliher & Anderson, 2010: Doing more with less? Flexible working practices and the intensification of work \n39 Piaska, 2018: Scheduled to work hard: The relationship between non-standard working hours and work \nintensity among European workers (2005–2015) \n40 See also the overview in: EU-OSHA, OSHWiki, Guyot, S: Psychosocial issues – the changing world of work, \nhere \n41 Newer literature: James & Walters, 2022: Work and Health: 50 Years of regulatory failure. \n42 Davis & Kim, 2015: Financialization of the Economy \n43 Ethics & Compliance Initiative, 2020: Global Business Ethics Survey Report. Pressure in the Workplace: \nPossible Risk Factors and Those at Risk \n44 Johnstone et al., 2005: Statutory Occupational Health and Safety Workplace Arrangements for the Modern \nLabour Market \n\n45 Lorenz & Valeyre, 2005: Organisational Innovation, Human Resource Management and Labour Market \nStructure: A comparison of the EU-15 ", - "page_start": 142, - "page_end": 142, + "text": "", + "page_start": 51, + "page_end": 51, "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" }, { - "text": "Some**EU OSH legislation**may be adapted and modernised to cope with the changes in technologies, \nemployment conditions, longer working life, and a growing share of mobile and remote work. Many of \nthese changes in the world of work have caused higher insecurity, less clear employer–worker relations, \nand a higher burden of psychosocial and ergonomic risks. \n\n**Which are the areas of concern?**\n\n**Incomplete compliance with OSH regulation is more noticeable in**certain sectors and types of work. \nMost of these types of work — mobile and home-based work, domestic work, care work and long-term \ndomestic care work, seasonal work, platform work, non-voluntary self-employed — are growing in terms \nof workforce. But many of these work and employment formats are until now not covered in the same \n\nEuropean Agency for Safety and Health at Work – EU-OSHA \n18 ", - "page_start": 18, - "page_end": 18, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 259, + "page_end": 259, + "source_file": "sg246915.pdf" }, { - "text": "80 EU-OSHA’s maintenance campaign revealed that maintenance and repair work has an accident risks far over \naverage. EU-OSHA, 2010: Safe maintenance in practice (p. 10):*‘Occupational accidents during maintenance*\n*work are numerous. Based on the data from several European countries, it is estimated that 10-15% of fatal*\n*accidents at work, and 15-20% of all accidents, are connected with maintenance*.’ \n81 No statistical data available for EU. \n82 Persons in employment by main place of work, frequency of working at other locations and working from home, \nLFS Ad hoc module: Work at home, percentage of Employed persons \n83 Eurostat: Working from home in the EU \n84 LFS Ad hoc module Work at home, percentage of Employed persons and LFS regular data collection Employed \npersons working from home as a percentage of the total employment \n85 EU-OSHA, 2021: Home-based teleworking and preventive occupational safety and health measures in \nEuropean workplaces: evidence from ESENER-3 \n86 Employed persons working from home as a percentage of the total employment, by sex, age and professional \nstatus (%), here \n87 There are more workers who spend most of their working time in private homes, e.g. technicians for \nmaintenance and repair of technical systems like heating water supply or electricity, or gardeners. According to \nthe ILO definition of domestic work they are not regarded as such. Care at home can be borderline if the care is \nmainly done for a few persons in a few homes. \n88 C189 European Alliance, 2021: Step up efforts towards decent work for domestic workers in the EU: 10th \nAnniversary of ILO Domestic Workers Convention, 2011 (No. 189) \nSee there in the introductory chapter the difficulties to achieve reliable figures. For more info: ILO, 2021: Making \ndecent work a reality for domestic workers: Progress and prospects ten years after the adoption of the Domestic \nWorkers Convention, 2011 (No. 189) \n89 EU-OSHA, 2020: Well-being at work in the service voucher sector in Belgium ", - "page_start": 144, - "page_end": 144, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 145, + "page_end": 145, + "source_file": "00-80T-80.pdf" }, { - "text": "**Conditions of employment and workforce development**\n\nDuring the past decades and at faster pace after 1990, a**greater variety of non-standard contractual**\n**relations**has emerged. Typical characteristics of non-standard work are part-time work, temporary (or \nfixed-term) work, seasonal work, casual work, home-based work, telework, self-employment or family \nwork. Currently, high public awareness is directed to those types of non-standard work that are \nconnected either to**new forms of contracts**(voucher, platform, zero-hours, portfolio, etc.) or increasing \n**types of work not bound to the premises of the employer**(mobile, at home, at client’s place), mostly \nmade possible by the increased use of modern information and communication technologies (ICT). \nThese forms of work often have as a — additional — major characteristic a**less clear employer–**\n**worker relationship**. \n\nHowever, in 2019 the conventional employment contract still accounted for around 86% of the workforce \n(EU27), 9% are ‘own-account’ workers, that is, self-employed without employees. The remaining 4% \nwere self-employed with employees (employers) and less than 1% were contributing family workers. Of \nall employed workers, 17.2% worked part-time and 13.3% had temporary contracts. ", - "page_start": 11, - "page_end": 11, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 261, + "page_end": 261, + "source_file": "sg246915.pdf" } ] }, @@ -20221,64 +20221,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 170, + "page_end": 170, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 13, + "page_end": 13, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "80 EU-OSHA’s maintenance campaign revealed that maintenance and repair work has an accident risks far over \naverage. EU-OSHA, 2010: Safe maintenance in practice (p. 10):*‘Occupational accidents during maintenance*\n*work are numerous. Based on the data from several European countries, it is estimated that 10-15% of fatal*\n*accidents at work, and 15-20% of all accidents, are connected with maintenance*.’ \n81 No statistical data available for EU. \n82 Persons in employment by main place of work, frequency of working at other locations and working from home, \nLFS Ad hoc module: Work at home, percentage of Employed persons \n83 Eurostat: Working from home in the EU \n84 LFS Ad hoc module Work at home, percentage of Employed persons and LFS regular data collection Employed \npersons working from home as a percentage of the total employment \n85 EU-OSHA, 2021: Home-based teleworking and preventive occupational safety and health measures in \nEuropean workplaces: evidence from ESENER-3 \n86 Employed persons working from home as a percentage of the total employment, by sex, age and professional \nstatus (%), here \n87 There are more workers who spend most of their working time in private homes, e.g. technicians for \nmaintenance and repair of technical systems like heating water supply or electricity, or gardeners. According to \nthe ILO definition of domestic work they are not regarded as such. Care at home can be borderline if the care is \nmainly done for a few persons in a few homes. \n88 C189 European Alliance, 2021: Step up efforts towards decent work for domestic workers in the EU: 10th \nAnniversary of ILO Domestic Workers Convention, 2011 (No. 189) \nSee there in the introductory chapter the difficulties to achieve reliable figures. For more info: ILO, 2021: Making \ndecent work a reality for domestic workers: Progress and prospects ten years after the adoption of the Domestic \nWorkers Convention, 2011 (No. 189) \n89 EU-OSHA, 2020: Well-being at work in the service voucher sector in Belgium ", - "page_start": 144, - "page_end": 144, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 13, + "page_end": 13, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "The**International Social Security Association**(ISSA) developed the**Vision Zero initiative**. 330 ISSA \npromotes together with enterprises and many global OSH organisations this concept, aiming at the \ncomplete elimination of work accidents and occupational diseases. \n\nThe**UN**has developed a set of targets and indicators,**the Social Development Goals**(SDG).331 Target \n8 is dedicated to*‘Promote sustained, inclusive and sustainable economic growth, full and productive*\n*employment and decent work for all’.*Sub targets are: \n\n*8.5 By 2030, achieve full and productive employment and decent work for all women and men,*\n*including for young people and persons with disabilities, and equal pay for work of equal value*\n\n*8.7 Take immediate and effective measures to eradicate forced labour, end modern slavery and*\n*human trafficking and secure the prohibition and elimination of the worst forms of child labour,*\n*including recruitment and use of child soldiers, and by 2025 end child labour in all its forms*\n\n*8.8 Protect labour rights and promote safe and secure working environments for all workers,*\n*including migrant workers, in particular women migrants, and those in precarious employment*", - "page_start": 116, - "page_end": 116, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 13, + "page_end": 13, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "**3.5 Worker groups with specific risks and needs**\nAlready in 1996 the European Commission identified in its ‘Guidance on Risk Assessment at Work’95 \n**‘sensitive risk groups’**as workers with disabilities, young and old workers, pregnant and nursing \nmothers, and untrained or inexperienced workers including temporary or migrant workers. Often these \ngroups are addressed as ‘Vulnerable groups’ 96 or ‘Groups at risk’. 97 Other institutions and authors \ninclude older workers, women, self-employed or low-qualified workers, and the ILO includes also \nworkers in the informal economy. All these ‘assignments’ refer either**to individual (endogenous)**\n**characteristics**or to the**position on the labour market**. \n\nThe scientific literature on the group-related particular risks for health and safety at work is very broad. \nEU-OSHA and practically all national and international OSH organisations have published studies and \nprovided fact sheets and guidance documents. An overview on such publications shows that awareness, \nknowledge and policies in and outside enterprises have substantially developed and increased, but \nthere is less evidence about progress in practice. \n\nThe textbox below shows some of these specific characteristics for five groups: women, migrants, low- \nqualified workers, ageing workers and young workers. The Directorate-General for Internal Policies of \nthe Union compiled this in 2010, based on several EU and OECD background documents. 98 ", - "page_start": 54, - "page_end": 54, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 365, + "page_end": 365, + "source_file": "00-80T-80.pdf" }, { - "text": "**Two criteria were crucial for the selection of these indicators: availability of reliable data and the**\n**relevance of the indicators.**An ideal and complete set of indicators would cover even more indicators \nthan presented in this report, but major limits were set by the availability of reliable data. \nThe main data sources**comprise a large variety of quantitative datasets**, for example, Eurostat \nstatistics and EU-wide surveys (e.g. EU-OSHA’s European Survey of Enterprises on New and Emerging \nRisks (ESENER), Eurofound’s European Working Conditions Survey (EWCS), Eurostat’s Labour Force \nSurvey (LFS) and its ad hoc modules, and the Flash Eurobarometer, detailed background reports on \nrisks, groups of workers, OSH systems and infrastructures (e.g. by EU-OSHA, Eurofound, the \nFundamental Rights Agency, etc.), and evaluations and assessments of the level of implementation of \nOSH directives (e.g. by the Directorate-General for Employment, Social Affairs and Inclusion (DG \nEMPL) or the Senior Labour Inspectors Committee (SLIC) surveys facilitated by the National Labour \nInspectorates). Regarding the description of developments beyond the EU, data were taken from the \nInternational Labour Organisation (ILO), the World Health Organisation (WHO), the International Social \nSecurity Association (ISSA), the United Nations (UN), the Organisation for Economic Co-operation and \nDevelopment (OECD), the International Commission on Occupational Health (ICOH) and the \nInternational Association of Labour Inspection (IALI). ", - "page_start": 10, - "page_end": 10, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 13, + "page_end": 13, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "**5.**—(1) A road passenger transport worker. \n(2) For the purposes of this paragraph— \n\n(a) “road passenger transport worker” means— \n(i) the driver of a public service vehicle, or \n(ii) a person who is employed by the holder of a Community licence issued under Article \n4 of Regulation (EC) No 1073/2009 of the European Parliament and of the Council, \nand who is acting in the course of their employment; \n\n(b) “driver” includes a person who is travelling in a vehicle as a relief driver; \n(c) “public service vehicle” has the meaning given in section 1 of the Public Passenger \n\nVehicles Act 1981(**a**). \n\n**6.**—(1) Seamen and masters, as defined in section 313(1) of the Merchant Shipping Act \n1995(**b**), where they have travelled to the United Kingdom in the course of their work or have \nbeen repatriated to the United Kingdom in accordance with the Maritime Labour Convention, \n2006 or the Work in Fishing Convention, 2007. \n\n(2) For the purposes of sub-paragraph (1) and paragraph 7— \n\n(a) “the Maritime Labour Convention, 2006” means the Convention adopted on 23rd \nFebruary 2006 by the General Conference of the International Labour Organisation; \n(b) “the Work in Fishing Convention, 2007” means the Convention adopted at Geneva on \n\n14th June 2007 by the International Labour Organisation. ", - "page_start": 37, - "page_end": 37, - "source_file": "uksi_20210582_en.pdf" + "text": "", + "page_start": 13, + "page_end": 13, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "• Economic developments, particularly the dominance of neoliberalist policies and enhanced \ncompetition between workers, companies and states; reduction of state influence and \nprivatisation.41 \n\n• Pressure due to substantial organisational changes, for example, introduction of short-term \neconomic objectives in enterprise policies, 42 expansion into new markets or new countries, \nacquiring other enterprises or merging, being acquired, restructuring of management or of basic \nstaff working conditions (contracts, working time, flexibility).43 \n\n• Decrease of trade union influence or worker participation regarding labour relations. \n• Liberalisation of labour legislation, creation of ‘new forms of work’ and new contract types, \nbeyond the permanent full-time employment.44 \n\n• New forms of management, application of management concepts like just-in-time production or \nlean management, higher flexibility of production and higher customer orientation, 45 \n\nEuropean Agency for Safety and Health at Work – EU-OSHA \n36 ", - "page_start": 36, - "page_end": 36, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 13, + "page_end": 13, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "**Low-qualified workers**\n\n· Low-qualified workers are found mainly in traditional sectors, including manufacturing, agriculture, \nconstruction, wholesale and retail trades. \n· Very often these workers have high-risk or elementary occupations that expose them to a higher rate \nof injuries and health-related problems. \n· Low-qualified workers have less autonomy, less responsibility and overall experience less job \nsatisfaction than workers with higher qualifications. Most low-qualified workers have low-paid jobs and \nmany have temporary contracts. \n\n**Ageing workers**\n\n· Ageing workers are more at risk of occupational health problems than younger workers because they \nhave been exposed longer to certain hazards. Older workers report more work-related health \nproblems than younger workers, with backache and muscular pain for more than 70% of workers aged \n55 and more. \n· Older workers are at lesser risk of non-fatal accidents because they have greater experience; \nhowever fatal accidents are more frequent than for younger workers. \n· Recovery time and return to work after illness are key issues to address when aiming to increase the \nemployment rate of ageing workers. \n\n**Young workers101**\n\n· Overall, young workers have a higher rate of non-fatal injuries than older workers. \n· Young workers are more likely to be employed under non-standard forms of contractual \narrangements such as part-time or temporary contracts. \n· Younger workers have less training, experience and maturity in their job, which puts them at risk of \noverestimating their physical capacities or underestimating the safety and health risks associated with \ntheir tasks. \n· A further concern is that exposure to workplace risks when young can contribute to later disease – \nthis factor is not, however, addressed by worker health and safety surveillance. ", - "page_start": 55, - "page_end": 55, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 13, + "page_end": 13, + "source_file": "NYSE_SMFG_2011.pdf" }, { - "text": "**Globalisation**does not only refer to products and services but also to workforce that is working in other \ncountries on the same or another continent, temporarily or seasonally, sometimes permanently. An \nexchange of workforce of a similar level of skills and employment conditions probably poses few risks \nregarding OSH. A relevant risk shift takes place when workers from low- or medium-income countries \ntake over hard, dangerous and dirty work in high-income countries. \n\nEuropean Agency for Safety and Health at Work – EU-OSHA \n115 ", - "page_start": 115, - "page_end": 115, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 228, + "page_end": 228, + "source_file": "00-80T-80.pdf" } ] }, @@ -20295,64 +20295,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 155, + "page_end": 155, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 390, + "page_end": 390, + "source_file": "00-80T-80.pdf" }, { - "text": "**Knowledge representation**\nKnowledge representation and knowledge engineering[17] \nallow AI programs to answer questions intelligently and \nmake deductions about real-world facts. Formal knowledge \nrepresentations are used in content-based indexing and \nretrieval,[18] scene \ninterpretation,[19] clinical decision \nsupport,[20] knowledge discovery (mining \"interesting\" and \nactionable inferences from large databases),[21] and other \nareas.[22] \n\nA knowledge base is a body of knowledge represented in a \nform that can be used by a program. An ontology is the set \nof objects, relations, concepts, and properties used by a \nparticular domain of knowledge.[23] Knowledge bases need \nto represent things such as objects, properties, categories, \nand relations between objects;[24] situations, events, states, \nand time;[25] causes and effects;[26] knowledge about \nknowledge (what we know about what other people \nknow);[27] default reasoning (things that humans assume are true until they are told differently and will \nremain true even when other facts are changing);[28] and many other aspects and domains of knowledge. \n\nAn ontology represents knowledge as a set \nof concepts within a domain and the \nrelationships between those concepts. ", - "page_start": 2, - "page_end": 2, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 220, + "page_end": 220, + "source_file": "00-80T-80.pdf" }, { - "text": "The*epistemic approach*to informal logic, on the other hand, focuses on the epistemic role of \narguments.[148] It is based on the idea that arguments aim to increase our knowledge. They achieve this \nby linking justified beliefs to beliefs that are not yet justified.[149] Correct arguments succeed at \nexpanding knowledge while fallacies are epistemic failures: they do not justify the belief in their \nconclusion.[150] For example, the fallacy of begging the question is a*fallacy*because it fails to provide \nindependent justification for its conclusion, even though it is deductively valid.[151] In this sense, logical \nnormativity consists in epistemic success or rationality.[149] The Bayesian approach is one example of an \nepistemic approach.[152] Central to Bayesianism is not just whether the agent believes something but the \ndegree to which they believe it, the so-called*credence*. Degrees of belief are seen as subjective \nprobabilities in the believed proposition, i.e. how certain the agent is that the proposition is true.[153] On \nthis view, reasoning can be interpreted as a process of changing one's credences, often in reaction to new ", - "page_start": 13, - "page_end": 13, - "source_file": "wikipedia1.pdf" + "text": "", + "page_start": 220, + "page_end": 220, + "source_file": "00-80T-80.pdf" }, { - "text": "**Criticisms**\n\nThe main criticisms of eliminative materialism and illusionism hinge on the counterintuitive nature of the \nview. Arguments of this form are called*Moorean Arguments*. A Moorean argument seeks to undermine \nthe conclusion of an argument by asserting that the negation of that conclusion is more certain than the \npremises of the argument.[79] \n\nThe roots of the Moorean Argument against illusionism extend back to Augustine of Hippo who stated \nthat he could not be deceived regarding his own existence, since the very act of being deceived secures \nthe existence of a being there to be the recipient of that deception.[note 1][80] \n\nIn the Early-Modern era, these arguments were repopularized by René Descartes, who coined the now \nfamous phrase*\"Je pense, donc je suis\"*(\"I think, therefore I am\").[81] Descartes argued that even if he \nwas maximally deceived (because, for example, an evil demon was manipulating all his senses) he would \nstill know with certainty that his mind exists, because the state of being deceived requires a mind as a \nprerequisite.[82] \n\nThis same general argumentative structure is still in use today. For example, in 2002 David Chalmers \npublished an explicitly Moorean argument against illusionism. The argument goes like this: The reality of \nconsciousness is more certain than any theoretical commitments (to, for example, physicalism) that may \nbe motivating the illusionist to deny the existence of consciousness. The reason for this is because we \nhave direct \"acquaintance\" with consciousness, but we do not have direct acquaintance with anything else \n(including anything that could inform our beliefs in consciousness being an illusion). In other words: \nconsciousness can be known directly, so the reality of consciousness is more certain than any \nphilosophical or scientific theory that says otherwise.[83] Chalmers concludes that \"there is little doubt \nthat something like the Moorean argument is the reason that most people reject illusionism and many find \nit crazy.\"[84] ", - "page_start": 10, - "page_end": 10, - "source_file": "wikipedia2.pdf" + "text": "", + "page_start": 220, + "page_end": 220, + "source_file": "00-80T-80.pdf" }, { - "text": "Among the most difficult problems in knowledge representation are the breadth of commonsense \nknowledge (the set of atomic facts that the average person knows is enormous);[29] and the sub-symbolic \nform of most commonsense knowledge (much of what people know is not represented as \"facts\" or \n\"statements\" that they could express verbally).[16] There is also the difficulty of knowledge acquisition, \nthe problem of obtaining knowledge for AI applications.[c] ", - "page_start": 2, - "page_end": 2, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 220, + "page_end": 220, + "source_file": "00-80T-80.pdf" }, { - "text": "**Knowledge argument**\n\nThe knowledge argument, also known as*Mary's Room*, is another common thought experiment: A \nhypothetical neuroscientist named Mary has lived her whole life in a black-and-white room and has never \nseen colour before. She also happens to know everything there is to know about the brain and colour \nperception.[50] Chalmers believes[48] that when Mary sees the colour red for the first time, she gains new \nknowledge — the knowledge of \"what red looks like\" — which is distinct from, and irreducible to, her \nprior physical knowledge of the brain or visual system. A stronger form of the knowledge argument[50] \nclaims not merely that Mary would lack subjective*knowledge*of \"what red looks like,\" but that she \nwould lack knowledge of an objective*fact*about the world: namely, \"what red looks like,\" a non-physical \nfact that can be learned only through direct experience (qualia). Others, such as Thomas Nagel, take a \n\"physicalist\" position, disagree with the argument in its stronger and/or weaker forms.[50] For example, \nNagel put forward a \"speculative proposal\" of devising a language that could \"explain to a person blind \nfrom birth what it is like to see.\"[31] The knowledge argument implies that such a language could not \nexist. ", - "page_start": 6, - "page_end": 6, - "source_file": "wikipedia2.pdf" + "text": "", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "In Chinese philosophy, the School of Names and Mohism were particularly influential. The School of \nNames focused on the use of language and on paradoxes. For example, Gongsun Long proposed the \nwhite horse paradox, which defends the thesis that a white horse is not a horse. The school of Mohism \nalso acknowledged the importance of language for logic and tried to relate the ideas in these fields to the \nrealm of ethics.[197] \n\nIn India, the study of logic was primarily pursued by the schools of Nyaya, Buddhism, and Jainism. It \nwas not treated as a separate academic discipline and discussions of its topics usually happened in the \ncontext of epistemology and theories of dialogue or argumentation.[198] In Nyaya, inference is understood \nas a source of knowledge (pramāṇa). It follows the perception of an object and tries to arrive at \nconclusions, for example, about the cause of this object.[199] A similar emphasis on the relation to \nepistemology is also found in Buddhist and Jainist schools of logic, where inference is used to expand the \nknowledge gained through other sources.[200] Some of the later theories of Nyaya, belonging to the \nNavya-Nyāya school, resemble modern forms of logic, such as Gottlob Frege's distinction between sense \nand reference and his definition of number.[201] ", - "page_start": 18, - "page_end": 18, - "source_file": "wikipedia1.pdf" + "text": "", + "page_start": 220, + "page_end": 220, + "source_file": "00-80T-80.pdf" }, { - "text": "**Eliminative materialism / Illusionism**\n\nEliminative materialism or eliminativism is the view that many or all of the mental states used in folk \npsychology (i.e., common-sense ways of discussing the mind) do not, upon scientific examination, \ncorrespond to real brain mechanisms.[59] According the 2020 PhilPapers survey, 4.51% of philosophers \nsurveyed subscribe to eliminativism.[25] \n\nWhile Patricia Churchland and Paul Churchland have famously applied eliminative materialism to \npropositional attitudes, philosophers including Daniel Dennett, Georges Rey, and Keith Frankish have \napplied it to qualia or phenomenal consciousness (i.e., conscious experience).[59] On their view, it is \nmistaken not only to believe there is a hard problem of consciousness, but to believe phenomenal \nconsciousness exists at all.[19][61] ", - "page_start": 8, - "page_end": 8, - "source_file": "wikipedia2.pdf" + "text": "", + "page_start": 221, + "page_end": 221, + "source_file": "00-80T-80.pdf" }, { - "text": "It is possible to specify more than one class as the domain or range of a property. One of the \nmost common mistakes of new users is to do this and expect that the resulting domain/range is \nthe union of the two classes. However, note that next to the Domain and Range in the \nDescription view it says (intersection). This is because the semantics of having 2 or more classes \nas the domain or range is the*intersection*of those classes*not*the union. E.g., if one defined the \ndomain for a property to be Pizza and then added another domain IceCream that would \nmean that for something to be in the domain of that property it would have to be an instance of \n*both*Pizza*and*IceCream not (as people often expect) the*union*of those two sets which \nwould be*either*the class Pizza*or*the class IceCream. Also, note that the domain and range \nare for inferencing, they are not data integrity constraints. This distinction will be explained in \nmore detail below in the section on SHACL. ", - "page_start": 29, - "page_end": 29, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 221, + "page_end": 221, + "source_file": "00-80T-80.pdf" } ] }, @@ -20369,64 +20369,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 89, + "page_end": 89, + "source_file": "ASX_STO_2004.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 169, + "page_end": 169, + "source_file": "00-80T-80.pdf" }, { - "text": "The third objective responds to the impact of the pandemic situation in 2020 and 2021. It includes the \ndevelopment of emergency procedures for future similar situations (‘Health crisis’). The Strategic \nFramework repeats and corroborates the value of research and data-based evidence by stating: \n*‘Research and data collection, both at EU and national level, are a pre-condition for the prevention of*\n*work-related diseases and accidents. Scientific advice and the latest technological developments feed*\n*into OSH legislation and policy.’*\n\nAlso, many Member States have agreed on provision of better data as an objective in their national \nstrategies.384 The EU strategy often gives orientation for the development of national OSH strategies. \nUnder the last strategy period, 24 of the 27 Member States had applied a strategy. Many national OSH \nstrategies contained similar targets. EU-OSHA published an overview report on national strategies, and \nthe OSH Barometer contains as one indicator a harmonised overview on the aspects of national \nstrategies.385 \n\nOSH strategies are regarded as an important and innovative policy area, a chance for better \ncollaboration, and also a very relevant joint national OSH activity. Those strategies help in priority setting \nand focused action on weaknesses. Strategies were often agreed in social dialogue processes, and \nmany strategy actors also developed new and better monitoring instruments and indicators.386 Labour \ninspections play an important or essential role in most of these strategies. 387 ", - "page_start": 124, - "page_end": 124, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 95, + "page_end": 95, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "Ontologies are used to capture knowledge about some domain of interest. An ontology describes the \nconcepts in the domain and also the relationships that hold between those concepts. Different ontology \nlanguages provide different facilities. The most recent development in standard ontology languages is \nOWL from the World Wide Web Consortium (W3C). A good primer on the basic concepts of OWL can \nbe found at: https://www.w3.org/TR/owl2-primer/ \n\nOWL makes it possible to describe concepts in an unambiguous manner based on set theory and logic. \nComplex concepts can be built up out of simpler concepts. The logical model allows the use of a reasoner \nwhich can check whether all of the statements and definitions in the ontology are mutually consistent and \ncan also recognize which concepts fit under which definitions. The reasoner can therefore help to \nmaintain the hierarchy correctly. This is particularly useful when dealing with cases where classes can \nhave more than one parent. The reasoner can also infer additional information. For example, if two \nproperties are inverses only one value needs to be asserted by the user and the inverse value will be \nautomatically inferred by the reasoner. \n\n3.1 Components of OWL Ontologies \nAn OWL ontology consists of Classes, Properties, and Individuals. OWL ontologies are an \nimplementation of Description Logic (DL) which is a decidable subset of First Order Logic. A class in \nOWL is a set, a property is a binary relation, and an individual is an element of a set. Other concepts from \nset theory are also implemented in OWL such as Disjoint sets, the Empty set (owl:Nothing), inverse ", - "page_start": 7, - "page_end": 7, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 95, + "page_end": 95, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "To understand what is going on you first need to understand that each SPARQL query consists of two \nparts. The first part at the beginning consists of several namespace prefixes. These statements consist of \nthe prefix used for a particular namespace as well as the IRI associated with this namespace. Recall that \nthese concepts were described in chapter 7. You may be wondering where all these prefixes came from \nsince you didn’t add them to your ontology. The answer is that every OWL ontology comes with a set of \nnamespaces and prefixes that are required to define the ontology. \n\nAlso, to understand SPARQL you need to “peak under the hood” of OWL. So far, we have been \ndiscussing concepts in purely logical and set theoretic terms, i.e., at the semantic level. However, like any \nlanguage or database there is a lower level that describes how the concepts are mapped to actual data. In a \nrelational database the fundamental construct to represent data is a table. In OWL the fundamental \nconstruct is a triple. OWL is actually built on top of RDFS which is a language built on top of RDF. RDF \n(Resource Description Framework) is a language to describe graphs (in the mathematical sense of the \nterm). I.e., to describe nodes and links. ", - "page_start": 69, - "page_end": 69, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 95, + "page_end": 95, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "next section. Which option you choose for your ontology will depend on the specific requirements you \nhave as well as the standards established by your organization or organizations that you work with. \n\nFinally, another name related concept you should be aware of is the concept of a namespace. If you have \nworked with most modern programming languages such as Python or Java, you are already familiar with \nthe concept of a namespace. The concept is identical in OWL. A namespace is used to avoid naming \nconflicts between different ontologies. For example, you may have a class called Network in an ontology \nabout telecommunications. You might also have a class called Network in an ontology about graph \ntheory. The two concepts are related but are different. Just as with programming languages you use \nnamespace prefixes to determine what specific namespace a name refers to. E.g., in this example you \nmight have the prefix tc for the Telecom ontology and gt for the Graph Theory ontology. Thus, when \nyou referred to the Network class for the Telecom ontology you would use tc:Network and \ngt:Network for the graph theory class. \n\nNote that you already have some experience with other namespaces. The OWL namespace prefix is owl \nand is used to refer to classes such as owl:Thing and owl:Nothing. The Resource Description \nFramework Schema (RDFS) is a model that OWL is built on top of and thus some properties that \nontologies use such as rdfs:label leverage this namespace. ", - "page_start": 62, - "page_end": 62, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 95, + "page_end": 95, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "Since the beginning of the century, research on ontology learning has gained popularity. Automatically**extracting and structuring knowledge**\nrelevant to a domain of interest from unstructured data is a major scientific challenge. We propose a new approach with a**modular ontology**\n**learning framework**considering tasks from data pre-processing to axiom extraction. Whereas previous contributions considered ontology learning \nsystems as tools to help the domain expert, we developed the proposed framework with**full automation**in mind. An implementation as an**open-**\n**source and collaborative python library**is available at https://gitlab.insa-rouen.fr/msesboue/ontology-learning. ", - "page_start": 1, - "page_end": 1, - "source_file": "infographic5.pdf" + "text": "", + "page_start": 95, + "page_end": 95, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "This tutorial is just the entry point to a technology that is entering the*Slope of Enlightenment*in the \nGartner technology hype cycle [Gartner Hype Cycle]. Tim Berners-Lee published his paper on the \nSemantic Web [Berners-Lee 2001] way back in 2001. At least in my experience for most large US \ncorporations the excitement around Machine Learning seemed for a while to eclipse serious interest in \nOWL, SPARQL, and other Semantic Web technologies in the United States. Then influential technology \ncompanies such as Google [Singhal 2012], Facebook [Olanof 2013], and Amazon [Neptune 2017] started \nto embrace the technology using the term Knowledge Graphs [Noy 2019] and the corporate world is \nfinally realizing that machine learning and knowledge graphs are complimentary not competitive \ntechnologies. \n\nThe term knowledge graph itself can be used in different ways. The best definition I’ve heard is that an \nontology provides the vocabulary (i.e., essentially the T-Box) and a knowledge graph is an ontology \ncombined with data (A-Box). Although in the corporate world I often hear people simply talk about \nknowledge graphs without much interest in the distinction between the vocabulary and the data. ", - "page_start": 89, - "page_end": 89, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 95, + "page_end": 95, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "| using | File>Check for plugins | |\n|---|---|---|\n| using | File>Check for plugins | |\n| Not now | | button. |\n\n\n| er-interface consists of several tabs such as Active ontology, Entities, etc. When you should be in the Active Ontology tab. This is for overview information about the entire always opens with a new untitled ontology you can start with. Your ontology should | e consists of several tabs such as Active ontology, Entities, etc. When you in the Active Ontology tab. This is for overview information about the entire pens with a new untitled ontology you can start with. Your ontology should |\n|---|---|\n| hing like: http://www.semanticweb.org/yourname/ontologies/2020/4/untitled-ontology- of the ontology (the part after the last “/” in this case untitled-ontology-27) and change i PizzaTutorial. Note: the Pizza ontology IRIs shown below (e.g., figure 4.3) show the | http://www.semanticweb.org/yourname/ontologies/2020/4/untitled-ontology- |\n| PizzaTutorial | |\n\n\n| on your name or the name of your organization. | | | | |\n|---|---|---|---|---|\n| 3. Now you want to save your new ontology. Select | | | File>Save | . T |\n| Choose a format to use when saving the ‘PizzaTutorial’ ontology | | | | |\n| to use. The default | RDF/XML Syntax | should be selected by click | | |\n", - "page_start": 11, - "page_end": 11, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 95, + "page_end": 95, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "It focuses on multiword terms to construct a \n\"lexicalised ontology\" by adapting an agglomerative \nclustering and an FCA method. It implements 4 \nsteps: text preprocessing, concept extraction (C/NC- \nvalue), taxonomy construction, and non-taxonomic \nrelation acquisition (rule-based and probabilistic). It considers only multiword \nterms and relies on WordNet \nand POS tags. It does not \ndistinguish between terms and \nconcepts and implements \ndifferent adaptable approaches. \n\nOntoGain, \n2010, [2] ", - "page_start": 1, - "page_end": 1, - "source_file": "infographic5.pdf" + "text": "", + "page_start": 95, + "page_end": 95, + "source_file": "NYSE_JWN_2014.pdf" } ] }, @@ -20443,64 +20443,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 206, + "page_end": 206, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, + "text": "", + "page_start": 19, + "page_end": 19, "source_file": "Excel Training Manual 1.pdf" }, { - "text": "To format text, select it, and then select a button in the Font or Paragraph area on the Home \ntab. \n\nTry it: Select text in the lines below and choose formatting options so that the text is an \nexample of the formatting it’s describing: ", - "page_start": 4, - "page_end": 4, - "source_file": "welcome_to_word_template.pdf" + "text": "", + "page_start": 280, + "page_end": 280, + "source_file": "00-80T-80.pdf" }, { - "text": "Example A-3 File names of per node statistics \n\nIBM_Storwize:ITSO-V7k:superuser>lsdumps -prefix /dumps/iostats \nid filename \n0 Nd_stats_7822DFF-2_181101_173808 \n1 Nn_stats_7822DFF-2_181101_173808 \n2 Nv_stats_7822DFF-2_181101_173808 \n3 Nm_stats_7822DFF-2_181101_173808 \n4 Nm_stats_7822DFF-2_181101_175308 \n5 Nv_stats_7822DFF-2_181101_175308 \n6 Nd_stats_7822DFF-2_181101_175308 \n7 Nn_stats_7822DFF-2_181101_175308 \n... \n60 Nm_stats_7822DFF-2_181101_212314 \n61 Nn_stats_7822DFF-2_181101_212314 \n62 Nd_stats_7822DFF-2_181101_212314 \n63 Nv_stats_7822DFF-2_181101_212314 ", - "page_start": 765, - "page_end": 765, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 179, + "page_end": 179, + "source_file": "sg246915.pdf" }, { - "text": "Note that as with object properties defining a domain and/or range is optional. In general, it is a good \npractice to do so as it can lead to finding errors in your ontology during the modeling phase rather than at \nrun time. \n\n5.2 Customizing the Protégé User Interface \nIn order to demonstrate our new data property, we will need to create some instances of the Pizza class \nand set the value of the data property hasCaloricContent. One of the advantages of Protégé is that it \nis highly customizable to your specific requirements and work style. There are many views that are \navailable that aren’t included in the default Protégé environment because it would be too cluttered. In \naddition, all of the views that you have already used can be resized, removed, or added to existing tabs. \nYou can also create completely new tabs of your own. \n\nAs an example, we are going to first bring up a new major tab called Individuals by class. This tab can be \nuseful to create individuals and to add or edit their object and data property values. We are going to \ncustomize this tab to make it easier to use by adding a new view to it. \n\nTo begin use the menu option Window>Tabs>Individuals by class to bring up this new tab. Of course, if \nit already exists in your UI simply select it. ", - "page_start": 51, - "page_end": 51, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "cv = nL2β2 \nhe2i − hei2 \n(cid:0) \n(cid:1) \nχo = nL2β \nho2i − hoi2 \n, \n(cid:0) \n∂βo = nL2 (hoei − hoihei) , \nho4i \n3ho2i2 , \n\n, \n\n(cid:1) ", - "page_start": 3, - "page_end": 3, - "source_file": "1001.0510.pdf" + "text": "", + "page_start": 155, + "page_end": 155, + "source_file": "00-80T-80.pdf" }, { - "text": "**Type of content** **Tags**\n\nTable without Alt Text \n\n \n \n \n \n \n \n \n tag Yes \n\n23 Total Row in a Table has tag Yes \n\n24 Header Cell in Table has Scope=Row, Column, or Both Yes \n\nin
\n*text content*\n \n*text content*\n
\n*text content*\n \n*text content*\n
\n*text content*\n \n*text content*", - "page_start": 52, - "page_end": 52, - "source_file": "office-pdf.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": " There are certain technical challenges in using books in AI training as well, given the nature of the \n8 \nformat. First, one must address whether a book is already in digital form. For the vast majority of books, \nthat is not the case. One first needs to digitize the book, and convert it to a digital text file using optical \ncharacter recognition (OCR), or use a born-digital version (although we return to specific limitations on \nthat approach below). Second, once a book is in digital text form, it must be converted into a text format \nthat is suitable for AI training. Text conversion tools transfer the content of books into complete text \nfiles, which is akin to the type of conversion that must be done between a Microsoft Word or Adobe PDF \nfile format and a simple .txt format. This conversion is generally not adequate for the purpose of AI \ntraining; researchers have found that post-processing is required to ensure these text files are properly \nformatted for the purposes of tokenization. For example, when building the dataset known as The Pile, \nresearchers had to modify an existing epub-to-text converter tool to ensure that document structure \nacross chapters was preserved to match the table of contents, that tables of data were correctly \nrendered, to convert numbered lists from digitally legible lists of “1\\.��� to “1.”, and to replace unicode \npunctuation with ascii punctuation. See Discussion in 4.3.2 in Bandy, Jack, and Nicholas Vincent. \n*Addressing “Documentation Debt” in Machine Learning Research: A Retrospective Datasheet for*\n*BookCorpus*. 2021, https://arxiv.org/pdf/2105.05241.pdf. and C.16 of The Pile documentation in Gao, \nLeo, et al.*The Pile: An 800GB Dataset of Diverse Text for Language Modeling*, https://arxiv.org/pdf/ \n2101.00027.pdf. ", - "page_start": 5, - "page_end": 5, - "source_file": "creative_common_ai.pdf" + "text": "", + "page_start": 21, + "page_end": 21, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "| | Type of content Tags | |\n|---|---|---|\n| | Type of content Tags | |\n| | Paragraph, Subtitle, Content Controls, and Legacy Controls

| |\n| | Paragraph Quote and Intense Quote

| |\n| | Inline Quote (Version ≥ 16.0.17004.20000) | |\n| | Table of Contents Table of Contents Link – OBJR Complete line text empty ... ... | |\n| | Header and Footer no tags | |\n| | Comment (Version ≥ 16.0.16831.20002)

paragraph content anchor text comment content | |\n| | Footnotes and Endnotes

paragraph content Link – OBJR | |\n", - "page_start": 57, - "page_end": 57, - "source_file": "office-pdf.pdf" + "text": "", + "page_start": 21, + "page_end": 21, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "**Number** **Improvement** **Word Excel PowerPoint**\n\nText, or Decorative has tag with text content \n\n15 Shape with Alt Text and non-whitespace text without Yes Yes \n\nEquation has

tag with Alt Text \n\n16 Table Cell with Equation in a Table without Alt Text has Yes \n\n tag with Alt Text \n\n17 Summary Zoom, Section Zoom, and Slide Zoom has Yes \n\n tag without Alt Text \n\n18 WordArt preserved as text Yes Yes Yes \n\n19 \n\nAlt Text includes the Alt Text Title as well as Alt Text \nDescription \n\nYes Yes Yes \n\n20 Alt Text includes the Object type Yes Yes Yes \n\n21 \n\nAlt Text for Shape with Alt Text includes the text \ncontent \n\nYes Yes \n\n22 Header Row in a Table has
tag \n\n25 Cell in a Table has Row span and Column span set Yes \n\nproperly on or tag ", - "page_start": 39, - "page_end": 39, - "source_file": "office-pdf.pdf" + "text": "", + "page_start": 155, + "page_end": 155, + "source_file": "00-80T-80.pdf" } ] }, @@ -20517,64 +20517,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 373, + "page_end": 373, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 338, + "page_end": 338, + "source_file": "00-80T-80.pdf" }, { - "text": "Data revenue was 17% higher \nthe \ncontinued penetration and growing use of smartphones, tablet devices \nand wireless laptops, which increased the use of e-mail, wireless, \nInternet access, text messaging and other wireless data services. Data \nrevenue represented approximately 47% of total network revenue this \nyear, compared to approximately 41% last year. \n\nthis year mainly because of \n\n*Lower Equipment Sales*\nEquipment sales (net of subsidies) include revenue from sales to: \n(cid:129) independent dealers, agents and retailers \n(cid:129) directly to subscribers through fulfillment by Wireless’ customer \nPostpaid churn was 1.24% this year, compared to 1.29% in 2012. The \nlower churn rate is partly attributable to the new simplified plans and \nthe roaming plans we introduced. \nservice groups, websites, telesales and corporate stores. \n\nRevenue from equipment sales was lower this year, mainly because \nfewer existing subscribers upgraded their devices and there were fewer \ngross activations. \n\nGross postpaid subscriber additions were 1.4 million this year, or 3% \nlower than last year, which reduced net postpaid subscriber additions to \n228,000, despite a lower postpaid churn. We believe the industry \ntransition from three year to two year plans resulting from the recent \nadoption of the Canadian Radio-television and Telecommunications \nCommission (CRTC) Wireless Code may have slowed our overall \nwireless subscriber growth from the second half of the year. See \n“Regulation in Our Industry” for more information on the Wireless \nCode. ", - "page_start": 44, - "page_end": 44, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 338, + "page_end": 338, + "source_file": "00-80T-80.pdf" }, { - "text": "We expect to have ongoing re-pricing of products and services with our \nexisting subscribers as we extend lower wireless pricing offers to attract \nand retain customers. As such, wireless penetration of the population \ndeepens, new wireless customers may generate lower average monthly \nrevenue and this could slow revenue growth. \n\n**Dependence on Information Technology Systems**\nOur businesses depend on information technology systems for day-to- \nday operations. \nIf we are unable to operate our systems or make \nenhancements to accommodate customer growth and new products \nand services or our systems go down, it could have an adverse effect on \nour ability to acquire new subscribers, service customers, manage \nsubscriber churn, produce accurate and timely subscriber invoices, \ngenerate revenue growth and manage operating expenses. This could \nhave an adverse impact on our results and financial position. \n\n(cid:129) Industry Canada’s new policy regarding the transfer of spectrum \nforeign \nlicenses, combined with 2012 legislation that allows \nownership of wireless providers with less than 10% market share, \ncould make it harder for incumbent wireless carriers to acquire \nadditional spectrum, \nincluding the completion of our previously \nannounced arrangements with Shaw and Videotron, while making it \nless expensive for foreign wireless carriers to enter the Canadian \nwireless market. This could increase the intensity of competition in \nthe Canadian wireless sector. ", - "page_start": 78, - "page_end": 78, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 338, + "page_end": 338, + "source_file": "00-80T-80.pdf" }, { - "text": "The Company reports revenues as wireless, wireline and other revenues. These revenue classifications are defined as \nfollows: Wireless revenues are made up of the Personal Communications Company (a PCS Affiliate of Sprint), and the \nMobile Company. Wireline revenues include the following subsidiary revenues in the financial results: Telephone \nCompany, Network Company, Cable Television Company, and the Long Distance Company. Other revenues are \ncomprised of the revenues of ShenTel Service Company, the Leasing Company, ShenTel Communications Company \nand the Holding Company. For additional information on the Company's business segments, see Note 14 to audited \nconsolidated financial statements appearing elsewhere in this report. \n\nThe Company participates in the telecommunications industry, which requires substantial investment in fixed assets or \nplant. This significant capital requirement may preclude profitability during the initial years of operation. The strategy \nof the Company is to grow and diversify the business by adding services and geographic areas that can leverage the \nexisting plant, but to do so within the opportunities and constraints presented by the industry. For many years the \nCompany focused on reducing reliance on the regulated telephone operation, which up until 1981 was the primary \nbusiness within the Company. This initial diversification was concentrated in other wireline businesses, such as the \ncable television and regional fiber facility businesses, but in 1990 the Company made its first significant investment in \nthe wireless sector through its former investment in the Virginia 10 RSA Limited partnership. By 1998, revenues of \nthe regulated telephone operation had decreased to 59.2% of total revenues. In that same year more than 76.6% of the \nCompany’s total revenue was generated by wireline operations, and initiatives were already underway to make wireless \na more significant contributor to total revenues. ", - "page_start": 41, - "page_end": 41, - "source_file": "NASDAQ_SHEN_2003.pdf" + "text": "", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_JWN_2014.pdf" }, { - "text": "**DATA REVENUE**\n**GROWTH**\n\nWHAT WE SAID: Generate \ndouble-digit wireless and \nbroadband data growth consistent \nwith our data usage monetization \nstrategy. \n\nWHAT WE DID: Grew wireless \nand broadband data revenues by \n17% and 16%, respectively over \n2012 levels. ", - "page_start": 2, - "page_end": 2, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 338, + "page_end": 338, + "source_file": "00-80T-80.pdf" }, { - "text": "KEY CHANGES IN FINANCIAL RESULTS THIS YEAR COMPARED TO 2012 \n\n**Operating Revenue**\nWireless network revenue was higher than last year because of higher \nadoption and usage of wireless data services, partially offset by the \nintroduction of lower priced roaming plans and pricing changes made \nover this year. \n\n(In millions of dollars) **Change** **see page**\n\n*Operating revenue changes – higher (lower):*\nNetwork revenue – Wireless \nEquipment sales – Wireless \nCable \nBusiness Solutions \nMedia \nCorporate items and intercompany eliminations $ 29 \n(39) \n117 \n23 \n84 \n6 \n39 \n39 \n42 \n45 \n48 \n\nCable operating revenue was higher than last year mainly because of \ngrowth in Internet and phone revenues and the acquisition of Mountain \nCable, partially offset by a decline in television revenue related \nprincipally from competitive TV subscriber losses. \n**Higher operating revenue compared to 2012** 220 \n\n*Adjusted operating profit changes – higher (lower):*\nWireless \nCable \nBusiness Solutions \nMedia \nCorporate items and intercompany eliminations 94 \n113 \n17 \n(29) \n(36) \n39 \n42 \n45 \n48 \n\nBusiness Solutions operating revenue was higher than last year mainly \nbecause we completed the acquisitions of Blackiron Data and Pivot \nData Centres earlier this year combined with the continued growth in \non-net and next generation services, partially offset by planned decline \nin legacy voice and data services. ", - "page_start": 40, - "page_end": 40, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 338, + "page_end": 338, + "source_file": "00-80T-80.pdf" }, { - "text": "Through December 31, 2003, the Agreement provided that Sprint retains 8% of all collected service revenue from \nsubscribers with their service home in the Company's territory, and 8% of the roaming revenue generated by non-Sprint \nwireless subscribers who use the Company's network. With the adoption of the new Amended Agreement, the \nCompany will record its service revenue and receive payment from Sprint based on billed revenue, net of the 8% of \nbilled revenue retained by Sprint, customer credits and allocated write offs. ", - "page_start": 31, - "page_end": 31, - "source_file": "NASDAQ_SHEN_2003.pdf" + "text": "", + "page_start": 338, + "page_end": 338, + "source_file": "00-80T-80.pdf" }, { - "text": "**HIGHER VALUE**\n**WIRELESS SUBSCRIBERS**\n\nWHAT WE SAID: Continue the \ngrowth in our smartphone \nsubscriber base to drive wireless \ndata revenue and ARPU. \n\nWHAT WE DID: Activated nearly \n2.7 million smartphones, helping \nbring smartphone penetration \nto 75% of postpaid subscriber \nbase. ", - "page_start": 2, - "page_end": 2, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 337, + "page_end": 337, + "source_file": "00-80T-80.pdf" }, { - "text": "We report our results of operations in four segments: \n\n| Wireless | Wireless telecommunications operations for\nconsumers and businesses\nCable telecommunications operations,\nincluding cable television, Internet and\ncable telephony for Canadian consumers\nand businesses\nNetwork connectivity through our fibre\nnetwork assets to support a range of voice,\ndata, networking, data centre and cloud-\nbased services for medium and large\nCanadian businesses, governments, and\nother telecommunications providers\nA diversified portfolio of media properties,\nincluding television and radio broadcasting,\ndigital media, multi-platform shopping,\npublishing and sports media and\nentertainment |\n|---|---|\n| Wireless | Wireless telecommunications operations for consumers and businesses Cable telecommunications operations, including cable television, Internet and cable telephony for Canadian consumers and businesses Network connectivity through our fibre network assets to support a range of voice, data, networking, data centre and cloud- based services for medium and large Canadian businesses, governments, and other telecommunications providers A diversified portfolio of media properties, including television and radio broadcasting, digital media, multi-platform shopping, publishing and sports media and entertainment |\n| Cable | |\n| Business Solutions | |\n| Media | |\n\n\n**Use of Estimates and Judgments**\nWhen preparing our \nstatements, management makes \njudgments, estimates and assumptions that affect how accounting \npolicies are applied and the amounts we report as assets, liabilities, \nin the assumptions, \nrevenue and expenses. Significant changes \nincluding those related to our future business plans and cash flows, \ncould materially change the carrying amounts we record. Actual results \ncould be different from these estimates. \n\nfinancial ", - "page_start": 98, - "page_end": 98, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 337, + "page_end": 337, + "source_file": "00-80T-80.pdf" } ] }, @@ -20585,70 +20585,70 @@ "target_page": 2, "target_passage": "Launched NextBox 3.0 delivering a superior TV experience and leveraged the success of Rogers AnyPlace TV, our Internet and mobile on-demand TV service.", "chunk_present": { - "presence": true, - "index": 5 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 131, + "page_end": 131, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 63, + "page_end": 63, + "source_file": "00-80T-80.pdf" }, { - "text": "**ROGERS COMMUNICATIONS**\n\n**Rogers Communications (TSX: RCI; NYSE: RCI) is a diversified Canadian**\n**telecommunications and media company. As discussed in the following**\n**pages, Rogers Communications is engaged in the telecom and media**\n**businesses through its primary operating segments Rogers Wireless,**\n**Rogers Cable, Rogers Business Solutions and Rogers Media.**", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 62, + "page_end": 62, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\nDIRECTORS \nOF ROGERS COMMUNICATIONS INC. \nAS OF FEBRUARY 11, 2014 ", - "page_start": 24, - "page_end": 24, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 62, + "page_end": 62, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\nROGERS COMMUNICATIONS INC. \n2013 ANNUAL REPORT ", - "page_start": 1, - "page_end": 1, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 62, + "page_end": 62, + "source_file": "00-80T-80.pdf" }, { - "text": "**EVOLVE AND ENHANCE**\n**TELEVISION PLATFORM**\n\nWHAT WE SAID: Invest in the \nevolution of our current TV \nplatform and extend our video \nofferings to new platforms. \n\nWHAT WE DID: Launched NextBox \n3.0 delivering a superior TV \nexperience and leveraged the \nsuccess of Rogers AnyPlace TV, \nour Internet and mobile \non-demand TV service. ", - "page_start": 2, - "page_end": 2, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 62, + "page_end": 62, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\nSENIOR EXECUTIVE OFFICERS \nOF ROGERS COMMUNICATIONS INC. \nAS OF FEBRUARY 11, 2014 ", - "page_start": 25, - "page_end": 25, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 36, + "page_end": 36, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" }, { - "text": "With Canada’s first and fastest LTE wireless network – the global gold \nstandard in wireless network technology – Rogers makes “place- \nshifting” a reality so customers can connect to their communications, \ninformation and entertainment from almost anywhere, easily and \nseamlessly. With Rogers, watching TV on the train, conducting a virtual \nwhite-boarding session from the beach, disarming a home monitoring \nsystem from a smartphone, or answering a home phone from 5,000 \nkilometers away are becoming everyday activities. Rogers customers no \nlonger have to pick up the phone to check their voicemail; they don’t \nneed to be in town to catch their local news; and they don’t have to be \nat their PCs to access their e-mail. And with Rogers, businesses no \nlonger need to work in traditional offices because we help them to \nquickly set up virtual workspaces, with complete access to customers, \ncolleagues, files and corporate applications, so they are as productive \non the road as they are in the office. \n\nAnd now, small businesses as well as households can enjoy the flexibility \nand value of Rogers new Wireless Home and Small Business Phone \nproducts as well. \n\nCustomers know that Rogers makes it easy and seamless to connect \nwith the same personalized information, communications and \nentertainment experiences no matter where they are – at work, at \nschool, at home or away, including when travelling to more than 200 \ncountries around the world. And they know that only Rogers is there \nfirst with innovative new services, such as mobile TV, remote home \nmonitoring, and Rogers One Number, which allows them to switch calls \nbetween their wireless device, computer, and home phone without \ninterruption; manage e-mails, text messages and voicemail; hold live \nvideo chats; and combine and sync contacts from across multiple \ndevices – no matter where they are. ", - "page_start": 11, - "page_end": 11, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 62, + "page_end": 62, + "source_file": "00-80T-80.pdf" }, { - "text": "ROGERS IS COMMITTED TO DELIVERING WORLD-CLASS \nCONTENT AND EXPERIENCES TO CONSUMERS AND \nADVERTISING SOLUTIONS TO BUSINESSES. THE COMPANY \nHAS A STRONG LEGACY OF BUILDING POWERFUL MEDIA \nBRANDS WITH COMPELLING CONTENT THAT RESONATES WITH \nAUDIENCES ACROSS MULTIPLE PLATFORMS ON ANY DEVICE. \n\nToday, businesses across Canada connect with customers through Rogers \ncategory-leading television and radio assets, sports entertainment, \ntelevised and online shopping, publishing, and digital media properties as \nthe one-stop solution for all their local and national advertising needs. \n\nRogers Media is Canada’s premier combination of diversified broadcast, \nspecialty, sports, print and online media assets which together touch \nnearly 90% of Canadians every week. This includes over 50 popular AM \nand FM radio stations across Canada. In television, it includes the seven \nstation City network which broadcasts intensely local, urban-oriented ", - "page_start": 16, - "page_end": 16, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 63, + "page_end": 63, + "source_file": "00-80T-80.pdf" }, { - "text": "Rogers continues to be Canada’s innovation leader in rapidly growing \nareas such as wireless machine-to-machine communications, remote \nhome monitoring and automation, mobile payments, in-car \ninfotainment and telematics, and digital media. As well, Rogers has \ndeployed a suite of unique local digital services that create virtual \nmarketplaces for bringing consumers and businesses together and \nprovide location-based targeted offers. \n\nThese are just a few examples of the ways Rogers continues to \ninnovate and lead the way, introducing wireless, broadband and digital \ntechnologies and services that fundamentally change the way \ncustomers stay connected, informed and entertained anywhere they \nare. Canadians know there’s one thing to be certain of – if they’re with \nRogers, they’ll never miss a thing. ", - "page_start": 19, - "page_end": 19, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 63, + "page_end": 63, + "source_file": "00-80T-80.pdf" } ] }, @@ -20659,70 +20659,70 @@ "target_page": 39, "target_passage": "Sportsnet announced a 10-year partnership extension with the Vancouver Canucks through the 2022-2023 NHL seasons", "chunk_present": { - "presence": true, - "index": 4 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 94, + "page_end": 94, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "ACQUISITIONS \n(cid:129) Closed our agreement to acquire Metro 14 Montreal for $10 million \non February 4, 2013, and relaunched the station as City Montreal, \nexpanding the City broadcast TV network into the largest market in \nQuebec and increasing the City television network reach to over \n80% of Canadian households. \n\nMEDIA FINANCIAL RESULTS \n\nOperating expenses \n\n(cid:129) Finalized our purchase of theScore, Canada’s third largest specialty \nsports channel, for $167 million. We later rebranded theScore as \nSportsnet 360. \n**Adjusted operating profit – Media**\n\nAdjusted operating profit margin \nAdditions to property, plant and equipment **$** **79** $ 55 \n\nNHL \n(cid:129) Advanced our strategy of delivering highly sought-after sports \ncontent anywhere, anytime, on any platform and strengthening the \nvalue of our sports brand by entering into an exclusive 12-year \nlicensing agreement with the NHL which begins with the 2014-2015 \nseason and grants Rogers the following: \n- \n\nnational \nmobile tablets and Internet streaming \nnational rights to all regular season games, all playoff games \nand the Stanley Cup Final, and all special events and non- \ngame events (e.g. NHL All-Star Game, NHL Draft) – in multiple \nlanguages \nout-of-market rights for all regional games \nownership of all \ncondensed games and video archives \nNHL broadcast assets: Rogers to operate NHL Centre Ice and \nNHL Game Centre Live \nsponsorship rights to the NHL Shield logo as an official partner \nof the NHL \nCanadian representation of ad sales for NHL.com \nownership of all commercial \nbroadcasts \nrights to sublicense broadcasting rights to TVA and CBC \nrights to use the Hockey Night In Canada brand through the \nCBC sublicense agreement. \n\nrights across television broadcasts, wireless and \n**2013** **$1,704**\n\n- ", - "page_start": 52, - "page_end": 52, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "programming across the country’s largest markets, as well \nas five OMNI Television stations which deliver multilingual news, \ninformation and entertainment to Canada’s multiple language \ncommunities. \n\nRogers also publishes many well-known consumer magazines, such as \nMaclean’s, Chatelaine, FLARE, L’actualité, and Canadian Business, and is \nthe leading publisher of a number of industry, medical and financial \npublications. Rogers also controls a suite of fast-growing digital media \nassets, including 90+ owned and 300+ premium partnership online \nsites, as well as the recently launched Next Issue Canada digital \nmagazine platform which provides 100+ of North America’s most \ncelebrated titles on an unlimited anytime, anywhere basis. \n\nThe Sportsnet specialty network provides sports programming across \nCanada through its four regional television channels and its nationally- \ndistributed Sportsnet ONE, Sportsnet World, and Sportsnet 360 \nstations. Rogers also owns other Canadian specialty television channels, \nincluding FX Canada, OLN, The Biography Channel and G4. \n\nIn sports entertainment, Rogers owns the Toronto Blue Jays baseball \nteam and Rogers Centre stadium, Canada’s largest sports and \nentertainment facility and home field of the Blue Jays. Rogers also holds \na 37.5% investment in Maple Leaf Sports & Entertainment which owns \nthe NHL Maple Leafs, NBA Raptors, MLS Toronto FC and a number of \nother sports related assets. ", - "page_start": 17, - "page_end": 17, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "(cid:129) Sportsnet 360 was launched, which is comprised of the rebranded \ntheScore assets. The acquisition of theScore received final regulatory \napproval in the first half of this year. \nCABLE \n(cid:129) Acquisition of Mountain Cable, Shaw Communications’ (Shaw) cable \n\n(cid:129) Sportsnet announced a 10-year partnership extension with the \nVancouver Canucks through the 2022-2023 NHL seasons, continuing \na 14-year network tradition as the regional television broadcaster of \nCanucks hockey. The new agreement features a comprehensive suite \nof multimedia rights \nincluding television, online and mobile, \ndelivering up to 60 regular season Vancouver Canucks games each \nseason. Sportsnet is also the official regional television broadcast \nrights holder for the Toronto Maple Leafs, Calgary Flames and \nEdmonton Oilers. \n\nsystem in Hamilton, Ontario was completed. \n\n(cid:129) Next generation TV experience was unveiled with NextBox 3.0 giving \nviewers access to record up to eight HD programs at one time and \nstore up to 240 hours of HD content. The NextBox 3.0 experience \nincludes Whole Home PVR capability and becomes a wireless TV \nexperience allowing viewers to navigate their cable guide, use a \nvirtual remote, set PVR recordings and live stream channels all from a \ntablet or smartphone while at home or away. ", - "page_start": 39, - "page_end": 39, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "MEDIA SEGMENT \n\nRogers Media is Canada’s premier destination for category-leading television and \nradio broadcasting, sports entertainment, publishing, and digital media properties. \nTelevision assets include national City network which reaches more than 80% of \nCanadians, five OMNI Television multilingual channels, seven regional and national \nSportsnet channels, as well as specialty channels FX Canada, OLN, The Biography \nChannel and G4. Rogers Media also owns The Shopping Channel, Canada’s only \nnationally televised and online shopping service. It operates more than 50 Canadian \nradio stations, publishes 50+ well known consumer and business magazines, and \nowns a suite of digital media properties. Media owns the Toronto Blue Jays Baseball \nClub and Rogers Centre, Canada’s largest sports and entertainment facility. Rogers \nalso holds a 37.5% investment in Maple Leaf Sports & Entertainment, owner of NHL \nToronto Maple Leafs, NBA Toronto Raptors and MLS Toronto FC. ", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "linear and digital highlights, including \n\n**Higher Operating Revenue**\nMedia generates revenue in five areas: \n(cid:129) advertising sales across its television, radio, publishing and digital \nmedia properties \n\n(cid:129) circulation \n(cid:129) subscriptions \n(cid:129) retail product sales \n(cid:129) ticket sales, receipts of MLB revenue sharing and concession sales inventories for the television \nassociated with Rogers Sports Entertainment. \n\nOperating revenue was 5% higher this year, mainly because of: \n(cid:129) higher \nsubscription and advertising revenue generated by the \ntheScore, and \nincluding the acquisition of \nSportsnet properties, \noverall growth in distribution of our other specialty channels \n\nThrough this agreement, Rogers plans to provide Canadians with a \nunique viewing experience that will feature expanded pre- and post- \ngame coverage of \nregular season and playoff games and other \nenhanced NHL content. We expect this agreement to drive Sportsnet \nsubscriber growth and to provide highly sought after content \nin \nmultiple languages across all of Rogers’ platforms. \n\n(cid:129) higher advertising revenue of $21 million resulting from timing of \nNHL hockey games. Advertising revenue last year was lower than \nnormal due to the NHL player lockout which resulted in no NHL \ngames being aired, and higher than normal this year due to the \ncompressed 2012-2013 season which started in January 2013 and \nthe \nthe compressed 2013-2014 NHL schedule in advance of \nupcoming winter Olympics ", - "page_start": 52, - "page_end": 52, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "The higher programming costs this year are a combination of lower \ncosts in 2012 because of the NHL player lockout, and higher costs this \nyear because more hockey games than normal were aired because of \nthe compressed NHL hockey schedule due in part to upcoming winter \nOlympics. Approximately $62 million of Media’s year over year increase \nin operating expense this year resulted from the 2012 NHL lockout and \nthe timing of games aired in 2013. Player salaries at the Toronto Blue \nJays were $34 million higher this year. \n\nto last year, instead of 5% higher as reported \n(cid:129) adjusted operating profit would have been 19% lower this year \ncompared to last year, instead of 15% lower as reported. \n\n**MEDIA ADJUSTED OPERATING PROFIT**\n(IN MILLIONS OF DOLLARS) \n\n**2013** **$161**\n\n2012 $190 \n\n2011 $180 ", - "page_start": 53, - "page_end": 53, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Cable unveiled the next generation of TV experience with NextBox 3.0, \nand Media made significant progress this year, announcing a landmark \nexclusive 12-year \nto broadcast national NHL \ngames, launching a subscription digital magazine service, upgrading \nThe Shopping Channel, and including adding a mobile app and social \nIt also launched Sportsnet 360, and announced a 10-year \nmedia. \npartnership extension with the Vancouver Canucks. \n\nlicensing agreement ", - "page_start": 36, - "page_end": 36, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "**ROGERS COMMUNICATIONS**\n\n**Rogers Communications (TSX: RCI; NYSE: RCI) is a diversified Canadian**\n**telecommunications and media company. As discussed in the following**\n**pages, Rogers Communications is engaged in the telecom and media**\n**businesses through its primary operating segments Rogers Wireless,**\n**Rogers Cable, Rogers Business Solutions and Rogers Media.**", - "page_start": 4, - "page_end": 4, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" } ] }, @@ -20733,69 +20733,69 @@ "target_page": 6, "target_passage": "The Annual Meeting of shareholders will be held at 10 a.m. Central Time on Wednesday, June 30, 2004, at Emmis’ Corporate office.", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 359, + "page_end": 359, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 317, + "page_end": 317, + "source_file": "00-80T-80.pdf" }, { - "text": "Transfer Agent Register \nWachovia Bank N.A., Shareholder Services Group, \n1525 West W.T. Harris Blvd., 3c3, Charlotte, North Carolina 28288-1153. \n\nAnnual Meeting \nThe Annual Meeting of shareholders will be held at 10 a.m. Central Time on \nWednesday, June 30, 2004, at Emmis’ Corporate office. \n\nForm 10-K \nA copy of the Annual Report on Form 10-K for the fiscal year ended February 29, \n2004, which was filed with the Securities and Exchange Commission, will be sent \nto shareholders without charge upon written request to Kate Healey, Emmis \nCommunications Corporation, One Emmis Plaza, 40 Monument Circle, Suite 700, \nIndianapolis, Indiana 46204, or ir@emmis.com. \n\nMarket and Dividend Information \nThe Company’s Class A Common Stock is traded in the over-the-counter market \nand is quoted on the National Association of Securities Dealers Automated \nQuotation (NASDAQ) National Market System under the symbol EMMS. \n\nThe following table sets forth the high and low bid prices of the Class A Common \nStock for the periods indicated. No dividends were paid during any such periods. ", - "page_start": 6, - "page_end": 6, - "source_file": "NASDAQ_EMMS_2004.pdf" + "text": "", + "page_start": 317, + "page_end": 317, + "source_file": "00-80T-80.pdf" }, { - "text": "about emmis \n\nEmmis Communications (NASDAQ: EMMS) owns 23 FM and 4 AM \ndomestic radio stations serving the nation’s largest markets of New \nYork, Los Angeles and Chicago as well as Phoenix, St. Louis, Austin, \nIndianapolis and Terre Haute, Ind. In addition, Emmis owns 16 television \nstations, award-winning regional and specialty magazines, a radio net- \nwork, international radio interests, and ancillary businesses in broadcast \nsales and publishing. \n\nEmmis was founded in 1980, and the company launched its first radio \nstation, WENS-FM, in July 1981. As Emmis (the Hebrew word for \n“truth”) acquired more radio stations across the nation, it established a \nreputation for sound operations and emerged as a radio industry leader \nand innovator. Emmis was the first broadcast company to own top- \nrated radio stations in both L.A. and New York, and it pioneered such \nconcepts as the all-sports format. \n\nThe company launched its magazine division in 1988 with the purchase \nof*Indianapolis Monthly*, and moved into the world of international radio \nin 1997, when it was awarded a license to operate a national radio \nnetwork in Hungary. In 1998, Emmis expanded into television by buying \nsix television stations in markets throughout the United States. In the last \nsix years, the company has added properties in each of its divisions. ", - "page_start": 2, - "page_end": 2, - "source_file": "NASDAQ_EMMS_2004.pdf" + "text": "", + "page_start": 317, + "page_end": 317, + "source_file": "00-80T-80.pdf" }, { - "text": "to each exchange where its \nshares are listed: ASX, NASDAQ \nand NZX. The Company Secretary \nis responsible for communications \nwith the exchanges. All material \ninformation disclosed to the ASX \nis posted on the Company’s \nwebsite at www.santos.com. This \nincludes ASX announcements, \nannual reports (including \ntherefore this Corporate \nGovernance Statement), notices \nof meeting, CEO briefings, media \nreleases, and materials presented \nat investor, media and analyst \nbriefings. An email “alert” \nfacility is also offered to \nshareholders. Web-casting of \nmaterial presentations, including \nannual and half-yearly results \npresentations, is provided for \nthe benefit of shareholders, \nregardless of their location. \n\nAdditionally, the Company’s \nexternal auditor attends annual \ngeneral meetings to be available \nto answer shareholder questions \nrelevant to the conduct of \nthe audit. ", - "page_start": 36, - "page_end": 36, - "source_file": "ASX_STO_2004.pdf" + "text": "", + "page_start": 317, + "page_end": 317, + "source_file": "00-80T-80.pdf" }, { - "text": "Dear Shareholders, \n\ntion, we gained revenue share at 11 of our 13 measured \nstations and held the line on expenses, giving us a 1.2 \npercent increase in fiscal-year cash flow. \n\nOn our year-end conference call, I said that last year was the \nbest in Emmis Communications’ history. And while that might \nhave sounded like the usual Wall Street hyperbole – like any \nother CEO bragging about his company’s performance – the \ndifference is, I believed it. And I still do. \n\nOur publishing and international divisions also posted strong \nresults. In a tough publishing market, our magazines boosted \ntheir division’s revenues by 4.6 percent over last year and \nincreased cash flow by 3.3 percent. Our international division \nturned in a revenue increase of 27 percent and a cash flow \nincrease of 31 percent. \n\nBut I’ve been in this business long enough to know two \nthings for sure: What I believe is not as important as what I \ncan prove, and what we did last year is only meaningful if it \nreflects on how we will do in the coming year. The good \nnews is, Emmis does have the results to back up my high \npraise, and what we did to perform last year does directly \nrelate to how we’ll perform in the year ahead. ", - "page_start": 4, - "page_end": 4, - "source_file": "NASDAQ_EMMS_2004.pdf" + "text": "", + "page_start": 317, + "page_end": 317, + "source_file": "00-80T-80.pdf" }, { - "text": "Abbreviations: EM, emergency medicine; IP, inpatient. \n\na Automated EM handoff notes are generated from \n\nthe curation of the data through both rule-based and \nlarge language model–summarization approaches. \n\nDecember 3, 2024 4/12 ", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed8.pdf" + "text": "", + "page_start": 317, + "page_end": 317, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\ni.. ", - "page_start": 13, - "page_end": 13, + "text": "", + "page_start": 317, + "page_end": 317, "source_file": "00-80T-80.pdf" }, { - "text": "| In addition, we commit ourselves to creating the best content that could change the face of American TV and once again\nin our markets. Our magazines routinely dominate their demonstrate that Emmis is a company that leads the way.\nindustry awards ceremonies – last year, Texas Monthly won a\ncoveted National Magazine Award, and Emmis publications Forty years ago, Americans began taking down their TV\nclaimed more than half of the awards at the City and antennas and severing broadcasters’ direct link to television\nRegional Magazine competition. Our radio stations feature audiences. Since then, the cable companies—the middlemen\nsome of the industry’s most popular personalities – in 2003, who replaced us—have created more than $300 billion of\nEmmis people and stations were awarded three Marconi value for themselves. However, changes in technology have\nRadio Awards. And our television operations are regularly given broadcasters the ability to provide the American public\nhonored by journalism organizations for their news gathering with the most popular TV channels, without the middlemen\nand community service. In short, we provide our markets and at a more reasonable price.\nwith reliable, high-quality content – content that helps us\nassemble the audiences our advertisers want to reach. We are developing an innovative model that will leverage\nthat technology to get broadcast companies back into the\nWe then generate revenue by overallocating to sales. We game. I believe it has the potential to revolutionize the\ngive our teams well-developed strategies, clearly defined television industry. I also believe it will add substantial value\nbrands and solid products. We build bigger, better sales to your investment.\nforces and put a greater emphasis on local dollars than our\ncompetitors. We hire aggressive managers, set ambitious We unveiled this concept at the National Association of\ngoals and then watch our people work harder and smarter Broadcasters meeting in April. I am proud to say that 11\nthan anyone else. other television companies joined us at that meeting to\nexpress their support for what we’re calling the Broadcasters’\nWe also seize the right opportunities and make the most Initiative, and more are signing on each week. Once again,\nof them. As the cost of buying radio properties has gone Emmis has leveraged innovation to take a leading role in our\nthrough the roof, we have been careful about buying. industries.\nHowever, when we had a chance to acquire the LBJ stations\nin Austin, we knew it was the right fit: good stations, a We’ll continue to use innovation to push us forward.\ntremendous heritage and a great culture, all with an opportu- Meanwhile, we’ll also build and maintain the best teams, pro-\nnity for growth. And we’ve already built on that group’s track duce the best media content, outhustle and outsell our com-\nrecord – since we bought them, we’ve reformatted one sta- petitors, seize the best opportunities and operate this com-\ntion and quickly sent it to No. 1 in the market, and we’ve pany better than any other.\npushed revenues up 9 percent for the entire group.\nIn other words, you can count on Emmis to continue to do\nFinally, we innovate. Why has Emmis, traditionally a radio what it has always done: Outperform.\ncompany, become the company to emulate in TV? Because\nwe approached TV in a way it’s never been approached Thank you for your belief and investment in Emmis.\nbefore. Why do we operate leading hip-hop stations in mar-\nkets across the nation? Because we pioneered the concept.\nWhy have we created a new “Music with Class” format in St.\nLouis’ Red 104.1? Because we believe we see a new oppor-\ntunity. We know that successful companies don’t follow the\npack. They lead it, and that’s what we’ll always do.\nThe year ahead\nThat last point – innovation – is an important one, especially Jeffrey H. Smulyan\nfor the future of Emmis, because we are planning something chairman & ceo emmis communications | | |\n|---|---|---|\n| In addition, we commit ourselves to creating the best content that could change the face of American TV and once again in our markets. Our magazines routinely dominate their demonstrate that Emmis is a company that leads the way. industry awards ceremonies – last year, Texas Monthly won a coveted National Magazine Award, and Emmis publications Forty years ago, Americans began taking down their TV claimed more than half of the awards at the City and antennas and severing broadcasters’ direct link to television Regional Magazine competition. Our radio stations feature audiences. Since then, the cable companies—the middlemen some of the industry’s most popular personalities – in 2003, who replaced us—have created more than $300 billion of Emmis people and stations were awarded three Marconi value for themselves. However, changes in technology have Radio Awards. And our television operations are regularly given broadcasters the ability to provide the American public honored by journalism organizations for their news gathering with the most popular TV channels, without the middlemen and community service. In short, we provide our markets and at a more reasonable price. with reliable, high-quality content – content that helps us assemble the audiences our advertisers want to reach. We are developing an innovative model that will leverage that technology to get broadcast companies back into the We then generate revenue by overallocating to sales. We game. I believe it has the potential to revolutionize the give our teams well-developed strategies, clearly defined television industry. I also believe it will add substantial value brands and solid products. We build bigger, better sales to your investment. forces and put a greater emphasis on local dollars than our competitors. We hire aggressive managers, set ambitious We unveiled this concept at the National Association of goals and then watch our people work harder and smarter Broadcasters meeting in April. I am proud to say that 11 than anyone else. other television companies joined us at that meeting to express their support for what we’re calling the Broadcasters’ We also seize the right opportunities and make the most Initiative, and more are signing on each week. Once again, of them. As the cost of buying radio properties has gone Emmis has leveraged innovation to take a leading role in our through the roof, we have been careful about buying. industries. However, when we had a chance to acquire the LBJ stations in Austin, we knew it was the right fit: good stations, a We’ll continue to use innovation to push us forward. tremendous heritage and a great culture, all with an opportu- Meanwhile, we’ll also build and maintain the best teams, pro- nity for growth. And we’ve already built on that group’s track duce the best media content, outhustle and outsell our com- record – since we bought them, we’ve reformatted one sta- petitors, seize the best opportunities and operate this com- tion and quickly sent it to No. 1 in the market, and we’ve pany better than any other. pushed revenues up 9 percent for the entire group. In other words, you can count on Emmis to continue to do Finally, we innovate. Why has Emmis, traditionally a radio what it has always done: Outperform. company, become the company to emulate in TV? Because we approached TV in a way it’s never been approached Thank you for your belief and investment in Emmis. before. Why do we operate leading hip-hop stations in mar- kets across the nation? Because we pioneered the concept. Why have we created a new “Music with Class” format in St. Louis’ Red 104.1? Because we believe we see a new oppor- tunity. We know that successful companies don’t follow the pack. They lead it, and that’s what we’ll always do. The year ahead That last point – innovation – is an important one, especially Jeffrey H. Smulyan for the future of Emmis, because we are planning something chairman & ceo emmis communications | | |\n| | Jeffrey H. Smulyan chairman & ceo emmis communications | |\n| | | |\n", - "page_start": 5, - "page_end": 5, - "source_file": "NASDAQ_EMMS_2004.pdf" + "text": "", + "page_start": 318, + "page_end": 318, + "source_file": "00-80T-80.pdf" }, { - "text": "\ni ", - "page_start": 388, - "page_end": 388, + "text": "", + "page_start": 317, + "page_end": 317, "source_file": "00-80T-80.pdf" } ] @@ -20807,70 +20807,70 @@ "target_page": 6, "target_passage": "Randall Bongarten Television Division President", "chunk_present": { - "presence": true, - "index": 3 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 22, + "page_end": 22, + "source_file": "NYSE_HNI_2003.pdf" }, { - "text": "about emmis \n\nEmmis Communications (NASDAQ: EMMS) owns 23 FM and 4 AM \ndomestic radio stations serving the nation’s largest markets of New \nYork, Los Angeles and Chicago as well as Phoenix, St. Louis, Austin, \nIndianapolis and Terre Haute, Ind. In addition, Emmis owns 16 television \nstations, award-winning regional and specialty magazines, a radio net- \nwork, international radio interests, and ancillary businesses in broadcast \nsales and publishing. \n\nEmmis was founded in 1980, and the company launched its first radio \nstation, WENS-FM, in July 1981. As Emmis (the Hebrew word for \n“truth”) acquired more radio stations across the nation, it established a \nreputation for sound operations and emerged as a radio industry leader \nand innovator. Emmis was the first broadcast company to own top- \nrated radio stations in both L.A. and New York, and it pioneered such \nconcepts as the all-sports format. \n\nThe company launched its magazine division in 1988 with the purchase \nof*Indianapolis Monthly*, and moved into the world of international radio \nin 1997, when it was awarded a license to operate a national radio \nnetwork in Hungary. In 1998, Emmis expanded into television by buying \nsix television stations in markets throughout the United States. In the last \nsix years, the company has added properties in each of its divisions. ", - "page_start": 2, - "page_end": 2, - "source_file": "NASDAQ_EMMS_2004.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_HNI_2003.pdf" }, { - "text": "Executive Officers \nJeffrey H. Smulyan \nChairman of the Board, \nPresident and Chief Executive Officer \n\nWalter Z. Berger \nExecutive Vice President, \nChief Financial Officer and Treasurer \n\nRandall Bongarten \nTelevision Division President \n\nRichard F. Cummings \nRadio Division President \n\nGary L. Kaseff \nExecutive Vice President, \nGeneral Counsel \n\nPaul W. Fiddick \nInternational Division President \n\nMichael Levitan \nSenior Vice President, \nHuman Resources \n\nGary Thoe \nPublishing Division President \n\nBoard of Directors \nJeffrey H. Smulyan \nChairman of the Board, \nPresident and Chief Executive Officer \n\nSusan B. Bayh \nFormer Commissioner of the International Joint \nCommission of the United States and Canada \n\nWalter Z. Berger \nExecutive Vice President, \nChief Financial Officer and Treasurer \n\nGary L. Kaseff \nExecutive Vice President, \nGeneral Counsel \n\nRichard A. Leventhal \nPresident and Majority Owner, \nLMCS, LLC \n\nPeter A. Lund \nMedia consultant and former \nPresident of CBS Inc. \n\nGreg A. Nathanson \nMedia consultant and former \nPresident of Fox Television Stations and \nEmmis Television \n\nFrank V. Sica \nSenior Advisor \nSoros Fund Management LLC ", - "page_start": 6, - "page_end": 6, - "source_file": "NASDAQ_EMMS_2004.pdf" + "text": "", + "page_start": 19, + "page_end": 19, + "source_file": "NYSE_HNI_2003.pdf" }, { - "text": "Transfer Agent Register \nWachovia Bank N.A., Shareholder Services Group, \n1525 West W.T. Harris Blvd., 3c3, Charlotte, North Carolina 28288-1153. \n\nAnnual Meeting \nThe Annual Meeting of shareholders will be held at 10 a.m. Central Time on \nWednesday, June 30, 2004, at Emmis’ Corporate office. \n\nForm 10-K \nA copy of the Annual Report on Form 10-K for the fiscal year ended February 29, \n2004, which was filed with the Securities and Exchange Commission, will be sent \nto shareholders without charge upon written request to Kate Healey, Emmis \nCommunications Corporation, One Emmis Plaza, 40 Monument Circle, Suite 700, \nIndianapolis, Indiana 46204, or ir@emmis.com. \n\nMarket and Dividend Information \nThe Company’s Class A Common Stock is traded in the over-the-counter market \nand is quoted on the National Association of Securities Dealers Automated \nQuotation (NASDAQ) National Market System under the symbol EMMS. \n\nThe following table sets forth the high and low bid prices of the Class A Common \nStock for the periods indicated. No dividends were paid during any such periods. ", - "page_start": 6, - "page_end": 6, - "source_file": "NASDAQ_EMMS_2004.pdf" + "text": "", + "page_start": 19, + "page_end": 19, + "source_file": "NYSE_HNI_2003.pdf" }, { - "text": "\nA MESSAGE FROM THE PRESIDENT & CEO ", - "page_start": 7, - "page_end": 7, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 17, + "page_end": 17, + "source_file": "NYSE_HNI_2003.pdf" }, { - "text": "| In addition, we commit ourselves to creating the best content that could change the face of American TV and once again\nin our markets. Our magazines routinely dominate their demonstrate that Emmis is a company that leads the way.\nindustry awards ceremonies – last year, Texas Monthly won a\ncoveted National Magazine Award, and Emmis publications Forty years ago, Americans began taking down their TV\nclaimed more than half of the awards at the City and antennas and severing broadcasters’ direct link to television\nRegional Magazine competition. Our radio stations feature audiences. Since then, the cable companies—the middlemen\nsome of the industry’s most popular personalities – in 2003, who replaced us—have created more than $300 billion of\nEmmis people and stations were awarded three Marconi value for themselves. However, changes in technology have\nRadio Awards. And our television operations are regularly given broadcasters the ability to provide the American public\nhonored by journalism organizations for their news gathering with the most popular TV channels, without the middlemen\nand community service. In short, we provide our markets and at a more reasonable price.\nwith reliable, high-quality content – content that helps us\nassemble the audiences our advertisers want to reach. We are developing an innovative model that will leverage\nthat technology to get broadcast companies back into the\nWe then generate revenue by overallocating to sales. We game. I believe it has the potential to revolutionize the\ngive our teams well-developed strategies, clearly defined television industry. I also believe it will add substantial value\nbrands and solid products. We build bigger, better sales to your investment.\nforces and put a greater emphasis on local dollars than our\ncompetitors. We hire aggressive managers, set ambitious We unveiled this concept at the National Association of\ngoals and then watch our people work harder and smarter Broadcasters meeting in April. I am proud to say that 11\nthan anyone else. other television companies joined us at that meeting to\nexpress their support for what we’re calling the Broadcasters’\nWe also seize the right opportunities and make the most Initiative, and more are signing on each week. Once again,\nof them. As the cost of buying radio properties has gone Emmis has leveraged innovation to take a leading role in our\nthrough the roof, we have been careful about buying. industries.\nHowever, when we had a chance to acquire the LBJ stations\nin Austin, we knew it was the right fit: good stations, a We’ll continue to use innovation to push us forward.\ntremendous heritage and a great culture, all with an opportu- Meanwhile, we’ll also build and maintain the best teams, pro-\nnity for growth. And we’ve already built on that group’s track duce the best media content, outhustle and outsell our com-\nrecord – since we bought them, we’ve reformatted one sta- petitors, seize the best opportunities and operate this com-\ntion and quickly sent it to No. 1 in the market, and we’ve pany better than any other.\npushed revenues up 9 percent for the entire group.\nIn other words, you can count on Emmis to continue to do\nFinally, we innovate. Why has Emmis, traditionally a radio what it has always done: Outperform.\ncompany, become the company to emulate in TV? Because\nwe approached TV in a way it’s never been approached Thank you for your belief and investment in Emmis.\nbefore. Why do we operate leading hip-hop stations in mar-\nkets across the nation? Because we pioneered the concept.\nWhy have we created a new “Music with Class” format in St.\nLouis’ Red 104.1? Because we believe we see a new oppor-\ntunity. We know that successful companies don’t follow the\npack. They lead it, and that’s what we’ll always do.\nThe year ahead\nThat last point – innovation – is an important one, especially Jeffrey H. Smulyan\nfor the future of Emmis, because we are planning something chairman & ceo emmis communications | | |\n|---|---|---|\n| In addition, we commit ourselves to creating the best content that could change the face of American TV and once again in our markets. Our magazines routinely dominate their demonstrate that Emmis is a company that leads the way. industry awards ceremonies – last year, Texas Monthly won a coveted National Magazine Award, and Emmis publications Forty years ago, Americans began taking down their TV claimed more than half of the awards at the City and antennas and severing broadcasters’ direct link to television Regional Magazine competition. Our radio stations feature audiences. Since then, the cable companies—the middlemen some of the industry’s most popular personalities – in 2003, who replaced us—have created more than $300 billion of Emmis people and stations were awarded three Marconi value for themselves. However, changes in technology have Radio Awards. And our television operations are regularly given broadcasters the ability to provide the American public honored by journalism organizations for their news gathering with the most popular TV channels, without the middlemen and community service. In short, we provide our markets and at a more reasonable price. with reliable, high-quality content – content that helps us assemble the audiences our advertisers want to reach. We are developing an innovative model that will leverage that technology to get broadcast companies back into the We then generate revenue by overallocating to sales. We game. I believe it has the potential to revolutionize the give our teams well-developed strategies, clearly defined television industry. I also believe it will add substantial value brands and solid products. We build bigger, better sales to your investment. forces and put a greater emphasis on local dollars than our competitors. We hire aggressive managers, set ambitious We unveiled this concept at the National Association of goals and then watch our people work harder and smarter Broadcasters meeting in April. I am proud to say that 11 than anyone else. other television companies joined us at that meeting to express their support for what we’re calling the Broadcasters’ We also seize the right opportunities and make the most Initiative, and more are signing on each week. Once again, of them. As the cost of buying radio properties has gone Emmis has leveraged innovation to take a leading role in our through the roof, we have been careful about buying. industries. However, when we had a chance to acquire the LBJ stations in Austin, we knew it was the right fit: good stations, a We’ll continue to use innovation to push us forward. tremendous heritage and a great culture, all with an opportu- Meanwhile, we’ll also build and maintain the best teams, pro- nity for growth. And we’ve already built on that group’s track duce the best media content, outhustle and outsell our com- record – since we bought them, we’ve reformatted one sta- petitors, seize the best opportunities and operate this com- tion and quickly sent it to No. 1 in the market, and we’ve pany better than any other. pushed revenues up 9 percent for the entire group. In other words, you can count on Emmis to continue to do Finally, we innovate. Why has Emmis, traditionally a radio what it has always done: Outperform. company, become the company to emulate in TV? Because we approached TV in a way it’s never been approached Thank you for your belief and investment in Emmis. before. Why do we operate leading hip-hop stations in mar- kets across the nation? Because we pioneered the concept. Why have we created a new “Music with Class” format in St. Louis’ Red 104.1? Because we believe we see a new oppor- tunity. We know that successful companies don’t follow the pack. They lead it, and that’s what we’ll always do. The year ahead That last point – innovation – is an important one, especially Jeffrey H. Smulyan for the future of Emmis, because we are planning something chairman & ceo emmis communications | | |\n| | Jeffrey H. Smulyan chairman & ceo emmis communications | |\n| | | |\n", - "page_start": 5, - "page_end": 5, - "source_file": "NASDAQ_EMMS_2004.pdf" + "text": "", + "page_start": 17, + "page_end": 17, + "source_file": "NYSE_HNI_2003.pdf" }, { - "text": "Business \nEmmis Communications (NASDAQ: EMMS) is a diversified media firm with award- \nwinning radio broadcasting, television broadcasting and magazine publishing \noperations. Emmis’ 23 FM and 4 AM domestic radio stations serve the nation’s largest \nmarkets of New York, Los Angeles and Chicago as well as Phoenix, St. Louis, Austin, \nIndianapolis and Terre Haute, Ind. The company’s 16 television stations are located in \nAlbuquerque, N.M.; Fort Myers, Fla.; Green Bay, Wis.; Honolulu; Huntington, W.Va.; \nMobile, Ala./Pensacola, Fla.; New Orleans; Omaha, Neb.; Orlando, Fla.; Portland, Ore.; \nTerre Haute, Ind.; Topeka, Kan.; Tucson, Ariz.; and Wichita, Kan. Emmis also publishes \n*Indianapolis Monthly, Texas Monthly, Cincinnati, Atlanta, Los Angeles*and Country \nSampler Group magazines; has a 59.5% interest in Sláger Rádió, a national radio \nnetwork in Hungary; operates nine FM radio stations serving more than 50 percent of \nthe population in the Flanders region of Belgium; and has ancillary businesses in \nbroadcast sales, publishing and interactive products. ", - "page_start": 6, - "page_end": 6, - "source_file": "NASDAQ_EMMS_2004.pdf" + "text": "", + "page_start": 16, + "page_end": 16, + "source_file": "NYSE_HNI_2003.pdf" }, { - "text": "**Introduction**\n\nHandoffs, where patient information is exchanged between health professionals during a transfer of \nclinical responsibility, have been identified as a critical source of medical errors.1,2 The Joint \nCommission, the Accreditation Council for Graduate Medical Education, and the Association of \n\nAmerican Medical Colleges have all recommended the development of high-quality and standardized \nhandoff processes to address the substantial patient risk of this ubiquitous event.3,4 Implementing \nhandoff tools has previously demonstrated significant reductions in medical errors.5,6 High-quality \nhandoffs from emergency medicine (EM) to inpatient (IP) services (EM-to-IP) are challenged by \nmedical complexity, diagnostic uncertainty, rapidly evolving care plans, and time constraints.7-10 The \nEM-to-IP handoff structure is not well standardized, frequently communicated verbally, and poorly \n\nadhered to in emergency departments (EDs), including in medical centers with formalized handoff \nsystems.11-14 Prior research has demonstrated that suboptimal EM-to-IP handoff is associated with \nadverse events, EM leaders and front-line clinicians themselves view the EM-to-IP handoff as high \n\nrisk, and an electronic health record (EHR)-based technology is commonly mentioned as the most \ndesired assistive tool in improving ED transitions of care.15-18 Limited work to date has demonstrated \nEM electronic handoff tools as feasible, efficient, and effective.19-21 In April 2023, EM and internal \nmedicine leadership of the study site collaboratively developed and launched a mandatory, ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed8.pdf" + "text": "", + "page_start": 16, + "page_end": 16, + "source_file": "NYSE_HNI_2003.pdf" }, { - "text": "Executive Summary \n\nABOUT ROGERS COMMUNICATIONS INC. \n\nRogers Communications is one of Canada’s leading diversified communications and media companies. \n\nWe provide a broad range of services: wireless and wired voice and data \ncommunications, cable television, high-speed Internet, cable telephony, \nwired telecom and data networking services \nto consumers and \nbusinesses. We also compete in television and radio broadcasting, \nmulti-platform shopping, sports media and entertainment, digital media \nand consumer, trade and professional publications. \n\n**2013 CONSOLIDATED REVENUE BY SEGMENT**\n(%) \n\nWIRELESS**57%**\n\nCABLE**27%**\n\n$12.7 \n\nAlmost all of our operations and sales are in Canada. We have a highly \nskilled and diversified workforce of approximately 28,000 employees. \nOur head-office is in Toronto, Ontario and we have numerous offices \nacross Canada. \n\nBILLION \nMEDIA**13%**\n\nBUSINESS SOLUTIONS**3%**\n\n**2013 CONSOLIDATED ADJUSTED OPERATING PROFIT BY SEGMENT**\n(%) \n\nWIRELESS**61%**\n\nCABLE**33%**\n\n$5.0 \nBILLION \n\nMEDIA**4%**\nBUSINESS SOLUTIONS**2%**", - "page_start": 30, - "page_end": 30, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 13, + "page_end": 13, + "source_file": "NYSE_HNI_2003.pdf" } ] }, @@ -20881,70 +20881,70 @@ "target_page": 7, "target_passage": "KLBJ-FM (93.7), Album Oriented Rock", "chunk_present": { - "presence": true, - "index": 4 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 337, + "page_end": 337, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 65, + "page_end": 65, + "source_file": "OTC_NSANY_2004.pdf" }, { - "text": "about emmis \n\nEmmis Communications (NASDAQ: EMMS) owns 23 FM and 4 AM \ndomestic radio stations serving the nation’s largest markets of New \nYork, Los Angeles and Chicago as well as Phoenix, St. Louis, Austin, \nIndianapolis and Terre Haute, Ind. In addition, Emmis owns 16 television \nstations, award-winning regional and specialty magazines, a radio net- \nwork, international radio interests, and ancillary businesses in broadcast \nsales and publishing. \n\nEmmis was founded in 1980, and the company launched its first radio \nstation, WENS-FM, in July 1981. As Emmis (the Hebrew word for \n“truth”) acquired more radio stations across the nation, it established a \nreputation for sound operations and emerged as a radio industry leader \nand innovator. Emmis was the first broadcast company to own top- \nrated radio stations in both L.A. and New York, and it pioneered such \nconcepts as the all-sports format. \n\nThe company launched its magazine division in 1988 with the purchase \nof*Indianapolis Monthly*, and moved into the world of international radio \nin 1997, when it was awarded a license to operate a national radio \nnetwork in Hungary. In 1998, Emmis expanded into television by buying \nsix television stations in markets throughout the United States. In the last \nsix years, the company has added properties in each of its divisions. ", - "page_start": 2, - "page_end": 2, - "source_file": "NASDAQ_EMMS_2004.pdf" + "text": "", + "page_start": 260, + "page_end": 260, + "source_file": "00-80T-80.pdf" }, { - "text": "Business \nEmmis Communications (NASDAQ: EMMS) is a diversified media firm with award- \nwinning radio broadcasting, television broadcasting and magazine publishing \noperations. Emmis’ 23 FM and 4 AM domestic radio stations serve the nation’s largest \nmarkets of New York, Los Angeles and Chicago as well as Phoenix, St. Louis, Austin, \nIndianapolis and Terre Haute, Ind. The company’s 16 television stations are located in \nAlbuquerque, N.M.; Fort Myers, Fla.; Green Bay, Wis.; Honolulu; Huntington, W.Va.; \nMobile, Ala./Pensacola, Fla.; New Orleans; Omaha, Neb.; Orlando, Fla.; Portland, Ore.; \nTerre Haute, Ind.; Topeka, Kan.; Tucson, Ariz.; and Wichita, Kan. Emmis also publishes \n*Indianapolis Monthly, Texas Monthly, Cincinnati, Atlanta, Los Angeles*and Country \nSampler Group magazines; has a 59.5% interest in Sláger Rádió, a national radio \nnetwork in Hungary; operates nine FM radio stations serving more than 50 percent of \nthe population in the Flanders region of Belgium; and has ancillary businesses in \nbroadcast sales, publishing and interactive products. ", - "page_start": 6, - "page_end": 6, - "source_file": "NASDAQ_EMMS_2004.pdf" + "text": "", + "page_start": 260, + "page_end": 260, + "source_file": "00-80T-80.pdf" }, { - "text": "**RADIO**\n**Austin**\nKDHT-FM (93.3), Rhythmic CHR \nKEYI-FM (103.5), Oldies \nKGSR-FM (107.1), Adult Alternative \nKLBJ-AM (590), News/Talk \nKLBJ-FM (93.7), Album Oriented Rock \n\nKROX-FM (101.5), Alternative Rock \n**Chicago**\n\nWKQX-FM (101.1), Alternative Rock \n**Indianapolis**\nWENS-FM (97.1), Adult Contemporary \n\nWIBC-AM (1070), News/Talk/Sports \nWNOU-FM (93.1), CHR \nWYXB-FM (105.7), Soft Adult Contemporary \n\nNetwork Indiana, Statewide news network \n**Los Angeles**\nKPWR-FM (105.9), Hip-Hop/R&B \n\nKZLA-FM (93.9), Country \n**New York**\n**INTERNATIONAL**\n\nWQCD-FM (101.9), Smooth Jazz \nWQHT-FM (97.7), Hip-Hop \n\nWRKS-FM(98.7), Classic Soul/Today’s R&B \n**Phoenix**\nKKFR-FM(92.3), Rhythmic CHR ", - "page_start": 7, - "page_end": 7, - "source_file": "NASDAQ_EMMS_2004.pdf" + "text": "", + "page_start": 151, + "page_end": 151, + "source_file": "00-80T-80.pdf" }, { - "text": "| In addition, we commit ourselves to creating the best content that could change the face of American TV and once again\nin our markets. Our magazines routinely dominate their demonstrate that Emmis is a company that leads the way.\nindustry awards ceremonies – last year, Texas Monthly won a\ncoveted National Magazine Award, and Emmis publications Forty years ago, Americans began taking down their TV\nclaimed more than half of the awards at the City and antennas and severing broadcasters’ direct link to television\nRegional Magazine competition. Our radio stations feature audiences. Since then, the cable companies—the middlemen\nsome of the industry’s most popular personalities – in 2003, who replaced us—have created more than $300 billion of\nEmmis people and stations were awarded three Marconi value for themselves. However, changes in technology have\nRadio Awards. And our television operations are regularly given broadcasters the ability to provide the American public\nhonored by journalism organizations for their news gathering with the most popular TV channels, without the middlemen\nand community service. In short, we provide our markets and at a more reasonable price.\nwith reliable, high-quality content – content that helps us\nassemble the audiences our advertisers want to reach. We are developing an innovative model that will leverage\nthat technology to get broadcast companies back into the\nWe then generate revenue by overallocating to sales. We game. I believe it has the potential to revolutionize the\ngive our teams well-developed strategies, clearly defined television industry. I also believe it will add substantial value\nbrands and solid products. We build bigger, better sales to your investment.\nforces and put a greater emphasis on local dollars than our\ncompetitors. We hire aggressive managers, set ambitious We unveiled this concept at the National Association of\ngoals and then watch our people work harder and smarter Broadcasters meeting in April. I am proud to say that 11\nthan anyone else. other television companies joined us at that meeting to\nexpress their support for what we’re calling the Broadcasters’\nWe also seize the right opportunities and make the most Initiative, and more are signing on each week. Once again,\nof them. As the cost of buying radio properties has gone Emmis has leveraged innovation to take a leading role in our\nthrough the roof, we have been careful about buying. industries.\nHowever, when we had a chance to acquire the LBJ stations\nin Austin, we knew it was the right fit: good stations, a We’ll continue to use innovation to push us forward.\ntremendous heritage and a great culture, all with an opportu- Meanwhile, we’ll also build and maintain the best teams, pro-\nnity for growth. And we’ve already built on that group’s track duce the best media content, outhustle and outsell our com-\nrecord – since we bought them, we’ve reformatted one sta- petitors, seize the best opportunities and operate this com-\ntion and quickly sent it to No. 1 in the market, and we’ve pany better than any other.\npushed revenues up 9 percent for the entire group.\nIn other words, you can count on Emmis to continue to do\nFinally, we innovate. Why has Emmis, traditionally a radio what it has always done: Outperform.\ncompany, become the company to emulate in TV? Because\nwe approached TV in a way it’s never been approached Thank you for your belief and investment in Emmis.\nbefore. Why do we operate leading hip-hop stations in mar-\nkets across the nation? Because we pioneered the concept.\nWhy have we created a new “Music with Class” format in St.\nLouis’ Red 104.1? Because we believe we see a new oppor-\ntunity. We know that successful companies don’t follow the\npack. They lead it, and that’s what we’ll always do.\nThe year ahead\nThat last point – innovation – is an important one, especially Jeffrey H. Smulyan\nfor the future of Emmis, because we are planning something chairman & ceo emmis communications | | |\n|---|---|---|\n| In addition, we commit ourselves to creating the best content that could change the face of American TV and once again in our markets. Our magazines routinely dominate their demonstrate that Emmis is a company that leads the way. industry awards ceremonies – last year, Texas Monthly won a coveted National Magazine Award, and Emmis publications Forty years ago, Americans began taking down their TV claimed more than half of the awards at the City and antennas and severing broadcasters’ direct link to television Regional Magazine competition. Our radio stations feature audiences. Since then, the cable companies—the middlemen some of the industry’s most popular personalities – in 2003, who replaced us—have created more than $300 billion of Emmis people and stations were awarded three Marconi value for themselves. However, changes in technology have Radio Awards. And our television operations are regularly given broadcasters the ability to provide the American public honored by journalism organizations for their news gathering with the most popular TV channels, without the middlemen and community service. In short, we provide our markets and at a more reasonable price. with reliable, high-quality content – content that helps us assemble the audiences our advertisers want to reach. We are developing an innovative model that will leverage that technology to get broadcast companies back into the We then generate revenue by overallocating to sales. We game. I believe it has the potential to revolutionize the give our teams well-developed strategies, clearly defined television industry. I also believe it will add substantial value brands and solid products. We build bigger, better sales to your investment. forces and put a greater emphasis on local dollars than our competitors. We hire aggressive managers, set ambitious We unveiled this concept at the National Association of goals and then watch our people work harder and smarter Broadcasters meeting in April. I am proud to say that 11 than anyone else. other television companies joined us at that meeting to express their support for what we’re calling the Broadcasters’ We also seize the right opportunities and make the most Initiative, and more are signing on each week. Once again, of them. As the cost of buying radio properties has gone Emmis has leveraged innovation to take a leading role in our through the roof, we have been careful about buying. industries. However, when we had a chance to acquire the LBJ stations in Austin, we knew it was the right fit: good stations, a We’ll continue to use innovation to push us forward. tremendous heritage and a great culture, all with an opportu- Meanwhile, we’ll also build and maintain the best teams, pro- nity for growth. And we’ve already built on that group’s track duce the best media content, outhustle and outsell our com- record – since we bought them, we’ve reformatted one sta- petitors, seize the best opportunities and operate this com- tion and quickly sent it to No. 1 in the market, and we’ve pany better than any other. pushed revenues up 9 percent for the entire group. In other words, you can count on Emmis to continue to do Finally, we innovate. Why has Emmis, traditionally a radio what it has always done: Outperform. company, become the company to emulate in TV? Because we approached TV in a way it’s never been approached Thank you for your belief and investment in Emmis. before. Why do we operate leading hip-hop stations in mar- kets across the nation? Because we pioneered the concept. Why have we created a new “Music with Class” format in St. Louis’ Red 104.1? Because we believe we see a new oppor- tunity. We know that successful companies don’t follow the pack. They lead it, and that’s what we’ll always do. The year ahead That last point – innovation – is an important one, especially Jeffrey H. Smulyan for the future of Emmis, because we are planning something chairman & ceo emmis communications | | |\n| | Jeffrey H. Smulyan chairman & ceo emmis communications | |\n| | | |\n", - "page_start": 5, - "page_end": 5, - "source_file": "NASDAQ_EMMS_2004.pdf" + "text": "", + "page_start": 151, + "page_end": 151, + "source_file": "00-80T-80.pdf" }, { - "text": "Transfer Agent Register \nWachovia Bank N.A., Shareholder Services Group, \n1525 West W.T. Harris Blvd., 3c3, Charlotte, North Carolina 28288-1153. \n\nAnnual Meeting \nThe Annual Meeting of shareholders will be held at 10 a.m. Central Time on \nWednesday, June 30, 2004, at Emmis’ Corporate office. \n\nForm 10-K \nA copy of the Annual Report on Form 10-K for the fiscal year ended February 29, \n2004, which was filed with the Securities and Exchange Commission, will be sent \nto shareholders without charge upon written request to Kate Healey, Emmis \nCommunications Corporation, One Emmis Plaza, 40 Monument Circle, Suite 700, \nIndianapolis, Indiana 46204, or ir@emmis.com. \n\nMarket and Dividend Information \nThe Company’s Class A Common Stock is traded in the over-the-counter market \nand is quoted on the National Association of Securities Dealers Automated \nQuotation (NASDAQ) National Market System under the symbol EMMS. \n\nThe following table sets forth the high and low bid prices of the Class A Common \nStock for the periods indicated. No dividends were paid during any such periods. ", - "page_start": 6, - "page_end": 6, - "source_file": "NASDAQ_EMMS_2004.pdf" + "text": "", + "page_start": 151, + "page_end": 151, + "source_file": "00-80T-80.pdf" }, { - "text": "In addition to boosting performance in our divisions, we \nhoned our corporate operations by continuing to build one \nof the most adept and hardest-working corporate groups in \nAmerican media. With this team in place, we’ve brought \nour leverage and cost of capital down to more manageable \nlevels, found ways to combat the continually increasing \ncosts of health insurance and, in a truly top-notch effort, \nsmoothly integrated our new Austin radio properties – in just \nunder a year as a part of Emmis, the Austin properties are \nenjoying significant ratings and revenue increases. **The best year**\nThe bottom line is this: Emmis Communications turned in a \nremarkable performance last year. Again and again, and by a \nnumber of measures, we outperformed our peers, our mar- \nkets and our own solid track record. \n\nAnd we did this in a year that was challenging in just about \nevery way. The economy was unstable, public companies \ncame under continuing scrutiny, indecency issues hounded \nbroadcasters, competition for tight ad dollars increased and \ntechnology continued to reshape the media world. Of course, for you, the real bottom line on our performance is \nits impact on your investment. I’m proud to say that we saw \na 27 percent increase in our share price over the course of \nthe last fiscal year – we ended fiscal ’03 at 19.79, and closed \nthe book on fiscal ’04 at 25.17. ", - "page_start": 4, - "page_end": 4, - "source_file": "NASDAQ_EMMS_2004.pdf" + "text": "", + "page_start": 259, + "page_end": 259, + "source_file": "00-80T-80.pdf" }, { - "text": "**Introduction**\n\nHandoffs, where patient information is exchanged between health professionals during a transfer of \nclinical responsibility, have been identified as a critical source of medical errors.1,2 The Joint \nCommission, the Accreditation Council for Graduate Medical Education, and the Association of \n\nAmerican Medical Colleges have all recommended the development of high-quality and standardized \nhandoff processes to address the substantial patient risk of this ubiquitous event.3,4 Implementing \nhandoff tools has previously demonstrated significant reductions in medical errors.5,6 High-quality \nhandoffs from emergency medicine (EM) to inpatient (IP) services (EM-to-IP) are challenged by \nmedical complexity, diagnostic uncertainty, rapidly evolving care plans, and time constraints.7-10 The \nEM-to-IP handoff structure is not well standardized, frequently communicated verbally, and poorly \n\nadhered to in emergency departments (EDs), including in medical centers with formalized handoff \nsystems.11-14 Prior research has demonstrated that suboptimal EM-to-IP handoff is associated with \nadverse events, EM leaders and front-line clinicians themselves view the EM-to-IP handoff as high \n\nrisk, and an electronic health record (EHR)-based technology is commonly mentioned as the most \ndesired assistive tool in improving ED transitions of care.15-18 Limited work to date has demonstrated \nEM electronic handoff tools as feasible, efficient, and effective.19-21 In April 2023, EM and internal \nmedicine leadership of the study site collaboratively developed and launched a mandatory, ", - "page_start": 2, - "page_end": 2, - "source_file": "pubmed8.pdf" + "text": "", + "page_start": 151, + "page_end": 151, + "source_file": "00-80T-80.pdf" }, { - "text": "Abbreviations: EM, emergency medicine; IP, inpatient. \n\na Automated EM handoff notes are generated from \n\nthe curation of the data through both rule-based and \nlarge language model–summarization approaches. \n\nDecember 3, 2024 4/12 ", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed8.pdf" + "text": "", + "page_start": 151, + "page_end": 151, + "source_file": "00-80T-80.pdf" } ] }, @@ -20961,64 +20961,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 27, + "page_end": 27, + "source_file": "basic-english-language-skills.PDF" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 420, + "page_end": 420, + "source_file": "00-80T-80.pdf" }, { - "text": "quantities as its target: the variational free energy (VFE) in the case of perception and the \nexpected free energy (EFE) in the case of action. The VFE is the free energy associated with \na given sensory observation and is resolved perceptually by updating beliefs about the \nenvironment. The EFE is the free energy that is expected in the future, contingent on a \ngiven policy or course of action. Choosing action policies associated with a low EFE lead \nto reducing uncertainty about the environment, as well as making preferred observations \nmore likely. ", - "page_start": 5, - "page_end": 5, - "source_file": "pubmed7_cc4.pdf" + "text": "", + "page_start": 419, + "page_end": 419, + "source_file": "00-80T-80.pdf" }, { - "text": "**2. Active Inference with POMDPs**\n\nIn this section, we briefly describe the core concepts of AIF and POMDPs. This \nshould familiarise the reader with the vernacular used in the later sections regarding \nthe functionalities of the package. While various extensions, such as structure learning, \nwhich enables an agent to learn the structure or shape of its environment through model \ncomparison [44–47], or hierarchical and temporally deep POMDPs [48,49], are relevant for \nfuture work, describing these in detail is beyond the scope of this foundational paper. \n\nAt the core of AIF lies the minimisation of a variational free energy upper bound on \nsurprise for perception, as well as action. This is motivated by the free energy principle [4–8], \nwhich states that self-organising systems can be described as minimising the variational \nfree energy of their sensory states. The minimisation of free energy generally takes two ", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed7_cc4.pdf" + "text": "", + "page_start": 419, + "page_end": 419, + "source_file": "00-80T-80.pdf" }, { - "text": "by a film of liquid or by a nanoparticle, respectively. Note that the probability densities correspond \n\nto number densities as we use the lattice spacing σ = 1 as our unit of length. \n\nTo develop the DDFT, one must first derive the underlying free energy functional F [ρl, ρn], and \n\nsecondly, devise dynamical equations for both density fields that account for the conserved and the \n\nnon-conserved aspects of their dynamics, i.e., transport and phase change processes, respectively. \n\nFor a system governed by the hamiltonian (3), we may construct a mean-field (Bragg-Williams) \n\napproximation for the free energy of the system [78, 84] which contains an entropic contribution \n\nand contributions from the interactions between the different species (nanoparticles and liquid). \n\nThe free energy is a semi-grand free energy, since the liquid is treated grand canonically (it is \n\ncoupled to a reservoir with chemical potential µ), whereas the nanoparticles are treated in the ", - "page_start": 14, - "page_end": 14, - "source_file": "1001.2669.pdf" + "text": "", + "page_start": 419, + "page_end": 419, + "source_file": "00-80T-80.pdf" }, { - "text": "which depends only on the free-energy density f (0) \nand \nv \nRDF g(0) of the reference fluid, with β = (kBT )− \n1 and \nρi the concentration of species i. The Gibbs-Bogoliubov \ninequality [15] ensures that the right-hand side of Eq. (1) \nis actually a strict upper bound. Once a reference system \nhas been chosen, the expression on the right-hand side of \nEq. (1) must be minimized with respect to the parameters \ndefining the reference. This procedure yields the best \nfirst-order approximation to the free energy of the system \nunder consideration. \n\nFor a system of charged particles in solution, the nat- \nural reference is the PM, defined in terms of the charge \nand diameter (σi) of each species. In this case, the per- \nturbing potentials are just the short-range effective po- \ntentials computed above (∆Vij = V SR \nij ). We use the \nMSA [3] solution to the PM, since it provides analyti- \ncal expressions for both the free energy and the RDF. \nThe perturbation term is evaluated using an exponential \napproximation to the RDF obtained within the MSA, \ng(r) = exp [gMSA(r) − 1], which removes any unphysical \nnegative regions and improves the comparison with HNC \ncalculations. ", - "page_start": 2, - "page_end": 2, - "source_file": "1001.2648.pdf" + "text": "", + "page_start": 259, + "page_end": 259, + "source_file": "00-80T-80.pdf" }, { - "text": "**Conflicts of Interest:**The authors declare no conflicts of interest. The funders had no role in the design \nof this study; in the collection, analyses or interpretation of data; in the writing of this manuscript; or \nin the decision to publish the results. \n\n**Abbreviations**\n\nThe following abbreviations are used in this manuscript: \n\nAIF \nFEP \nVFE \nEFE \nMCMC Markov Chain Monte Carlo \nPOMDP \n\nActive inference \nFree energy principle \nVariational free energy \nExpected free energy \n\nPartially Observed Markov Decision Process ", - "page_start": 30, - "page_end": 30, - "source_file": "pubmed7_cc4.pdf" + "text": "", + "page_start": 259, + "page_end": 259, + "source_file": "00-80T-80.pdf" }, { - "text": "The maximum level flight speed for the air- \nplane will be obtained when the power :or \nthrust required equals the maximum power or \nthrust available from the powerplant. The \nminimum level flight airspeed is not usually \ndefined by thrust or power requirement since \nconditions of, stall or stability and control \nproblems generally predominate. \n\nCLIMB PERFOLWANCE \n\nthe airplane gains \nflight, \npotential energy by virtue of elevation. This \nincrease in potential energy during a climb is \nprovided by one, or a combination, of two \nmeans: (1) expenditure of propulsive energy \nabove that required to maintain level flight or \n(2) expenditure of airplane kinetic energy, i.e., \nloss of velocity by a zoom. Zooming for alti- \ntude is a transient process of trading kinetic \nenergy for potential energy and is of considera- \nfor airplane configurations \nble \nwhich can operate at very high levels of kinetic \nenergy. However, the major portions of climb \nperformance for most airplanes is a near steady \nprocess in which additional propulsive energy \nis converted into potential energy. The funda- \nmental parts of airplane climb performance in- \nvolve a flight condition where the airplane is \nin equilibrium but not at constant altitude. \n\nDuring climbing ", - "page_start": 168, - "page_end": 168, + "text": "", + "page_start": 419, + "page_end": 419, "source_file": "00-80T-80.pdf" }, { - "text": "2.3. Action in Active Inference \n\nAs with perception, action in AIF is guided by the minimisation of free energy. How- \never, instead of VFE being minimised directly, it is the free energy that is expected to occur \ndepending on the actions taken by the agent—the expected free energy or EFE—that is \nminimised. As stated below, choosing actions that minimise the EFE leads to a natural \nbalance between exploration and exploitation, ensuring preferences are realised and am- \nbiguity about the environment is minimised. In AIF, policies*π*are sequences of actions \nu. The policy length (also called the planning horizon or temporal depth) is the length of \nthe policies being considered. The total number of policies therefore depends on the policy \nlength and the number of different actions that can be made at each time step. An EFE is \nassigned to each policy*π*(denoted as G*π*), where policies associated with a lower EFE are \nthen more likely to be chosen. \n\nOne can rewrite the EFE in different ways to highlight different consequences of \noptimising it. Below, we show the two most crucial ways to rewrite it, taken from [1,33]. \nWe denote the states and observations that are expected future outcomes of actions with \n(~). Additionally, we introduce a preference prior**C**that encodes the agent’s preferences: ", - "page_start": 10, - "page_end": 10, - "source_file": "pubmed7_cc4.pdf" + "text": "", + "page_start": 419, + "page_end": 419, + "source_file": "00-80T-80.pdf" }, { - "text": "3 ENVIRONMENTAL AND FINANCIAL COST \nStrubell et al. recently benchmarked model training and develop- \nment costs in terms of dollars and estimated 𝐶𝑂2 emissions [129]. \nWhile the average human is responsible for an estimated 5t 𝐶𝑂2𝑒 \nper year,2 the authors trained a Transformer (big) model [136] with \nneural architecture search and estimated that the training procedure \nemitted 284t of 𝐶𝑂2. Training a single BERT base model (without \nhyperparameter tuning) on GPUs was estimated to require as much \nenergy as a trans-American flight. \n\nWhile some of this energy comes from renewable sources, or \ncloud compute companies’ use of carbon credit-offset sources, the \nauthors note that the majority of cloud compute providers’ energy is \nnot sourced from renewable sources and many energy sources in the \nworld are not carbon neutral. In addition, renewable energy sources \nare still costly to the environment,3 and data centers with increasing \ncomputation requirements take away from other potential uses of ", - "page_start": 3, - "page_end": 3, - "source_file": "arxiv5_ccby4license.pdf" + "text": "", + "page_start": 419, + "page_end": 419, + "source_file": "00-80T-80.pdf" } ] }, @@ -21035,64 +21035,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 303, + "page_end": 303, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, + "text": "", + "page_start": 16, + "page_end": 16, "source_file": "Excel Training Manual 1.pdf" }, { - "text": "inference that tracks the noise rather than the correct state of \nthe estimated variable system (i.e. overfitting), whereas assigning \nexcessively low weight to sensations (or excessively high weight to \nprior knowledge) makes the system poorly responsive to incom- \ning observations that might signal a change in the state of the \nsystem—and both are examples of aberrant inference (Friston \net al. 2014). \n\nFigure 2 provides a formal illustration of the above by plot- \nting some examples of Bayesian inference using generative models \nunder various levels of precision of the model components. For \nsimplicity, we focus on a simplified example of inference of an \ninteroceptive variable: one’s heart rate. Heart rate is a “hidden \nvariable” in Bayesian parlance since it is not directly observable \nbut needs to be inferred through two sources of information: \nprior knowledge about the most likely heart rate and sensory \n(heartbeat) observations. The top panel of Fig. 2 shows a series \nof (noisy) heartbeat observations. In the beginning, they are \nin the normal range for an adult (time steps 1–10), then they \nincrease significantly, simulating tachycardia (time steps 11–20), \nthen they go back to the normal range (time steps 21–30), then \nthey decrease significantly, simulating bradycardia (time steps \n31–40), and finally, they go back to the normal range (time steps \n41–50). ", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed1.pdf" + "text": "", + "page_start": 109, + "page_end": 109, + "source_file": "00-80T-80.pdf" }, { - "text": "Active inference, interoceptive processing, \nand uncertainty reduction \n\nActive inference is based on the idea that in order to engage in \nadaptive allostatic regulation and goal-directed behavior, living \norganisms continuously strive to minimize the surprise of their \nsensations or, more formally, an upper bound to surprise: varia- \ntional free energy (Parr et al. 2022). Notably, the (expected) free \nenergy minimization processes that drive active inference jointly \nconsider two complementary objectives. The former (utilitarian) \nobjective is to realize one’s preferences, such as being satiated \nor safe, by minimizing the discrepancy between preferred sensa- \ntions (encoded as “priors over observations” in active inference) \nand current sensations in different modalities (e.g. interoceptive \nor exteroceptive). The latter (epistemic) objective is to reduce ", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed1.pdf" + "text": "", + "page_start": 109, + "page_end": 109, + "source_file": "00-80T-80.pdf" }, { - "text": "Figure 2. A simplified example of (Bayesian) inference of one’s heart rate. First panel: simulated time series of heartbeat observations. Second panel: \nShannon surprise of a generative model composed of a fixed prior about heart rate (a Gaussian with a mean of 67 and a precision of 0.11) and a \nlikelihood (a Gaussian centered on the current heart rate with an additional bias of 15 pulses, with various precisions that vary between 0.47 and 10, \nsee the legend). Third panel: Bayesian surprise, which measures the discrepancy between posterior and prior probabilities over time. Bottom panels: \nthe two series of panels are organized in two (left and right) columns, which show the first five time steps of inference for the two cases with high \nprecision (of 10) and low precision (of 0.1) of the likelihood, respectively. See the main text for an explanation and online article for colored version of \nthis figure. ", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed1.pdf" + "text": "", + "page_start": 16, + "page_end": 16, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "The second panel of Fig. 2 shows the Shannon surprise of \nan inference model that estimates the current heart rate using \nthe two standard components of a generative model. The for- \nmer component is the prior, which encodes the person’s a priori \nprobabilistic belief (i.e. probability distribution) about her “nor- \nmal” heart rate range; here, the prior is a Gaussian centered on \n67 and has a precision of 0.11. The latter component is the likeli- \nhood, which encodes the probabilistic mapping between sensory \n(heartbeat) observations and the hidden state (heart rate); here, \nthe likelihood is a Gaussian centered on the current heart rate \nwith an additional bias of 15 pulses, and the panel shows the \nresults for 10 values for precision obtained by subdividing the \nrange [0.1,10] into equal intervals. The results shown in the second \npanel of Fig. 2 show that Shannon surprise increases dramatically \nduring episodes of tachycardia and bradycardia, which are far \nfrom the normal range. The pattern of results is the same across \nall levels of likelihood precision. However, the inference with a \nvery high precision (a precision of 10) tracks more closely the noise \nsensory signals and can therefore lead to more extreme results. ", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed1.pdf" + "text": "", + "page_start": 16, + "page_end": 16, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "2.2. Perception in Active Inference \n\nIn AIF, perception is conceptualised as the result of variational (i.e., approximate) \nBayesian inference, performed by minimising the VFE to optimise parameters of poste- \nrior beliefs about the environment. In exact Bayesian inference, we use a parametrised \ngenerative model m to make an optimal inference about state s of the environment based \non observation o. This is performed by combining a prior belief over states p(s|m); a like- \nlihood model p(o|s, m); and the model evidence p(o|m), a normalisation term encoding \nthe likelihood of receiving the given observations across all possible environmental states, \nas follows [1]: \n\np(o|s, m)p(s|m) \np(o|m) \np(s|o, m) = (1) \n\nThe posterior distribution over states given observations p(s|o, m) here represent the agent’s \nbeliefs about the environment. Forming beliefs in this way is thought to be the process that \nenables conscious, as well as unconscious, perception. The product of the likelihood model \nand prior is also called the joint likelihood p(o, s|m), which fully defines the generative \nmodel, and which we use henceforth. In the following, for notational simplicity, we also \nomit denoting the dependency on the generative model m. ", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed7_cc4.pdf" + "text": "", + "page_start": 179, + "page_end": 179, + "source_file": "sg246915.pdf" }, { - "text": "The third panel shows the Bayesian surprise (or the Kullback- \nLeibler divergence between posterior and prior probability distri- \nbutions) over time. This is a measure of how much dissimilar the \nposterior and the prior are, and it always decreases as a result of \ninference, but note that it decreases much more rapidly when the \nprecision of the likelihood is 10, which is another indication that \nthe posterior is “overfitting,” meaning that the inference result is \nexcessively biased by the likelihood distribution. \n\nFinally, the two bottom series of panels are organized in two \n(left and right) columns, which show the first five time steps of \ninference for the two cases with high precision (of 10) and low pre- \ncision (of 0.1) of the likelihood, respectively. In these plots, the prior \ndistributions are in blue, the posterior distributions are in green, \nand the likelihoods are in red. It is possible to note that in the left \n(high precision) panels, the posterior inference closely follows the \nlikelihood (it “overfits”) after five time steps and the inferred heart \nrate is slightly biased (i.e. it is 79). Differently, in the right (low \nprecision) panels, the inference converges much slower to a high \nprecision posterior, but without overfitting. ", - "page_start": 6, - "page_end": 6, - "source_file": "pubmed1.pdf" + "text": "", + "page_start": 16, + "page_end": 16, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "**Citation:**Nehrer, S.W.; Ehrenreich \nLaursen, J.; Heins, C.; Friston, K.; \n\nMathys, C.; Thestrup Waade, P. \nIntroducing ActiveInference.jl: A \nJulia Library for Simulation and \n**1. Introduction**\nParameter Estimation with Active \n\nWe introduce a novel software library for Julia, ActiveInference, which lets users \nproduce the simulated behaviour of agents and their internal belief states with active \ninference (AIF) models, as well as fit such models to empirically observed behaviour. \nAIF [1–3] is a generally applicable formal framework for understanding and simulating \nintelligent behaviour that is based in neurobiology and first principles from statistical \nphysics [4–8]. AIF treats action and perception as unified under a joint imperative: to \nminimise the variational free energy (VFE), which quantifies how well the agent’s internal \ngenerative model explains incoming sensory observations. It is an upper bound on the \nthe surprise from sensory observations, making AIF formally related to prediction error \n\nInference Models. Entropy**2025**, 27, 62. \nhttps://doi.org/10.3390/e27010062 ", - "page_start": 1, - "page_end": 1, - "source_file": "pubmed7_cc4.pdf" + "text": "", + "page_start": 230, + "page_end": 230, + "source_file": "00-80T-80.pdf" }, { - "text": "Calculating the model evidence p(o) is often intractable, making exact Bayesian infer- \nence unfeasible. The way to circumvent this in AIF is to use a variational approximation \nto Bayesian inference [23,33,50,51]. This works by transforming the inference into an opti- \nmisation problem, specifically the minimisation of the VFE. First, an arbitrary probability \ndistribution over environmental states q(s), an approximate posterior that is used to ap- \nproximate the exact posterior, is introduced. We then introduce the Kullback–Leibler (KL) ", - "page_start": 7, - "page_end": 7, - "source_file": "pubmed7_cc4.pdf" + "text": "", + "page_start": 16, + "page_end": 16, + "source_file": "Excel Training Manual 1.pdf" } ] }, @@ -21103,70 +21103,70 @@ "target_page": 3, "target_passage": "Among the challenges that adolescents have to face are the structuring of a “narrative identity” or self-story, featuring the development of a sense of personal identity that integrates past experiences with current, and future goals and meanings in a coherent whole over time ", "chunk_present": { - "presence": true, - "index": 5 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 21, + "page_end": 21, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "reciprocity with caregivers and peers. Thus, in parallel to the \nnegotiation of identity with caregivers (through a relative detach- \nment from them, a renegotiation of intimacy, and the questioning \nof their confirmatory authority), the modifications of friendship \nstructures—from childhood to adolescence—lay the ground for \nthe progressive recognition of social contexts and peer relation- \nships as the elite territories for the modulation and exploration \nof personal identity. The redefinition that the adolescent has to \nface in these territories of exploration (of the self as an individ- \nual separated from the other and of the self with the other) might \npass through a phase of reduced coherence in the narration of \nthe self and hence an increased level of uncertainty. Coherence \nin the self’s narrative is considered a measure of well-being and \nhas been associated with psychopathology in adulthood (Klim- \nstra and Denissen 2017) and adolescence (Lind et al. 2020, Shiner \net al. 2021). For example, narrative incoherence has been found \nto be associated with personality disorders in adolescents (Lind \net al. 2019), where “identity diffusion” (e.g. feelings of emptiness \nand being fragmented and lack of a sense of continuity over time) \nmight be considered an expression of high levels of uncertainty of \nthe self. ", - "page_start": 4, - "page_end": 4, - "source_file": "pubmed1.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Thus at each step, from initial participation in Internet fora, to \ncontinued presence there, to the collection and finally the filtering \nof training data, current practice privileges the hegemonic view- \npoint. In accepting large amounts of web text as ‘representative’ \nof ‘all’ of humanity we risk perpetuating dominant viewpoints, \nincreasing power imbalances, and further reifying inequality. We \ninstead propose practices that actively seek to include communities \nunderrepresented on the Internet. For instance, one can take inspi- \nration from movements to decolonize education by moving towards \noral histories due to the overrepresentation of colonial views in \ntext [35, 76, 127], and curate training datasets through a thoughtful \nprocess of deciding what to put in, rather than aiming solely for \nscale and trying haphazardly to weed out, post-hoc, flotsam deemed \n‘dangerous’, ‘unintelligible’, or ‘otherwise bad’. \n\n4.2 Static Data/Changing Social Views \nA central aspect of social movement formation involves using lan- \nguage strategically to destabilize dominant narratives and call at- \ntention to underrepresented social perspectives. Social movements \nproduce new norms, language, and ways of communicating. This \nadds challenges to the deployment of LMs, as methodologies re- \nliant on LMs run the risk of ‘value-lock’, where the LM-reliant \ntechnology reifies older, less-inclusive understandings. \n\nFor instance, the Black Lives Matter movement (BLM) influenced \nWikipedia article generation and editing such that, as the BLM \nmovement grew, articles covering shootings of Black people in- \ncreased in coverage and were generated with reduced latency [135]. \nImportantly, articles describing past shootings and incidents of po- \nlice brutality were created and updated as articles for new events \nwere created, reflecting how social movements make connections \nbetween events in time to form cohesive narratives [102]. More \ngenerally, Twyman et al. [135] highlight how social movements \nactively influence framings and reframings of minority narratives ", - "page_start": 5, - "page_end": 5, - "source_file": "arxiv5_ccby4license.pdf" + "text": "", + "page_start": 189, + "page_end": 189, + "source_file": "00-80T-80.pdf" }, { - "text": "development program to a maximum of 5% of our balance sheet per year. We \nhave three other developments projects in various planning stages, but don’t \nexpect to begin construction on any additional new projects until late 2014 or \ninto 2015. ", - "page_start": 11, - "page_end": 11, - "source_file": "TSX_KMP_2013.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Paradoxical behaviors: the case of NSSI \n\n“Self-injury behaviors” is an umbrella term that includes a wide \nrange of behaviors (and intentions), including suicide attempts, \nsuperficial cuts, and medication withdrawals (Skegg 2005, Nock \n2010). We focus on NSSI behaviors as the direct, deliberate \ndestruction of body tissue without lethal intent (e.g. cutting one- \nself). A distinction is also made between NSSI performed stereo- \ntypically in the context of developmental disabilities (e.g. head \nbanging) and major injuries often observed in psychotic disorders. \nThe most frequent examples of NSSI include cutting the skin with \na sharp object (e.g. a knife, razor blade, or needle) and skin burn, \nusually with a cigarette (Khanipour et al. 2016). Patients often \ninjure themselves, in a single act, by inflicting multiple injuries \nat the same body site, usually in areas that are easily hidden \nbut accessible (e.g. forearms and anterior thighs). The behavior \nis often repeated, resulting in extensive scarring patterns. The age \n\nNSSI in adolescence \n\nAdolescence is the period of developmental transition from child- \nhood to adulthood, which might be stretched up to the early \n20s due to current sociocultural changes (e.g. delays in complet- \ning education, occupational attainment, and parenthood) (Patton \net al. 2018). Among the challenges that adolescents have to face \nare the structuring of a “narrative identity” or self-story, featuring \nthe development of a sense of personal identity that integrates \npast experiences with current, and future goals and meanings in \na coherent whole over time (McAdams and McLean 2013, McLean \nand Lilgendahl 2019). The definition of the new boundaries of \nadolescents’ personal identity involves significant changes in the ", - "page_start": 3, - "page_end": 3, - "source_file": "pubmed1.pdf" + "text": "", + "page_start": 42, + "page_end": 42, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "\ntakes place in which ", - "page_start": 70, - "page_end": 70, - "source_file": "00-80T-80.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\nhasChild ", - "page_start": 9, - "page_end": 9, - "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": " , ", - "page_start": 41, - "page_end": 41, - "source_file": "00-80T-80.pdf" + "text": "", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "Second Paragraph \nMention your qualifications, skills and experience, and relate them to the \nneeds of the company. Give relevant examples of how you have used \nyour skills in the past to perform similar tasks and responsibilities to \nthose set out in the job description. ", - "page_start": 47, - "page_end": 47, - "source_file": "basic-english-language-skills.PDF" + "text": "", + "page_start": 189, + "page_end": 189, + "source_file": "00-80T-80.pdf" } ] }, @@ -21183,64 +21183,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 23, + "page_end": 23, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 25, + "page_end": 25, + "source_file": "NYSE_HNI_2003.pdf" }, { - "text": "Intellectual Property Rights \nNissan owns a wide variety of proprietary technologies and has the \nexpertise to differentiate Nissan’s products making them unique from \nthose of its competitors. These assets have proven their value in the \ngrowth of Nissan’s business and will, no doubt, continue to be of value in \nthe future. Nissan strives to protect its intellectual property assets; \nhowever, in certain markets, Nissan may encounter difficulty in fully \nprotecting the proprietary rights to its own technologies. Cases may arise \nwhere Nissan finds itself unable to prohibit others from infringing on its \nintellectual property rights. \n\n• Unfavorable political or economic factors \n• Legal or regulatory changes \n• Potentially adverse tax consequences \n• Labor disputes including strikes \n• Difficulties in recruiting and retaining personnel \n• Social, political or economic turmoil due to terrorism, war, or other \nThe Company has established Intellectual Property Rights Management \nDepartment for the purpose of protecting intellectual property rights in \nspecific areas, strengthening activities to protect Nissan’s intellectual \nproperty rights, and abstracting new intellectual property rights. And the \ndepartment has been performing various activities to protect and create \nNissan Brand. \ndestabilizing factors. \n\nResearch and Development \nNissan’s technology must be “real world”—useful, pragmatic and easy to \nuse. Nissan anticipates the nature and scope of the market demand, and \nthen prioritizes and invests in new technologies. Nonetheless, any sudden \nand greater-than-anticipated changes in its business environment or in \ncustomer preferences may impact negatively on customer satisfaction with \nthese new technologies. ", - "page_start": 73, - "page_end": 73, - "source_file": "OTC_NSANY_2004.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "NYSE_HNI_2003.pdf" }, { - "text": "Europe \n\nNissan Europe S.A.S. \n\nNissan International Finance \n(Netherlands) B.V. \n\nNissan France S.A. \n\nNissan Motor (GB) Ltd. \n\nNissan Holding (UK) Ltd. \n\nNissan Italia S.p.A. \n\nNissan Motor Manufacturing \n(UK) Ltd. \n\nNissan Technical Center \nEurope Ltd. \n\nNissan Forklift Europe B.V. \n\nNissan Motor Iberica, S.A. \n\nNissan Motor Espana, S.A. \n\nNissan Forklift Espana, S.A. \n\nAustralia \n\nNissan Motor Co. (Australia) Pty. Ltd. Dandenong, Victoria \n\nNew Zealand \n\nNissan New Zealand Ltd. Auckland ", - "page_start": 109, - "page_end": 109, - "source_file": "OTC_NSANY_2004.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "NYSE_HNI_2003.pdf" }, { - "text": "**IR Activities**\n\nUnder NISSAN Value-Up, the IR team’s performance will \n\nbe evaluated based on the price-earnings ratio (PER) and \n\nvolatility relative to our major competitors. PER is used to \n\nmeasure how successfully the IR team manages market \n\nexpectations about Nissan in order to maintain the Nissan \n\nshare price close to an intrinsic value. The other measure, \n\nvolatility, is used to measure the risk investors perceive \n\nwhen considering Nissan stock. If Nissan can successfully \n\nreduce volatility, the minimum return required by investors \n\nshould decline. The IR team believes that a strengthening \n\nof disclosure activities is required to improve both \n\nmeasures. The team plans to disclose not only financial \n\nresults but also more forward-looking information about \n\nNissan fundamentals such as technology and product. \n\nSuch forward-looking information helps investors to \n\nforecast future performance more precisely and reduces \n\nuncertainty about the future. As a consequence, Nissan will \n\nincrease the number of investor conferences, events, and \n\nteleconferences during fiscal 2005. ", - "page_start": 17, - "page_end": 17, - "source_file": "OTC_NSANY_2004.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "NYSE_HNI_2003.pdf" }, { - "text": "“The evolution that took place in Nissan’s purchasing \n\nactivities during the Nissan Revival Plan, or NRP, and \n\ncontinued through NISSAN 180, will stretch even further \n\nduring NISSAN Value-Up. Why evolution and not \n\nrevolution? Because the shift in purchasing that started \n\nsix years ago was not a single action, it was a mindset \n\nchange that continues to drive all our activities. \n\nPurchasing represents the single largest area of \n\ncost for Nissan. Through the NISSAN Value-Up \n\nbusiness plan, we are determined to drive greater \n\nvalue from our purchasing activities and maintain the \n\nmomentum built over the last six years. \n\nDuring the Nissan Revival Plan years, our focus \n\nwas on catching up with the rest of the industry. \n\nNISSAN 180 was focused on reaching the \n\nbenchmarks set during NRP and now as we enter the \n\nNISSAN Value-Up period, that focus evolves towards \n\nbeing the global cost leader. \n\nOne of the key breakthrough strategies of \n\nNISSAN Value-Up is the focus on new and emerging \n\nmarkets. On the sales side, markets like China, India, \n\nRussia and ASEAN represent significant opportunities \n\nfor Nissan. On the purchasing side, we look at the ", - "page_start": 50, - "page_end": 50, - "source_file": "OTC_NSANY_2004.pdf" + "text": "", + "page_start": 192, + "page_end": 192, + "source_file": "00-80T-80.pdf" }, { - "text": "Due to changes in government regulations, information on risks \ninvolved in business operations has been disclosed in the \nYukashoken-Houkokusho for the year ended March 31,2005 \nas follows: \nand that the outcome may be significantly different from that anticipated. \nAs a result, any such verdict or settlement could adversely affect Nissan’s \nfinancial position and operating results. \n\nGovernment Regulations \nThe automobile industry worldwide is influenced by a broad spectrum of \nregulations governing the emission levels of exhaust fumes, fuel economy \nguidelines, noise level limitations and safety standards, and Nissan expects \nthese regulations to become increasingly stringent. In order to ensure \ncompliance, it may be necessary for Nissan to make significant ongoing \ninvestments in these areas which would have an impact on its financial \nposition and results of operations. \n\nEconomic Factors \nThe demand for products manufactured by Nissan is affected by the \neconomic conditions in each country or market in which they are offered \nfor sale. Nissan conducts its operations all over the world and, in particular, \nin the major markets of North America, Europe, and Asia, to say nothing of \nJapan. While Nissan strives to develop a comprehensive and integrated \nprojection of the global economic outlook, any greater-than-anticipated \ndownturn in one of these markets may have a significant effect on Nissan \nfinancial position and results of operations. \n\nInternational Activities and Overseas Expansion \nNissan’s manufacturing and marketing activities outside Japan are \nconducted in the United States, in Europe, and in the developing and \nemerging markets of Asia. Nissan forecasts and evaluates a wide variety of \nrisks inherent in doing business in such overseas markets including the \nfollowing factors, each of which entails a greater-than-anticipated level of \nrisk: ", - "page_start": 73, - "page_end": 73, - "source_file": "OTC_NSANY_2004.pdf" + "text": "", + "page_start": 192, + "page_end": 192, + "source_file": "00-80T-80.pdf" }, { - "text": "NNoorrtthh AAmmeerriiccaa \n\nN O R T H A M E R I C A \n\n“At Nissan Motor Acceptance Corporation, our \nmission is to maximize the value of Nissan by \nproviding competitive financial products and \nexceptional customer service. We are continually \nstriving to support our customers by being an \nintegral component of the Nissan North America \nsales and marketing plan, being the first choice \nof dealership financing, and by being the \npreferred lender to Nissan and Infiniti retail and \nlease customers. Since we mainly contribute to \nthe Nissan global profit objective when a car is \nsold, we work closely with Nissan North America \nto support this sales process. Our overall market \npenetration—one of our key performance \nindicators, or KPI—was strong in fiscal 2004 at \n49.7 percent for retail and lease combined. That \nmeans nearly half of all retail Nissan and Infiniti \nvehicles sold in the U.S. are financed through \nInfiniti Financial Services or NMAC. \n\nSTEVEN R. LAMBERT \nPresident and CEO \nNissan Motor \nAcceptance Corporation \n\napproximately fifty percent of funding comes \nfrom asset-backed securitization, making that \nour largest funding source. However, that \nproportion has been declining because we \nbegan using a variety of other funding sources, \nincluding commercial paper and bonds, after \nour ratings improvement. As a result, our \ndependence on Nissan North America for \nfunding via inter-company loans will be reduced \nin the future. ", - "page_start": 31, - "page_end": 31, - "source_file": "OTC_NSANY_2004.pdf" + "text": "", + "page_start": 192, + "page_end": 192, + "source_file": "00-80T-80.pdf" }, { - "text": "information, both good and bad, so the level and rate of \n\ninformation from dealers and consumers have gone up \n\naccordingly. Meanwhile, even prices for used Nissan \n\nvehicles are improving steadily, a major indication that the \n\nNissan brand is recognized and valued. \n\nOur home market is of prime importance to Nissan. \n\nJapan is a major contributor to our total profit, and we will \n\ncontinue to make the upgrades in quality, products and \n\nservice needed to drive sales and profit higher.” ", - "page_start": 62, - "page_end": 62, - "source_file": "OTC_NSANY_2004.pdf" + "text": "", + "page_start": 26, + "page_end": 26, + "source_file": "NYSE_HNI_2003.pdf" }, { - "text": "Derivatives \nNissan utilizes derivatives transactions for the purpose of hedging its \nexposure to fluctuation in foreign exchange rates, interest rates and \ncommodity prices. While Nissan can hedge against these risks by using \nderivatives transactions, Nissan, by so doing, may miss the potential gains \nwhich could result from seizing the market opportunities to profit from such \nfluctuation in exchange rates and interest rates. \nIn addition, Nissan manages its exposure to credit risk by limiting its \ncounterparties to financial institutions with high credit ratings. However, a \ndefault by any one of these counterparties could have an adverse effect on \nNissan’s financial position and operating results. \n\nPurchase of raw materials and parts \nNissan purchases raw materials and parts from many suppliers. Market \nconditions that Nissan can’t control and whether or not the suppliers can \nprocure raw materials and parts continuously may adversely affect Nissan’s \nfinancial position and results of operations. \n\nLawsuits and Claims \nWith respect to various lawsuits and claims which Nissan encounters, the \npossibility exists that the position defended by Nissan will not be accepted \n\nNissan Annual Report 2004**71**", - "page_start": 73, - "page_end": 73, - "source_file": "OTC_NSANY_2004.pdf" + "text": "", + "page_start": 26, + "page_end": 26, + "source_file": "NYSE_HNI_2003.pdf" } ] }, @@ -21257,64 +21257,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 24, + "page_end": 24, + "source_file": "NYSE_RCI_2013.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "Europe \n\nNissan Europe S.A.S. \n\nNissan International Finance \n(Netherlands) B.V. \n\nNissan France S.A. \n\nNissan Motor (GB) Ltd. \n\nNissan Holding (UK) Ltd. \n\nNissan Italia S.p.A. \n\nNissan Motor Manufacturing \n(UK) Ltd. \n\nNissan Technical Center \nEurope Ltd. \n\nNissan Forklift Europe B.V. \n\nNissan Motor Iberica, S.A. \n\nNissan Motor Espana, S.A. \n\nNissan Forklift Espana, S.A. \n\nAustralia \n\nNissan Motor Co. (Australia) Pty. Ltd. Dandenong, Victoria \n\nNew Zealand \n\nNissan New Zealand Ltd. Auckland ", - "page_start": 109, - "page_end": 109, - "source_file": "OTC_NSANY_2004.pdf" + "text": "", + "page_start": 206, + "page_end": 206, + "source_file": "00-80T-80.pdf" }, { - "text": "Nissan Real Estate Development \nCorporation \n\nNissan Finance Co., Ltd. Tokyo \n\nAichi Nissan Motor Co., Ltd. Nagoya, Aichi \n\nTokyo Nissan Motor Sales Co., Ltd. Tokyo \n\nNissan Prince Tokyo Motor Sales \nCo., Ltd. \nTokyo \n\nNissan Chuo Parts Sales Co., Ltd. Yokohama, Kanagawa \n\nUS \n\nNissan North America, Inc. \n\nNissan Motor Acceptance Corporation Torrance California \n\nNissan Motor Corporation \nin Hawaii, Ltd. \nHonolulu, Hawaii \n\nNissan Capital of America, Inc. Torrance, California \n\nNissan Technical Center \nNorth America, Inc. Farmington Hills \nMichigan \n\nNissan Motor Insurance Corporation Honolulu, Hawaii \n\nNissan Forklift Co., North America Marengo, Illinois \n\nCanada \n\nNissan Canada, Inc. Mississauga, Ontario \n\nMexico \n\nNissan Mexicana, S.A. de C.V. Mexico D.F. ", - "page_start": 108, - "page_end": 108, - "source_file": "OTC_NSANY_2004.pdf" + "text": "", + "page_start": 207, + "page_end": 207, + "source_file": "00-80T-80.pdf" }, { - "text": "NISSAN HAS A GLOBAL PRESENCE. BORN IN JAPAN, WE ARE PERFECTLY \n\nAT HOME IN THE U.S., THE UK, SPAIN, THAILAND, CHINA, EGYPT, BRAZIL \n\nAND WELL OVER 150 OTHER NATIONS WHERE NISSAN CARS AND \n\nTHEIR COMPONENT PARTS ARE PRODUCED, SOLD AND DRIVEN. \n\nWITH NISSAN, DRIVING PLEASURE IS A SENSATION THAT KNOWS NO BORDERS. \n\nTHIS IS THE NISSAN SHIFT_", - "page_start": 60, - "page_end": 60, - "source_file": "OTC_NSANY_2004.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "NISSAN IS ABOUT MEETING UNMET NEEDS, CRAFTING SINGULAR PRODUCTS \n\nAND TRANSFORMING BRAND STRENGTH AND INNOVATION INTO NEW BUSINESS \n\nOPPORTUNITIES. WE ARE NISSAN. WE ARE INFINITI. WE ARE NISSAN LIGHT \n\nCOMMERCIAL VEHICLES, EXPANDING OUR RANGE. WE ARE NISSAN INDUSTRIAL \n\nMACHINERY, LEVERAGING OUR EXPERTISE TO BUILD FORKLIFTS AND MARINE \n\nPRODUCTS. AND WE ARE NISSAN FINANCIAL SERVICES, PROVIDING OUR \n\nCUSTOMERS WITH A COMPREHENSIVE LINEUP OF OFFERINGS. \n\nTHIS IS THE NISSAN SHIFT_", - "page_start": 18, - "page_end": 18, - "source_file": "OTC_NSANY_2004.pdf" + "text": "", + "page_start": 207, + "page_end": 207, + "source_file": "00-80T-80.pdf" }, { - "text": "“Europe is one of the most \n\nfragmented automotive \n\nmarket in the world and \n\na highly competitive one \n\nbesides. Despite our \n\nrelatively small size, \n\nhowever, we have begun to \n\ndemonstrate that it is \n\npossible to make money in \n\nEurope. In fact, although \n\nDOMINIQUE THORMANN \nSenior Vice President \nNissan Europe \nNissan does not yet deliver \n\nthe levels of profitability here \n\nthat the U.S. or other markets generate, we surpassed \n\nour NISSAN 180 business targets in fiscal 2004. Our \n\nprofitability is now on par with the best European \n\nmanufacturers. Nissan has a foundation for increasing \n\nprofitability further in the coming years in Europe. \n\nNissan is already an established name around the \n\nregion, and the brand is strongly associated with 4x4 \n\ntechnology, off-road vehicles and pickup trucks. \n\nHowever, there is also a solid heritage built around \n\nthe Micra, a model designed for urban driving. Both \n\nthe first and second generations of this car were very \n\nsuccessful, and the third generation is performing \n\nwell. To leverage our 4x4 heritage and SUV strength \n\ninto the passenger car segment, Nissan is developing \n\na series of crossover vehicles that blend car-like ", - "page_start": 63, - "page_end": 63, - "source_file": "OTC_NSANY_2004.pdf" + "text": "", + "page_start": 207, + "page_end": 207, + "source_file": "00-80T-80.pdf" }, { - "text": "“The evolution that took place in Nissan’s purchasing \n\nactivities during the Nissan Revival Plan, or NRP, and \n\ncontinued through NISSAN 180, will stretch even further \n\nduring NISSAN Value-Up. Why evolution and not \n\nrevolution? Because the shift in purchasing that started \n\nsix years ago was not a single action, it was a mindset \n\nchange that continues to drive all our activities. \n\nPurchasing represents the single largest area of \n\ncost for Nissan. Through the NISSAN Value-Up \n\nbusiness plan, we are determined to drive greater \n\nvalue from our purchasing activities and maintain the \n\nmomentum built over the last six years. \n\nDuring the Nissan Revival Plan years, our focus \n\nwas on catching up with the rest of the industry. \n\nNISSAN 180 was focused on reaching the \n\nbenchmarks set during NRP and now as we enter the \n\nNISSAN Value-Up period, that focus evolves towards \n\nbeing the global cost leader. \n\nOne of the key breakthrough strategies of \n\nNISSAN Value-Up is the focus on new and emerging \n\nmarkets. On the sales side, markets like China, India, \n\nRussia and ASEAN represent significant opportunities \n\nfor Nissan. On the purchasing side, we look at the ", - "page_start": 50, - "page_end": 50, - "source_file": "OTC_NSANY_2004.pdf" + "text": "", + "page_start": 207, + "page_end": 207, + "source_file": "00-80T-80.pdf" }, { - "text": "**NISSAN Value-Up: Sustaining Performance**\n\nNissan’s position today is much different than it was six years ago or even three years ago. In \n\n1999, we were in crisis, and the Nissan Revival Plan was needed to revive our company and \n\nbuild a future. In April 2002, when NISSAN 180 began, we wanted to complete the revival \n\nprocess, with an emphasis on profitable growth. \n\nE \nC \nN \nA \nM \nR \nO \nF \nR \nE \nP \n\nNISSAN Value-Up is about sustaining performance. About taking all the gains we have \n\nmade in connecting with our customers, in growing volumes, in creating value, in earning profits, \n\nin improving management— and then building upon these gains. \n\nWith NISSAN Value-Up, you will not see a radical break from NISSAN 180. This plan is \n\nevolutionary, not revolutionary. We will take the core elements that got us to this point—namely, \n\nmore revenue, less cost, more quality and speed, and maximized Alliance benefit with Renault— \n\nand build upon them. \n\nNISSAN Value-Up has three critical commitments: \nProfit: Nissan will maintain the top level of operating profit margin among global automakers \n\nfor each of the three years of the plan. \n\nVolume: Nissan will achieve global sales of 4.2 million units measured in fiscal 2008. \nROIC: Nissan will achieve a 20 percent ROIC on average over the course of the plan, based \n\non the new formula that excludes cash on hand from the denominator. \n\nNISSAN Value-Up will oversee 28 new models, resulting in the start of production of 70 \n\nmodels worldwide, over two dozen more than the 44 production starts during NISSAN 180. Of \n\nthe 28 new models, 18 will be replacements for existing models and 10 will be completely new \n\n“conquest” models. We will enter more new segments, and we will introduce six models that will \n\ndelight customers by being completely innovative in their concept and benefits. ", - "page_start": 12, - "page_end": 12, - "source_file": "OTC_NSANY_2004.pdf" + "text": "", + "page_start": 207, + "page_end": 207, + "source_file": "00-80T-80.pdf" }, { - "text": "NISSAN IS A WORLD-CLASS AUTOMOBILE MANUFACTURER. \n\nTO ENVISION, PLAN, BUILD AND DISTRIBUTE MILLIONS OF AUTOMOBILES \n\nTO THE WORLD REQUIRES A CLEAR DEFINITION OF ROLES AND PROCESSES. \n\nAT NISSAN, OUR BUSINESS DIVISIONS COMMUNICATE IDEAS ACROSS COUNTRIES, \n\nCULTURES AND FUNCTIONS TO DEVISE THE TRANSPARENT, \n\nEFFICIENT SOLUTIONS THAT CREATE SUCCESS. THIS IS THE NISSAN SHIFT_", - "page_start": 34, - "page_end": 34, - "source_file": "OTC_NSANY_2004.pdf" + "text": "", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_KCN_2013.pdf" } ] }, @@ -21325,70 +21325,70 @@ "target_page": 18, "target_passage": "The increase in oil revenues was the result of increased oil production volumes ($81.3 million) offset by a decrease in product pricing ($15.7 million). ", "chunk_present": { - "presence": true, - "index": 9 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 386, + "page_end": 386, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 341, + "page_end": 341, + "source_file": "00-80T-80.pdf" }, { - "text": "TSR will be compared to a set of 22 oil and gas exploration and production companies headquartered in the United States and \nAustralia. The Australian-headquartered companies are highlighted. The chart on the right depicts the TSR over a three year \nperiod ending 31 December 2014. Diamondback Energy Inc, Matador Resources Co and Midstates Petroleum Co Inc were \nexcluded from the chart as there was not enough historical data to measure the defined TSR. \n\n| | Company | |\n|---|---|---|\n| | Company | |\n| Abraxas Petroleum Corp/NV | | |\n| Approach Resources Inc | | |\n| | Austex Oil Ltd | |\n| | Beach Energy Ltd | |\n| Bonanza Creek Energy Inc. | | |\n| Callon Petroleum CO/DE | | |\n| Carrizo Oil & Gas Inc | | |\n| Contango Oil & Gas Co | | |\n| Diamondback Energy Inc | | |\n| | Drillsearch Energy Ltd | |\n| Emerald Oil Inc | | |\n| Goodrich Petroleum Corp | | |\n| | Lonestar Resources Ltd | |\n| Matador Resources Co | | |\n| Midstates Petroleum Co Inc | | |\n| Panhandle Oil & Gas Inc | | |\n| | Red Fork Energy Ltd | |\n| Rex Energy Corp | | |\n| Sanchez Energy Corp | | |\n| | Senex Energy Ltd | |\n| Synergy Resources Corp | | |\n| Triangle Petroleum Corp | | |\n", - "page_start": 40, - "page_end": 40, - "source_file": "ASX_SEA_2014.pdf" + "text": "", + "page_start": 341, + "page_end": 341, + "source_file": "00-80T-80.pdf" }, { - "text": "for a new energy future with greater natural gas usage and increased \ndomestic oil production as two of its primary attributes, it is encouraging \nto see our political leadership finally grasp that natural gas stands alone \nas the only affordable, scalable and immediately available alternative to \nforeign oil and that U.S. oil production can be increased significantly in \nthe years ahead. \n\nThe combination of these vast new discoveries of unconventional \nnatural gas and liquids provides America with a unique future path- \nway toward greater energy independence, an industrial renaissance, \neconomic rejuvenation and greater national security. I remain fully con- \nfident that the marketplace understands this and that over time the U.S. \nwill more fully embrace and utilize clean, affordable, abundant American \nnatural gas and increased domestic oil production as the best alterna- \ntives to burning environmentally challenged coal and expensive and \ndangerous foreign oil. \n\nThe events of the past few months have unmistakably driven home \nthe fact that it is insanity to rely on the Middle East to provide our econ- \nomy’s lifeline of oil. This should be especially obvious when one realizes \nthat during the next 10 years, America will likely export at least another \n$4 trillion in national wealth to oil exporters around the world. Clearly, \nour country must demand from its leaders a new and more sustainable \nenergy future. ", - "page_start": 17, - "page_end": 17, - "source_file": "NYSE_CHK_2010.pdf" + "text": "", + "page_start": 341, + "page_end": 341, + "source_file": "00-80T-80.pdf" }, { - "text": "10,000 other Chesapeake employees, that every day we are working \nhard to create shareholder value and a better future for our communi- \nties, our states and our country through the continued discovery and \ndevelopment of unconventional natural gas and liquids. \n\n*Advancing technology for cleaner operations: solar panels at a West Texas well power*\n*telemetry systems that provide pumpers with real-time information on oil and water*\n*tank levels to alarm them when levels near capacity, preventing tank spills.*\n\nThe good news, however, is that America can now secure a new \nenergy future thanks to Chesapeake and a handful of other leading U.S. \nE&P companies that have reinvented the process of finding natural gas \nand oil during the past five years. In doing so, we have discovered twice \nthe resources of natural gas in the U.S. that Saudi Arabia possesses in oil. \nFurthermore, these same few companies that led the unconventional \nnatural gas revolution have in just the past two years also reinvented \nthe way in which we can find large new oil resources onshore in the U.S. \nIn fact, I believe the U.S. can possibly increase its production of oil from \nthe current 5.8 million barrels per day by 30–50% during the next 5–10 \nyears, thereby potentially reaching the President’s 2025 goal of reducing \nforeign oil imports by 33%, 5–10 years earlier than hoped. \n\nBest regards, ", - "page_start": 17, - "page_end": 17, - "source_file": "NYSE_CHK_2010.pdf" + "text": "", + "page_start": 341, + "page_end": 341, + "source_file": "00-80T-80.pdf" }, { - "text": "Gulf of Suez \nGippsland Basin \nIndonesia \n\nEast Java Basin \nKutei Basin \nWest Natuna Basin \nWest Papua Oil and gas exploration and production \nOil and gas exploration \nOil and gas exploration and production \nOil and gas exploration \n\nOffshore Northern Australia \nBonaparte Basin \nHoutman Basin \nTimor Gap \nTimor Sea \nOil and gas exploration \nOil and gas exploration \nOil and gas exploration and production \nOil and gas exploration and production \nOil and gas exploration and production \nOtway Basin \nPapua New Guinea \n\nPDL1 (Part Hides Field) \nOther interests \nOil and gas exploration \nOil and gas exploration and production \nOil and gas exploration \nSorell Basin \nUSA \n\nGulf Coast \nRocky Mountains Oil and gas exploration and production \nOil and gas exploration and production \n\n(b) The sales revenue received from the Santos Group’s share of petroleum products produced by the joint ventures is $1,493.5 million \n\n(2003: $1,451.2 million) and the contribution of joint venture business undertakings to profit from ordinary activities before interest and tax \nof the Santos Group is $581.3 million (2003: $496.7 million). ", - "page_start": 74, - "page_end": 74, - "source_file": "ASX_STO_2004.pdf" + "text": "", + "page_start": 341, + "page_end": 341, + "source_file": "00-80T-80.pdf" }, { - "text": "We expect that Sundance will grow organically and also through further leasing or \nbolt-on acquisitions in our core Eagle Ford focus area within our current, conservative \nbalance sheet parameters. \n\nPositive outlook for 2015 \nDespite the current oil pricing scenario, Sundance’s medium-to-long term growth \ntrajectory looks very positive. \n\nWe can demonstrate this through: \n\n• A track record of capital efficient growth \n• A track record of value creation \n• Being a low cost/high margin operator \n• Having top tier Eagle Ford assets with an extensive drilling inventory \n• Having a clean balance sheet \n\nAs a mid-tier oil and gas producer and explorer in the S&P/ASX All Australian 200 index, \nand with the increasing interest and support from institutional and retail investors. I believe \nthat Sundance will deliver significant long-term value from our assets for our shareholders. \n\nThank you for your support \nWe have had a busy year at Sundance and I would like to recognise the efforts and valued \ncontribution of the Board of Directors, management team and all staff and contractors of \nthe Company in helping us achieve our strategic goals. I am confident that we have the \nright team and excellent assets in place to execute our clear and focused strategy that we \nexpect to deliver significant value for our shareholders. ", - "page_start": 5, - "page_end": 5, - "source_file": "ASX_SEA_2014.pdf" + "text": "", + "page_start": 341, + "page_end": 341, + "source_file": "00-80T-80.pdf" }, { - "text": "**23. Interests in Joint Ventures**\n\n(a) Santos Ltd and its controlled entities have combined interests in unincorporated joint ventures in the following major areas: \n\n**Joint venture/area** **Principal activities**\n**Average interest**\n**%**\n\nAmadeus Basin \nMereenie \nMereenie Pipeline \nPalm Valley \n\nOil and gas production \nOil transportation \nGas production \nOil and gas exploration \nOil and gas exploration and production \nLiquid hydrocarbon transportation and processing 65 \n65 \n48 \n74 \n32 \n65 \nBrowse Basin \nCarnarvon Basin \nCooper Basin Downstream \nCooper Basin Unit \n\nSouth Australia \nQueensland Oil and gas production \nOil and gas production 65 \n60 \n\nCooper/Eromanga Basins \nSouth Australia \nQueensland, ATP 259P \nOther Eromanga \nJackson Moonie Pipeline Oil and gas exploration and production \nOil and gas exploration and production \nOil and gas exploration and production \nOil transportation 65 \n60 \n74 \n83 \n\nEastern Queensland \nBowen Basin \nSurat Basin Gas exploration and production \nOil and gas exploration and production 50 \n48 \nEgypt \n\nOil and gas exploration \nOil and gas exploration and production 50 \n35 ", - "page_start": 74, - "page_end": 74, - "source_file": "ASX_STO_2004.pdf" + "text": "", + "page_start": 341, + "page_end": 341, + "source_file": "00-80T-80.pdf" }, { - "text": "**Annex 2: Fuel categories**\n\n**Liquid Fuels**(Crude oil and petroleum products) \nCrude oil \nOrimulsion \nNatural gas liquids \nGasoline \nMotor Gasoline \nAviation Gasoline \nJet Gasoline \nJet kerosene \nOther kerosene \nShale oil \nGas/Diesel oil \nResidual fuel oil \nLiquefied petroleum gas \nEthane \nNaphtha \nBitumen \nLubricants \nPetroleum coke \nRefinery Feedstock \nOther oil \nRefinery gas \nParaffin waxes \nWhite spirit \nHeavy fuel - low \nHeavy fuel - medium \nHeavy fuel - high \nLight fuel oil/diesel - low \nLight fuel oil/diesel - medium \nLight fuel oil/diesel - high \nDiesel (road) \nGasoline (road) \n\nPeat \nCoke \nCoke oven coke \nGas coke \nPatent fuel \nCoke \nCoke oven coke \nGas coke \nBKB/Patent Fuel \nPatent Fuel \nBrown coal briquettes \nGas works gas \nCoke oven gas \nBlast furnace gas \nOther gases and mixtures from coal-derived carbon \nCoal - low \nCoal - medium \nCoal - high \n\n**Gaseous Fuels**\nNatural gas \n\n**Other Fuels**\nMunicipal solid waste \nIndustrial waste \nFuel mixtures (fossil and biomass) \nWaste gas \nOther wastes \nHydrogen ", - "page_start": 47, - "page_end": 47, - "source_file": "maiis-user-manual.pdf" + "text": "", + "page_start": 342, + "page_end": 342, + "source_file": "00-80T-80.pdf" }, { - "text": "**Oil sales.**Oil sales increased by $65.6 million (82.7%) to $145.0 million for the year ended 31 December 2014 from $79.4 million \nfor the prior year. The increase in oil revenues was the result of increased oil production volumes ($81.3 million) offset by a \ndecrease in product pricing ($15.7 million). Oil production volumes increased 102.4% to 1,675,078 Bbls for the year ended 31 \nDecember 2014 compared to 827,432 Bbls for the prior year. The average price we realised on (NGL) the sale of our oil \ndecreased by 9.8% to $86.56 per Bbl for the year ended 31 December 2014 from $95.92 per Bbl for the prior year. \n\n**Natural gas sales.**Natural gas sales increased by $3.4 million (122.1%) to $6.2 million for the year ended 31 December 2014 \nfrom $2.8 million for the prior year. The increase in natural gas revenues was primarily the result of increased production \nvolumes ($2.6 million) and improved product pricing ($0.8 million). Natural gas production volumes increased 868,800 Mcf \n(93.0%) to 1,803,000 Mcf for the year ended 31 December 2014 compared to 934,200 Mcf for the prior year. The average price \nwe realised on the sale of our natural gas increased by 15.1% to $3.42 per Mcf for the year ended 31 December 2014 from \n$2.97 per Mcf for the prior year. ", - "page_start": 18, - "page_end": 18, - "source_file": "ASX_SEA_2014.pdf" + "text": "", + "page_start": 339, + "page_end": 339, + "source_file": "00-80T-80.pdf" } ] }, @@ -21399,70 +21399,70 @@ "target_page": 21, "target_passage": "In July 2014, the Company completed the acquisition of approximately 5,700 net Eagle Ford acres in Dimmit County, South Texas", "chunk_present": { - "presence": true, - "index": 3 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 378, + "page_end": 378, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 381, + "page_end": 381, + "source_file": "00-80T-80.pdf" }, { - "text": "TSR will be compared to a set of 22 oil and gas exploration and production companies headquartered in the United States and \nAustralia. The Australian-headquartered companies are highlighted. The chart on the right depicts the TSR over a three year \nperiod ending 31 December 2014. Diamondback Energy Inc, Matador Resources Co and Midstates Petroleum Co Inc were \nexcluded from the chart as there was not enough historical data to measure the defined TSR. \n\n| | Company | |\n|---|---|---|\n| | Company | |\n| Abraxas Petroleum Corp/NV | | |\n| Approach Resources Inc | | |\n| | Austex Oil Ltd | |\n| | Beach Energy Ltd | |\n| Bonanza Creek Energy Inc. | | |\n| Callon Petroleum CO/DE | | |\n| Carrizo Oil & Gas Inc | | |\n| Contango Oil & Gas Co | | |\n| Diamondback Energy Inc | | |\n| | Drillsearch Energy Ltd | |\n| Emerald Oil Inc | | |\n| Goodrich Petroleum Corp | | |\n| | Lonestar Resources Ltd | |\n| Matador Resources Co | | |\n| Midstates Petroleum Co Inc | | |\n| Panhandle Oil & Gas Inc | | |\n| | Red Fork Energy Ltd | |\n| Rex Energy Corp | | |\n| Sanchez Energy Corp | | |\n| | Senex Energy Ltd | |\n| Synergy Resources Corp | | |\n| Triangle Petroleum Corp | | |\n", - "page_start": 40, - "page_end": 40, - "source_file": "ASX_SEA_2014.pdf" + "text": "", + "page_start": 379, + "page_end": 379, + "source_file": "00-80T-80.pdf" }, { - "text": "In July 2014, the Company completed the acquisition of approximately 5,700 net Eagle Ford acres in Dimmit County, South \nTexas, for approximately $36 million and a commitment to drill four Eagle Ford wells. The Company also has the option, at its \nsole discretion, to acquire the Seller’s remaining working interest for an additional $45 million for the earlier of one year from \nclosing the acquisition or six months from first production of hydrocarbons. ", - "page_start": 21, - "page_end": 21, - "source_file": "ASX_SEA_2014.pdf" + "text": "", + "page_start": 380, + "page_end": 380, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n**THE WOODLANDS, TEXAS**", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_JWN_2014.pdf" + "text": "", + "page_start": 380, + "page_end": 380, + "source_file": "00-80T-80.pdf" }, { - "text": "**Business Combinations**\n\nWe make decisions to acquire or invest in businesses based on Ñnancial and strategic considerations. \nBusinesses acquired are accounted for under the purchase method of accounting and are included in our \nConsolidated Financial Statements from the date of acquisition. \n\nWe acquired various solid waste businesses during the years ended December 31, 2004, 2003 and 2002. \nThe aggregate purchase prices we paid for these transactions was $47.4 million, $51.5 million and \n$55.8 million, respectively. \n\nCost in excess of fair value of net assets acquired (goodwill) for 2004 acquisitions totaled approximately \n$13.2 million. As of December 31, 2004 we had goodwill, net of accumulated amortization, of \n$1,562.7 million. \n\nDuring 2004, $28.2 million of the total purchase price paid for acquisitions and contingent payments to \nformer owners was allocated to landÑll airspace. As of December 31, 2004, we had $743.6 million of landÑll \ndevelopment costs, net of accumulated depletion and amortization, which includes purchase price allocated to \nlandÑll airspace as well as other capitalized landÑll costs. When a landÑll is acquired as part of a group of \nassets, purchase price is allocated to airspace based upon the discounted expected future cash Öows of the \nlandÑll relative to the other assets within the acquired group and is adjusted for other non-depletable landÑll \nassets and liabilities acquired (primarily Ñnal capping, closure and post-closure liabilities). LandÑll purchase \nprice is amortized using the units-of-consumption method over total available airspace, which includes \nprobable expansion airspace where appropriate. ", - "page_start": 41, - "page_end": 41, - "source_file": "NYSE_RSG_2004.pdf" + "text": "", + "page_start": 380, + "page_end": 380, + "source_file": "00-80T-80.pdf" }, { - "text": "**Acquisition in 2013**\nOn 8 March 2013, the Company acquired 100% of the outstanding shares of Texon Petroleum Ltd (\"Texon\", whose \nname was changed to Armadillo Petroleum Ltd), an Australian corporation with oil and gas assets in the Eagle Ford \nformation in the United States. The Company acquired Texon to gain access to its existing production and drilling \ninventory in the Eagle Ford formation. As consideration for substantially all of the net assets of Texon, the Company \nissued 122.7 million ordinary shares (approximately 30.6% of the total outstanding shares immediately subsequent \nto the acquisition), which had a fair value of $132.1 million on the acquisition date and net cash consideration of \n$26.3 million for a total purchase price of $158.4 million. The net cash consideration includes a $141.0 million pre- \nmerger purchase by the Company of certain Texon oil and gas properties, offset by $114.7 million of cash acquired \nat the time of the merger. The current income tax liability, included in accrued expenses, and deferred tax liability \nof $33.4 million and $16.9 million, respectively, are comprised of tax liabilities assumed as at the acquisition date \nand an increase in the tax liability related to the incremental acquisition date fair value of the acquired development \nand production and exploration and evaluation assets as compared to Texon's historical basis. ", - "page_start": 75, - "page_end": 75, - "source_file": "ASX_SEA_2014.pdf" + "text": "", + "page_start": 245, + "page_end": 245, + "source_file": "sg246915.pdf" }, { - "text": "Such statements reflect the current views of our management with respect to future events and are subject to these \nand other risks, uncertainties and assumptions relating to our operations, results of operations, growth strategy and \nliquidity. All subsequent written and oral forward-looking statements attributable to us or persons acting on our \nbehalf are expressly qualified in their entirety by this paragraph. \n\n**PART I**\n\n**ITEM 1.** **BUSINESS**\n\n**General**\n\nFirst Financial Bankshares, Inc., a Texas corporation, is a financial holding company registered under the Bank \nHolding Company Act of 1956, or BHCA. As such, we are supervised by the Board of Governors of the Federal \nReserve System, or Federal Reserve Board, as well as several other state and federal regulators. We were formed as \na bank holding company in 1956 under the original name F & M Operating Company, but our banking operations \ndate back to 1890, when Farmers and Merchants National Bank opened for business in Abilene, Texas. By virtue of \na series of reorganizations, mergers, and acquisitions since 1956, we now own, through our wholly-owned Delaware \nsubsidiary, First Financial Bankshares of Delaware, Inc., ten banks organized and located in Texas. These ten banks \nare: \n\n• First National Bank of Abilene, Abilene, Texas; \n• Hereford State Bank, Hereford, Texas; \n• First National Bank, Sweetwater, Texas; \n\n• Eastland National Bank, Eastland, Texas; \n• First Financial Bank, National Association, Cleburne, Texas; \n• Stephenville Bank and Trust Co., Stephenville, Texas; \n• San Angelo National Bank, San Angelo, Texas; \n• Weatherford National Bank, Weatherford, Texas; \n• First Financial Bank, National Association, Southlake, Texas; and \n• City National Bank, Mineral Wells, Texas. \n\nAs described in more detail below, we elected to be treated as a financial holding company in September 2001. \n\nOur service centers are located primarily in North Central and West Texas. Considering the branches and \nlocations of all our subsidiary banks, as of December 31, 2002, we had 28 financial centers across Texas, with seven \nlocations in Abilene, two locations in Cleburne, two locations in Stephenville, two locations in San Angelo, three \nlocations in Weatherford, and one location each in Mineral Wells, Hereford, Sweetwater, Eastland, Southlake, \nAledo, Alvarado, Burleson, Keller, Trophy Club, Roby, and Trent. \n\nInformation on our revenues, profits and losses and total assets appears in the discussion of our Results of \nOperations contained in Item 7 hereof. ", - "page_start": 29, - "page_end": 29, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 380, + "page_end": 380, + "source_file": "00-80T-80.pdf" }, { - "text": "*Property Acquisitions*\nWhen investment properties are acquired, Management considers whether the acquisition represents the acquisition of an asset or a business. \nThe Company accounts for an acquisition as a business combination where an integrated set of activities is acquired in addition to the property. \nMore specifically, consideration is made of the extent to which significant processes are acquired and, in particular, the extent of ancillary \nservices provided by the subsidiary (e.g., maintenance, cleaning, security, bookkeeping, leasing operations, etc.). \n\nManagement believes that the majority of the Company’s acquisitions will be classified as asset acquisitions. During the acquisition of most \nproperties, Killam buys the asset itself and any short‑term leases that are in place. Generally, Killam does not purchase any business systems or \nprocesses with a property. Management would consider an acquisition to be a business combination if all the following criteria were met: ", - "page_start": 61, - "page_end": 61, - "source_file": "TSX_KMP_2013.pdf" + "text": "", + "page_start": 380, + "page_end": 380, + "source_file": "00-80T-80.pdf" }, { - "text": "*Transfer and Disposal Services.*We own or operate 96 transfer stations. We deposit waste at these \nstations, as do other private haulers and municipal haulers, for compaction and transfer to trailers for transport \nto disposal sites or recycling facilities. As of December 31, 2004, we owned or operated 58 landÑlls, which had \napproximately 8,904 permitted acres and total available permitted and probable expansion disposal capacity of \napproximately 1.7 billion in-place cubic yards. The in-place capacity of our landÑlls is subject to change based \non engineering factors, requirements of regulatory authorities and the ability to expand our sites successfully. \nSome of our landÑlls accept non-hazardous special waste, including utility ash, asbestos and contaminated \nsoils. See \"\"Ì Properties.'' \n\nMost of our existing landÑll sites have the potential for expanded disposal capacity beyond the currently \npermitted acreage. We monitor the availability of permitted disposal capacity at each of our landÑlls and \nevaluate whether to pursue expansion at a given landÑll based on estimated future waste volumes and prices, \nmarket needs, remaining capacity and likelihood of obtaining an expansion. To satisfy future disposal demand, \nwe are currently seeking to expand permitted capacity at certain of our landÑlls, although no assurances can be \nmade that all future expansions will be permitted as designed. ", - "page_start": 16, - "page_end": 16, - "source_file": "NYSE_RSG_2004.pdf" + "text": "", + "page_start": 380, + "page_end": 380, + "source_file": "00-80T-80.pdf" } ] }, @@ -21473,70 +21473,70 @@ "target_page": 31, "target_passage": "No increases to Managing Director’s or KMP’s base salary", "chunk_present": { - "presence": true, - "index": 7 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 390, + "page_end": 390, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 346, + "page_end": 346, + "source_file": "00-80T-80.pdf" }, { - "text": "We expect that Sundance will grow organically and also through further leasing or \nbolt-on acquisitions in our core Eagle Ford focus area within our current, conservative \nbalance sheet parameters. \n\nPositive outlook for 2015 \nDespite the current oil pricing scenario, Sundance’s medium-to-long term growth \ntrajectory looks very positive. \n\nWe can demonstrate this through: \n\n• A track record of capital efficient growth \n• A track record of value creation \n• Being a low cost/high margin operator \n• Having top tier Eagle Ford assets with an extensive drilling inventory \n• Having a clean balance sheet \n\nAs a mid-tier oil and gas producer and explorer in the S&P/ASX All Australian 200 index, \nand with the increasing interest and support from institutional and retail investors. I believe \nthat Sundance will deliver significant long-term value from our assets for our shareholders. \n\nThank you for your support \nWe have had a busy year at Sundance and I would like to recognise the efforts and valued \ncontribution of the Board of Directors, management team and all staff and contractors of \nthe Company in helping us achieve our strategic goals. I am confident that we have the \nright team and excellent assets in place to execute our clear and focused strategy that we \nexpect to deliver significant value for our shareholders. ", - "page_start": 5, - "page_end": 5, - "source_file": "ASX_SEA_2014.pdf" + "text": "", + "page_start": 346, + "page_end": 346, + "source_file": "00-80T-80.pdf" }, { - "text": "The easy credit environment caused asset prices to increase significantly to the point \nwhere, in our view, risk adjusted returns on new acquisitions were threatening cyclical \nlows. In line with our strategy, Sundance had monetized several mature assets realizing \n\n~$50 million in current period gains while freeing up \n~$165 million in invested capital. \nSundance’s Performance versus the ASX 200 \n\nWe primarily reinvested this capital in production growth \nand cash flow with only about $75 million reinvested in \nacquiring oil and gas leases and producing properties. This \nresulted in our production increasing from 5,028 BOEPD \nto 9,434 BOEPD by December 2014 and full year EBITDAX \nincreasing $73.8 million to $126.4 million in 2014. Had \nprices stayed steady, we likely would have generated \nearnings before income taxes of over $85 million and a \nreturn on capital in excess of 20%. \n\nANNUAL PERCENTAGE CHANGE \n\nIN 2P PV10 \n(NET ASSET VALUE) \nPER DEBT ADJUSTED SHARE IN SUNDANCE \nPRICE PER SHARE **YEAR** IN ASX200 \n\n2014 21.6% -48.0% 1.1% \n2013 63.3% 29.9% 15.1% \n2012 -15.6% 87.8% 14.6% \n2011 59.7% -44.6% -14.5% ", - "page_start": 6, - "page_end": 6, - "source_file": "ASX_SEA_2014.pdf" + "text": "", + "page_start": 346, + "page_end": 346, + "source_file": "00-80T-80.pdf" }, { - "text": "**2014 Expected Dividend Dates**\nRecord Date*: \nMarch 14, 2014 \nJune 13, 2014 \nSeptember 12, 2014 \nDecember 11, 2014 \n*Subject to Board approval \nPayment Date*: \nApril 4, 2014 \nJuly 4, 2014 \nOctober 3, 2014 \nJanuary 2, 2015 ", - "page_start": 130, - "page_end": 130, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 346, + "page_end": 346, + "source_file": "00-80T-80.pdf" }, { - "text": "The success of Browse Basin wells drilled this year, strong developments in the energy sector and \n\nthe intention of operators to base their 2001 operations in Broome, have encouraged the Board \n\nto consider further investment to ensure that capability keeps pace with demand and that we \n\nleave no reason for competitors to offer more or better. ", - "page_start": 22, - "page_end": 22, - "source_file": "ASX_MRM_2000.pdf" + "text": "", + "page_start": 346, + "page_end": 346, + "source_file": "00-80T-80.pdf" }, { - "text": "**A.** **Key Fiscal Year 2014 Remuneration and Key Changes for Fiscal Year 2015**\n\n| 2014 Remuneration | Action | Rationale |\n|---|---|---|\n| 2014 Remuneration | Action | Rationale |\n| Fixed Remuneration | Increased Managing Director’s base pay from $275,000 (fiscal year 2013) to $370,000 (fiscal year 2014). Increased CFO’s base pay from $225,000 (fiscal year 2013) to $295,000 (fiscal year 2014). | Award for progress towards strategic goals and individual performance; CEO’s base pay was below the 25th percentile of the Company’s U.S. and Australian market peers. CFO’s base pay was below the 50th percentile of the Company’s U.S. market peers. |\n| Cash Short-Term Incentive | Authorised annual cash short-term awards for 2013 performance to the CEO of 87% of year-end 2013 base salary and to the other KMPs at 65% of year-end 2013 base salary. | Annual cash awards were based on the achievement of financial and strategic objectives in 2013. |\n| Equity Long-Term Incentive | Authorised long-term equity awards that vest over three years to the CEO with an aggregate grant date fair value of $679,510 and to other KMPs with an aggregate grant date fair value totalling $681,886. | Annual long-term equity awards were based on the achievement of financial and strategic objectives in 2013. |\n", - "page_start": 30, - "page_end": 30, - "source_file": "ASX_SEA_2014.pdf" + "text": "", + "page_start": 346, + "page_end": 346, + "source_file": "00-80T-80.pdf" }, { - "text": "| 2014 Remuneration | Action | Rationale |\n|---|---|---|\n| 2014 Remuneration | Action | Rationale |\n| Non-executive Director Compensation | Increased total director base compensation during 2014 by approximately A$65,000 per Director. | Based on market review of director compensation at peer group companies and to reflect the increasing complexity of the Company’s operations and therefore the related time commitment and performance expectations of the directors. |\n\n\n| D E | |\n|---|---|\n| Key Changes for 2015 | Action |\n| Fixed Remuneration | No increases to Managing Director’s or KMP’s base salary. |\n| Cash Short-Term Incentive | Short-Term Incentive payments earned for 2014 will be paid out in Restricted Stock Units during 2015 instead of cash to reflect the current low commodity price environment and preserve liquidity. |\n| Equity Long-Term Incentive | Long-Term Incentive RSUs to KMPs earned for 2014 will be paid out in 2015 with 50% time based vesting and 50% vesting tied to Total Shareholder Return compared to the peer group over a three year period. |\n| Non-executive Director Compensation | No increases to NED fees |\n", - "page_start": 31, - "page_end": 31, - "source_file": "ASX_SEA_2014.pdf" + "text": "", + "page_start": 346, + "page_end": 346, + "source_file": "00-80T-80.pdf" }, { - "text": "*Dear Fellow Shareholders,*\n\n*I am pleased to present Sundance Energy Australia Limited’s*\n*Annual Report for the 12 months ended 31 December 2014. It*\n*has been another year of significant progress for Sundance*\n*across our portfolio of liquids rich oil and gas assets in the US.*\nCHAIRMAN’S LETTER \n\nThe Company’s strategic focus on growing production, cash flows and reserves from \nlarge, repeatable resource plays in North America continues to deliver positive results \nwith growth in production, cash flows, and reserves. \n\nDuring late 2013 and 2014, we completed the divestment of our interest in the Williston \nBasin in North Dakota for $51 million which realised an internal rate of return of 45 percent; \nand also opportunistically divested our interest in the Denver-Julesburg Basin in Colorado \nfor $114 million which realised an internal rate of return of 104 percent. These divestitures \nof smaller, less scalable positions enabled us to focus on developing and growing our \nassets in the Eagle Ford in Texas and our Mississippian/Woodford assets in Oklahoma. \n\nDespite the reduction in crude oil and liquids prices towards the end of the year \nand continuing into 2015, the operational performance and focused, value-adding \ntransactions during the past year have positioned the Company very favourably for \nfuture growth in net asset value and shareholder returns. \n\n*Despite the reduction in*\n*crude oil and liquids*\n*prices towards the end of*\n*the year and continuing*\n*into 2015, the opertional*\n*performance and focused,*\n*value-adding transactions*\n*during the past year have*\n*positioned the Company*\n*very favourably for future*\n*growth in net asset value*\n*and shareholder returns.*\nCorresponding with the growth in annual production, the Company’s full year revenues \nincreased to $159.8 million and Adjusted EBITDAX increased to $126.4 million. ", - "page_start": 4, - "page_end": 4, - "source_file": "ASX_SEA_2014.pdf" + "text": "", + "page_start": 346, + "page_end": 346, + "source_file": "00-80T-80.pdf" }, { - "text": "*Base Salary*\nBase salaries for executives recognize their qualifications, experience and responsibilities as well as their unique value and \nhistorical contributions to Sundance. In addition to being important to attracting and retaining executives, setting base salaries \nat appropriate levels motivates employees to aspire to and accept enlarged opportunities. We do not consider base salaries to \nbe part of performance-based remuneration. In setting the amount, the individuals' performance is considered as well as the \nlength of time in their current position without a salary increase. ", - "page_start": 35, - "page_end": 35, - "source_file": "ASX_SEA_2014.pdf" + "text": "", + "page_start": 347, + "page_end": 347, + "source_file": "00-80T-80.pdf" } ] }, @@ -21553,64 +21553,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 13, + "page_end": 13, + "source_file": "ASX_KCN_2013.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 301, + "page_end": 301, + "source_file": "00-80T-80.pdf" }, { - "text": "6. \n\nIf the previous preparation steps were followed, the Storwize V7000 is now seen as a host \nfrom the system to be migrated. LUs can then be mapped to the Storwize V7000. Map the \nexternal storage system by following the instructions that are shown in Figure 9-6. ", - "page_start": 414, - "page_end": 414, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 301, + "page_end": 301, + "source_file": "00-80T-80.pdf" }, { - "text": "**3.1 General planning rules**\n\n**Important:**At the time of this writing, the statements that are provided in this book are \naccurate but can change. Always verify any statements that are made in this book with the \nIBM Storwize V7000 supported hardware list, device driver, firmware, and recommended \nsoftware levels information that are available at the following websites: \n\n(cid:2) Support Information for Storwize V7000 \n(cid:2) IBM System Storage Interoperation Center (SSIC) \n\nTo maximize the benefit that is realized from the Storwize V7000, pre-installation planning \nmust include several important steps. These steps ensure that the Storwize V7000 provides \nthe best possible performance, reliability, and ease of management for your application \nneeds. The correct configuration also helps minimize downtime by avoiding changes to the \nStorwize V7000 and the storage area network (SAN) environment to meet future growth \nneeds. \n\nThis book is*not*intended to provide in-depth information about the described topics. For an \nenhanced analysis of advanced topics, see IBM System Storage SAN Volume Controller and \nStorwize V7000 Best Practices and Performance Guidelines, SG24-7521. ", - "page_start": 66, - "page_end": 66, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 10, + "page_end": 10, + "source_file": "NYSE_CHK_2010.pdf" }, { - "text": "**13.4.4 Updating IBM Storwize V7000 drive code**\n\nAfter completing the Storwize V7000 software update as described in 13.4, “Software update” \non page 687, the firmware of the Storwize V7000 drives also must be updated. The upgrade \ntest utility identified that downlevel drives are in the system, as shown in Figure 13-25. \nHowever, this fact does not stop the system software from being performed. ", - "page_start": 718, - "page_end": 718, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 301, + "page_end": 301, + "source_file": "00-80T-80.pdf" }, { - "text": "**3.19.3 Storwize V7000**\n\nThe Storwize V7000 clustered system is scalable up to eight nodes. Its performance grows \nnearly linearly when more nodes are added until it becomes limited by other components in \nthe storage infrastructure. Although virtualization with the Storwize V7000 provides a great \ndeal of flexibility, it does not abolish the necessity to have a SAN and back-end storage \nsubsystems that can deliver the performance that you want. \n\nEssentially, Storwize V7000 performance improvements are gained by using in parallel as \nmany physical disks as possible, which creates a greater level of concurrent I/O to the \nback-end storage without overloading a single disk or array. \n\nAssuming that no bottlenecks exist in the SAN or on the disk subsystem, you must follow \nspecific guidelines when you perform the following tasks: \n\n(cid:2) Creating a storage pool \n\n(cid:2) Creating volumes \n\n(cid:2) Connecting to or configuring hosts that use storage presented by a Storwize V7000 \nclustered system \n\nFor more information about performance and preferred practices for the Storwize V7000, see \nIBM System Storage SAN Volume Controller and Storwize V7000 Best Practices and \nPerformance Guidelines, SG24-7521. ", - "page_start": 104, - "page_end": 104, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 60, + "page_end": 60, + "source_file": "sg246915.pdf" }, { - "text": "**3.3 Connectivity planning**\n\nIBM Storwize V7000 offers a wide range of connectivity options, both to back-end storage and \nto hosts. They include Fibre Channel (FC) SAN (8 and 16 Gbps, including direct attachment \nfor some purposes), iSCSI (with 1 Gbps and 10 Gbps ports, depending on hardware \nconfiguration), and FCoE connectivity on 10 Gbps ports. \n\nStorwize V7000 supports SAN routing technologies between Storwize V7000 and storage \nsystems if the routing stays entirely within Fibre Channel connectivity and does not use other \ntransport technologies, such as IP. However, SAN routing technologies (including FCIP links) \nare supported for connections between the Storwize V7000 and hosts. The use of \nlong-distance FCIP connections might degrade the storage performance for any servers that \nare attached through this technology. \n\nTable 3-1 lists the fabric type that can be used for communicating between hosts, nodes, and \nback-end storage systems. All fabric types can be used at the same time. \n\nTable 3-1 Storwize V7000 communication options \n\n| Communication type | Host to Storwize\nV7000 | Storwize V7000\nto storage | Storwize V7000\nto\nStorwize V7000 |\n|---|---|---|---|\n| Communication type | Host to Storwize V7000 | Storwize V7000 to storage | Storwize V7000 to Storwize V7000 |\n| Fibre Channel (FC) SAN | Yes | Yes | Yes |\n| iSCSI (1 GbE or 10 GbE) | Yes | Yes | No |\n| iSCSI (25 GbE) (RDMA iSER) | Yes | No | Yes |\n| FCoE (10 GbE) | Yes | Yes | Yes |\n", - "page_start": 69, - "page_end": 69, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 141, + "page_end": 141, + "source_file": "00-80T-80.pdf" }, { - "text": "Figure 3-9 Example of host connectivity \n\nIn Figure 3-9, the optical distance between Storwize V7000 Node 1 and Host 2 is slightly over \n40 km (24.85 miles). \n\nTo avoid latencies that lead to degraded performance, avoid ISL hops whenever possible. In \nan optimal setup, the servers connect to the same SAN switch as the Storwize V7000 nodes. \n\n**Note:**Before attaching host systems to Storwize V7000, review the Configuration Limits \nand Restrictions for the IBM System Storage Storwize V7000 at this IBM Support web \npage. ", - "page_start": 92, - "page_end": 92, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 60, + "page_end": 60, + "source_file": "sg246915.pdf" }, { - "text": "**3.12 Host attachment planning**\n\nThe typical FC host attachment to the Storwize V7000 is done through SAN fabric. However, \nthe system allows direct attachment connectivity between its 8 Gb or 16 Gb Fibre Channel \nports and host ports. No special configuration is required for host systems that are using this \nconfiguration. However, the maximum number of directly attached hosts is severely limited by \nthe number of FC ports on Storwize V7000’s nodes. \n\nThe Storwize V7000 imposes no particular limit on the distance between the Storwize V7000 \nnodes and host servers. However, for host attachment, the Storwize V7000 supports up to \nthree ISL hops in the fabric. This capacity means that the server to the Storwize V7000 can \nbe separated by up to five FC links, four of which can be 10 km long (6.2 miles) if long wave \nSmall Form-factor Pluggables (SFPs) are used. \n\nFigure 3-9 shows an example of a supported configuration with Storwize V7000 nodes using \nshortwave SFPs. ", - "page_start": 92, - "page_end": 92, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 301, + "page_end": 301, + "source_file": "00-80T-80.pdf" }, { - "text": "When considering performance for a system, always identify the bottleneck and, therefore, \nthe limiting factor of a specific system. This is a multidimensional analysis that needs to be \nperformed for each of your workload patterns. There can be different bottleneck components \nfor different workloads. \n\nWhen you are designing a storage infrastructure with the Storwize V7000 or implementing a \nStorwize V7000 in an existing storage infrastructure, you must ensure that the performance \nand capacity of the SAN, back-end disk subsystems, and Storwize V7000 meets \nrequirements for the set of known or expected workloads. \n\n**3.19.1 SAN**\n\nThe following Storwize V7000 models are supported for V8.2.1: \n\n(cid:2) Control enclosures: \n\n– 2076-524 \n– 2076-624 \n\n(cid:2) Expansion enclosures: \n\n– 2076-12F \n– 2076-24F ", - "page_start": 102, - "page_end": 102, - "source_file": "sg247938.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_CHK_2010.pdf" } ] }, @@ -21627,64 +21627,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 191, + "page_end": 191, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, + "text": "", + "page_start": 13, + "page_end": 13, "source_file": "Excel Training Manual 1.pdf" }, { - "text": "k \n2 k \n2 \nh(Jcluster/2)(Sj1 + Sj2 + Sj3 + Sj4)2 + \n1j)2 + 2j)2 \n(QE (QE \nX \ncluster j \n\nSj1 Sj4 + Sj2 Sj3 + Sj2 \n\nSj4 + Sj1 \n√12 \n\nSj3 2Sj1 Sj2 2Sj3 Sj4 \n+ J ′ \n(cid:16)QE \n· · · · − · − · \n1j \n\nSj2 Sj4 + Sj1 Sj3 Sj1 Sj4 Sj2 Sj3 \n+ QE \n2j \n· · \n− \n2 \n· − · \n(cid:17)i \n\n4Jxk2 \n3J ′2 QE \n1j · 4Jyk2 \n3J ′2 QE \n2j · 16Jzk4 \n9J ′4 QE \nQE \n2k + \n1k − X 2j · − X \nX \nz−links x−links y−links ", - "page_start": 6, - "page_end": 6, - "source_file": "1001.0266.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "λ2 \n\n2Jcluster Pjk(Hperturbation)2 \nThis is true for other perturbations considered later in \nthis Appendix. The cluster j and cluster k parts can be \nseparated, this term then becomes (a, b = x, y, z), \n\nPjk − \n\n=λy[Sj1 \nJy| \nJcluster, r = sgn(Jy) is the sign of Jy. \n4 \nwith λy = \np \nj τ z \nThe τ z \nk term is again more difficult to get. We use \nthe representation of τ z by spin-chirality (6). And con- \nsider the following perturbation \n\n(cid:2)PjSa \n2Jcluster X \na,b \nj2Pj · PkSa \nj1Sb \nPjSa \nj2Pj · PkSa \nj2Sb \nPjSa \njℓSb \nPjSa \nPj(Sjℓ · \nThen use the fact that \nSjm) \nPj by spin rotation symmetry, the perturbation be- \ncomes \n\nj1Pj · PkSa \nk1Sb \nk2Sb \n\nk1Pk − \n\nHperturbation = Sj2 (Sj3 Sj4) + r Sk2 (Sj3 Sj4) \n· · × \n\n+ 2r \n+ r2 \n\nk2Pk \nk2Pk(cid:3) \njmPj = δab(1/3) \nλ2 \n· ", - "page_start": 9, - "page_end": 9, - "source_file": "1001.0266.pdf" + "text": "", + "page_start": 54, + "page_end": 54, + "source_file": "00-80T-80.pdf" }, { - "text": "user_public_key = \"ssh-rsa \nAAAAB3NzaC1yc2EAAAABIwAAAQEA09+YMqJ8VHX3HC7qy6HSxs3JjTGKbEgK+CExpf811uxsq+uJYbfXEKH19/NCf/U \nvpkozJBDDXDIxJ4uqOEBWDG4mUuu5U9a4lXgb6qaPYyXwVTygL/IcB0poSGEQQaJzhB05g71uZrya++sG1xHUjSQAQz \nhDuKrs4Bc3gcN4184UR+BX1pVgCls3NRn9hLrfLWS37M/kn+b/n6VMYYVpHsZ2XVydAn2nwuzktaEuWYaY/1cNd4xuu \nyVu08GQOon6t5KQ1EZBheADdSsyamulLqW9z4j6Y1wwDe4GPDc5zIW++ASDAZB0eEfbKGDLVdpFsI5YV8nLV1r/T0Y/ \nFiFZqQ== Bogdan Savu;IBMROO45771;IBMROZZ014E826;J;\" \ndns1 = \"192.168.11.210\" # DNS server 1 \ndns_domain = \"domain.example.com\" ", - "page_start": 131, - "page_end": 131, - "source_file": "sg248459.pdf" + "text": "", + "page_start": 13, + "page_end": 13, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "Again consider two clusters j and k. For simplicity \nof notations define a projection operator \nPjPk, \nwhere \nPj,k is projection into the singlet subspace of clus- \nτ z \nj,k = \nter j and k, respectively, \nPj,k = \ns \n. For a given perturbation λ Hperturbation with small \n| \nparameter λ (in factor λ/Jcluster is the expansion param- \neter), lowest two orders of the perturbation series are \n\n=λy[Sj1 \nJy| \nwith λy = \n4 \np | \n\nλz Hperturbation, z \n\nPjk + λ2 \nHcluster k]−1(1 \n\n= λz[Sj2 \nJz| \nwith λz = 4 \n\n(Sk3 \n\nSk4) + sgn(Jz) \nSk4). \n\nSk2 (Sj3 Sj4)] λ \n\nPjkHperturbation \nHcluster j − \n[0 \n× \n\nPjkHperturbation(1 \n\n− Pjk) \n− Pjk)Hperturbation \n· \n(Sj3 × \nSj4 + Sk3 \n· · × \n\nPjk \n(15) \n− | \n\n· \nJz| · \n\n· \n− \n\nJcluster. \np| \nThe entire Hamiltonian Hmagnetic reads explicitly as, ", - "page_start": 7, - "page_end": 7, - "source_file": "1001.0266.pdf" + "text": "", + "page_start": 13, + "page_end": 13, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "#General configuration: \n#--------------------------------- \nssh_user = \"root\" # Image username \nssh_user_password = \"\" # Image password \nuser_public_key = \"ssh-rsa \nAAAAB3NzaC1yc2EAAAABIwAAAQEA09+YMqJ8VHX3HC7qy6HSxs3JjTGKbEgK+CExpf811uxsq+uJYbfXEKH19/NCf/U \nvpkozJBDDXDIxJ4uqOEBWDG4mUuu5U9a4lXgb6qaPYyXwVTygL/IcB0poSGEQQaJzhB05g71uZrya++sG1xHUjSQAQz \nhDuKrs4Bc3gcN4184UR+BX1pVgCls3NRn9hLrfLWS37M/kn+b/n6VMYYVpHsZ2XVydAn2nwuzktaEuWYaY/1cNd4xuu \nyVu08GQOon6t5KQ1EZBheADdSsyamulLqW9z4j6Y1wwDe4GPDc5zIW++ASDAZB0eEfbKGDLVdpFsI5YV8nLV1r/T0Y/ \nFiFZqQ== Bogdan Savu;IBMROO45771;IBMROZZ014E826;J;\" \ndns1 = \"192.168.11.210\" \ndns_domain = \"domain.example.com\" # DNS Domain Name \n# DNS server 1 ", - "page_start": 133, - "page_end": 133, - "source_file": "sg248459.pdf" + "text": "", + "page_start": 13, + "page_end": 13, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "#General configuration: \n#--------------------------------- \nssh_user = \"root\" # Image username \nssh_user_password = \"\" # Image password \nuser_public_key = \"ssh-rsa \nAAAAB3NzaC1yc2EAAAABIwAAAQEA09+YMqJ8VHX3HC7qy6HSxs3JjTGKbEgK+CExpf811uxsq+uJYbfXEKH19/NCf/U \nvpkozJBDDXDIxJ4uqOEBWDG4mUuu5U9a4lXgb6qaPYyXwVTygL/IcB0poSGEQQaJzhB05g71uZrya++sG1xHUjSQAQz \nhDuKrs4Bc3gcN4184UR+BX1pVgCls3NRn9hLrfLWS37M/kn+b/n6VMYYVpHsZ2XVydAn2nwuzktaEuWYaY/1cNd4xuu \nyVu08GQOon6t5KQ1EZBheADdSsyamulLqW9z4j6Y1wwDe4GPDc5zIW++ASDAZB0eEfbKGDLVdpFsI5YV8nLV1r/T0Y/ \nFiFZqQ== Bogdan Savu;IBMROO45771;IBMROZZ014E826;J;\" \ndns1 = \"192.168.11.210\" \ndns_domain = \"domain.example.com\" # DNS Domain Name \n# DNS server 1 ", - "page_start": 132, - "page_end": 132, - "source_file": "sg248459.pdf" + "text": "", + "page_start": 13, + "page_end": 13, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "this term becomes \n\nλ2 \n6Jcluster · \n(λ2)/(32Jcluster) \n\n− \n\n= \n− · − \n\nAnother second order perturbation term r2λ2 \n\nPjkSk2 \n· \nHcluster k]−1(1 \n− \nPjk can be computed in the similar \nτ x \nj ). \nSj4)(1 \n(Sj3 \n− Pjk)[0 \n× \n(Sj3 \nSj4) \nPjk)Sk2 \n× \nway and gives the result Hcluster j − \n(r2 λ2)/(32Jcluster) (2 \n− \nFor one of the cross term \n· − \n\nJz| \nwith λz = 4 \nJcluster, r = sgn(Jz) is the sign of Jz. \nThe last term on the right-hand-side is to cancel the non- \ntrivial terms (r2 τ x \nz/(32Jcluster) from the second \norder perturbation of the first term. Up to second order \nperturbation this will produce \n\nr λ2 \nPjkSj2 \n[0 \n− \n− Pjk)Sk2 \n(1 \n\nJzτ z \nj τ z k interactions. \n\n× \n× \n− \n(Sj3 \nPjk × \n\nFinally we have been able to reduce the high order \ninteractions to at most three spin terms, the Hamiltonian \nHmagnetic is Hcluster k]−1(1 \n− ", - "page_start": 10, - "page_end": 10, - "source_file": "1001.0266.pdf" + "text": "", + "page_start": 13, + "page_end": 13, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "McGarry, Ken (1 December 2005). \"A survey of interestingness measures for knowledge \n\ndiscovery\".*The Knowledge Engineering Review*.**20**(1): 39–61. \ndoi:10.1017/S0269888905000408 (https://doi.org/10.1017%2FS0269888905000408). \nS2CID 14987656 (https://api.semanticscholar.org/CorpusID:14987656). ", - "page_start": 61, - "page_end": 61, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 12, + "page_end": 12, + "source_file": "Excel Training Manual 1.pdf" } ] }, @@ -21695,70 +21695,70 @@ "target_page": 1, "target_passage": "Smart home automation Smart home automation has been around for a while, but AI is taking it to the next level. Imagine a home that not only follows your commands, but also anticipates your needs. Enhanced smart home systems can learn your daily routines and adjust settings accordingly, from lighting and temperature to security and entertainment, making your home smarter and more responsive than ever before.", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_MGM_2004.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 152, + "page_end": 152, + "source_file": "00-80T-80.pdf" }, { - "text": "(NC) As we look ahead to 2025, artificial intelligence (AI) continues to revolutionize our lives. From \nenhancing our daily routines to transforming entire industries, AI’s impact is undeniable. \n\nThese five innovations are set to shape our future, offering unprecedented convenience, efficiency and \npersonalization. \n\nAI-powered computing \nAI-powered computing, such as Intel-powered laptops – or AI PC – is at the forefront of technological \nadvancement. But what, exactly, is an AI PC? They’re computers that have AI built into their processors \n– also known as the brain of the computer – which optimizes performance, enhances security and \nprovides a more personalized experience as they learn from your usage patterns. For consumers, this \nmeans faster, smarter and more secure computing tailored to your individual needs. \n\nSmart home automation \nSmart home automation has been around for a while, but AI is taking it to the next level. Imagine a \nhome that not only follows your commands, but also anticipates your needs. Enhanced smart home \nsystems can learn your daily routines and adjust settings accordingly, from lighting and temperature to \nsecurity and entertainment, making your home smarter and more responsive than ever before. \n\nHealth and wellness \nThe health-care industry is seeing significant transformation. AI-driven health and wellness applications \ncan monitor vital signs, predict potential health issues, and even provide personalized fitness and \nnutrition plans. Wearable devices equipped with this technology can offer real-time health insights, \nhelping individuals make informed decisions about their well-being. ", - "page_start": 1, - "page_end": 1, - "source_file": "news4.pdf" + "text": "", + "page_start": 151, + "page_end": 151, + "source_file": "00-80T-80.pdf" }, { - "text": "Unlike previous waves of automation, many middle-class jobs may be eliminated by artificial \nintelligence;*The Economist*stated in 2015 that \"the worry that AI could do to white-collar jobs what \nsteam power did to blue-collar ones during the Industrial Revolution\" is \"worth taking seriously\".[262] \nJobs at extreme risk range from paralegals to fast food cooks, while job demand is likely to increase for \ncare-related professions ranging from personal healthcare to the clergy.[263] \n\nFrom the early days of the development of artificial intelligence, there have been arguments, for example, \nthose put forward by Joseph Weizenbaum, about whether tasks that can be done by computers actually \nshould be done by them, given the difference between computers and humans, and between quantitative ", - "page_start": 18, - "page_end": 18, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 152, + "page_end": 152, + "source_file": "00-80T-80.pdf" }, { - "text": "By standardizing and automating data extraction processes, enterprises can more \nproductively and accurately extract knowledge and intelligence from unstructured content \nto create insights that accurately reflect operational reality, which enables more effective \ndigital transformation initiatives and better business outcomes. Intelligent data extraction is \nan innovative evolution in standard data capture that extends optical character recognition \n(OCR), AI, and other techniques to identify and extract information from unstructured \ncontent. \n\n(cid:2) Tasks \n\nAutomating repetitive tasks saves time and money. Robotic process automation bots \nexpand the value of an automation platform by completing tasks faster, which allows \nemployees to perform higher-value work. Robotic process automation (RPA) is the use of \nsoftware bots to automate highly repetitive, routine tasks that are normally performed by \nknowledge workers. ", - "page_start": 64, - "page_end": 64, - "source_file": "sg248459.pdf" + "text": "", + "page_start": 152, + "page_end": 152, + "source_file": "00-80T-80.pdf" }, { - "text": "Promotion of the wellbeing of the people and communities that these technologies affect requires \nconsideration of the social and ethical implications at all stages of AI system design, development and \nimplementation, and collaboration between job roles such as data scientists, product managers, data \nengineers, domain experts, and delivery managers.[300] \n\nThe UK AI Safety Institute released in 2024 a testing toolset called 'Inspect' for AI safety evaluations \navailable under a MIT open-source licence which is freely available on GitHub and can be improved with \nthird-party packages. It can be used to evaluate AI models in a range of areas including core knowledge, \nability to reason, and autonomous capabilities.[301] ", - "page_start": 21, - "page_end": 21, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 152, + "page_end": 152, + "source_file": "00-80T-80.pdf" }, { - "text": "Artificial intelligent (AI) agents are software entities designed to \nperceive their environment, make decisions, and take actions \nautonomously to achieve specific goals. These agents can interact \nwith users, their environment, or other agents. AI agents are used \nin various applications, including virtual assistants, chatbots, \nindustrial \nautonomous vehicles, game-playing systems, and \nrobotics. AI agents operate within the constraints of their \nprogramming, available computational resources, and hardware \nlimitations. This means they are restricted to performing tasks \nwithin their defined scope and have finite memory and processing \ncapabilities. In real-world applications, AI agents often face time \nconstraints for decision-making and action execution. Many AI \nagents incorporate learning algorithms, enabling them to improve \ntheir performance over time through experience or training. Using \nmachine learning, AI agents can adapt to new situations and \noptimise their behaviour for their designated tasks.[175][176][177] ", - "page_start": 12, - "page_end": 12, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 152, + "page_end": 152, + "source_file": "00-80T-80.pdf" }, { - "text": "A statement of two researchers from the Massachusetts Institute of Technology shortly summarises this: \n\n*‘Technologies such as payroll-processing and inventory-control software, factory automation, computer-*\n*controlled machining centers, and scheduling tools have replaced workers on the shop floor and in*\n*clerical tasks and rote information processing. By contrast, big data, analytics, and high-speed*\n*communications have enhanced the output of people with engineering, creative, and design skills and*\n*made them more valuable. The net effect has been to decrease the demand for low-skilled information*\n*workers while increasing the demand for highly skilled ones.’*274 \n\n**Digital technologies can enhance prevention at workplaces.**They can help to separate workers \nfrom hazardous working situations, facilitate better and innovative ways of monitoring exposure, and \nmight improve the quality of work by relieving workers from repetitive or routine tasks. Digital \ntechnologies may also create higher levels of autonomy and flexibility or facilitate the access of a more \ndiverse workforce to the labour market, in particular vulnerable groups such as disabled people, ageing \n\nEuropean Agency for Safety and Health at Work – EU-OSHA \n104 ", - "page_start": 104, - "page_end": 104, - "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + "text": "", + "page_start": 152, + "page_end": 152, + "source_file": "00-80T-80.pdf" }, { - "text": "**As I write these words after recently joining the company, I can say with genuine**\n**enthusiasm that it’s great to be here at Rogers. I took this post because Rogers**\n**is a remarkable company with a rich history and an unrivalled mix of wireless,**\n**cable and media assets. It is a good match with my background and my experience.**\n\nDuring the recruiting and onboarding \nprocess, I spent considerable time with the \nRogers family, the Board of Directors and \nthe leadership team. I am struck by their \nenergy, passion and drive to win, which I \nthink we can harness to do even greater \nthings. I also value the support and longer- \nterm focus of the founding Rogers family \nwho own significant equity in the company. \n\nWhile it is early days, I believe we can \nevolve the business in a way that will be \neven more rewarding for our customers, \nour shareholders and employees. Our goal \nis clear – winning on a consistent basis. \nAnd while our industry faces the challenge \nof moderating growth and regulatory \nuncertainty, few industries are more \ndynamic and better at leveraging new \ntechnologies. \n\nSince joining, I have criss-crossed Canada \nmeeting my team, external stakeholders \nand customers. I have also conducted \nnumerous business reviews, overseen the \n700 MHz spectrum auction and reviewed \nthe regulatory agenda. All this with the \nview to developing a detailed set of \npriorities and plans for the company going \nforward. After I complete this review in \nthe Spring I will outline a detailed strategy \nand business plan working with my \nmanagement team. ", - "page_start": 7, - "page_end": 7, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 152, + "page_end": 152, + "source_file": "00-80T-80.pdf" }, { - "text": "ARTS AND ENTERTAINMENT \n\nNew Artificial Intelligence Summit Series Begins With \nEnergy \n\n07/31/2024 \n\n (AI) continues to transform the United States and the world. To promote and inform rapid advancements in AI and maintain \n\nAmerica’s global competitiveness, the Special Competitive Studies Project (SCSP), a nonprofit and nonpartisan initiative \n\nwith a goal of making recommendations to strengthen America's long-term competitiveness in AI, announces the AI+ Summit \n\nSeries. \n\nThe series kicks off with the topic of energy. The AI + Energy Summit, scheduled for September 26, 2024, in Washington, \n\nD.C., will bring together policy makers, energy industry leaders, top government and academic energy researchers, and \n\ntechnologists to address the challenges of AI’s energy consumption and develop solutions for a resilient and abundant \n\nenergy future. The event also aims to address the implications of AI and energy for national security and promote \n\npartnerships between AI and energy stakeholders. \n\nAI and other emerging technologies can help the United States take the lead in energy areas including maximizing energy \n\nefficiencies, discovering new materials, and enabling new forms of power generation. AI also has a role to play in \n\novercoming energy challenges. The Department of Energy (DOE) already uses AI in several areas including advanced \n\ncomputing, emergency response, environmental modeling, climate forecasting, and materials research. ", - "page_start": 1, - "page_end": 1, - "source_file": "news1.pdf" + "text": "", + "page_start": 152, + "page_end": 152, + "source_file": "00-80T-80.pdf" } ] }, @@ -21769,70 +21769,70 @@ "target_page": 1, "target_passage": "Wearable devices equipped with this technology can offer real-time health insights, helping individuals make informed decisions about their well-being", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 318, + "page_end": 318, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 0, + "page_end": 0, + "source_file": "NASDAQ_EMMS_2004.pdf" }, { - "text": "(NC) As we look ahead to 2025, artificial intelligence (AI) continues to revolutionize our lives. From \nenhancing our daily routines to transforming entire industries, AI’s impact is undeniable. \n\nThese five innovations are set to shape our future, offering unprecedented convenience, efficiency and \npersonalization. \n\nAI-powered computing \nAI-powered computing, such as Intel-powered laptops – or AI PC – is at the forefront of technological \nadvancement. But what, exactly, is an AI PC? They’re computers that have AI built into their processors \n– also known as the brain of the computer – which optimizes performance, enhances security and \nprovides a more personalized experience as they learn from your usage patterns. For consumers, this \nmeans faster, smarter and more secure computing tailored to your individual needs. \n\nSmart home automation \nSmart home automation has been around for a while, but AI is taking it to the next level. Imagine a \nhome that not only follows your commands, but also anticipates your needs. Enhanced smart home \nsystems can learn your daily routines and adjust settings accordingly, from lighting and temperature to \nsecurity and entertainment, making your home smarter and more responsive than ever before. \n\nHealth and wellness \nThe health-care industry is seeing significant transformation. AI-driven health and wellness applications \ncan monitor vital signs, predict potential health issues, and even provide personalized fitness and \nnutrition plans. Wearable devices equipped with this technology can offer real-time health insights, \nhelping individuals make informed decisions about their well-being. ", - "page_start": 1, - "page_end": 1, - "source_file": "news4.pdf" + "text": "", + "page_start": 47, + "page_end": 47, + "source_file": "NASDAQ_EEFT_2000.pdf" }, { - "text": "**AI welfare and rights**\n\nIt is difficult or impossible to reliably evaluate whether an advanced AI is sentient (has the ability to feel), \nand if so, to what degree.[388] But if there is a significant chance that a given machine can feel and suffer, \nthen it may be entitled to certain rights or welfare protection measures, similarly to animals.[389][390] \nSapience (a set of capacities related to high intelligence, such as discernment or self-awareness) may \nprovide another moral basis for AI rights.[389] Robot rights are also sometimes proposed as a practical \nway to integrate autonomous agents into society.[391] \n\nIn 2017, the European Union considered granting \"electronic personhood\" to some of the most capable AI \nsystems. Similarly to the legal status of companies, it would have conferred rights but also \nresponsibilities.[392] Critics argued in 2018 that granting rights to AI systems would downplay the \nimportance of human rights, and that legislation should focus on user needs rather than speculative \nfuturistic scenarios. They also noted that robots lacked the autonomy to take part to society on their \nown.[393][394] \n\nProgress in AI increased interest in the topic. Proponents of AI welfare and rights often argue that AI \nsentience, if it emerges, would be particularly easy to deny. They warn that this may be a moral blind spot \nanalogous to slavery or factory farming, which could lead to large-scale suffering if sentient AI is created \nand carelessly exploited.[390][389] ", - "page_start": 27, - "page_end": 27, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 47, + "page_end": 47, + "source_file": "NASDAQ_EEFT_2000.pdf" }, { - "text": "**Sexuality**\n\nApplications of AI in this domain include AI-enabled menstruation and fertility trackers that analyze user \ndata to offer prediction,[138] AI-integrated sex toys (e.g., teledildonics),[139] AI-generated sexual \neducation content,[140] and AI agents that simulate sexual and romantic partners (e.g., Replika).[141] AI is \nalso used for the production of non-consensual deepfake pornography, raising significant ethical and legal \nconcerns.[142] \n\nAI technologies have also been used to attempt to identify online gender-based violence and online \nsexual grooming of minors.[143][144] ", - "page_start": 10, - "page_end": 10, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 47, + "page_end": 47, + "source_file": "NASDAQ_EEFT_2000.pdf" }, { - "text": "Some authors have suggested in practice, that the definition of AI is vague and difficult to define, with \ncontention as to whether classical algorithms should be categorised as AI,[367] with many companies \nduring the early 2020s AI boom using the term as a marketing buzzword, often even if they did \"not \nactually use AI in a material way\".[368] ", - "page_start": 25, - "page_end": 25, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 47, + "page_end": 47, + "source_file": "NASDAQ_EEFT_2000.pdf" }, { - "text": "**Artificial intelligence**\n\n**Artificial intelligence**(**AI**), in its broadest sense, is intelligence exhibited by machines, particularly \ncomputer systems. It is a field of research in computer science that develops and studies methods and \nsoftware that enable machines to perceive their environment and use learning and intelligence to take \nactions that maximize their chances of achieving defined goals.[1] Such machines may be called AIs. \n\nHigh-profile applications of AI include advanced web search engines (e.g., Google Search); \nrecommendation systems (used by YouTube, Amazon, and Netflix); virtual assistants (e.g., Google \nAssistant, Siri, and Alexa); autonomous vehicles (e.g., Waymo); generative and creative tools (e.g., \nChatGPT and AI art); and superhuman play and analysis in strategy games (e.g., chess and Go). However, \nmany AI applications are not perceived as AI: \"A lot of cutting edge AI has filtered into general \napplications, often without being called AI because once something becomes useful enough and common \nenough it's not labeled AI anymore.\"[2][3] \n\nVarious subfields of AI research are centered around particular goals and the use of particular tools. The \ntraditional goals of AI research include reasoning, knowledge representation, planning, learning, natural \nlanguage processing, perception, and support for robotics.[a] General intelligence—the ability to complete \nany task performed by a human on an at least equal level—is among the field's long-term goals.[4] To \nreach these goals, AI researchers have adapted and integrated a wide range of techniques, including \nsearch and mathematical optimization, formal logic, artificial neural networks, and methods based on \nstatistics, operations research, and economics.[b] AI also draws upon psychology, linguistics, philosophy, \nneuroscience, and other fields.[5] ", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 186, + "page_end": 186, + "source_file": "00-80T-80.pdf" }, { - "text": "**Evaluating approaches to AI**\nNo established unifying theory or paradigm has guided AI research for most of its history.[aa] The \nunprecedented success of statistical machine learning in the 2010s eclipsed all other approaches (so much \nso that some sources, especially in the business world, use the term \"artificial intelligence\" to mean \n\"machine learning with neural networks\"). This approach is mostly sub-symbolic, soft and narrow. Critics \nargue that these questions may have to be revisited by future generations of AI researchers. ", - "page_start": 25, - "page_end": 25, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 66, + "page_end": 66, + "source_file": "00-80T-80.pdf" }, { - "text": "Financial services \nAI is also making waves in the financial sector, offering smarter and more secure ways to manage \nmoney. From AI-driven investment platforms that provide personalized financial advice to fraud \ndetection systems that protect against cyber threats, AI can analyze vast amounts of data to identify \ntrends and make more informed financial decisions. \n\nEnhanced education \nIn education, enhanced learning tools provide personalized learning experiences that adapt to each \nstudent’s strengths and weaknesses. This technology can offer real-time feedback, helping students \nimprove their skills more effectively. Additionally, AI can assist educators by automating administrative \ntasks and providing insights into student performance, allowing for more focused and effective \nteaching. \n\nLearn more at intel.com/aipc. \n\nwww.newscanada.com \n\nWord Count: 346 ", - "page_start": 1, - "page_end": 1, - "source_file": "news4.pdf" + "text": "", + "page_start": 66, + "page_end": 66, + "source_file": "00-80T-80.pdf" }, { - "text": "**Misinformation**\n\nYouTube, Facebook and others use recommender systems to guide users to more content. These AI \nprograms were given the goal of maximizing user engagement (that is, the only goal was to keep people \nwatching). The AI learned that users tended to choose misinformation, conspiracy theories, and extreme \npartisan content, and, to keep them watching, the AI recommended more of it. Users also tended to watch \nmore content on the same subject, so the AI led people into filter bubbles where they received multiple \nversions of the same misinformation.[215] This convinced many users that the misinformation was true, \nand ultimately undermined trust in institutions, the media and the government.[216] The AI program had \ncorrectly learned to maximize its goal, but the result was harmful to society. After the U.S. election in \n2016, major technology companies took steps to mitigate the problem . \n\nIn 2022, generative AI began to create images, audio, video and text that are indistinguishable from real \nphotographs, recordings, films, or human writing. It is possible for bad actors to use this technology to \ncreate massive amounts of misinformation or propaganda.[217] AI pioneer Geoffrey Hinton expressed \nconcern about AI enabling \"authoritarian leaders to manipulate their electorates\" on a large scale, among \nother risks.[218] ", - "page_start": 15, - "page_end": 15, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 186, + "page_end": 186, + "source_file": "00-80T-80.pdf" } ] }, @@ -21849,64 +21849,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 326, + "page_end": 326, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 416, + "page_end": 416, + "source_file": "00-80T-80.pdf" }, { - "text": "**Finance**\n\nFinance is one of the fastest growing sectors where applied AI tools are being deployed: from retail \nonline banking to investment advice and insurance, where automated \"robot advisers\" have been in use \nfor some years.[161] \n\nWorld Pensions experts like Nicolas Firzli insist it may be too early to see the emergence of highly \ninnovative AI-informed financial products and services: \"the deployment of AI tools will simply further \nautomatise things: destroying tens of thousands of jobs in banking, financial planning, and pension advice \nin the process, but I'm not sure it will unleash a new wave of [e.g., sophisticated] pension \ninnovation.\"[162] ", - "page_start": 11, - "page_end": 11, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 416, + "page_end": 416, + "source_file": "00-80T-80.pdf" }, { - "text": "Artificial intelligence was founded as an academic discipline in 1956,[6] and the field went through \nmultiple cycles of optimism throughout its history,[7][8] followed by periods of disappointment and loss of \nfunding, known as AI winters.[9][10] Funding and interest vastly increased after 2012 when deep learning \noutperformed previous AI techniques.[11] This growth accelerated further after 2017 with the transformer \narchitecture,[12] and by the early 2020s many billions of dollars were being invested in AI and the field \nexperienced rapid ongoing progress in what has become known as the AI boom. The emergence of \nadvanced generative AI in the midst of the AI boom and its ability to create and modify content exposed \nseveral unintended consequences and harms in the present and raised concerns about the risks of AI and \nits long-term effects in the future, prompting discussions about regulatory policies to ensure the safety \nand benefits of the technology. ", - "page_start": 1, - "page_end": 1, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 416, + "page_end": 416, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\nFINANCE ", - "page_start": 22, - "page_end": 22, - "source_file": "NYSE_RCI_2013.pdf" + "text": "", + "page_start": 416, + "page_end": 416, + "source_file": "00-80T-80.pdf" }, { - "text": "160. Alex McFarland:*7 Best AI for Math Tools.*(https://www.unite.ai/best-ai-for-math-tools/) \n\nArchived (https://web.archive.org/web/20240911125615/https://www.unite.ai/best-ai-for-mat \nh-tools/) 11 September 2024 at the Wayback Machine unite.ai. Retrieved 2024-08-07 \n161. Matthew Finio & Amanda Downie: IBM Think 2024 Primer, \"What is Artificial Intelligence (AI) \n\nin Finance?\" 8 Dec. 2023 \n\n162. M. Nicolas, J. Firzli: Pensions Age/European Pensions magazine, \"Artificial Intelligence: Ask \n\nthe Industry\" May June 2024 https://videovoice.org/ai-in-finance-innovation- \nentrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence-act-wont-work-as- \nintended/ Archived (https://web.archive.org/web/20240911125502/https://videovoice.org/ai-i \nn-finance-innovation-entrepreneurship-vs-over-regulation-with-the-eus-artificial-intelligence- \nact-wont-work-as-intended/) 11 September 2024 at the Wayback Machine. ", - "page_start": 39, - "page_end": 39, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 416, + "page_end": 416, + "source_file": "00-80T-80.pdf" }, { - "text": "In November 2023, the first global AI Safety Summit was held in Bletchley Park in the UK to discuss the \nnear and far term risks of AI and the possibility of mandatory and voluntary regulatory frameworks.[314] \n28 countries including the United States, China, and the European Union issued a declaration at the start \nof the summit, calling for international co-operation to manage the challenges and risks of artificial \nintelligence.[315][316] In May 2024 at the AI Seoul Summit, 16 global AI tech companies agreed to safety \ncommitments on the development of AI.[317][318] ", - "page_start": 22, - "page_end": 22, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 416, + "page_end": 416, + "source_file": "00-80T-80.pdf" }, { - "text": "**Regulation**\n\nThe regulation of artificial intelligence is the development \nof public sector policies and laws for promoting and \nregulating AI; it is therefore related to the broader regulation \nof algorithms.[302] The regulatory and policy landscape for \nAI is an emerging issue in jurisdictions globally.[303] \nAccording to AI Index at Stanford, the annual number of \nAI-related laws passed in the 127 survey countries jumped \nfrom one passed \nin 2022 \nalone.[304][305] Between 2016 and 2020, more than 30 \ncountries adopted dedicated strategies for AI.[306] Most EU \nmember states had released national AI strategies, as had \nCanada, China, India, Japan, Mauritius, \nthe Russian \nFederation, Saudi Arabia, United Arab Emirates, U.S., and \nVietnam. Others were in the process of elaborating their own AI strategy, including Bangladesh, Malaysia \nand Tunisia.[306] The Global Partnership on Artificial Intelligence was launched in June 2020, stating a \nneed for AI to be developed in accordance with human rights and democratic values, to ensure public \nconfidence and trust in the technology.[306] Henry Kissinger, Eric Schmidt, and Daniel Huttenlocher \npublished a joint statement in November 2021 calling for a government commission to regulate AI.[307] \nIn 2023, OpenAI leaders published recommendations for the governance of superintelligence, which they \nbelieve may happen in less than 10 years.[308] In 2023, the United Nations also launched an advisory \nbody to provide recommendations on AI governance; the body comprises technology company \nexecutives, governments officials and academics.[309] In 2024, the Council of Europe created the first \ninternational legally binding treaty on AI, called the \"Framework Convention on Artificial Intelligence \nand Human Rights, Democracy and the Rule of Law\". It was adopted by the European Union, the United \nStates, the United Kingdom, and other signatories.[310] \n\nin 2016 to 37 passed ", - "page_start": 21, - "page_end": 21, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 415, + "page_end": 415, + "source_file": "00-80T-80.pdf" }, { - "text": "ARTS AND ENTERTAINMENT \n\nNew Artificial Intelligence Summit Series Begins With \nEnergy \n\n07/31/2024 \n\n (AI) continues to transform the United States and the world. To promote and inform rapid advancements in AI and maintain \n\nAmerica’s global competitiveness, the Special Competitive Studies Project (SCSP), a nonprofit and nonpartisan initiative \n\nwith a goal of making recommendations to strengthen America's long-term competitiveness in AI, announces the AI+ Summit \n\nSeries. \n\nThe series kicks off with the topic of energy. The AI + Energy Summit, scheduled for September 26, 2024, in Washington, \n\nD.C., will bring together policy makers, energy industry leaders, top government and academic energy researchers, and \n\ntechnologists to address the challenges of AI’s energy consumption and develop solutions for a resilient and abundant \n\nenergy future. The event also aims to address the implications of AI and energy for national security and promote \n\npartnerships between AI and energy stakeholders. \n\nAI and other emerging technologies can help the United States take the lead in energy areas including maximizing energy \n\nefficiencies, discovering new materials, and enabling new forms of power generation. AI also has a role to play in \n\novercoming energy challenges. The Department of Energy (DOE) already uses AI in several areas including advanced \n\ncomputing, emergency response, environmental modeling, climate forecasting, and materials research. ", - "page_start": 1, - "page_end": 1, - "source_file": "news1.pdf" + "text": "", + "page_start": 415, + "page_end": 415, + "source_file": "00-80T-80.pdf" }, { - "text": "Some authors have suggested in practice, that the definition of AI is vague and difficult to define, with \ncontention as to whether classical algorithms should be categorised as AI,[367] with many companies \nduring the early 2020s AI boom using the term as a marketing buzzword, often even if they did \"not \nactually use AI in a material way\".[368] ", - "page_start": 25, - "page_end": 25, - "source_file": "wikipedia3.pdf" + "text": "", + "page_start": 415, + "page_end": 415, + "source_file": "00-80T-80.pdf" } ] }, @@ -21923,64 +21923,64 @@ }, "top_chunk": [ { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 394, + "page_end": 394, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 38, + "page_end": 38, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\nRELATIVE WIND ", - "page_start": 314, - "page_end": 314, + "text": "", + "page_start": 17, + "page_end": 17, "source_file": "00-80T-80.pdf" }, { - "text": "In 2007 Chesapeake launched a scholarship program in Texas with an \ninitial $1.25 million contribution, challenging the cities of Fort Worth and Dal- \nlas to match its gift within a year. The cities responded and matched the gift, \nso Chesapeake in 2008 added another $1.25 million to the fund, bringing the \ntotal to $3.75 million. The Chesapeake Scholarship Fund currently funds the \ncost of higher education for 48 minority students. The fund provides each \nstudent $20,000 a year for up to four years at the school of their choice. To \ndate more than $1.0 million has been distributed to deserving local students. \nTo help ensure the training of qualified geologists, engineers, land- \nmen and energy lawyers in the next generation, we award scholarships \nto students pursuing energy-related degrees. We also help mentor them \nthrough Chesapeake’s Peak Program. Junior- and senior-level scholarship \nrecipients are paired with Chesapeake employee mentors who help devel- \nop students’ knowledge and provide career advice. There are currently 25 \nmentors and 40 scholarship recipients participating in the Peak Program. \n\nChesapeake partners with other companies and organizations to meet \nbasic, practical needs in hundreds of communities. An example is our ", - "page_start": 27, - "page_end": 27, - "source_file": "NYSE_CHK_2010.pdf" + "text": "", + "page_start": 69, + "page_end": 69, + "source_file": "ASX_MRM_2000.pdf" }, { - "text": " 15,000 \n 15,000 \n30,000 \n (859) \n\n 29,141 \n\n**Junior Credit Facility**\n\nIn August 2013, Sundance Energy, Inc. (“Sundance Energy”), a wholly owned subsidiary of the Company, entered \ninto a second lien credit agreement with Wells Fargo Energy Capital, Inc., as the administrative agent (the “Junior \nCredit Facility”), which provides for term loans to be made in a series of draws up to $100 million. The Junior Credit \nFacility matures in June 2018 and is secured by a second priority lien on substantially all of the Company’s assets. \nUpon entering into the Junior Credit Facility, the Company immediately borrowed $15 million pursuant to the terms \nof the Junior Credit Facility and paid down the outstanding principal of the Senior Credit Facility. In May 2014, the \nCompany’s borrowing capacity increased to $35 million. As at 31 December 2014, the borrowing capacity under the \nJunior Credit Facility remains at $35 million. ", - "page_start": 88, - "page_end": 88, - "source_file": "ASX_SEA_2014.pdf" + "text": "", + "page_start": 17, + "page_end": 17, + "source_file": "00-80T-80.pdf" }, { - "text": "load through measures such as “carbon \nload through measures such as “carbon \n\nneutral leases” (with carbon credits allocated \nneutral leases” (with carbon credits allocated \n\nin proportion to emission volumes of leased \nin proportion to emission volumes of leased \n\nassets) and leasing of environment-friendly \nassets) and leasing of environment-friendly \n\nand energy-saving equipment. \nand energy-saving equipment. \n\nLikewise, by trading used machinery and \nLikewise, by trading used machinery and \n\nsemiconductor- manufacturing equipment, \nsemiconductor- manufacturing equipment, \n\nSumitomo Mitsui Finance & Leasing is \nSumitomo Mitsui Finance & Leasing is \n\nsupporting more efficient capital investment \nsupporting more efficient capital investment \n\nby its customers, while itself evolving into a \nby its customers, while itself evolving into a \n\nrecycling-oriented, environment-friendly \nrecycling-oriented, environment-friendly \n\ncompany. \ncompany. ", - "page_start": 12, - "page_end": 12, - "source_file": "NYSE_SMFG_2011.pdf" + "text": "", + "page_start": 17, + "page_end": 17, + "source_file": "00-80T-80.pdf" }, { - "text": "George Marti believes in doing things. Good things. \n\nBorn to humble roots on his parents’ farm in 1920, Marti has accomplished much, including found- \ning three radio stations (and investing in 10 more) and developing a remote pickup device that \nbecame standard equipment in 80 percent of all radio stations worldwide. He still has part own- \nership of KCLE in Cleburne, Texas (the town where he was once mayor for 12 years). \n\nMarti’s dedication to his hometown is part of the reason why he bought Cleburne State Bank in \n1992. His business skills (and success in the broadcasting industry) gave him the resources to \nturn the bank into yet another winning venture. Five years later, he sold it to First Financial, which \nmerged it with their existing First Financial Bank, Cleburne. \n\nThe proceeds from the sale helped Marti complete the funding for his proudest achievement: the \nMarti Foundation, which he created in the 1970s to help send students from Johnson County to \ncollege. “We help over 100 students a year … most are the first from their family ever to attend \ncollege,” says Marti. “I know what education did for me, so it’s a great thing to help these young \npeople.” Marti says that when he dies, the Foundation will live on, $20 million strong. ", - "page_start": 8, - "page_end": 8, - "source_file": "NASDAQ_FFIN_2002.pdf" + "text": "", + "page_start": 16, + "page_end": 16, + "source_file": "00-80T-80.pdf" }, { - "text": "Our recruiting team also initiated a strategic military recruitment \neffort during the past two years to hire former military personnel to \nwork in a variety of leadership and crew positions. This effort earned \nChesapeake an honor from G.I. JOBS magazine when we were named a \n2011 Top 100 Military-Friendly Employer. Chesapeake currently employs \n37 men and women who formerly served as junior military officers and \nmore than 100 former servicemen and servicewomen who joined the \ncompany through a program called Troops 2 Roughnecks. \n\nIn addition to our specific scholarship programs, one-time educational \ndonations and recruitment efforts, in 2010 we gave more than $1.8 million \nto fund higher education for nearly 400 other students in 12 states through \nour Chesapeake Scholars program. Chesapeake’s scholarships help recruit \nthe best and brightest students and provide educational opportunities in \ncommunities where we operate. In Oklahoma City, more than 400 em- \nployees volunteer for up to an hour a week on company time at four local \npublic schools. Chesapeake’s program has grown to become the largest \ncorporate mentoring program in Oklahoma. \n\n*Putting food on the table — Employees volunteer at the Regional Food Bank*\n*of Oklahoma as part of Operation Blue.*\n\nsponsorship of the annual Day of Caring at the Ganus Center of Harding \nUniversity in White County, Arkansas. During the event, approximately \n1,200 uninsured or underinsured residents received a day of free medical, \ndental and eye screenings. ", - "page_start": 27, - "page_end": 27, - "source_file": "NYSE_CHK_2010.pdf" + "text": "", + "page_start": 68, + "page_end": 68, + "source_file": "ASX_MRM_2000.pdf" }, { - "text": "to selected students pursuing careers in finance, economics, accounting, \nmarketing, business administration, computer science and information \ntechnology. In addition, scholars will take part in a Chesapeake Presiden- \ntial Leadership Course facilitated by faculty members in coordination with \ndesignated Chesapeake leadership coaches, including a Chesapeake senior \nvice president and OCU alumni. \n\nvolunteer program in which employees roll up their sleeves in the com- \nmunities they call home. \n\nChesapeake’s contributions take many forms: financial and equipment \ndonations, volunteerism and scholarships. Last year, we made numerous \nin-kind donations of laptops, reconditioned Chesapeake fleet vehicles and \nsubsidized office space. These contributions provide essential operating \ntools as nonprofit organizations across the nation attempt to serve more \npeople — often with lower budgets — in tough economic times. \n\nFor example, in Louisiana we donated 12 vehicles in 2010, including \none to the Panola College Oil and Natural Gas Technology Program, which \nteaches students about the natural gas industry and provides them with \nhands-on technical training. Across many of the company’s operating \nareas, we’ve donated computers to deserving students, schools and \norganizations through Chesapeake’s Discovering Tomorrow’s Leaders \nprogram. In 2010 the company equipped 14 students with laptops and \ndonated 70 computers to schools or supporting nonprofit organizations. ", - "page_start": 27, - "page_end": 27, - "source_file": "NYSE_CHK_2010.pdf" + "text": "", + "page_start": 68, + "page_end": 68, + "source_file": "ASX_MRM_2000.pdf" }, { - "text": "The SMBC Food and Agricultural Assessment \nThe SMBC Food and Agricultural Assessment \n\nLoan comes with conditions, depending on \nLoan comes with conditions, depending on \n\nthe results of an evaluation of food-producers’ \nthe results of an evaluation of food-producers’ \n\nprogress in areas such as food safety and \nprogress in areas such as food safety and \n\nenvironment-friendliness, healthiness and \nenvironment-friendliness, healthiness and \n\nnutritional value, and efficiency of distribution. \nnutritional value, and efficiency of distribution. \n\nThe Japan Research Institute researches \nThe Japan Research Institute researches \n\nm e a s u r e s i n t h e \nm e a s u r e s i n t h e \n\nTelephone handset-type ATM \n (The Minato Bank) of food and \na r e a s of food and \na r e a s \n\nfarming being taken \nfarming being taken \n\nby the loan applicant, \nby the loan applicant, \n\n**Preparing our businesses**\n**for a higher old-age**\n**dependency ratio**\n\nand drafts a simple \nand drafts a simple \n\n“diagnosis” stating \n“diagnosis” stating \n\nwhether there is room \nwhether there is room \n\nfor future improvement. Ernst & Young \nfor future improvement. Ernst & Young \n\nShinNihon LLC provides expert opinions on \nShinNihon LLC provides expert opinions on ", - "page_start": 8, - "page_end": 8, - "source_file": "NYSE_SMFG_2011.pdf" + "text": "", + "page_start": 67, + "page_end": 67, + "source_file": "ASX_MRM_2000.pdf" } ] }, @@ -21997,64 +21997,64 @@ }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 375, + "page_end": 375, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 381, + "page_end": 381, + "source_file": "00-80T-80.pdf" }, { - "text": "**Structure of Sumitomo Mitsui Financial Group (as of September 30, 2011)**\n\nDaiwa SB Investments \nDaiwa SB Investments \n\n**SMFG SUMITOMO MITSUI FINANCIAL GROUP**\nSumitomo Mitsui Auto Service \nSumitomo Mitsui Auto Service ", - "page_start": 16, - "page_end": 16, - "source_file": "NYSE_SMFG_2011.pdf" + "text": "", + "page_start": 383, + "page_end": 383, + "source_file": "00-80T-80.pdf" }, { - "text": "In the past, the Sumitomo Group \nIn the past, the Sumitomo Group undertook large-scale afforestation \nundertook large-scale afforestation \n\nprograms to solve the problem of \nprograms to solve the problem of pollution around the Besshi copper \npollution around the Besshi copper \n\nmine, while the Mitsui Group set up \nmine, while the Mitsui Group set up the Mitsui Memorial Hospital to \nthe Mitsui Memorial Hospital to \n\ngive the poorest in society access to \ngive the poorest in society access to basic medical care. Based on this \nbasic medical care. Based on this \n\ncorporate social responsibility \ncorporate social responsibility DNA embedded in the business \nDNA embedded in the business \n\nphilosophies of both the Sumitomo \nphilosophies of both the Sumitomo and Mitsui groups over the 400 \nand Mitsui groups over the 400 \n\nyears of their existence, we will \nyears of their existence, we will continue to play our part in solving \ncontinue to play our part in solving \n\nproblems facing the international \nproblems facing the international community through our financial \ncommunity through our financial \n\noperations. \nservice operations. \nservice ", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_SMFG_2011.pdf" + "text": "", + "page_start": 383, + "page_end": 383, + "source_file": "00-80T-80.pdf" }, { - "text": "| www.smfg.co.jp/english | | Sumitomo Mitsui Financial Group CSR Report\nDigest version |\n|---|---|---|\n| www.smfg.co.jp/english | | Sumitomo Mitsui Financial Group CSR Report Digest version |\n| | | |\n", - "page_start": 1, - "page_end": 1, - "source_file": "NYSE_SMFG_2011.pdf" + "text": "", + "page_start": 383, + "page_end": 383, + "source_file": "00-80T-80.pdf" }, { - "text": "As part of its core leasing operations, \nAs part of its core leasing operations, \n\nSumitomo Mitsui Finance & Leasing is \nSumitomo Mitsui Finance & Leasing is \n\nhelping reduce customers’ environmental \nhelping reduce customers’ environmental ", - "page_start": 12, - "page_end": 12, - "source_file": "NYSE_SMFG_2011.pdf" + "text": "", + "page_start": 383, + "page_end": 383, + "source_file": "00-80T-80.pdf" }, { - "text": "\nAnd today \nAnd today Besshi copper mine in the Meiji era \nBesshi copper mine in the Meiji era \n\nMitsui Charity Hospital at its establishment \nMitsui Charity Hospital at its establishment ", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_SMFG_2011.pdf" + "text": "", + "page_start": 383, + "page_end": 383, + "source_file": "00-80T-80.pdf" }, { - "text": "*Uplifting the nation’s spirits*\n*Uplifting the nation’s spirits*\n\nJapan is now facing a wide variety of problems, ranging from the reconstruction of the Tohoku region (the northeastern region of Japan) \nJapan is now facing a wide variety of problems, ranging from the reconstruction of the Tohoku region (the northeastern region of Japan) \n\nafter the March 11 earthquake and tsunami (“the Great East Japan Earthquake”) to a shrinking and aging population, with falling birth rates \nafter the March 11 earthquake and tsunami (“the Great East Japan Earthquake”) to a shrinking and aging population, with falling birth rates \n\nand increasing numbers of the aged. \nand increasing numbers of the aged. \n\nWe must now find ways for people to coexist in harmony with nature, based on a global perspective. \nWe must now find ways for people to coexist in harmony with nature, based on a global perspective. \n\nSumitomo Mitsui Financial Group (SMFG) invited the world-famous architect Tadao Ando to join in a conversation on the issues facing society \nSumitomo Mitsui Financial Group (SMFG) invited the world-famous architect Tadao Ando to join in a conversation on the issues facing society ", - "page_start": 3, - "page_end": 3, - "source_file": "NYSE_SMFG_2011.pdf" + "text": "", + "page_start": 383, + "page_end": 383, + "source_file": "00-80T-80.pdf" }, { - "text": "**China**\n**2**\n\n**Scholarships at major universities**\n\nSumitomo Mitsui Banking Corporation (China) Limited \nSumitomo Mitsui Banking Corporation (China) Limited \nestablished a scholarship program for students of Zhejiang \nestablished a scholarship program for students of Zhejiang \nUniversity, Shanghai Inter \nUniversity, Shanghai Inter- \nnational Studies University, \nnational Studies University, \nSun Yat-sen University, \nSun Yat-sen University, \nand other universities. \nand other universities. ", - "page_start": 15, - "page_end": 15, - "source_file": "NYSE_SMFG_2011.pdf" + "text": "", + "page_start": 383, + "page_end": 383, + "source_file": "00-80T-80.pdf" }, { - "text": "In November 2010, the Sumitomo Mitsui \nIn November 2010, the Sumitomo Mitsui \n\nFinancial Group listed on the New York \nFinancial Group listed on the New York \n\nStock Exchange. This move, we believe, not \nStock Exchange. This move, we believe, not \n\nonly significantly increases convenience for \nonly significantly increases convenience for \n\nour overseas shareholders and investors, \nour overseas shareholders and investors, \n\nbut also broadens our customer base as it \nbut also broadens our customer base as it \n\nfurther increases the transparency of our \nfurther increases the transparency of our \n\nfinancial position. Listing on the New York \nfinancial position. Listing on the New York \n\nStock Exchange as a socially responsible \nStock Exchange as a socially responsible \n\ncorporation accelerates our evolution into a \ncorporation accelerates our evolution into a \n\nglobal player. \nglobal player. ", - "page_start": 10, - "page_end": 10, - "source_file": "NYSE_SMFG_2011.pdf" + "text": "", + "page_start": 383, + "page_end": 383, + "source_file": "00-80T-80.pdf" } ] }, @@ -22065,70 +22065,70 @@ "target_page": 28, "target_passage": "Created to meet the challenge of reducing our water usage, Chesapeake’s Aqua Renew® program uses state-of-the-art technology to recycle pro- duced water.", "chunk_present": { - "presence": true, - "index": 2 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 270, + "page_end": 270, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 253, + "page_end": 253, + "source_file": "00-80T-80.pdf" }, { - "text": "As we explore for and produce clean, affordable, abundant, American \nnatural gas, we provide an important solution to our nation’s energy \nchallenges and its quest for energy independence. With at least a 200- \nyear supply of natural gas located right here in the U.S., this versatile \nfuel can be used to not only heat homes, create electricity and meet \nAmerica’s transportation needs, but also to fuel the country’s future \nby creating jobs and stimulating local and national economies through \ninvestment and taxes. \n\nenergy development should be as small and temporary as possible. \nThese practices are continually evolving and further improving as \nChesapeake and the industry develop new innovative techniques and \napproaches to business. \n\nIn addition to our BMPs, Chesapeake has also initiated several \ninnovative internal programs focused on water recycling and greener \nhydraulic fracturing processes. \n\n***Aqua Renew*®**\nCreated to meet the challenge of reducing our water usage, Chesapeake’s \n*Aqua Renew*® program uses state-of-the-art technology to recycle pro- \nduced water. Since the \ncompany’s preliminary \nreclamation project \nin \n2006, our focus on water reuse and conservation has become a company- \nwide endeavor, stretching from the Barnett Shale of North Texas to the \nMarcellus Shale of northern Pennsylvania. ", - "page_start": 28, - "page_end": 28, - "source_file": "NYSE_CHK_2010.pdf" + "text": "", + "page_start": 252, + "page_end": 252, + "source_file": "00-80T-80.pdf" }, { - "text": "**What advantages does CHK’s unique vertical integration strategy provide?**\nChesapeake has built a large inventory of low-risk natural gas and liquids-rich plays that we plan to develop \naggressively over the next two decades. As a result, we know that our company will consistently utilize a tremen- \ndous (and growing) amount of oilfield services for this resource development. This high level of planned drilling \nactivity will create value for the provider of oilfield services, and Chesapeake’s strategy is to capture a portion \nof this value for our shareholders rather than transfer it to third-party vendors whose interests and investments \nare not always aligned with ours. To date, Chesapeake has invested in drilling rigs, rental tools, water manage- \nment equipment, trucking, compression equipment, midstream services, and most recently pressure pumping and \nfracture stimulation equipment. Chesapeake’s activities require a high level of planning and project coordination \nthat is best accomplished through vertical integration and ownership of the oilfield services we utilize. This approach \ncreates a multitude of cost savings, an alignment of interests, operational synergies, greater capacity of equipment, \nincreased safety and better coordinated logistics. In addition, Chesapeake’s control of a large portion of the oilfield \nservice equipment it utilizes provides a unique advantage to control the timing of leasehold development. Simply \nput, faster development of resources maximizes the present value of leasehold. This has been a key advantage for \nJeff Fisher \nSenior Vice President – Production \n\nChesapeake over the past three years as the company has monetized leasehold investments at premium values through our joint ventures. ", - "page_start": 23, - "page_end": 23, - "source_file": "NYSE_CHK_2010.pdf" + "text": "", + "page_start": 252, + "page_end": 252, + "source_file": "00-80T-80.pdf" }, { - "text": "**Environmentally Friendly Operations**\nAt Chesapeake, we realize that the way a great product is produced is \nas important as the product itself. For example, we have helped pioneer \nthe use of multiwell padsites to drill up to 16 wells from a single loca- \ntion, greatly reducing our land and road use and overall environmental \nfootprint. We use the latest horizontal and directional drilling technology \nto place wells at a safe distance from homes, schools and businesses. In \naddition, we build and maintain access roads and work to eliminate soil \nerosion near our sites, as well as restore local vegetation. \n\nThe*Aqua Renew*program has yet to find a limit to how much \nrecycled water could be used without compromising well production. \nIn fact, our Marcellus Shale operations are treating and recycling virtu- \nally 100% of produced water (more than 10 million gallons per month) \nfor reuse in our hydraulic fracturing operations. Properly conducted \nmodern fracking is a highly engineered, controlled, sophisticated and \nsafe procedure. \n\nWe implement advanced, modern protective measures known as Best \nManagement Practices (BMPs) to help ensure energy development is con- \nducted in an environmentally responsible manner. Procedures are imple- \nmented throughout our operations to protect freshwater aquifers and \nreduce environmental impacts. BMPs protect wildlife, air quality, water and \nlandscapes as we work to develop vitally needed domestic energy sources. \nImplemented throughout the entire life cycle of a well, BMPs can be \nas simple as strategically placing a berm, or land barrier, on locations \nto control surface water runoff. Others involve cutting-edge operational \ntechnologies such as utilizing the most advanced techniques offered in \ndrilling fluids, well casing and cement design. Regardless of complex- \nity, all BMPs are based on the idea that the environmental footprint of \n\nWith such large volumes of recycled water, the company is see- \ning more than just environmental advantages. We estimate that this \n\n*Green operations — Chesapeake’s Best Management Practices ensure our*\n*operations are as environmentally friendly as possible, while protecting*\n*our employees, neighbors and the areas where we operate.*", - "page_start": 28, - "page_end": 28, - "source_file": "NYSE_CHK_2010.pdf" + "text": "", + "page_start": 253, + "page_end": 253, + "source_file": "00-80T-80.pdf" }, { - "text": "In 2007 Chesapeake launched a scholarship program in Texas with an \ninitial $1.25 million contribution, challenging the cities of Fort Worth and Dal- \nlas to match its gift within a year. The cities responded and matched the gift, \nso Chesapeake in 2008 added another $1.25 million to the fund, bringing the \ntotal to $3.75 million. The Chesapeake Scholarship Fund currently funds the \ncost of higher education for 48 minority students. The fund provides each \nstudent $20,000 a year for up to four years at the school of their choice. To \ndate more than $1.0 million has been distributed to deserving local students. \nTo help ensure the training of qualified geologists, engineers, land- \nmen and energy lawyers in the next generation, we award scholarships \nto students pursuing energy-related degrees. We also help mentor them \nthrough Chesapeake’s Peak Program. Junior- and senior-level scholarship \nrecipients are paired with Chesapeake employee mentors who help devel- \nop students’ knowledge and provide career advice. There are currently 25 \nmentors and 40 scholarship recipients participating in the Peak Program. \n\nChesapeake partners with other companies and organizations to meet \nbasic, practical needs in hundreds of communities. An example is our ", - "page_start": 27, - "page_end": 27, - "source_file": "NYSE_CHK_2010.pdf" + "text": "", + "page_start": 253, + "page_end": 253, + "source_file": "00-80T-80.pdf" }, { - "text": "Development Program of the Year, Deal of the Year, Energy Producer \nof the Year and the Industry Leadership Award. Chesapeake was one \nof only two companies selected as a finalist in five or more categories. \nThe company was also honored in 2010 with a Certificate of Recognition \nfor our military reserve recruiting efforts, named a 2010 Best Diversity \nCompany by Engineering & Information Technology Magazine and rec- \nognized for Best Investor Relations in Energy Sector and Best Investor \nRelations Website at the 2010 IR Magazine U.S. Awards. \n\nas the best employees in the industry. From our beginning 22 years ago \nwith 10 employees in Oklahoma City to employing more than 10,000 \npeople across 15 states today, Chesapeake has always focused on build- \ning first-class human resources within a distinctive corporate culture. Talk \nto Chesapeake employees and you will note genuine pride and great \nenthusiasm about the company and the critical role that we play in deliv- \nering increasing quantities of clean and affordable American natural gas \nand valuable and reliable liquids to energy consumers across the country. \nChesapeake employees are distinctive in other ways as well. They \nare much younger than the industry average, with half of our almost \n4,000 Oklahoma City-based headquarters employees 33 years old \nor younger. Their enthusiasm and willingness to learn create an ", - "page_start": 14, - "page_end": 14, - "source_file": "NYSE_CHK_2010.pdf" + "text": "", + "page_start": 253, + "page_end": 253, + "source_file": "00-80T-80.pdf" }, { - "text": "2010 also marked a truly transformative year for our industry. We and \na handful of our peers enhanced our capabilities to find and produce sig- \nnificant new resources of oil and natural gas liquids (collectively, “liquids”) in \nunconventional formations. Chesapeake and these other companies combined \ncreativity, innovation and technology to reinvent the way that our industry \nexplores for and produces natural gas and liquids. \n\nFurthermore, 2010 was the year when global energy companies more \nfully recognized the importance of these developments and the tremendous \nopportunities that have emerged in the U.S. Through a wide variety of trans- \nactions, including several led by Chesapeake, the global energy industry made \nit clear that the assets owned by Chesapeake and some of its peers are the most \nattractive in the world. This realization has already increased the value of high- \nquality unconventional assets in the U.S. and, in time, should lead to higher \nstock prices for the leading U.S. onshore E&P companies, especially Chesapeake. Simply put, the global energy \nindustry is beating a path to our door, and we are welcoming it with open arms. \n\nBefore we move ahead, I want to emphasize that even though 2010 was a year of transition and achievement, \nour stock price was essentially unchanged. Nevertheless, it was still a very strong year for the company operation- \nally and financially. Here are the year’s highlights for your review: ", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_CHK_2010.pdf" + "text": "", + "page_start": 253, + "page_end": 253, + "source_file": "00-80T-80.pdf" }, { - "text": "**Why is an investment grade rating on its debt securities important to CHK?**\nWe believe that Chesapeake will benefit in multiple ways from an investment grade rating on our debt \nsecurities, which we hope to achieve in 2012 or 2013. First, a higher rating would obviously lower the company’s \nborrowing costs over time. In addition, other less easily quantifiable benefits will also accrue to Chesapeake. \nHigher debt ratings would result in lower costs on long-term firm transportation contracts that we enter into in \norder to market our natural gas and oil production as well as facilitate our ability to enter into long-term contracts \nto sell our natural gas production to international buyers in the form of LNG. An improved rating will also enhance \nChesapeake’s ability to further attract world-class energy companies to participate in our joint venture projects, \nwhich profitably monetize a portion of our leasehold investments and also accelerate the development of our \nresource base. Finally, and perhaps most importantly, we believe that reduced financial leverage and an invest- \nment grade rating will lead to a higher stock price and provide further interest from worldwide equity investors. ", - "page_start": 23, - "page_end": 23, - "source_file": "NYSE_CHK_2010.pdf" + "text": "", + "page_start": 253, + "page_end": 253, + "source_file": "00-80T-80.pdf" }, { - "text": "Rockies Chesapeake is the second-largest leasehold owner in the Niobrara Shale, \nFrontier and Codell plays in the Powder River and Denver Julesburg (DJ) basins of Wyoming \n\n**8**\nand Colorado. In February 2011, Chesapeake completed a $1.3 billion joint venture agreement with \nCNOOC, whereby CNOOC acquired a 33.3% interest in Chesapeake’s approximately 800,000 net \nleasehold acres in the Powder River and DJ basins. CNOOC paid Chesapeake approximately $570 million \nin cash at closing and will pay an additional $697 million in carries by funding 66.7% of Chesapeake’s \n\nshare of drilling and completion expenditures, which \nChesapeake expects to occur by year-end 2014. We plan \nto utilize an average of approximately 11 rigs in 2011 to \ndevelop our current 535,000 net leasehold acres with \nour partner and estimate that we could drill up to 7,600 net wells. \nNote: Figures do not add to company totals. \n*\n**% of company total \n***Bossier Shale acreage overlaps with \n\nCompared to last year \n\nHaynesville Shale acreage \nNM Not meaningful ", - "page_start": 21, - "page_end": 21, - "source_file": "NYSE_CHK_2010.pdf" + "text": "", + "page_start": 253, + "page_end": 253, + "source_file": "00-80T-80.pdf" } ] }, @@ -22139,70 +22139,70 @@ "target_page": 16, "target_passage": "I am pleased to report that we have apparently finally convinced President Barack Obama and Congressional leadership to recognize that the energy path America is on today is completely unsustainable.", "chunk_present": { - "presence": true, - "index": 5 + "presence": false, + "index": null } }, "top_chunk": [ { - "text": "\n\n ", - "page_start": 43, - "page_end": 43, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 315, + "page_end": 315, + "source_file": "00-80T-80.pdf" }, { - "text": "\n\n \n ", - "page_start": 42, - "page_end": 42, - "source_file": "Excel Training Manual 1.pdf" + "text": "", + "page_start": 259, + "page_end": 259, + "source_file": "00-80T-80.pdf" }, { - "text": "Development Program of the Year, Deal of the Year, Energy Producer \nof the Year and the Industry Leadership Award. Chesapeake was one \nof only two companies selected as a finalist in five or more categories. \nThe company was also honored in 2010 with a Certificate of Recognition \nfor our military reserve recruiting efforts, named a 2010 Best Diversity \nCompany by Engineering & Information Technology Magazine and rec- \nognized for Best Investor Relations in Energy Sector and Best Investor \nRelations Website at the 2010 IR Magazine U.S. Awards. \n\nas the best employees in the industry. From our beginning 22 years ago \nwith 10 employees in Oklahoma City to employing more than 10,000 \npeople across 15 states today, Chesapeake has always focused on build- \ning first-class human resources within a distinctive corporate culture. Talk \nto Chesapeake employees and you will note genuine pride and great \nenthusiasm about the company and the critical role that we play in deliv- \nering increasing quantities of clean and affordable American natural gas \nand valuable and reliable liquids to energy consumers across the country. \nChesapeake employees are distinctive in other ways as well. They \nare much younger than the industry average, with half of our almost \n4,000 Oklahoma City-based headquarters employees 33 years old \nor younger. Their enthusiasm and willingness to learn create an ", - "page_start": 14, - "page_end": 14, - "source_file": "NYSE_CHK_2010.pdf" + "text": "", + "page_start": 257, + "page_end": 257, + "source_file": "00-80T-80.pdf" }, { - "text": "As we explore for and produce clean, affordable, abundant, American \nnatural gas, we provide an important solution to our nation’s energy \nchallenges and its quest for energy independence. With at least a 200- \nyear supply of natural gas located right here in the U.S., this versatile \nfuel can be used to not only heat homes, create electricity and meet \nAmerica’s transportation needs, but also to fuel the country’s future \nby creating jobs and stimulating local and national economies through \ninvestment and taxes. \n\nenergy development should be as small and temporary as possible. \nThese practices are continually evolving and further improving as \nChesapeake and the industry develop new innovative techniques and \napproaches to business. \n\nIn addition to our BMPs, Chesapeake has also initiated several \ninnovative internal programs focused on water recycling and greener \nhydraulic fracturing processes. \n\n***Aqua Renew*®**\nCreated to meet the challenge of reducing our water usage, Chesapeake’s \n*Aqua Renew*® program uses state-of-the-art technology to recycle pro- \nduced water. Since the \ncompany’s preliminary \nreclamation project \nin \n2006, our focus on water reuse and conservation has become a company- \nwide endeavor, stretching from the Barnett Shale of North Texas to the \nMarcellus Shale of northern Pennsylvania. ", - "page_start": 28, - "page_end": 28, - "source_file": "NYSE_CHK_2010.pdf" + "text": "", + "page_start": 258, + "page_end": 258, + "source_file": "00-80T-80.pdf" }, { - "text": "2010 also marked a truly transformative year for our industry. We and \na handful of our peers enhanced our capabilities to find and produce sig- \nnificant new resources of oil and natural gas liquids (collectively, “liquids”) in \nunconventional formations. Chesapeake and these other companies combined \ncreativity, innovation and technology to reinvent the way that our industry \nexplores for and produces natural gas and liquids. \n\nFurthermore, 2010 was the year when global energy companies more \nfully recognized the importance of these developments and the tremendous \nopportunities that have emerged in the U.S. Through a wide variety of trans- \nactions, including several led by Chesapeake, the global energy industry made \nit clear that the assets owned by Chesapeake and some of its peers are the most \nattractive in the world. This realization has already increased the value of high- \nquality unconventional assets in the U.S. and, in time, should lead to higher \nstock prices for the leading U.S. onshore E&P companies, especially Chesapeake. Simply put, the global energy \nindustry is beating a path to our door, and we are welcoming it with open arms. \n\nBefore we move ahead, I want to emphasize that even though 2010 was a year of transition and achievement, \nour stock price was essentially unchanged. Nevertheless, it was still a very strong year for the company operation- \nally and financially. Here are the year’s highlights for your review: ", - "page_start": 6, - "page_end": 6, - "source_file": "NYSE_CHK_2010.pdf" + "text": "", + "page_start": 7, + "page_end": 7, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "*Rig lights come on at twilight in the Permian Basin of Texas, where crews drill around the clock in the liquids-rich Bone Spring play. This is the newest in a*\n*series of energy booms that has enabled West Texas cities like Midland to prosper for almost 100 years.*\n\nI am pleased to report that we have apparently finally convinced \nPresident Barack Obama and Congressional leadership to recognize that \nthe energy path America is on today is completely unsustainable. There \nappears to be growing recognition that it is spectacularly dangerous for \nAmerica to continue importing 9 million barrels of oil per day and exporting more than $1 billion per day in national wealth to oil exporting countries. \nAmerica’s undiminished appetite for foreign oil has created the larg- \nest wealth transfer in the history of the world. The political leadership \nin Washington, D.C., has not seemed overly concerned about this issue \nuntil recently. However, after President Obama’s recent speech calling ", - "page_start": 16, - "page_end": 16, - "source_file": "NYSE_CHK_2010.pdf" + "text": "", + "page_start": 7, + "page_end": 7, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "**It is often said that the energy industry has an aging work force that is fast approaching**\n**retirement age. How is Chesapeake addressing this?**\nIt is no secret that there is a shortage of experienced professionals in the natural gas and oil industry. The industry down- \nturn of the 1980s and 1990s discouraged many from pursuing energy careers. In the following decades, strong compe- \ntition from other industries lured away many of the best and brightest science and technology graduates, and today \nmany experienced professionals who stayed in the industry through the downturn are approaching retirement age. \nAs a result, one of our industry’s greatest challenges over the past 10 years has been to develop a new generation \nof natural gas and oil professionals who have the knowledge and experience required to meet the nation’s growing \nenergy needs. \n\nIn 2000 Chesapeake was one of the first companies to recognize this trend and to understand how recruiting \nand training a new generation of energy professionals would impact the company’s future success and its ability to \ncompete in the industry. At that time, Chesapeake formulated a business strategy to address future staffing needs \nand decided to create a world-class college recruiting and intern program to recruit the most promising industry \ntalent. Today, Chesapeake hosts more than 150 interns every summer in its internship program, many of whom go \non to become full-time Chesapeake employees upon graduation. In addition, we have 350 students who receive \nscholarships through Chesapeake programs, and our staff of college recruiters has developed strong relationships with professors, department heads \nand career counselors at the more than 31 universities where we actively recruit. \n\nMartha Burger \nSenior Vice President – \nHuman and Corporate Resources ", - "page_start": 22, - "page_end": 22, - "source_file": "NYSE_CHK_2010.pdf" + "text": "", + "page_start": 7, + "page_end": 7, + "source_file": "Excel Training Manual 1.pdf" }, { - "text": "**12**| LETTER TO SHAREHOLDERS \n\nwet natural gas and dry natural gas), similar to the components of the \nEagle Ford Shale. We have made a large commitment to this play and \nhave acquired approximately 1.2 million net leasehold acres and expect \nto increase this total to as much as 1.5 million net leasehold acres in the \ncoming months. We are currently using three rigs to evaluate the play \nand believe our leasehold could support the drilling of up to 12,000 net \nwells. This is an area where we anticipate bringing in a joint venture \npartner late in 2011 or early in 2012. \n\natmosphere of vitality and energy at Chesapeake, important ingredi- \nents of our distinctive culture. These attributes, along with a vibrant \nand attractive corporate headquarters campus, low levels of bureau- \ncracy, great assets and a well-executed corporate strategy combine to \ncreate our culture of success and innovation. \n\nThis has generated extremely positive external feedback as \nChesapeake was recently recognized for the fourth consecutive year \nas one of the FORTUNE 100 Best Companies to Work For®(3) in the U.S. \nIn fact, we moved up to #32 overall and #1 in our industry — we are \nvery proud of having created and sustained what is now considered \nthe best place to work in all of the U.S. energy production industry. ", - "page_start": 14, - "page_end": 14, - "source_file": "NYSE_CHK_2010.pdf" + "text": "", + "page_start": 258, + "page_end": 258, + "source_file": "00-80T-80.pdf" }, { - "text": "10,000 other Chesapeake employees, that every day we are working \nhard to create shareholder value and a better future for our communi- \nties, our states and our country through the continued discovery and \ndevelopment of unconventional natural gas and liquids. \n\n*Advancing technology for cleaner operations: solar panels at a West Texas well power*\n*telemetry systems that provide pumpers with real-time information on oil and water*\n*tank levels to alarm them when levels near capacity, preventing tank spills.*\n\nThe good news, however, is that America can now secure a new \nenergy future thanks to Chesapeake and a handful of other leading U.S. \nE&P companies that have reinvented the process of finding natural gas \nand oil during the past five years. In doing so, we have discovered twice \nthe resources of natural gas in the U.S. that Saudi Arabia possesses in oil. \nFurthermore, these same few companies that led the unconventional \nnatural gas revolution have in just the past two years also reinvented \nthe way in which we can find large new oil resources onshore in the U.S. \nIn fact, I believe the U.S. can possibly increase its production of oil from \nthe current 5.8 million barrels per day by 30–50% during the next 5–10 \nyears, thereby potentially reaching the President’s 2025 goal of reducing \nforeign oil imports by 33%, 5–10 years earlier than hoped. \n\nBest regards, ", - "page_start": 17, - "page_end": 17, - "source_file": "NYSE_CHK_2010.pdf" + "text": "", + "page_start": 258, + "page_end": 258, + "source_file": "00-80T-80.pdf" }, { - "text": "**CORPORATE PROFILE**\n\nChesapeake Energy Corporation is the second-largest producer of \nnatural gas, a Top 15 producer of oil and natural gas liquids and \nthe most active driller of new wells in the U.S. \nHeadquartered in Oklahoma City, the company’s operations are focused on discovering and developing \n\nunconventional natural gas and oil fields onshore in the U.S. Chesapeake owns leading positions in \n\nthe Barnett, Haynesville, Bossier, Marcellus and Pearsall natural gas shale plays and in the Granite \n\nWash, Cleveland, Tonkawa, Mississippian, Bone Spring, Avalon, Wolfcamp, Wolfberry, Eagle Ford, \n\nNiobrara and Utica unconventional liquids-rich plays. \n\nThe company has also vertically integrated its oper- \n\nations and owns substantial midstream, compression, \n\ndrilling and oilfield service assets. Chesapeake’s stock \n\nis listed on the New York Stock Exchange under \n\nthe symbol CHK. Further information is available at \n\n**www.chk.com**where Chesapeake routinely posts \n\nannouncements, updates, events, investor informa- \n\ntion, presentations and press releases. ", - "page_start": 2, - "page_end": 2, - "source_file": "NYSE_CHK_2010.pdf" + "text": "", + "page_start": 7, + "page_end": 7, + "source_file": "Excel Training Manual 1.pdf" } ] }