diff --git "a/results_retrieval/emb_bge_base/retrieval_default_docling.json" "b/results_retrieval/emb_bge_base/retrieval_default_docling.json" new file mode 100644--- /dev/null +++ "b/results_retrieval/emb_bge_base/retrieval_default_docling.json" @@ -0,0 +1,22210 @@ +[ + { + "top_k": 10, + "mrr": 0.5063333333333333, + "recall": 0.7466666666666667, + "count_empty_strings": 4 + }, + [ + { + "references": { + "source_file": "uksi_20200438_en.pdf", + "query": "What does \"new account\" mean according to the international tax compliance from 2020 ?", + "target_page": 2, + "target_passage": "“new account” means a financial account maintained by a reporting financial institution opened on or after 13th May 2020", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Amendments to the International Tax Compliance Regulations 2015\n(a) 'new account' means a financial account maintained by a reporting financial institution( a ) opened on or after 13th May 2020;\n(b) 'pre-existing account' means-\n(i) a financial account maintained by a reporting financial institution as of 12th May 2020, or\n(ii) a financial account within Section VIII(C)(9)(b) of Annex 1 of the DAC( b ), but in the application of that provision the references to 'subparagraph C(9)(a)' are to be read as references to paragraph (i) of this sub-paragraph.\n(4) The accounts are-\n(a) non-registered pension arrangements where the annual contributions are limited to £50,000 and funds contributed cannot be accessed before the age of 55 except in circumstances of serious ill health;\n(b) Premium Bonds issued by the UK National Savings and Investments;\n(c) Fixed Interest Savings Certificates issued by the UK National Savings and Investments; and\n(d) Index Linked Savings Certificates issued by the UK National Savings and Investments.'.\n(5) In Schedule 2, omit paragraphs 2, 6, 8 and 9.", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20200438_en.pdf" + }, + { + "text": "The International Tax Compliance (Amendment) Regulations 2020\nMade\n-\n-\n-\n-\n20th April 2020\nLaid before the House of Commons\n21st April 2020\nComing into force\n- -\n13th May 2020\nThe Treasury make these Regulations in exercise of the powers conferred by section 222 of the Finance Act 2013( a ):", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20200438_en.pdf" + }, + { + "text": "Amendments to the International Tax Compliance Regulations 2015\n2. -(1) The International Tax Compliance Regulations 2015( b ) are amended as follows.\n(2) In regulation 1(3)(b)(i), for '16th May 2019' substitute '19th April 2020'( c ).\n(3) In regulation 3(4A)(a), at the beginning insert 'subject to regulation 24(3)'.\n(4) In regulation 24-\n(a) in the table in paragraph (2), in the column headed 'the CRS'-\n(i) at the beginning of the entry for 'new account' insert 'subject to paragraph (3)', and\n(ii) at the beginning of the entry for 'pre-existing account' insert 'subject to regulation 3(4A)(a) and paragraph (3)', and\n(b) after paragraph (2) insert-\n'(3) In respect of the accounts listed in paragraph (4)-\n( a ) 2013 c. 29; section 222 was amended by section 50 of the Finance (No. 2) Act 2015 (c. 33) but the amendments are not relevant to these Regulations.\n( b ) S.I. 2015/878 (referred to in these footnotes as 'the principal Regulations'); relevant amending instruments are S.I. 2017/598, 2018/490 and 2019/881.\n( c ) In accordance with the common reporting standard for automatic exchange of financial account information developed by the Organisation for Economic Co-operation and Development and adopted by the United Kingdom, the United Kingdom exchanges information received from financial institutions under the principal Regulations with a territory which is a 'Reportable Jurisdiction' under the CRS and with which the United Kingdom has entered into international exchange arrangements for that year. Reportable Jurisdictions are identified in a published list available at https://www.gov.uk/hmrcinternal-manuals/international-exchange-of-information/ieim402340. A hard copy of this list is available for inspection at the offices of HMRC at 10 South Colonnade, 9th Floor, Canary Wharf, London E14 4PU.", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20200438_en.pdf" + }, + { + "text": "Transitional provision\n3. -(1) For the purposes of the International Tax Compliance Regulations 2015, in relation to an account that by virtue of regulation 2(5) ceases to be an excluded account, the calendar year 2020 is treated as beginning on 13th May 2020 and ending on 31st December 2020.\n(2) Where in consequence of paragraph (1) it is necessary to apportion an amount for the calendar year 2020 to the period ending immediately before 13th May 2020 and the period beginning with that date, it is to be apportioned-\n(a) on a time basis according to the respective length of the periods, or\n(b) if that method would produce a result that is unjust or unreasonable, on a just and reasonable basis.\nDavid Rutley Maggie Throup\n20th April 2020\nTwo of the Lords Commissioners of Her Majesty's Treasury", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20200438_en.pdf" + }, + { + "text": "Citation and commencement\n1. These Regulations may be cited as the International Tax Compliance (Amendment) Regulations 2020 and come into force on 13th May 2020.", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20200438_en.pdf" + }, + { + "text": "EXPLANATORY NOTE\n(This note is not part of the Regulations)\nThe Regulations amend the International Tax Compliance Regulations 2015 ('the principal Regulations') which give effect to agreements and arrangements reached between the United Kingdom and other jurisdictions to improve international tax compliance.\nRegulation 2(2) extends the application of the principal Regulations to arrangements entered into by the United Kingdom for the exchange of financial account information with other jurisdictions up to 19th April 2020, the date before the Regulations are made.\nRegulation 2(5) omits various accounts from the category of excluded accounts. Regulation 2(4)(b) amends the definitions of 'new account' and 'pre-existing account' in relation to those\n( a ) 'Financial account' and 'reporting financial institution' are defined in the table in regulation 24(2) of the principal Regulations.\n( b ) 'The DAC' is defined in regulation 1(3)(a) of the principal Regulations.\n2\naccounts so that these terms are defined by reference to the date that those accounts ceased to be excluded accounts. Regulation 2(3) and (4)(a) make consequential amendments.\nRegulation 3 makes a transitional provision for the calendar year 2020 in relation to accounts which were previously excluded accounts.\nA Tax Information and Impact Note covering the International Tax Compliance Regulations 2015 was published on 18th March 2015 and is available on the HMRC website at https://www.gov.uk/government/publications/tax-administration-regulations-to-implement-theuks-automatic-exchange-of-information-agreements. It remains an accurate summary of the impacts that apply to this instrument.\n' Crown copyright 2020\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, Controller of Her Majesty's Stationery Office and Queen's Printer of Acts of Parliament.\n3\n£4.90\nUK202004201005 04/2020 19585\nhttp://www.legislation.gov.uk/id/uksi/2020/438", + "page_start": 1, + "page_end": 3, + "source_file": "uksi_20200438_en.pdf" + }, + { + "text": "New Accounting S tandards\nWe adopted the following new accounting standards effective January 1, 2013, of which none had a material impact on prior periods.\nGLYPH<129> IFRS 10, Consolidated Financial Statements (IFRS 10) As a result of the adoption of IFRS 10, we have changed our approach to determining whether we have control over and consequently whether we consolidate our investees. IFRS 10 introduces a new control model that is applicable to all investees. Among other things, it requires the consolidation of an investee if we control the investee on the basis of de facto circumstances. In accordance with the transitional provisions of IFRS 10, we re-assessed the control conclusion for our investees at January 1, 2013. We made no changes in the current or comparative period as a result of this assessment.\nGLYPH<129> IFRS 11, Joint Arrangements (IFRS 11) As a result of the adoption of IFRS 11, we have changed how we evaluate our interests in joint arrangements. Under IFRS 11, we classify our interests in joint arrangements as either joint operations or joint ventures depending on our right to the assets and obligations for the liabilities of the arrangements. When making this assessment, we consider the structure of the arrangements, the legal form of any separate vehicles, the contractual terms of the arrangements and other facts\nand circumstances. We have re-evaluated our involvement in our joint arrangements and have accounted for these either using the proportionate consolidation method, or the equity method depending on whether the investment is defined as a joint operation or a joint venture, respectively. The adoption of IFRS 11 was not material to the current or comparative years.", + "page_start": 84, + "page_end": 84, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "14. RETAINED EARNINGS\nfor retirement benefit by foreign subsidiaries (Note 2(b)) ................................................................., = . Effect of adoption of a new accounting standard for retirement benefit by foreign subsidiaries (Note 2(b)) ................................................................., Millions of yen.2004 Mar. 31, 2005 = -. Effect of adoption of a new accounting standard for retirement benefit by foreign subsidiaries (Note 2(b)) ................................................................., Millions of yen.2003 Mar. 31, 2004 = (18,132). Effect of adoption of a new accounting standard for retirement benefit by foreign subsidiaries (Note 2(b)) ................................................................., Millions of yen.2002 Mar. 31, 2003 = -. Effect of adoption of a new accounting standard for retirement benefit by foreign subsidiaries (Note 2(b)) ................................................................., Thousands of U.S. dollars.2004 Mar. 31, 2005 = -. Decrease in unfunded retirement benefit obligation", + "page_start": 86, + "page_end": 86, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "AASB 9/IFRS 9 Financial Instruments\nAASB 9/IFRS 9 introduces new requirements for the classification, measurement, and derecognition of financial assets and financial liabilities. The final version of IFRS 9 supersedes all previous versions of the standard. However, for annual periods beginning before 1 January 2018, an entity may elect to apply those earlier versions of IFRS 9 if the entity's relevant date of initial application is before 1 February 2015. The effective date of this standard is for fiscal years beginning on or after 1 January 2018. Management is currently assessing the impact of the new standard but it is not expected to have a material impact on the Group's consolidated financial statements.\n- 71 -", + "page_start": 72, + "page_end": 72, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "Recent Accounting Pronouncements\nGLYPH<129> IFRIC 21, Levies (IFRIC 21) - In May 2013, the IASB issued a new accounting guidance IFRIC 21, which provides guidance on when to recognize a liability for a levy imposed by a government, both for levies that are accounted for in accordance with IAS 37 Provisions, Contingent Liabilities and Contingent Assets and those where the timing and amount of the levy is certain. The Interpretation identifies the obligating event for the recognition of a liability as the activity that triggers the payment of the levy in accordance with the relevant legislation. It provides the following guidance on recognition of a liability to pay levies (i) the liability is recognized progressively if the obligating event occurs over a period of time, and (ii) if an obligation is triggered on reaching a minimum threshold, the liability is recognized when that minimum threshold is reached. The standard is effective for annual periods beginning on or after January 1, 2014, with early adoption permitted. We are assessing the impact of this new standard on our consolidated financial statements.\nGLYPH<129> IFRS 9, Financial Instruments (IFRS 9) In October 2010, the IASB issued IFRS 9, which replaces IAS 39, Financial Instruments: Recognition and Measurement, establishes principles for the financial reporting of financial assets and financial liabilities that will present relevant and useful information to users of financial statements for their assessment of the amounts, timing and uncertainty of an entity's future cash flows. This new standard also includes a new general hedge accounting standard which will align hedge accounting more closely with risk management. It does not fundamentally change the types of hedging relationships or the requirement to measure and recognize ineffectiveness, however it will provide more hedging strategies that are used for risk management to qualify for hedge accounting and introduce more judgment to assess the effectiveness of a hedging relationship. The mandatory effective date of IFRS 9 has not yet been communicated by the IASB. We are assessing the impact of this new standard on its consolidated financial statements.", + "page_start": 85, + "page_end": 85, + "source_file": "NYSE_RCI_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "uksi_20200438_en.pdf", + "query": "Under which conditions can the funds of a non-registered pension arrengements be obtained before the age of 55 ?", + "target_page": 2, + "target_passage": "non-registered pension arrangements where the annual contributions are limited to £50,000 and funds contributed cannot be accessed before the age of 55 except in circumstances of serious ill health", + "chunk_present": { + "presence": true, + "index": 7 + } + }, + "top_chunk": [ + { + "text": "115. P ensions law s and protection of pensions rights\n(3) W here a person is entitled to exercise an option as to w hich of tw o or m ore law s shall apply in his or her case, the law for w hich he or she opts shall, for the purposes of this section, be deem ed to be m ore favourable to him or her than the other law or law s.\n(4) A ll pensions benefits shall (except to the extent to w hich under any law providing for the funding of pensions benefits they are a charge on a fund established by that law and have been duly paid out of that fund to the person or authority to w hom paym ent is due) be a charge on the C onsolidated Fund.\n(5) In this section \"pensions benefits\" m eans any pensions, com pensation, gratuities or other like allow ances for persons in respect of their service as public officers or as m em bers of the arm ed forces or for the w idow s, children, dependants or personal representatives of such persons in respect of such service.\n(6) R eferences in this section to the law w ith respect to pensions benefits include (w ithout prejudice to their generality) references to the law regulating the circum stances in w hich such benefits m ay be granted or in w hich the grant of such benefits m ay be refused, the law regulating the circum stances in w hich any such benefits that have been granted m ay be w ithheld, reduced in am ount or suspended and the law regulating the am ount of any such benefits.\n(7) In this section references to service as a public officer include references to service as a public officer of the form er P rotectorate of B echuanaland.\nC opyright G overnm ent of B otsw ana", + "page_start": 49, + "page_end": 49, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "115. P ensions law s and protection of pensions rights\n(1) The law to be applied w ith respect to any pensions benefits that w ere granted to any person before the com ing into operation of this C onstitution shall be the law that w as in force at the date on w hich those benefits w ere granted or any law in force at a later date that is not less favourable to that person.\n(2) The law to be applied w ith respect to any pensions benefits (not being benefits to w hich subsection (1) of this section applies) shall-\n( a ) in so far as those benefits are w holly in respect of a period of service as a public officer that com m enced before the date on w hich this C onstitution com es into operation, be the law that w as in force im m ediately before that date; and\n( b ) in so far as those benefits are w holly or partly in respect of a period of service as a public officer that com m enced after the date on w hich this C onstitution com es into operation, be the law in force on the date on w hich that period of service com m enced,\nor any law in force at a later date that is not less favourable to that person.", + "page_start": 49, + "page_end": 49, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "40. Salary and allow ances of P resident\n(1) The P resident shall receive such salary and allow ances as m ay be prescribed by resolution of the N ational A ssem bly, w hich shall be a charge on the general revenues of the R epublic.\n(2) The salary and allow ances of the P resident shall not be altered to his or her disadvantage during his or her period of office.\n(3) A person w ho has held the office of P resident shall receive such pension or, upon the expiration of his or her term of office, such gratuity as m ay be prescribed by resolution of the N ational A ssem bly, w hich shall be a charge on the C onsolidated Fund.", + "page_start": 21, + "page_end": 21, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "116. P ow er of C om m issions in relation to pensions, etc.\n(5) In this section \"pensions benefits\" m eans any pensions, com pensation, gratuities or other like allow ances for persons in respect of their service as public officers (including service as public officers of the form er P rotectorate of B echuanaland) or for the w idow s, children, dependants or personal representatives of such persons in respect of such service.", + "page_start": 50, + "page_end": 50, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "24. Employee benefits and share-based payments continued\nend of year Number = . Year ended 30 June 2012 - Employees, Vested and exercisable at end of year Number = . 07 Jul 2006, Expiry date = 01 Jul 2011. 07 Jul 2006, Exercise price $ = $6.00. 07 Jul 2006, Balance start of year Number = 50,000. 07 Jul 2006, Granted during year Number = -. 07 Jul 2006, Expired during year Number = (50,000). 07 Jul 2006, Balance end of year Number = -. 07 Jul 2006, Vested and exercisable at end of year Number = -. 04 Apr 2008, Expiry date = 03 Apr 2013. 04 Apr 2008, Exercise price $ = $4.68. 04 Apr 2008, Balance start of year Number = 58,535. 04 Apr 2008, Granted during year Number = -. 04 Apr 2008, Expired during year Number = (58,535). 04 Apr 2008, Balance end of year Number = -. 04 Apr 2008, Vested and exercisable at end of year Number = -. 04 Apr 2008, Expiry date = 03 Apr 2013. 04 Apr 2008, Exercise price $ = $6.00. 04 Apr 2008, Balance start of year Number = 566,001. 04 Apr 2008, Granted during year Number = -. 04 Apr 2008, Expired during year Number = (85,001). 04 Apr 2008, Balance end of year Number = 481,000. 04 Apr 2008, Vested and exercisable at end of year Number = 481,000. Total, Expiry date = . Total, Exercise price $ = . Total, Balance start of year Number = 674,536. Total, Granted during year Number = -. Total, Expired during year Number = (193,536). Total, Balance end of year Number = 481,000. Total, Vested and exercisable at end of year Number = 481,000. Weighted average exercise price, Expiry date = Weighted average exercise price. Weighted average exercise price, Exercise price $ = . Weighted average exercise price, Balance start of year Number = $5.89. Weighted average exercise price, Granted during year Number = -. Weighted average exercise price, Expired during year Number = $5.60. Weighted average exercise price, Balance end of year Number = $6.00. Weighted average exercise price, Vested and", + "page_start": 97, + "page_end": 97, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "NOTE 22: PENSIONS\nWe have contributory and non-contributory defined benefit pension plans that are made available to most of our employees. The plans provide pensions based on years of service, years of contributions and earnings. We do not provide any non-pension post-retirement benefits. We also provide unfunded supplemental pension benefits to certain executives.\nThe assets of the defined benefit pension plans are held in segregated accounts isolated from our assets. We administer the defined benefit pension plans pursuant to applicable regulations, the Statement of Investment Policies and Procedures and to the mandate of the Pension Committee of the Board of Directors. The Pension Committee of the Board of Directors oversees our administration of the defined benefits pension plans, which includes the following principal areas:\nGLYPH<129> overseeing the funding, administration, communication and investment management of the plans\nGLYPH<129> selecting and monitoring the performance of all third parties performing duties in respect of the plans, including audit, actuarial and investment management services\nGLYPH<129> proposing, considering and approving amendments to the defined benefit pension plans\nGLYPH<129> proposing, considering and approving amendments of the Statement of Investment Policies and Procedures\nGLYPH<129> reviewing management and actuarial reports prepared in respect of the administration of the defined benefit pension plans\nGLYPH<129> reviewing and approving the audited financial statements of the defined benefit pension plan funds.\nThe assets of the defined benefit pension plans are invested and managed following all applicable regulations and the Statement of Investment Policies and Procedures, and reflect the characteristics and asset mix of each defined benefit pension plan. Investment and market return risk is managed by:\nGLYPH<129> contracting professional investment managers to execute the investment strategy following the Statement of Investment Policies and Procedures and regulatory requirements\nGLYPH<129> specifying the kinds of investments that can be held in the plans and monitoring compliance\nGLYPH<129> using asset allocation and diversification strategies, and\nGLYPH<129> purchasing annuities from time to time.\nThe funded pension plans are registered with the Office of the Superintendent of Financial Institutions and are subject to the Federal Pension Benefits Standards Act. The plans are also registered with the Canada Revenue Agency and are subject to the Canada Income Tax Act. The benefits provided under the plans and the contributions to the plans are funded and administered in accordance with all applicable legislation and regulations.", + "page_start": 121, + "page_end": 121, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Other Transactions with the Company or its Controlled Entities\nAgreements exist with the non-executive Directors appointed prior to 1 January 2004 providing for the payment of a sum on retirement from office as a Director in accordance with shareholder approval at the 1989 Annual General Meeting. From 30 June 2004 the retirement allowances ceased to accrue.\nThe transactions referred to above occurred on terms no more favourable than would have been adopted if dealing at arm's length, do not have the potential to affect adversely decisions about the allocation of scarce resources and are trivial in nature.", + "page_start": 81, + "page_end": 81, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "Amendments to the International Tax Compliance Regulations 2015\n(a) 'new account' means a financial account maintained by a reporting financial institution( a ) opened on or after 13th May 2020;\n(b) 'pre-existing account' means-\n(i) a financial account maintained by a reporting financial institution as of 12th May 2020, or\n(ii) a financial account within Section VIII(C)(9)(b) of Annex 1 of the DAC( b ), but in the application of that provision the references to 'subparagraph C(9)(a)' are to be read as references to paragraph (i) of this sub-paragraph.\n(4) The accounts are-\n(a) non-registered pension arrangements where the annual contributions are limited to £50,000 and funds contributed cannot be accessed before the age of 55 except in circumstances of serious ill health;\n(b) Premium Bonds issued by the UK National Savings and Investments;\n(c) Fixed Interest Savings Certificates issued by the UK National Savings and Investments; and\n(d) Index Linked Savings Certificates issued by the UK National Savings and Investments.'.\n(5) In Schedule 2, omit paragraphs 2, 6, 8 and 9.", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20200438_en.pdf" + }, + { + "text": "24. Employee benefits and share-based payments continued\nYear ended 30 June 2013 - Employees, Expiry date = Year ended 30 June 2013 - Employees. Year ended 30 June 2013 - Employees, Exercise price $ = Year ended 30 June 2013 - Employees. Year ended 30 June 2013 - Employees, Balance start of year Number = Year ended 30 June 2013 - Employees. Year ended 30 June 2013 - Employees, Granted during year Number = . Year ended 30 June 2013 - Employees, Expired during year Number = . Year ended 30 June 2013 - Employees, Balance end of year Number = . Year ended 30 June 2013 - Employees, Vested and exercisable at end of year Number = . 04 Apr 2008, Expiry date = 03 Apr 2013. 04 Apr 2008, Exercise price $ = $6.00. 04 Apr 2008, Balance start of year Number = 481,000. 04 Apr 2008, Granted during year Number = -. 04 Apr 2008, Expired during year Number = (481,000). 04 Apr 2008, Balance end of year Number = -. 04 Apr 2008, Vested and exercisable at end of year Number = -. Total, Expiry date = . Total, Exercise price $ = . Total, Balance start of year Number = 481,000. Total, Granted during year Number = -. Total, Expired during year Number = (481,000). Total, Balance end of year Number = -. Total, Vested and exercisable at end of year Number = -. Weighted average exercise price, Expiry date = Weighted average exercise price. Weighted average exercise price, Exercise price $ = . Weighted average exercise price, Balance start of year Number = $6.00. Weighted average exercise price, Granted during year Number = -. Weighted average exercise price, Expired during year Number = $6.00. Weighted average exercise price, Balance end of year Number = -. Weighted average exercise price, Vested and exercisable at end of year Number = -. Year ended 30 June 2012 - Employees, Expiry date = Year ended 30 June 2012 - Employees. Year ended 30 June 2012 - Employees, Exercise price $ = Year ended 30 June 2012 - Employees. Year ended 30 June 2012 - Employees, Balance start of year Number = Year ended 30 June 2012 - Employees. Year ended 30 June 2012 - Employees, Granted during year Number = . Year ended 30 June 2012 - Employees, Expired during year Number = . Year ended 30 June 2012 - Employees, Balance", + "page_start": 97, + "page_end": 97, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Notes to Consolidated Financial Statements\nJune 30, 2024 and 2023\nGifts of cash and other assets are reported as contributions with donor restrictions if they are received with donor stipulations that limit the use of the donated assets or are restricted as to time. When a donor restriction expires, that is, when a stipulated time restriction ends or purpose restriction is accomplished, net assets with donor restrictions are reclassified to net assets without donor restrictions and reported in the consolidated statement of activities as net assets released from restrictions.", + "page_start": 10, + "page_end": 10, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2538.pdf", + "query": "What metrics are good indicators of the coverage of gas molecules on carbon nanotubes ?", + "target_page": 1, + "target_passage": "the bind- ing energy and scattering resistance of the molecules", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nThe ability to detect small concentrations of specific chemical species is fundamental for a variety of industrial and scientific processes as well as for medical applications and environmental monitoring [1]. In general, nanostructured materials should be well suited for sensor applications because of their large surface to volume ratio which makes them sensitive to molecular adsorption. Specifically, carbon nanotubes (CNT) [2] have been shown to work remarkably well as detectors of small gas molecules. This has been demonstrated both for individual CNTs [3-8] as well as for CNT networks [9, 10].\nPristine CNTs are known to be chemically inert - a property closely related to their high stability. As a consequence, only radicals bind strong enough to the CNT to notably affect its electrical properties [2, 5, 11-13]. To make CNTs attractive for sensor applications thus requires some kind of functionalization, e.g. through doping or decoration of the CNT sidewall [13-21]. Ideally, this type of functionalization could be used to control not only the reactivity of the CNT but also the selectivity towards specific chemical species.\nIn this work we consider the possibility of using CNTs doped by 3d transition metal atoms for chemical gas sensing. We use computational screening to systematically identify the most promising dopant candidates for detection of three different target molecules (CO, NH3, H2S) under typical atmospheric conditions. The screening procedure is based on the calculation of two microscopic descriptors: the binding energy and scattering resistance of the molecules when adsorbed on a doped CNT. These two quantities give a good indication of the gas coverage and impact on the resistance. For the most promising candidates we then employ a simple thermodynamic model of the CNT sensor. In this model, the binding energies are used to obtain the fractional coverage of the metallic sites as a function of the target molecule concentration under ambient conditions. Under the assumption of transport in the diffusive rather than localization regime, the\nchange in CNT resistivity may then be obtained from the calculated coverages and single impurity conductances.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2538.pdf" + }, + { + "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nJ. M. Garc´ıa-Lastra 1,2 , ∗ D. J. Mowbray 1,2 , K. S. Thygesen 2 , A. Rubio 1,3 , and K. W. Jacobsen 2 1 Nano-Bio Spectroscopy group and ETSF Scientific Development Centre, Dpto. F´ısica de Materiales, Universidad del Pa´ıs Vasco, Centro de F´ısica de Materiales CSIC-UPV/EHU- MPC and DIPC, Av. Tolosa 72, E-20018 San Sebasti´an, Spain 2 Center for Atomic-scale Materials Design, Department of Physics, Technical University of Denmark, DK-2800 Kgs. Lyngby, Denmark 3 Fritz-Haber-Institut der Max-Planck-Gesellschaft, Berlin, Germany\nWe use computational screening to systematically investigate the use of transition metal doped carbon nanotubes for chemical gas sensing. For a set of relevant target molecules (CO, NH3, H2S) and the main components of air (N2, O2, H2O), we calculate the binding energy and change in conductance upon adsorption on a metal atom occupying a vacancy of a (6,6) carbon nanotube. Based on these descriptors, we identify the most promising dopant candidates for detection of a given target molecule. From the fractional coverage of the metal sites in thermal equilibrium with air, we estimate the change in the nanotube resistance per doping site as a function of the target molecule concentration assuming charge transport in the diffusive regime. Our analysis points to Ni-doped nanotubes as candidates for CO sensors working under typical atmospheric conditions.\nPACS numbers: 73.63.-b, 68.43.-h, 73.50.Lw", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2538.pdf" + }, + { + "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nFIG. 2: Calculated (a) adsorption energy E ads in eV and (b) change in conductance ∆ G in units of G 0 = 2 e 2 /h for N2, O2, H2O, CO, NH3, and H2S on 3d transition metals occupying a monovacancy (top), divacancy I (middle), and divacancy II (bottom) in a (6,6) carbon nanotube.\nwhere E [ X @M@VC] is the total energy of molecule X on a transition metal atom occupying a vacancy, and E [ X ] is the gas phase energy of the molecule.\nFrom the adsorption energies plotted in Fig. 2(a), we see that the earlier transition metals tend to bind the adsorbates stronger than the late transition metals. The latest metals in the series (Cu and Zn) bind adsorbates rather weakly in the divacancy structures. We also note that O2 binds significantly stronger than any of the three target molecules on Ti, V, Cr, and Mn (except for Cr in divacancy I where H2S is found to dissociate). Active sites containing these metals are therefore expected to be completely passivated if oxygen is present in the background. Further, we find H2O is rather weakly bound to most of the active sites. This ensures that these types of sensors are robust against changes in humidity.\nIn thermodynamic equilibrium [27], the coverage of the active sites follows from\nΘ[ X ] = K [ X ] C [ X ] 1 + ∑ Y K [ Y ] C [ Y ] , (4)\nwhere K = k + /k -is the ratio of forward and backward rate constants for the adsorption reaction,\nK [ X ] = exp [ -E ads [ X ] + TS [ X ] k B T ] . (5)\nIn these expressions C [ X ] is the concentration of species X , S [ X ] is its gas phase entropy and T is the temperature. Experimental values for the gas phase entropies have been taken from Ref. [28].", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2538.pdf" + }, + { + "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\n[8] S. Brahim, S. Colbern, R. Gump, and L. Grigorian, 'Tailoring gas sensing properties of carbon nanotubes', J. Appl. Phys. 104 (2), 024502 (Jul. 2008), doi:10.1063/1.2956395.\n[9] C. Morgan, Z. Alemipour, and M. Baxendale, 'Variable range hopping in oxygen-exposed single-wall carbon nanotube networks', Phys. Stat. Solidi A 205 (6), 1394 (May 2008), doi:10.1002/pssa.200778113.\n[10] D. J. Mowbray, C. Morgan, and K. S. Thygesen, 'Influence of O2 and N2 on the conductivity of carbon nanotube networks', Phys. Rev. B 79 (19), 195431 (May 2009), doi:10.1103/PhysRevB.79.195431.\n[11] L. Valentini, F. Mercuri, I. Armentano, C. Cantalini, S. Picozzi, L. Lozzi, S. Santucci, A. Sgamellotti, and J. M. Kenny, 'Role of defects on the gas sensing properties of carbon nanotubes thin films: experiment and theory', Chem. Phys. Lett. 387 (4-6), 356 (Apr. 2004), doi:10.1016/j.cplett.2004.02.038.\n[12] Z. Zanolli and J.-C. Charlier, 'Defective carbon nanotubes for single-molecule sensing', Phys. Rev. B 80 (15), 155447 (Oct. 2009), doi:10.1103/PhysRevB.80.155447.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2538.pdf" + }, + { + "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nIn summary, we have presented a general model of nanostructured chemical sensors which takes the adsorption energies of the relevant chemical species and their individual scattering resistances as the only input. On the basis of this model we have performed a computational screening of transition metal doped CNTs, and found that Ni-doped CNTs are promising candidates for detecting CO in a background of air. The model may be applied straightforwardly to other nanostructures than CNTs, other functionalizations than metal doping and other gas compositions than air.\nThe authors acknowledge financial support from Spanish MEC (FIS2007-65702-C02-01), 'Grupos Consolidados UPV/EHU del Gobierno Vasco' (IT-319-07), e-I3 ETSF project (Contract Number 211956), 'Red Espa˜nola de Supercomputaci'on', NABIIT and the Danish Center for Scientific Computing. The Center for Atomic-scale Materials Design (CAMD) is sponsored by the Lundbeck Foundation. JMG-L acknowledges funding from Spanish MICINN through Juan de la Cierva and Jos'e Castillejo programs.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2538.pdf" + }, + { + "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nFIG. 3: Fractional coverage Θ in thermal equilibrium of Ni in a (a) monovacancy, (b) divacancy I, (c) divacancy II and (d) change in resistance ∆ R per dopant site as a function of CO concentration in a background of air at room temperature and 1 bar of pressure. The reference concentration of CO is taken to be C 0 = 0.1 ppm. Note the change from linear to log scale on the y -axis at ∆ R = 10 Ω .\nFor a given background composition we may thus estimate the fractional coverages for each available adsorbate for a given type of doping. As an example, Fig. 3(a)-(c) shows the fractional coverage of a Ni atom occupying a monovacancy, divacancy I, and divacancy II, versus CO concentration in a background of air at room temperature and 1 bar of pressure. Due to the relatively small binding energy of N2 and H2O as compared to O2 and CO, all Ni sites will be either empty or occupied by O2 or CO. In particular, Ni in a monovacancy (top panel of Fig. 3) will be completely oxidized for all relevant CO concentrations. For the Ni occupied divacancy II structures we find the coverage of CO changes significantly around toxic concentrations ( ∼ 10 ppm).", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2538.pdf" + }, + { + "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\n∗ Electronic address: juanmaria.garcia@ehu.es\n[1] Gas Sensing Materials, MRS Bull. , vol. 24 (1999).\n[2] J. C. Chalier, X. Blase, and S. Roche, 'Electronic and transport properties of nanotubes', Rev. Mod. Phys. 79 (2), 677 (May 2007), doi:10.1103/RevModPhys.79.677.\n[3] J. Kong, N. R. Franklin, C. Zhou, M. G. Chapline, S. Peng, K. Cho, and H. Dai, 'Nanotube molecular wires as chemical sensors', Science 287 (5453), 622 (Jan. 2000), doi:10.1126/science.287.5453.622.\n[4] P. G. Collins, K. Bradley, M. Ishigami, and A. Zettl, 'Extreme oxygen sensitivity of electronic properties of carbon nanotubes', Science 287 (5459), 1801 (Mar. 2000), doi:10.1126/science.287.5459.1801.\n[5] C. Hierold, Carbon Nanotube Devices: Properties, Modeling, Integration and Applications (Wiley-VCH, Weinheim, 2008).\n[6] F. Villalpando-P'aez, A. H. Romero, E. Mu˜noz-Sandoval, L. M. Mart'ınez, H. Terrones, and M. Terrones, 'Fabrication of vapor and gas sensors using films of aligned CN x nanotubes', Chem. Phys. Lett. 386 (1-3), 137 (Mar. 2004), doi:10.1016/j.cplett.2004.01.052.\n[7] A. R. Rocha, M. Rossi, A. Fazzio, and A. J. R. da Silva, 'Designing real nanotube-based gas sensors', Phys. Rev. Lett. 100 (17), 176803 (May 2008), doi:10.1103/PhysRevLett.100.176803.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2538.pdf" + }, + { + "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nWe now return to the discussion of the validity of Eq. (7). As mentioned, the series coupling of individual scatterers should be valid when l φ < d . However, even for l φ > d and assuming that the Anderson localization length, l loc in the system exceeds l φ , Eq. (7) remains valid if one replaces the actual resistance R by the sample averaged resistance 〈 R 〉 [29]. At room temperature under ambient conditions, interactions with external degrees of freedom such as internal CNT phonons and vibrational modes of the adsorbed molecules would rapidly randomize the phase of the electrons. Therefore Eq. (7) should certainly be valid in the limit of low doping concentrations. On the other hand, the total number of dopants, N , should be large enough for the statistical treatment of the coverage to hold. Finally, we stress that Eq. (7) represents a conservative estimate of the change in resistance. In fact, in the regime where l φ > l loc, i.e. in the Anderson localization regime, the resistance would be highly sensitive to changes in the fractional coverage of active sites. Calculation of the actual resistance of the CNT in this regime would, however, involve a full transport calculation in the presence of\n4\nall N impurities. At this point it suffices to see that the conservative estimates obtained from Eq. (7) predict measurable signals in response to small changes in concentration of the target molecules.\nTo our knowledge, controlled doping of CNTs with transition metal atoms has so far not been achieved. It has, however, been found that metal atoms incorporated into the CNT lattice during catalytic growth are afterwards very difficult to remove [30]. Furthermore, it has been shown that CNT vacancies, which are needed for the metallic doping, may be formed in a controlled way by irradiation by Ar ions [31]. This suggests that metallic doping of CNTs should be possible.", + "page_start": 2, + "page_end": 3, + "source_file": "1001.2538.pdf" + }, + { + "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nWe find that oxidation of the active metal site passivates the sensor in the case of doping by Ti, V, Cr, and Mn under standard conditions (room temperature and 1 bar of pressure). Among the remaining metals, we identify Ni as is the most promising candidate for CO detection. For this system the change in resistance per active site is generally significant ( > 1 Ω ) for small changes in CO concentration in the relevant range of around 0.1-10 ppm. Our approach is quite general and is directly applicable to other nanostructures than CNTs, other functionalizations than metal doping, and other backgrounds than atmospheric air.\nAll total energy calculations and structure optimizations have been performed with the real-space density functional theory (DFT) code GPAW [22] which is based on the projector augmented wave method. We use a grid spacing of 0.2 ˚ A for representing the density and wave functions and the PBE exchange correlation functional [23]. Transport calculations for the optimized structures have been performed using the nonequilibrium Green's function method [24] with an electronic Hamiltonian obtained from the SIESTA code [25] in a double zeta polarized (DZP) basis set. Spin polarization has been taken into account in all calculations.\nMetallic doping of a (6,6) CNT has been modeled in a supercell containing six repeated minimal unit cells along the CNT axis (dimensions: 15 ˚ A × 15 ˚ A × 14.622 ˚ A). For this size of supercell a Γ -point sampling of the Brillouin zone was found to be sufficient. The formation energy for creating a vacancy (VC) occupied by a transition metal atom (M) was calculated using the relation\nE form [ M @ VC ] = E [ M @ VC ] + nE [ C ] -E [ M@NT ] (1)\nwhere E [M@VC] is the total energy of a transition metal atom occupying a vacancy in the nanotube, n is the number of carbon atoms removed to form the vacancy, E [C] is the energy per carbon atom in a pristine nanotube, and E [M@NT]\n2", + "page_start": 0, + "page_end": 1, + "source_file": "1001.2538.pdf" + }, + { + "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\n[18] C. S. Yeung, L. V. Liu, and Y. A. Wang, 'Adsorption of small gas molecules onto Pt-doped single-walled carbon nanotubes', J. Phys. Chem. C 112 (19), 7401 (Apr. 2008), doi:10.1021/jp0753981.\n[19] T. Vo, Y.-D. Wu, R. Car, and M. Robert, 'Structures, interactions, and ferromagnetism of Fe-carbon nanotube systems', J. Phys. Chem. C 112 (22), 400 (May 2008), doi:10.1021/jp0761968.\n[20] J. A. Furst, M. Brandbyge, A.-P. Jauho, and K. Stokbro, ' Ab initio study of spin-dependent transport in carbon nanotubes with iron and vanadium adatoms', Phys. Rev. B 78 (19), 195405 (Nov. 2008), doi:10.1103/PhysRevB.78.195405.\n[21] A. V. Krasheninnikov, P. O. Lehtinen, A. S. Foster, P. Pyykko, and R. M. Nieminen, 'Embedding transitionmetal atoms in graphene: Structure, bonding, and magnetism', Phys. Rev. Lett. 102 (12), 126807 (Mar. 2009), doi:10.1103/PhysRevLett.102.126807.\n[22] J. J. Mortensen, L. B. Hansen, and K. W. Jacobsen, 'Real-space grid implementation of the projector augmented wave method', Phys. Rev. B 71 (3), 035109 (Jan. 2005), doi:10.1103/PhysRevB.71.035109.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2538.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2648.pdf", + "query": "What is the source of inaccuracy of the MSA3 model at high ionic concentrations ?", + "target_page": 3, + "target_passage": "At high concentration (about 1 mol l−1), the MSA3 overestimates the free energy", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\n˜ ˜ Using these two reference systems, the threecomponent MSA3 and BIMSA3, we obtain results in much better agreement with the MC simulations, as shown in Fig. 4. The diameters obtained for species 1, 2, and 3 are 3.65, 4.79, and 5.76 ˚ A for MSA3 and 3.69, 4.75 and 6.19 ˚ A for BIMSA3. The free ion diameters are similar for MSA2, MSA3, and BIMSA3. The pair diameter is smaller when modeled as a hard sphere (MSA3) than when modeled as a dumbbell (BIMSA3). At high concentration (about 1 mol l -1 ), the MSA3 overestimates the free energy, because the excluded volume repulsion becomes too important for the pairs to be represented as hard spheres. The BIMSA3 model is the closest to the MC simulation results. It is worth noting that even at the lowest concentration considered, the fraction of pairs (shown in the insert of Fig. 4), although less then 5%, has a non-negligible effect on the thermodynamics of the system.\nThis procedure also provides an accurate description of the structure over the whole range of concentrations. A development similar to the one that leads to Eq. (2) derives the average unpaired RDF from the corresponding paired quantities:\nρ i ρ j g ij ( k ) = ˜ ρ 3 ˜ w ( k ) (1 -δ ij ) + ˜ ρ i ˜ ρ j ˜ g ij ( k ) + ˜ ρ 3 ˜ w ( k / 2) [ ˜ ρ i ˜ g 3 i + ˜ ρ j ˜ g 3 j ] ( k ) (5) + ˜ ρ 2 3 [ ˜ w ( k / 2)] 2 ˜ g 33 ( k )\nFIG. 5: (Color online) RDF obtained from MC simulations (diamond), BIMSA3 (solid line), and MSA-fit (dot dashed) at two concentrations.", + "page_start": 2, + "page_end": 3, + "source_file": "1001.2648.pdf" + }, + { + "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nof the BIMSA3 appears to be negligible compared to the reference term for concentrations less than 1 mol l -1 . The perturbation can then be omitted to obtain a fully analytical theory, determined by the hard sphere diameters and the pair fraction given by LPT; with the free energy and the RDF given in terms of the BIMSA and MSA solutions, as described above. While the procedure we have followed uses two different approximations for the reference and perturbation terms (MSA vs BIMSA), these are known to be accurate for the systems under consideration and do not appear to be inconsistent with each other.\nTo conclude, we have combined MD simulations with LPT to construct simple models of electrolyte solutions which account for the molecular nature of the solvent. The final result is fully analytical and it yields the thermodynamic and structural properties of the solution, in agreement with the original molecular description. The methodology can in principle be adapted to any molecular description of the system (MD simulations involving interaction potentials accounting for polarization effects or Car-Parrinello MD simulations for example) as long as the ion-ion RDF are known. It can also be generalized to study interfaces. The method appears to be a promising approach toward the description of the specific effects of ions, especially for complex systems whose modeling requires an analytic solution.\nThe authors are particularly grateful to Werner Kunz for fruitful discussions.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2648.pdf" + }, + { + "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nThe RDF obtained within BIMSA3 are compared with the MC and MSA-fit results in Fig. 5. Our BIMSA3 model accounts for the strong molecular peak of the CIP and provides the correct distances of minimal approach; whereas the naive MSA-fit procedure ignores the former and gives poor estimates for the latter. At larger separations, the BIMSA3 results do not reproduce the oscillations observed in the MC simulations, but the corresponding energy oscillations in the effective potentials are less than k B T . In addition, the perturbation term\n[1] W. G. McMillan and J. E. Mayer, J. Chem. Phys. 13 , 276 (1945).\n[2] J. M. G. Barthel, H. Krienke, and W. Kunz, Physical Chemistry of Electrolyte Solutions (Springer, 1998).\n[3] L. Blum, in Theoretical Chemistry: Advances and Perspectives , edited by H. Eyring and D. Henderson (Academic Press, 1980), vol. 5, pp. 1-66.\n[4] L. Blum and O. Bernard, J. Stat. Phys. 79 , 569 (1995).\n[5] J.-F. Dufrˆeche et al., J. Phys. Chem. B 109 , 9873 (2005).\n[6] P. Jungwirth and D. J. Tobias, Chem. Rev. 106 , 1259 (2006).\n[7] W. Kunz, P. LoNostro, and B. W. Ninham, Curr. Opin. Colloid Interface Sci. 9 , 1 (2004).\n[8] B. Hess, C. Holm, and N. van der Vegt, Phys. Rev. Lett. 96 , 147801 (2006).\n[9] I. Kalcher and J. Dzubiella, J. Chem. Phys. 130 , 134507 (2009).\n[10] S. Gavryushov and P. Linse, J. Phys. Chem. B 110 , 10878 (2006)\n[11] A. P. Lyubartsev and A. Laaksonen, Phys. Rev. E 52 , 3730 (1995).\n4", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2648.pdf" + }, + { + "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nFIG. 2: (Color online) (a) Osmotic coefficient Φ in the McMillan-Mayer frame of reference. (diamond) MC simulations, (dot dashed) MSA2, (dot) Debye Huckel Limiting law (DHLL), (cross) experiments (Ref. [18] with the McMillanMayer to Lewis Randall conversion). (b) Minimization diameters. (dot dashed) MSA2 and (diamond) MSA-fit.\nWe first used LPT for a two-component system (Na + and Cl -free ions) within the MSA (model MSA2), for concentrations ranging from 0.1 to 2 . 0 mol l -1 . The minimization leads to almost constant diameters on the whole range of concentration: σ 1 = 3 . 67 ˚ A and σ 2 = 4 . 78 ˚ A. As shown in Fig. 2, these parameters yield osmotic coefficients close to MC calculations only at very low concentration, i.e., c ≤ 0 . 1 moll -1 (experimental values are given for indicative purposes only, since a perfect model will exactly match the MC results). For molar solutions, the LPT results differ considerably from MC calculations. This discrepancy can easily be understood by comparing the diameters found within the MSA2 calculation with the effective potentials given in Fig. 1. The anion/cation contact distance obtained within the MSA2 calculation is 4 . 2 ˚ A, which is in the region of the second minimum of the effective potential and corresponds to the situation where there is a single layer of water molecules between the ions. The first minimum of the potential, which corresponds to the contact ion pair (CIP) is thus completely ignored by the MSA2 calculation. If the MSA diameters are directly fitted to reproduce the MC osmotic pressure, much smaller values are obtained. These MSA-fit hydrated diameters, which are compared to the MSA2 diameters in the bottom part of Fig. 2, are averages of the CIP and the solvent-separated ion pair.", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2648.pdf" + }, + { + "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nJohn Jairo Molina 1 , 2 , 3 , ∗ Jean-Fran¸cois Dufrˆeche 1 , 2 , 3 , † Mathieu Salanne 1 , 2 , Olivier Bernard 1 , 2 , Marie Jardat 1 , 2 , and Pierre Turq 1 , 2 1 UPMC-Universit'e Paris 06, UMR 7195, PECSA, F-75005 Paris, France 2 CNRS, UMR 7195, PECSA, F-75005 Paris, France 3 Institut de Chimie S'eparative de Marcoule (ICSM), UMR 5257 CEA-CNRS-Universit'e Montpellier 2, Site de Marcoule,\nBˆatiment 426, BP 17171, 30207 Bagnols-sur-C'eze Cedex, France\nWe present a method to derive implicit solvent models of electrolyte solutions from all-atom descriptions; providing analytical expressions of the thermodynamic and structural properties of the ions consistent with the underlying explicit solvent representation. Effective potentials between ions in solution are calculated to perform perturbation theory calculations, in order to derive the best possible description in terms of charged hard spheres. Applying this method to NaCl solutions yields excellent agreement with the all-atom model, provided ion association is taken into account.\nSince the pioneering works of Debye, Huckel, and Onsager, electrolyte solutions have been commonly described by continuous solvent models, for which the McMillan-Mayer theory [1] provides a rigorous statistical-mechanical foundation. Within that level of description, simple phenomenological models such as the primitive model (PM), for which the ions are assimilated to charged hard spheres [2], can lead to explicit formulas for the thermodynamic and structural properties (e.g., with the help of the mean spherical approximation (MSA) [3] or the binding MSA (BIMSA) [4]). These models are the most practical to use [5], since they allow for a direct link between the experimental measurements and the microscopic parameters of the system. Nevertheless, they ignore the molecular structure of the solvent. Consequently, they cannot properly account for the complex specific effects of the ions, which appear in numerous biological, chemical, and physical interfacial phenomena [6, 7], without further developments.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2648.pdf" + }, + { + "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nTo overcome this difficulty, we have explicitly introduced the CIP in our model (species 3). Straightforward calculations, based on a characteristic-function formalism, allow us to define an equivalent model in which the free ions and the CIP are explicitly taken into account [19, 20]. We apply this formalism by defining a pair as an anion and a cation at a distance less than 4 ˚ A, which corresponds to the position of the effective potential maximum. The interaction between free, like charges in this new system remains unchanged, and the cation-anion interactions are easily approximated by ex-\n2\nFIG. 3: Effective pair potentials derived for MSA3 and BIMSA3. (a) Cation anion (dashed line: without taking the pair into account), (b) pair cation, (c) pair anion, and (d) pair pair. The internal potential of the pair β ˜ V int ( r ) is set equal to βV eff ij ( r ) for distances less than 4 ˚ A.\nrapolating the original potential at the barrier separating pairs from free ions (as shown in Fig. 3). We assume that the interaction potential is averaged over the rotational degrees of freedom of the CIP and thus pairwise additive. Hereafter, the quantities referring to such a three-component model are written with a tilda symbol. The short-range potentials involving the pair can be derived, in the infinite dilution limit, from an average of the contributing ion interactions. In Fourier space,\n˜ V SR 3 i ( k ) = w ( k / 2) [ V SR 1 i + V SR 2 i ] ( k ) , i = 1 , 2 (2a)\nwhere ˜ w ( r ) is the pair probability distribution\n˜ ˜ V SR 33 ( k ) = ˜ w ( k / 2) 2 [ V SR 11 + V SR 22 +2 V SR 12 ] ( k ) (2b)\n˜ w ( r ) = K -1 0 e -β ˜ V int ( r ) (2c)\n˜ V int ( r ) is the internal part of the pair potential (see Fig. 3), and K 0 is the association constant, defined as:", + "page_start": 1, + "page_end": 2, + "source_file": "1001.2648.pdf" + }, + { + "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nAn alternative procedure consists in carrying out molecular simulations, where both the solvent and solute are treated explicitly. After a rigorous averaging over the solvent configurations, a coarse-grained description of the ions, which still includes the effect of the solvent structure, can be obtained [8-11]. However, this set of methods is purely numeric; they do not provide any analytical expression for thermodynamic quantities. They are therefore restricted to simple geometries [12, 13] (bulk solutions or planar interfaces). The description of complex systems, such as porous or electrochemical materials, is still based on continuous solvent models [14].\nIn this letter we present a method aimed at bridging the gap between analytical and numerical approaches. It is based on the application of liquid perturbation theory (LPT) [15] to effective ion-ion potentials extracted from\n∗ Electronic address: john.molina@etu.upmc.fr\n† Electronic address: jean-francois.dufreche@upmc.fr\nmolecular dynamics (MD) results. Different approximations of the PM are employed for the case of NaCl electrolyte solutions: a two component model (MSA2), that only takes free ions into account, and two different three component models (MSA3 and BIMSA3), which include a third species (the contact ion pair). As we proceed to show, LPT allows us to select the best simple model which accurately accounts for the thermodynamics and the physical-chemistry of the system.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2648.pdf" + }, + { + "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nThe first stage consists in calculating the McMillanMayer effective ion-ion interaction potentials V eff ij ( r ), by inverting the radial distribution functions (RDF) g ij ( r ) obtained by MD. The simulations were carried out on a box of 2000 water molecules and 48 NaCl pairs using the same interaction potentials as in reference [16]. This setup corresponds to a concentration of 0 . 64 moll -1 . NPT ensemble sampling at standard pressure and temperature was enforced, with a time step of 1 fs and a pressure bath coupling constant of 1 ps. An equilibration run of 0.25 ns was followed by a production run of 0.6 ns for five different initial configurations. The averages of the resulting RDF were then used for the potential inversion via the HNC closure [15]. These effective potentials are assumed to be concentration independent and will be used for simulations at all concentrations.\nSubtracting the long-range Coulombic potential V LR ij ( r ) (which depends on the dielectric constant of the solvent) from V eff ij ( r ), we obtain the short-range contribution V SR ij ( r ) to the effective potentials. These are given in Fig. 1 (species 1 and 2 refer to Na + and Cl -free ions, respectively). All the short-range potentials exhibit oscillations corresponding to the solvent layering between the ions, but this effect is particularly important for the cation-anion interaction: a considerable potential barrier ( /greaterorsimilar 2 k B T ) separates the first two attractive wells. To serve as a reference, Monte Carlo (MC) simulations were performed with these effective potentials; a comparison between MD and MC RDF is also provided in Fig. 1. The excellent agreement between both sets of RDF validates the HNC inversion procedure [17], and allows us to com-\nFIG. 1: Effective McMillan-Mayer short-range pair potentials extracted from explicit solvent simulations using the HNC closure. (a) Cation anion, (b) cation cation, (c) anion anion, (d) cation anion RDF obtained from explicit solvent MD and implicit solvent MC simulations.\npute all ion thermodynamic properties through implicit solvent MC simulations.", + "page_start": 0, + "page_end": 1, + "source_file": "1001.2648.pdf" + }, + { + "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nK 0 = ∫ ∞ 0 d r 4 πr 2 e -β ˜ V int ( r ) = 0 . 43 L . mol -1 (3)\nThe excess free-energy density of the original system βf ex v is that of the three component mixture β ˜ f ex v plus a correction term\nβf ex v = β ˜ f ex v -˜ ρ 3 ln K 0 , (4)\nwhich is due to the change in standard chemical potential between the two component and three component models. It should be noted that the fraction of pairs is now an additional parameter in the minimization scheme, which serves to ensure chemical equilibrium. Within this representation, the pair can be modeled as a hard sphere (MSA3) or as a dumbbell-like CIP (BIMSA3) [4]. Since\n3\nFIG. 4: (Color online) Excess free-energy density βf ex v as a function of the square root of the concentration √ c . (diamond) MC simulations, (dot dashed) MSA2, (dashed) MSA3, (solid) BIMSA3, (dot) DHLL, and (cross) experiments. The inset gives the fraction of pairs (MSA3, BIMSA3) as a function of √ c .\nwe have no additional information, we consider only symmetric dumbbells. Furthermore, since analytic expressions for the RDF within BIMSA are not known, we approximate the dumbbell as a hard sphere when computing the perturbation term (this is not necessary for the reference term, since an expression for the free energy is available). Let ˜ σ c be the diameter of the cation (anion) within the dumbbell, the diameter of the hard sphere representing this dumbbell is taken to be σ 3 = 4 √ 2 π σ c [21].", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2648.pdf" + }, + { + "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nThe second stage of our coarse-graining procedure consists in applying LPT, in order to deduce the best analytical model of electrolyte solutions which reproduces this molecular description. The principle of LPT is to describe the properties of a given system in terms of those of a well known reference system, with the difference between them treated as a perturbation in the reference potential. Assuming pairwise additive potentials, V ij = V (0) ij + ∆V ij , a first-order truncated expression for the free energy density of the system βf v is obtained,\nβf v /lessorsimilar βf (0) v + 1 2 β ∑ i,j ρ i ρ j ∫ d r g (0) ij ( r ) ∆V ij ( r ) (1)\nwhich depends only on the free-energy density f (0) v and RDF g (0) of the reference fluid, with β = ( k B T ) -1 and ρ i the concentration of species i . The Gibbs-Bogoliubov inequality [15] ensures that the right-hand side of Eq. (1) is actually a strict upper bound. Once a reference system has been chosen, the expression on the right-hand side of Eq. (1) must be minimized with respect to the parameters defining the reference. This procedure yields the best first-order approximation to the free energy of the system under consideration.\nFor a system of charged particles in solution, the natural reference is the PM, defined in terms of the charge and diameter ( σ i ) of each species. In this case, the perturbing potentials are just the short-range effective potentials computed above (∆ V ij = V SR ij ). We use the MSA [3] solution to the PM, since it provides analytical expressions for both the free energy and the RDF. The perturbation term is evaluated using an exponential approximation to the RDF obtained within the MSA, g ( r ) = exp [ g MSA ( r ) -1], which removes any unphysical negative regions and improves the comparison with HNC calculations.\nΦ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2648.pdf" + } + ] + }, + { + "references": { + "source_file": "uksi_20210582_en.pdf", + "query": "In the health regulation regarding coronavirus, what is considered a \"device\" ?", + "target_page": 3, + "target_passage": "means an in vitro diagnostic medical device within the meaning given in regulation 2(1) of the Medical Devices Regulations 2002", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "EXPLANATORY NOTE\n(This note is not part of the Regulations)\nThese Regulations replace the Health Protection (Coronavirus, International Travel) (England) Regulations 2020 ('the International Travel Regulations'), the Health Protection (Coronavirus, Public Health Information for International Passengers) (England) Regulations 2020 and the Health Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England) (Amendment) Regulations 2021.\nThey impose requirements on certain categories of person to provide information upon arrival in England, to take coronavirus tests before and after arrival and to self-isolate in order to prevent the spread of infection or contamination from coronavirus or coronavirus disease. They also impose obligations on operators to ensure that passengers receive information and comply with the requirements.\nAn impact assessment has not been produced for this instrument. An explanatory memorandum has been published alongside this instrument at www.legislation.gov.uk.\n' Crown copyright 2021\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, Controller of Her Majesty's Stationery Office and Queen's Printer of Acts of Parliament.\n91\nhttp://www.legislation.gov.uk/id/uksi/2021/582", + "page_start": 90, + "page_end": 91, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "2. -(1) In these Regulations-\n'category 1 arrival' means person who has arrived in England from a category 1 country or territory, and has not been in a category 2 country or territory or a category 3 country or territory in the period beginning with the 10th day before the date of their arrival in England;\n'category 1 country or territory' means a country or territory, or part of a country or territory, specified in Schedule 1( b );\n'category 2 country or territory' means a country or territory or part of a country or territory specified in Schedule 2( c );\n'category 3 country or territory' means a country or territory or part of a country or territory specified in Schedule 3( d );\n'child' means a person under the age of 18;\n'the common travel area' has the meaning given in section 1(3) of the Immigration Act 1971( e );\n'coronavirus' means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2);\n'coronavirus disease' means COVID-19 (the official designation of the disease which can be caused by coronavirus);\n'designated port' means a port designated for the purposes of Schedule 11;\n'device' means an in vitro diagnostic medical device within the meaning given in regulation 2(1) of the Medical Devices Regulations 2002( f );\n'disability' has the meaning given in the Equality Act 2010( g ) (see section 6 of, and Schedule 1 to, that Act);\n'immigration officer' means a person appointed by the Secretary of State as an immigration officer under paragraph 1 of Schedule 2 to the Immigration Act 1971( h );\n'managed self-isolation package' has the meaning given in paragraph 8 of Schedule 11;\n'operator' except in regulation 18, means an operator of a relevant service;\n( a ) 1984 c. 22. Part 2A was inserted by section 129 of the Health and Social Care Act 2008 (c. 14).\n( b ) Category 1 countries and territories are referred to colloquially and in guidance as 'Green List' countries and territories.\n( c ) Category 2 countries and territories are referred to colloquially and in guidance as 'Amber List' countries and territories.\n( d ) Category 3 countries and territories are referred to colloquially and in guidance as 'Red List' countries and territories.", + "page_start": 2, + "page_end": 2, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "Compliant tests\n1. A test complies with this paragraph if-\n(a) it is a test for the detection of coronavirus undertaken using a device which the manufacturer states has-\n56\nRegulation 4\n(i) a sensitivity of at least 80%,\n(ii) a specificity of at least 97%, and\n(iii) a limit of detection of less than or equal to 100,000 SARS-CoV-2 copies per millilitre;\n(b) it is not a test provided or administered under the National Health Service Act 2006, the National Health Services (Wales) Act 2006, the National Health Service (Scotland) Act 1978, or the Health and Personal Social Services (Northern Ireland) Order 1972; and\n(c) the test sample is taken from the person no more than three days before-\n(i) in the case of that person travelling to England on a commercial transport service, the service's scheduled time of departure, or\n(ii) in any other case, the actual time of departure of the vessel or aircraft on which that person is travelling to England.", + "page_start": 55, + "page_end": 56, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "Appropriate tests\n2. -(1) A test is an 'appropriate test' where-\n(a) it is a test for the detection of coronavirus;\n(b) the manufacturer of any device used for the purposes of the test states that the device has-\n(i) a sensitivity greater than 95% (with 95% two-sided confidence interval entirely above 90%),\n(ii) a specificity greater than 95% (with 95% two-sided confidence interval entirely above 90%),\n68\nRegulation 9(16)\n(iii) a limit of detection of less than or equal to 1000 SARS-CoV-2 copies per millilitre, and\n(iv) uses an established molecular detection method;\n(c) any device used for the purposes of the test-\n(i) can be put into service in accordance with Part 4 of the Medical Devices Regulations 2002, other than solely by virtue of regulation 39(2) of those Regulations,\n(ii) has been validated no more than 18 months before the test is administered or provided to P;\n(d) it is not a test provided or administered under the National Health Service Act 2006, the National Health Service (Wales) Act 2006( a ), the National Health Service (Scotland) Act 1978( b ), or the Health and Personal Social Services (Northern Ireland) Order 1972( c ); and\n(e) the test provider complies with paragraph 3.\n(2) For the purposes of sub-paragraph (1), 'validated', in relation to a device, means confirmed as having the required sensitivity and specificity using at least 150 positive clinical samples and 250 negative clinical samples against a laboratory-based RT-PCR test that is itself within the performance specification of the target product profile published by the Medicines and Healthcare Products Regulatory Agency for laboratory based SARS-CoV-2 PCR tests, by-", + "page_start": 67, + "page_end": 68, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "' Relaxation of time periods due to coronavirus exception\n(2) The coronavirus exception applies where it is not reasonably practicable for a person to meet a requirement referred to in paragraph (1) for a reason relating to the incidence or transmission of coronavirus.\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)-\n(a) regulation 15(2) (transfer of EHC plans) (in relation to the second reference to 15 working days), (4), (5), (7) (in relation to the second reference to 15 working days) and (8);\n(b) regulation 16(2) and (3) (change of responsible commissioning body);\n(c) regulation 20(9) and (10) (review where the child or young person attends a school or other institution);\n(d) regulation 21(7), (8) and (9) (review of EHC plan where the child or young person does not attend a school or other institution);\n(e) regulation 25(1) (notification of decision whether it is necessary to re-assess educational, health care and social care provision);\n(f) regulation 27(4) (amending or replacing an EHC plan following a re-assessment);\n(g) regulation 33 (requirement to consider mediation);\n(h) regulation 34(1) and (2) (where a parent or young person does not wish to or fails to pursue mediation);\n(i) regulation 35(2), (3) and (4) (mediation - health care issues);\n(j) regulation 36(2) (mediation - no health care issues);\n(k) regulation 39(1) and (3) (mediation certificate under section 55(5));\n(l) regulation 42(3) and (4) (steps to be taken by a local authority);\n(m) regulation 44(2)(d), (e), (f) and (h) (compliance with the orders of the First-tier Tribunal);\n(n) regulation 45(4), (5) and (6A) (unopposed appeals);\n(o) regulation 47 (disclosure of EHC plans in relation to higher education); and\n(p) regulation 56(3) (publication of comments on the local offer).'.", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "Power to use and disclose information\n(4) Subject to paragraph (7), A may only disclose relevant information to another person (the 'recipient') where it is necessary for the recipient to have the information -\n(a) for the purpose of carrying out a function of the recipient under-\n(i) these Regulations, or\n(ii) an enactment which, in Scotland, Wales or Northern Ireland, has the effect of requiring the isolation or quarantine of persons who have been outside the common travel area, for any of the purposes described in sub-paragraph (b);\n(b) for the purpose of-\n(i) preventing danger to public health as a result of the spread of infection or contamination with coronavirus or coronavirus disease,\n(ii) monitoring the spread of infection or contamination with coronavirus or coronavirus disease, or\n(iii) giving effect to any international agreement or arrangement relating to the spread of infection or contamination with coronavirus or coronavirus disease; or\n29", + "page_start": 28, + "page_end": 28, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "' Relaxation of time periods due to coronavirus exception\n23. In regulation 8(2) (duty to co-operate in a detained person's EHC needs assessment), at the end of sub-paragraph (d) insert-\n'; or\n(e) of a reason relating to the incidence or transmission of coronavirus'.\n24. In regulation 10(4) (decision not to secure an EHC plan)-\n(a) at the end of sub-paragraph (b) omit 'or'; and\n(b) at the end of sub-paragraph (c) insert-\n'; or\n(d) of a reason relating to the incidence or transmission of coronavirus'.\n25. In regulation 13(3) (timescales for EHC plans), for '(c)' substitute '(d)'.\n26. In regulation 29 (compliance with the orders of the First-tier Tribunal)-\n(a) after paragraph (6) insert-\n'(6A) The home authority need not comply with the time limits specified in paragraph (3) if it is impractical to do so because the circumstances referred to in regulation 10(4)(d) apply.'.\n(b) in paragraph (7)(c) after '10(4)(a)' insert 'or (d)'.\n27. In regulation 30(7)(c) (unopposed appeals), after '10(4)(a)' insert 'or (d)'.", + "page_start": 4, + "page_end": 4, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "Citation, commencement, extent and application\n1. -(1) These Regulations may be cited as the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021.\n(2) These Regulations come into force at 4.00 a.m. on 17th May 2021.\n(3) These Regulations extend to England and Wales and apply in relation to England only.", + "page_start": 2, + "page_end": 2, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "Consequential Amendments\n(3) In regulation 4ZA-\n(a) in the heading, for 'the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021';\n(b) in paragraph (1)(a), for 'regulation 3B of the Health Protection (Coronavirus, International Travel) (England) Regulations 2020 ('the 2020 Regulations')' substitute 'regulation 6 of the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021 ('the International Travel and Operator Liability Regulations')';\n(c) in paragraph (1)(c), for 'paragraph 7(1)(f) of Schedule 2C to the 2020 Regulations' substitute 'paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations';\n(d) in paragraph (3), for 'paragraph 7(1)(f) of Schedule 2C to the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations'.\n2. -(1) The Health Protection (Coronavirus, Restrictions) (Self-Isolation) (England) Regulations 2020( a ) are amended as follows.\n(2) In regulation 2D(1)(c), for 'regulation 4 of the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'regulation 9 of the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021'.\n(3) In regulation 6(1)-\n(a) in the definitions of 'designated place', 'isolation requirements' and 'self-isolating worker', for 'regulation 4' substitute 'regulation 9';\n(b) in the definition of 'International Travel Regulations', for 'the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021'.", + "page_start": 88, + "page_end": 88, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "' Relaxation of time periods due to coronavirus exception\n2A. -(1) Where the coronavirus exception applies, any requirement in any of the regulations specified in paragraph (3) for action to be taken within a specified period of time or by a certain day is to be read instead as a requirement for such action to be taken as soon as reasonably practicable.\n(2) The coronavirus exception applies where it is not reasonably practicable for a person to meet a requirement referred to in paragraph (1) for a reason relating to the incidence or transmission of coronavirus.\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)-\n(a) regulation 15(1) and (4) (needs assessments which are not completed);\n(b) regulation 16(2), (3) and (4) (transfer of a kept EHC plan);\n(c) regulation 17(1) and (2) (restriction on disclosure of EHC plans);\n(d) regulation 19 (requirement to consider mediation);\n(e) regulation 20(1) and (2) (where the appropriate person does not wish to or fails to pursue mediation);\n(f) regulation 21 (mediation);\n(g) regulation 24(1) and (3) (mediation certificate under section 55(5) of the Act);\n(h) regulation 27(3) (steps to be taken by a home authority);\n(i) regulation 29(2) and (6) (compliance with the orders of the First-tier Tribunal); and\n(j) regulation 30(3) and (6) (unopposed appeals).'.\n21. In regulation 4 (determination whether or not special educational provision may be necessary), after paragraph (2) insert-\n'(3) The local authority need not comply with the time limit referred to in paragraph (1) if it is impractical to do so because of a reason relating to the incidence or transmission of coronavirus.'.\n22. In regulation 5(4) (decision whether or not to conduct a detained person's EHC needs assessment)-\n(a) at the end of sub-paragraph (b) omit 'or'; and\n(b) at the end of sub-paragraph (c) insert-\n', or\n(d) of a reason relating to the incidence or transmission of coronavirus'.\n( a ) S.I. 2015/62.\n4", + "page_start": 3, + "page_end": 3, + "source_file": "uksi_20200471_en.pdf" + } + ] + }, + { + "references": { + "source_file": "uksi_20210582_en.pdf", + "query": "Regarding the regulation of Enforcement of requirement to self-isolate concerning travel and coronavirus, who are considered an \"authorised persons\" ?", + "target_page": 19, + "target_passage": "For the purposes of this regulation, “authorised person” means— (a) a constable; (b) for the purposes of paragraphs (2) and (3) only, an immigration officer; or (c) a person designated by the Secretary of State for the purposes of this regulation.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "EXPLANATORY NOTE\n(This note is not part of the Regulations)\nThese Regulations replace the Health Protection (Coronavirus, International Travel) (England) Regulations 2020 ('the International Travel Regulations'), the Health Protection (Coronavirus, Public Health Information for International Passengers) (England) Regulations 2020 and the Health Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England) (Amendment) Regulations 2021.\nThey impose requirements on certain categories of person to provide information upon arrival in England, to take coronavirus tests before and after arrival and to self-isolate in order to prevent the spread of infection or contamination from coronavirus or coronavirus disease. They also impose obligations on operators to ensure that passengers receive information and comply with the requirements.\nAn impact assessment has not been produced for this instrument. An explanatory memorandum has been published alongside this instrument at www.legislation.gov.uk.\n' Crown copyright 2021\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, Controller of Her Majesty's Stationery Office and Queen's Printer of Acts of Parliament.\n91\nhttp://www.legislation.gov.uk/id/uksi/2021/582", + "page_start": 90, + "page_end": 91, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "Citation, commencement, extent and application\n1. -(1) These Regulations may be cited as the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021.\n(2) These Regulations come into force at 4.00 a.m. on 17th May 2021.\n(3) These Regulations extend to England and Wales and apply in relation to England only.", + "page_start": 2, + "page_end": 2, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "2. -(1) In these Regulations-\n'category 1 arrival' means person who has arrived in England from a category 1 country or territory, and has not been in a category 2 country or territory or a category 3 country or territory in the period beginning with the 10th day before the date of their arrival in England;\n'category 1 country or territory' means a country or territory, or part of a country or territory, specified in Schedule 1( b );\n'category 2 country or territory' means a country or territory or part of a country or territory specified in Schedule 2( c );\n'category 3 country or territory' means a country or territory or part of a country or territory specified in Schedule 3( d );\n'child' means a person under the age of 18;\n'the common travel area' has the meaning given in section 1(3) of the Immigration Act 1971( e );\n'coronavirus' means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2);\n'coronavirus disease' means COVID-19 (the official designation of the disease which can be caused by coronavirus);\n'designated port' means a port designated for the purposes of Schedule 11;\n'device' means an in vitro diagnostic medical device within the meaning given in regulation 2(1) of the Medical Devices Regulations 2002( f );\n'disability' has the meaning given in the Equality Act 2010( g ) (see section 6 of, and Schedule 1 to, that Act);\n'immigration officer' means a person appointed by the Secretary of State as an immigration officer under paragraph 1 of Schedule 2 to the Immigration Act 1971( h );\n'managed self-isolation package' has the meaning given in paragraph 8 of Schedule 11;\n'operator' except in regulation 18, means an operator of a relevant service;\n( a ) 1984 c. 22. Part 2A was inserted by section 129 of the Health and Social Care Act 2008 (c. 14).\n( b ) Category 1 countries and territories are referred to colloquially and in guidance as 'Green List' countries and territories.\n( c ) Category 2 countries and territories are referred to colloquially and in guidance as 'Amber List' countries and territories.\n( d ) Category 3 countries and territories are referred to colloquially and in guidance as 'Red List' countries and territories.", + "page_start": 2, + "page_end": 2, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "Enforcement of requirement to self-isolate\n(6) Paragraphs (1)(b) and (c), (2) and (3) do not apply where P is a person described in paragraph 1 of Schedule 4 (diplomats, members of international organisations etc).\n(7) An authorised person exercising the power in paragraph (1)(b) or (c), (2)(b) or (3) may use reasonable force, if necessary, in the exercise of the power.\n(8) Where P is a child, and has left or is outside of, the place where they are self-isolating and is accompanied by an individual who has responsibility for them-\n(a) an authorised person may direct that individual to take P to the place where P is selfisolating; and\n(b) that individual must, so far as reasonably practicable, ensure that P complies with any direction given by an authorised person to P.\n(9) Where P is a child, and an authorised person has reasonable grounds to believe that P is repeatedly failing to comply with regulation 9 or Schedule 11, the authorised person may direct any individual who has responsibility for P to ensure, so far as reasonably practicable, that P so complies.\n(10) An authorised person may only exercise a power in paragraph (1), (2), (8) or (9) if the authorised person considers that it is a necessary and proportionate means of ensuring compliance with regulation 9 or Schedule 11.\n18\n(11) For the purposes of this regulation, 'authorised person' means-\n(a) a constable;\n(b) for the purposes of paragraphs (2) and (3) only, an immigration officer; or\n(c) a person designated by the Secretary of State for the purposes of this regulation.", + "page_start": 17, + "page_end": 18, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "Transitional provision\n1. Passenger information provided before 4.00 a.m. on 17th May 2021 by a person pursuant to regulation 3 of the Health Protection (Coronavirus, International Travel) (England) Regulations 2020 ('the 2020 Regulations') in advance of arrival in England is treated as passenger information provided for the purposes of these Regulations where the person arrives in England on or after that date.\n2. Confirmation given by the Foreign, Commonwealth and Development Office that a person is not required to comply with regulation 3B of the 2020 Regulations is treated as confirmation that the person is not required to comply with regulation 6 of these Regulations where the person arrives in England on or after 4.00 a.m. on 17th May 2021.\n3. A designation by the Secretary of State of a person as an authorised person under regulation 5(7) of the 2020 Regulations has effect as a designation of that person as an authorised person under of regulation 11(11)(c) of these Regulations.\n4. Regulation 5A of the 2020 Regulations continues to have effect in relation to a constable who exercises the powers in that regulation in relation to a person who arrived in England before 4.00 a.m. on 17th May 2021.\n( a ) S.I. 2020/1045. Regulation 2D was inserted by S.I. 2021/364. There are other amendments but none is relevant.\n89", + "page_start": 88, + "page_end": 88, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "Enforcement of requirement to self-isolate\n(b) where the authorised person is a constable, remove P to the place where P is selfisolating;\n(c) where the authorised person is a constable and it is not practicable or appropriate in the circumstances to take the action in sub-paragraph (a) or (b), remove P to accommodation facilitated by the Secretary of State for the purposes of P's self-isolation.\n(2) Where an authorised person has reasonable grounds to believe that P is a Schedule 11 passenger, an authorised person may do any of the following for the purpose of ensuring that P complies with the requirements in Schedule 11-\n(a) give a direction to P, including a direction-\n(i) that P remain in a particular area of a port to await transportation to accommodation designated for the purposes of Schedule 11,\n(ii) that P move to a particular place to board transportation designated for the purposes of Schedule 11,\n(iii) that P board transportation designated for the purposes of Schedule 11 to travel to accommodation designated for the purposes of Schedule 11,\n(iv) that P remain in the place where P is self-isolating;\n(b) remove P to accommodation designated for the purposes of Schedule 11.\n(3) Where an authorised person has reasonable grounds to believe that P is a Schedule 11 passenger and that P has committed an offence under regulation 19(1)(a) or (6), the authorised person may-\n(a) require P to produce their passport or travel document for examination;\n(b) detain P for up to three hours;\n(c) search P and any baggage belonging to P or under P's control, or any vehicle in which P has travelled, for evidence, other than items subject to legal privilege, that relates to the possible commission of an offence under regulation 19(6); and\n(d) seize and retain any document or article recovered by a search under sub-paragraph (c).\n(4) Paragraph (3) does not confer a power-\n(a) to detain or search an unaccompanied child; or\n(b) to conduct an intimate search.\n(5) Any search under paragraph (3) must be conducted by an authorised person of the same gender as P.", + "page_start": 17, + "page_end": 17, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "Further requirements on arrivals from category 3 countries or territories\n10. -(1) This regulation applies to a person ('P') where P is a Schedule 11 passenger.\n(2) P must remain in isolation from others in accordance with, and otherwise comply with the requirements in, Schedule 11.\n(3) The address specified by P in the Passenger Locator Form pursuant to paragraph 2(a) of Schedule 6 must be the designated accommodation which is part of the managed self-isolation package booked by or on behalf of P.", + "page_start": 16, + "page_end": 16, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "Consequential Amendments\n(3) In regulation 4ZA-\n(a) in the heading, for 'the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021';\n(b) in paragraph (1)(a), for 'regulation 3B of the Health Protection (Coronavirus, International Travel) (England) Regulations 2020 ('the 2020 Regulations')' substitute 'regulation 6 of the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021 ('the International Travel and Operator Liability Regulations')';\n(c) in paragraph (1)(c), for 'paragraph 7(1)(f) of Schedule 2C to the 2020 Regulations' substitute 'paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations';\n(d) in paragraph (3), for 'paragraph 7(1)(f) of Schedule 2C to the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations'.\n2. -(1) The Health Protection (Coronavirus, Restrictions) (Self-Isolation) (England) Regulations 2020( a ) are amended as follows.\n(2) In regulation 2D(1)(c), for 'regulation 4 of the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'regulation 9 of the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021'.\n(3) In regulation 6(1)-\n(a) in the definitions of 'designated place', 'isolation requirements' and 'self-isolating worker', for 'regulation 4' substitute 'regulation 9';\n(b) in the definition of 'International Travel Regulations', for 'the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021'.", + "page_start": 88, + "page_end": 88, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "2. -(1) In these Regulations-\n( e ) 1971 c. 77; section 1(3) provides that the United Kingdom, the Channel Islands, the Isle of Man and the Republic of Ireland are collectively referred to in that Act as 'the common travel area'.\n( f ) S.I. 2002/618.\n( g ) 2010 c. 15.\n( h ) Paragraph 1 was amended by paragraph 3 of Schedule 3 to the Health Protection Agency Act 2004 (c. 17), and by S.I. 1993/1813.\n3\n'passenger' means a person travelling on a conveyance who is not a member of the conveyance's crew;\n'passenger information' has the meaning given in regulation 3(1);\n'Passenger Locator Form' means the form published electronically by the Secretary of State for the provision of passenger information( a );\n'port', except where the context otherwise requires, means-\n(a) any port (including a seaport, airport or heliport), or\n(b) a place which is an authorised terminal control point for international services for the purposes of sections 11 and 12 of the Channel Tunnel Act 1987( b );\n'qualifying test' means a test that is a qualifying test for the purposes of regulation 4;\n'relevant service' means a commercial transport service carrying passengers travelling to England from outside the common travel area, other than a shuttle service;\n'Schedule 11 passenger' means a passenger to whom Schedule 11 (additional measures applicable to arrivals from category 3 countries or territories) applies;\n'self-isolate' has the meaning given in regulation 9(2), and 'self-isolation' and 'selfisolating' are to be construed accordingly;\n'the Self-Isolation Regulations' means the Health Protection (Coronavirus, Restrictions) (Self-Isolation) (England) Regulations 2020( c );\n'sensitivity', in relation to a device, means how often the device correctly generates a positive result;\n'shuttle service' has the meaning given in section 1(9) of the Channel Tunnel Act 1987;\n'specificity', in relation to a device, means how often the device correctly generates a negative result;\n'tunnel system' has the meaning given in section 1(7) of the Channel Tunnel Act 1987.", + "page_start": 2, + "page_end": 3, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "' Relaxation of time periods due to coronavirus exception\n2A. -(1) Where the coronavirus exception applies, any requirement in any of the regulations specified in paragraph (3) for action to be taken within a specified period of time or by a certain day is to be read instead as a requirement for such action to be taken as soon as reasonably practicable.\n(2) The coronavirus exception applies where it is not reasonably practicable for a person to meet a requirement referred to in paragraph (1) for a reason relating to the incidence or transmission of coronavirus.\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)-\n(a) regulation 15(1) and (4) (needs assessments which are not completed);\n(b) regulation 16(2), (3) and (4) (transfer of a kept EHC plan);\n(c) regulation 17(1) and (2) (restriction on disclosure of EHC plans);\n(d) regulation 19 (requirement to consider mediation);\n(e) regulation 20(1) and (2) (where the appropriate person does not wish to or fails to pursue mediation);\n(f) regulation 21 (mediation);\n(g) regulation 24(1) and (3) (mediation certificate under section 55(5) of the Act);\n(h) regulation 27(3) (steps to be taken by a home authority);\n(i) regulation 29(2) and (6) (compliance with the orders of the First-tier Tribunal); and\n(j) regulation 30(3) and (6) (unopposed appeals).'.\n21. In regulation 4 (determination whether or not special educational provision may be necessary), after paragraph (2) insert-\n'(3) The local authority need not comply with the time limit referred to in paragraph (1) if it is impractical to do so because of a reason relating to the incidence or transmission of coronavirus.'.\n22. In regulation 5(4) (decision whether or not to conduct a detained person's EHC needs assessment)-\n(a) at the end of sub-paragraph (b) omit 'or'; and\n(b) at the end of sub-paragraph (c) insert-\n', or\n(d) of a reason relating to the incidence or transmission of coronavirus'.\n( a ) S.I. 2015/62.\n4", + "page_start": 3, + "page_end": 3, + "source_file": "uksi_20200471_en.pdf" + } + ] + }, + { + "references": { + "source_file": "uksi_20210582_en.pdf", + "query": "What is the expiracy date of the regulation regarding travel during the coronavirus pandemic made in 2021 ?", + "target_page": 31, + "target_passage": "These Regulations expire at the end of 16th May 2022.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Citation, commencement, extent and application\n1. -(1) These Regulations may be cited as the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021.\n(2) These Regulations come into force at 4.00 a.m. on 17th May 2021.\n(3) These Regulations extend to England and Wales and apply in relation to England only.", + "page_start": 2, + "page_end": 2, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "PUBLIC HEALTH, ENGLAND\nThe Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021\nMade\n-\n-\n-\n-\nat 10.32 a.m. on 14th May 2021\nLaid before Parliament\nat 2.30 p.m. on 14th May 2021\nComing into force\n- -\nat 4.00 a.m. on 17th May 2021", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "EXPLANATORY NOTE\n(This note is not part of the Regulations)\nThese Regulations replace the Health Protection (Coronavirus, International Travel) (England) Regulations 2020 ('the International Travel Regulations'), the Health Protection (Coronavirus, Public Health Information for International Passengers) (England) Regulations 2020 and the Health Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England) (Amendment) Regulations 2021.\nThey impose requirements on certain categories of person to provide information upon arrival in England, to take coronavirus tests before and after arrival and to self-isolate in order to prevent the spread of infection or contamination from coronavirus or coronavirus disease. They also impose obligations on operators to ensure that passengers receive information and comply with the requirements.\nAn impact assessment has not been produced for this instrument. An explanatory memorandum has been published alongside this instrument at www.legislation.gov.uk.\n' Crown copyright 2021\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, Controller of Her Majesty's Stationery Office and Queen's Printer of Acts of Parliament.\n91\nhttp://www.legislation.gov.uk/id/uksi/2021/582", + "page_start": 90, + "page_end": 91, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "Revocations, transitional provision consequential amendments and savings\n26. -(1) The following Regulations are revoked-\n(a) the Health Protection (Coronavirus, Public Health Information for International Passengers) (England) Regulations 2020( a );\n(b) the Health Protection (Coronavirus, International Travel) (England) Regulations 2020 ('the International Travel Regulations')( b ); and\n(c) the Health Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England) (Amendment) Regulations 2021( c ).\n(2) Schedule 15 makes consequential amendments to other instruments specified in that Schedule.\n(3) Schedule 16 makes transitional provisions.\n(4) Nothing in these Regulations applies in relation to a person who arrived in England before 4.00 a.m. on 17th May 2021 (and accordingly, the regulations mentioned in paragraph (1) continue to have effect in relation to such a person).\nSigned by authority of the Secretary of State\nAt 10.32 a.m. on 14th May 2021\n( a ) S.I. 2020/567.\n( b ) S.I. 2020/568.\n( c ) S.I. 2021/38.\nRobert Courts Parliamentary Under Secretary of State Department for Transport\n31\nAustralia\nBrunei\nFalkland Islands\nFaroe Islands\nGibraltar\nIceland\nIsrael\nNew Zealand\nPortugal, including the Azores and Madeira\nSaint Helena, Ascension and Tristan da Cunha\nSingapore\nSouth Georgia and the South Sandwich Islands", + "page_start": 30, + "page_end": 31, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "Transitional provision\n1. Passenger information provided before 4.00 a.m. on 17th May 2021 by a person pursuant to regulation 3 of the Health Protection (Coronavirus, International Travel) (England) Regulations 2020 ('the 2020 Regulations') in advance of arrival in England is treated as passenger information provided for the purposes of these Regulations where the person arrives in England on or after that date.\n2. Confirmation given by the Foreign, Commonwealth and Development Office that a person is not required to comply with regulation 3B of the 2020 Regulations is treated as confirmation that the person is not required to comply with regulation 6 of these Regulations where the person arrives in England on or after 4.00 a.m. on 17th May 2021.\n3. A designation by the Secretary of State of a person as an authorised person under regulation 5(7) of the 2020 Regulations has effect as a designation of that person as an authorised person under of regulation 11(11)(c) of these Regulations.\n4. Regulation 5A of the 2020 Regulations continues to have effect in relation to a constable who exercises the powers in that regulation in relation to a person who arrived in England before 4.00 a.m. on 17th May 2021.\n( a ) S.I. 2020/1045. Regulation 2D was inserted by S.I. 2021/364. There are other amendments but none is relevant.\n89", + "page_start": 88, + "page_end": 88, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "Consequential Amendments\n(3) In regulation 4ZA-\n(a) in the heading, for 'the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021';\n(b) in paragraph (1)(a), for 'regulation 3B of the Health Protection (Coronavirus, International Travel) (England) Regulations 2020 ('the 2020 Regulations')' substitute 'regulation 6 of the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021 ('the International Travel and Operator Liability Regulations')';\n(c) in paragraph (1)(c), for 'paragraph 7(1)(f) of Schedule 2C to the 2020 Regulations' substitute 'paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations';\n(d) in paragraph (3), for 'paragraph 7(1)(f) of Schedule 2C to the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations'.\n2. -(1) The Health Protection (Coronavirus, Restrictions) (Self-Isolation) (England) Regulations 2020( a ) are amended as follows.\n(2) In regulation 2D(1)(c), for 'regulation 4 of the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'regulation 9 of the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021'.\n(3) In regulation 6(1)-\n(a) in the definitions of 'designated place', 'isolation requirements' and 'self-isolating worker', for 'regulation 4' substitute 'regulation 9';\n(b) in the definition of 'International Travel Regulations', for 'the Health Protection (Coronavirus, International Travel) (England) Regulations 2020' substitute 'the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021'.", + "page_start": 88, + "page_end": 88, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "Relevant websites\n1. The following are 'the relevant websites' for the purposes of regulation 14-\nhttps://www.gov.uk/government/publications/coronavirus-covid-19-travellers-exempt-from-ukborder-rules/coronavirus-covid-19-travellers-exempt-from-uk-border-rules\nhttps://www.gov.uk/guidance/booking-and-staying-in-a-quarantine-hotel-when-you-arrive-inengland\nhttps://www.gov.uk/guidance/coronavirus-covid-19-testing-for-people-travelling-to-england\nhttp://www.gov.uk/travel-quarantine-and-testing\nhttps://www.gov.uk/guidance/red-amber-and-green-list-rules-for-entering-england\n83\nhttps://www.gov.uk/provide-journey-contact-details-before-travel-uk\nhttps://www.gov.uk/uk-border-control\nhttps://www.nidirect.gov.uk/articles/coronavirus-covid-19-international-travel-advice\nhttps://www.gov.scot/publications/coronavirus-covid-19-international-travel-quarantine/\nhttps://gov.wales/arriving-wales-overseas", + "page_start": 82, + "page_end": 83, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "Citation and commencement\n1. These Regulations may be cited as the Special Educational Needs and Disability (Coronavirus) (Amendment) Regulations 2020 and come into force on 1st May 2020.", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "EDUCATION, ENGLAND\nThe Special Educational Needs and Disability (Coronavirus) (Amendment) Regulations 2020\nMade\n-\n-\n-\n-\n28th April 2020\nLaid before Parliament\n30th April 2020\nComing into force\n-\n-\n1st May 2020\nThe Secretary of State makes the following Regulations in exercise of the powers conferred by sections 30(8), 31(4), 36(11), 37(4), 44(7)(b) and (c), 47, 49(3), 51(4), 56(1), 71(11), 73(4), 74(3) and 135(2) and (3) of the Children and Families Act 2014( a ) and sections 29(3) and 569(4) of the Education Act 1996( b ).", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "' Relaxation of time periods due to coronavirus exception\n2A. -(1) Where the coronavirus exception applies, any requirement in any of the regulations specified in paragraph (3) for action to be taken within a specified period of time or by a certain day is to be read instead as a requirement for such action to be taken as soon as reasonably practicable.\n(2) The coronavirus exception applies where it is not reasonably practicable for a person to meet a requirement referred to in paragraph (1) for a reason relating to the incidence or transmission of coronavirus.\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)-\n(a) regulation 15(1) and (4) (needs assessments which are not completed);\n(b) regulation 16(2), (3) and (4) (transfer of a kept EHC plan);\n(c) regulation 17(1) and (2) (restriction on disclosure of EHC plans);\n(d) regulation 19 (requirement to consider mediation);\n(e) regulation 20(1) and (2) (where the appropriate person does not wish to or fails to pursue mediation);\n(f) regulation 21 (mediation);\n(g) regulation 24(1) and (3) (mediation certificate under section 55(5) of the Act);\n(h) regulation 27(3) (steps to be taken by a home authority);\n(i) regulation 29(2) and (6) (compliance with the orders of the First-tier Tribunal); and\n(j) regulation 30(3) and (6) (unopposed appeals).'.\n21. In regulation 4 (determination whether or not special educational provision may be necessary), after paragraph (2) insert-\n'(3) The local authority need not comply with the time limit referred to in paragraph (1) if it is impractical to do so because of a reason relating to the incidence or transmission of coronavirus.'.\n22. In regulation 5(4) (decision whether or not to conduct a detained person's EHC needs assessment)-\n(a) at the end of sub-paragraph (b) omit 'or'; and\n(b) at the end of sub-paragraph (c) insert-\n', or\n(d) of a reason relating to the incidence or transmission of coronavirus'.\n( a ) S.I. 2015/62.\n4", + "page_start": 3, + "page_end": 3, + "source_file": "uksi_20200471_en.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia2.pdf", + "query": "Who first suggested the notions of \"hard\" and \"easy\" problems regarding consciousness ?", + "target_page": 1, + "target_passage": "The terms \"hard problem\" and \"easy problems\" were coined by the philosopher David Chalmers", + "chunk_present": { + "presence": true, + "index": 3 + } + }, + "top_chunk": [ + { + "text": "Overview\nCognitive scientist David Chalmers first formulated the hard problem in his paper \"Facing up to the problem of consciousness\" (1995) [1] and expanded upon it in The Conscious Mind (1996). His works provoked comment. Some, such as philosopher David Lewis and Steven Pinker, have praised Chalmers for his argumentative rigour and \"impeccable clarity\". [27] Pinker later said, in 2018, \"In the end I still think that the hard problem is a meaningful conceptual problem, but agree with Dennett that it is not a meaningful scientific problem. No one will ever get a grant to study whether you are a zombie or whether the same Captain Kirk walks on the deck of the Enterprise and the surface of Zakdorn. And I agree with several other philosophers that it may be futile to hope for a solution at all, precisely because it is a conceptual problem, or, more accurately, a problem with our concepts.\" [28] Daniel Dennett and Patricia Churchland, among others, believe that the hard problem is best seen as a collection of easy problems that will be solved through further analysis of the brain and behaviour. [29][30]\nConsciousness is an ambiguous term. It can be used to mean self consciousness, awareness, the state of being awake, and so on. Chalmers uses Thomas Nagel's definition of consciousness: \" the feeling of what it is like to be something.\" Consciousness, in this sense, is synonymous with experience. [31][27]", + "page_start": 1, + "page_end": 1, + "source_file": "wikipedia2.pdf" + }, + { + "text": "Consciousness\nDavid Chalmers identified two problems in understanding the mind, which he named the \"hard\" and \"easy\" problems of consciousness. [381] The easy problem is understanding how the brain processes signals, makes plans and controls behavior. The hard problem is explaining how this feels or why it should feel like anything at all, assuming we are right in thinking that it truly does feel like something (Dennett's consciousness illusionism says this is an illusion). While human information processing is easy to explain, human subjective experience is difficult to explain. For example, it is easy to imagine a colorblind person who has learned to identify which objects in their field of view are red, but it is not clear what would be required for the person to know what red looks like . [382]", + "page_start": 25, + "page_end": 25, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Historical precedents\nThe hard problem of consciousness has scholarly antecedents considerably earlier than Chalmers. Chalmers himself notes that \"a number of thinkers in the recent and distant past\" have \"recognised the particular difficulties of explaining consciousness.\" [33] He states that all his original 1996 paper contributed to the discussion was \"a catchy name, a minor reformulation of philosophically familiar points\". [33]\nAmong others, thinkers who have made arguments similar to Chalmers' formulation of the hard problem include Isaac Newton, [34] John Locke, [35] Gottfried Wilhelm Leibniz, [36][34] John Stuart Mill, [37] and Thomas Henry Huxley. [38][34] Likewise, Asian philosophers like Dharmakirti and Guifeng Zongmi discussed the problem of how consciousness arises from unconscious matter. [34][39][40][41]", + "page_start": 3, + "page_end": 3, + "source_file": "wikipedia2.pdf" + }, + { + "text": "Hard problem of consciousness\nIn the philosophy of mind, the hard problem of consciousness is to explain why and how humans and other organisms have qualia, phenomenal consciousness, or subjective experience. [1][2] It is contrasted with the \"easy problems\" of explaining why and how physical systems give a (healthy) human being the ability to discriminate, to integrate information, and to perform behavioral functions such as watching, listening, speaking (including generating an utterance that appears to refer to personal behaviour or belief), and so forth. [1] The easy problems are amenable to functional explanation-that is, explanations that are mechanistic or behavioral-since each physical system can be explained (at least in principle) purely by reference to the \"structure and dynamics\" that underpin the phenomenon. [1][3]\nProponents of the hard problem argue that it is categorically different from the easy problems since no mechanistic or behavioral explanation could explain the character of an experience, not even in principle. Even after all the relevant functional facts are explicated, they argue, there will still remain a further question: \"why is the performance of these functions accompanied by experience?\" [1] To bolster their case, proponents of the hard problem frequently turn to various philosophical thought experiments, involving philosophical zombies (which, they claim, are conceivable) or inverted qualia, or the claimed ineffability of colour experiences, or the claimed unknowability of foreign states of consciousness, such as the experience of being a bat.\nThe terms \"hard problem\" and \"easy problems\" were coined by the philosopher David Chalmers in a 1994 talk given at The Science of Consciousness conference held in Tucson, Arizona. [4] The following year, the main talking points of Chalmers' talk were published in The Journal of Consciousness Studies . [1] The publication gained significant attention from consciousness researchers and became the subject of a special volume of the journal, [5][6] which was later published into a book. [7] In 1996, Chalmers published The Conscious Mind , a book-length treatment of the hard problem, in which he elaborated on his core arguments and responded to counterarguments. His use of the word easy is \"tongue-in-cheek\". [8] As the\nChalmers on stage for an Alan Turing Year event at De La Salle University, Manila, 27 March 2012", + "page_start": 0, + "page_end": 0, + "source_file": "wikipedia2.pdf" + }, + { + "text": "In popular culture\nTom Stoppard's play The Hard Problem , first produced in 2015, is named after the hard problem of consciousness, which Stoppard defines as having \"subjective First Person experiences\". [145]", + "page_start": 17, + "page_end": 17, + "source_file": "wikipedia2.pdf" + }, + { + "text": "References\n22. Seth, Anil (November 2016). \"The real problem\" (https://aeon.co/essays/the-hard-problem-of -consciousness-is-a-distraction-from-the-real-one). Aeon . Retrieved 22 April 2018.\n23. Sean Carroll (29 April 2019). \"Sean Carroll's Mindscape\" (https://www.preposterousunivers e.com/podcast/2019/04/29/episode-44-antonio-damasio-on-feelings-thoughts-and-the-evolu tion-of-humanity/). Preposterousuniverse.com (Podcast). Sean Carroll. Event occurs at 1:04.46. \"I'm just saying that the idea of a hard problem that you cannot transpose, I think is wrong.\"\n24. \"Psychological Scales. The Hard Problem of Consciousness\" (https://scales.arabpsycholog y.com/2022/11/19/hard-problem-of-consciousness-2/). arabpsychology.com . Retrieved 2023-10-29.\n25. Bourget, David; Chalmers, David J. (2020). \"Philosophers on Philosophy: The 2020 PhilPapers Survey\" (https://survey2020.philpeople.org). Philosophers' Imprint .\n26. Roberts, Tim S. (September 2007). \" The Even Harder Problem of Consciousness by Roberts. Tim S.\" (https://www.researchgate.net/publication/228618472) NeuroQuantology . 5 (2): 214-221. doi:10.14704/nq.2007.5.2.129 (https://doi.org/10.14704%2Fnq.2007.5.2.129).\n27. Chalmers, David (1996). The Conscious Mind . New York: Oxford University Press. pp. xiixiii, 95-106, backcover.\n28. Pinker, Steven (2018). Enlightenment Now . Viking. p. 481. ISBN 9780525427575.", + "page_start": 19, + "page_end": 19, + "source_file": "wikipedia2.pdf" + }, + { + "text": "Hard problem of consciousness\ncognitive psychologist Steven Pinker puts it, they are about as easy as going to Mars or curing cancer. \"That is, scientists more or less know what to look for, and with enough brainpower and funding, they would probably crack it in this century.\" [9]\nThe existence of the hard problem is disputed. It has been accepted by some philosophers of mind such as Joseph Levine, [10] Colin McGinn, [11] and Ned Block [12] and cognitive neuroscientists such as Francisco Varela, [13] Giulio Tononi, [14][15] and Christof Koch. [14][15] On the other hand, its existence is denied by other philosophers of mind, such as Daniel Dennett, [16] Massimo Pigliucci, [17] Thomas Metzinger, Patricia Churchland, [18] and Keith Frankish, [19] and by cognitive neuroscientists such as Stanislas Dehaene, [20] Bernard Baars, [21] Anil Seth, [22] and Antonio Damasio. [23] Clinical neurologist and skeptic\nSteven Novella has dismissed it as \"the hard non-problem\". [24] According to a 2020 PhilPapers survey, a majority (62.42%) of the philosophers surveyed said they believed that the hard problem is a genuine problem, while 29.72% said that it does not exist. [25]\nThere are a number of other potential philosophical problems that are related to the Hard Problem. Ned Block believes that there exists a \"Harder Problem of Consciousness\", due to the possibility of different physical and functional neurological systems potentially having phenomenal overlap. [12] Another potential philosophical problem which is closely related to Benj Hellie's vertiginous question, dubbed \"The Even Harder Problem of Consciousness\", refers to why a given individual has their own particular personal identity, as opposed to existing as someone else. [26]", + "page_start": 0, + "page_end": 1, + "source_file": "wikipedia2.pdf" + }, + { + "text": "References\n34. Chalmers, David (2020). \"Is the hard problem of consciousness universal?\" (http://consc.ne t/papers/universal.pdf) (PDF). Journal of Consciousness Studies . 27 (5-6): 227-257. Retrieved 22 February 2022.\n35. Locke, John (1722). The works of John Locke: in three volumes . Vol. 1. London: Printed for A. Churchill, and A. Manship, and sold by W. Taylor in Pater-noster-Row. p. 293 (https://book s.google.com/books?id=0BfmAAAAMAAJ&pg=PA293).\n36. Leibniz, Monadology, 17, as quoted by Aranyosi, Istvan (2004). \"Chalmers's zombie arguments\" (http://www.personal.ceu.hu/students/03/Istvan_Aranyosi/Chapter%20IV.pdf) (PDF) (draft ed.). Central European University Personal Pages.\n37. Mill, John Stuart. A System of Logic (1843), Book V, Chapter V, section 3\n38. Huxley, Thomas Henry; Youmans, William Jay (1868). The elements of physiology and hygiene: a text-book for educational institutions . New York: D. Appleton and company. p. 178 (https://books.google.com/books?id=aVUAAAAAYAAJ&pg=PA178).\n39. Arnold, Dan (2021). \"Philosophy of Mind's \"Hard Problem\" in Light of Buddhist Idealism\". In Emmanuel, Steven M. (ed.). Philosophy's Big Questions: Comparing Buddhist and Western Approaches . New York: Columbia University Press. pp. 97-128. ISBN 978-0231174879.\n40. Bryan Van Norden, Buddhism Comes to China (https://www.youtube.com/watch?v=Q1xv3H mUddY), 17 March 2021, retrieved 2021-12-29\n41. Tiwald, Justin; Van Norden, Bryan W. eds. (2005), Readings in Later Chinese Philosophy, p. 101. Hackett Publishing.\n42. Levine, J. 1983. 'Materialism and qualia: the explanatory gap'. Pacific Philosophical Quarterly , 64: 354-361.", + "page_start": 20, + "page_end": 20, + "source_file": "wikipedia2.pdf" + }, + { + "text": "Eliminative materialism / Illusionism\nThe philosopher Daniel Dennett is another prominent figure associated with illusionism. After Frankish published a paper in the Journal of Consciousness Studies titled Illusionism as a Theory of Consciousness, [60] Dennett responded with his own paper with the spin-off title Illusionism as the Obvious Default Theory of Consciousness. [61] Dennett has been arguing for the illusory status of consciousness since early on in his career. For example, in 1979 he published a paper titled On the Absence of Phenomenology (where he argues for the nonexistence of phenomenal consciousness). [70] Similar ideas have been explicated in his 1991 book Consciousness Explained. [71] Dennett argues that the so-called \"hard problem\" will be solved in the process of solving what Chalmers terms the \"easy problems\". [16] He compares consciousness to stage magic and its capability to create extraordinary illusions out of ordinary things. [72] To show how people might be commonly fooled into overstating the accuracy of their introspective abilities, he describes a phenomenon called change blindness, a visual process that involves failure to detect scenery changes in a series of alternating images. [73] He accordingly argues that consciousness need not be what it seems to be based on introspection. To address the question of the hard problem, or how and why physical processes give rise to experience, Dennett states that the phenomenon of having experience is nothing more than the performance of functions or the production of behavior, which can also be referred to as the easy problems of consciousness. [16] Thus, Dennett argues that the hard problem of experience is included among-not separate from-the easy problems, and therefore they can only be explained together as a cohesive unit. [72]", + "page_start": 8, + "page_end": 8, + "source_file": "wikipedia2.pdf" + }, + { + "text": "Neural correlates of consciousness\nSince 1990, researchers including the molecular biologist Francis Crick and the neuroscientist Christof Koch have made significant progress toward identifying which neurobiological events occur concurrently to the experience of subjective consciousness. [131] These postulated events are referred to as neural correlates of consciousness or NCCs. However, this research arguably addresses the question of which neurobiological mechanisms are linked to consciousness but not the question of why they should give rise to consciousness at all, the latter being the hard problem of consciousness as Chalmers formulated it. In \"On the Search for the Neural Correlate of Consciousness\", Chalmers said he is confident that, granting the principle that something such as what he terms \"global availability\" can be used as an indicator of consciousness, the neural correlates will be discovered \"in a century or two\". [132] Nevertheless, he stated regarding their relationship to the hard problem of consciousness:\nOne can always ask why these processes of availability should give rise to consciousness in the first place. As yet we cannot explain why they do so, and it may well be that full details about the processes of availability will still fail to answer this question. Certainly, nothing in the standard methodology I have outlined answers the question; that methodology assumes a relation between availability and consciousness, and therefore does nothing to explain it. [...] So the hard problem remains. But who knows: Somewhere along the line we may be led to the relevant insights that show why the link is there, and the hard problem may then be solved. [132]\nThe neuroscientist and Nobel laureate Eric Kandel wrote that locating the NCCs would not solve the hard problem, but rather one of the so-called easy problems to which the hard problem is contrasted. [133] Kandel went on to note Crick and Koch's suggestion that once the binding problem-understanding what accounts for the unity of experience-is solved, it will be possible to solve the hard problem empirically. [133] However, neuroscientist Anil Seth argued that emphasis on the so-called hard problem is a distraction from what he calls the \"real problem\": understanding the neurobiology underlying", + "page_start": 14, + "page_end": 14, + "source_file": "wikipedia2.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia2.pdf", + "query": "What is David Chalmer's definition of \"consciousness\" ?", + "target_page": 2, + "target_passage": "Chalmers uses Thomas Nagel's definition of consciousness: \"the feeling of what it is like to be something.\"", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Overview\nCognitive scientist David Chalmers first formulated the hard problem in his paper \"Facing up to the problem of consciousness\" (1995) [1] and expanded upon it in The Conscious Mind (1996). His works provoked comment. Some, such as philosopher David Lewis and Steven Pinker, have praised Chalmers for his argumentative rigour and \"impeccable clarity\". [27] Pinker later said, in 2018, \"In the end I still think that the hard problem is a meaningful conceptual problem, but agree with Dennett that it is not a meaningful scientific problem. No one will ever get a grant to study whether you are a zombie or whether the same Captain Kirk walks on the deck of the Enterprise and the surface of Zakdorn. And I agree with several other philosophers that it may be futile to hope for a solution at all, precisely because it is a conceptual problem, or, more accurately, a problem with our concepts.\" [28] Daniel Dennett and Patricia Churchland, among others, believe that the hard problem is best seen as a collection of easy problems that will be solved through further analysis of the brain and behaviour. [29][30]\nConsciousness is an ambiguous term. It can be used to mean self consciousness, awareness, the state of being awake, and so on. Chalmers uses Thomas Nagel's definition of consciousness: \" the feeling of what it is like to be something.\" Consciousness, in this sense, is synonymous with experience. [31][27]", + "page_start": 1, + "page_end": 1, + "source_file": "wikipedia2.pdf" + }, + { + "text": "Global workspace theory\nOnce our intuitions are educated by cognitive neuroscience and computer simulations, Chalmers' hard problem will evaporate. The hypothetical concept of qualia, pure mental experience, detached from any information-processing role, will be viewed as a peculiar idea of the prescientific era, much like vitalism... [Just as science dispatched vitalism] the science of consciousness will keep eating away at the hard problem of consciousness until it vanishes.", + "page_start": 16, + "page_end": 16, + "source_file": "wikipedia2.pdf" + }, + { + "text": "References\n89. Chalmers, David (2020). \"Is the Hard Problem of Consciousness Universal?\". Journal of Consciousness Studies . 27 (5-6): 227-257.\n90. Papineau, D. (2019). \"Response to Chalmers' 'The Meta-Problem of Consciousness' \" (http s://philpapers.org/rec/PAPRTC-6). Journal of Consciousness Studies . 26 (9-10): 173-181.\n91. J. Levine, \"Conceivability, Identity, and the Explanatory Gap\" in Stuart R. Hameroff, Alfred W. Kaszniak and David Chalmers (eds.), Towards a Science of Consciousness III: The Third Tucson Discussions and Debates , The MIT Press, 1999,. pp 3-12.\n92. Gennaro, Rocco J. \"Consciousness\" (https://www.iep.utm.edu/consciou). Internet Encyclopedia of Philosophy .\n93. Block, Ned; Stalnaker, Robert (1999). \"Conceptual Analysis, Dualism, and the Explanatory Gap\" (http://www.nyu.edu/gsas/dept/philo/faculty/block/papers/ExplanatoryGap.pdf) (PDF). The Philosophical Review . 108 (1): 1-46. CiteSeerX 10.1.1.693.2421 (https://citeseerx.ist.ps u.edu/viewdoc/summary?doi=10.1.1.693.2421). doi:10.2307/2998259 (https://doi.org/10.230 7%2F2998259). JSTOR 2998259 (https://www.jstor.org/stable/2998259).\n94. Stoljar, Daniel (2005). \"Physicalism and Phenomenal Concepts\". Mind & Language . 20 (5): 469-494. doi:10.1111/j.0268-1064.2005.00296.x (https://doi.org/10.1111%2Fj.0268-1064.2 005.00296.x).", + "page_start": 23, + "page_end": 23, + "source_file": "wikipedia2.pdf" + }, + { + "text": "How the easy and hard problems are related\nphysical constituents. For example, water is nothing more than H 2 O molecules, and understanding everything about H 2 O molecules is to understand everything there is to know about water. But consciousness is not like this. Knowing everything there is to know about the brain, or any physical system, is not to know everything there is to know about consciousness. Consciousness, then, must not be purely physical. [27]", + "page_start": 3, + "page_end": 3, + "source_file": "wikipedia2.pdf" + }, + { + "text": "The \"soft-wired view\"\nSome consciousness researchers have argued that the hard problem is a cultural artifact, unique to contemporary Western Culture. This is similar to Type-B Materialism, but it makes the further claim that the psychological facts that cause us to intuit the hard problem are not innate, but culturally conditioned. Notable researchers who hold this view include Anna Wierzbicka, [96] Hakwan Lau and Matthias Michel. [97]\nWierzbicka (who is a linguist) argues that the vocabulary used by consciousness researchers (including words like experience and consciousness ) are not universally translatable, and are \"parochially English.\" [96] Weirzbicka calls David Chalmers out by name for using these words, arguing that if\nphilosophers \"were to use panhuman concepts expressed in crosstranslatable words\" (such as know , think , or feel ) then the hard problem would dissolve. [96] David Chalmers has responded to these criticisms by saying that he will not \"apologize for using technical terms in an academic article . . . they play a key role in efficient communication in every discipline, including Wierzbicka's\". [89]", + "page_start": 10, + "page_end": 11, + "source_file": "wikipedia2.pdf" + }, + { + "text": "Chalmers' formulation\n. . .even when we have explained the performance of all the cognitive and behavioral functions in the vicinity of experience-perceptual discrimination, categorization, internal access, verbal report-there may still remain a further unanswered question: Why is the performance of these functions accompanied by experience?\n- David Chalmers, Facing up to the problem of consciousness\nThe problems of consciousness, Chalmers argues, are of two kinds: the easy problems and the hard problem .", + "page_start": 1, + "page_end": 1, + "source_file": "wikipedia2.pdf" + }, + { + "text": "The \"hard-wired view\"\nJoseph Levine (who formulated the notion of the explanatory gap) states: \"The explanatory gap argument doesn't demonstrate a gap in nature, but a gap in our understanding of nature.\" [91] He nevertheless contends that full scientific understanding will not close the gap, [43] and that analogous gaps do not exist for other identities in nature, such as that between water and H 2 O. [92] The philosophers Ned Block and Robert Stalnaker agree that facts about what a conscious experience is like to the one experiencing it cannot be deduced from knowing all the facts about the underlying physiology, but by contrast argue that such gaps of knowledge are also present in many other cases in nature, such as the distinction between water and H 2 O. [93][12]\nTo explain why these two ways of knowing (i.e. third-person scientific observation and first-person introspection) yield such different understandings of consciousness, weak reductionists often invoke the phenomenal concepts strategy , which argues the difference stems from our inaccurate phenomenal concepts (i.e., how we think about consciousness), not from the nature of consciousness itself. [94][95] By this view, the hard problem of consciousness stems from a dualism of concepts, not from a dualism of properties or substances. [43]", + "page_start": 10, + "page_end": 10, + "source_file": "wikipedia2.pdf" + }, + { + "text": "Consciousness\nDavid Chalmers identified two problems in understanding the mind, which he named the \"hard\" and \"easy\" problems of consciousness. [381] The easy problem is understanding how the brain processes signals, makes plans and controls behavior. The hard problem is explaining how this feels or why it should feel like anything at all, assuming we are right in thinking that it truly does feel like something (Dennett's consciousness illusionism says this is an illusion). While human information processing is easy to explain, human subjective experience is difficult to explain. For example, it is easy to imagine a colorblind person who has learned to identify which objects in their field of view are red, but it is not clear what would be required for the person to know what red looks like . [382]", + "page_start": 25, + "page_end": 25, + "source_file": "wikipedia3.pdf" + }, + { + "text": "References\n74. Anthis, Jacy (2022). \"Consciousness Semanticism: A Precise Eliminativist Theory of Consciousness\" (https://philarchive.org/rec/ANTCSA). Biologically Inspired Cognitive Architectures 2021 . Studies in Computational Intelligence. Vol. 1032. pp. 20-41. doi:10.1007/978-3-030-96993-6_3 (https://doi.org/10.1007%2F978-3-030-96993-6_3). ISBN 978-3-030-96992-9. Retrieved 7 August 2022.\n75. Irvine, Elizabeth (2013). Consciousness as a scientific concept: a philosophy of science perspective . Studies in brain and mind. Vol. 5. Dordrecht; New York: Springer-Verlag. p. 167 (https://books.google.com/books?id=jO4HNB7OoUgC&pg=PA167). ISBN 9789400751729.\n76. Chalmers, David (2018). \"The Meta-Problem of Consciousness\" (http://consc.net/papers/me taproblem.pdf) (PDF). Journal of Consciousness Studies . 25 (9-10): 6-61. Retrieved 6 February 2019.\n77. Graziano, Michael (2013). Consciousness and the social brain . Oxford; New York: Oxford University Press. ISBN 978-0190263195.\n78. Michael Graziano (10 July 2015). \"Build-a-brain\" (https://aeon.co/essays/can-we-make-cons ciousness-into-an-engineering-problem). aeon.co . Retrieved 19 April 2018.", + "page_start": 22, + "page_end": 22, + "source_file": "wikipedia2.pdf" + }, + { + "text": "References\n144. The Meta-Problem of Consciousness | Professor David Chalmers | Talks at Google (https:// www.youtube.com/watch?v=OsYUWtLQBS0), 2 April 2019, retrieved 2022-01-11\n145. Stoppard, Tom (28 January 2015). \"First Person\". Programme notes . London: Royal National Theatre.", + "page_start": 26, + "page_end": 26, + "source_file": "wikipedia2.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia2.pdf", + "query": "What is the role of the PhilPapers organization ?", + "target_page": 6, + "target_passage": " PhilPapers is an organization that archives academic philosophy papers and periodically surveys professional philosophers about their views.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Restructuring and Other\nTable of Contents", + "page_start": 41, + "page_end": 41, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Bibliography\nPossin, Kevin (2016). \"Conductive Arguments: Why is This Still a Thing?\" (https://philpapers. org/rec/POSCAW-4). Informal Logic . 36 (4): 563-593. doi:10.22329/il.v36i4.4527 (https://do i.org/10.22329%2Fil.v36i4.4527). Archived (https://web.archive.org/web/20220108171723/ht tps://philpapers.org/rec/POSCAW-4) from the original on 8 January 2022. Retrieved 8 January 2022.\nPriest, Graham; Tanaka, Koji; Weber, Zach (2018). \"Paraconsistent Logic\" (https://plato.stan ford.edu/entries/logic-paraconsistent/). The Stanford Encyclopedia of Philosophy . Metaphysics Research Lab, Stanford University. Retrieved 14 December 2021.\nPépin, Jean (2004). \"Logos\". Encyclopedia of Religion (https://www.encyclopedia.com/philo sophy-and-religion/philosophy/philosophy-terms-and-concepts/logos). ISBN 978-0-02865733-2. Archived (https://web.archive.org/web/20211229134626/https://www.encyclopedi a.com/philosophy-and-religion/philosophy/philosophy-terms-and-concepts/logos) from the original on 29 December 2021. Retrieved 29 December 2021.\nPutnam, H. (1969). \"Is Logic Empirical?\". Boston Studies in the Philosophy of Science . Vol. 5. pp. 216-241. doi:10.1007/978-94-010-3381-7_5 (https://doi.org/10.1007%2F978-94010-3381-7_5). ISBN 978-94-010-3383-1.\nQuine, Willard Van Orman (1981). Mathematical Logic . Harvard University Press. p. 1. ISBN 978-0-674-55451-1.", + "page_start": 33, + "page_end": 33, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Roles and Responsibilities of the Board\nThe Board of Directors is accountable to shareholders for the proper and prudent investment and preservation of shareholder funds.\nThe Board is responsible for:\n〉 overseeing the Company, including its control and accountability systems;\n〉 providing leadership of the Company within a framework of prudent and effective controls which enable risks to be assessed and managed;\n〉 providing input into and final approval of management's development of corporate strategy and performance objectives;\n〉 reviewing, ratifying and monitoring systems of risk management and internal control, codes of conduct and legal compliance;\n〉 setting the Company's direction, strategies and financial objectives;\n〉 ensuring compliance with regulatory and ethical standards;\nwww.kingsgate.com.au\n〉 approving and monitoring the progress of major capital expenditure, capital management and acquisitions and divestitures;\n〉 approving and monitoring financial and other reporting;\n〉 appointing, terminating and reviewing the performance of the Managing Director;\n〉 ratifying the appointment and the termination of senior executives;\n〉 monitoring senior executives' performance and implementation of strategy; and\n〉 ensuring appropriate resources are available to senior executives.\nResponsibility for the day-to-day management of the Company is delegated to the Managing Director and the senior executives.\nIn carrying out its duties the Board meets formally at least nine times per year. Additional meetings are held to address specific issues or are held as the need arises. Directors also participate in meetings of various Board committees. In the financial year ending 30 June 2013, the Board met eleven times and there were four Committee meetings.", + "page_start": 35, + "page_end": 35, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Bibliography\nBlackburn, Simon (24 March 2016). \"rule of inference\". The Oxford Dictionary of Philosophy (https://www.oxfordreference.com/view/10.1093/oi/authority.20110803100432990). Oxford University Press. ISBN 978-0-19-954143-0. Archived (https://web.archive.org/web/2022010 8194809/https://www.oxfordreference.com/view/10.1093/oi/authority.20110803100432990) from the original on 8 January 2022. Retrieved 8 January 2022.\nBlair, J. Anthony; Johnson, Ralph H. (1987). \"The Current State of Informal Logic\" (https://ph ilpapers.org/rec/BLATCS). Informal Logic . 9 (2): 147-51. doi:10.22329/il.v9i2.2671 (https://d oi.org/10.22329%2Fil.v9i2.2671). Archived (https://web.archive.org/web/20211230194638/ht tps://philpapers.org/rec/BLATCS) from the original on 30 December 2021. Retrieved 2 January 2022.\nBlair, J. Anthony; Johnson, Ralph H. (2000). \"Informal Logic: An Overview\" (https://philpaper s.org/rec/BLAILA-3). Informal Logic . 20 (2): 93-107. doi:10.22329/il.v20i2.2262 (https://doi.o rg/10.22329%2Fil.v20i2.2262). Archived (https://web.archive.org/web/20211209195317/http s://philpapers.org/rec/BLAILA-3) from the original on 9 December 2021. Retrieved 29 December 2021.\nBlair, J. Anthony (20 October 2011). Groundwork in the Theory of Argumentation: Selected Papers of J. Anthony Blair . Springer Science & Business Media. p. 47. ISBN 978-94-0072363-4.", + "page_start": 24, + "page_end": 25, + "source_file": "wikipedia1.pdf" + }, + { + "text": "References\n54. Majeed, Raamy (September 2016). \"The hard problem & its explanatory targets\". Ratio . 29 (3): 298-311. doi:10.1111/rati.12103 (https://doi.org/10.1111%2Frati.12103).\n55. Levin, Janet (2008). \"Taking Type-B Materialism Seriously\" (https://philpapers.org/rec/LEVT TM). Mind and Language . 23 (4): 402-425. doi:10.1111/j.1468-0017.2008.00349.x (https://d oi.org/10.1111%2Fj.1468-0017.2008.00349.x).\n56. Mandik, Pete; Weisberg, Josh (2008). Wrenn, Chase (ed.). Type-Q Materialism (https://philp apers.org/rec/MANTM). Peter Lang Publishing Group.\n57. Pereira, Roberto Horácio Sá (2016). \"In Defence of Type-A Materialism\" (https://philpapers.o rg/rec/PERIDO-3). Diametros . 49 (49): 68-83. doi:10.13153/diam.49.2016.921 (https://doi.or g/10.13153%2Fdiam.49.2016.921).\n58. Yetter-Chappell, Helen (2017). \"Dissolving Type-B Physicalism\" (https://philpapers.org/rec/Y ETDTP-2). Philosophical Perspectives . 31 (1): 469-498. doi:10.1111/phpe.12099 (https://do i.org/10.1111%2Fphpe.12099).\n59. Ramsey, William (2019). \"Eliminative Materialism\" (https://plato.stanford.edu/entries/material ism-eliminative/). In Zalta, Edward N. (ed.). Stanford Encyclopedia of Philosophy . Retrieved 1 April 2019.", + "page_start": 21, + "page_end": 21, + "source_file": "wikipedia2.pdf" + }, + { + "text": "2. Social and political landscape\n80. The supreme authority of the State ought, therefore, to let subordinate groups handle matters and concerns of lesser importance, which would otherwise dissipate its efforts greatly. Thereby the State will more freely, powerfully, and effectively do all those things that belong to it alone because it alone can do them: directing, watching, urging, restraining, as occasion requires and necessity demands. Therefore, those in power should be sure that the more perfectly a graduated order is kept among the various associations, in observance of the principle of \"subsidiary function,\" the stronger social authority and effectiveness will be the happier and more prosperous the condition of the State.\nThis is the principle of subsidiarity, often summarized in a way that may sound familiar to many Open Data advocates: \"What men can do by themselves with their own resources can't be taken away from them and assigned as a task to society\" . In March 2011, journalist Guido Gentili made just this connection. After noting that the principle was also introduced in the Italian Constitution by the 2001 reform of article 118, he concluded that subsidiarity as a strategy for development isn't an English invention and the \"Big Society\" vision (a proposal in which Open data is key) would do good to Italy too\" .\nAt a more practical and economical level, digital information continues to increase. In spite of mounting cost pressures, large public and private organizations have to maintain massive amounts of structured and unstructured data, that keep growing, both for their own internal needs and to simply comply with government regulations . At the same time, signals that traditional public services and the whole welfare state won't remain sustainable for long with traditional means, continue to arrive, therefore strengthening the search for radical, innovative and cost-effective solutions.\nBesides costs, another practical driver and justification for Open Data that is becoming more and\n4/34\nCopyright 2011 LEM, Scuola Superiore Sant'Anna. This work is released under a Creative Commons attribution license (http://creativecommons.org/licenses/by/3.0/)", + "page_start": 3, + "page_end": 3, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "Bibliography\nSiegel, Harvey; Biro, John (1997). \"Epistemic Normativity, Argumentation, and Fallacies\" (htt ps://philpapers.org/rec/SIEENA). Argumentation . 11 (3): 277-292. doi:10.1023/A:1007799325361 (https://doi.org/10.1023%2FA%3A1007799325361). S2CID 126269789 (https://api.semanticscholar.org/CorpusID:126269789). Archived (https:// web.archive.org/web/20220228035651/https://philpapers.org/rec/SIEENA) from the original on 28 February 2022. Retrieved 4 January 2022.\nSimpson, R. L. (2008). Essentials of Symbolic Logic (3rd ed.). Broadview Press. p. 14. ISBN 978-1-77048-495-5.\nSmith, Robin (2022). \"Aristotle's Logic\" (https://plato.stanford.edu/entries/aristotle-logic/). The Stanford Encyclopedia of Philosophy . Metaphysics Research Lab, Stanford University. Retrieved 11 March 2023.\nSpade, Paul Vincent; Panaccio, Claude (2019). \"William of Ockham\" (https://plato.stanford.e du/entries/ockham/#SummLogi). The Stanford Encyclopedia of Philosophy . Metaphysics Research Lab, Stanford University.\nSpriggs, John (2012). GSN - The Goal Structuring Notation: A Structured Approach to Presenting Arguments . Springer Science & Business Media. pp. 20-22. ISBN 978-1-44712312-5.\nStairs, Allen (2017). A Thinker's Guide to the Philosophy of Religion . Routledge. p. 343. ISBN 978-1-351-21981-5.", + "page_start": 35, + "page_end": 35, + "source_file": "wikipedia1.pdf" + }, + { + "text": "6.2 Role of the Audit Committee\nThe primary objective of the Audit Committee is to assist the Board to fulfil its corporate governance and oversight responsibilities related to financial accounting practices, external financial reporting, financial reporting, risk management and internal control, and the internal and external audit function.\nSpecifically, the role of the Audit Committee includes:\n· examining the accounting policies of the Company to determine whether they are appropriate and in accordance with generally accepted practices;\n· ensuring that truth and fairness is reflected in the preparation and publication of the Company's financial reports;\n· meeting regularly with the internal and external auditors to reinforce their respective independence and to determine the appropriateness of internal and external audit procedures;\n· reviewing the performance of the internal and external auditors and providing them with confidential access to the Board;\n· receiving from the external auditors a formal written statement delineating all\nAnnual Report 2004\n31\n32\nrelationships between the auditors and the Company and confirming compliance with all professional and regulatory requirements relating to auditor independence; and\n· referring matters of concern to the Board, as appropriate, and considering issues which may impact on the financial reports of the Company.\nIn order to ensure that truth and fairness is reflected in the preparation and publication of the Company's financial reports, the Audit Committee reviews the written statement of the CEO and CFO to the Board that the Consolidated Financial Report presents a true and fair view, in all material respects, of the financial condition and operational results of the Santos Group and is in accordance with Accounting Standards. This Statement also confirms that:\n· the Consolidated Financial Report is founded on a sound system of risk management and internal compliance and control, which implements the policies adopted by the Board; and\n· the Company's risk management and internal control systems, to the extent they relate to financial reporting, are operating effectively in all material respects.\nThe Chairman of the Audit Committee provides, and addresses, a written report together with the minutes and recommendations of the Audit Committee at the next Board Meeting. Similar procedures apply to all other Committees of the Board.\nAnnual Report 2004", + "page_start": 32, + "page_end": 33, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "Nomination Committee\nThe members of the Nomination Committee as at the date of this Report are:\n〉 Mr Ross Smyth-Kirk (Chairman of Nomination Committee);\n〉 Mr Peter McAleer; and\n〉 Mr Craig Carracher.\nThe role of the Nomination Committee supports and advises the Board in fulfilling its responsibility to ensure that it comprises individuals who are best able to discharge the responsibilities of the Directors, having regard to the law and the highest standards of governance, by:\n〉 assessing the skills required on the Board;\n〉 reviewing the structure, size and composition of the Board;\n〉 from time to time assessing the extent to which the required skills are represented on the Board and ensuring an appropriate succession planning is in place;\n〉 establishing processes for the review of the performance of individual Directors and the Board as a whole, its committees and key executives; and\n〉 establishing processes for the identification of suitable candidates for appointment to the Board.\nTo ensure that the Board has an appropriate mix of skills and experience, the Nomination Committee will consider men and women from diverse backgrounds for Board membership who have demonstrated high levels of integrity and performance in improving shareholder returns, and who can apply such skills and experience to the benefit of the Company.\nThe Nomination Committee met once during the 2013 financial year.\nThe Nomination Committee operates in accordance with a charter published in the 'Corporate Governance' section of the Company's website.", + "page_start": 37, + "page_end": 37, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Responsibilities:\nChairman of the Board, member of the Audit Committee and Chairman of the Remuneration Committee and Nomination Committee.", + "page_start": 49, + "page_end": 49, + "source_file": "ASX_KCN_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0510.pdf", + "query": "What explains mostly the physical behavior that occurs in region iii of thin films ?", + "target_page": 5, + "target_passage": "The observed behaviour in region iii) can be reason- ably attributed to the decreasing relevance of the con- tribution to the total energy of the system coming from the competitive interactions among NNN planes as the film thickness decreases", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "IV. DISCUSSION AND CONCLUSION\nA possible framework to analyze the results presented in the previous Section is suggested by Fig. 5, where we can easily distinguish three significant regions: i ) high thickness, n /greaterorequalslant 16, where the films substantially display a bulk behaviour, with the single planes ordering temperature coinciding with the helical phase transition one; ii ) intermediate thickness, 6 ≤ n /lessorsimilar 15, where the temperature corresponding to the onset of in-plane order, T C ( n ), is still /similarequal T Ho N , but where the helical/fan arrangement stabilizes only below a finite temperature T N ( n ) < T C ( n ); iii ) low thickness,1 ≤ n ≤ 5, where T C ( n ) /lessorsimilar T Ho N but no fan phase is present at any temperature.\nThe observed behaviour in region iii ) can be reasonably attributed to the decreasing relevance of the contribution to the total energy of the system coming from the competitive interactions among NNN planes as the film thickness decreases; moreover, the thinness of the\nFIG. 7: (color online) ∆ ϕ l ( T ) vs. temperature for the surface planes, l = 1 (triangles), l = 2 (squares), l = 3 (diamonds), l = 4 (circles). Straight lines and full symbols: n = 8. Dashed lines and open symbols: n = 16.\nfilm leads to an effective 2d-like trend. Region ii ) looks however more intriguing, and requires a more accurate discussion, which can benefit from a careful comparison of the behaviour of a given quantity in regions i ) and ii ).\n/negationslash", + "page_start": 4, + "page_end": 5, + "source_file": "1001.0510.pdf" + }, + { + "text": "Acknowledgments\n[110] L. Rockford, Y. Liu, P. Mansky, T. P. Russell, M. Yoon, and S. G. J. Mochrie, 'Polymers on nanoperiodic, heterogeneous surfaces,' Phys. Rev. Lett. 82 , 2602-2605 (1999).\n[111] A. Sehgal, V. Ferreiro, J. F. Douglas, E. J. Amis, and A. Karim, 'Pattern-directed dewetting of ultrathin polymer films,' Langmuir 18 , 7041-7048 (2002).\n[112] M. Geoghegan and G. Krausch, 'Wetting at polymer surfaces and interfaces,' Prog. Polym. Sci. 28 , 261-302 (2003).\n[113] P. Lenz and R. Lipowsky, 'Morphological transitions of wetting layers on structured surfaces,' Phys. Rev. Lett. 80 , 1920-1923 (1998).\n[114] C. Bauer, S. Dietrich, and A. O. Parry, 'Morphological phase transitions of thin fluid films on chemically structured substrates,' Europhys. Lett. 47 , 474-480 (1999).\n[115] R. Konnur, K. Kargupta, and A. Sharma, 'Instability and morphology of thin liquid films on chemically heterogeneous substrates,' Phys. Rev. Lett. 84 , 931-934 (2000).\n[116] M. Brinkmann and R. Lipowsky, 'Wetting morphologies on substrates with striped surface domains,' J. Appl. Phys. 92 , 4296-4306 (2002).\n[117] L. Brusch, H. Kuhne, U. Thiele, and M. Bar, 'Dewetting of thin films on heterogeneous substrates: Pinning vs. coarsening,' Phys. Rev. E 66 , 011602 (2002).", + "page_start": 32, + "page_end": 32, + "source_file": "1001.2669.pdf" + }, + { + "text": "II. EXPERIMENT WITH NANOPARTICLE SOLUTIONS\nWhen following the evolution of the branched patterns in situ (see the complementary video material of Ref. [40]), one clearly observes that different processes occur on different lenght scales. First, a macroscopic dewetting front recedes, leaving behind a seemingly dry substrate. The macroscopic front can be transversely unstable resulting in large-scale ( > 100 µ m) strongly anisotropic fingered structures. For fronts that move relatively quickly these macroscopic structures cover all the available substrate. However, when at a later stage the macroscopic front becomes slower, those fingers become scarce and 'macroscopic fingering' finally ceases. At this stage it is possible to appreciate that the seemingly dry region left behind by the front is not at all dry, but covered by an ultrathin 'postcursor' film that is itself unstable. The thickness of this film\n6\nis similar to the size of the nanoparticles. At a certain distance from the macroscopic front, the ultrathin film starts to evolve a locally isotropic pattern of holes. The holes themselves grow in an unstable manner resulting in an array of isotropically branched structures as shown, e.g., above in Fig. 1. This indicates that at least some of the patterns described in the literature may have arisen from processes in similar ultrathin 'postcursor' films.\nThe existence of the ultrathin 'postcursor' film is an experimental finding that can be drawn on when choosing a theoretical approach to account for the pattern formation (see below). Note however, that at the moment there exists no explanation for its existence. A possible hypothesis is that the substrate strongly attracts the nanoparticles. As a result they form a dense suspension layer having a thickness roughly equal to the diameter of the nanoparticles. The observed mesoscopic dewetting front then actually correspond to an autophobic dewetting of a low concentration suspension from the higher concentration suspension on the surface of the substrate.", + "page_start": 5, + "page_end": 6, + "source_file": "1001.2669.pdf" + }, + { + "text": "C. Thin film hydrodynamics\n(i) in Fig. 8). The concentration increases further and when it approaches random close packing φ c , the viscosity diverges and the front pins itself. When pinned, further retraction only occurs through evaporation (Fig. 7(b) and regime (ii) in Fig. 8). The front eventually depins and starts to move again, leaving a nanoparticle ring behind (Fig. 7(c) and regime (iii) in Fig. 8). However, the velocity is not as large as at the beginning, owing to the fact that the mean concentration of particles has increased. The remaining particles are transported to the centre and are deposited there when the remaining solvent evaporates (regime (iv) in Fig. 8).\nThe simple model used here shows, (i) that the contact line stops due to self-pinning by the deposited particles and (ii) the Marangoni effect is not necessary for the ring formation. The model can easily be refined to account for solutal and/or thermal Marangoni effects [88] but self-pinning\n22\nFIG. 8: (Colour online) Space-time plots are given for (left) the film thickness h and (right) the nanoparticle layer height h p = hφ . The plot corresponds to the complete evolution resulting in the ring profile of Fig. 6(b). In both panels bright [dark] parts denote high [low] regions. The prominent central dark-bright border in the left panel indicates the change of the position of the contact line in time. Over time, four regimes can be distinguished: (i) fast motion before pinning, (ii) nearly no front motion during self-pinning, (iii) slow motion after depinning, and (iv) final evaporation from the center.\nshould also be investigated further in the simple case presented here.", + "page_start": 21, + "page_end": 22, + "source_file": "1001.2669.pdf" + }, + { + "text": "Acknowledgments\nBenard instability,' Phys. Rev. Lett. 88 , 164501 (2002).\n[50] J. Huang, F. Kim, A. R. Tao, S. Connor, and P. Yang, 'Spontaneous formation of nanoparticle stripe patterns through dewetting,' Nat. Mater. 4 , 896-900 (2005).\n[51] S. H. Lee, P. J. Yoo, S. J. Kwon, and H. H. Lee, 'Solvent-driven dewetting and rim instability,' J. Chem. Phys. 121 , 4346-4351 (2004).\n[52] L. Xu, T. F. Shi, P. K. Dutta, and L. An, 'Rim instability by solvent-induced dewetting,' J. Chem. Phys. 127 , 144704 (2007).\n[53] L. Xu, T. F. Shi, and L. J. An, 'The dewetting dynamics of the polymer thin film by solvent annealing,' J. Chem. Phys. 129 , 044904 (2008).\n[54] M. Elbaum and S. G. Lipson, 'How does a thin wetted film dry up?' Phys. Rev. Lett. 72 , 3562-3565 (1994).\n[55] N. Samid-Merzel, S. G. Lipson, and D. S. Tannhauser, 'Pattern formation in drying water films,' Phys. Rev. E 57 , 2906-2913 (1998).\n[56] A. Padmakar, K. Kargupta, and A. Sharma, 'Instability and dewetting of evaporating thin water films on partially and completely wettable substrates,' J. Chem. Phys. 110 , 1735-1744 (1999).\n[57] A. V. Lyushnin, A. A. Golovin, and L. M. Pismen, 'Fingering instability of thin evaporating liquid films,' Phys. Rev. E 65 , 021602 (2002).\n[58] L. M. Pismen, 'Spinodal dewetting in a volatile liquid film,' Phys. Rev. E 70 , 021601 (2004).", + "page_start": 28, + "page_end": 28, + "source_file": "1001.2669.pdf" + }, + { + "text": "Interplay among helical order, surface effects and range of interacting layers in ultrathin films.\nF. Cinti (1 , 2 , 3) , A. Rettori (2 , 3) , and A. Cuccoli (2)\n(1) Department of Physics, University of Alberta, Edmonton, Alberta, Canada T6G 2J1\n(2) CNISM and Department of Physics, University of Florence, 50019 Sesto Fiorentino (FI), Italy. and\n(3) CNR-INFM S 3 National Research Center, I-41100 Modena, Italy\n(Dated: June 8, 2022)\nThe properties of helical thin films have been thoroughly investigated by classical Monte Carlo simulations. The employed model assumes classical planar spins in a body-centered tetragonal lattice, where the helical arrangement along the film growth direction has been modeled by nearest neighbor and next-nearest neighbor competing interactions, the minimal requirement to get helical order. We obtain that, while the in-plane transition temperatures remain essentially unchanged with respect to the bulk ones, the helical/fan arrangement is stabilized at more and more low temperature when the film thickness, n , decreases; in the ordered phase, increasing the temperature, a softening of the helix pitch wave-vector is also observed. Moreover, we show also that the simulation data around both transition temperatures lead us to exclude the presence of a first order transition for all analyzed sizes. Finally, by comparing the results of the present work with those obtained for other models previously adopted in literature, we can get a deeper insight about the entwined role played by the number (range) of interlayer interactions and surface effects in non-collinear thin films.\nPACS numbers: 64.60.an,64.60.De,75.10.Hk,75.40.Cx,75.70.Ak.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0510.pdf" + }, + { + "text": "I. INTRODUCTION\nThe patterns formed in dewetting processes have attracted strong interest since Reiter analysed the process quantitatively in the early nineties. In these experiments, that proved to be a paradigm in our understanding of dewetting, a uniform thin film of polystyrene (tens of nanometers thick) is deposited on a flat silicon oxide substrate is brought above the glass transition temperature. The film ruptures in several places, forming holes which subsequently grow, competing for space. As a result, a random polygonal network of liquid rims emerges. The rims may further decay into lines of small drops due to a Rayleigh-type instability [1-3]. The related problems of retracting contact lines on partially wetting substrates and the opening of single holes in rather thick films have also been studied [4, 5].\nSubsequent work has mainly focused on many different aspects of the dewetting process for simple non-volatile liquids and polymers (for reviews see Refs. [6-8]). All stages of the dewetting of a film are studied: the initial film rupture via nucleation or a surface instability (called spinodal dewetting) [1, 9-13], the growth process of individual holes [14-16], the evolution of the resulting hole pattern [3, 13], and the stability of the individual dewetting fronts [17-19]. We note in passing, that descriptions of dewetting patterns may also be found in historic papers, particularly for the dewetting of a liquid film on a liquid substrate. Tomlinson [20, footnote 18 on p. 40] considered turpentine on water and Marangoni [21, p. 352f] oil on water.", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2669.pdf" + }, + { + "text": "Acknowledgments\n[5] F. Brochard-Wyart and J. Daillant, 'Drying of solids wetted by thin liquid films,' Can. J. Phys. 68 , 1084-1088 (1989).\n[6] P. Muller-Buschbaum, 'Dewetting and pattern formation in thin polymer films as investigated in real and reciprocal space,' J. Phys.-Condes. Matter 15 , R1549-R1582 (2003).\n[7] R. Seemann, S. Herminghaus, C. Neto, S. Schlagowski, D. Podzimek, R. Konrad, H. Mantz, and K. Jacobs, 'Dynamics and structure formation in thin polymer melt films,' J. Phys.-Condes. Matter 17 , S267-S290 (2005).\n[8] U. Thiele, 'Structure formation in thin liquid films,' in S. Kalliadasis and U. Thiele, editors, 'Thin films of Soft Matter,' pages 25-93, Springer, Wien (2007).\n[9] R. Xie, A. Karim, J. F. Douglas, C. C. Han, and R. A. Weiss, 'Spinodal dewetting of thin polymer films,' Phys. Rev. Lett. 81 , 1251-1254 (1998).\n[10] R. Seemann, S. Herminghaus, and K. Jacobs, 'Dewetting patterns and molecular forces: A reconciliation,' Phys. Rev. Lett. 86 , 5534-5537 (2001).\n[11] U. Thiele, M. G. Velarde, and K. Neuffer, 'Dewetting: Film rupture by nucleation in the spinodal regime,' Phys. Rev. Lett. 87 , 016104 (2001).\n[12] M. Bestehorn and K. Neuffer, 'Surface patterns of laterally extended thin liquid films in three dimensions,' Phys. Rev. Lett. 87 , 046101 (2001).", + "page_start": 25, + "page_end": 25, + "source_file": "1001.2669.pdf" + }, + { + "text": "III. MODELLING APPROACHES\nFor the present system a thin film description using Eq. (1) is not appropriate because the nanoparticles are not taken into account. However, under certain conditions one can augment equation (1) for the evolution of the film thickness by coupling it to an equation for the evolution of the mean particle concentration. The resulting model is able to describe the behaviour of an evaporating solution on the meso- and macroscale. Such an approach is briefly discussed below in Section III C. Weshould expect such a model to describe the mesoscopic dewetting front discussed above. However, the theory is less suited to a description of the dewetting dynamics of the ultrathin postcursor\nfilm.\nThe dewetting of the ultrathin film of highly concentrated suspension may be described by a discrete stochastic model such as, for instance, a kinetic Monte Carlo (KMC) model based solely on evaporation/condensation dynamics of the solvent and diffusion of the solute [35, 39, 41]. The validity of this strong assumption regarding the relevant transport processes can be confirmed from an estimate based on Eq. (1): The pressure p = δF/δh drives convection and evaporation. The convective mobility is proportional to h 3 , i.e., it is large for thick films but decreases strongly with reduced film thickness. The evaporative mobility, however, is a constant, implying that evaporation will dominate below a certain (cross-over) thickness. For the parameter values of Ref. [57] and a small contact angle ( ≈ 0 . 01 ), the cross-over thickness is in the range of 1-5 nanometers. This estimate justifies the neglect of convective transport in a description of the postcursor film and may explain why one has such good agreement between the experimentally observed patterns and the patterns obtained from a purely two-dimensional (single layer) kinetic Monte Carlo model [35]. We introduce the KMC model below in Section III A.", + "page_start": 7, + "page_end": 7, + "source_file": "1001.2669.pdf" + }, + { + "text": "Acknowledgments\n[13] J. Becker, G. Grun, R. Seemann, H. Mantz, K. Jacobs, K. R. Mecke, and R. Blossey, 'Complex dewetting scenarios captured by thin-film models,' Nat. Mater. 2 , 59-63 (2003).\n[14] C. Redon, F. Brochard-Wyart, and F. Rondelez, 'Dynamics of dewetting,' Phys. Rev. Lett. 66 , 715718 (1991).\n[15] R. Seemann, S. Herminghaus, and K. Jacobs, 'Shape of a liquid front upon dewetting,' Phys. Rev. Lett. 87 , 196101 (2001).\n[16] R. Fetzer, K. Jacobs, A. Munch, B. Wagner, and T. P. Witelski, 'New slip regimes and the shape of dewetting thin liquid films,' Phys. Rev. Lett. 95 , 127801 (2005).\n[17] F. Brochard-Wyart and C. Redon, 'Dynamics of liquid rim instabilities,' Langmuir 8 , 2324-2329 (1992).\n[18] G. Reiter and A. Sharma, 'Auto-optimization of dewetting rates by rim instabilities in slipping polymer films,' Phys. Rev. Lett. 87 , 166103 (2001).\n[19] A. Munch and B. Wagner, 'Contact-line instability of dewetting thin films,' Physica D 209 , 178-190 (2005).\n26", + "page_start": 25, + "page_end": 25, + "source_file": "1001.2669.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0510.pdf", + "query": "Where are located the magnetic ions in the lattice of the studied layers ?", + "target_page": 2, + "target_passage": "the magnetic ions are located on the sites of a body-centered tetragonal (BCT) lattice", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "IV. DISCUSSION AND CONCLUSION\nFIG. 8: (color online) Q z , position of the maximum of S ( /vector q ), vs. temperature for thickness n = 8. Inset: magnetic vector ( m x l , m y l ) profile for some temperatures for L = 64. Colors and symbols as in Fig. 2.\nFIG. 9: ∆ ϕ l for a BCT lattice and n = 12, when the six coupling constants set employed in Ref. 14,15 (see text) is used. The temperature range has been chosen around T C ( n ) (error bars lye within point size).\ngled out, with the high-temperature, paramagnetic phase separated from the low-temperature, long-range ordered one, by an intermediate-temperature block phase where outer ordered 4-layers blocks coexist with some inner disordered ones. Moreover, it was observed that the phase transition of such inner layers turns out to have the signatures of a Kosterlitz-Thouless one.\nThe absence of the block phase in the J 1 -J 2 model here investigated has to be attributed to the different range of interactions, rather than to the different lattice structure. We came to this conclusion by doing some simulations using the same set of interaction constants employed in Refs. 14,15, but using a BCT lattice: the results we obtained for ∆ ϕ l with n = 12 are reported in Fig. 9. The latter is absolutely similar to Fig.7 of Ref. 15 and clearly displays the footmarks of the block phase (see down-triangle), with two external blocks of ordered layers ( l =1.. . 5 and 8. . . 12 ), where ∆ ϕ l is roughly 10 · , separated by a block of disordered layers, and with almost\nFIG. 10: (colors online) Equilibrium probability distribution of the energy for the thickness n = 8 for some temperatures around T N (8), (a) , and T C (8), (b) , respectively.\nopposite magnetization. We can thus confidently assert that, regardless of the underlying lattice structure, by decreasing the number of the out-of-plane interactions, for thicknesses close to the helical bulk pitch, the block", + "page_start": 5, + "page_end": 6, + "source_file": "1001.0510.pdf" + }, + { + "text": "II. MODEL HAMILTONIAN AND MONTE CARLO OBSERVABLES\n/vector S i are classical planar unit vectors representing the direction of the total angular momentum of the magnetic ions, whose magnitude √ j ( j +1) ( j = 8 for Holmium ions) is already encompassed within the definition of the interaction constants J 0 , 1 , 2 . As sketched in Fig. 1, the magnetic ions are located on the sites of a body-centered tetragonal (BCT) lattice; the first sum appearing in the Hamiltonian describes the in-plane ( xy ) nearest neighbor (NN) interaction, which is taken ferromagnetic (FM), with exchange strength J 0 > 0; the second sum represents the coupling, of exchange strength J 1 , between spins belonging to nearest neighbor (NN) planes along the z -direction (which we will assume to coincide with the film growth direction); finally, the third sum takes into account the interaction, of exchange strength J 2 , between spins lying on next-nearest neighbor (NNN) planes along z . In order to have frustration, giving rise to noncollinear order along z in the bulk, NN interaction J 1 can be taken both ferro- or antiferromagnetic, but NNN coupling J 2 has necessarily to be antiferromagnetic, and the condition | J 2 | > | J 1 | / 4 must be fulfilled. Such simplified Hamiltonian was already employed to simulate helical ordering in bulk systems by Diep 1,17 and Loison 18 . In the bulk limit, the state of minimal energy of a system described by Eq.(1) corresponds to a helical arrangement of spins. The ground state energy per spin is equal to e g ( Q z ) = [ -4 J 0 -2 J 1 (4 cos ( Q z c ' ) + δ cos (2 Q z c ' ))] where c ' is the distance between NN layers, δ = J 2 J 1 , and Q z c ' = arccos ( -1 δ ) is the angle between spins lying on adjacent planes along the z -direction. The observed helical arrangement in bulk holmium corresponds to Q z c ' /similarequal 30 . 5 · 10 : such value can be obtained from the formula above with the set of coupling constants J 0 =67.2K, J 1 =20.9K, and J 2 =", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0510.pdf" + }, + { + "text": "II. MODEL HAMILTONIAN AND MONTE CARLO OBSERVABLES\n-24.2 K, that we have employed in our simulations. The given values for the exchange constants are the same already used by Weschke et al. in Ref. 13 to interpret experimental data on Holmium films on the basis of a J 1 -J 2 model, after a proper scaling by the numbers of NN and NNN on neighboring layers of a BCT lattice.\nIn the following we will denote with n the film thickness, i.e. the number of spin layers along the z direction, and with L × L the number of spins in each layer (i.e., L is the lattice size along both the x and y directions). In our simulations thickness values from 1 to 24 were considered, while the range of lateral size L was from 8 to 64. Periodic boundary conditions were applied along x and y , while free boundaries were obviously taken along the film growth direction z .\nThermal equilibrium was attained by the usual Metropolis algorithm 19 , supplemented by the overrelaxed technique 20 in order to speed-up the sampling of the spin configuration space: a typical 'Monte Carlo step' was composed by four Metropolis and four-five over-relaxed moves per particle. Such judicious mix of moves is able both to get faster the thermal equilibrium and to minimize the correlation 'time' between successive samples, i.e. the undesired effects due to lack of in-\ndependence of different samples during the measurement stage. For each temperature we have usually performed three independent simulations, each one containing at least 2 × 10 5 measurements, taken after discarding up to 5 × 10 4 Monte Carlo steps in order to assure thermal equilibration.\nIn the proximity of the critical region the multiple histogram (MH) technique was also employed 21 , as it allows us to estimate the physical observables of interest over a whole temperature range in a substantially continuous way by interpolating results obtained from sets of simulations performed at some different temperatures.", + "page_start": 1, + "page_end": 2, + "source_file": "1001.0510.pdf" + }, + { + "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nClear differences are observed between the Mn XMCD hysteresis loops obtained using TEY and FY detection modes. For FY the magnitude of the XMCD is similar (but of opposite sign) at remanence and at high magnetic fields, whereas for TEY at remanence it is approximately a factor of two larger than at 1000 Oe. The Mn L 2 , 3 XMCD spectra recorded at remanence and at 1000 Oe, shown in Fig. 3, confirm this result. At remanence the FY and TEY detected XMCD have similar magnitudes. However, under a large external field the XMCD is substantially smaller in TEY than in FY, confirming that the net magnetization of the Mn ions near the interface is significantly less than in the bulk of the (Ga,Mn)As film. This is the case even up to the highest field applied (20 kOe). By applying the XMCD sum rules 14 to the TEY data, and by comparing the spectra to previous measurements on well-characterized (Ga,Mn)As\nsamples 15 , the projected Mn 3 d magnetic moments are obtained as -1.4 µ B and +0.8 µ B per ion at remanence and 1000 Oe, respectively.\nThe difference between these values can be understood as being due to an interface layer which is strongly antiferromagnetically coupled to the Fe layer. At zero field, both the interfacial and bulk Mn are aligned antiparallel to the Fe layer. At high fields, the bulk of the (Ga,Mn)As layer away from the interface is re-oriented into the external field direction. However, the interfacial Mn remains antiparallel to the Fe layer and thus partially compensates the XMCD signal from the bulk of the (Ga,Mn)As. From the size of the remanent and 1000 Oe magnetic moments, it can be estimated that around 25-30% of the TEY XMCD signal can be ascribed to the interfacial Mn which is strongly coupled to the Fe moments.", + "page_start": 1, + "page_end": 2, + "source_file": "1001.2449.pdf" + }, + { + "text": "III. RESULTS\nFIG. 4: (color online) Thermodynamic quantities obtained for thickness n = 8 in the temperature range 0-150 K. Colors and symbols as in Fig. 2. (a) : specific heat; (b) : chirality order parameter. (c) : susceptibility χ κ . (d) : Binder cumulant for κ .\n133 . 1(3)K (see Fig. 3b). The crossing points of the Binder's cumulants of the helical order parameter immediately appear to be located, within the error bars, at the same temperature of those for the average magnetization previously discussed. In addition, it is worthwhile to observe that the peak evolution of S (0 , 0 , q z ), in particular close to T N (16) (inset of Fig. 3b), displays the typical behaviour expected for an helical structure. We can thus conclude that for n = 16, as it is commonly observed in bulk samples, the establishment of the in-plane order coincides with onset of the perpendicular helical arrangement at T N (16). However, due to helix distortion in the surface regions, the maximum of S (0 , 0 , q z ) stabilizes at values of q z sensibly smaller (e.g. Q z ( T N (16)) ≈ 16 · , and Q z ( T = 10 K ) ≈ 28 · ) with respect to the bulk one ( Q Ho z = 30 . 5 · ).\nThe MC simulations outcomes for n = 16 we just presented appear quite different with respect to those obtained at the same thickness for the model with six coupling constants along the z direction 14,15 . Indeed, for the J 1 -J 2 model here investigated, we observe that all layers order at the same temperature, and we do not find any hint of the block-phase, with inner disordered planes intercalated to antiparallel quasi -FM four-layer blocks, previously observed; sample MC runs we made using the same hcp lattice employed in Refs. 14,15 shows that the presence or absence of the block phase is not related to the lattice geometry, but it is a consequence of the interaction range only.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0510.pdf" + }, + { + "text": "III. RESULTS\nWe now move to describe and discuss MC simulation data for thinner samples. A graphical synthesis of the results obtained for n = 8 in reported in Fig. 4a-d. The specific heat c v , shown in Figs. 4a, reveals very small finite-size effects, which, however, cannot be unambiguously detected for the largest lattice size ( L = 64), as they fall comfortably within the error range. Surprisingly, the specific heat maximum is located close to the bulk transition temperature as found for n = 16, and\nFIG. 5: Transition temperatures T N ( n ) and T C ( n ) vs. film thickness n .\nthe same is true for the crossing point of the Binder cumulant of the average magnetization M (not reported in figure), which is located at T C (8) = 133 . 3(3)K. These data give a first rough indication that also for n = 8 all the planes of the sample are still ordering almost at the same temperature; such property has been observed for all the investigated thicknesses n below 16, so that T C ( n ) results quite n -independent (see also Fig. 5) .\nAlthough the layer subtraction does not seem to modify T C ( n ), the onset of helical arrangement is observed to shift at lower temperatures as n decreases. The chirality κ defined in Eq. (4) is reported in Fig 4b for n = 8. As the temperature decreases, around T ∼ 80K we can identify a finite-size behaviour of κ which, at variance with the previous one, can be easily recognized as typical of an effective phase transition. Such conclusion is confirmed by the analysis of the chiral susceptibility χ κ (Fig. 4c), which for the largest L has a maximum at T = 85K. Assuming that the order parameter (4) is the relevant one to single out the onset of the fan arrangement, we can get a more accurate estimate of T N (8) by looking at the Binder cumulant u 4 ( κ ), reported in Fig. 4d. By making use of the MH technique, we locate the crossing point at T N (8) = 92(2) K. Finally, it is worthwhile to observe as the specific heat does not show any anomaly at T N (8), being the entropy substantially removed at T C (8).", + "page_start": 3, + "page_end": 4, + "source_file": "1001.0510.pdf" + }, + { + "text": "III. RESULTS\nThe scenario just outlined for n = 8 results to be correct in the thickness range 6 ≤ n /lessorsimilar 15, where a clear separation between T N ( n ) and T C ( n ) can be easily figured out. In such temperature window, the strong surface effects produce a quasi -FM set-up of the magnetic film structure along the z -direction. While leaving to the next Section a more detailed discussion of this regime, we report in Fig. 5 a plot of T N ( n ) and T C ( n ) vs. n for all the simulated thicknesses. The separation between the two critical temperatures is maximum for n = 6, where T N (6) = 38(4), that is T N (6) ∼ 1 3 T C (6). For films with less than six layers no fan order is observed, i.e. for n = 5 and below the chirality does not display any typical feature of fan ordering at any temperature below T C ( n ). As a representative quantity we finally look at the rotation\n5\nFIG. 6: Rotation angle ∆ ϕ l between magnetic moments on NN layers ( l + 1 , l ) at some low temperatures, for thickness n = 5 and n = 6, and lateral dimension L = 64.\nangle of the magnetization between nearest planes:\n∆ ϕ l = ϕ l +1 -ϕ l = arccos [ M x l M x l +1 + M y l M y l +1 ] (10)\nwhere ( M x l , M y l ) is the magnetic vector profile for each plane l . ∆ ϕ l is displayed in Fig. 6a and Fig. 6b, for n = 6 and n = 5, respectively. In Fig. 6a, a quite clear fan stabilization is observed when the temperature decreases, while in Fig. 6b, i.e. for n = 5, ∆ ϕ l keeps an almost temperature independent very small value; what's more, ∆ ϕ l seems to loose any temperature dependence as T = 0 is approached. We attribute the absence of fan arrangement for n ≤ 5 as simply due to the lack of 'bulk planes' inside the film, so that we are left with only a 2d trend at T C ( n ), i.e. at the temperature where the order parameters defined in Eqs. (2) and (3) show a critical behaviour.", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0510.pdf" + }, + { + "text": "IV. DISCUSSION AND CONCLUSION\nFor this purpose, we look at the temperature dependence of the rotation angle of the magnetization between NN planes. In Fig. 7, ∆ ϕ l ( T ) for n = 8 and n = 16 (continuous and dashed lines, respectively), is plotted for the outermost planes, l = 1 . . . 4. For both thicknesses, a monotonic trend is observed for all l , but at variance with what happens for the highest thickness, for n = 8 we see, starting from a temperature T /lessorsimilar T N (8), an abrupt drop of ∆ ϕ 3 and ∆ ϕ 4 , which rapidly reach an almost constant value, only slightly larger than ∆ ϕ 1 . In the temperature range T N (8) /lessorsimilar T < T C (8) we thus substantially observe the same small magnetic phase shifts between all NN layers, testifying an energetically stable quasi -FM configuration giving no contribution to the helical order parameters. The latter point can be made clearer by looking at the the peak position Q z,max of the structure factor S (0 , 0 , q z ). In Fig. 8 the average of Q z,max vs T is reported, again for n = 8 and for different lateral dimensions L 26 . As expected from the previous argument, we see that Q z,max = 0 for T N (8) < T < T C (8), while it begins to shift to higher values as soon as the temperature decreases below T N (8), making apparent a progressive fan stabilization with Q z,max = 0 and reaching a value of about 21 · for T = 10K.\nIn a previous study, where the magnetic properties of Ho thin films were investigated by MC simulations of a Heisenberg model with easy-plane single-ion anisotropy and six out-of-plane coupling constants (as obtained by experimental neutron scattering measurements 16 ) on a HCPlattice 14,15 , it was found that for thicknesses comparable with the helical pitch the phase diagram landscape is quite different from what we find here. Indeed, for n = 9 -16, three different magnetic phases could be sin-\n6", + "page_start": 5, + "page_end": 5, + "source_file": "1001.0510.pdf" + }, + { + "text": "I. INTRODUCTION\nbe achieved with different number of interacting layers: notably, nearest and next-nearest layers competitive interactions are enough to get a helical structure with a whatever pitch wavevector. Such observation gives us a possible way to solve the conundrum previously emerged, as we have the possibility of varying the range of interactions without modifying the helical pitch, thus decoupling the two relevant length scales along the film growth direction, and making accessible a range of n of the order of, or smaller than, the helical pitch, but still large enough that a substantial number of layers can behave as 'bulk' layers. Therefore, while in the previous papers we have studied the properties of ultrathin magnetic films of Ho assuming a model with six interlayer exchange interactions, here we investigate by MC simulations the properties of the same system by making use of the simplest model Hamiltonian able to describe the onset of a helical magnetic order in Holmium, i.e. we consider only two inter-layer coupling constants, as previously done in Ref. 11.\nThe paper is organized as follows: In Sec. II the model Hamiltonian will be defined, and the MC techniques, and all the thermodynamic quantities relevant for this study, will be introduced. In Sec. III the results obtained for different thicknesses will be presented, both in the matter of the critical properties of the model and of the magnetic ordered structures observed. Finally, in Sec. IV we shall discuss such results, drawing also some conclusions.", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0510.pdf" + }, + { + "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\n2 J.-H. Chung, S. J. Chung, S. Lee, B. J. Kirby, J. A. Borchers, Y. J. Cho, X. Liu, and J. K. Furdyna, Phys. Rev. Lett. 101 , 237202 (2008).\n3 M. Wang, R. P. Campion, A. W. Rushforth, K. W. Edmonds, C. T. Foxon, and R. P. Campion, Appl. Phys. Lett. 93 , 132103 (2008).\n4 M. Zhu, M. J. Wilson, B. L. Sheu, P. Mitra, P. Schiffer, and N. Samarth, Appl. Phys. Lett. 91 , 192503 (2007); M. Zhu, M. J. Wilson, P. Mitra, P. Schiffer, and N. Samarth, Phys. Rev. B 78 , 195307 (2008).\n5 S. Mark, C. Gould, K. Pappert, J. Wenisch, K. Brunner, G. Schmidt, and L. W. Molenkamp, Phys. Rev. Lett. 103 , 017204 (2009).\n6 G. Wastlbauer and J.A.C. Bland, Adv. Phys. 54 , 137 (2005).\n7 F. Maccherozzi, M. Sperl, G. Panaccione, J. Minar, S.\n3\nmonolayers, assuming a uniform distribution of Mn ions and magnetic moments throughout the (Ga,Mn)As film. This is around a factor of three thinner than in Ref. 7 , which could be due to the lower Mn concentration or the different preparation method of the present samples.", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2449.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0510.pdf", + "query": "What is the minimum number of spin layers in a film before a correct bulk is reached ?", + "target_page": 1, + "target_passage": "For n > 16, n being the number of spin layers in the film, a correct bulk limit is reached", + "chunk_present": { + "presence": true, + "index": 4 + } + }, + "top_chunk": [ + { + "text": "II. MODEL HAMILTONIAN AND MONTE CARLO OBSERVABLES\n-24.2 K, that we have employed in our simulations. The given values for the exchange constants are the same already used by Weschke et al. in Ref. 13 to interpret experimental data on Holmium films on the basis of a J 1 -J 2 model, after a proper scaling by the numbers of NN and NNN on neighboring layers of a BCT lattice.\nIn the following we will denote with n the film thickness, i.e. the number of spin layers along the z direction, and with L × L the number of spins in each layer (i.e., L is the lattice size along both the x and y directions). In our simulations thickness values from 1 to 24 were considered, while the range of lateral size L was from 8 to 64. Periodic boundary conditions were applied along x and y , while free boundaries were obviously taken along the film growth direction z .\nThermal equilibrium was attained by the usual Metropolis algorithm 19 , supplemented by the overrelaxed technique 20 in order to speed-up the sampling of the spin configuration space: a typical 'Monte Carlo step' was composed by four Metropolis and four-five over-relaxed moves per particle. Such judicious mix of moves is able both to get faster the thermal equilibrium and to minimize the correlation 'time' between successive samples, i.e. the undesired effects due to lack of in-\ndependence of different samples during the measurement stage. For each temperature we have usually performed three independent simulations, each one containing at least 2 × 10 5 measurements, taken after discarding up to 5 × 10 4 Monte Carlo steps in order to assure thermal equilibration.\nIn the proximity of the critical region the multiple histogram (MH) technique was also employed 21 , as it allows us to estimate the physical observables of interest over a whole temperature range in a substantially continuous way by interpolating results obtained from sets of simulations performed at some different temperatures.", + "page_start": 1, + "page_end": 2, + "source_file": "1001.0510.pdf" + }, + { + "text": "III. RESULTS\nThe scenario just outlined for n = 8 results to be correct in the thickness range 6 ≤ n /lessorsimilar 15, where a clear separation between T N ( n ) and T C ( n ) can be easily figured out. In such temperature window, the strong surface effects produce a quasi -FM set-up of the magnetic film structure along the z -direction. While leaving to the next Section a more detailed discussion of this regime, we report in Fig. 5 a plot of T N ( n ) and T C ( n ) vs. n for all the simulated thicknesses. The separation between the two critical temperatures is maximum for n = 6, where T N (6) = 38(4), that is T N (6) ∼ 1 3 T C (6). For films with less than six layers no fan order is observed, i.e. for n = 5 and below the chirality does not display any typical feature of fan ordering at any temperature below T C ( n ). As a representative quantity we finally look at the rotation\n5\nFIG. 6: Rotation angle ∆ ϕ l between magnetic moments on NN layers ( l + 1 , l ) at some low temperatures, for thickness n = 5 and n = 6, and lateral dimension L = 64.\nangle of the magnetization between nearest planes:\n∆ ϕ l = ϕ l +1 -ϕ l = arccos [ M x l M x l +1 + M y l M y l +1 ] (10)\nwhere ( M x l , M y l ) is the magnetic vector profile for each plane l . ∆ ϕ l is displayed in Fig. 6a and Fig. 6b, for n = 6 and n = 5, respectively. In Fig. 6a, a quite clear fan stabilization is observed when the temperature decreases, while in Fig. 6b, i.e. for n = 5, ∆ ϕ l keeps an almost temperature independent very small value; what's more, ∆ ϕ l seems to loose any temperature dependence as T = 0 is approached. We attribute the absence of fan arrangement for n ≤ 5 as simply due to the lack of 'bulk planes' inside the film, so that we are left with only a 2d trend at T C ( n ), i.e. at the temperature where the order parameters defined in Eqs. (2) and (3) show a critical behaviour.", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0510.pdf" + }, + { + "text": "IV. DISCUSSION AND CONCLUSION\nA possible framework to analyze the results presented in the previous Section is suggested by Fig. 5, where we can easily distinguish three significant regions: i ) high thickness, n /greaterorequalslant 16, where the films substantially display a bulk behaviour, with the single planes ordering temperature coinciding with the helical phase transition one; ii ) intermediate thickness, 6 ≤ n /lessorsimilar 15, where the temperature corresponding to the onset of in-plane order, T C ( n ), is still /similarequal T Ho N , but where the helical/fan arrangement stabilizes only below a finite temperature T N ( n ) < T C ( n ); iii ) low thickness,1 ≤ n ≤ 5, where T C ( n ) /lessorsimilar T Ho N but no fan phase is present at any temperature.\nThe observed behaviour in region iii ) can be reasonably attributed to the decreasing relevance of the contribution to the total energy of the system coming from the competitive interactions among NNN planes as the film thickness decreases; moreover, the thinness of the\nFIG. 7: (color online) ∆ ϕ l ( T ) vs. temperature for the surface planes, l = 1 (triangles), l = 2 (squares), l = 3 (diamonds), l = 4 (circles). Straight lines and full symbols: n = 8. Dashed lines and open symbols: n = 16.\nfilm leads to an effective 2d-like trend. Region ii ) looks however more intriguing, and requires a more accurate discussion, which can benefit from a careful comparison of the behaviour of a given quantity in regions i ) and ii ).\n/negationslash", + "page_start": 4, + "page_end": 5, + "source_file": "1001.0510.pdf" + }, + { + "text": "I. INTRODUCTION\nbe achieved with different number of interacting layers: notably, nearest and next-nearest layers competitive interactions are enough to get a helical structure with a whatever pitch wavevector. Such observation gives us a possible way to solve the conundrum previously emerged, as we have the possibility of varying the range of interactions without modifying the helical pitch, thus decoupling the two relevant length scales along the film growth direction, and making accessible a range of n of the order of, or smaller than, the helical pitch, but still large enough that a substantial number of layers can behave as 'bulk' layers. Therefore, while in the previous papers we have studied the properties of ultrathin magnetic films of Ho assuming a model with six interlayer exchange interactions, here we investigate by MC simulations the properties of the same system by making use of the simplest model Hamiltonian able to describe the onset of a helical magnetic order in Holmium, i.e. we consider only two inter-layer coupling constants, as previously done in Ref. 11.\nThe paper is organized as follows: In Sec. II the model Hamiltonian will be defined, and the MC techniques, and all the thermodynamic quantities relevant for this study, will be introduced. In Sec. III the results obtained for different thicknesses will be presented, both in the matter of the critical properties of the model and of the magnetic ordered structures observed. Finally, in Sec. IV we shall discuss such results, drawing also some conclusions.", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0510.pdf" + }, + { + "text": "I. INTRODUCTION\nteractions by including six different exchange constants along the c crystallographic axis, and gives a helix pitch wave-vector Q z such that Q z c ' /similarequal 30 · , where c ' = c/ 2 is the distance between nearest neighboring spin layers parallel to the ab crystallographic planes, henceforth denoted also as x -y planes, while z will be taken parallel to c . For n > 16, n being the number of spin layers in the film, a correct bulk limit is reached, while for lower n the film properties are clearly affected by the strong competition among the helical pitch and the surface effects, which involve the majority of the spin layers. In the thickness range n = 9 -16, i.e. right for thickness values comparable with the helical pitch, three different magnetic phases emerged, with the high-temperature, disordered, paramagnetic phase and the low-temperature, long-range ordered one separated by an intriguing, intermediatetemperature block phase, where outer ordered layers coexist with some inner disordered ones, the phase transition of the latter eventually displaying the signatures of a Kosterlitz-Thouless one. Finally, for n ≤ 7 the film collapses once and for all to a quasi-collinear order.\nThe complex phase diagram unveiled by such MC simulations awaken however a further intriguing question: to what extent the observed behavior may be considered a simple consequence of the competition between helical order and surface effects? I.e., is it just a matter of having such a competition or does the range of interactions also play a relevant role? Indeed, when the range of the interactions is large enough we have a greater number of planes which can be thought of as 'surface planes', i.e. for which the number of interacting neighbors are significantly reduced with respect to the bulk layers; therefore, we expect that the larger the interaction range, the stronger should be the surface effects. But, at the same time, the same modulation of the magnetic order can\nFIG. 1: (colors online) (a) : body-centered tetragonal (BCT) lattice with J 0 in-plane coupling constant, and out-of-plane J 1 , and J 2 competing interactions.", + "page_start": 0, + "page_end": 1, + "source_file": "1001.0510.pdf" + }, + { + "text": "III. RESULTS\nThe results obtained by MC simulations of the model introduced in Sec. II will be presented starting from n = 16, i.e. the highest investigated film thickness which still displays a bulk-like behaviour. In Fig. 2 the specific heat for samples with n = 16 and lateral dimension L = 24 , 32 , 48 , 64 is shown. The location of the specific heat maximum shows a quite definite evolution toward the bulk transition temperature, T Ho N /similarequal 132K 10 (it is worthwhile to note that for this XY model the mean field theory predicts a critical temperature T Ho N,MF /similarequal 198K).\nThe intensity of the maximum of c v has been analyzed by the MH technique for the same lateral dimensions (see inset of Fig. 2): it clearly appears as it increases with L in a smooth way.\nThe Binder cumulant for the average order parameter defined in Eq. (3) was obtained close to the c v peak and is reported in Fig. 3a; its analysis leads to an estimate of the critical temperature of the sample (given by the location of the common crossing point of the different curves reported in the figure) of T C (16) = 133 . 2(5) This value can be considered in a rather good agreement with the experimental ordering temperature of Holmium T Ho N , the relative difference being about 1%. Even such a mismatch between T Ho N and T C (16) could be completely eliminated by slightly adjusting the in-plane coupling constant J 0 , but, as discussed in Sec. II, we shall preserve the value reported in Refs. 13, and 12 in order to allow for a correct comparison with the results reported in those papers.\nThe development of the helical arrangement of magnetization along the film growth direction was investigated by looking at the integral of the structure factor S ( /vector q ) along the z -direction, i.e. by taking /vector q = (0 , 0 , q z ), and making again use of the cumulant analysis in order to locate the helical transition temperature at T N (16) =\n4", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0510.pdf" + }, + { + "text": "Interplay among helical order, surface effects and range of interacting layers in ultrathin films.\nF. Cinti (1 , 2 , 3) , A. Rettori (2 , 3) , and A. Cuccoli (2)\n(1) Department of Physics, University of Alberta, Edmonton, Alberta, Canada T6G 2J1\n(2) CNISM and Department of Physics, University of Florence, 50019 Sesto Fiorentino (FI), Italy. and\n(3) CNR-INFM S 3 National Research Center, I-41100 Modena, Italy\n(Dated: June 8, 2022)\nThe properties of helical thin films have been thoroughly investigated by classical Monte Carlo simulations. The employed model assumes classical planar spins in a body-centered tetragonal lattice, where the helical arrangement along the film growth direction has been modeled by nearest neighbor and next-nearest neighbor competing interactions, the minimal requirement to get helical order. We obtain that, while the in-plane transition temperatures remain essentially unchanged with respect to the bulk ones, the helical/fan arrangement is stabilized at more and more low temperature when the film thickness, n , decreases; in the ordered phase, increasing the temperature, a softening of the helix pitch wave-vector is also observed. Moreover, we show also that the simulation data around both transition temperatures lead us to exclude the presence of a first order transition for all analyzed sizes. Finally, by comparing the results of the present work with those obtained for other models previously adopted in literature, we can get a deeper insight about the entwined role played by the number (range) of interlayer interactions and surface effects in non-collinear thin films.\nPACS numbers: 64.60.an,64.60.De,75.10.Hk,75.40.Cx,75.70.Ak.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0510.pdf" + }, + { + "text": "III. RESULTS\nWe now move to describe and discuss MC simulation data for thinner samples. A graphical synthesis of the results obtained for n = 8 in reported in Fig. 4a-d. The specific heat c v , shown in Figs. 4a, reveals very small finite-size effects, which, however, cannot be unambiguously detected for the largest lattice size ( L = 64), as they fall comfortably within the error range. Surprisingly, the specific heat maximum is located close to the bulk transition temperature as found for n = 16, and\nFIG. 5: Transition temperatures T N ( n ) and T C ( n ) vs. film thickness n .\nthe same is true for the crossing point of the Binder cumulant of the average magnetization M (not reported in figure), which is located at T C (8) = 133 . 3(3)K. These data give a first rough indication that also for n = 8 all the planes of the sample are still ordering almost at the same temperature; such property has been observed for all the investigated thicknesses n below 16, so that T C ( n ) results quite n -independent (see also Fig. 5) .\nAlthough the layer subtraction does not seem to modify T C ( n ), the onset of helical arrangement is observed to shift at lower temperatures as n decreases. The chirality κ defined in Eq. (4) is reported in Fig 4b for n = 8. As the temperature decreases, around T ∼ 80K we can identify a finite-size behaviour of κ which, at variance with the previous one, can be easily recognized as typical of an effective phase transition. Such conclusion is confirmed by the analysis of the chiral susceptibility χ κ (Fig. 4c), which for the largest L has a maximum at T = 85K. Assuming that the order parameter (4) is the relevant one to single out the onset of the fan arrangement, we can get a more accurate estimate of T N (8) by looking at the Binder cumulant u 4 ( κ ), reported in Fig. 4d. By making use of the MH technique, we locate the crossing point at T N (8) = 92(2) K. Finally, it is worthwhile to observe as the specific heat does not show any anomaly at T N (8), being the entropy substantially removed at T C (8).", + "page_start": 3, + "page_end": 4, + "source_file": "1001.0510.pdf" + }, + { + "text": "IV. DISCUSSION AND CONCLUSION\nFor this purpose, we look at the temperature dependence of the rotation angle of the magnetization between NN planes. In Fig. 7, ∆ ϕ l ( T ) for n = 8 and n = 16 (continuous and dashed lines, respectively), is plotted for the outermost planes, l = 1 . . . 4. For both thicknesses, a monotonic trend is observed for all l , but at variance with what happens for the highest thickness, for n = 8 we see, starting from a temperature T /lessorsimilar T N (8), an abrupt drop of ∆ ϕ 3 and ∆ ϕ 4 , which rapidly reach an almost constant value, only slightly larger than ∆ ϕ 1 . In the temperature range T N (8) /lessorsimilar T < T C (8) we thus substantially observe the same small magnetic phase shifts between all NN layers, testifying an energetically stable quasi -FM configuration giving no contribution to the helical order parameters. The latter point can be made clearer by looking at the the peak position Q z,max of the structure factor S (0 , 0 , q z ). In Fig. 8 the average of Q z,max vs T is reported, again for n = 8 and for different lateral dimensions L 26 . As expected from the previous argument, we see that Q z,max = 0 for T N (8) < T < T C (8), while it begins to shift to higher values as soon as the temperature decreases below T N (8), making apparent a progressive fan stabilization with Q z,max = 0 and reaching a value of about 21 · for T = 10K.\nIn a previous study, where the magnetic properties of Ho thin films were investigated by MC simulations of a Heisenberg model with easy-plane single-ion anisotropy and six out-of-plane coupling constants (as obtained by experimental neutron scattering measurements 16 ) on a HCPlattice 14,15 , it was found that for thicknesses comparable with the helical pitch the phase diagram landscape is quite different from what we find here. Indeed, for n = 9 -16, three different magnetic phases could be sin-\n6", + "page_start": 5, + "page_end": 5, + "source_file": "1001.0510.pdf" + }, + { + "text": "II. EXPERIMENT WITH NANOPARTICLE SOLUTIONS\nTwo different procedures are employed for the deposition of the solution on to the substrate: spincoating or a meniscus technique [61, 62]. The choice is important as it strongly influences the evaporation rate and, as a result, the pattern formation process. When using spin-coating, one finds that directly after deposition, evaporation competes with dewetting until all the solvent has evaporated. The resulting deposits of nanoparticles are imaged by atomic force microscopy (AFM). For spin-coated films, the evaporation rate is high and structuring is normally finished before the spincoater is stopped. Conversely, the solvent evaporation rate is strongly decreased when employing the meniscus technique [61], i.e., by depositing a drop of solution on a Teflon ring that is wetted by the solvent. This allows for a better control of the process and enables the use of contrast-enhanced microscopy to observe the dewetting process in situ [40]. All pattern formation is confined to the region of the receding contact line of toluene, silicon and air. With both techniques one may find mono-modal or bi-modal polygonal networks [34], labyrinthine spinodal structures, or branched patterns (see Fig. 1). The meniscus technique allows for the study of branched structures in a more controlled manner. The work in Ref. [40] indicates that fingering strongly depends on the interaction strength of the particles, i.e., on the chain length of the thiol molecules coating the gold cores. For short chains (C 5 and C 8 ) no formation of branched structures is observed. At similar concentrations, well-developed branched structures are formed for longer chains (C 10 and C 12 ). For even longer chains (C 14 ), however, one again finds less branching. It also depends on the amount of excess thiol in the solvent (for details see Ref. [40]).", + "page_start": 5, + "page_end": 5, + "source_file": "1001.2669.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_JWN_2014.pdf", + "query": "What the rough sales amount of the nordstrom.com website ?", + "target_page": 3, + "target_passage": "$2 billion in nordstrom.com sales", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Retail Business Net Sales\nNordstrom.com, 2012 = 37.1%. Nordstrom, 2014 = 3.6%. Nordstrom, 2013 = 2.3%. Nordstrom, 2012 = 7.5%. Nordstrom Rack, 2014 = 3.8%. Nordstrom Rack, 2013 = 2.7%. Nordstrom Rack, 2012 = 7.4%. Nordstromrack.com and HauteLook, 2014 = 22.1%. Nordstromrack.com and HauteLook, 2013 = 27.3%. Nordstromrack.com and HauteLook, 2012 = -. Total company, 2014 = 4.0%. Total company, 2013 = 2.5%. Total company, 2012 = 7.3%. Sales per square foot 3 :, 2014 = . Sales per square foot 3 :, 2013 = . Sales per square foot 3 :, 2012 = . Total sales per square foot, 2014 = $493. Total sales per square foot, 2013 = $474. Total sales per square foot, 2012 = $470. 4-wall sales per square foot, 2014 = 413. 4-wall sales per square foot, 2013 = 408. 4-wall sales per square foot, 2012 = 417. Full-line sales per square foot - U.S., 2014 = 371. Full-line sales per square foot - U.S., 2013 = 372. Full-line sales per square foot - U.S., 2012 = 385. Nordstrom Rack sales per square foot, 2014 = 552. Nordstrom Rack sales per square foot, 2013 = 553. Nordstrom Rack sales per square foot, 2012 = 568. Percentage of net sales by merchandise category:, 2014 = . Percentage of net sales by merchandise category:, 2013 = . Percentage of net sales by merchandise category:, 2012 = . Women's Apparel, 2014 = 30%. Women's Apparel, 2013 = 31%. Women's Apparel, 2012 = 31%. Shoes, 2014 = 23%. Shoes, 2013 = 23%. Shoes, 2012 = 23%. Men's Apparel, 2014 = 16%. Men's Apparel, 2013 = 16%. Men's Apparel, 2012 = 16%. Women's Accessories, 2014 = 14%. Women's Accessories, 2013 = 14%. Women's Accessories, 2012 = 13%. Cosmetics, 2014 = 11%. Cosmetics, 2013", + "page_start": 29, + "page_end": 29, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Net Sales\nTotal net sales increased in the fourth quarter by 9.0%, driven by a comparable sales increase of 4.7% and 35 new stores in 2014.\nNordstrom net sales, which consist of the full-line stores in the U.S. and Nordstrom.com businesses, increased $141, or 5.0%, compared with the same period in 2013, while comparable sales increased 4.5%. Both the number of items sold and the average selling price of our merchandise increased on a comparable basis. Category highlights for the quarter were Cosmetics, Accessories and Men's Apparel.\nU.S. full-line net sales for the quarter increased $26, or 1.2%, compared with the same period in 2013, with an increase in comparable sales of 0.5%. The Southwest and Southeast were the top-performing geographic regions.\nNordstrom.com net sales increased $115, or 19%, on top of last year's 30% increase for the same period. Nordstromrack.com and HauteLook net sales increased $24, or 28%, compared with the same period in 2013. Both were primarily driven by expanded merchandise selection and ongoing technology investments to enhance the customer experience.\n24\nNordstrom Rack net sales for the quarter increased $130, or 17%, reflecting 27 new Nordstrom Rack store openings since the fourth quarter of 2013, while comparable sales increased 3.2%. On a comparable basis, the average selling price of Nordstrom Rack merchandise increased while the number of items sold was flat. Shoes and Accessories were the category highlights for Nordstrom Rack.", + "page_start": 35, + "page_end": 36, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Retail Business Net Sales\nNet sales by channel:, 2014 = . Net sales by channel:, 2013 = . Net sales by channel:, 2012 = . Nordstrom full-line stores - U.S., 2014 = $7,682. Nordstrom full-line stores - U.S., 2013 = $7,705. Nordstrom full-line stores - U.S., 2012 = $7,964. Nordstrom.com, 2014 = 1,996. Nordstrom.com, 2013 = 1,622. Nordstrom.com, 2012 = 1,269. Nordstrom, 2014 = 9,678. Nordstrom, 2013 = 9,327. Nordstrom, 2012 = 9,233. Nordstrom Rack, 2014 = 3,215. Nordstrom Rack, 2013 = 2,738. Nordstrom Rack, 2012 = 2,445. Nordstromrack.com and HauteLook, 2014 = 360. Nordstromrack.com and HauteLook, 2013 = 295. Nordstromrack.com and HauteLook, 2012 = 236. Other retail 1, 2014 = 116. Other retail 1, 2013 = 35. Other retail 1, 2012 = 35. Total Retail segment, 2014 = 13,369. Total Retail segment, 2013 = 12,395. Total Retail segment, 2012 = 11,949. Corporate/Other, 2014 = (259). Corporate/Other, 2013 = (229). Corporate/Other, 2012 = (187). Total net sales, 2014 = $13,110. Total net sales, 2013 = $12,166. Total net sales, 2012 = $11,762. Net sales increase, 2014 = 7.8%. Net sales increase, 2013 = 3.4%. Net sales increase, 2012 = 12.1%. Comparable sales increase (decrease) by channel 2 :, 2014 = . Comparable sales increase (decrease) by channel 2 :, 2013 = . Comparable sales increase (decrease) by channel 2 :, 2012 = . Nordstrom full-line stores - U.S., 2014 = (0.5%). Nordstrom full-line stores - U.S., 2013 = (2.1%). Nordstrom full-line stores - U.S., 2012 = 3.9%. Nordstrom.com, 2014 = 23.1%. Nordstrom.com, 2013 = 29.5%.", + "page_start": 29, + "page_end": 29, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Item 6. Selected Financial Data.\nfull-line stores - U.S., 2014 = 116. Nordstrom full-line stores - U.S., 2013 = 117. Nordstrom full-line stores - U.S., 2012 = 117. Nordstrom full-line stores - U.S., 2011 = 117. Nordstrom full-line stores - U.S., 2010 = 115. Nordstrom Rack and other stores 7, 2014 = 176. Nordstrom Rack and other stores 7, 2013 = 143. Nordstrom Rack and other stores 7, 2012 = 123. Nordstrom Rack and other stores 7, 2011 = 108. Nordstrom Rack and other stores 7, 2010 = 89. Total square footage, 2014 = 27,061,000. Total square footage, 2013 = 26,017,000. Total square footage, 2012 = 25,290,000. Total square footage, 2011 = 24,745,000. Total square footage, 2010 = 23,838,000\n1 Gross profit is calculated as net sales less cost of sales and related buying and occupancy costs (for all segments).\n2 Comparable sales include sales from stores that have been open at least one full year at the beginning of the year. We also include sales from our online channels (Nordstrom.com, Nordstromrack.com and HauteLook) in comparable sales because of the integration with our stores. Fiscal year 2012 includes an extra week (the 53 rd week) as a result of our 4-5-4 retail reporting calendar. The 53 rd week is not included in comparable sales calculations.\n3 See ROIC (Non-GAAP financial measure) on page 26 for additional information and reconciliation to the most directly comparable GAAP financial measure.\n4 Sales per square foot is calculated as net sales divided by weighted-average square footage. Weighted-average square footage includes a percentage of year-end square footage for new stores equal to the percentage of the year during which they were open. 4-wall sales per square foot is calculated as sales for Nordstrom U.S. full-line stores, Nordstrom Rack stores, Jeffrey boutiques, our Canada full-line store, Last Chance and Trunk Club showrooms divided by their weighted-average square footage.\n5 Ending inventory includes pack and hold inventory of $222, $173, $125, $34 and $0 in 2014, 2013, 2012, 2011 and 2010, which represents strategic purchases of merchandise for upcoming selling seasons.", + "page_start": 26, + "page_end": 26, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "1 million\nSTORE VISITS FROM CUSTOMERS RETURNING THEIR HAUTELOOK AND NORDSTROMRACK.COM PURCHASES TO NORDSTROM RACK.\nALMOST\nIN NORDSTROM.COM SALES. THAT'S MORE THAN DOUBLE OUR SALES\nFROM JUST THREE YEARS AGO.\nMORE THAN\nNEW MEMBERS JOINED OUR NORDSTROM REWARDS™ PROGRAM FOR THE THIRD YEAR IN A ROW.\nFULL -PRICE\nOFF -PRICE\nSTORES\nONLINE", + "page_start": 2, + "page_end": 3, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Retail Business Net Sales\n= 11%. Cosmetics, 2012 = 11%. Kids' Apparel, 2014 = 4%. Kids' Apparel, 2013 = 3%. Kids' Apparel, 2012 = 3%. Other, 2014 = 2%. Other, 2013 = 2%. Other, 2012 = 3%. Total, 2014 = 100%. Total, 2013 = 100%. Total, 2012 = 100%\n1 Other retail includes our Jeffrey boutiques, Trunk Club and our Nordstrom Canada full-line store.\n2 Comparable sales include sales from stores that have been open at least one full year at the beginning of the year. We also include sales from our online channels (Nordstrom.com, Nordstromrack.com and HauteLook) in comparable sales because of the integration with our stores. Fiscal year 2012 includes an extra week (the 53 rd week) as a result of our 4-5-4 retail reporting calendar. The 53 rd week is not included in comparable sales calculations.\n3 Sales per square foot is calculated as net sales divided by weighted-average square footage. Weighted-average square footage includes a percentage of year-end square footage for new stores equal to the percentage of the year during which they were open. 4-wall sales per square foot is calculated as sales for Nordstrom U.S. full-line stores, Nordstrom Rack stores, Jeffrey boutiques, our Canada full-line store, Last Chance and Trunk Club showrooms divided by their weighted-average square footage.\n18", + "page_start": 29, + "page_end": 29, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "OFF-PRICE: NORDSTROM RACK, NORDSTROMRACK.COM AND HAUTELOOK\nWe opened a record 27 new Nordstrom Rack stores, ending 2014 with 167 stores and on track to meet our long-term growth plans\nof 300 stores by 2020. Customers continue to respond favorably to the treasure-hunt experience that defines Nordstrom Rack stores. As we expand in many markets for the first time, we hope to continue delivering a great experience, as this business represents a terrific opportunity for us to attract new customers. Last year, Nordstrom Rack was our biggest source of new customers, attracting nearly 4 million. Also, a year ago, we began accepting returns of HauteLook and Nordstromrack.com merchandise at any Nordstrom Rack store. This drove nearly 1 million trips to Nordstrom Rack stores in 2014. The Nordstrom Rack customer also tends to be younger than our full-line customer, and there is a meaningful opportunity for these customers to begin shopping our full-price channels as well. We plan to open 27 more Nordstrom Racks in 2015 across the U.S.\n' I love how you used models with physical challenges in your Anniversary catalog. Nice work! '\nOUR CUSTOMER, DONNA A.\n7\n»› THAT'S BRILLIANT! WE'LL HAVE TOPSHOP IN 80 STORES BY THE END OF 2015-AND THAT'S JUST ONE OF THE WAYS WE'RE ATTRACTING NEW YOUNG CUSTOMERS WITH GREAT BRANDS AT ACCESSIBLE PRICE POINTS.\n' Praise the fashion gods. Nordstrom Downtown Portland is opening Topshop in the next month.\n'\nOUR CUSTOMER, KARLY T.\n«‹ A PERFECT PAIR: SHOES AND SJP ACTRESS AND STYLE ICON SARAH JESSICA PARKER DESIGNED HER OWN SHOE LINE, SJP, AND WE WERE THE EXCLUSIVE RETAILER FOR ITS LAUNCH.\nIn addition to our new stores, we improved our online/o/ff-price capabilities with the launch of Nordstromrack.com. Combined with HauteLook, the integrated ecommerce site o/ffers a consistent merchandise selection as well as flash sales in a single web or mobile experience, providing customers a wide range of merchandise with one easy-to-use, shared checkout. Since the launch last spring, we've more than doubled the selection at Nordstromrack.com. We will continue to work on ways to further integrate our business to improve our customer experience.", + "page_start": 6, + "page_end": 7, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Net Sales (2014 vs. 2013)\nIn 2014, total company net sales increased 7.8%, which was attributable to the comparable sales increase of 4.0%. During the year, we opened three Nordstrom full-line stores, including our first store in Canada, and 27 Nordstrom Rack stores. Additionally, as a result of the acquisition of Trunk Club, we acquired four Trunk Club showrooms and opened one additional Trunk Club showroom in 2014. These additions increased our square footage by 5.5% and represented 2.8% of our total net sales for 2014.\nNordstrom net sales, which consist of the U.S. full-line and Nordstrom.com businesses, were $9,678 in 2014, an increase of 3.8% compared with 2013, with comparable sales up 3.6%. These increases reflected continued momentum in our Nordstrom.com channel. Both the number of items sold and the average selling price increased on a comparable basis in 2014. Category highlights included Accessories, Cosmetics and Men's Apparel.\nU.S. full-line net sales for 2014 were $7,682, a decrease of 0.3% compared with 2013 and comparable sales decreased by 0.5%. The topperforming geographic regions for full-line stores were the Southeast and Southwest.\nOur Nordstrom.com, Nordstromrack.com and HauteLook channels continued to experience outsized growth. Nordstrom.com net sales increased 23% and Nordstromrack.com and HauteLook net sales increased 22%, both driven by expanded merchandise selection and ongoing technology investments to enhance the customer experience.\nNordstrom Rack net sales increased $477, or 17%, compared with 2013, reflecting incremental volume from existing stores and the impact of 27 new stores since fiscal 2013. Comparable sales increased 3.8% for the year. Shoes and Accessories were the top-performing categories for the year. On a comparable basis, the average selling price of Nordstrom Rack merchandise increased while the number of items sold was flat.", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Net Sales (2013 vs. 2012)\nNet sales for 2013 increased 3.4% compared with 2012, driven by a comparable sales increase of 2.5%, attributable to growth at Nordstrom.com and Nordstrom Rack's accelerated store expansion. During 2013, we opened 22 Nordstrom Rack stores and relocated one Nordstrom full-line store and two Nordstrom Rack stores. These additions represented 1.6% of our total net sales for 2013 and increased our square footage by 2.9%. The 53 rd week in 2012 contributed approximately $162 in additional net sales.\nNordstrom net sales for 2013 were $9,327, an increase of 1.0% compared with 2012, with comparable sales up 2.3%. Strong growth at Nordstrom.com was partially offset by sales decreases at our full-line stores. Both the average selling price and the number of items sold increased on a comparable basis in 2013 compared with 2012. Category highlights included Cosmetics, Men's Shoes and Women's Apparel.\nFull-line net sales for 2013 were $7,705, a decrease of 3.3% compared with 2012, which was primarily driven by a comparable sales decrease of 2.1% for the year. The top-performing geographic regions for full-line stores for 2013 were the Southwest and Southeast. Nordstrom.com showed strong sales growth with net sales of $1,622, an increase of 28% compared with 2012, with comparable sales up 30% on a comparable 52-week basis. These increases were driven by expanded merchandise selection and ongoing technology investments to enhance the customer experience.\nNordstrom Rack net sales were $2,738, up 12.0% compared with 2012, primarily due to 37 new store openings in 2012 and 2013. Comparable sales increased 2.7% for the year. Cosmetics and Shoes were the strongest-performing categories for the year. Both the average selling price and the number of items sold increased on a comparable basis in 2013 compared with 2012.", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "OVERVIEW\nNordstrom is a leading fashion specialty retailer offering apparel, shoes, cosmetics and accessories for women, men and children. We offer an extensive selection of high-quality brand-name and private label merchandise through our various channels: 'Nordstrom' branded full-line stores and online store at Nordstrom.com, Nordstrom Rack stores, Nordstromrack.com and HauteLook and other retail channels, including Trunk Club showrooms and TrunkClub.com, our Jeffrey boutiques and our clearance store that operates under the name 'Last Chance.' As of January 31, 2015, our stores are located in 38 states throughout the United States and in one province in Canada. In addition, we offer our customers a Nordstrom Rewards ™ loyalty program along with a variety of payment products and services, including credit and debit cards.\nWe continue to see the ongoing evolution of retail, with increasing customer interaction between our stores and ecommerce. We are making progress to meet customer expectations of a personalized experience that merges the richness of stores with the convenience of online. Because the customer views us simply as Nordstrom, we believe there is tremendous value in strengthening our platform for the customer experience that encompasses full-price, off-price, in-store and online. While each channel represents a substantial growth opportunity, there are significant synergies across channels to create a unique customer experience to gain market share.\nWe considered 2014 a watershed year in our company history, with our successful entry into Canada, continued expansion of our Nordstrom Rack business through store growth, the launch of Nordstromrack.com and the acquisition of Trunk Club. Our performance in 2014 reflected continued progress in executing our customer strategy through investments to drive growth across channels. We achieved total net sales growth of 7.8%, adding nearly $1 billion to our top-line and delivering record sales and earnings per diluted share. Our financial position remains strong and this marked the sixth consecutive year we generated over $1 billion in cash flow from operations.\nOur partnership with vendors and brands enhances our product offering. We offer Topshop merchandise at 53 full-line stores and online, with plans to reach over 80 stores in 2015. Our new partnership with Madewell in 2015, initially available at 15 of our stores and online, is another way to provide sought-after brands that appeal to new and existing customers.", + "page_start": 27, + "page_end": 27, + "source_file": "NYSE_JWN_2014.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_JWN_2014.pdf", + "query": "How many employees did Nordstrom count in 2014 ?", + "target_page": 17, + "target_passage": "During 2014, we employed approximately 67,000 employees on a full- or part-time basis.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Capital Expenditures\nStore count.2013 = 260. Total, end of year, Store count.2012 = 240. Total, end of year, Square footage.2014 = 27.1. Total, end of year, Square footage.2013 = 26.0. Total, end of year, Square footage.2012 = 25.3\n1 Other stores include Jeffrey boutiques, Trunk Club showrooms, our Nordstrom Canada full-line store and Last Chance.\nWe had no store relocations in 2014, compared with one Nordstrom full-line store and two Nordstrom Rack relocations in 2013 and three Nordstrom Rack relocations in 2012. Our 2014 new store openings increased our square footage by 5.5%.\nTo date in 2015, we have opened our second full-line store in Canada. We plan to open 27 Nordstrom Rack stores, three additional Nordstrom full-line stores in the U.S. and another full-line store in Canada during 2015. Planned net store openings are expected to increase our retail square footage by approximately 6.1%.\nNordstrom, Inc. and subsidiaries 27\nWe received property incentives from our developers of $110 in 2014, $89 in 2013 and $58 in 2012. These incentives are included in our cash provided by operations in our Consolidated Statements of Cash Flows in Item 8: Financial Statements and Supplementary Data. However, operationally we view these as an offset to our capital expenditures. Our capital expenditure percentages, net of property incentives, by category are summarized as follows:\nCategory and expenditure percentage:, 2014 = . Category and expenditure percentage:, 2013 = . Category and expenditure percentage:, 2012 = . New store openings, relocations and remodels, 2014 = 62%. New store openings, relocations and remodels, 2013 = 62%. New store openings, relocations and remodels, 2012 = 54%. Information technology, 2014 = 35%. Information technology, 2013 = 27%. Information technology, 2012 = 27%. Other, 2014 = 3%. Other, 2013 = 11%. Other, 2012 = 19%. Total, 2014 = 100%. Total, 2013 = 100%. Total, 2012 = 100%\nOther capital expenditures consist of ongoing improvements to our stores in the ordinary course of business and expenditures related to various growth initiatives.", + "page_start": 38, + "page_end": 39, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Net Sales (2014 vs. 2013)\nIn 2014, total company net sales increased 7.8%, which was attributable to the comparable sales increase of 4.0%. During the year, we opened three Nordstrom full-line stores, including our first store in Canada, and 27 Nordstrom Rack stores. Additionally, as a result of the acquisition of Trunk Club, we acquired four Trunk Club showrooms and opened one additional Trunk Club showroom in 2014. These additions increased our square footage by 5.5% and represented 2.8% of our total net sales for 2014.\nNordstrom net sales, which consist of the U.S. full-line and Nordstrom.com businesses, were $9,678 in 2014, an increase of 3.8% compared with 2013, with comparable sales up 3.6%. These increases reflected continued momentum in our Nordstrom.com channel. Both the number of items sold and the average selling price increased on a comparable basis in 2014. Category highlights included Accessories, Cosmetics and Men's Apparel.\nU.S. full-line net sales for 2014 were $7,682, a decrease of 0.3% compared with 2013 and comparable sales decreased by 0.5%. The topperforming geographic regions for full-line stores were the Southeast and Southwest.\nOur Nordstrom.com, Nordstromrack.com and HauteLook channels continued to experience outsized growth. Nordstrom.com net sales increased 23% and Nordstromrack.com and HauteLook net sales increased 22%, both driven by expanded merchandise selection and ongoing technology investments to enhance the customer experience.\nNordstrom Rack net sales increased $477, or 17%, compared with 2013, reflecting incremental volume from existing stores and the impact of 27 new stores since fiscal 2013. Comparable sales increased 3.8% for the year. Shoes and Accessories were the top-performing categories for the year. On a comparable basis, the average selling price of Nordstrom Rack merchandise increased while the number of items sold was flat.", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Capital Expenditures\nTotal, beginning of year, Store count.2014 = 260. Total, beginning of year, Store count.2013 = 240. Total, beginning of year, Store count.2012 = 225. Total, beginning of year, Square footage.2014 = 26.0. Total, beginning of year, Square footage.2013 = 25.3. Total, beginning of year, Square footage.2012 = 24.7. Store openings:, Store count.2014 = . Store openings:, Store count.2013 = . Store openings:, Store count.2012 = . Store openings:, Square footage.2014 = . Store openings:, Square footage.2013 = . Store openings:, Square footage.2012 = . Nordstrom full-line stores - U.S., Store count.2014 = 2. Nordstrom full-line stores - U.S., Store count.2013 = -. Nordstrom full-line stores - U.S., Store count.2012 = 1. Nordstrom full-line stores - U.S., Square footage.2014 = 0.3. Nordstrom full-line stores - U.S., Square footage.2013 = -. Nordstrom full-line stores - U.S., Square footage.2012 = 0.1. Nordstrom Rack and other stores 1, Store count.2014 = 29. Nordstrom Rack and other stores 1, Store count.2013 = 22. Nordstrom Rack and other stores 1, Store count.2012 = 15. Nordstrom Rack and other stores 1, Square footage.2014 = 1.2. Nordstrom Rack and other stores 1, Square footage.2013 = 0.7. Nordstrom Rack and other stores 1, Square footage.2012 = 0.6. Stores acquired, Store count.2014 = 4. Stores acquired, Store count.2013 = -. Stores acquired, Store count.2012 = -. Stores acquired, Square footage.2014 = -. Stores acquired, Square footage.2013 = -. Stores acquired, Square footage.2012 = . Stores closed, Store count.2014 = (3). Stores closed, Store count.2013 = (2). Stores closed, Store count.2012 = (1). Stores closed, Square footage.2014 = (0.4). Stores closed, Square footage.2013 = -. Stores closed, Square footage.2012 = (0.1). Total, end of year, Store count.2014 = 292. Total, end of year,", + "page_start": 38, + "page_end": 38, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Notes to Consolidated Financial Statements\nNordstrom full-line stores - U.S., 2014 = $7,682. Nordstrom full-line stores - U.S., 2013 = $7,705. Nordstrom full-line stores - U.S., 2012 = $7,964. Nordstrom.com, 2014 = 1,996. Nordstrom.com, 2013 = 1,622. Nordstrom.com, 2012 = 1,269. Nordstrom, 2014 = 9,678. Nordstrom, 2013 = 9,327. Nordstrom, 2012 = 9,233. Nordstrom Rack, 2014 = 3,215. Nordstrom Rack, 2013 = 2,738. Nordstrom Rack, 2012 = 2,445. Nordstromrack.com and HauteLook, 2014 = 360. Nordstromrack.com and HauteLook, 2013 = 295. Nordstromrack.com and HauteLook, 2012 = 236. Other retail 1, 2014 = 116. Other retail 1, 2013 = 35. Other retail 1, 2012 = 35. Total Retail segment, 2014 = 13,369. Total Retail segment, 2013 = 12,395. Total Retail segment, 2012 = 11,949. Corporate/Other, 2014 = (259). Corporate/Other, 2013 = (229). Corporate/Other, 2012 = (187). Total net sales, 2014 = $13,110. Total net sales, 2013 = $12,166. Total net sales, 2012 = $11,762\n1 Other retail includes our Jeffrey boutiques, Trunk Club and our Nordstrom Canada full-line store.\nThe following table summarizes net sales by merchandise category:", + "page_start": 75, + "page_end": 75, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "OVERVIEW\nIn 2014, we opened our first full-line store in Canada in Calgary, Alberta, reflecting a multi-year effort from our team to address the unique challenges of crossing the border. With our store outperforming our expectations, we are encouraged with our customers' response in this market. We are looking forward to opening stores in 2015 in Ottawa, Ontario and Vancouver, British Columbia. In the U.S. we increased our presence with two full-line stores in The Woodlands, Texas and Jacksonville, Florida. In 2015, we plan to open three full-line stores in Puerto Rico, Minneapolis, Minnesota and Milwaukee, Wisconsin.\nAt Nordstrom Rack, we offer customers great brands at great prices, with 48 of the top 50 full-line brands represented. We opened 27 Nordstrom Rack stores in 2014, a record number of openings, contributing to Nordstrom Rack's total sales growth of 17%.\nOur online businesses continue to be our fastest-growing channels. In the spring of 2014, we expanded our capabilities through the launch of Nordstromrack.com, providing a seamless integration with HauteLook. We more than doubled our merchandise selection, which accelerated growth in this channel in the second half of 2014. Demonstrating synergies across our businesses, we enabled customers to return purchases from HauteLook and Nordstromrack.com to any of our Nordstrom Rack stores, which drove nearly one million incremental trips to Nordstrom Rack stores.\nNordstrom.com finished its fifth consecutive year of approximately 20% or more comparable sales growth, with a key driver being increased merchandise selection. In 2015, we plan to open our third fulfillment center, located in Pennsylvania, which will enhance the customer experience through faster delivery. Furthermore, we have extended our full-price offering with our acquisition of Trunk Club, a high-growth business offering a new approach to personalized service.\nOur credit business, through our Nordstrom Rewards program, continues to play an important role in attracting new customers and deepening our engagement with existing customers. The program contributes to our overall results, with members shopping more frequently and spending more on average than non-members. For the third consecutive year, we opened over one million new accounts. With over four million active members, 2014 sales from members represented approximately 40% of our sales.", + "page_start": 27, + "page_end": 27, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Item 6. Selected Financial Data.\nfull-line stores - U.S., 2014 = 116. Nordstrom full-line stores - U.S., 2013 = 117. Nordstrom full-line stores - U.S., 2012 = 117. Nordstrom full-line stores - U.S., 2011 = 117. Nordstrom full-line stores - U.S., 2010 = 115. Nordstrom Rack and other stores 7, 2014 = 176. Nordstrom Rack and other stores 7, 2013 = 143. Nordstrom Rack and other stores 7, 2012 = 123. Nordstrom Rack and other stores 7, 2011 = 108. Nordstrom Rack and other stores 7, 2010 = 89. Total square footage, 2014 = 27,061,000. Total square footage, 2013 = 26,017,000. Total square footage, 2012 = 25,290,000. Total square footage, 2011 = 24,745,000. Total square footage, 2010 = 23,838,000\n1 Gross profit is calculated as net sales less cost of sales and related buying and occupancy costs (for all segments).\n2 Comparable sales include sales from stores that have been open at least one full year at the beginning of the year. We also include sales from our online channels (Nordstrom.com, Nordstromrack.com and HauteLook) in comparable sales because of the integration with our stores. Fiscal year 2012 includes an extra week (the 53 rd week) as a result of our 4-5-4 retail reporting calendar. The 53 rd week is not included in comparable sales calculations.\n3 See ROIC (Non-GAAP financial measure) on page 26 for additional information and reconciliation to the most directly comparable GAAP financial measure.\n4 Sales per square foot is calculated as net sales divided by weighted-average square footage. Weighted-average square footage includes a percentage of year-end square footage for new stores equal to the percentage of the year during which they were open. 4-wall sales per square foot is calculated as sales for Nordstrom U.S. full-line stores, Nordstrom Rack stores, Jeffrey boutiques, our Canada full-line store, Last Chance and Trunk Club showrooms divided by their weighted-average square footage.\n5 Ending inventory includes pack and hold inventory of $222, $173, $125, $34 and $0 in 2014, 2013, 2012, 2011 and 2010, which represents strategic purchases of merchandise for upcoming selling seasons.", + "page_start": 26, + "page_end": 26, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Item 2. Properties.\nIn 2014, we opened three Nordstrom full-line stores (The Woodlands, Texas; Calgary, Alberta; and Jacksonville, Florida) and 27 Nordstrom Rack stores (Palm Desert, California; San Francisco, California; Chicago, Illinois; Riverside, California; Skokie, Illinois; Tulsa, Oklahoma; Wauwatosa, Wisconsin; Brooklyn, New York; Columbus, Ohio; Houston, Texas; Manhassett, New York; Chicago, Illinois; Dayton, Ohio; Houston, Texas; Queens, New York; Brentwood, Tennessee; Greenville, South Carolina; Madison, Wisconsin; Tempe, Arizona; Brooklyn, New York; Livingston, New Jersey; West Palm Beach, Florida; Brandon, Florida; Columbia, South Carolina; Des Moines, Iowa; Philadelphia, Pennsylvania; and Summerlin, Nevada). As part of our purchase of Trunk Club in August 2014, we acquired four Trunk Club showrooms (Los Angeles, California; Chicago, Illinois; Dallas, Texas; and Washington D.C.) and opened one additional Trunk Club showroom (New York City, New York) in December 2014. Additionally, in 2014, we closed three Nordstrom full-line stores (Orlando, Florida; Vancouver, Washington; and Portland, Oregon).\nTo date in 2015, we have opened one Nordstrom full-line store in Ottawa, Ontario. During the remainder of 2015, we have announced the opening of four additional Nordstrom full-line stores (San Juan, Puerto Rico; Vancouver, British Columbia; Minneapolis, Minnesota; and Wauwatosa, Wisconsin) and the opening of 27 additional Nordstrom Rack stores (Bakersfield, California; Redlands, California; Reno, Nevada; Princeton, New Jersey; Westwood, Massachusetts; Webster, Texas; Laguna Niguel, California; Miami, Florida; Springfield, Virginia; St. Louis Park, Minnesota; Dublin, California; Albany, New York; Anchorage, Alaska; Baton Rouge, Louisiana; Buffalo, New York; Cerritos, California; Clearwater, Florida; Eatontown, New Jersey; Emeryville, California; Fort Collins, Colorado; Long Beach, California; Mount Pleasant, South Carolina; Newark, Delaware; Rockaway, New Jersey; Syracuse, New York; Thousand Oaks, California; and Wayne, New Jersey).", + "page_start": 21, + "page_end": 21, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Retail Business Net Sales\nNordstrom.com, 2012 = 37.1%. Nordstrom, 2014 = 3.6%. Nordstrom, 2013 = 2.3%. Nordstrom, 2012 = 7.5%. Nordstrom Rack, 2014 = 3.8%. Nordstrom Rack, 2013 = 2.7%. Nordstrom Rack, 2012 = 7.4%. Nordstromrack.com and HauteLook, 2014 = 22.1%. Nordstromrack.com and HauteLook, 2013 = 27.3%. Nordstromrack.com and HauteLook, 2012 = -. Total company, 2014 = 4.0%. Total company, 2013 = 2.5%. Total company, 2012 = 7.3%. Sales per square foot 3 :, 2014 = . Sales per square foot 3 :, 2013 = . Sales per square foot 3 :, 2012 = . Total sales per square foot, 2014 = $493. Total sales per square foot, 2013 = $474. Total sales per square foot, 2012 = $470. 4-wall sales per square foot, 2014 = 413. 4-wall sales per square foot, 2013 = 408. 4-wall sales per square foot, 2012 = 417. Full-line sales per square foot - U.S., 2014 = 371. Full-line sales per square foot - U.S., 2013 = 372. Full-line sales per square foot - U.S., 2012 = 385. Nordstrom Rack sales per square foot, 2014 = 552. Nordstrom Rack sales per square foot, 2013 = 553. Nordstrom Rack sales per square foot, 2012 = 568. Percentage of net sales by merchandise category:, 2014 = . Percentage of net sales by merchandise category:, 2013 = . Percentage of net sales by merchandise category:, 2012 = . Women's Apparel, 2014 = 30%. Women's Apparel, 2013 = 31%. Women's Apparel, 2012 = 31%. Shoes, 2014 = 23%. Shoes, 2013 = 23%. Shoes, 2012 = 23%. Men's Apparel, 2014 = 16%. Men's Apparel, 2013 = 16%. Men's Apparel, 2012 = 16%. Women's Accessories, 2014 = 14%. Women's Accessories, 2013 = 14%. Women's Accessories, 2012 = 13%. Cosmetics, 2014 = 11%. Cosmetics, 2013", + "page_start": 29, + "page_end": 29, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "OVERVIEW\nNordstrom is a leading fashion specialty retailer offering apparel, shoes, cosmetics and accessories for women, men and children. We offer an extensive selection of high-quality brand-name and private label merchandise through our various channels: 'Nordstrom' branded full-line stores and online store at Nordstrom.com, Nordstrom Rack stores, Nordstromrack.com and HauteLook and other retail channels, including Trunk Club showrooms and TrunkClub.com, our Jeffrey boutiques and our clearance store that operates under the name 'Last Chance.' As of January 31, 2015, our stores are located in 38 states throughout the United States and in one province in Canada. In addition, we offer our customers a Nordstrom Rewards ™ loyalty program along with a variety of payment products and services, including credit and debit cards.\nWe continue to see the ongoing evolution of retail, with increasing customer interaction between our stores and ecommerce. We are making progress to meet customer expectations of a personalized experience that merges the richness of stores with the convenience of online. Because the customer views us simply as Nordstrom, we believe there is tremendous value in strengthening our platform for the customer experience that encompasses full-price, off-price, in-store and online. While each channel represents a substantial growth opportunity, there are significant synergies across channels to create a unique customer experience to gain market share.\nWe considered 2014 a watershed year in our company history, with our successful entry into Canada, continued expansion of our Nordstrom Rack business through store growth, the launch of Nordstromrack.com and the acquisition of Trunk Club. Our performance in 2014 reflected continued progress in executing our customer strategy through investments to drive growth across channels. We achieved total net sales growth of 7.8%, adding nearly $1 billion to our top-line and delivering record sales and earnings per diluted share. Our financial position remains strong and this marked the sixth consecutive year we generated over $1 billion in cash flow from operations.\nOur partnership with vendors and brands enhances our product offering. We offer Topshop merchandise at 53 full-line stores and online, with plans to reach over 80 stores in 2015. Our new partnership with Madewell in 2015, initially available at 15 of our stores and online, is another way to provide sought-after brands that appeal to new and existing customers.", + "page_start": 27, + "page_end": 27, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "CONCLUSION\nOur strategy is based on the customer and will remain so. Customers' expectations of speed, convenience, personalization and mobile are increasing. As we continue on our journey, we recognize it's imperative for us to invest for the future and find ways to make our stores more\n«‹ THAT'S A RECORD! WE OPENED 27 NEW NORDSTROM RACK STORES IN 2014-THE MOST WE'VE EVER OPENED IN ONE YEAR.\nconvenient and our online experience richer. We believe we are well positioned to deliver a great experience for our customers-no matter how they choose to shop with Nordstrom.", + "page_start": 8, + "page_end": 8, + "source_file": "NYSE_JWN_2014.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_JWN_2014.pdf", + "query": "How many stores did Nordstrom posses at the end of 2014 ?", + "target_page": 22, + "target_passage": "Number of stores, end of year : 292", + "chunk_present": { + "presence": true, + "index": 8 + } + }, + "top_chunk": [ + { + "text": "Item 2. Properties.\nIn 2014, we opened three Nordstrom full-line stores (The Woodlands, Texas; Calgary, Alberta; and Jacksonville, Florida) and 27 Nordstrom Rack stores (Palm Desert, California; San Francisco, California; Chicago, Illinois; Riverside, California; Skokie, Illinois; Tulsa, Oklahoma; Wauwatosa, Wisconsin; Brooklyn, New York; Columbus, Ohio; Houston, Texas; Manhassett, New York; Chicago, Illinois; Dayton, Ohio; Houston, Texas; Queens, New York; Brentwood, Tennessee; Greenville, South Carolina; Madison, Wisconsin; Tempe, Arizona; Brooklyn, New York; Livingston, New Jersey; West Palm Beach, Florida; Brandon, Florida; Columbia, South Carolina; Des Moines, Iowa; Philadelphia, Pennsylvania; and Summerlin, Nevada). As part of our purchase of Trunk Club in August 2014, we acquired four Trunk Club showrooms (Los Angeles, California; Chicago, Illinois; Dallas, Texas; and Washington D.C.) and opened one additional Trunk Club showroom (New York City, New York) in December 2014. Additionally, in 2014, we closed three Nordstrom full-line stores (Orlando, Florida; Vancouver, Washington; and Portland, Oregon).\nTo date in 2015, we have opened one Nordstrom full-line store in Ottawa, Ontario. During the remainder of 2015, we have announced the opening of four additional Nordstrom full-line stores (San Juan, Puerto Rico; Vancouver, British Columbia; Minneapolis, Minnesota; and Wauwatosa, Wisconsin) and the opening of 27 additional Nordstrom Rack stores (Bakersfield, California; Redlands, California; Reno, Nevada; Princeton, New Jersey; Westwood, Massachusetts; Webster, Texas; Laguna Niguel, California; Miami, Florida; Springfield, Virginia; St. Louis Park, Minnesota; Dublin, California; Albany, New York; Anchorage, Alaska; Baton Rouge, Louisiana; Buffalo, New York; Cerritos, California; Clearwater, Florida; Eatontown, New Jersey; Emeryville, California; Fort Collins, Colorado; Long Beach, California; Mount Pleasant, South Carolina; Newark, Delaware; Rockaway, New Jersey; Syracuse, New York; Thousand Oaks, California; and Wayne, New Jersey).", + "page_start": 21, + "page_end": 21, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "DESCRIPTION OF BUSINESS\nFounded in 1901 as a retail shoe business in Seattle, Nordstrom later incorporated in Washington state in 1946 and went on to become one of the leading fashion specialty retailers based in the U.S. As of March 16, 2015, we operate 290 U.S. stores located in 38 states as well as a robust ecommerce business through Nordstrom.com, Nordstromrack.com and HauteLook and TrunkClub.com. We also operate two Nordstrom full-line stores in Canada. The west and east coasts of the U.S. are the areas in which we have the largest presence. We have two reportable segments: Retail and Credit.", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "OFF-PRICE: NORDSTROM RACK, NORDSTROMRACK.COM AND HAUTELOOK\nWe opened a record 27 new Nordstrom Rack stores, ending 2014 with 167 stores and on track to meet our long-term growth plans\nof 300 stores by 2020. Customers continue to respond favorably to the treasure-hunt experience that defines Nordstrom Rack stores. As we expand in many markets for the first time, we hope to continue delivering a great experience, as this business represents a terrific opportunity for us to attract new customers. Last year, Nordstrom Rack was our biggest source of new customers, attracting nearly 4 million. Also, a year ago, we began accepting returns of HauteLook and Nordstromrack.com merchandise at any Nordstrom Rack store. This drove nearly 1 million trips to Nordstrom Rack stores in 2014. The Nordstrom Rack customer also tends to be younger than our full-line customer, and there is a meaningful opportunity for these customers to begin shopping our full-price channels as well. We plan to open 27 more Nordstrom Racks in 2015 across the U.S.\n' I love how you used models with physical challenges in your Anniversary catalog. Nice work! '\nOUR CUSTOMER, DONNA A.\n7\n»› THAT'S BRILLIANT! WE'LL HAVE TOPSHOP IN 80 STORES BY THE END OF 2015-AND THAT'S JUST ONE OF THE WAYS WE'RE ATTRACTING NEW YOUNG CUSTOMERS WITH GREAT BRANDS AT ACCESSIBLE PRICE POINTS.\n' Praise the fashion gods. Nordstrom Downtown Portland is opening Topshop in the next month.\n'\nOUR CUSTOMER, KARLY T.\n«‹ A PERFECT PAIR: SHOES AND SJP ACTRESS AND STYLE ICON SARAH JESSICA PARKER DESIGNED HER OWN SHOE LINE, SJP, AND WE WERE THE EXCLUSIVE RETAILER FOR ITS LAUNCH.\nIn addition to our new stores, we improved our online/o/ff-price capabilities with the launch of Nordstromrack.com. Combined with HauteLook, the integrated ecommerce site o/ffers a consistent merchandise selection as well as flash sales in a single web or mobile experience, providing customers a wide range of merchandise with one easy-to-use, shared checkout. Since the launch last spring, we've more than doubled the selection at Nordstromrack.com. We will continue to work on ways to further integrate our business to improve our customer experience.", + "page_start": 6, + "page_end": 7, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "OVERVIEW\nIn 2014, we opened our first full-line store in Canada in Calgary, Alberta, reflecting a multi-year effort from our team to address the unique challenges of crossing the border. With our store outperforming our expectations, we are encouraged with our customers' response in this market. We are looking forward to opening stores in 2015 in Ottawa, Ontario and Vancouver, British Columbia. In the U.S. we increased our presence with two full-line stores in The Woodlands, Texas and Jacksonville, Florida. In 2015, we plan to open three full-line stores in Puerto Rico, Minneapolis, Minnesota and Milwaukee, Wisconsin.\nAt Nordstrom Rack, we offer customers great brands at great prices, with 48 of the top 50 full-line brands represented. We opened 27 Nordstrom Rack stores in 2014, a record number of openings, contributing to Nordstrom Rack's total sales growth of 17%.\nOur online businesses continue to be our fastest-growing channels. In the spring of 2014, we expanded our capabilities through the launch of Nordstromrack.com, providing a seamless integration with HauteLook. We more than doubled our merchandise selection, which accelerated growth in this channel in the second half of 2014. Demonstrating synergies across our businesses, we enabled customers to return purchases from HauteLook and Nordstromrack.com to any of our Nordstrom Rack stores, which drove nearly one million incremental trips to Nordstrom Rack stores.\nNordstrom.com finished its fifth consecutive year of approximately 20% or more comparable sales growth, with a key driver being increased merchandise selection. In 2015, we plan to open our third fulfillment center, located in Pennsylvania, which will enhance the customer experience through faster delivery. Furthermore, we have extended our full-price offering with our acquisition of Trunk Club, a high-growth business offering a new approach to personalized service.\nOur credit business, through our Nordstrom Rewards program, continues to play an important role in attracting new customers and deepening our engagement with existing customers. The program contributes to our overall results, with members shopping more frequently and spending more on average than non-members. For the third consecutive year, we opened over one million new accounts. With over four million active members, 2014 sales from members represented approximately 40% of our sales.", + "page_start": 27, + "page_end": 27, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "OVERVIEW\nNordstrom is a leading fashion specialty retailer offering apparel, shoes, cosmetics and accessories for women, men and children. We offer an extensive selection of high-quality brand-name and private label merchandise through our various channels: 'Nordstrom' branded full-line stores and online store at Nordstrom.com, Nordstrom Rack stores, Nordstromrack.com and HauteLook and other retail channels, including Trunk Club showrooms and TrunkClub.com, our Jeffrey boutiques and our clearance store that operates under the name 'Last Chance.' As of January 31, 2015, our stores are located in 38 states throughout the United States and in one province in Canada. In addition, we offer our customers a Nordstrom Rewards ™ loyalty program along with a variety of payment products and services, including credit and debit cards.\nWe continue to see the ongoing evolution of retail, with increasing customer interaction between our stores and ecommerce. We are making progress to meet customer expectations of a personalized experience that merges the richness of stores with the convenience of online. Because the customer views us simply as Nordstrom, we believe there is tremendous value in strengthening our platform for the customer experience that encompasses full-price, off-price, in-store and online. While each channel represents a substantial growth opportunity, there are significant synergies across channels to create a unique customer experience to gain market share.\nWe considered 2014 a watershed year in our company history, with our successful entry into Canada, continued expansion of our Nordstrom Rack business through store growth, the launch of Nordstromrack.com and the acquisition of Trunk Club. Our performance in 2014 reflected continued progress in executing our customer strategy through investments to drive growth across channels. We achieved total net sales growth of 7.8%, adding nearly $1 billion to our top-line and delivering record sales and earnings per diluted share. Our financial position remains strong and this marked the sixth consecutive year we generated over $1 billion in cash flow from operations.\nOur partnership with vendors and brands enhances our product offering. We offer Topshop merchandise at 53 full-line stores and online, with plans to reach over 80 stores in 2015. Our new partnership with Madewell in 2015, initially available at 15 of our stores and online, is another way to provide sought-after brands that appeal to new and existing customers.", + "page_start": 27, + "page_end": 27, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Net Sales (2014 vs. 2013)\nIn 2014, total company net sales increased 7.8%, which was attributable to the comparable sales increase of 4.0%. During the year, we opened three Nordstrom full-line stores, including our first store in Canada, and 27 Nordstrom Rack stores. Additionally, as a result of the acquisition of Trunk Club, we acquired four Trunk Club showrooms and opened one additional Trunk Club showroom in 2014. These additions increased our square footage by 5.5% and represented 2.8% of our total net sales for 2014.\nNordstrom net sales, which consist of the U.S. full-line and Nordstrom.com businesses, were $9,678 in 2014, an increase of 3.8% compared with 2013, with comparable sales up 3.6%. These increases reflected continued momentum in our Nordstrom.com channel. Both the number of items sold and the average selling price increased on a comparable basis in 2014. Category highlights included Accessories, Cosmetics and Men's Apparel.\nU.S. full-line net sales for 2014 were $7,682, a decrease of 0.3% compared with 2013 and comparable sales decreased by 0.5%. The topperforming geographic regions for full-line stores were the Southeast and Southwest.\nOur Nordstrom.com, Nordstromrack.com and HauteLook channels continued to experience outsized growth. Nordstrom.com net sales increased 23% and Nordstromrack.com and HauteLook net sales increased 22%, both driven by expanded merchandise selection and ongoing technology investments to enhance the customer experience.\nNordstrom Rack net sales increased $477, or 17%, compared with 2013, reflecting incremental volume from existing stores and the impact of 27 new stores since fiscal 2013. Comparable sales increased 3.8% for the year. Shoes and Accessories were the top-performing categories for the year. On a comparable basis, the average selling price of Nordstrom Rack merchandise increased while the number of items sold was flat.", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Capital Expenditures\nTotal, beginning of year, Store count.2014 = 260. Total, beginning of year, Store count.2013 = 240. Total, beginning of year, Store count.2012 = 225. Total, beginning of year, Square footage.2014 = 26.0. Total, beginning of year, Square footage.2013 = 25.3. Total, beginning of year, Square footage.2012 = 24.7. Store openings:, Store count.2014 = . Store openings:, Store count.2013 = . Store openings:, Store count.2012 = . Store openings:, Square footage.2014 = . Store openings:, Square footage.2013 = . Store openings:, Square footage.2012 = . Nordstrom full-line stores - U.S., Store count.2014 = 2. Nordstrom full-line stores - U.S., Store count.2013 = -. Nordstrom full-line stores - U.S., Store count.2012 = 1. Nordstrom full-line stores - U.S., Square footage.2014 = 0.3. Nordstrom full-line stores - U.S., Square footage.2013 = -. Nordstrom full-line stores - U.S., Square footage.2012 = 0.1. Nordstrom Rack and other stores 1, Store count.2014 = 29. Nordstrom Rack and other stores 1, Store count.2013 = 22. Nordstrom Rack and other stores 1, Store count.2012 = 15. Nordstrom Rack and other stores 1, Square footage.2014 = 1.2. Nordstrom Rack and other stores 1, Square footage.2013 = 0.7. Nordstrom Rack and other stores 1, Square footage.2012 = 0.6. Stores acquired, Store count.2014 = 4. Stores acquired, Store count.2013 = -. Stores acquired, Store count.2012 = -. Stores acquired, Square footage.2014 = -. Stores acquired, Square footage.2013 = -. Stores acquired, Square footage.2012 = . Stores closed, Store count.2014 = (3). Stores closed, Store count.2013 = (2). Stores closed, Store count.2012 = (1). Stores closed, Square footage.2014 = (0.4). Stores closed, Square footage.2013 = -. Stores closed, Square footage.2012 = (0.1). Total, end of year, Store count.2014 = 292. Total, end of year,", + "page_start": 38, + "page_end": 38, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Capital Expenditures\nStore count.2013 = 260. Total, end of year, Store count.2012 = 240. Total, end of year, Square footage.2014 = 27.1. Total, end of year, Square footage.2013 = 26.0. Total, end of year, Square footage.2012 = 25.3\n1 Other stores include Jeffrey boutiques, Trunk Club showrooms, our Nordstrom Canada full-line store and Last Chance.\nWe had no store relocations in 2014, compared with one Nordstrom full-line store and two Nordstrom Rack relocations in 2013 and three Nordstrom Rack relocations in 2012. Our 2014 new store openings increased our square footage by 5.5%.\nTo date in 2015, we have opened our second full-line store in Canada. We plan to open 27 Nordstrom Rack stores, three additional Nordstrom full-line stores in the U.S. and another full-line store in Canada during 2015. Planned net store openings are expected to increase our retail square footage by approximately 6.1%.\nNordstrom, Inc. and subsidiaries 27\nWe received property incentives from our developers of $110 in 2014, $89 in 2013 and $58 in 2012. These incentives are included in our cash provided by operations in our Consolidated Statements of Cash Flows in Item 8: Financial Statements and Supplementary Data. However, operationally we view these as an offset to our capital expenditures. Our capital expenditure percentages, net of property incentives, by category are summarized as follows:\nCategory and expenditure percentage:, 2014 = . Category and expenditure percentage:, 2013 = . Category and expenditure percentage:, 2012 = . New store openings, relocations and remodels, 2014 = 62%. New store openings, relocations and remodels, 2013 = 62%. New store openings, relocations and remodels, 2012 = 54%. Information technology, 2014 = 35%. Information technology, 2013 = 27%. Information technology, 2012 = 27%. Other, 2014 = 3%. Other, 2013 = 11%. Other, 2012 = 19%. Total, 2014 = 100%. Total, 2013 = 100%. Total, 2012 = 100%\nOther capital expenditures consist of ongoing improvements to our stores in the ordinary course of business and expenditures related to various growth initiatives.", + "page_start": 38, + "page_end": 39, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Item 2. Properties.\nThe following table summarizes the number of retail stores we own or lease, and the percentage of total store square footage represented by each listed category as of January 31, 2015:\nLeased stores on leased land, Number of stores = 195. Leased stores on leased land, % of total store square footage = 38%. Owned stores on leased land, Number of stores = 61. Owned stores on leased land, % of total store square footage = 40%. Owned stores on owned land, Number of stores = 35. Owned stores on owned land, % of total store square footage = 21%. Partly owned and partly leased store, Number of stores = 1. Partly owned and partly leased store, % of total store square footage = 1%. Total, Number of stores = 292. Total, % of total store square footage = 100%\nThe following table summarizes our store activity during the last three years:\nNumber of stores, beginning of year, 2014 = 260. Number of stores, beginning of year, 2013 = 240. Number of stores, beginning of year, 2012 = 225. Stores opened, 2014 = 31. Stores opened, 2013 = 22. Stores opened, 2012 = 16. Stores acquired, 2014 = 4. Stores acquired, 2013 = -. Stores acquired, 2012 = -. Stores closed, 2014 = (3). Stores closed, 2013 = (2). Stores closed, 2012 = (1). Number of stores, end of year, 2014 = 292. Number of stores, end of year, 2013 = 260. Number of stores, end of year, 2012 = 240. Nordstrom full-line stores - U.S., 2014 = 116. Nordstrom full-line stores - U.S., 2013 = 117. Nordstrom full-line stores - U.S., 2012 = 117. Nordstrom Rack, 2014 = 167. Nordstrom Rack, 2013 = 140. Nordstrom Rack, 2012 = 119. Other 1, 2014 = 9. Other 1, 2013 = 3. Other 1, 2012 = 4\n1 Other includes Jeffrey boutiques, Trunk Club showrooms, our Nordstrom Canada full-line store and Last Chance.", + "page_start": 21, + "page_end": 21, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Notes to Consolidated Financial Statements\nNordstrom full-line stores - U.S., 2014 = $7,682. Nordstrom full-line stores - U.S., 2013 = $7,705. Nordstrom full-line stores - U.S., 2012 = $7,964. Nordstrom.com, 2014 = 1,996. Nordstrom.com, 2013 = 1,622. Nordstrom.com, 2012 = 1,269. Nordstrom, 2014 = 9,678. Nordstrom, 2013 = 9,327. Nordstrom, 2012 = 9,233. Nordstrom Rack, 2014 = 3,215. Nordstrom Rack, 2013 = 2,738. Nordstrom Rack, 2012 = 2,445. Nordstromrack.com and HauteLook, 2014 = 360. Nordstromrack.com and HauteLook, 2013 = 295. Nordstromrack.com and HauteLook, 2012 = 236. Other retail 1, 2014 = 116. Other retail 1, 2013 = 35. Other retail 1, 2012 = 35. Total Retail segment, 2014 = 13,369. Total Retail segment, 2013 = 12,395. Total Retail segment, 2012 = 11,949. Corporate/Other, 2014 = (259). Corporate/Other, 2013 = (229). Corporate/Other, 2012 = (187). Total net sales, 2014 = $13,110. Total net sales, 2013 = $12,166. Total net sales, 2012 = $11,762\n1 Other retail includes our Jeffrey boutiques, Trunk Club and our Nordstrom Canada full-line store.\nThe following table summarizes net sales by merchandise category:", + "page_start": 75, + "page_end": 75, + "source_file": "NYSE_JWN_2014.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2538.pdf", + "query": "What type of nanostructured material works notably well to build gas nanosensors ?", + "target_page": 1, + "target_passage": "carbon nanotubes (CNT) [2] have been shown to work remarkably well as de- tectors of small gas molecules", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nIn summary, we have presented a general model of nanostructured chemical sensors which takes the adsorption energies of the relevant chemical species and their individual scattering resistances as the only input. On the basis of this model we have performed a computational screening of transition metal doped CNTs, and found that Ni-doped CNTs are promising candidates for detecting CO in a background of air. The model may be applied straightforwardly to other nanostructures than CNTs, other functionalizations than metal doping and other gas compositions than air.\nThe authors acknowledge financial support from Spanish MEC (FIS2007-65702-C02-01), 'Grupos Consolidados UPV/EHU del Gobierno Vasco' (IT-319-07), e-I3 ETSF project (Contract Number 211956), 'Red Espa˜nola de Supercomputaci'on', NABIIT and the Danish Center for Scientific Computing. The Center for Atomic-scale Materials Design (CAMD) is sponsored by the Lundbeck Foundation. JMG-L acknowledges funding from Spanish MICINN through Juan de la Cierva and Jos'e Castillejo programs.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2538.pdf" + }, + { + "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nThe ability to detect small concentrations of specific chemical species is fundamental for a variety of industrial and scientific processes as well as for medical applications and environmental monitoring [1]. In general, nanostructured materials should be well suited for sensor applications because of their large surface to volume ratio which makes them sensitive to molecular adsorption. Specifically, carbon nanotubes (CNT) [2] have been shown to work remarkably well as detectors of small gas molecules. This has been demonstrated both for individual CNTs [3-8] as well as for CNT networks [9, 10].\nPristine CNTs are known to be chemically inert - a property closely related to their high stability. As a consequence, only radicals bind strong enough to the CNT to notably affect its electrical properties [2, 5, 11-13]. To make CNTs attractive for sensor applications thus requires some kind of functionalization, e.g. through doping or decoration of the CNT sidewall [13-21]. Ideally, this type of functionalization could be used to control not only the reactivity of the CNT but also the selectivity towards specific chemical species.\nIn this work we consider the possibility of using CNTs doped by 3d transition metal atoms for chemical gas sensing. We use computational screening to systematically identify the most promising dopant candidates for detection of three different target molecules (CO, NH3, H2S) under typical atmospheric conditions. The screening procedure is based on the calculation of two microscopic descriptors: the binding energy and scattering resistance of the molecules when adsorbed on a doped CNT. These two quantities give a good indication of the gas coverage and impact on the resistance. For the most promising candidates we then employ a simple thermodynamic model of the CNT sensor. In this model, the binding energies are used to obtain the fractional coverage of the metallic sites as a function of the target molecule concentration under ambient conditions. Under the assumption of transport in the diffusive rather than localization regime, the\nchange in CNT resistivity may then be obtained from the calculated coverages and single impurity conductances.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2538.pdf" + }, + { + "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nFIG. 2: Calculated (a) adsorption energy E ads in eV and (b) change in conductance ∆ G in units of G 0 = 2 e 2 /h for N2, O2, H2O, CO, NH3, and H2S on 3d transition metals occupying a monovacancy (top), divacancy I (middle), and divacancy II (bottom) in a (6,6) carbon nanotube.\nwhere E [ X @M@VC] is the total energy of molecule X on a transition metal atom occupying a vacancy, and E [ X ] is the gas phase energy of the molecule.\nFrom the adsorption energies plotted in Fig. 2(a), we see that the earlier transition metals tend to bind the adsorbates stronger than the late transition metals. The latest metals in the series (Cu and Zn) bind adsorbates rather weakly in the divacancy structures. We also note that O2 binds significantly stronger than any of the three target molecules on Ti, V, Cr, and Mn (except for Cr in divacancy I where H2S is found to dissociate). Active sites containing these metals are therefore expected to be completely passivated if oxygen is present in the background. Further, we find H2O is rather weakly bound to most of the active sites. This ensures that these types of sensors are robust against changes in humidity.\nIn thermodynamic equilibrium [27], the coverage of the active sites follows from\nΘ[ X ] = K [ X ] C [ X ] 1 + ∑ Y K [ Y ] C [ Y ] , (4)\nwhere K = k + /k -is the ratio of forward and backward rate constants for the adsorption reaction,\nK [ X ] = exp [ -E ads [ X ] + TS [ X ] k B T ] . (5)\nIn these expressions C [ X ] is the concentration of species X , S [ X ] is its gas phase entropy and T is the temperature. Experimental values for the gas phase entropies have been taken from Ref. [28].", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2538.pdf" + }, + { + "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nJ. M. Garc´ıa-Lastra 1,2 , ∗ D. J. Mowbray 1,2 , K. S. Thygesen 2 , A. Rubio 1,3 , and K. W. Jacobsen 2 1 Nano-Bio Spectroscopy group and ETSF Scientific Development Centre, Dpto. F´ısica de Materiales, Universidad del Pa´ıs Vasco, Centro de F´ısica de Materiales CSIC-UPV/EHU- MPC and DIPC, Av. Tolosa 72, E-20018 San Sebasti´an, Spain 2 Center for Atomic-scale Materials Design, Department of Physics, Technical University of Denmark, DK-2800 Kgs. Lyngby, Denmark 3 Fritz-Haber-Institut der Max-Planck-Gesellschaft, Berlin, Germany\nWe use computational screening to systematically investigate the use of transition metal doped carbon nanotubes for chemical gas sensing. For a set of relevant target molecules (CO, NH3, H2S) and the main components of air (N2, O2, H2O), we calculate the binding energy and change in conductance upon adsorption on a metal atom occupying a vacancy of a (6,6) carbon nanotube. Based on these descriptors, we identify the most promising dopant candidates for detection of a given target molecule. From the fractional coverage of the metal sites in thermal equilibrium with air, we estimate the change in the nanotube resistance per doping site as a function of the target molecule concentration assuming charge transport in the diffusive regime. Our analysis points to Ni-doped nanotubes as candidates for CO sensors working under typical atmospheric conditions.\nPACS numbers: 73.63.-b, 68.43.-h, 73.50.Lw", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2538.pdf" + }, + { + "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nWe find that oxidation of the active metal site passivates the sensor in the case of doping by Ti, V, Cr, and Mn under standard conditions (room temperature and 1 bar of pressure). Among the remaining metals, we identify Ni as is the most promising candidate for CO detection. For this system the change in resistance per active site is generally significant ( > 1 Ω ) for small changes in CO concentration in the relevant range of around 0.1-10 ppm. Our approach is quite general and is directly applicable to other nanostructures than CNTs, other functionalizations than metal doping, and other backgrounds than atmospheric air.\nAll total energy calculations and structure optimizations have been performed with the real-space density functional theory (DFT) code GPAW [22] which is based on the projector augmented wave method. We use a grid spacing of 0.2 ˚ A for representing the density and wave functions and the PBE exchange correlation functional [23]. Transport calculations for the optimized structures have been performed using the nonequilibrium Green's function method [24] with an electronic Hamiltonian obtained from the SIESTA code [25] in a double zeta polarized (DZP) basis set. Spin polarization has been taken into account in all calculations.\nMetallic doping of a (6,6) CNT has been modeled in a supercell containing six repeated minimal unit cells along the CNT axis (dimensions: 15 ˚ A × 15 ˚ A × 14.622 ˚ A). For this size of supercell a Γ -point sampling of the Brillouin zone was found to be sufficient. The formation energy for creating a vacancy (VC) occupied by a transition metal atom (M) was calculated using the relation\nE form [ M @ VC ] = E [ M @ VC ] + nE [ C ] -E [ M@NT ] (1)\nwhere E [M@VC] is the total energy of a transition metal atom occupying a vacancy in the nanotube, n is the number of carbon atoms removed to form the vacancy, E [C] is the energy per carbon atom in a pristine nanotube, and E [M@NT]\n2", + "page_start": 0, + "page_end": 1, + "source_file": "1001.2538.pdf" + }, + { + "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\n∗ Electronic address: juanmaria.garcia@ehu.es\n[1] Gas Sensing Materials, MRS Bull. , vol. 24 (1999).\n[2] J. C. Chalier, X. Blase, and S. Roche, 'Electronic and transport properties of nanotubes', Rev. Mod. Phys. 79 (2), 677 (May 2007), doi:10.1103/RevModPhys.79.677.\n[3] J. Kong, N. R. Franklin, C. Zhou, M. G. Chapline, S. Peng, K. Cho, and H. Dai, 'Nanotube molecular wires as chemical sensors', Science 287 (5453), 622 (Jan. 2000), doi:10.1126/science.287.5453.622.\n[4] P. G. Collins, K. Bradley, M. Ishigami, and A. Zettl, 'Extreme oxygen sensitivity of electronic properties of carbon nanotubes', Science 287 (5459), 1801 (Mar. 2000), doi:10.1126/science.287.5459.1801.\n[5] C. Hierold, Carbon Nanotube Devices: Properties, Modeling, Integration and Applications (Wiley-VCH, Weinheim, 2008).\n[6] F. Villalpando-P'aez, A. H. Romero, E. Mu˜noz-Sandoval, L. M. Mart'ınez, H. Terrones, and M. Terrones, 'Fabrication of vapor and gas sensors using films of aligned CN x nanotubes', Chem. Phys. Lett. 386 (1-3), 137 (Mar. 2004), doi:10.1016/j.cplett.2004.01.052.\n[7] A. R. Rocha, M. Rossi, A. Fazzio, and A. J. R. da Silva, 'Designing real nanotube-based gas sensors', Phys. Rev. Lett. 100 (17), 176803 (May 2008), doi:10.1103/PhysRevLett.100.176803.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2538.pdf" + }, + { + "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\n[8] S. Brahim, S. Colbern, R. Gump, and L. Grigorian, 'Tailoring gas sensing properties of carbon nanotubes', J. Appl. Phys. 104 (2), 024502 (Jul. 2008), doi:10.1063/1.2956395.\n[9] C. Morgan, Z. Alemipour, and M. Baxendale, 'Variable range hopping in oxygen-exposed single-wall carbon nanotube networks', Phys. Stat. Solidi A 205 (6), 1394 (May 2008), doi:10.1002/pssa.200778113.\n[10] D. J. Mowbray, C. Morgan, and K. S. Thygesen, 'Influence of O2 and N2 on the conductivity of carbon nanotube networks', Phys. Rev. B 79 (19), 195431 (May 2009), doi:10.1103/PhysRevB.79.195431.\n[11] L. Valentini, F. Mercuri, I. Armentano, C. Cantalini, S. Picozzi, L. Lozzi, S. Santucci, A. Sgamellotti, and J. M. Kenny, 'Role of defects on the gas sensing properties of carbon nanotubes thin films: experiment and theory', Chem. Phys. Lett. 387 (4-6), 356 (Apr. 2004), doi:10.1016/j.cplett.2004.02.038.\n[12] Z. Zanolli and J.-C. Charlier, 'Defective carbon nanotubes for single-molecule sensing', Phys. Rev. B 80 (15), 155447 (Oct. 2009), doi:10.1103/PhysRevB.80.155447.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2538.pdf" + }, + { + "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nFIG. 1: Structural schematics and formation energy for a 3d transition metal occupied monovacancy (black), divacancy I (gray), or divacancy II (white) in a (6,6) carbon nanotube. Formation energies of the empty vacancies are indicated by dashed lines.\nis the total energy of the pristine nanotube with a physisorbed transition metal atom. We have considered the monovacancy and two divacancies shown in Fig. 1. The energy required to form an empty vacancy is obtained from\nE form [ VC ] = E [ VC ] + nE [ C ] -E [ NT ] , (2)\nwhere E [VC] is the total energy of the nanotube with a vacancy of n atoms.\nThe calculated formation energies for the 3d transition metals are shown in Fig. 1. From the horizontal lines we see that both divacancies are more stable than the monovacancy. This may be attributed to the presence of a two-fold coordinated C atom in the monovacancy, while all C atoms remain three-fold coordinated in the divacancies. When a transition metal atom occupies a vacancy, the strongest bonding to the C atoms is through its d orbitals [26]. For this reason, Cu and Zn, which both have filled d-bands, are rather unstable in the CNT. For the remaining metals, adsorption in the monovacancies leads to quite stable structures. This is because the three-fold coordination of the C atoms and the CNT's hexagonal structure are recovered when the metal atom is inserted. On the other hand, metal adsorption in divacancies is slightly less stable because of the resulting pentagon defects, see upper panel in Fig. 1. A similar behaviour has been reported by Krasheninnikov et al. for transition metal atoms in graphene [21].\nThe adsorption energies for N2, O2, H2O, CO, NH3, and H2S on the metallic site of the doped (6,6) CNTs are shown in Fig. 2(a). The adsorption energy of a molecule X is defined by\nE ads [ X @M@VC ] = E [ X @M@VC ] -E [ X ] -E [ M@VC ] , (3)", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2538.pdf" + }, + { + "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\n[18] C. S. Yeung, L. V. Liu, and Y. A. Wang, 'Adsorption of small gas molecules onto Pt-doped single-walled carbon nanotubes', J. Phys. Chem. C 112 (19), 7401 (Apr. 2008), doi:10.1021/jp0753981.\n[19] T. Vo, Y.-D. Wu, R. Car, and M. Robert, 'Structures, interactions, and ferromagnetism of Fe-carbon nanotube systems', J. Phys. Chem. C 112 (22), 400 (May 2008), doi:10.1021/jp0761968.\n[20] J. A. Furst, M. Brandbyge, A.-P. Jauho, and K. Stokbro, ' Ab initio study of spin-dependent transport in carbon nanotubes with iron and vanadium adatoms', Phys. Rev. B 78 (19), 195405 (Nov. 2008), doi:10.1103/PhysRevB.78.195405.\n[21] A. V. Krasheninnikov, P. O. Lehtinen, A. S. Foster, P. Pyykko, and R. M. Nieminen, 'Embedding transitionmetal atoms in graphene: Structure, bonding, and magnetism', Phys. Rev. Lett. 102 (12), 126807 (Mar. 2009), doi:10.1103/PhysRevLett.102.126807.\n[22] J. J. Mortensen, L. B. Hansen, and K. W. Jacobsen, 'Real-space grid implementation of the projector augmented wave method', Phys. Rev. B 71 (3), 035109 (Jan. 2005), doi:10.1103/PhysRevB.71.035109.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2538.pdf" + }, + { + "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nWe now return to the discussion of the validity of Eq. (7). As mentioned, the series coupling of individual scatterers should be valid when l φ < d . However, even for l φ > d and assuming that the Anderson localization length, l loc in the system exceeds l φ , Eq. (7) remains valid if one replaces the actual resistance R by the sample averaged resistance 〈 R 〉 [29]. At room temperature under ambient conditions, interactions with external degrees of freedom such as internal CNT phonons and vibrational modes of the adsorbed molecules would rapidly randomize the phase of the electrons. Therefore Eq. (7) should certainly be valid in the limit of low doping concentrations. On the other hand, the total number of dopants, N , should be large enough for the statistical treatment of the coverage to hold. Finally, we stress that Eq. (7) represents a conservative estimate of the change in resistance. In fact, in the regime where l φ > l loc, i.e. in the Anderson localization regime, the resistance would be highly sensitive to changes in the fractional coverage of active sites. Calculation of the actual resistance of the CNT in this regime would, however, involve a full transport calculation in the presence of\n4\nall N impurities. At this point it suffices to see that the conservative estimates obtained from Eq. (7) predict measurable signals in response to small changes in concentration of the target molecules.\nTo our knowledge, controlled doping of CNTs with transition metal atoms has so far not been achieved. It has, however, been found that metal atoms incorporated into the CNT lattice during catalytic growth are afterwards very difficult to remove [30]. Furthermore, it has been shown that CNT vacancies, which are needed for the metallic doping, may be formed in a controlled way by irradiation by Ar ions [31]. This suggests that metallic doping of CNTs should be possible.", + "page_start": 2, + "page_end": 3, + "source_file": "1001.2538.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2538.pdf", + "query": "What seems to be a great technique to ensure vacancies are formed in carbon nanotubes (CNT) ?", + "target_page": 4, + "target_passage": "Furthermore, it has been shown that CNT vacan- cies, which are needed for the metallic doping, may be formed in a controlled way by irradiation by Ar ion", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nFIG. 1: Structural schematics and formation energy for a 3d transition metal occupied monovacancy (black), divacancy I (gray), or divacancy II (white) in a (6,6) carbon nanotube. Formation energies of the empty vacancies are indicated by dashed lines.\nis the total energy of the pristine nanotube with a physisorbed transition metal atom. We have considered the monovacancy and two divacancies shown in Fig. 1. The energy required to form an empty vacancy is obtained from\nE form [ VC ] = E [ VC ] + nE [ C ] -E [ NT ] , (2)\nwhere E [VC] is the total energy of the nanotube with a vacancy of n atoms.\nThe calculated formation energies for the 3d transition metals are shown in Fig. 1. From the horizontal lines we see that both divacancies are more stable than the monovacancy. This may be attributed to the presence of a two-fold coordinated C atom in the monovacancy, while all C atoms remain three-fold coordinated in the divacancies. When a transition metal atom occupies a vacancy, the strongest bonding to the C atoms is through its d orbitals [26]. For this reason, Cu and Zn, which both have filled d-bands, are rather unstable in the CNT. For the remaining metals, adsorption in the monovacancies leads to quite stable structures. This is because the three-fold coordination of the C atoms and the CNT's hexagonal structure are recovered when the metal atom is inserted. On the other hand, metal adsorption in divacancies is slightly less stable because of the resulting pentagon defects, see upper panel in Fig. 1. A similar behaviour has been reported by Krasheninnikov et al. for transition metal atoms in graphene [21].\nThe adsorption energies for N2, O2, H2O, CO, NH3, and H2S on the metallic site of the doped (6,6) CNTs are shown in Fig. 2(a). The adsorption energy of a molecule X is defined by\nE ads [ X @M@VC ] = E [ X @M@VC ] -E [ X ] -E [ M@VC ] , (3)", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2538.pdf" + }, + { + "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nWe now return to the discussion of the validity of Eq. (7). As mentioned, the series coupling of individual scatterers should be valid when l φ < d . However, even for l φ > d and assuming that the Anderson localization length, l loc in the system exceeds l φ , Eq. (7) remains valid if one replaces the actual resistance R by the sample averaged resistance 〈 R 〉 [29]. At room temperature under ambient conditions, interactions with external degrees of freedom such as internal CNT phonons and vibrational modes of the adsorbed molecules would rapidly randomize the phase of the electrons. Therefore Eq. (7) should certainly be valid in the limit of low doping concentrations. On the other hand, the total number of dopants, N , should be large enough for the statistical treatment of the coverage to hold. Finally, we stress that Eq. (7) represents a conservative estimate of the change in resistance. In fact, in the regime where l φ > l loc, i.e. in the Anderson localization regime, the resistance would be highly sensitive to changes in the fractional coverage of active sites. Calculation of the actual resistance of the CNT in this regime would, however, involve a full transport calculation in the presence of\n4\nall N impurities. At this point it suffices to see that the conservative estimates obtained from Eq. (7) predict measurable signals in response to small changes in concentration of the target molecules.\nTo our knowledge, controlled doping of CNTs with transition metal atoms has so far not been achieved. It has, however, been found that metal atoms incorporated into the CNT lattice during catalytic growth are afterwards very difficult to remove [30]. Furthermore, it has been shown that CNT vacancies, which are needed for the metallic doping, may be formed in a controlled way by irradiation by Ar ions [31]. This suggests that metallic doping of CNTs should be possible.", + "page_start": 2, + "page_end": 3, + "source_file": "1001.2538.pdf" + }, + { + "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nThe ability to detect small concentrations of specific chemical species is fundamental for a variety of industrial and scientific processes as well as for medical applications and environmental monitoring [1]. In general, nanostructured materials should be well suited for sensor applications because of their large surface to volume ratio which makes them sensitive to molecular adsorption. Specifically, carbon nanotubes (CNT) [2] have been shown to work remarkably well as detectors of small gas molecules. This has been demonstrated both for individual CNTs [3-8] as well as for CNT networks [9, 10].\nPristine CNTs are known to be chemically inert - a property closely related to their high stability. As a consequence, only radicals bind strong enough to the CNT to notably affect its electrical properties [2, 5, 11-13]. To make CNTs attractive for sensor applications thus requires some kind of functionalization, e.g. through doping or decoration of the CNT sidewall [13-21]. Ideally, this type of functionalization could be used to control not only the reactivity of the CNT but also the selectivity towards specific chemical species.\nIn this work we consider the possibility of using CNTs doped by 3d transition metal atoms for chemical gas sensing. We use computational screening to systematically identify the most promising dopant candidates for detection of three different target molecules (CO, NH3, H2S) under typical atmospheric conditions. The screening procedure is based on the calculation of two microscopic descriptors: the binding energy and scattering resistance of the molecules when adsorbed on a doped CNT. These two quantities give a good indication of the gas coverage and impact on the resistance. For the most promising candidates we then employ a simple thermodynamic model of the CNT sensor. In this model, the binding energies are used to obtain the fractional coverage of the metallic sites as a function of the target molecule concentration under ambient conditions. Under the assumption of transport in the diffusive rather than localization regime, the\nchange in CNT resistivity may then be obtained from the calculated coverages and single impurity conductances.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2538.pdf" + }, + { + "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\n∆ R N ≈ ∑ X R s ( X )(Θ[ X,C ] -Θ[ X,C 0 ]) , (7)\nwhere N is the number of dopants, Θ[ X,C ] is the fractional coverage of species X at concentration C of the target and C 0 is the reference concentration. Notice that the contact resistance drops out as we evaluate a change in resistance.\nIn Fig. 3(d) we show the change in resistance calculated from Eq. (7) as a function of CO concentration for Ni occupying the three types of vacancies. The background reference concentration of CO is taken to be C 0 = 0 . 1 ppm. For the monovacancy there is very little change in resistivity. This is because most active sites are blocked by O2 at relevant CO concentrations, as shown in the upper panel of Fig. 3. For Ni in the divacancies there is, however, a change in resistance on the order of 1Ω per site. For concentrations above ∼ 1 ppm, the CO coverage of Ni in the divacancy II increases dramatically and this leads to a significant increase in resistance.", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2538.pdf" + }, + { + "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nWe find that oxidation of the active metal site passivates the sensor in the case of doping by Ti, V, Cr, and Mn under standard conditions (room temperature and 1 bar of pressure). Among the remaining metals, we identify Ni as is the most promising candidate for CO detection. For this system the change in resistance per active site is generally significant ( > 1 Ω ) for small changes in CO concentration in the relevant range of around 0.1-10 ppm. Our approach is quite general and is directly applicable to other nanostructures than CNTs, other functionalizations than metal doping, and other backgrounds than atmospheric air.\nAll total energy calculations and structure optimizations have been performed with the real-space density functional theory (DFT) code GPAW [22] which is based on the projector augmented wave method. We use a grid spacing of 0.2 ˚ A for representing the density and wave functions and the PBE exchange correlation functional [23]. Transport calculations for the optimized structures have been performed using the nonequilibrium Green's function method [24] with an electronic Hamiltonian obtained from the SIESTA code [25] in a double zeta polarized (DZP) basis set. Spin polarization has been taken into account in all calculations.\nMetallic doping of a (6,6) CNT has been modeled in a supercell containing six repeated minimal unit cells along the CNT axis (dimensions: 15 ˚ A × 15 ˚ A × 14.622 ˚ A). For this size of supercell a Γ -point sampling of the Brillouin zone was found to be sufficient. The formation energy for creating a vacancy (VC) occupied by a transition metal atom (M) was calculated using the relation\nE form [ M @ VC ] = E [ M @ VC ] + nE [ C ] -E [ M@NT ] (1)\nwhere E [M@VC] is the total energy of a transition metal atom occupying a vacancy in the nanotube, n is the number of carbon atoms removed to form the vacancy, E [C] is the energy per carbon atom in a pristine nanotube, and E [M@NT]\n2", + "page_start": 0, + "page_end": 1, + "source_file": "1001.2538.pdf" + }, + { + "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nIn summary, we have presented a general model of nanostructured chemical sensors which takes the adsorption energies of the relevant chemical species and their individual scattering resistances as the only input. On the basis of this model we have performed a computational screening of transition metal doped CNTs, and found that Ni-doped CNTs are promising candidates for detecting CO in a background of air. The model may be applied straightforwardly to other nanostructures than CNTs, other functionalizations than metal doping and other gas compositions than air.\nThe authors acknowledge financial support from Spanish MEC (FIS2007-65702-C02-01), 'Grupos Consolidados UPV/EHU del Gobierno Vasco' (IT-319-07), e-I3 ETSF project (Contract Number 211956), 'Red Espa˜nola de Supercomputaci'on', NABIIT and the Danish Center for Scientific Computing. The Center for Atomic-scale Materials Design (CAMD) is sponsored by the Lundbeck Foundation. JMG-L acknowledges funding from Spanish MICINN through Juan de la Cierva and Jos'e Castillejo programs.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2538.pdf" + }, + { + "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\n[8] S. Brahim, S. Colbern, R. Gump, and L. Grigorian, 'Tailoring gas sensing properties of carbon nanotubes', J. Appl. Phys. 104 (2), 024502 (Jul. 2008), doi:10.1063/1.2956395.\n[9] C. Morgan, Z. Alemipour, and M. Baxendale, 'Variable range hopping in oxygen-exposed single-wall carbon nanotube networks', Phys. Stat. Solidi A 205 (6), 1394 (May 2008), doi:10.1002/pssa.200778113.\n[10] D. J. Mowbray, C. Morgan, and K. S. Thygesen, 'Influence of O2 and N2 on the conductivity of carbon nanotube networks', Phys. Rev. B 79 (19), 195431 (May 2009), doi:10.1103/PhysRevB.79.195431.\n[11] L. Valentini, F. Mercuri, I. Armentano, C. Cantalini, S. Picozzi, L. Lozzi, S. Santucci, A. Sgamellotti, and J. M. Kenny, 'Role of defects on the gas sensing properties of carbon nanotubes thin films: experiment and theory', Chem. Phys. Lett. 387 (4-6), 356 (Apr. 2004), doi:10.1016/j.cplett.2004.02.038.\n[12] Z. Zanolli and J.-C. Charlier, 'Defective carbon nanotubes for single-molecule sensing', Phys. Rev. B 80 (15), 155447 (Oct. 2009), doi:10.1103/PhysRevB.80.155447.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2538.pdf" + }, + { + "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nJ. M. Garc´ıa-Lastra 1,2 , ∗ D. J. Mowbray 1,2 , K. S. Thygesen 2 , A. Rubio 1,3 , and K. W. Jacobsen 2 1 Nano-Bio Spectroscopy group and ETSF Scientific Development Centre, Dpto. F´ısica de Materiales, Universidad del Pa´ıs Vasco, Centro de F´ısica de Materiales CSIC-UPV/EHU- MPC and DIPC, Av. Tolosa 72, E-20018 San Sebasti´an, Spain 2 Center for Atomic-scale Materials Design, Department of Physics, Technical University of Denmark, DK-2800 Kgs. Lyngby, Denmark 3 Fritz-Haber-Institut der Max-Planck-Gesellschaft, Berlin, Germany\nWe use computational screening to systematically investigate the use of transition metal doped carbon nanotubes for chemical gas sensing. For a set of relevant target molecules (CO, NH3, H2S) and the main components of air (N2, O2, H2O), we calculate the binding energy and change in conductance upon adsorption on a metal atom occupying a vacancy of a (6,6) carbon nanotube. Based on these descriptors, we identify the most promising dopant candidates for detection of a given target molecule. From the fractional coverage of the metal sites in thermal equilibrium with air, we estimate the change in the nanotube resistance per doping site as a function of the target molecule concentration assuming charge transport in the diffusive regime. Our analysis points to Ni-doped nanotubes as candidates for CO sensors working under typical atmospheric conditions.\nPACS numbers: 73.63.-b, 68.43.-h, 73.50.Lw", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2538.pdf" + }, + { + "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\nFIG. 2: Calculated (a) adsorption energy E ads in eV and (b) change in conductance ∆ G in units of G 0 = 2 e 2 /h for N2, O2, H2O, CO, NH3, and H2S on 3d transition metals occupying a monovacancy (top), divacancy I (middle), and divacancy II (bottom) in a (6,6) carbon nanotube.\nwhere E [ X @M@VC] is the total energy of molecule X on a transition metal atom occupying a vacancy, and E [ X ] is the gas phase energy of the molecule.\nFrom the adsorption energies plotted in Fig. 2(a), we see that the earlier transition metals tend to bind the adsorbates stronger than the late transition metals. The latest metals in the series (Cu and Zn) bind adsorbates rather weakly in the divacancy structures. We also note that O2 binds significantly stronger than any of the three target molecules on Ti, V, Cr, and Mn (except for Cr in divacancy I where H2S is found to dissociate). Active sites containing these metals are therefore expected to be completely passivated if oxygen is present in the background. Further, we find H2O is rather weakly bound to most of the active sites. This ensures that these types of sensors are robust against changes in humidity.\nIn thermodynamic equilibrium [27], the coverage of the active sites follows from\nΘ[ X ] = K [ X ] C [ X ] 1 + ∑ Y K [ Y ] C [ Y ] , (4)\nwhere K = k + /k -is the ratio of forward and backward rate constants for the adsorption reaction,\nK [ X ] = exp [ -E ads [ X ] + TS [ X ] k B T ] . (5)\nIn these expressions C [ X ] is the concentration of species X , S [ X ] is its gas phase entropy and T is the temperature. Experimental values for the gas phase entropies have been taken from Ref. [28].", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2538.pdf" + }, + { + "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes\ning theory put into practice: First-principles modeling of transport in doped silicon wires', Phys. Rev. Lett. 99 (7), 076803 (Aug. 2007), doi:10.1103/PhysRevLett.99.076803.\n[30] M. Ushiro, K. Uno, T. Fujikawa, Y. Sato, K. Tohji, F. Watari, W.-J. Chun, Y. Koike, and K. Asakura, 'X-ray absorption fine structure (XAFS) analyses of Ni species trapped in graphene sheet of carbon nanofibers', Phys. Rev. B 73 (14), 144103 (Apr. 2006), doi:10.1103/PhysRevB.73.144103.\n[31] C. Gomez-Navarro, P. J. de Pablo, J. Gomez-Herrero, B. Biel, F. J. Garcia-Vidal, A. Rubio, and F. Flores, 'Tuning the conductance of single-walled carbon nanotubes by ion irradiation in the Anderson localization regime', Nature Materials 4 , 534 (Jun. 2005), doi:10.1038/nmat1414.", + "page_start": 4, + "page_end": 4, + "source_file": "1001.2538.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_HNI_2003.pdf", + "query": "How many employees did HON Industries count in 2003 ?", + "target_page": 15, + "target_passage": "Members (employees) at year-end : 8,926", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "HON INDUSTRIES INC. OFFICERS\nJack D. Michaels\nChairman and Chief Executive Officer", + "page_start": 61, + "page_end": 61, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "Stan A. Askren\nPresident, HON INDUSTRIES Inc.", + "page_start": 61, + "page_end": 61, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "Sincerely,\nThe HON INDUSTRIES Board of Directors\nStan A. Askren\nGary M. Christensen\nCheryl A. Francis\nRobert L. Katz\nDennis J. Martin\nJack D. Michaels\nJoseph Scalzo\nAbbie J. Smith\nRichard H. Stanley\nBrian E. Stern\nRonald V. Waters, III\n61\nHON INDUSTRIES Inc. and SUBSIDIARIES", + "page_start": 60, + "page_end": 61, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "TO OUR SHAREHOLDERS:\nLEFT: Stan A. Askren, PRESIDENT\nRIGHT: Jack D. Michaels, CHAIRMAN AND CHIEF EXECUTIVE OFFICER\nAs we celebrate our 60th year, HON INDUSTRIES has seen much change. The industry has changed. The world has changed. Our business has changed. What has not changed are the culture and values on which we were founded: integrity, fairness, and respect - in the treatment of others, continuous improvement, and responsiveness to those who buy our products and services. In our unique and powerful member-owner culture, throughout our history, every member has had an opportunity to participate in making the business better. We did so again in 2003.\nWe outperformed our peers. We grew our sales and profits. We gained market share by providing strong brands, innovative products and services, and greater value to our endusers. We continued to increase our gross margins, a direct result of our ongoing commitment to lean initiatives. We used our strong, positive cash flow to invest in our business for the long term and returned profits to shareholders. We accomplished all of this in a very challenging economy and market.\nAlthough we are proud of what we achieved, our philosophy of constructive discontent drives us to continue to challenge ourselves to do better. We believe to succeed in a business environment of ongoing change and continuous transformation we also must continue to change. Today, we are\nleaner, more focused, and have more clearly defined brands than ever before. Our challenge is to grow, aggressively and profitably, through market-driven solutions while maintaining focus on what we do best - operational excellence. Our transformation continues:", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "HON INDUSTRIES Inc. and SUBSIDIARIES\n1993 = 573,392. , = 537,828. , 1999 = 564,319. , 1998 = 533,632. , 1997 = 429,556. , = 318,639. , 1996 1995 = 268,419. , 1994 1993 = 272,606. , = 242,498. , 1999 = 9,712. , 1998 = 10,658. , 1997 = 8,179. , = 4,173. , 1996 1995 = 3,569. , 1994 1993 = 3,248. , = 3,120. , 1999 = 137,575. , 1998 = 170,109. , 1997 = 139,128. , = 105,267. , 1996 1995 = 65,517. , 1994 1993 = 86,338. , = 70,854. , 1999 = 7.64%. , 1998 = 9.97%. , 1997 = 10.21%. , = 10.55%. , 1996 1995 = 7.34%. , 1994 1993 = 10.21%. , = 9.08%. $, 1999 = 50,215. $, 1998 = $ 63,796. $, 1997 = $ 52,173. $, = $ 37,173. $, 1996 1995 = $ 24,419. $, 1994 1993 = $ 31,945. $, = $ 26,216. , 1999 = 36.5%. , 1998 = 37.50%. , 1997 = 37.50%. , = 35.31%. , 1996 1995 = 37.27%. , 1994 1993 = 37.00%. , = 37.00%. $, 1999 = 87,360. $, 1998 = $ 106,313. $, 1997 = $ 86,955. $, = $ 68,094. $, 1996 1995 = $ 41,098. $, 1994 1993 = $ 54,393. $, = $ 44,638. , 1999 = 87,360 4.85%. , 1998 = 106,313 6.23%. , 1997 = 86,955 6.38%. , = 68,094 6.82%. , 1996 1995 = 41,098 4.60%. , 1994", + "page_start": 56, + "page_end": 56, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "afkljdf aojvoaipddddS EEKING I N V E S T O R S FOR A PERFECT MATCH\nJoin us in the dynamic, aggressive, profitable growth of HON INDUSTRIES.\nTHE BEST IS YET TO COME!\nManagement's Discussion and Analysis … 32 Consolidated Financial Statements and Notes … 39 Eleven-Year Summary … 56 Reports of Independent Auditors … 58 A Message from the Board of Directors … 61 Board of Directors and Officers … 62\nHON INDUSTRIES Inc. and SUBSIDIARIES", + "page_start": 30, + "page_end": 31, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "HON INDUSTRIES Inc. and SUBSIDIARIES\n1993 = 54,156 6.43%. , = 45,127 5.78%. $, 1999 = 23,112. $, 1998 = $ 19,730. $, 1997 = $ 16,736. $, = $ 14,970. $, 1996 1995 = $ 14,536. $, 1994 1993 = $ 13,601. $, = $ 12,587. , 1999 = 64,248. , 1998 = 86,583. , 1997 = 37,838. , = 33,860. , 1996 1995 = 18,863. , 1994 1993 = 13,563. , = 17,338. , 1999 = . , 1998 = 106,313. , 1997 = 86,955. , = 68,094. , 1996 1995 = 41,098. , 1994 1993 = . , = 45,127. , 1999 = 87,360 18.14%. , 1998 = 25.20%. , 1997 = 27.43%. , = 29.06%. , 1996 1995 = 20.00%. , 1994 1993 = 54,156 28.95%. , = 26.35%. $, 1999 = 65,453. $, 1998 = $ 52,999. $, 1997 = $ 35,610. $, = $ 25,252. $, 1996 1995 = $ 21,416. $, 1994 1993 = $ 19,042. $, = $ 16,631. , 1999 = 26.46%. , 1998 = 18.56%. , 1997 = 19.25%. , = 21.98%. , 1996 1995 = 35.37%. , 1994 1993 = 25.11%. , = 27.89%. , 1999 = 73.54%. , 1998 = 81.44%. , 1997 = 80.75%. , = 78.02%. , 1996 1995 = 64.63%. , 1994 1993 = 74.89%. , = 72.11%. $, 1999 = 316,556. $, 1998 = $ 290,329. $, 1997 = $ 295,150. $, = $ 205,527. $, 1996 1995 = $ 194,183. $, 1994", + "page_start": 56, + "page_end": 56, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "HON INDUSTRIES Inc. and SUBSIDIARIES\n1993 = $ 188,810. $, = $ 188,419. , 1999 = 225,123. , 1998 = 217,438. , 1997 = 200,759. , = 152,553. , 1996 1995 = 128,915. , 1994 1993 = 111,093. , = 110,759. , 1999 = 91,433. , 1998 = 72,891. , 1997 = 94,391. , = 52,974. , 1996 1995 = 65,268. , 1994 1993 = 77,717. , = 77,660. , 1999 = 455,591. , 1998 = 444,177. , 1997 = 341,030. , = 234,616. , 1996 1995 = 210,033. , 1994 1993 = 177,844. , = 157,770. , 1999 = 906,723. , 1998 = 864,469. , 1997 = 754,673. , = 513,514. , 1996 1995 = 409,518. , 1994 1993 = 372,568. , = 352,405. , 1999 = 16.94%. , 1998 = 23.74%. , 1997 = 28.27%. , = 25.93%. , 1996 1995 = 17.91%. , 1994 1993 = 24.72%. , = 22.14%. $, 1999 = . $, 1998 = $ 135,563. $, 1997 = $ 134,511. $, = $ 77,605. $, 1996 1995 = $ 42,581. $, 1994 1993 = $ 45,877. $, = $ 45,916. , 1999 = 124,173 501,271. , 1998 = 462,022. , 1997 = 381,662. , = 252,397. , 1996 1995 = 216,235. , 1994 1993 = 194,640. , = 179,553. , 1999 = 416,034. , 1998 = 351,786. , 1997 = 265,203. , = 227,365. , 1996 1995 = 193,505. , 1994 1993 = 174,642. , = 161,079. , 1999 = 1.41. , 1998 = 1.34. , 1997 = 1.47. , = 1.35. , 1996", + "page_start": 56, + "page_end": 56, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "Jack D. Michaels\nChairman and Chief Executive Officer, HON INDUSTRIES Inc.", + "page_start": 61, + "page_end": 61, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "Nature of Operations\nHON INDUSTRIES Inc., with its subsidiaries (the 'Company'), is a provider of office furniture and hearth products. Both industries are reportable segments; however, the Company's office furniture business is its principal line of business. Refer to the Operating Segment Information note for further information. Office furniture products are sold through a national system of dealers, wholesalers, mass merchandisers, warehouse clubs, retail superstores, end-user customers, and to federal and state governments. Dealer, wholesaler, and retail superstores are the major channels based on sales. Hearth products include electric, wood-, pellet-, and gas-burning factory-built fireplaces, fireplace inserts, stoves, and gas logs. These products are sold through a national system of dealers, wholesalers, large regional contractors, and Company-owned retail outlets. The Company's products are marketed predominantly in the United States and Canada. The Company exports select products to a limited number of markets outside North America, principally Latin America and the Caribbean, through its export subsidiary; however, based on sales, these activities are not significant.", + "page_start": 42, + "page_end": 42, + "source_file": "NYSE_HNI_2003.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed8.pdf", + "query": "Did automating the writing of EM-to-IP handoffs notes using LLM lead to life-threatening outputs ?", + "target_page": 8, + "target_passage": "none of the incorrect output text elements reached life-threatening risk", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Discussion\nThe study demonstrated success in generating EM-to-IP handoff notes using both a fine tuned, pretrained LLM and rule-based approaches within an end user-developed note template. It is important to note that (largely due to time constraints within the EM care delivery model) the performance of EM-to-IP handoff notes was not the current standard of care in EM. The study site's unique electronic handoff process enabled a comparison between physician-written and LLM-generated handoff notes. Traditional automated evaluations of the model output suggested\nTable 3. Mean Clinical Quality Evaluation, Large Language Model (LLM)-Generated and Physician-Written", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed8.pdf" + }, + { + "text": "Conclusions\nThis study's results suggest promise for future thoughtful integration of LLM-generated EM-to-IP handoff notes into clinical admission workflows, as well as the associated potential downstream quality and efficiency gains. Our novel clinical evaluation framework demonstrates an effective preimplementation strategy to measure potential patient safety implications of incorrectness identified in LLM-generated clinical care summaries, which will guide future model refinement and implementation strategies. In the absence of a current written standard of care in EM, this innovation could represent a transformative advancement in the quality of EM-to-IP transitions of care.", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed8.pdf" + }, + { + "text": "KeyPoints\nQuestion Can a large language model (LLM) generate emergency medicine (EM)-to-inpatient (IP) handoff notes that are useful and safe for EM care?\nFindings In this cohort study of 1600 EMpatient medical records using a novel evaluation framework, the LLM-generated EM-to-IP handoff notes had a mean usefulness of 4.04 out of 5 (compared with 4.36 for physician-written) and a mean patient safety of 4.06 out of 5 (compared with 4.50 for physician-written) with no critical patient safety risks.\nMeaning These findings suggest the value of a manual, patient safetyfocused clinical evaluation of LLM models and the potential of LLM-generated handoff notes to create a new standard of care in EM.\n+\nInvited Commentary", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed8.pdf" + }, + { + "text": "Abstract\nIMPORTANCE An emergency medicine (EM) handoff note generated by a large language model (LLM) has the potential to reduce physician documentation burden without compromising the safety of EM-to-inpatient (IP) handoffs.\nOBJECTIVE To develop LLM-generated EM-to-IP handoff notes and evaluate their accuracy and safety compared with physician-written notes.\nDESIGN, SETTING, AND PARTICIPANTS This cohort study used EM patient medical records with acute hospital admissions that occurred in 2023 at NewYork-Presbyterian/Weill Cornell Medical Center. A customized clinical LLM pipeline was trained, tested, and evaluated to generate templated EM-to-IP handoff notes. Using both conventional automated methods (ie, recall-oriented understudy for gisting evaluation [ROUGE], bidirectional encoder representations from transformers score [BERTScore], and source chunking approach for large-scale inconsistency evaluation [SCALE]) and a novel patient safety-focused framework, LLM-generated handoff notes vs physician-written notes were compared. Data were analyzed from October 2023 to March 2024.\nEXPOSURE LLM-generated EM handoff notes.\nMAINOUTCOMESANDMEASURES LLM-generated handoff notes were evaluated for (1) lexical similarity with respect to physician-written notes using ROUGE and BERTScore; (2) fidelity with respect to source notes using SCALE; and (3) readability, completeness, curation, correctness, usefulness, and implications for patient safety using a novel framework.", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed8.pdf" + }, + { + "text": "Abstract\nRESULTS In this study of 1600 EM patient records (832 [52%] female and mean [SD] age of 59.9 [18.9] years), LLM-generated handoff notes, compared with physician-written ones, had higher ROUGE(0.322 vs 0.088), BERTScore (0.859 vs 0.796), and SCALE scores (0.691 vs 0.456), indicating the LLM-generated summaries exhibited greater similarity and more detail. As reviewed by 3 board-certified EM physicians, a subsample of 50 LLM-generated summaries had a mean (SD) usefulness score of 4.04 (0.86) out of 5 (compared with 4.36 [0.71] for physician-written) and mean (SD) patient safety scores of 4.06 (0.86) out of 5 (compared with 4.50 [0.56] for physician-written). None of the LLM-generated summaries were classified as a critical patient safety risk.\nCONCLUSIONSANDRELEVANCE In this cohort study of 1600 EM patient medical records, LLM-generated EM-to-IP handoff notes were determined superior compared with physician-written summaries via conventional automated evaluation methods, but marginally inferior in usefulness\n(continued)\nOpenAccess. This is an open access article distributed under the terms of the CC-BY License.\nJAMANetwork Open. 2024;7(12):e2448723. doi:10.1001/jamanetworkopen.2024.48723\n(Reprinted)\nDecember 3, 2024\n1/12\nDownloaded from jamanetwork.com by guest on 01/13/2025", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed8.pdf" + }, + { + "text": "Supplement 1.\nJAMANetwork Open. 2024;7(12):e2448723. doi:10.1001/jamanetworkopen.2024.48723\n(Reprinted)\nDecember 3, 2024\n4/12\nDownloaded from jamanetwork.com by guest on 01/13/2025\nAbbreviations: EM, emergency medicine; IP, inpatient.\na Automated EM handoff notes are generated from the curation of the data through both rule-based and large language model-summarization approaches.\nJAMANetworkOpen | EmergencyMedicine\nDeveloping and Evaluating LLM-Generated Emergency Medicine Handoff Notes", + "page_start": 3, + "page_end": 4, + "source_file": "pubmed8.pdf" + }, + { + "text": "EM-to-IP Handoff Note Template\nThe EM-to-IP handoff note template used in the study is a replication of the current manual handoff note structure used at the study site. The generated EM handoff note consists of components generated by a rule-based pattern-matching approach (laboratory tests, vitals, medications, consult orders, and radiology impressions) and components generated by the trained abstractive summarization model (history of present illness [HPI], differential diagnoses, immediate care plans, in-ED events, and disposition). Each summary also included a header with the timestamp of ED triage and discharge, patient's birth date, patient's unique identifier, patient's encounter number, and the total time of patient's stay in the ED.", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed8.pdf" + }, + { + "text": "Introduction\nDeveloping and Evaluating LLM-Generated Emergency Medicine Handoff Notes\nevaluation frameworks may not address the anticipated effect LLM performance limitations could have on patient safety. 38-41\nIn this study, we aim to expand on prior work of clinical summarization to rigorously evaluate the outcomes of a fine-tuned model developed to generate accurate and safe summaries of the care rendered during an ED visit, with the long-term goal of integrating automated, structured EM-to-IP handoff notes into an EHR-based electronic handoff admission workflow (see eAppendix 1 in Supplement 1). We fine-tune pretrained LLMs on well curated datasets of structured and unstructured EHR data from the ED encounter to summarize the patient's ED care. We improved the correctness of model generations and customized the summaries in a structured format designed by a team of EM and internal medicine physician leaders for optimal usefulness. We proposed a novel patient safety-focused LLM evaluation framework to examine the LLM-generated handoff notes' quality and accuracy and the downstream patient safety implications of any identified inaccuracies. To evaluate noninferiority, we compared the LLM-generated handoff notes with the preexisting physician-written EM-to-IP handoff notes as the active control, using both the proposed patient safety-focused clinical evaluation framework and automated benchmark-driven methods. We used the physician-written EM-to-IP handoff notes as the active control and used the scores from both evaluation frameworks for the margin of inferiority of the intervention.", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed8.pdf" + }, + { + "text": "JAMANetworkOpen | EmergencyMedicine\nDeveloping and Evaluating LLM-Generated Emergency Medicine Handoff Notes", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed8.pdf" + }, + { + "text": "Data Processing\nAs LLM 2 only has a context size of 4096 tokens, 44 weused 2 steps to process the EM notes to both shorten the input size while maintaining content salience. First, we adopted a number of heuristic strategies for prioritization and filtration: (1) clinical note types (hierarchy presented in Table 1), (2) time of authorship, and (3) duplicate sentence detection. Second, we used an LLM 1-based saliency model to infer EM note sentences based on likelihood of content contribution to the EM-to-IP handoff notes.", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed8.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed8.pdf", + "query": "How did automating the writing of EM-to-IP handoffs notes using LLM affect the usefulness of these notes ?", + "target_page": 1, + "target_passage": "LLM-generated EM-to-IP handoff notes were determined superior compared with physician-written summaries via conventional automated evaluation methods, but marginally inferior in usefulness", + "chunk_present": { + "presence": true, + "index": 4 + } + }, + "top_chunk": [ + { + "text": "Discussion\nThe study demonstrated success in generating EM-to-IP handoff notes using both a fine tuned, pretrained LLM and rule-based approaches within an end user-developed note template. It is important to note that (largely due to time constraints within the EM care delivery model) the performance of EM-to-IP handoff notes was not the current standard of care in EM. The study site's unique electronic handoff process enabled a comparison between physician-written and LLM-generated handoff notes. Traditional automated evaluations of the model output suggested\nTable 3. Mean Clinical Quality Evaluation, Large Language Model (LLM)-Generated and Physician-Written", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed8.pdf" + }, + { + "text": "Conclusions\nThis study's results suggest promise for future thoughtful integration of LLM-generated EM-to-IP handoff notes into clinical admission workflows, as well as the associated potential downstream quality and efficiency gains. Our novel clinical evaluation framework demonstrates an effective preimplementation strategy to measure potential patient safety implications of incorrectness identified in LLM-generated clinical care summaries, which will guide future model refinement and implementation strategies. In the absence of a current written standard of care in EM, this innovation could represent a transformative advancement in the quality of EM-to-IP transitions of care.", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed8.pdf" + }, + { + "text": "KeyPoints\nQuestion Can a large language model (LLM) generate emergency medicine (EM)-to-inpatient (IP) handoff notes that are useful and safe for EM care?\nFindings In this cohort study of 1600 EMpatient medical records using a novel evaluation framework, the LLM-generated EM-to-IP handoff notes had a mean usefulness of 4.04 out of 5 (compared with 4.36 for physician-written) and a mean patient safety of 4.06 out of 5 (compared with 4.50 for physician-written) with no critical patient safety risks.\nMeaning These findings suggest the value of a manual, patient safetyfocused clinical evaluation of LLM models and the potential of LLM-generated handoff notes to create a new standard of care in EM.\n+\nInvited Commentary", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed8.pdf" + }, + { + "text": "Supplement 1.\nJAMANetwork Open. 2024;7(12):e2448723. doi:10.1001/jamanetworkopen.2024.48723\n(Reprinted)\nDecember 3, 2024\n4/12\nDownloaded from jamanetwork.com by guest on 01/13/2025\nAbbreviations: EM, emergency medicine; IP, inpatient.\na Automated EM handoff notes are generated from the curation of the data through both rule-based and large language model-summarization approaches.\nJAMANetworkOpen | EmergencyMedicine\nDeveloping and Evaluating LLM-Generated Emergency Medicine Handoff Notes", + "page_start": 3, + "page_end": 4, + "source_file": "pubmed8.pdf" + }, + { + "text": "Abstract\nRESULTS In this study of 1600 EM patient records (832 [52%] female and mean [SD] age of 59.9 [18.9] years), LLM-generated handoff notes, compared with physician-written ones, had higher ROUGE(0.322 vs 0.088), BERTScore (0.859 vs 0.796), and SCALE scores (0.691 vs 0.456), indicating the LLM-generated summaries exhibited greater similarity and more detail. As reviewed by 3 board-certified EM physicians, a subsample of 50 LLM-generated summaries had a mean (SD) usefulness score of 4.04 (0.86) out of 5 (compared with 4.36 [0.71] for physician-written) and mean (SD) patient safety scores of 4.06 (0.86) out of 5 (compared with 4.50 [0.56] for physician-written). None of the LLM-generated summaries were classified as a critical patient safety risk.\nCONCLUSIONSANDRELEVANCE In this cohort study of 1600 EM patient medical records, LLM-generated EM-to-IP handoff notes were determined superior compared with physician-written summaries via conventional automated evaluation methods, but marginally inferior in usefulness\n(continued)\nOpenAccess. This is an open access article distributed under the terms of the CC-BY License.\nJAMANetwork Open. 2024;7(12):e2448723. doi:10.1001/jamanetworkopen.2024.48723\n(Reprinted)\nDecember 3, 2024\n1/12\nDownloaded from jamanetwork.com by guest on 01/13/2025", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed8.pdf" + }, + { + "text": "Abstract\nIMPORTANCE An emergency medicine (EM) handoff note generated by a large language model (LLM) has the potential to reduce physician documentation burden without compromising the safety of EM-to-inpatient (IP) handoffs.\nOBJECTIVE To develop LLM-generated EM-to-IP handoff notes and evaluate their accuracy and safety compared with physician-written notes.\nDESIGN, SETTING, AND PARTICIPANTS This cohort study used EM patient medical records with acute hospital admissions that occurred in 2023 at NewYork-Presbyterian/Weill Cornell Medical Center. A customized clinical LLM pipeline was trained, tested, and evaluated to generate templated EM-to-IP handoff notes. Using both conventional automated methods (ie, recall-oriented understudy for gisting evaluation [ROUGE], bidirectional encoder representations from transformers score [BERTScore], and source chunking approach for large-scale inconsistency evaluation [SCALE]) and a novel patient safety-focused framework, LLM-generated handoff notes vs physician-written notes were compared. Data were analyzed from October 2023 to March 2024.\nEXPOSURE LLM-generated EM handoff notes.\nMAINOUTCOMESANDMEASURES LLM-generated handoff notes were evaluated for (1) lexical similarity with respect to physician-written notes using ROUGE and BERTScore; (2) fidelity with respect to source notes using SCALE; and (3) readability, completeness, curation, correctness, usefulness, and implications for patient safety using a novel framework.", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed8.pdf" + }, + { + "text": "Data Processing\nAs LLM 2 only has a context size of 4096 tokens, 44 weused 2 steps to process the EM notes to both shorten the input size while maintaining content salience. First, we adopted a number of heuristic strategies for prioritization and filtration: (1) clinical note types (hierarchy presented in Table 1), (2) time of authorship, and (3) duplicate sentence detection. Second, we used an LLM 1-based saliency model to infer EM note sentences based on likelihood of content contribution to the EM-to-IP handoff notes.", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed8.pdf" + }, + { + "text": "EM-to-IP Handoff Note Template\nThe EM-to-IP handoff note template used in the study is a replication of the current manual handoff note structure used at the study site. The generated EM handoff note consists of components generated by a rule-based pattern-matching approach (laboratory tests, vitals, medications, consult orders, and radiology impressions) and components generated by the trained abstractive summarization model (history of present illness [HPI], differential diagnoses, immediate care plans, in-ED events, and disposition). Each summary also included a header with the timestamp of ED triage and discharge, patient's birth date, patient's unique identifier, patient's encounter number, and the total time of patient's stay in the ED.", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed8.pdf" + }, + { + "text": "Introduction\nDeveloping and Evaluating LLM-Generated Emergency Medicine Handoff Notes\nevaluation frameworks may not address the anticipated effect LLM performance limitations could have on patient safety. 38-41\nIn this study, we aim to expand on prior work of clinical summarization to rigorously evaluate the outcomes of a fine-tuned model developed to generate accurate and safe summaries of the care rendered during an ED visit, with the long-term goal of integrating automated, structured EM-to-IP handoff notes into an EHR-based electronic handoff admission workflow (see eAppendix 1 in Supplement 1). We fine-tune pretrained LLMs on well curated datasets of structured and unstructured EHR data from the ED encounter to summarize the patient's ED care. We improved the correctness of model generations and customized the summaries in a structured format designed by a team of EM and internal medicine physician leaders for optimal usefulness. We proposed a novel patient safety-focused LLM evaluation framework to examine the LLM-generated handoff notes' quality and accuracy and the downstream patient safety implications of any identified inaccuracies. To evaluate noninferiority, we compared the LLM-generated handoff notes with the preexisting physician-written EM-to-IP handoff notes as the active control, using both the proposed patient safety-focused clinical evaluation framework and automated benchmark-driven methods. We used the physician-written EM-to-IP handoff notes as the active control and used the scores from both evaluation frameworks for the margin of inferiority of the intervention.", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed8.pdf" + }, + { + "text": "JAMANetworkOpen | EmergencyMedicine\nDeveloping and Evaluating LLM-Generated Emergency Medicine Handoff Notes", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed8.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv5_ccby4license.pdf", + "query": "What company released MegatronLM ?", + "target_page": 2, + "target_passage": "NVIDIA released the MegatronLM", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "OUR PROGRESS IN 2013\nWe made strides in the M2M market this year, demonstrating a single, worldwide SIM card with our M2M global alliance partners that will strengthen our M2M offering to multinational customers, and announcing an M2M agreement with Sprint to bring a comprehensive in-car infotainment solution to the Canadian market. We also certified the Suretap wallet, our mobile payment service, for the Android and BlackBerry 10 operating smartphone systems. We received a licence to operate a bank for the purposes of launching a Rogers' branded credit card. In addition, we expanded our Rogers Smart Home Monitoring footprint, and launched other initiatives such as Outrank, an online site for marketing and advertising small business, introduced Rogers Alerts and other digital opportunities.", + "page_start": 35, + "page_end": 35, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Making Profit as a Smaller Player\nAs in many other mature markets, an incentive war is raging in Europe. Nissan's position here, as elsewhere, is to use incentives selectively and to always protect profitability. Providing products which customers recognize and appreciate for their style and attributes rather than being the best deal is the foundation of Nissan's profitable growth. We now have a wide range of products, five of which were newly launched in 2005, including the Pathfinder and the Navara pickup. We will release the Micra C+C at the Frankfurt Motor Show in September, giving customers the option of a unique standard glass roof in a fully retracting hard convertible top.\nNissan's manufacturing still defines the leading edge in Europe. According to The Harbour Report , our plant in Sunderland is the most productive plant in Europe. Sunderland will start production on a new B-segment car based on the Tone concept car in early 2006, followed by the Qashqai crossover vehicle in early 2007. Our Barcelona plant, which manufactures SUVs, 4x4s and light commercial vehicles, will reach full capacity in mid-2005. Finally, our truck plant in Avila, Spain, which specializes in light-duty trucks, will start producing a replacement for the popular Cabstar in late 2006. This efficient production base is a critical part of our profitable growth scenario.\nNISSAN Value-Up has given us a plan for building both profit and volume. We will not, however, sacrifice profit to gain volume. How far we can go depends on how fast we deliver results. I believe that we have much more room to grow, and to demonstrate that in even a crowded European market a smaller player can produce significant returns.'\nNissan Annual Report 2004\n61\nOUR WORLD\nOUR WORLD\n62\nNORTH AMERICA", + "page_start": 62, + "page_end": 63, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "PRODUCTION BY PRODUCT\nmmboe\nNET PROFIT AFTER TAX $ million", + "page_start": 4, + "page_end": 4, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "From the B Platform\nMARCH/MICRA", + "page_start": 32, + "page_end": 32, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "Metro Mirror\nMetro Mirror (MM) is a method of synchronous replication that maintains data consistency across multiple volumes within the system. Metro Mirror is generally used when the write latency that is caused by the distance between the source site and target site is acceptable to application performance.", + "page_start": 801, + "page_end": 801, + "source_file": "sg247938.pdf" + }, + { + "text": "REVENUES FROM MAJOR CUSTOMERS 9\nThe Company had one major customer which represented approximately $9.1 million (14.4 percent), $7.4 million (12.4 percent) and $11.0 million (19.1 percent) of the Company's operating revenues during the years 2003, 2002 and 2001, respectively.", + "page_start": 20, + "page_end": 20, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "28 All-New Models\nWe displayed that confidence when we introduced the Murano in the U.S. Crossover vehicles were a new concept for the U.S. car buyer, and that carried a risk. The product planners boldly pushed ahead, though, and after the Murano became a hit in that market, it proved equally popular in Japan and Europe. Now, with new product launches rising from 44 during NISSAN 180 to 70 in NISSAN Value-Up, and with global expansion in markets outside our traditional regions, you can see how the product planners benefited from the Murano's success. From the conceptual stage onward, they now have the confidence to make strong projections about how many customers a model will have around the world. Their mindset is, we've succeeded before with Murano and others, so why not try this again on a global basis? They can identify and target certain customers but then propose skipping a particular market to avoid compromising the concept. We don't want to make bland cars, where we design one variation for Europe, another for Japan, and something else for the US. There is no flavor, nothing special, about a chameleon car that tries to please everyone. The Murano was the kind of strong, innovative concept that prospered because it was not a compromise.\nThese are the things that we as planners can do. For instance, if we understand that in one market diesel engines are very important, the engineers can create a package that takes that into account. We are not compromising, but creating the proper combination to address specific needs from the start. With a car like the Z, for instance, we will not compromise. We will make a clear choice, even if it means losing some volume in other markets. Cars like the Z are not volume seekers; they are brand builders.\nNissan Annual Report 2004\nThe global expansion of the Infiniti brand is another example of building a brand. Developing and building Infiniti is about making a specific brand decision. You can't advertise a luxury brand like this in the same way you do a standard non-luxury brand. The typical Infiniti customer might never buy a Nissan, for example, because it's not exclusive enough. So in the Planning Group, we have a lot of work to do upstream, going deep into brand understanding and then deploying this understanding on specific products, features that span across multiple car lines, perceived product quality, materials and so on.", + "page_start": 37, + "page_end": 37, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "MGM MIRAGE 2004 ANNUAL REPORT", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "Implementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\nJon Tate\nJack Armstrong\nTiago Bastos\nPawel Brodacki\nFrank Enders\nSergey Kubin\nDanilo Miyasiro\nRodrigo Suzuki", + "page_start": 0, + "page_end": 0, + "source_file": "sg247938.pdf" + }, + { + "text": "October 2015, Fifth Edition\nThis revision includes information about IBM Content Manager OnDemand Version 9.5.\n' Copyright IBM Corp. 2003, 2015. All rights reserved.\nxxi\nxxii\nIBM Content Manager OnDemand Guide\nPart\n1", + "page_start": 22, + "page_end": 24, + "source_file": "sg246915.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv5_ccby4license.pdf", + "query": "What is the average emission of a human being per year in terms of CO2eq ?", + "target_page": 3, + "target_passage": "the average human is responsible for an estimated 5t CO2e per year", + "chunk_present": { + "presence": true, + "index": 9 + } + }, + "top_chunk": [ + { + "text": "Summary of expected outputs\nTable 1 below indicates the likely dimensions of the outputs for each of the components as of July 2017.\nprojections = 1950-2100 RCP2.6, RCP4.5,. Period of data, Land.Global projections = 1900-2100 RCP8.5; additional. Period of data, Land.Probabilistic projections = 1961-2100 SRES A1B, RCP2.6, RCP4.5, RCP6.0 RCP8.5. Period of data, Land.High resolution projections = 1981-2080. Period of data, Land.High resolution projections = 1981-2000 2021-2040 2061-2080. Emissions scenarios, Observations (UK State of the Climate) = N/A. Emissions scenarios, Marine and coastal projections = RCP8.5 H ++. Emissions scenarios, Land.Global projections = lower scenario (for Met Office Hadley Centre model only). Emissions scenarios, Land.Probabilistic projections = Temperature, precipitation, solar radiation. Emissions scenarios, Land.High resolution projections = RCP8.5. Emissions scenarios, Land.High resolution projections = RCP8.5. Variables available ++, Observations (UK State of the Climate) = Temperature, precipitation (including snow), sunshine, wind. Variables available ++, Marine and coastal projections = Sea level rise, storm surge. Variables available ++, Land.Global projections = Temperature, precipitation, humidity, wind speed, wind direction, solar radiation. Variables available ++, Land.Probabilistic projections = humidity, wind speed,. Variables available ++, Land.High resolution projections = Temperature, precipitation, humidity, wind speed, wind direction, solar radiation. Variables available ++, Land.High resolution projections = Temperature, precipitation, humidity, wind speed, wind direction, solar radiation", + "page_start": 3, + "page_end": 3, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "Annex 3: Global Warming Potentials (GWPs)\nCarbon dioxide, Chemical formula = CO2. Carbon dioxide, 1995 IPCC GWP = 1. Methane, Chemical formula = CH4. Methane, 1995 IPCC GWP = 21. Nitrous oxide, Chemical formula = N2O. Nitrous oxide, 1995 IPCC GWP = 310. HFC-23, Chemical formula = CHF3. HFC-23, 1995 IPCC GWP = 11,700. HFC-32, Chemical formula = CH2F2. HFC-32, 1995 IPCC GWP = 650. HFC-41, Chemical formula = CH3F. HFC-41, 1995 IPCC GWP = 150. HFC-43-10mee, Chemical formula = C5H2F10. HFC-43-10mee, 1995 IPCC GWP = 1,300. HFC-125, Chemical formula = C2HF5. HFC-125, 1995 IPCC GWP = 2,800. HFC-134, Chemical formula = C2H2F4. HFC-134, 1995 IPCC GWP = 1,000. HFC-134a, Chemical formula = CH2FCF3. HFC-134a, 1995 IPCC GWP = 1,300. HFC-152a, Chemical formula = C2H4F2. HFC-152a, 1995 IPCC GWP = 140. HFC-143, Chemical formula = C2H3F3. HFC-143, 1995 IPCC GWP = 300. HFC-143a, Chemical formula = CF3CH3. HFC-143a, 1995 IPCC GWP = 3,800. HFC-227ea, Chemical formula = C3HF7. HFC-227ea, 1995 IPCC GWP = 2,900. HFC-236fa, Chemical formula = C3H2F6. HFC-236fa, 1995 IPCC GWP = 6,300. HFC-254ca, Chemical formula = C3H3F5. HFC-254ca, 1995 IPCC GWP = 560. Perfluoromethane, Chemical formula = CF4. Perfluoromethane, 1995 IPCC GWP = 6,500. Perfluroethane, Chemical", + "page_start": 47, + "page_end": 47, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "Materials and methods\nFirstly, the period of 1986-2005 is de/fined as the baseline, of which the simulated average value is recognized as 0.61 °C above pre-industrial (the period of 1850-1900) levels; the baseline is selected according to the accessibility and operability of data, which is used for the determination of the periods with global warming by 1.5 °C and 2.0 °C and the comparison of maize yield between di/fferent periods. Secondly, the simulated values of global mean temperature in the future years are subtracted from the simulated average value of 1986-2005; then the values should be plus with 0.61 °C, which are the global warming results above pre-industrial levels; then 20 years moving average of the above results are calculated. /T_hirdly, the climate data of global warming by 1.5 °C is de/fined according to the principles provided in the /fi/f_th IPCC Assessment Report, for which it should be within 1.5-2.0 °C above pre-industrial levels at the end of the twenty-/first century; the climate data of global warming by 2.0 °C is de/fined according to the principles provided in the /fi/f_th IPCC Assessment Report, for which it should be within 2.0-2.5 °C above pre-industrial levels at the end of the twenty-/first century and the period of global warming by 2.0 °C should not be earlier than 2050. Finally, the climate models, scenarios and periods of global warming by 1.5 °C and 2.0 °C are separately con/firmed; the data of global warming by 1.5 °C, simulated by IPSL-CM5A-LR under RCP2.6 scenario during 2020-2039 and simulated by GFDL-ESM2M under RCP4.5 scenario during 2041-2060; the data of global warming by 2.0 °C, simulated by NorESM1-M under RCP4.5 scenario during 2060-2079 and simulated by GFDL-ESM2M under RCP6.0 scenario during 2065-2084.", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed9.pdf" + }, + { + "text": "Ten Year Summary\n- 181,013 824 457 18,657 - 92,680 51.7 -, 2007 = (15,705) 224,986 21,220 19,532 40,752 184,234 - 184,234 417 440 524 (19,888) 4,513 92,680 ( 17. 3 ) -. 47,872 203,249 1,599 20,637 22,236 181,013 - 181,013 824 457 18,657 - 92,680 51.7 -, 2006 = - 16,662 164,597 - 36,589 36,589 128,008 - 128,008 206 247 21,889 8,669 88,592 19.3 10.0. 47,872 203,249 1,599 20,637 22,236 181,013 - 181,013 824 457 18,657 - 92,680 51.7 -, 2005 = 136,008 - 14,779 14,779 121,229 - 121,229 401 212 262 22,184 11,973 85,949 9.8 7. 0. 47,872 203,249 1,599 20,637 22,236 181,013 - 181,013 824 457 18,657 - 92,680 51.7 -, 2004 = 143,413 - 8,367 8,367 135,046 - 135,046 385 135 189 49,294 17,6 31 85,329 45.5 22.0. 47,872 203,249 1,599 20,637 22,236 181,013 - 181,013 824 457 18,657 - 92,680 51.7 -, 12 = . 47,872 203,249 1,599 20,637 22,236 181,013 - 181,013 824 457 18,657 - 92,680 51.7 -, 11 = . 47,872 203,249 1,599 20,637 22,236 181,013 - 181,013 824 457 18,657 - 92,680 51.7 -, 10 = . 47,872 203,249 1,599 20,637 22,236 181,013", + "page_start": 8, + "page_end": 8, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Keywords:\n1.5 ° C, Paris Agreement, 2 ° C, global climate impacts, water resources, terrestrial ecosystems", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed11.pdf" + }, + { + "text": "here\n284 Communication from the Commission to the European Parliament, The Council, The European Economic and Social Committee and the Committee of the Regions: A new Circular Economy Action Plan: For a cleaner and more competitive Europe. 11.03.2020 COM(2020) 98 final, here\n285 EU-OSHA, 2013: Green jobs and occupational safety and health: Foresight on new and emerging risks associated with new technologies by 2020\n286 EU-OSHA, 2021: What will the circular economy (CE) mean for occupational safety and health (OSH)? An overview of four foresight scenarios.\n287 EU-OSHA, Emerging risks: Workers' safety and health in green jobs\n288 United States Environmental Protection Agency: Green Engineering\n289 United Nations Environmental Programme (UNEP): Global Chemicals Outlook\n290 CEFIC, Facts and figures: Chemical Industry Contributes $5.7 Trillion to Global GDP and Supports 120 Million Jobs, New Report Shows, here\n291 UNEP, 2019: Global Chemicals Outlook II - From Legacies to Innovative Solutions: Implementing the 2030 Agenda for Sustainable Development (p. 27).\n292 Naidu et al., 2021: Chemical pollution: A growing peril and potential catastrophic risk to humanity\n293 Eurostat: Production and consumption of chemicals by hazard class, here\n294 Statistics Sweden SCB: Environmental accounts - Chemical indicators 2019\n295 EU-OSHA: ESENER Data visualisation 2019 Risk factors present in the establishment - Chemical or biological substances.\n296 OSHWiki: Climate change - Impact on Occupational Safety and Health.\n297 Pace advanced from intergenerational conception (children live and work like their parents) to a generational conception (children work in a different occupation, compared to their parents but have one main job all their life), to intragenerational conceptions (several changes during lifetime), according to: Rosa, 2013: Social acceleration A new theory of modernity.\n298 Eurostat: Employment and activity by sex, age and citizenship (%) - annual data, here\n299 Eurostat: Employment by sex, age and professional status, here, Filter for age class: 15-64 years.\n300 Eurostat: Full-time and part-time employment by sex, age and educational attainment level (1 000), here", + "page_start": 151, + "page_end": 151, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "References\n9. Dong, W. H., Liu, Z., Liao, H., Tang, Q. H. & Li, X. E. New climate and socio-economic scenarios for assessing global human health challenges due to heat risk. Clim. Change 130 (4), 505-518 (2015).\n10. Brown, S. C., Wigley, T. M. L., Otto-Bliesner, B. L., Rahbek, C. & Fordham, D. A. Persistent Quaternary climate refugia are hospices for biodiversity in the Anthropocene. Nat. Clim. Change 10 , 244-248 (2020).\n11. Fischer, H., Amelung, D. & Said, N. /T_he accuracy of German citizens' con/fidence in their climate change knowledge. Nat. Clim. Change 9 , 776-780 (2020).\n12. Hasegawa, T. et al. Risk of increased food insecurity under stringent global climate change mitigation policy. Nat. Clim. Change 8 , 699-703 (2018).\n13. Lobell, D. B., Schlenker, W. & Costa-Roberts, J. Climate trends and global crop production since 1980. Science 333 , 616-620 (2011).\n14. UNFCCC. /T_he Paris Agreement. 2015, https:// unfccc. int/ proce ss- and- meeti ngs/ the- paris- agree ment/ the- paris- agree ment.", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed9.pdf" + }, + { + "text": "Annex 3: Global Warming Potentials (GWPs)\nformula = C2F6. Perfluroethane, 1995 IPCC GWP = 9,200. Perfluoropropape, Chemical formula = C3F8. Perfluoropropape, 1995 IPCC GWP = 7,000. Perfluorobutane, Chemical formula = C2F10. Perfluorobutane, 1995 IPCC GWP = 7,000. Perfluorocyclobutane, Chemical formula = c-c4F8. Perfluorocyclobutane, 1995 IPCC GWP = 8,700. Perfluoropentane, Chemical formula = C5F12. Perfluoropentane, 1995 IPCC GWP = 7,500. Perfluorohexane, Chemical formula = C6F14. Perfluorohexane, 1995 IPCC GWP = 7,400. Sulphur hexafluoride, Chemical formula = SF6. Sulphur hexafluoride, 1995 IPCC GWP = 23,900\nSource: Climate Change 1995, The Science of Climate Change: Summary for Policymakers and Technical Summary of the Working Group I Report, page 22.\nNAIIS-User-Manual.Docx\nPage 48\n07/08/2013", + "page_start": 47, + "page_end": 47, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "Review of Operations\nended 31 December.2014 = 1,803,000. Natural gas (Mcf) ................................................................., Year ended 31 December.2013 = 934,200. Natural gas (Mcf) ................................................................., Change in.Volume = 868,800. Natural gas (Mcf) ................................................................., Change as.% = 93.0. NGL (Bbls) ............................................................................, Year ended 31 December.2014 = 267,952. NGL (Bbls) ............................................................................, Year ended 31 December.2013 = 95,821. NGL (Bbls)", + "page_start": 17, + "page_end": 17, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "3 ENVIRONMENTAL AND FINANCIAL COST\nStrubell et al. recently benchmarked model training and development costs in terms of dollars and estimated GLYPH<24> $ 2 emissions [129]. While the average human is responsible for an estimated 5t GLYPH<24> $ 2 4 per year, 2 the authors trained a Transformer (big) model [136] with neural architecture search and estimated that the training procedure emitted 284t of GLYPH<24> $ 2 . Training a single BERT base model (without hyperparameter tuning) on GPUs was estimated to require as much energy as a trans-American flight.\nWhile some of this energy comes from renewable sources, or cloud compute companies' use of carbon credit-offset sources, the authors note that the majority of cloud compute providers' energy is not sourced from renewable sources and many energy sources in the world are not carbon neutral. In addition, renewable energy sources are still costly to the environment, 3 and data centers with increasing computation requirements take away from other potential uses of\n2\nData for 2017, from https://ourworldindata.org/co2-emissions, accessed Jan 21, 2021\n3 https://www.heraldscotland.com/news/18270734.14m-trees-cut-scotland-make-waywind-farms/\ngreen energy, 4 underscoring the need for energy efficient model architectures and training paradigms.\nStrubell et al. also examine the cost of these models vs. their accuracy gains. For the task of machine translation where large LMs have resulted in performance gains, they estimate that an increase in 0.1 BLEU score using neural architecture search for English to German translation results in an increase of $150,000 compute cost in addition to the carbon emissions. To encourage more equitable access to NLP research and reduce carbon footprint, the authors give recommendations to report training time and sensitivity to hyperparameters when the released model is meant to be re-trained for downstream use. They also urge governments to invest in compute clouds to provide equitable access to researchers.", + "page_start": 2, + "page_end": 2, + "source_file": "arxiv5_ccby4license.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv5_ccby4license.pdf", + "query": "How did the Black Lives Matter movement influence the writing of Wikipedia articles ?", + "target_page": 5, + "target_passage": " the Black Lives Matter movement (BLM) influenced Wikipedia article generation and editing such that, as the BLM movement grew, articles covering shootings of Black people in- creased in coverage and were generated with reduced latency", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "4.2 Static Data/Changing Social Views\nA central aspect of social movement formation involves using language strategically to destabilize dominant narratives and call attention to underrepresented social perspectives. Social movements produce new norms, language, and ways of communicating. This adds challenges to the deployment of LMs, as methodologies reliant on LMs run the risk of 'value-lock', where the LM-reliant technology reifies older, less-inclusive understandings.\nFor instance, the Black Lives Matter movement (BLM) influenced Wikipedia article generation and editing such that, as the BLM movement grew, articles covering shootings of Black people increased in coverage and were generated with reduced latency [135]. Importantly, articles describing past shootings and incidents of police brutality were created and updated as articles for new events were created, reflecting how social movements make connections between events in time to form cohesive narratives [102]. More generally, Twyman et al. [135] highlight how social movements actively influence framings and reframings of minority narratives\n14 Available at https://github.com/LDNOOBW/List-of-Dirty-Naughty-Obscene-andOtherwise-Bad-Words/blob/master/en, accessed Jan 18, 2021\n15 This observation is due to William Agnew.\nin the type of online discourse that potentially forms the data that underpins LMs.\nAn important caveat is that social movements which are poorly documented and which do not receive significant media attention will not be captured at all. Media coverage can fail to cover protest events and social movements [41, 96] and can distort events that challenge state power [36]. This is exemplified by media outlets that tend to ignore peaceful protest activity and instead focus on dramatic or violent events that make for good television but nearly always result in critical coverage [81]. As a result, the data underpinning LMs stands to misrepresent social movements and disproportionately align with existing regimes of power.", + "page_start": 4, + "page_end": 4, + "source_file": "arxiv5_ccby4license.pdf" + }, + { + "text": "For example (unaudited):\n· Wikipedia and the other projects operated by the Foundation receive more than 19.4 billion pageviews per month, making them one of the most popular Web properties worldwide. Wikipedia is available in more than 332 languages and contains more than 63 million articles contributed by a global volunteer community.\n· For the year ended June 30, 2024, the educational content of the Foundation's largest project, Wikipedia, grew by approximately 1.9 million articles to approximately 63.4 million articles.\n· For the year ended June 30, 2024, volunteers added approximately 12.2 million images, movies, and sound files to the Foundation's multimedia repository, making the total 106.7 million files.\n· Volunteers also contribute in several ways to the Foundation's wiki software: volunteer software developers add new functionality to the code base, and volunteer language specialists add to the code base by translating the wiki interface into different languages. During the year ended June 30, 2024, there were 47,773 commits merged, through the efforts of approximately 511 authors/contributors, of which 8,161 commits were through the efforts of approximately 244 volunteers.", + "page_start": 17, + "page_end": 17, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "References\n66. Conover, M.D.; Ratkiewicz, J.; Francisco, M.; Gonçalves, B.; Menczer, F.; Flammini, A. Political polarization on twitter. In Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, Barcelona, Spain, 17-21 July 2011.\n67. Kitzie, V.; Ghosh, D. # Criming and# Alive: Network and content analysis of two sides of a story on twitter. In Proceedings of the 78th ASIS&T Annual Meeting: Information Science with Impact: Research in and for the Community, St. Louis, MO, USA, 6-10 October; 2015; p. 41.\n68. Burgess, J.; Galloway, A.; Sauter, T. Hashtag as hybrid forum: The case of# agchatoz. In Hashtag Publics. The Power and Politics of Discursive Networks ; Peter Lang: New York, NY, USA, 2015; pp. 61-76.\n69. Rushko GLYPH<11> , D. 17. Permanent revolution: Occupying democracy. In The Playful Citizen ; Amsterdam University Press: Amsterdam, The Netherlands, 2013; p. 335.\n70. Grundberg, M.D.; Lindgren, S. Translocal frame extensions in a networked protest: Situating the# IdleNoMore hashtag. IC Rev. Cient í fica De Inf. Y Comun. 2015 , 11 , 49-57.\n71. Bruns, A.; Burgess, J.E. # ausvotes: How Twitter covered the 2010 Australian federal election. Commun. Politics Cult. 2011 , 44 , 37-56.\n72. Pearce, W.; Holmberg, K.; Hellsten, I.; Nerlich, B. Climate change on Twitter: Topics, communities and conversations about the 2013 IPCC Working Group 1 report. PLoS ONE 2014 , 9 , e94785. [CrossRef]\n73. Zhao, W.X.; Jiang, J.; Weng, J.; He, J.; Lim, E.P.; Yan, H.; Li, X. Comparing twitter and traditional media using topic models. In Proceedings of the European Conference on Information Retrieval, Dublin, Ireland, 18-21 April 2011; pp. 338-349.", + "page_start": 19, + "page_end": 19, + "source_file": "pubmed10.pdf" + }, + { + "text": "References\n23. Druckman, J.N. The implications of framing e GLYPH<11> ects for citizen competence. Political Behav. 2001 , 23 , 225-256. [CrossRef]\n24. Teigen, K.H.; Karevold, K.I. Looking back versus looking ahead: Framing of time and work at di GLYPH<11> erent stages of a project. J. Behav. Decis. Mak. 2005 , 18 , 229-246. [CrossRef]\n25. McKenzie, C.R.; Nelson, J.D. What a speaker's choice of frame reveals: Reference points, frame selection, and framing e GLYPH<11> ects. Psychon. Bull. Rev. 2003 , 10 , 596-602. [CrossRef]\n26. Du, Y.R. Same events, di GLYPH<11> erent stories: Internet censorship in the Arab Spring seen from China. Journal. Mass Commun. Q. 2016 , 93 , 99-117. [CrossRef]\n27. Schuldt, J.P.; Roh, S. Media frames and cognitive accessibility: What do 'global warming' and 'climate change' evoke in partisan minds? Environ. Commun. 2014 , 8 , 529-548. [CrossRef]\n28. Sonnett, J. Climates of risk: A field analysis of global climate change in US media discourse, 1997-2004. Public Underst. Sci. 2010 , 19 , 698-716. [CrossRef]\n29. Jaspal, R.; Nerlich, B.; Van Vuuren, K. Embracing and resisting climate identities in the Australian press: Sceptics, scientists and politics. Public Underst. Sci. 2016 , 25 , 807-824. [CrossRef] [PubMed]\n30. Shi, W.; Chen, C.; Xiong, J.; Fu, H. What Framework Promotes Saliency of Climate Change Issues on Online Public Agenda: A Quantitative Study of Online Knowledge Community Quora. Sustainability 2019 , 11 , 1619. [CrossRef]", + "page_start": 17, + "page_end": 17, + "source_file": "pubmed10.pdf" + }, + { + "text": "4.1 Size Doesn't Guarantee Diversity\nmost similar to the ones used in GPT-2's training data, i.e. documents linked to from Reddit [25], plus Wikipedia and a collection of books. While this was reportedly effective at filtering out documents that previous work characterized as 'unintelligible' [134], what is unmeasured (and thus unknown) is what else it filtered out. The Colossal Clean Crawled Corpus [107], used to train a trillion parameter LM in [43], is cleaned, inter alia , by discarding any page containing one of a list of about 400 'Dirty, Naughty, Obscene or Otherwise Bad Words' [p.6]. 14 This list is overwhelmingly words related to sex, with a handful of racial slurs and words related to white supremacy (e.g. swastika , white power ) included. While possibly effective at removing documents containing pornography (and the associated problematic stereotypes encoded in the language of such sites [125]) and certain kinds of hate speech, this approach will also undoubtedly attenuate, by suppressing such words as twink , the influence of online spaces built by and for LGBTQ people. 15 If we filter out the discourse of marginalized populations, we fail to provide training data that reclaims slurs and otherwise describes marginalized identities in a positive light.\nThus at each step, from initial participation in Internet fora, to continued presence there, to the collection and finally the filtering of training data, current practice privileges the hegemonic viewpoint. In accepting large amounts of web text as 'representative' of 'all' of humanity we risk perpetuating dominant viewpoints, increasing power imbalances, and further reifying inequality. We instead propose practices that actively seek to include communities underrepresented on the Internet. For instance, one can take inspiration from movements to decolonize education by moving towards oral histories due to the overrepresentation of colonial views in text [35, 76, 127], and curate training datasets through a thoughtful process of deciding what to put in, rather than aiming solely for scale and trying haphazardly to weed out, post-hoc, flotsam deemed 'dangerous', 'unintelligible', or 'otherwise bad'.", + "page_start": 4, + "page_end": 4, + "source_file": "arxiv5_ccby4license.pdf" + }, + { + "text": "References\n51. Hermida, A.; Fletcher, F.; Korell, D.; Logan, D. Share, like, recommend: Decoding the social media news consumer. J. Stud. 2012 , 13 , 815-824. [CrossRef]\n52. Small, T.A. What the hashtag? A content analysis of Canadian politics on Twitter. Inf. Commun. Soc. 2011 , 14 , 872-895. [CrossRef]\n53. Bruns, A.; Stieglitz, S. Quantitative approaches to comparing communication patterns on Twitter. J. Technol. Hum. Serv. 2012 , 30 , 160-185. [CrossRef]\n54. Yang, G. Narrative agency in hashtag activism: The case of# BlackLivesMatter. Media Commun. 2016 , 4 , 13.\n55. Bruns, A.; Burgess, J.E. The use of Twitter hashtags in the formation of ad hoc publics. In Proceedings of the 6th European Consortium for Political Research (ECPR) General Conference 2011, Reykjav í k, Iceland, 25-27 August 2011.\n56. Rzeszotarski, J.M.; Spiro, E.S.; Matias, J.N.; Monroy-Hern á ndez, A.; Morris, M.R. Is anyone out there?: Unpacking Q&A hashtags on twitter. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Toronto, ON, Canada, 26 April-1 May 2014; pp. 2755-2758.\n57. Tsur, O.; Rappoport, A. What's in a hashtag?: Content based prediction of the spread of ideas in microblogging communities. In Proceedings of the Fifth ACM International Conference on Web Search and Data Mining, Seattle, WA, USA, 8-12 February 2012; pp. 643-652.\nInt. J. Environ. Res. Public Health 2020 , 17 , 1062\n20 of 22", + "page_start": 18, + "page_end": 19, + "source_file": "pubmed10.pdf" + }, + { + "text": "References\n74. Doctor, V. Hashtag History: When and What Started It? Available online: https: // www.hashtags.org / featured / hashtag-history-when-and-what-started-it / (accessed on 16 January 2020).\n75. Newman, T.P. Tracking the release of IPCC AR5 on Twitter: Users, comments, and sources following the release of the Working Group I Summary for Policymakers. Public Underst. Sci. 2017 , 26 , 815-825. [CrossRef]\n76. Segerberg, A.; Bennett, W.L. Social media and the organization of collective action: Using Twitter to explore the ecologies of two climate change protests. Commun. Rev. 2011 , 14 , 197-215. [CrossRef]\n77. Statista. Number of Monthly Active Twitter Users Worldwide from 1st Quarter 2010 to 1st Quarter 2019 (in Millions). 2019. Available online: https: // www.statista.com / statistics / 282087 / number-of-monthly-activetwitter-users / (accessed on 10 October 2019).\n78. Liu, Y.; Kliman-Silver, C.; Mislove, A. The tweets they are a-changin': Evolution of Twitter users and behavior. In Proceedings of the Eighth International AAAI Conference on Weblogs and Social Media, Ann Arbor, MI, USA, 1-4 June 2014.\nInt. J. Environ. Res. Public Health 2020 , 17 , 1062\n21 of 22", + "page_start": 19, + "page_end": 20, + "source_file": "pubmed10.pdf" + }, + { + "text": "4.1 Size Doesn't Guarantee Diversity\nStarting with who is contributing to these Internet text collections, we see that Internet access itself is not evenly distributed, resulting in Internet data overrepresenting younger users and those from developed countries [100, 143]. 12 However, it's not just the Internet as a whole that is in question, but rather specific subsamples of it. For instance, GPT-2's training data is sourced by scraping outbound links from Reddit, and Pew Internet Research's 2016 survey reveals 67% of Reddit users in the United States are men, and 64% between ages 18 and 29. 13 Similarly, recent surveys of Wikipedians find that only 8.8-15% are women or girls [9].\nFurthermore, while user-generated content sites like Reddit, Twitter, and Wikipedia present themselves as open and accessible to anyone, there are structural factors including moderation practices which make them less welcoming to marginalized populations. Jones [64] documents (using digital ethnography techniques [63]) multiple cases where people on the receiving end of death threats on Twitter have had their accounts suspended while the accounts issuing the death threats persist. She further reports that harassment on Twitter is experienced by 'a wide range of overlapping groups including domestic abuse victims, sex workers, trans people, queer people, immigrants, medical patients (by their providers), neurodivergent people, and visibly or vocally disabled people.' The net result is that a limited set of subpopulations can continue to easily add data, sharing their thoughts and developing platforms that are inclusive of their worldviews; this systemic pattern in turn worsens diversity and inclusion within Internet-based communication, creating a feedback loop that lessens the impact of data from underrepresented populations.", + "page_start": 3, + "page_end": 3, + "source_file": "arxiv5_ccby4license.pdf" + }, + { + "text": "4.3. Temporal Analysis of the Associations in the Two Discourses\nhashtags in the global warming discourse was significantly higher than that in the climate change discourse according to the comparison between Figure 5a,b. From 2009 to 2018, the number of associations with political hashtags (blue nodes) faded, as shown in Figure 4, and its importance in the semantic network gradually decreased, as shown in Figure 5, except for variation in 2014. The yellow nodes describe the hesitation about climate facts and actions, where words describing global efforts, such as 'ipcc', 'cop15', and 'un', and words questioning global warming, such as 'hoax' and 'fraud', were both included. The associations between the yellow nodes were most salient in 2010 and 2011 but were less dominant in the following years. The green nodes occupied 50.7% of all the nodes representing talk about the scientific hashtags of climate issue, including words such as 'ecology', 'ocean', and 'cleanenergy'. Associations between scientific hashtags (green nodes) exploded and the centrality sum of this cluster also showed an obvious rising trend in dominating the theme of the global warming discourse, according to Figure 5. then the associations suddenly strengthened in 2012 when numerous hashtags about phenomena were included in the discourse. Notably, the red node in the top right-hand corner named '2012' refers to the Maya prediction that the year 2012 would be the end of the world and that the world would be destroyed by extreme natural events, and was linked to other climate hashtags for the first time in the graph exactly in 2012. The blue nodes included the political hashtags, such as 'maga', 'ows', 'p2', 'tcot', and 'obama'. The involvement of political hashtags in the global warming discourse was significantly higher than that in the climate change discourse according to the comparison between Figure 5a,b. From 2009 to 2018, the number of associations with political hashtags (blue nodes) faded, as shown in Figure 4, and its importance in the semantic network gradually decreased, as shown in Figure 5, except for variation in 2014. The yellow nodes describe the hesitation about climate facts and actions, where words describing global efforts, such as 'ipcc', 'cop15', and 'un', and words questioning global warming, such as 'hoax' and 'fraud', were both included. The associations between", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed10.pdf" + }, + { + "text": "2.3. Hashtags as Frame Vehicles on Social Media\nLarge amounts of unprompted user-generated data on social media serve as distributed sensors that better reflect public opinion [50] and o GLYPH<11> er researchers more accurate insight into the associations of concepts in people's minds [51]. In particular, hashtags, a unique mechanism of social media, provide researchers with an unprecedented chance to accurately extract the public cognitive framework contained in texts. To inform or comment [52], social media users attach user-generated tagging with a hash character '#' to anchor the keywords of their tweet and classify the tweet to a unifying topic, and other users can view hashtags as beacons to follow specific topics and join collective discussions. Asacommunicative marker, hashtags have been used in a wide range of cases [53] and have contributed considerably to conversations and social participation [54,55]. In addition to the function as a topical signifier [56], social scientists noted that hashtags can also represent the context of a tweet [57], flag an individual's community membership [58], or indicate shared interests [59]. Several studies adopted hashtags as frame markers for both content and sentiment analysis [60-65] to eliminate researchers' subjectivity in frame detection.\nIn some cases, social media users have long struggled to define the most appropriate hashtag for certain events [60,66]. By observing the usage pattern of trending hashtags '#CrimingWhileWhite' and '#AliveWhileBlack' in a struggle against racism, [67] discovered that two related hashtags generated in a single event will draw public attention to di GLYPH<11> erent sides of a story and cause noticeable structural and linguistic di GLYPH<11> erences in public discourse.", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed10.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2648.pdf", + "query": "Concerning electrolyte solutions, what assumption makes the primitive model (PM) regarding ions?", + "target_page": 1, + "target_passage": "simple phenomenological models such as the primitive model (PM), for which the ions are assimi- lated to charged hard spheres", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nAn alternative procedure consists in carrying out molecular simulations, where both the solvent and solute are treated explicitly. After a rigorous averaging over the solvent configurations, a coarse-grained description of the ions, which still includes the effect of the solvent structure, can be obtained [8-11]. However, this set of methods is purely numeric; they do not provide any analytical expression for thermodynamic quantities. They are therefore restricted to simple geometries [12, 13] (bulk solutions or planar interfaces). The description of complex systems, such as porous or electrochemical materials, is still based on continuous solvent models [14].\nIn this letter we present a method aimed at bridging the gap between analytical and numerical approaches. It is based on the application of liquid perturbation theory (LPT) [15] to effective ion-ion potentials extracted from\n∗ Electronic address: john.molina@etu.upmc.fr\n† Electronic address: jean-francois.dufreche@upmc.fr\nmolecular dynamics (MD) results. Different approximations of the PM are employed for the case of NaCl electrolyte solutions: a two component model (MSA2), that only takes free ions into account, and two different three component models (MSA3 and BIMSA3), which include a third species (the contact ion pair). As we proceed to show, LPT allows us to select the best simple model which accurately accounts for the thermodynamics and the physical-chemistry of the system.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2648.pdf" + }, + { + "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nJohn Jairo Molina 1 , 2 , 3 , ∗ Jean-Fran¸cois Dufrˆeche 1 , 2 , 3 , † Mathieu Salanne 1 , 2 , Olivier Bernard 1 , 2 , Marie Jardat 1 , 2 , and Pierre Turq 1 , 2 1 UPMC-Universit'e Paris 06, UMR 7195, PECSA, F-75005 Paris, France 2 CNRS, UMR 7195, PECSA, F-75005 Paris, France 3 Institut de Chimie S'eparative de Marcoule (ICSM), UMR 5257 CEA-CNRS-Universit'e Montpellier 2, Site de Marcoule,\nBˆatiment 426, BP 17171, 30207 Bagnols-sur-C'eze Cedex, France\nWe present a method to derive implicit solvent models of electrolyte solutions from all-atom descriptions; providing analytical expressions of the thermodynamic and structural properties of the ions consistent with the underlying explicit solvent representation. Effective potentials between ions in solution are calculated to perform perturbation theory calculations, in order to derive the best possible description in terms of charged hard spheres. Applying this method to NaCl solutions yields excellent agreement with the all-atom model, provided ion association is taken into account.\nSince the pioneering works of Debye, Huckel, and Onsager, electrolyte solutions have been commonly described by continuous solvent models, for which the McMillan-Mayer theory [1] provides a rigorous statistical-mechanical foundation. Within that level of description, simple phenomenological models such as the primitive model (PM), for which the ions are assimilated to charged hard spheres [2], can lead to explicit formulas for the thermodynamic and structural properties (e.g., with the help of the mean spherical approximation (MSA) [3] or the binding MSA (BIMSA) [4]). These models are the most practical to use [5], since they allow for a direct link between the experimental measurements and the microscopic parameters of the system. Nevertheless, they ignore the molecular structure of the solvent. Consequently, they cannot properly account for the complex specific effects of the ions, which appear in numerous biological, chemical, and physical interfacial phenomena [6, 7], without further developments.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2648.pdf" + }, + { + "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nTo overcome this difficulty, we have explicitly introduced the CIP in our model (species 3). Straightforward calculations, based on a characteristic-function formalism, allow us to define an equivalent model in which the free ions and the CIP are explicitly taken into account [19, 20]. We apply this formalism by defining a pair as an anion and a cation at a distance less than 4 ˚ A, which corresponds to the position of the effective potential maximum. The interaction between free, like charges in this new system remains unchanged, and the cation-anion interactions are easily approximated by ex-\n2\nFIG. 3: Effective pair potentials derived for MSA3 and BIMSA3. (a) Cation anion (dashed line: without taking the pair into account), (b) pair cation, (c) pair anion, and (d) pair pair. The internal potential of the pair β ˜ V int ( r ) is set equal to βV eff ij ( r ) for distances less than 4 ˚ A.\nrapolating the original potential at the barrier separating pairs from free ions (as shown in Fig. 3). We assume that the interaction potential is averaged over the rotational degrees of freedom of the CIP and thus pairwise additive. Hereafter, the quantities referring to such a three-component model are written with a tilda symbol. The short-range potentials involving the pair can be derived, in the infinite dilution limit, from an average of the contributing ion interactions. In Fourier space,\n˜ V SR 3 i ( k ) = w ( k / 2) [ V SR 1 i + V SR 2 i ] ( k ) , i = 1 , 2 (2a)\nwhere ˜ w ( r ) is the pair probability distribution\n˜ ˜ V SR 33 ( k ) = ˜ w ( k / 2) 2 [ V SR 11 + V SR 22 +2 V SR 12 ] ( k ) (2b)\n˜ w ( r ) = K -1 0 e -β ˜ V int ( r ) (2c)\n˜ V int ( r ) is the internal part of the pair potential (see Fig. 3), and K 0 is the association constant, defined as:", + "page_start": 1, + "page_end": 2, + "source_file": "1001.2648.pdf" + }, + { + "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nof the BIMSA3 appears to be negligible compared to the reference term for concentrations less than 1 mol l -1 . The perturbation can then be omitted to obtain a fully analytical theory, determined by the hard sphere diameters and the pair fraction given by LPT; with the free energy and the RDF given in terms of the BIMSA and MSA solutions, as described above. While the procedure we have followed uses two different approximations for the reference and perturbation terms (MSA vs BIMSA), these are known to be accurate for the systems under consideration and do not appear to be inconsistent with each other.\nTo conclude, we have combined MD simulations with LPT to construct simple models of electrolyte solutions which account for the molecular nature of the solvent. The final result is fully analytical and it yields the thermodynamic and structural properties of the solution, in agreement with the original molecular description. The methodology can in principle be adapted to any molecular description of the system (MD simulations involving interaction potentials accounting for polarization effects or Car-Parrinello MD simulations for example) as long as the ion-ion RDF are known. It can also be generalized to study interfaces. The method appears to be a promising approach toward the description of the specific effects of ions, especially for complex systems whose modeling requires an analytic solution.\nThe authors are particularly grateful to Werner Kunz for fruitful discussions.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2648.pdf" + }, + { + "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nThe second stage of our coarse-graining procedure consists in applying LPT, in order to deduce the best analytical model of electrolyte solutions which reproduces this molecular description. The principle of LPT is to describe the properties of a given system in terms of those of a well known reference system, with the difference between them treated as a perturbation in the reference potential. Assuming pairwise additive potentials, V ij = V (0) ij + ∆V ij , a first-order truncated expression for the free energy density of the system βf v is obtained,\nβf v /lessorsimilar βf (0) v + 1 2 β ∑ i,j ρ i ρ j ∫ d r g (0) ij ( r ) ∆V ij ( r ) (1)\nwhich depends only on the free-energy density f (0) v and RDF g (0) of the reference fluid, with β = ( k B T ) -1 and ρ i the concentration of species i . The Gibbs-Bogoliubov inequality [15] ensures that the right-hand side of Eq. (1) is actually a strict upper bound. Once a reference system has been chosen, the expression on the right-hand side of Eq. (1) must be minimized with respect to the parameters defining the reference. This procedure yields the best first-order approximation to the free energy of the system under consideration.\nFor a system of charged particles in solution, the natural reference is the PM, defined in terms of the charge and diameter ( σ i ) of each species. In this case, the perturbing potentials are just the short-range effective potentials computed above (∆ V ij = V SR ij ). We use the MSA [3] solution to the PM, since it provides analytical expressions for both the free energy and the RDF. The perturbation term is evaluated using an exponential approximation to the RDF obtained within the MSA, g ( r ) = exp [ g MSA ( r ) -1], which removes any unphysical negative regions and improves the comparison with HNC calculations.\nΦ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2648.pdf" + }, + { + "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\n˜ ˜ Using these two reference systems, the threecomponent MSA3 and BIMSA3, we obtain results in much better agreement with the MC simulations, as shown in Fig. 4. The diameters obtained for species 1, 2, and 3 are 3.65, 4.79, and 5.76 ˚ A for MSA3 and 3.69, 4.75 and 6.19 ˚ A for BIMSA3. The free ion diameters are similar for MSA2, MSA3, and BIMSA3. The pair diameter is smaller when modeled as a hard sphere (MSA3) than when modeled as a dumbbell (BIMSA3). At high concentration (about 1 mol l -1 ), the MSA3 overestimates the free energy, because the excluded volume repulsion becomes too important for the pairs to be represented as hard spheres. The BIMSA3 model is the closest to the MC simulation results. It is worth noting that even at the lowest concentration considered, the fraction of pairs (shown in the insert of Fig. 4), although less then 5%, has a non-negligible effect on the thermodynamics of the system.\nThis procedure also provides an accurate description of the structure over the whole range of concentrations. A development similar to the one that leads to Eq. (2) derives the average unpaired RDF from the corresponding paired quantities:\nρ i ρ j g ij ( k ) = ˜ ρ 3 ˜ w ( k ) (1 -δ ij ) + ˜ ρ i ˜ ρ j ˜ g ij ( k ) + ˜ ρ 3 ˜ w ( k / 2) [ ˜ ρ i ˜ g 3 i + ˜ ρ j ˜ g 3 j ] ( k ) (5) + ˜ ρ 2 3 [ ˜ w ( k / 2)] 2 ˜ g 33 ( k )\nFIG. 5: (Color online) RDF obtained from MC simulations (diamond), BIMSA3 (solid line), and MSA-fit (dot dashed) at two concentrations.", + "page_start": 2, + "page_end": 3, + "source_file": "1001.2648.pdf" + }, + { + "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nThe RDF obtained within BIMSA3 are compared with the MC and MSA-fit results in Fig. 5. Our BIMSA3 model accounts for the strong molecular peak of the CIP and provides the correct distances of minimal approach; whereas the naive MSA-fit procedure ignores the former and gives poor estimates for the latter. At larger separations, the BIMSA3 results do not reproduce the oscillations observed in the MC simulations, but the corresponding energy oscillations in the effective potentials are less than k B T . In addition, the perturbation term\n[1] W. G. McMillan and J. E. Mayer, J. Chem. Phys. 13 , 276 (1945).\n[2] J. M. G. Barthel, H. Krienke, and W. Kunz, Physical Chemistry of Electrolyte Solutions (Springer, 1998).\n[3] L. Blum, in Theoretical Chemistry: Advances and Perspectives , edited by H. Eyring and D. Henderson (Academic Press, 1980), vol. 5, pp. 1-66.\n[4] L. Blum and O. Bernard, J. Stat. Phys. 79 , 569 (1995).\n[5] J.-F. Dufrˆeche et al., J. Phys. Chem. B 109 , 9873 (2005).\n[6] P. Jungwirth and D. J. Tobias, Chem. Rev. 106 , 1259 (2006).\n[7] W. Kunz, P. LoNostro, and B. W. Ninham, Curr. Opin. Colloid Interface Sci. 9 , 1 (2004).\n[8] B. Hess, C. Holm, and N. van der Vegt, Phys. Rev. Lett. 96 , 147801 (2006).\n[9] I. Kalcher and J. Dzubiella, J. Chem. Phys. 130 , 134507 (2009).\n[10] S. Gavryushov and P. Linse, J. Phys. Chem. B 110 , 10878 (2006)\n[11] A. P. Lyubartsev and A. Laaksonen, Phys. Rev. E 52 , 3730 (1995).\n4", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2648.pdf" + }, + { + "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nK 0 = ∫ ∞ 0 d r 4 πr 2 e -β ˜ V int ( r ) = 0 . 43 L . mol -1 (3)\nThe excess free-energy density of the original system βf ex v is that of the three component mixture β ˜ f ex v plus a correction term\nβf ex v = β ˜ f ex v -˜ ρ 3 ln K 0 , (4)\nwhich is due to the change in standard chemical potential between the two component and three component models. It should be noted that the fraction of pairs is now an additional parameter in the minimization scheme, which serves to ensure chemical equilibrium. Within this representation, the pair can be modeled as a hard sphere (MSA3) or as a dumbbell-like CIP (BIMSA3) [4]. Since\n3\nFIG. 4: (Color online) Excess free-energy density βf ex v as a function of the square root of the concentration √ c . (diamond) MC simulations, (dot dashed) MSA2, (dashed) MSA3, (solid) BIMSA3, (dot) DHLL, and (cross) experiments. The inset gives the fraction of pairs (MSA3, BIMSA3) as a function of √ c .\nwe have no additional information, we consider only symmetric dumbbells. Furthermore, since analytic expressions for the RDF within BIMSA are not known, we approximate the dumbbell as a hard sphere when computing the perturbation term (this is not necessary for the reference term, since an expression for the free energy is available). Let ˜ σ c be the diameter of the cation (anion) within the dumbbell, the diameter of the hard sphere representing this dumbbell is taken to be σ 3 = 4 √ 2 π σ c [21].", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2648.pdf" + }, + { + "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nFIG. 2: (Color online) (a) Osmotic coefficient Φ in the McMillan-Mayer frame of reference. (diamond) MC simulations, (dot dashed) MSA2, (dot) Debye Huckel Limiting law (DHLL), (cross) experiments (Ref. [18] with the McMillanMayer to Lewis Randall conversion). (b) Minimization diameters. (dot dashed) MSA2 and (diamond) MSA-fit.\nWe first used LPT for a two-component system (Na + and Cl -free ions) within the MSA (model MSA2), for concentrations ranging from 0.1 to 2 . 0 mol l -1 . The minimization leads to almost constant diameters on the whole range of concentration: σ 1 = 3 . 67 ˚ A and σ 2 = 4 . 78 ˚ A. As shown in Fig. 2, these parameters yield osmotic coefficients close to MC calculations only at very low concentration, i.e., c ≤ 0 . 1 moll -1 (experimental values are given for indicative purposes only, since a perfect model will exactly match the MC results). For molar solutions, the LPT results differ considerably from MC calculations. This discrepancy can easily be understood by comparing the diameters found within the MSA2 calculation with the effective potentials given in Fig. 1. The anion/cation contact distance obtained within the MSA2 calculation is 4 . 2 ˚ A, which is in the region of the second minimum of the effective potential and corresponds to the situation where there is a single layer of water molecules between the ions. The first minimum of the potential, which corresponds to the contact ion pair (CIP) is thus completely ignored by the MSA2 calculation. If the MSA diameters are directly fitted to reproduce the MC osmotic pressure, much smaller values are obtained. These MSA-fit hydrated diameters, which are compared to the MSA2 diameters in the bottom part of Fig. 2, are averages of the CIP and the solvent-separated ion pair.", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2648.pdf" + }, + { + "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nThe first stage consists in calculating the McMillanMayer effective ion-ion interaction potentials V eff ij ( r ), by inverting the radial distribution functions (RDF) g ij ( r ) obtained by MD. The simulations were carried out on a box of 2000 water molecules and 48 NaCl pairs using the same interaction potentials as in reference [16]. This setup corresponds to a concentration of 0 . 64 moll -1 . NPT ensemble sampling at standard pressure and temperature was enforced, with a time step of 1 fs and a pressure bath coupling constant of 1 ps. An equilibration run of 0.25 ns was followed by a production run of 0.6 ns for five different initial configurations. The averages of the resulting RDF were then used for the potential inversion via the HNC closure [15]. These effective potentials are assumed to be concentration independent and will be used for simulations at all concentrations.\nSubtracting the long-range Coulombic potential V LR ij ( r ) (which depends on the dielectric constant of the solvent) from V eff ij ( r ), we obtain the short-range contribution V SR ij ( r ) to the effective potentials. These are given in Fig. 1 (species 1 and 2 refer to Na + and Cl -free ions, respectively). All the short-range potentials exhibit oscillations corresponding to the solvent layering between the ions, but this effect is particularly important for the cation-anion interaction: a considerable potential barrier ( /greaterorsimilar 2 k B T ) separates the first two attractive wells. To serve as a reference, Monte Carlo (MC) simulations were performed with these effective potentials; a comparison between MD and MC RDF is also provided in Fig. 1. The excellent agreement between both sets of RDF validates the HNC inversion procedure [17], and allows us to com-\nFIG. 1: Effective McMillan-Mayer short-range pair potentials extracted from explicit solvent simulations using the HNC closure. (a) Cation anion, (b) cation cation, (c) anion anion, (d) cation anion RDF obtained from explicit solvent MD and implicit solvent MC simulations.\npute all ion thermodynamic properties through implicit solvent MC simulations.", + "page_start": 0, + "page_end": 1, + "source_file": "1001.2648.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2648.pdf", + "query": "What is the principle of the liquid perturbation theory (LPT) ?", + "target_page": 2, + "target_passage": "The principle of LPT is to describe the properties of a given system in terms of those of a well known reference system, with the differ- ence between them treated as a perturbation in the ref- erence potential", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nThe second stage of our coarse-graining procedure consists in applying LPT, in order to deduce the best analytical model of electrolyte solutions which reproduces this molecular description. The principle of LPT is to describe the properties of a given system in terms of those of a well known reference system, with the difference between them treated as a perturbation in the reference potential. Assuming pairwise additive potentials, V ij = V (0) ij + ∆V ij , a first-order truncated expression for the free energy density of the system βf v is obtained,\nβf v /lessorsimilar βf (0) v + 1 2 β ∑ i,j ρ i ρ j ∫ d r g (0) ij ( r ) ∆V ij ( r ) (1)\nwhich depends only on the free-energy density f (0) v and RDF g (0) of the reference fluid, with β = ( k B T ) -1 and ρ i the concentration of species i . The Gibbs-Bogoliubov inequality [15] ensures that the right-hand side of Eq. (1) is actually a strict upper bound. Once a reference system has been chosen, the expression on the right-hand side of Eq. (1) must be minimized with respect to the parameters defining the reference. This procedure yields the best first-order approximation to the free energy of the system under consideration.\nFor a system of charged particles in solution, the natural reference is the PM, defined in terms of the charge and diameter ( σ i ) of each species. In this case, the perturbing potentials are just the short-range effective potentials computed above (∆ V ij = V SR ij ). We use the MSA [3] solution to the PM, since it provides analytical expressions for both the free energy and the RDF. The perturbation term is evaluated using an exponential approximation to the RDF obtained within the MSA, g ( r ) = exp [ g MSA ( r ) -1], which removes any unphysical negative regions and improves the comparison with HNC calculations.\nΦ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2648.pdf" + }, + { + "text": "B. Dynamical Density Functional theory\nThe limitations of the kinetic Monte Carlo model introduced in the previous Section are related to its character as a two-dimensional lattice gas with only three states: gas, liquid or particle. This implies that (i) no liquid can be transported to a site on the surface already filled with liquid, i.e., diffusion of the liquid can not be incorporated in a sensible way and (ii) one is not able to distinguish between the influence of the short- and the long-range parts of the interactions with the substrate, as all such interactions are absorbed into the effective chemical potential.\nHowever, using dynamical density functional theory (DDFT) [78-83] one can develop a model for the processes in the ultrathin postcursor film without these limitations, although here we limit ourselves to developing the theory at the level of the KMC and solely discuss how to extend it to incorporate the influence of the liquid diffusion over the surface. Such a DDFT model describes the coupled dynamics of the density fields of the liquid ρ l and the nanoparticles ρ n . The densities ρ l and ρ n are defined as the probabilities of finding a given lattice site on the surface to be occupied by a film of liquid or by a nanoparticle, respectively. Note that the probability densities correspond to number densities as we use the lattice spacing σ = 1 as our unit of length.\nTo develop the DDFT, one must first derive the underlying free energy functional F [ ρ l , ρ n ] , and secondly, devise dynamical equations for both density fields that account for the conserved and the non-conserved aspects of their dynamics, i.e., transport and phase change processes, respectively. For a system governed by the hamiltonian (3), we may construct a mean-field (Bragg-Williams) approximation for the free energy of the system [78, 84] which contains an entropic contribution and contributions from the interactions between the different species (nanoparticles and liquid). The free energy is a semi-grand free energy, since the liquid is treated grand canonically (it is coupled to a reservoir with chemical potential µ ), whereas the nanoparticles are treated in the\n14\ncanonical ensemble. The free energy functional is first defined on the original KMC lattice. However, after re-writing the interaction terms employing gradient operators [78] one finally obtains the free energy functional for a continuous system", + "page_start": 13, + "page_end": 14, + "source_file": "1001.2669.pdf" + }, + { + "text": "III. MODELLING APPROACHES\nIn several respects, however, the kinetic Monte Carlo model is rather simplistic, limiting its potential applications. For instance, the thermodynamic chemical potential as well as any wetting interaction of the solvent with the substrate are collected in a single parameter - an effective chemical potential. This implies that any influence of a disjoining pressure is 'smeared out' over the whole system and that no distinction between the short- and the long-range parts of the disjoining pressure is possible. It is furthermore based on the assumption that evaporation/condensation is\n8\nthe dominant dynamic process, but does not allow one to probe this assumption. In Section III B we show how one may develop a dynamical density functional theory (DDFT) that describes the system at a similar level to the KMC. However, the DDFT may also be easily extended to include other effects such as fluid diffusion, that the KMC does not incorporate.", + "page_start": 7, + "page_end": 8, + "source_file": "1001.2669.pdf" + }, + { + "text": "B. Dynamical Density Functional theory\n∂ρ l ∂t = ∇· [ M c l ρ l ∇ δF [ ρ n , ρ l ] δρ l ] -M nc l δF [ ρ n , ρ l ] δρ l , (7)\nwhere we assume that the coefficients M c l and M nc l are constants.\n16\nFIG. 5: (Colour online) Density profiles for the situation where the substrate is covered by nanoparticles with average density ρ av n = 0 . 3 and with the liquid excluded from the region y < 0 . The top row shows the nanoparticle density profiles and bottom row the corresponding liquid density profiles at the times t/t l = 1000 (left), 10000 (middle) and 30000 (right), where t l = 1 /kTM nc l σ 2 . The parameters are kT/ε ll = 0 . 8 , ε nl /ε ll = 0 . 6 , ε nn = 0 , α = 0 . 2 M nc l σ 4 , M c l = 0 , ρ l ( t = 0) = 0 . 9 ± ξ (where ξ represents white noise of amplitude 0.05) and ( µ -µ coex ) /kT = -0 . 78 .\nThis theory allows us to study the time evolution of the evaporating film of nanoparticle suspension without some of the restrictions of the kinetic Monte Carlo model. Here, however, we illustrate its application in similar parameter regimes as used above for the KMC. We focus on two examples: (i) the spinodal dewetting of a initially flat film of nanoparticle suspension characterised by constant ρ l and ρ n (Fig. 4); and (ii) the retraction of a dewetting front that is unstable with respect to a fingering instability (Fig. 5).", + "page_start": 15, + "page_end": 16, + "source_file": "1001.2669.pdf" + }, + { + "text": "B. Dynamical Density Functional theory\nF [ ρ l , ρ n ] = ∫ d r [ f ( ρ l , ρ n ) + ε ll 2 ( ∇ ρ l ) 2 + ε nn 2 ( ∇ ρ n ) 2 + ε nl ( ∇ ρ n ) · ( ∇ ρ l ) -µρ l ] , (4)\nwhere\nf ( ρ l , ρ n ) = kT [ ρ l ln ρ l +(1 -ρ l ) ln(1 -ρ l )] + kT [ ρ n ln ρ n +(1 -ρ n ) ln(1 -ρ n )] -2 ε ll ρ 2 l -2 ε nn ρ 2 n -4 ε nl ρ n ρ l . (5)\nSince the liquid may evaporate from the surface into the vapour above the surface, µ is the (true) chemical potential of this reservoir and determines the rate of evaporation [condensation] from [to] the surface. Note that normally a free energy of the form in Eq. (4) is obtained by making a gradient expansion of the free energy functional of a continuous system [84]. However, here we have made the mapping from the free energy of the lattice KMC system.\nThe chemical potential for the nanoparticles may be determined from the functional derivative µ n = δF [ ρ n , ρ l ] /δρ n ( r ) . In equilibrium it is constant throughout the system, but it may vary spatially in a non-equilibrium system, i.e., µ n = µ n ( r , t ) . We assume that the dynamics of the nanoparticles is governed by the thermodynamic force ∇ µ n - i.e. that the nanoparticle current is j = -M n ρ n ∇ µ n , where M n ( ρ l ) is a mobility coefficient that depends on the local density of the liquid. Combining this expression for the current with the continuity equation, we obtain the following evolution equation for the nanoparticle density profile\n∂ρ n ∂t = ∇· [ M n ρ n ∇ δF [ ρ n , ρ l ] δρ n ] . (6)", + "page_start": 14, + "page_end": 14, + "source_file": "1001.2669.pdf" + }, + { + "text": "IV. CONCLUSION\nThe dynamical density functional theory describes the coupled dynamics of the density fields of the liquid and the nanoparticles. In the form described above (i.e. based on the two-dimensional hamiltonian (3)) we obtain a simple theory that allows us to study the time evolution of the evaporating ultrathin film and also to investigate the influence of processes such as surface diffusion by the liquid, which are not incorporated in the KMC model. However, it is straightforward to extend the theory to consider a fully three-dimensional fluid film, in which one can distinguish between short- and long-range interactions of solvent and/or solute with the substrate. We have, however, restricted the examples given here to situations that can also be described using the KMC model. A further exploration will be presented elsewhere.\nFinally, we have discussed a simple thin film model for the hydrodynamics on the mesoscale. It results from a long-wave approximation and consists of coupled evolution equations for the film thickness profile and the mean particle concentration. It has been used to discuss the self-pinning of receding contact lines that is related to the formation of rings of dried-in particles (coffeestain effect) that frequently occurs when films or drops of solutions or suspensions dewet by the combined effects of convection and evaporation.\nOne of the primary goals of researchers in this field, is the search for simple-to-use techniques that allow one to produce hierarchically structured functional layers for a wide range of applications such as, e.g., organic solar cells [98]. This means that the experiments advance very rapidly towards increasingly complex systems. For example, there have been investigations of the influence of the phase behaviour on the drying of droplets of a suspension of hard-sphere colloidal particles and non-adsorbing polymer [99], of the instabilities and the formation of drops in evaporating thin films of binary solutions [100] that may lead to treelike patterns [101], of effects of a secondary phase separation on evaporation-induced pattern formation in polymer films [102], and of the influence of an imposed flow on decomposition and deposition processes in a sliding ridge of evaporating solution of a binary polymer mixture [103] and of the influence of rather\n24", + "page_start": 23, + "page_end": 23, + "source_file": "1001.2669.pdf" + }, + { + "text": "B. Dynamical Density Functional theory\nNote that this equation of motion may also be obtained by assuming that the nanoparticles have over-damped stochastic equations of motion [80-83]. Here, we assume that M n ( ρ l ) = α Θ s ( ρ l -0 . 5) , where Θ s ( x ) is a continuous function that switches smoothly from the value 0 to the value 1 at x = 0 (i.e. it is essentially a smooth analogue of the Heaviside function). This ensures that the nanoparticles are immobile when the local liquid density is small (dry substrate) and have a mobility coefficient α when ρ l is high (wet substrate).\nFor the evolution of the liquid density distribution we assume that the liquid is able to evaporate from the surface into the vapour (reservoir) above the surface (non-conserved dynamics) and may\n15\nFIG. 4: (Colour online) Density profiles for the situation where the substrate is covered by nanoparticles with average density ρ av n = 0 . 3 . The top row are the nanoparticle density profiles and the bottom row are the corresponding liquid density profiles at the times t/t l = 8 (left) and 80 (right), where t l = 1 /kTM nc l σ 2 . The parameters are kT/ε ll = 0 . 8 , ε nl /ε ll = 0 . 6 , ε nn = 0 , α = 0 . 4 M nc l σ 4 , M c l = 0 , ρ l ( t = 0) = 0 . 9 ± ξ (where ξ represents white noise of amplitude 0.05) and ( µ -µ coex ) /kT = -0 . 88 , where the liquid exhibits spinodal decomposition-evaporation.\nalso diffuse over the substrate (conserved dynamics). The conserved part is treated along the lines developed above for the nanoparticles. For the non-conserved part we assume a standard form [85], i.e., the change in time of ρ l is proportional to -( µ surf ( r , t ) -µ ) = -δF [ ρ n , ρ l ] /δρ l ( r ) where µ surf ( r , t ) is the local chemical potential of the liquid at the point r on the surface at time t . This gives the evolution equation for the liquid density", + "page_start": 14, + "page_end": 15, + "source_file": "1001.2669.pdf" + }, + { + "text": "IV. CONCLUSION\nWe have discussed recent work on pattern formation processes in films and drops of evaporating suspensions/solutions of polymers and particles. After reviewing experiments on suspensions of thiol-coated gold nanoparticles in toluene we have focused on the modelling of the transport and phase change processes involved. A theoretical approach to the modelling of the hydrodynamics on the mesoscale has been described as well as more microscopic models for the dynamics in the observed nanoscopic 'postcursor' film. In particular, we have introduced (i) a microscopic kinetic Monte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film model.\nThe kinetic Monte Carlo model and the dynamical density functional theory can both be used to investigate and understand the formation of polygonal networks, spinodal and branched structures resulting from the dewetting of an ultrathin 'postcursor' film that remains behind the mesoscopic dewetting front. They are, however, not capable of describing the dynamical processes in a meso-\n23\nscopic film. We have seen that the KMC model is able to describe the interplay of solute diffusion within the solvent and solvent evaporation/condensation. It also takes the liquid-liquid, liquidparticle and particle-particle interactions into account and therefore allows us to distinguish different regimes of the transverse (fingering) instability of the evaporative dewetting front: a transport regime where the instability is almost completely independent of the interaction strengths and a demixing regime where particles and liquid demix at the receding front thereby increasing its transverse instability.", + "page_start": 22, + "page_end": 23, + "source_file": "1001.2669.pdf" + }, + { + "text": "C. Thin film hydrodynamics\nwhere φ c = 0 . 64 corresponds to random close packing of spherical particles. For the nanoparticle volume per length h p = φh one obtains the following evolution equation:\n∂ t ( φh ) = ∇· [ φQ c ∇ δF δh ] + ∇· [ D ( φ ) h ∇ φ ] , (9)\nwhere the particle concentration dependent diffusion coefficient D ( φ ) is related to the viscosity by the Einstein relation D ( φ ) = kT/ 6 πRη ( φ ) , where R is the radius of the nanoparticles [96].\nWe illustrate results obtained employing this thin film theory using the single example of a receding dewetting front for a partially wetting film. We use the disjoining pressure and material constants for the liquid considered in Ref. [57], where the evaporative and convective dewetting of a film of volatile liquid is studied. We add, however, the nanoparticles to the system. The expression that we employ for the local free energy term in Eq. (2) is:\nf ( h ) = S LW d 2 0 h 2 + S P exp ( d 0 -h l 0 ) , (10)\nwhere the parameters characterising the interaction between the liquid film and the surface are the apolar and polar spreading coefficients S LW and S P , respectively, the Debye length l 0 and the Born repulsion length d 0 [57]. The resulting disjoining pressure Π = -∂ h f ( h ) allows for a stable precursor film (thickness h precursor ) and also has a second (larger) thickness ( h 0 ) that corresponds to a secondary minimum of the underlying energy functional. See Refs. [11, 97] for studies of film and drop states for similar disjoining pressures. Our results are calculated for a system where the profiles only vary in one Cartesian direction ( x ), corresponding to a straight dewetting front. However, our results may also be interpreted as applying to a circular flat drop whose front remains\n19\n1\n1", + "page_start": 18, + "page_end": 19, + "source_file": "1001.2669.pdf" + }, + { + "text": "A. Kinetic Monte Carlo model\nTo illustrate the influence of energetics (characterized by the interaction parameters ε ij ) on fingering in Fig. 3 we display the dependence of the mean finger number on particle-liquid interaction strength ε nl . For ε nl ≥ 1 . 5 the mean finger number < f > is nearly constant; this is the transport regime. However, on decreasing ε nl below 1.5, we observe a marked increase in the value of < f > , indicating that energy plays an important role in determining the number of fingers in this regime. In this parameter range, demixing of particles and liquid occurs at the moving front and increases its transverse instability. In this 'demixing regime', the wavelength of the fingering instability is determined by the dynamics and the energetics of the system. Decreasing ε nl further (below 1 . 4 in Fig. 3) one first observes in regime (iii) a slight decrease in the average finger number. This is a geometric effect resulting from our one-dimensional finger counting routine: The fingers increasingly break up and the dried-in pattern looks progressively isotropic. In regime (iv), the measure 〈 f 〉 does not represent a finger number but instead indicates a decrease in the typical\n12\ndistance between particle clusters resulting from the demixing process that occurs already in the bulk liquid and is not related to the front instability at all. Note that one finds a similar sequence of regimes (i) to (iv) when increasing the particle-particle interaction strengths for fixed ε nl (see Ref. [41]) for further details.\nFIG. 3: (Colour online) Dependence of the mean finger number left behind by the unstable dewetting front on the particle-liquid interaction strength ε nl . The regions marked (i) to (iv) are discussed in the main text. The insets display typical snapshots obtained in the four different regions. Particles are black, liquid is grey (green online) and the empty substrate is white. The remaining parameters are kT = 0 . 2 , M = 20 , µ = -2 . 2 , ρ av n = 0 . 1 , glyph[epsilon1] nn = 2 . 0 , domain size 1200 × 1200 . For the insets, from left to right, glyph[epsilon1] nl = 1 . 2 , 1 . 4 , 1 . 45 , 1 . 8 .\nnl", + "page_start": 11, + "page_end": 12, + "source_file": "1001.2669.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_HIG_2001.pdf", + "query": "By how much did the Hartford group's link to AARP website account concerning buisness made over the internet ?", + "target_page": 16, + "target_passage": "In 2001 the company’s link to AARP’s Web site accounted for much of the $55 million worth of auto business The Hartford generated over the Internet", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "Dear Fellow Shareholders,\nBecause The Hartford quotes and issues this business online (and added online billing in 2001), acquisition and processing costs are 15 to 20 percent lower than those of traditional direct-marketing or face-toface sales. Because of this and other factors, the expense ratio for AARP business is 30 percent below that of the industry in general. And the customer renewal rate is 96 percent, versus the industry's 88 percent, making the AARP program yield some of the most profitable auto business The Hartford writes.\nThe relationship also has The Hartford thinking ahead toward new business and an even stronger relationship with AARP members. The Hartford can crossmarket auto insurance to homeowner's customers and homeowner's insurance to auto customers, which presents a tremendous growth opportunity. In addition,\nThe Hartford is committed to providing value to AARP members in many ways. An example: The Hartford and AARP work with the MIT Age Lab to produce information-available in print and on both partners' Web sites-advising AARP members about Alzheimer's disease and other forms of dementia as they affect driving ability. The information guides caregivers struggling with difficult decisions about family members' safety behind the wheel. The resource-a customer solution like no other-helps enhance the superior value The Hartford provides to AARP members.\nAlthough it's the most comprehensive, the AARP relationship isn't The Hartford's only affinity program. The company also has affinity arrangements with USAA and other companies. Regardless of the program's size, the affinity partners share the right qualities: strong name-brand recognition, first-class marketing and a broad and loyal customer base.\nIn other words, they share some of The Hartford's core attributes.\n14\n/H17076 T he Campbell Agency in Byron Center, Mich., found that by aligning its organization to mirror that of The Hartford, the two partners could work more closely-and grow more-together. For example, The Campbell Agency emulated The Hartford by dedicating a team to the small-business market.\nThat made the agency more proficient at identifying potential customers and setting sales targets, according to Mary Lou Barna, vice president, sales and marketing. In other words, she says, the partnership with The Hartford has made Barna and her colleagues better managers.", + "page_start": 15, + "page_end": 16, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "Dear Fellow Shareholders,\n'P artnering' is a popular business buzzword that may vanish as quickly as it appeared. The Hartford's partnerships, on the other hand, are built for the long term and have played a major role in the company's growth and success.\nThe company enjoys outstanding partnerships with several of the world's top asset managers. It also values its thousands of relationships with financial intermediaries such as large broker-dealers, banks and independent financial planners-and with affinity partners who extend The Hartford's reach into large, growing markets.\n'A lot of people talk about having the right partners, but The Hartford views it differently from most,' says Gary Trippe, CEO of Fort Myers, Fla., propertycasualty agency Oswald, Trippe and Company, Inc. 'They look for partners who share their core values, and the relationship is based on trust and respect. It's all about compatibility.' Trippe should know. His\nagency writes three times as much business with The Hartford, in both personal and commercial lines, as it writes with any other insurer.\nMutually beneficial partnerships with successful businesses of all sizes are the foundation of The Hartford's business model.\nPerhaps no relationship represents shared values and shared success better than the one with AARP, which signed a new eight-year contract with The Hartford that began Jan. 1, 2002. The AARP insurance program with The Hartford is a model of affinity marketing and distribution savvy. AARP's membershipthose age 50 and over-is the fastest-growing segment of the U.S. population. Computer use among this group is growing by an estimated 20 percent per year, and the population segment respects established brands and seeks value, convenience and extraordinary service.\nThat right combination of factors helps make AARP's World Wide Web site one of The Hartford's\n13\nmost dynamic sources of business growth. In 2001 the company's link to AARP's Web site accounted for much of the $55 million worth of auto business The Hartford generated over the Internet.", + "page_start": 14, + "page_end": 15, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "the\n/H17075 K wadwo Dankyi-Ampadu, service representative, personal lines, takes customer phone calls in The Hartford's Southington, Conn., customer call center. It's one of three AARP call centers throughout the United States.\nN ew technology tools made The Hartford Experiencecustomer solutions, ease of doing business and extraordinary service-more real than ever for our customers in 2001.\nIt was a year that saw the debut of life operations' Hartford Investor Web portal, expanded Web portals for group benefits administrators, and enhancements to technology for The Hartford's property-casualty agents and customers.\nHartford Investor is both a versatile personal assistant and an aid in wholesaling, especially for the independent financial planner channel. Broker-dealers and financial advisors can use it to research The Hartford's full complement of individual life and investment products, update their books of business in seconds, track daily fund performance, run financialplanning models, receive online product training, produce customized presentations and even submit business electronically.\nIn short, the portal allows The Hartford to bring products and functions from a variety of sources into one convenient online environment.\nHartford Investor has two strategic objectives: One, deepen current intermediaries' loyalty to The Hartford by extending The Hartford Experience right to their desktops. Two, expand the network of intermediaries by giving them the technological support they need to grow their businesses.\nMore than 153,000 licensed intermediaries-from solo advisors to members of large financial institutions-are appointed to sell The Hartford's products. Yet fewer than 60,000 actively write business for the company. The untapped potential is vast, especially among independents, the fastest-growing distribution channel and the only one in which The Hartford doesn't hold the largest market share.\nThat's bound to change. With Hartford Investor available on their desktops, intermediaries will have far\n21", + "page_start": 21, + "page_end": 22, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "the\n/H17073 T he Hartford's acquisition of Fortis Financial Group in 2001 enhanced the company's market share and distribution advantage. Most importantly, the acquisition brought into The Hartford's family powerful sales professionals like Allen Chinoy of Darien, Ill., left, the nation's fifthleading producer of The Hartford's variable universal life insurance. Chinoy is a vocal supporter of Hartford Investor, which makes it easier for him to show customers such as Dr. Dilip Patel how his portfolio is performing.\n/H17075 J oe Smith, right, and Kim Connolly, left, are a brother-sister team heading Smith Brothers Insurance, Inc. of Glastonbury, Conn. These VIP agents are enthusiastic users of The Hartford's Electronic Business Center (EBC) and other technological tools for propertycasualty agents. They piloted the EBC and have given valuable feedback to Senior Commercial Underwriter Tracey Kamenash and others at The Hartford to help develop the EBC standards and navigational model.\n22\nmore incentive to look to The Hartford for the right products to offer their clients.\nThe Hartford's Group Benefits Division's (GBD) Producer View Web portal enables group benefits brokers to manage their books of business and track commissions and premium payments online. It's also a resource for product brochures and other marketing material. GBD's Employer View portal meets benefits managers' increasing demands for self-service. In 2001 GBD added online billing capability to the portal, which also features access to forms and status reports on premium payments and claims, among other functions.\nThe property-casualty operation's Electronic Business Center (EBC) has transformed the way agents do business. They can obtain quotes almost instantly, check billing and loss information, track claims payments and perform a host of other daily tasks. Because it's their virtual back office, agents have more time to do what's right for them: build their business. The EBC is proving especially valuable in the high-growth smallbusiness market, where service is as important as price.\nThe EBC saves hours of administrative time, allowing agents to sell commercial insurance products much more profitably.", + "page_start": 23, + "page_end": 24, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "Common Stock and Dividend Information\nThe Hartford's common stock is traded on the New York Stock Exchange (NYSE) under the trading symbol 'HIG.' The following table presents the high and low closing prices for the common stock of The Hartford on the NYSE for the periods indicated, and the quarterly dividends declared per share.\n2001, Common Stock Price.High = . 2001, Common Stock Price.Low = . 2001, Dividends.Declared = . First quarter, Common Stock Price.High = $ 67.75. First quarter, Common Stock Price.Low = $ 55.15. First quarter, Dividends.Declared = $0.25. Second quarter, Common Stock Price.High = 70.46. Second quarter, Common Stock Price.Low = 56.88. Second quarter, Dividends.Declared = 0.25. Third quarter, Common Stock Price.High = 69.28. Third quarter, Common Stock Price.Low = 50.10. Third quarter, Dividends.Declared = 0.25. Fourth quarter, Common Stock Price.High = 62.83. Fourth quarter, Common Stock Price.Low = 53.91. Fourth quarter, Dividends.Declared = 0.26. 2000, Common Stock Price.High = . 2000, Common Stock Price.Low = . 2000, Dividends.Declared = . First quarter, Common Stock Price.High = $ 52.75. First quarter, Common Stock Price.Low = $ 29.38. First quarter, Dividends.Declared = $0.24. Second quarter, Common Stock Price.High = 64.00. Second quarter, Common Stock Price.Low = 44.25. Second quarter, Dividends.Declared = 0.24. Third quarter, Common Stock Price.High = 73.75. Third quarter, Common Stock Price.Low = 56.38. Third quarter, Dividends.Declared = 0.24. Fourth quarter, Common Stock Price.High = 79.31. Fourth quarter, Common Stock Price.Low = 65.44. Fourth quarter, Dividends.Declared = 0.25\nAs of February 28, 2002 there were approximately 120,000 shareholders of The Hartford.\nDesign: Gene Mayer Associates, Inc. www .shareholderfocus.com T ext: Daniel D. Elman Photography: T ed Kawalerski ; page 8, Amy Etra\nFORM 100025[2001]", + "page_start": 37, + "page_end": 39, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "Dear Fellow Shareholders,\nFuture generations will measure the full impact of Sept. 11. But at The Hartford, one thing is known already. As they did after disasters such as the New York fire of 1835, the Chicago fire of 1871 and the 1906 San Francisco earthquake, The Hartford's people in 2001 ran their business the only way they know howthe right way. They put customers first and kept promises. In so doing, they helped lay the foundation for a more confident future.\n/H17076 N ew York employees admire a painting depicting the courage and resilience of The Hartford employees and the New York rescue teams. The montage, which now hangs in the lobby of The Hartford's New York offices, was painted by Andy Yelenak of The Hartford's Information Technology department.\n/H17073 T he Hartford's New York staff got their businesses back up and running in less than a week after the Sept. 11 attack, despite the destruction of their offices. Among those who were instrumental in getting 330 employees situated in temporary office space were, left to right, Lucille T. Sgaglione, vice president, Hartford Financial Products; Linda Banks, administrative assistant, office support\nservices, Business Insurance; Holly McCalmont, human resources manager, Business Insurance; Jim Norris, business technology solutions manager, Business Insurance; Craig Lowenthal, first vice president and chief information officer, Hartford Financial Products; and Susan Miranda, support services manager, Hartford Specialty Co.\n11\n/H17074 J ohn Belisle, right, is senior vice president of Oswald, Trippe and Company, Inc. in Fort Myers, Fla., one of The Hartford's largest sellers of Select Customer commercial insurance. David van der Merwe, president of electronics manufacturer Saftronics, Inc., depends on him for reliable counsel, as well as products tailored to Saftronics' business.\n/H17075 T he Hartford signed a new eightyear contract, beginning Jan.1, 2002, to continue its highly successful relationship with AARP. Property & Casualty Operations President and CEO Dave Zwiener, second from left, works closely with, left to right, Bill Farris, director, financial products, AARP Services, Inc.; Leisha Spaulding, manager, financial products, AARP Services, Inc.; and Steve Zaleznick, CEO, AARP Services, Inc.", + "page_start": 12, + "page_end": 13, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "Corporate Information\nCorporate Headquarters\nThe Hartford Financial Services Group, Inc. 690 Asylum Avenue Hartford, Connecticut 06115 860-547-5000\nInternet Address\nhttp://www.thehartford.com\nAnnual Meeting\nShareholders are cordially invited to attend The Hartford's Annual Meeting of Shareholders, which will be held on Thursday, April 18, 2002 at 9:00a.m. in the Wallace Stevens Theater at The Hartford Financial Services Group, Inc.'s home office at 690 Asylum Avenue, Hartford, Connecticut. Shareholders of record as of February 28, 2002 are entitled to notice of, and to vote at, the Annual Meeting.", + "page_start": 37, + "page_end": 37, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "Dear Fellow Shareholders,\nWe merged our personal and business insurance sales and agency management organizations in 2001 to give agents a single point of contact. This makes it easier for them to do business with us and enhances their ability to cross-sell these lines. We also gave agents a wealth of new technological tools. They include continuously updated small-business underwriting guidelines available online, customized direct-bill status reports, online access to commission statements, and online quoting capabilities, to name just a few.\nTom Marra, President and Chief Operating Officer, Life Operations\nRecognizing that technology can only supplement-not supplant-personal relationships, we created an organization of business technology solutions managers in our field offices. These specialists provide hands-on support to property-casualty agents who use The Hartford's online tools.\nThis successful high-tech, high-touch mix is one reason why we estimate our smallbusiness insurance growth rate is five to six times the industry average. Another reason is that we strategically target these businesses' unmet needs. Our new CyberFlex TM business insurance coverage, for example, is geared to traditional brick-and-mortar businesses that have some exposure for cyber-risk in their normal course of doing business-such as using e-mail or operating a Web site.\nOur focus on growth never distracts us from the bottom line. When markets or businesses prove unprofitable, we're nimble enough to take quick action. We exited the European property-casualty business in 2001, focusing instead on financial services in Asia. We also repositioned our reinsurance business to concentrate on the U.S. market, where we're already strong.\nIn all our operations, we've built a well-deserved reputation as a premier partner because we offer an exceptional value proposition that will never change: innovative products, world-class money management, value-added distribution, and outstanding service and technology.\nI'm deeply grateful to our employees, our business partners, our board of directors and, of course, our customers for their support during some of the most trying times we've ever experienced. I especially want to thank you, our shareholders, for allowing us to continue earning your support.", + "page_start": 7, + "page_end": 8, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "Dear Fellow Shareholders,\n/H17073 D alal Maria Salomon, right, is managing director, investment officer of Salomon Group, part of First Union Securities in Richmond, Va. She strives to maintain high service levels for clients such as Daniel Austin, whose life insurance from The Hartford is part of\na diversified investment portfolio Salomon helps him manage. Salomon relies on The Hartford for outstanding service, versatile online tools and consistently strong returns. The Hartford's mutual funds are some of her first choices when designing a portfolio.\n15\n/H17073 Marsh, Inc. is a major distributor of The Hartford's group benefits plans for mid-sized businessesa key growth area for The Hartford. Joe Axelrod, senior account executive, third from right, and Kevin Szott, group sales representative, far right, work in partnership with senior executives from\nMarsh's employee benefits practice. The team includes, left to right, Senior Vice Presidents Kerry King, Robert Lustberg, Maria McHugh and, second from right, Eric Jacobson. Szott, who is legally blind, also works with The Hartford's Team Ability, a group of company-sponsored athletes with disabilities.\n/H17075 I n 2001, The Hartford introduced a new category of commercial coverage called CyberFlex, TM designed to protect small and mid-sized businesses against e-business risks such as e-mail viruses and Web site business interruption. Deirdre Barbee, The Hartford's middle market manager in Charlotte, N.C., Mike Lesniak, Charlotte regional vice president, far left, and VIP agent\nCameron Harris, president of Cameron M. Harris & Company, second from right, explain CyberFlex's benefits to Todd W. Mansfield, CEO of Crosland, a Charlotte property developer and a 13-year customer of The Hartford. Product innovations such as CyberFlex allow The Hartford to provide riskmanagement solutions for customers as their businesses evolve.\n16", + "page_start": 16, + "page_end": 17, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "Dear Fellow Shareholders,\nThe Hartford Chairman, President and CEO Ramani Ayer speaking at the opening of New York employees' new permanent offices in early November. Despite the destruction of their offices at 7 World Trade Center on Sept. 11, The Hartford's New York employees had their businesses back in operation by Sept. 17. Employees moved into their new permanent offices less than 60 days after the attack.\nour proven approach to asset management despite the stock market's vagaries. It means growing our business profitably, maintaining financial discipline, controlling expenses and providing extraordinary service to distributors and customers.\nWe take the last point very seriously, as evidenced by our earning a sixth consecutive DALBAR Annuity Service Award in 2001. DALBAR also awarded us the Intermediary Service Award and the first-ever Life Insurance Service Award.\nAs you'll read throughout this report, service means very specific-and very important-things to us. We strive to forge strong partnerships with our distributors and provide them with technological tools and outstanding products to enhance their selling efforts. These are some of the underpinnings to our solid 2001 results.\nDespite the challenges I've mentioned, our revenues for 2001 rose 3 percent to $15.1 billion. Total assets under management rose 8 percent to $198 billion. Operating income rose 7 percent to $1.034 billion, or $4.28 per diluted share, excluding the $440 million impact of Sept. 11 (after tax and net of reinsurance) and a $130 million tax benefit in our life operations.\nThe results attest to the resilience of our enterprise. With our strong and balanced portfolio of businesses, we consistently demonstrate superior financial performance. Since 1995, we've produced 13 percent annualized operating earnings-per-share growth, excluding the effects of Sept. 11 and the tax benefit in 2001, and 13 percent annualized growth in assets under management. Excluding the effect of Sept. 11 and the tax benefit, operating return on equity has met or exceeded our 13 to 15 percent target every year for the past five years.\nAll this translates into increased shareholder value. Since 1995, our market cap has increased from $5.7 billion to $15.4 billion-an 18 percent compound annual growth rate. Our share price has increased nearly 160 percent since The Hartford became a public company. During the same period, the S&P 500 increased 89 percent, and the Dow Jones Industrial Average 97 percent.", + "page_start": 5, + "page_end": 6, + "source_file": "NYSE_HIG_2001.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_HIG_2001.pdf", + "query": "How many licensed intermediaries did Hartford group have in 2001 ?", + "target_page": 23, + "target_passage": "More than 153,000 licensed intermediaries", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "the\n/H17073 T he Hartford's acquisition of Fortis Financial Group in 2001 enhanced the company's market share and distribution advantage. Most importantly, the acquisition brought into The Hartford's family powerful sales professionals like Allen Chinoy of Darien, Ill., left, the nation's fifthleading producer of The Hartford's variable universal life insurance. Chinoy is a vocal supporter of Hartford Investor, which makes it easier for him to show customers such as Dr. Dilip Patel how his portfolio is performing.\n/H17075 J oe Smith, right, and Kim Connolly, left, are a brother-sister team heading Smith Brothers Insurance, Inc. of Glastonbury, Conn. These VIP agents are enthusiastic users of The Hartford's Electronic Business Center (EBC) and other technological tools for propertycasualty agents. They piloted the EBC and have given valuable feedback to Senior Commercial Underwriter Tracey Kamenash and others at The Hartford to help develop the EBC standards and navigational model.\n22\nmore incentive to look to The Hartford for the right products to offer their clients.\nThe Hartford's Group Benefits Division's (GBD) Producer View Web portal enables group benefits brokers to manage their books of business and track commissions and premium payments online. It's also a resource for product brochures and other marketing material. GBD's Employer View portal meets benefits managers' increasing demands for self-service. In 2001 GBD added online billing capability to the portal, which also features access to forms and status reports on premium payments and claims, among other functions.\nThe property-casualty operation's Electronic Business Center (EBC) has transformed the way agents do business. They can obtain quotes almost instantly, check billing and loss information, track claims payments and perform a host of other daily tasks. Because it's their virtual back office, agents have more time to do what's right for them: build their business. The EBC is proving especially valuable in the high-growth smallbusiness market, where service is as important as price.\nThe EBC saves hours of administrative time, allowing agents to sell commercial insurance products much more profitably.", + "page_start": 23, + "page_end": 24, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "The Hartford Financial Services Group, Inc.\n2001 Summary Annual Report\nThere's only", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "the\n/H17075 K wadwo Dankyi-Ampadu, service representative, personal lines, takes customer phone calls in The Hartford's Southington, Conn., customer call center. It's one of three AARP call centers throughout the United States.\nN ew technology tools made The Hartford Experiencecustomer solutions, ease of doing business and extraordinary service-more real than ever for our customers in 2001.\nIt was a year that saw the debut of life operations' Hartford Investor Web portal, expanded Web portals for group benefits administrators, and enhancements to technology for The Hartford's property-casualty agents and customers.\nHartford Investor is both a versatile personal assistant and an aid in wholesaling, especially for the independent financial planner channel. Broker-dealers and financial advisors can use it to research The Hartford's full complement of individual life and investment products, update their books of business in seconds, track daily fund performance, run financialplanning models, receive online product training, produce customized presentations and even submit business electronically.\nIn short, the portal allows The Hartford to bring products and functions from a variety of sources into one convenient online environment.\nHartford Investor has two strategic objectives: One, deepen current intermediaries' loyalty to The Hartford by extending The Hartford Experience right to their desktops. Two, expand the network of intermediaries by giving them the technological support they need to grow their businesses.\nMore than 153,000 licensed intermediaries-from solo advisors to members of large financial institutions-are appointed to sell The Hartford's products. Yet fewer than 60,000 actively write business for the company. The untapped potential is vast, especially among independents, the fastest-growing distribution channel and the only one in which The Hartford doesn't hold the largest market share.\nThat's bound to change. With Hartford Investor available on their desktops, intermediaries will have far\n21", + "page_start": 21, + "page_end": 22, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "the\nThe EBC also came into its own as a decision-support tool in 2001. Among other new features, its scoring tool evaluates potential small-business customers based on factors such as the number of employees and the size and type of the business. The score helps identify businesses The Hartford is likely to accept and minimizes the complexity of agents' decisions.\nTechnology introduced in 2001 also enhanced customers' interaction with our personal lines operation. Computer-telephony integration (CTI) at call centers immediately directs calls to the right customer service representative based on whether the caller is an auto or homeowner's policyholder. CTI also automatically calls up the customer's record on the customer service representative's screen so service is faster and doing business is easier-the embodiment of The Hartford Experience.\n/H17073 H usband-and-wife team Mike and Debbie Brown, senior vice president and vice president of UBS PaineWebber in Chattanooga, Tenn., left, like to cultivate relationships with investors such as Mac and Teresa Dean. One thing that strengthens their bonds is that the Browns don't ask clients to do anything they wouldn't do. 'My own family's money is with The Hartford,' Mike Brown says. The Browns share equally close relationships with the PLANCO wholesalers who support them.\n/H17075 PLANCO organized some 5,000 instructional seminars in 2001. Brian Taggart, regional marketing director, center, educates banks' customer service specialists and branch-based advisors about The Hartford's variable annuities and mutual funds. The sessions give them the knowledge and confidence to sell The Hartford's products or refer potential customers to banks' financial advisors.\n24\nT he stock market meltdown of 2001 sent a lot of people running for cover-but not the financial professionals who work with PLANCO, a wholly owned subsidiary of The Hartford that wholesales our annuities, mutual funds and other financial services products.\nDespite a painful combination of recession and terrorism, PLANCO never wavered in its confidence in long-term economic growth or in its commitment to the brokers and other intermediaries it serves. And throughout 2001, the industry's leading wholesaler of annuities shared its unshakeable optimism and strengthened its partnerships with more than 153,000 financial advisors.", + "page_start": 24, + "page_end": 26, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "Dear Fellow Shareholders,\nThe Hartford Chairman, President and CEO Ramani Ayer speaking at the opening of New York employees' new permanent offices in early November. Despite the destruction of their offices at 7 World Trade Center on Sept. 11, The Hartford's New York employees had their businesses back in operation by Sept. 17. Employees moved into their new permanent offices less than 60 days after the attack.\nour proven approach to asset management despite the stock market's vagaries. It means growing our business profitably, maintaining financial discipline, controlling expenses and providing extraordinary service to distributors and customers.\nWe take the last point very seriously, as evidenced by our earning a sixth consecutive DALBAR Annuity Service Award in 2001. DALBAR also awarded us the Intermediary Service Award and the first-ever Life Insurance Service Award.\nAs you'll read throughout this report, service means very specific-and very important-things to us. We strive to forge strong partnerships with our distributors and provide them with technological tools and outstanding products to enhance their selling efforts. These are some of the underpinnings to our solid 2001 results.\nDespite the challenges I've mentioned, our revenues for 2001 rose 3 percent to $15.1 billion. Total assets under management rose 8 percent to $198 billion. Operating income rose 7 percent to $1.034 billion, or $4.28 per diluted share, excluding the $440 million impact of Sept. 11 (after tax and net of reinsurance) and a $130 million tax benefit in our life operations.\nThe results attest to the resilience of our enterprise. With our strong and balanced portfolio of businesses, we consistently demonstrate superior financial performance. Since 1995, we've produced 13 percent annualized operating earnings-per-share growth, excluding the effects of Sept. 11 and the tax benefit in 2001, and 13 percent annualized growth in assets under management. Excluding the effect of Sept. 11 and the tax benefit, operating return on equity has met or exceeded our 13 to 15 percent target every year for the past five years.\nAll this translates into increased shareholder value. Since 1995, our market cap has increased from $5.7 billion to $15.4 billion-an 18 percent compound annual growth rate. Our share price has increased nearly 160 percent since The Hartford became a public company. During the same period, the S&P 500 increased 89 percent, and the Dow Jones Industrial Average 97 percent.", + "page_start": 5, + "page_end": 6, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "Dear Fellow Shareholders,\nWe merged our personal and business insurance sales and agency management organizations in 2001 to give agents a single point of contact. This makes it easier for them to do business with us and enhances their ability to cross-sell these lines. We also gave agents a wealth of new technological tools. They include continuously updated small-business underwriting guidelines available online, customized direct-bill status reports, online access to commission statements, and online quoting capabilities, to name just a few.\nTom Marra, President and Chief Operating Officer, Life Operations\nRecognizing that technology can only supplement-not supplant-personal relationships, we created an organization of business technology solutions managers in our field offices. These specialists provide hands-on support to property-casualty agents who use The Hartford's online tools.\nThis successful high-tech, high-touch mix is one reason why we estimate our smallbusiness insurance growth rate is five to six times the industry average. Another reason is that we strategically target these businesses' unmet needs. Our new CyberFlex TM business insurance coverage, for example, is geared to traditional brick-and-mortar businesses that have some exposure for cyber-risk in their normal course of doing business-such as using e-mail or operating a Web site.\nOur focus on growth never distracts us from the bottom line. When markets or businesses prove unprofitable, we're nimble enough to take quick action. We exited the European property-casualty business in 2001, focusing instead on financial services in Asia. We also repositioned our reinsurance business to concentrate on the U.S. market, where we're already strong.\nIn all our operations, we've built a well-deserved reputation as a premier partner because we offer an exceptional value proposition that will never change: innovative products, world-class money management, value-added distribution, and outstanding service and technology.\nI'm deeply grateful to our employees, our business partners, our board of directors and, of course, our customers for their support during some of the most trying times we've ever experienced. I especially want to thank you, our shareholders, for allowing us to continue earning your support.", + "page_start": 7, + "page_end": 8, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "Dear Fellow Shareholders,\nIt's no surprise that our management team is highly regarded within the financial services industry and on Wall Street. We've built a strong leadership team, complemented by more than 27,000 dedicated employees who are nurtured and energized by a culture of success. Consequently, we had a smooth leadership transition over the past year. Tom Marra succeeded Lon Smith as president of our life operations and joined our board of directors. Lon retired after a 33-year career with The Hartford, and we owe him a tremendous amount of gratitude for building a strong and successful operation.\nDuring 2001 we also welcomed two new members to our board of directors. Edward J. Kelly III, president and CEO of Mercantile Bankshares Corp., joined us in May, and we welcomed Charles B. Strauss, president and CEO of Unilever United States, Inc., in November.\nWe're well-positioned for growth in 2002. On Jan. 1 we renewed our relationship with AARP by signing a new eight-year contract to market auto and homeowner's insurance to its 35 million members. Our small-business property-casualty operation continues to grow-premiums surpassed $1.2 billion in annual sales in 2001.\nWe're also in a leading position to take advantage of demographic shifts and to provide estate planning and investment and insurance products to baby boomers. We are very excited, too, about our new SMART 529 ™ college savings program, which offers flexible features and numerous tax advantages. And the growing small-business market segment is a key target for our 401(k) and group-benefits businesses. In fact, with $2 billion in fully insured premiums and $106 million in net income, the Group Benefits Division (GBD) had its best year ever.\nAs our markets continue to grow and evolve, we stay intensely focused on the key strategies in all our businesses.\nSoon after the Sept. 11 attack, The Hartford Chairman, President and CEO Ramani Ayer, left foreground, joined other industry CEOs in meeting with President Bush at the White House. During the meeting, the executives assured the president of industry support as the nation recovers.\nDave Zwiener, President and Chief Operating Officer, Property & Casualty Operations\n6", + "page_start": 6, + "page_end": 7, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "Dear Fellow Shareholders,\nFuture generations will measure the full impact of Sept. 11. But at The Hartford, one thing is known already. As they did after disasters such as the New York fire of 1835, the Chicago fire of 1871 and the 1906 San Francisco earthquake, The Hartford's people in 2001 ran their business the only way they know howthe right way. They put customers first and kept promises. In so doing, they helped lay the foundation for a more confident future.\n/H17076 N ew York employees admire a painting depicting the courage and resilience of The Hartford employees and the New York rescue teams. The montage, which now hangs in the lobby of The Hartford's New York offices, was painted by Andy Yelenak of The Hartford's Information Technology department.\n/H17073 T he Hartford's New York staff got their businesses back up and running in less than a week after the Sept. 11 attack, despite the destruction of their offices. Among those who were instrumental in getting 330 employees situated in temporary office space were, left to right, Lucille T. Sgaglione, vice president, Hartford Financial Products; Linda Banks, administrative assistant, office support\nservices, Business Insurance; Holly McCalmont, human resources manager, Business Insurance; Jim Norris, business technology solutions manager, Business Insurance; Craig Lowenthal, first vice president and chief information officer, Hartford Financial Products; and Susan Miranda, support services manager, Hartford Specialty Co.\n11\n/H17074 J ohn Belisle, right, is senior vice president of Oswald, Trippe and Company, Inc. in Fort Myers, Fla., one of The Hartford's largest sellers of Select Customer commercial insurance. David van der Merwe, president of electronics manufacturer Saftronics, Inc., depends on him for reliable counsel, as well as products tailored to Saftronics' business.\n/H17075 T he Hartford signed a new eightyear contract, beginning Jan.1, 2002, to continue its highly successful relationship with AARP. Property & Casualty Operations President and CEO Dave Zwiener, second from left, works closely with, left to right, Bill Farris, director, financial products, AARP Services, Inc.; Leisha Spaulding, manager, financial products, AARP Services, Inc.; and Steve Zaleznick, CEO, AARP Services, Inc.", + "page_start": 12, + "page_end": 13, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "Common Stock and Dividend Information\nThe Hartford's common stock is traded on the New York Stock Exchange (NYSE) under the trading symbol 'HIG.' The following table presents the high and low closing prices for the common stock of The Hartford on the NYSE for the periods indicated, and the quarterly dividends declared per share.\n2001, Common Stock Price.High = . 2001, Common Stock Price.Low = . 2001, Dividends.Declared = . First quarter, Common Stock Price.High = $ 67.75. First quarter, Common Stock Price.Low = $ 55.15. First quarter, Dividends.Declared = $0.25. Second quarter, Common Stock Price.High = 70.46. Second quarter, Common Stock Price.Low = 56.88. Second quarter, Dividends.Declared = 0.25. Third quarter, Common Stock Price.High = 69.28. Third quarter, Common Stock Price.Low = 50.10. Third quarter, Dividends.Declared = 0.25. Fourth quarter, Common Stock Price.High = 62.83. Fourth quarter, Common Stock Price.Low = 53.91. Fourth quarter, Dividends.Declared = 0.26. 2000, Common Stock Price.High = . 2000, Common Stock Price.Low = . 2000, Dividends.Declared = . First quarter, Common Stock Price.High = $ 52.75. First quarter, Common Stock Price.Low = $ 29.38. First quarter, Dividends.Declared = $0.24. Second quarter, Common Stock Price.High = 64.00. Second quarter, Common Stock Price.Low = 44.25. Second quarter, Dividends.Declared = 0.24. Third quarter, Common Stock Price.High = 73.75. Third quarter, Common Stock Price.Low = 56.38. Third quarter, Dividends.Declared = 0.24. Fourth quarter, Common Stock Price.High = 79.31. Fourth quarter, Common Stock Price.Low = 65.44. Fourth quarter, Dividends.Declared = 0.25\nAs of February 28, 2002 there were approximately 120,000 shareholders of The Hartford.\nDesign: Gene Mayer Associates, Inc. www .shareholderfocus.com T ext: Daniel D. Elman Photography: T ed Kawalerski ; page 8, Amy Etra\nFORM 100025[2001]", + "page_start": 37, + "page_end": 39, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "the\nIt's no accident that PLANCO, which The Hartford acquired in 1998, is the industry leader, as well as a trusted wholesaler of mutual funds, 401(k) plans and\nsingle-premium variable life. When it comes to supporting financial professionals, PLANCO does it right and does it often-especially during the most trying times.\nPLANCO wholesalers spent the latter part of 2001 reminding financial professionals that every 20th century downturn gave rise to a prolonged recovery, and urged them to think ahead to the first recovery of the 21st century. Within two weeks after the Sept. 11 tragedies, thousands of those professionals received a new brochure from PLANCO titled 'From Crisis to Recovery.' It outlined the history of the bull markets that followed World War II, the Cuban missile crisis, the Iran hostage crisis and the Persian Gulf War, demonstrating the market's resilience and ability to bounce back from a national crisis.\nThe optimistic message expanded on The Hartford's 'Investor Survival Guide,' a brochure PLANCO used throughout the year to help financial professionals advise their clients amid market volatility. PLANCO sent out more than 500,000 guides in the second half of 2001 alone. And that was just a small part of the company's massive educational efforts during the year. Those efforts included 5,000 instructional seminars-1,200 more than in 2000-and constant advice and selling strategies for The Hartford's products.\n'Our value is in providing education to financial professionals,' says Tim Seifert, PLANCO senior vice president and managing director. 'One of their major concerns in 2001 was how to show their clients that we've been through downturns and crises before.'\nPLANCO wholesalers did that and much more. They provided reliable counsel only a trusted partner can offer. They helped financial professionals successfully show clients the benefits of using short-term buying opportunities to enhance their long-term investment positions. Consequently, despite the\n26\nprolonged market correction, many of the financial professionals PLANCO works with-and their clientsearned above-market returns in 2001.", + "page_start": 26, + "page_end": 27, + "source_file": "NYSE_HIG_2001.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_HIG_2001.pdf", + "query": "When did the annual sherholder meeting of Hartford happen in 2002 ?", + "target_page": 38, + "target_passage": "Shareholders are cordially invited to attend The Hartford’s Annual Meeting of Shareholders, which will be held on Thursday, April 18, 2002 ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Corporate Information\nCorporate Headquarters\nThe Hartford Financial Services Group, Inc. 690 Asylum Avenue Hartford, Connecticut 06115 860-547-5000\nInternet Address\nhttp://www.thehartford.com\nAnnual Meeting\nShareholders are cordially invited to attend The Hartford's Annual Meeting of Shareholders, which will be held on Thursday, April 18, 2002 at 9:00a.m. in the Wallace Stevens Theater at The Hartford Financial Services Group, Inc.'s home office at 690 Asylum Avenue, Hartford, Connecticut. Shareholders of record as of February 28, 2002 are entitled to notice of, and to vote at, the Annual Meeting.", + "page_start": 37, + "page_end": 37, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "annual report 2002", + "page_start": 0, + "page_end": 0, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "2002 (132)\nPaula Abla\nNicole Adams\nJenny Adkins\nRoger Aldrich\nJimmy Alexander\nBrian Babb\nCharlie Bagley\nBob Baker\nLynard Barrera\nCindy Barrios\nShane Barron\nDennis Bass\nJames Beavers\nRandy Bergen\nLeonard Blackwill Paul Bowyer Troy Bradford Robert Bradley Don Bredy Jim Brock Cindy Brown Kathy Brown Lynn Broyles Jason Budde Greg Burchett Aaron Bush Ernest Byrd Chris Carter Paul Childers Jackie Cooper Jr. Lori Crabtree Cary Crusinbery Jr. James Davis Trent Delano Cheryl Delzer Cathy DeGiusti Larry Dill Sherry Dixon Eldon Eagan Eric S. Edwards Michael Falen Mark Falk Shawn Fields Tom Flesher Viel Flores Justin Foust Adam Gaskill Tamara Gathers Fred Gipson Lisa Glover Cornelio Gomez David Gouker Steve Hall Melvin Harper John Henry John Hornsby John Hurst Todd Ice Bud Jackson Jay Jarvis Danny Jech Jim Jinkins Gary D. Johnson William D. Johnson Chris Jones Joe Jones Mike Kee Dax Kimble Nancy Knox Greg Kochenower Jeremie Koehn Spencer Land Steve Larman Ricky Laster Casidy Lee Ken Leedy\nStephen Lobaugh\nBilly Long\nShawn Marsh\nAndrew McCalmont\nMitch McNeill\nRichard Mieser\nSteve Mills\nSidney Mitchell\nClaudia Molina de Wolford\nNathan Morrison\nTodd Murphy\nCindy Murray\nJeff Newby\nRick Nunley\nJohn Ortiz\nDavid Parker\nRobert Pennel\nRyan Phillips\nSharon Pool\nBob Portman\nEric Powell\nMike L. Reddick\nRonald Reidle\nMartin Robertson II\nA.D. Robison\nRandy Rodrigue\nVern Roe Jr.\nDanny Schmidt\nKary Schneberger\nStacy Settles\nDewayne Shaw\nMichael Sherwood\nWill Shisler\nGreg Skiles\nChad Smith\nRobin Smith\nMaria Strain\nJosh Swift\nChris Townsend\nMichelle Townsend\nRyan Turner\nRodney Vaeth\nFred Vasquez\nRuben Vega Jr.\nAl Warner\nJames Warner\nMichael Weese\nHazel Welch\nLeslie Wertz\nEddie Whitehead\nJohn Wilken\nGary Willeford\nMark Willson\nJerry Wilson\nRobert A. Wilson\nRoy Wilson", + "page_start": 31, + "page_end": 31, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "B A L A N C E\nCorning Annual Report 2002", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "Directors\nChuck A. Cowell\nPresident and Chief Executive Officer\nJ. Michael Alexander\nPresident, James M. Alexander & Co.\nTucker S. Bridwell\nPresident and Chief Executive Officer, Mansefeldt Investments, Inc.\nJoseph E. Canon\nExecutive Director, Dodge Jones Foundation\nDavid Copeland\nPresident, Shelton Family Foundation\nJoe Crawford\nPresident, Abilene Aero, Inc.\nF. Scott Dueser\nFirst Financial Bankshares, Inc.\nCharles Ezzell\nInvestments\nAllan D. Frizzell\nExecutive Vice President,\nEnrich Oil Corporation\nRaymond A. McDaniel, Jr. Investments\nAssets, December 31, 2002 = $705,468. Assets, December 31, 2001 = $670,959. Loans, December 31, 2002 = 353,564. Loans, December 31, 2001 = 344,341. Deposits, December 31, 2002 = 624,262. Deposits, December 31, 2001 = 598,310. Equity, December 31, 2002 = 68,670. Equity, December 31, 2001 = 63,276. Net Income, December 31, 2002 = 14,277. Net Income, December 31, 2001 = 13,051. Trust Assets, December 31, 2002 = 740,745. Trust Assets, December 31, 2001 = 722,504. Return on Average Assets, December 31, 2002 = 2.12%. Return on Average Assets, December 31, 2001 = 1.98%. Return on Average Equity, December 31, 2002 = 21.05. Return on Average Equity, December 31, 2001 = 20.19\nTaylor County Deposit Market Share", + "page_start": 15, + "page_end": 15, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "Annual Meeting\nTuesday, April 22, 2003 Abilene Civic Center 1100 N. Sixth Street Abilene, Texas 79601", + "page_start": 94, + "page_end": 94, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "Directors\nPerry D. Elliott Chairman of the Board\nJames E. Burger\nJack Dortch Jack Dortch Insurance Agency\nF. Scott Dueser First Financial Bankshares, Inc.\nDerrell Johnson\nPresident, American Council of Engineering Companies Life Health Trust\nMark L. Jones\nPresident and Chief Executive Officer\nK. Wayne Lee\nPresident, DDFW Properties\nRobert S. Mundlin\nOwner, Lifetime Benefits Insurance\nJim Ridenour President, Sunbelt Station Service\nBurger Construction\nAssets, December 31, 2002 = $67,750. Assets, December 31, 2001 = $65,554. Loans, December 31, 2002 = 45,132. Loans, December 31, 2001 = 42,366. Deposits, December 31, 2002 = 61,532. Deposits, December 31, 2001 = 59,672. Equity, December 31, 2002 = 6,295. Equity, December 31, 2001 = 5,845. Net Income, December 31, 2002 = 412. Net Income, December 31, 2001 = 652. Return on Average Assets, December 31, 2002 = 0.62%. Return on Average Assets, December 31, 2001 = 1.07%. Return on Average Equity, December 31, 2002 = 6.74. Return on Average Equity, December 31, 2001 = 10.97\nCities of Southlake, Keller and Roanoke Deposit Market Share", + "page_start": 21, + "page_end": 21, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "Common Stock and Dividend Information\nThe Hartford's common stock is traded on the New York Stock Exchange (NYSE) under the trading symbol 'HIG.' The following table presents the high and low closing prices for the common stock of The Hartford on the NYSE for the periods indicated, and the quarterly dividends declared per share.\n2001, Common Stock Price.High = . 2001, Common Stock Price.Low = . 2001, Dividends.Declared = . First quarter, Common Stock Price.High = $ 67.75. First quarter, Common Stock Price.Low = $ 55.15. First quarter, Dividends.Declared = $0.25. Second quarter, Common Stock Price.High = 70.46. Second quarter, Common Stock Price.Low = 56.88. Second quarter, Dividends.Declared = 0.25. Third quarter, Common Stock Price.High = 69.28. Third quarter, Common Stock Price.Low = 50.10. Third quarter, Dividends.Declared = 0.25. Fourth quarter, Common Stock Price.High = 62.83. Fourth quarter, Common Stock Price.Low = 53.91. Fourth quarter, Dividends.Declared = 0.26. 2000, Common Stock Price.High = . 2000, Common Stock Price.Low = . 2000, Dividends.Declared = . First quarter, Common Stock Price.High = $ 52.75. First quarter, Common Stock Price.Low = $ 29.38. First quarter, Dividends.Declared = $0.24. Second quarter, Common Stock Price.High = 64.00. Second quarter, Common Stock Price.Low = 44.25. Second quarter, Dividends.Declared = 0.24. Third quarter, Common Stock Price.High = 73.75. Third quarter, Common Stock Price.Low = 56.38. Third quarter, Dividends.Declared = 0.24. Fourth quarter, Common Stock Price.High = 79.31. Fourth quarter, Common Stock Price.Low = 65.44. Fourth quarter, Dividends.Declared = 0.25\nAs of February 28, 2002 there were approximately 120,000 shareholders of The Hartford.\nDesign: Gene Mayer Associates, Inc. www .shareholderfocus.com T ext: Daniel D. Elman Photography: T ed Kawalerski ; page 8, Amy Etra\nFORM 100025[2001]", + "page_start": 37, + "page_end": 39, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "Directors\nJ.V. Martin\nChairman of the Board, President and Chief Executive Officer\nGlenn D. Bennett Bennett & Associates\nLouis Brooks, Jr.\nRanching, Brooks-Maberry, Inc.\nAssets, December 31, 2002 = $112,079. Assets, December 31, 2001 = $104,968. Loans, December 31, 2002 = 49,487. Loans, December 31, 2001 = 46,666. Deposits, December 31, 2002 = 100,306. Deposits, December 31, 2001 = 90,100. Equity, December 31, 2002 = 11,114. Equity, December 31, 2001 = 10,204. Net Income, December 31, 2002 = 2,078. Net Income, December 31, 2001 = 1,605. Trust Assets, December 31, 2002 = 64,854. Trust Assets, December 31, 2001 = 66,118. Return on Average Assets, December 31, 2002 = 1.99%. Return on Average Assets, December 31, 2001 = 1.53%. Return on Average Equity, December 31, 2002 = 19.15. Return on Average Equity, December 31, 2001 = 15.82\nNolan and Fisher Counties Deposit Market Share\n8", + "page_start": 23, + "page_end": 23, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "2003 (211)\nMindi Richardson\nMatt Roberts\nJody Robertson\nKristen Rogstad\nDoug Romero\nMark Russo\nBeverly Sampson\nLarry Savage\nBob Schmicker\nDave Schoonmaker\nKily Seaman\nJanet Selling\nKeith Shahan\nClay Shamblin\nAaron Siemers\nStacy Smith\nJoyce Stanmire\nScott Stearman\nMarla Strack\nLuke Strickland\nMichelle Surratt\nBlake Surrell\nJaime Tatro\nAmber Thomas\nChevy Thomason\nJerry Todd\nScottie Trejo\nSeth Unruh\nJulio Vasquez\nLarry Ventris\nJohnny Voth\nKeith Wagnon\nJosh Wangler\nBrad Watkins\nNoel Way\nDan Welch\nDavid Wernli\nDe Ann Williams\nNicole Williams\nDavid B. Willis\nBill Wince Jr.\nMartin Wise\nJames Worsham Jr.\nTodd Wright\nLinn Yousey\nLori Zang", + "page_start": 32, + "page_end": 32, + "source_file": "NYSE_CHK_2010.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed11.pdf", + "query": "Regarding climate change, to what corresponds the \"average length of flood events ?", + "target_page": 11, + "target_passage": "The average length of flood events (number of days in which the cumulative daily rainfall excess is positive, compared to the 95th percentile of the baseline", + "chunk_present": { + "presence": true, + "index": 5 + } + }, + "top_chunk": [ + { + "text": "(a) Climate-change impacts at 2 ° Cglobalwarming\nFigure 6. Simulated changes in the average length of /flood events (number of days in which the cumulative daily rainfall excess is positive, compared with the 95th percentile in 1981-2010, at 2 ° C global warming, for individual HadGEM3 simulations driven by SSTs and SICs from di/fferent members of the CMIP5 ensemble, and the ensemble mean. The labels above each panel identify the driving CMIP5 model (or ensemble mean).\nensemble mean\nIPSL-CM5A-LR\nGFDL-ESM2M\nMIROC-ESM-CHEM\nFigure 7. Hunger and Climate Vulnerability Index calculated for simulated climate states at 2 ° C global warming for /five individual HadGEM3 simulations driven by SSTs and SICs from di/fferent members of the CMIP5 ensemble, and the ensemble mean.\nchange in length of average flood event (days)\n13\nrsta.r o y alsociet ypublishing . or g P h i l .T r a n s .R . S o c .A 376 : 2 0160452 ........................................................\nensemble mean\nIPSL-CM5A-LR\nIPSL-CM5A-MR\nMIROC-ESM-CHEM\nACCESS1-0\nFigure 8. Change in Hunger and Climate Vulnerability Index relative to baseline calculated for simulated climate states at 2 ° C globalwarming,for/five individual HadGEM3 simulations driven by SSTs and SICs from di/fferent members of the CMIP5 ensemble, and the ensemble mean.", + "page_start": 12, + "page_end": 13, + "source_file": "pubmed11.pdf" + }, + { + "text": "(a) Climate-change impacts at 2 ° Cglobalwarming\nThe ensemble members showed broadly consistent changes in HCVI at 2°C global warming, with increases in most assessed countries and generally similar sets of countries experiencing the largest and smallest changes. Southeastern Africa consistently showed larger increases in HCVI than Central Africa, due to increased length of drought events projected in all ensemble members (not shown). The length of flood events was not projected to increase in this region. The Sahel region consistently showed one or more countries with a small decrease in the HCVI, although the precise country or countries varied between ensemble members. The decrease in HCVI here was due to projected decreases in length of drought, with length of flood events projected to change little.\nIndia is projected to see increased HCVI by all ensemble members, due to a consistent increase in length of flood events projected in all members, outweighing the beneficial impact of decreased length of drought which is again projected in all members.\nBrazil is projected to see increased HCVI, but for reasons which vary between ensemble members. Although the location of projected longer flood events varies across the country in different members, the aggregation of the HCVI to the country level renders this geographical variability irrelevant for such a large country because only the median value across the country is used in the HCVI. Some ensemble members project longer drought for Brazil, which again contributed to increased HCVI.\nHadGEM2-ES\n12\nrsta.r o y alsociet ypublishing . or g P h i l .T r a n s .R . S o c .A 376 : 2 0160452 ........................................................\nensemble mean\nIPSL-CM5A-LR\nGFDL-ESM2M\nIPSL-CM5A-MR\nMIROC-ESM-CHEM\nACCESS1-0", + "page_start": 11, + "page_end": 12, + "source_file": "pubmed11.pdf" + }, + { + "text": "(a) Climate-change impacts at 2 ° Cglobalwarming\n-\nareas are projected to see an increase in flood event lengths of 4 days or more, particularly India and Bangladesh, for which such increases are projected in all ensemble members to some extent. Increases of 2-4 days are also projected in parts of Brazil by all ensemble members, although the magnitude and location within the country varied between members. Similar increases are projected in the region of the Horn of Africa and southern Arabian Peninsula in several members.\nThe HCVI calculated for 2°C global warming showed very large geographical variability (figure 7) which relates largely to differences in socio-economic factors [22]. Differences in the climate change simulated in different ensemble members leads to some variation in the HCVI at\nHadGEM2-ES\n11\nrsta.r o y alsociet ypublishing . or g P h i l .T r a n s .R . S o c .A 376 : 2 0160452 ........................................................\nIPSL-CM5A-LR\nGFDL-ESM2M\nIPSL-CM5A-MR\nMIROC-ESM-CHEM\nACCESS1-0\nFigure 5. Simulated changes in the annual maximum rainfall over 5 days relative to 1981-2010, at 2 ° C global warming, for individual HadGEM3 simulations driven by SSTs and SICs from di/fferent members of the CMIP5 ensemble, and the ensemble mean. The labels above each panel identify the driving CMIP5 model (or ensemble mean).\n2°C, although the geographical variation is still dominated by the non-climatic factors (figure 7). Therefore, the ensemble-mean change is a reasonable guide to the results.\nThe ensemble mean is higher in nearly all assessed countries relative to the baseline (figure 8). The greatest increase was in Oman, followed by India, Bangladesh and Saudi Arabia, then Brazil and a number of its neighbouring countries. Smaller increases in HCVI were seen across Africa. Southeastern Africa showed larger increases than Central Africa. The HCVI decreased in three countries: Mali, Burkino Faso and Sudan.", + "page_start": 10, + "page_end": 11, + "source_file": "pubmed11.pdf" + }, + { + "text": "(c) Food security: the Hunger and Climate Vulnerability Index\nTable 2. Proxies for /flood and drought events used in the HCVI.\nextreme weather event, 1 = description of proxy. average length of /flood events, 1 = number of days in which the cumulative daily rainfall excess is positive, compared with the 95th percentile in the 1981-2010 average ........................................................................................................................................................................................................... average length of drought events, 1 = number of days in which the cumulative daily rainfall de/ficit is positive, compared with the 20th percentile in the 1981-2010 average", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed11.pdf" + }, + { + "text": "5. Conclusion\nThe higher-resolution HadGEM3 simulations project consistent increases in temperature-related extremes, with larger changes at 2°C compared to 1.5°C and local changes being larger than the global annual mean. There is a higher degree of spatial variation in our projections compared with CMIP5-based studies.\nIn the model projections examined here, changes relating to the water cycle are complex, both in their geographical pattern and in the variation between different models. The length of flooding events generally increases across world in all models, but maximum rainfall can either increase or decrease depending on locations. Global patterns of increase and decrease show some consistency between the different GWLs, but also some local differences. Worldwide, most impacts broadly tend to increase with global warming in most areas. For global mean changes, even when the sign of change is uncertain, individual realizations generally show reduced impact at 1.5°C compared with 2°C. However, this does not always hold even at the scale of major global river basins.\nVulnerability to food insecurity increases more at 2°C global warming than 1.5°C in approximately three-quarters of countries assessed. The vulnerability increase can arise from increases in either flooding or drought. Reduced drought leads to decreased vulnerability in a limited number of cases.\nMost simulations here project a general increase in mean streamflow in most of the basins examined, but with a number of notable exceptions in the tropics. While flows in the Ganges are consistently projected to increase by 30-110% at 2°C, Amazon flows could either increase by 3% or decrease by 25%. Ensemble-mean changes in river flow often do not give a full impression of the magnitude of changes that may be possible, so adaptation planning in particular should not rely on ensemble-mean projections and instead consider a range of outcomes. The seasonal low streamflows also increase in many basins, but not as many as for the mean flows-many basins see decreased low flows in some or all projections.\nBroadly, changes in weather extremes at 1.5°C global warming could be estimated by scalingback the impacts at 2°C, if this is done with individual ensemble members rather than the ensemble mean. However, this was not always the case for impacts that depend on more complex process or interactions between more than one climate variable, such as run-off and an indicator of vulnerability to food insecurity.\nData accessibility.\nThis article has no additional data.\nCompeting interests. We declare we have no competing interests.", + "page_start": 24, + "page_end": 24, + "source_file": "pubmed11.pdf" + }, + { + "text": "(a) Climate-change impacts at 2 ° Cglobalwarming\nLarge increases in Rx5day are simulated in south and southeast Asia in all models, but with local details varying. Southeastern South America (broadly southern Brazil and northern Argentina) also see large increases in Rx5day in all models. All models show only small changes over central and north Africa, Europe and most of Asia. In northern South America, however, some models show increases in Rx5day but others show decreases. This suggests that the ensemble-mean result of a decrease in Rx5day in this area may be subject to large uncertainty. Inter-model variations in the sign of changes are seen in a few other local localized regions.\nThe average length of flood events (number of days in which the cumulative daily rainfall excess is positive, compared to the 95th percentile of the baseline) generally increase over most of the land surface, although this increase was mostly by a day or less (figure 6). However, some\nHadGEM2-ES\n10\nrsta.r o y alsociet ypublishing . or g P h i l .T r a n s .R . S o c .A 376 : 2 0160452 ........................................................\nensemble mean\nIPSL-CM5A-LR\nGFDL-ESM2M\nIPSL-CM5A-MR\nMIROC-ESM-CHEM\nACCESS1-0\nFigure 4. Simulated changes in the number of consecutive dry days relative to 1981-2010, at 2 ° C global warming, for individual HadGEM3 simulations driven by SSTs and SICs from di/fferent members of the CMIP5 ensemble, and the ensemble mean. The labels above each panel identify the driving CMIP5 model (or ensemble mean).\nTable 5. Global mean changes at 2 ° C global warming compared to present day for individual ensemble members, for the ClimPACT indices, the /flood and drought proxies used as input to the HCVI calculations, and percentage change in mean precipitation (Pmean), mean run-o/ff (Rmean) and low run-o/ff (Rlow).", + "page_start": 9, + "page_end": 10, + "source_file": "pubmed11.pdf" + }, + { + "text": "(a) Climate-change impacts at 2 ° Cglobalwarming\nTable 5. Global mean changes at 2 ° C global warming compared to present day for individual ensemble members, for the ClimPACT indices, the /flood and drought proxies used as input to the HCVI calculations, and percentage change in mean precipitation (Pmean), mean run-o/ff (Rmean) and low run-o/ff (Rlow).\nensemble mean = 0.61. /flood proxy .........................................................................................................................................................................................................., IPSL- CM5A-LR = 0.83. /flood proxy", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed11.pdf" + }, + { + "text": "(b) Impacts at 1.5 ° Cglobalwarmingcomparedto2 ° C\nTable 6. Global mean changes at 1.5 ° C global warming compared to present day for individual ensemble members, for the ClimPACT indices, the /flood and drought proxies used as input to the HCVI calculations, and percentage change in mean precipitation (Pmean), mean run-o/ff (Rmean) and low run-o/ff (Rlow).\n.........................................................................................................................................................................................................., ensemble mean = 0.42. /flood proxy", + "page_start": 16, + "page_end": 16, + "source_file": "pubmed11.pdf" + }, + { + "text": "(b) Impacts at 1.5 ° Cglobalwarmingcomparedto2 ° C\nTable 6. Global mean changes at 1.5 ° C global warming compared to present day for individual ensemble members, for the ClimPACT indices, the /flood and drought proxies used as input to the HCVI calculations, and percentage change in mean precipitation (Pmean), mean run-o/ff (Rmean) and low run-o/ff (Rlow).\n.........................................................................................................................................................................................................., ACCESS1-0 = 0.73. /flood proxy", + "page_start": 16, + "page_end": 16, + "source_file": "pubmed11.pdf" + }, + { + "text": "(b) Impacts at 1.5 ° Cglobalwarmingcomparedto2 ° C\nTable 6. Global mean changes at 1.5 ° C global warming compared to present day for individual ensemble members, for the ClimPACT indices, the /flood and drought proxies used as input to the HCVI calculations, and percentage change in mean precipitation (Pmean), mean run-o/ff (Rmean) and low run-o/ff (Rlow).\n.........................................................................................................................................................................................................., GFDL- ESM2M = 0.73. /flood proxy", + "page_start": 16, + "page_end": 16, + "source_file": "pubmed11.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed11.pdf", + "query": "What is the projected situation of India regarding HCVI (Hunger and Climate Vulnerability Index)?", + "target_page": 12, + "target_passage": "India is projected to see increased HCVI by all ensemble members, due to a consistent increase in length of flood events projected in all members, outweighing the beneficial impact of decreased length of drought which is again projected in all members", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "(c) Food security: the Hunger and Climate Vulnerability Index\nTo assess implications of climate change for vulnerability to food insecurity, we used an adaptation of the Hunger and Climate Vulnerability Index (HCVI) [22]. The HCVI was developed by the United Nations World Food Programme to provide a country-level assessment of vulnerability to food insecurity as a result of climate-related events. We used a new iteration of the HCVI which makes use of gridded climate model projections to understand the impact of climate change on vulnerability to food insecurity, and the benefits that adaptation can bring via scenarios of adaptation investment [23]. This iteration of the HCVI only considers in-country production of food and does not account for food trade. For this reason, the HCVI is only calculated for 122 developing and least-developed countries (defined here as countries not in the OECD or EU which can be resolved by the scale of the climate model; i.e. larger than 500 km 2 ).\nThe index provides quantification at the national level across the globe of the scale and direction of impact of climate change on food insecurity. As such, it aims to provide the following: (i) information to help policy-makers understand the level of challenge to global food security that climate change presents; (ii) information on the geography of the impacts and help to evaluate the relative benefits of mitigation and adaptation responses.\nThe index is not intended to be a detailed planning tool, but aims to help planners evaluate the nature of the top-level threat to food insecurity that climate change presents, thereby supporting prioritization of effort.\nThe HCVI consists of three equally weighted components: exposure to climate-related hazards, sensitivity of national agricultural production to climate-related hazards, and adaptive capacitya measure of a country's ability to cope with climate-related food shocks. The sensitivity and adaptive capacity components are based on data from the World Bank, World Resources Institute,\n5\nrsta.r o y alsociet ypublishing . or g P h i l .T r a n s .R . S o c .A 376 : 2 0160452 ........................................................", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed11.pdf" + }, + { + "text": "(c) Food security: the Hunger and Climate Vulnerability Index\nFigure 1. Hunger and Climate Vulnerability Index for 1981-2010 climate (ensemble mean across the bias-corrected HadGEM3 ensemble).\nTable 2. Proxies for /flood and drought events used in the HCVI.", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed11.pdf" + }, + { + "text": "(b) Impacts at 1.5 ° Cglobalwarmingcomparedto2 ° C\nOf the 122 countries assessed, 93 have smaller ensemble-mean HCVI calculated at 1.5°C global warming than at 2°C, indicating an ensemble consensus that 76% of assessed countries would see a smaller increase in vulnerability to food insecurity if global warming were limited to 1.5°C (figures 18 and 19). Conversely, 24% of countries would, by this metric, see the same or higher vulnerability to food insecurity at 1.5°C than 2°C. Of these, some are countries where HCVI is projected to be lower at 2°C global warming than in the baseline. For example, in Mali the ensemble-mean baseline HCVI of 0.83 increased slightly to 0.85 at 1.5°C then reduced to 0.81 at 2°C. In some countries, the ensemble-mean HCVI happened to be identical at both warming levels. In Chad, for example, the baseline HCVI of 0.89 increased to 0.91 at both 1.5°C and 2°C.\nAs noted above, four countries saw ensemble-mean HCVI values at 2°C above any seen in the baseline, and this number increased to seven at 1.5°C. The same four countries with 'unprecedented' HCVI values at 2°C also saw 'unprecedented' values at 1.5°C; these were Oman, Bangladesh, Mauritania and Yemen. These were joined by Myanmar, India and Cambodia as having 'unprecedented' values at 1.5°C. The role of internal climate variability in the HCVI results needs to be assessed, as does the effect of potential nonlinear interactions between the flood and drought metric. Until the reasons behind these country-specific results are understood,\n18\nrsta.r o y alsociet ypublishing . or g P h i l .T r a n s .R . S o c .A 376 : 2 0160452 ........................................................", + "page_start": 17, + "page_end": 17, + "source_file": "pubmed11.pdf" + }, + { + "text": "(c) Food security: the Hunger and Climate Vulnerability Index\nTable 2. Proxies for /flood and drought events used in the HCVI.\n..........................................................................................................................................................................................................", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed11.pdf" + }, + { + "text": "(a) Climate-change impacts at 2 ° Cglobalwarming\nFour countries show ensemble-mean HCVI values at 2°C global warming that are higher than any seen in the baseline climate; these are Oman, Bangladesh, Mauritania and Yemen. The implication of such HCVI values is that climate change at 2°C is projected to cause levels of vulnerability to food insecurity that are greater than any seen in the present day. For individual ensemble members, the number of countries with 'unprecedented' HCVI values at 2°C varies from three to seven. Conversely, many countries in the baseline climate have levels of vulnerability to food insecurity that are greater than those expected in other countries under 2°C global warming. This suggests that other factors are already posing greater risk for food insecurity than 2°C climate change is expected to cause in other countries, so the increased risk from climate change should not overshadow the need to reduce vulnerability to food insecurity arising from non-climatic factors. There is scope to reduce vulnerability to food insecurity by addressing various socio-economic issues in such counties.\nThe JULES simulations show a general tendency towards increased run-off over approximately half of the land surface (figure 9) and the majority of the major river basins assessed (figure 10), but with large regional uncertainties including the possibility of decreased flows in many basins. The ensemble-mean change in mean streamflow shows an increase of between 5 and 25% over most of the Northern Hemisphere land surface, with some regions seeing an increase of over 50% at 2°C global warming. Notable exceptions to this are western Europe and southcentral USA, which see less than a 5% change in run-off, and the already very dry region of the Sahara Desert where the existing very small run-off become even smaller.\nEnsemble-mean projected changes in low run-off flows are generally larger (figure 11), with the regions seeing an increase in mean run-off seeing a larger percentage increase in low run-off-over 75% increases over much of North America, Eastern Europe and Asia. Note that this does not necessarily imply a larger increase in absolute low flow compared to absolute mean flow, because the baseline is (by definition) smaller for low flows. In western Europe, where the changes in mean flows were less than 5%, the ensemble-mean low flow decreases by between 5\nGFDL-ESM2M\n14", + "page_start": 13, + "page_end": 13, + "source_file": "pubmed11.pdf" + }, + { + "text": "(c) Food security: the Hunger and Climate Vulnerability Index\nUN Food and Agriculture Organization, UN Development Programme and UN Population Fund [22]. The exposure component comprised proxies for the average length of flood and drought events calculated with daily precipitation data [23] (table 2). These proxies were chosen above other possible metrics as they were required to replace self-reported instances of flood and drought events used in the original HCVI, which correlate with undernutrition data at the country-level [23]. The proxies were therefore masked to only include data where a significant proportion of people live and grow crops before aggregating to country level and combining to comprise a measure of exposure [23]; nevertheless, it is recognized that precipitation data alone may not always be adequate for representing flood and drought events, so the current method is regarded as preliminary.\nThe impacts of projected climate change, therefore, act through changes in these quantities. In the current version of the HCVI, climate-change impacts on other quantities such as crop yield are not considered. Socio-economic factors affecting sensitivity and adaptive capacity are fixed at present-day conditions.\nThe ensemble-mean baseline HCVI calculated with the high-resolution bias-corrected HadGEM3 ensemble is shown in figure 1. The spatial pattern is compatible with HCVI values calculated using reanalysis data at the CMIP5 grid-scale resolution [23]; the most vulnerable regions are sub-Saharan Africa and South Asia. This higher-resolution climate data enables inclusion of additional countries which were not resolved in the lower-resolution CMIP5 data.\n6\nrsta.r o y alsociet ypublishing . or g P h i l .T r a n s .R . S o c .A 376 : 2 0160452 ........................................................\nIn the present study, processing errors in the input data for one ensemble member, the HadGEM2-ES-driven member, caused the results to be invalid. Results for this member for the HCVI are, therefore, not presented here.", + "page_start": 5, + "page_end": 6, + "source_file": "pubmed11.pdf" + }, + { + "text": "(b) Impacts at 1.5 ° Cglobalwarmingcomparedto2 ° C\nrsta.r o y alsociet ypublishing . or g P h i l .T r a n s .R . S o c .A 376 : 2 0160452 ........................................................\nvulnerability to food insecurity\n-0.2\n0.2\n0.4\n0.6\n0\n0.8\n1.0\n1.2\n1.4\nFigure 18. Hunger and Climate Vulnerability Index at 1.5 ° C global warming (ensemble mean).\nIPSL-CM5A-LR\nIPSL-CM5A-MR\nMIROC-ESM-CHEM\nFigure19. Di/fference in Hunger and Climate Vulnerability Index between 2 ° Cand1.5 ° Cglobalwarming,forindividualensemble members and ensemble mean.", + "page_start": 20, + "page_end": 21, + "source_file": "pubmed11.pdf" + }, + { + "text": "Research\nCite this article: Betts RA et al . 2018 Changes in climate extremes, fresh water availability and vulnerability to food insecurity projected at 1.5 ° Cand2 ° C global warming with a higher-resolution global climate model. Phil. Trans. R. Soc. A 376 : 20160452.\nhttp://dx.doi.org/10.1098/rsta.2016.0452\nAccepted:13February2018\nOne contribution of 20 to a theme issue 'The Paris Agreement: understanding the physical and social challenges for a warming world of 1.5 ° C above pre-industrial levels'.", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed11.pdf" + }, + { + "text": "(b) Impacts at 1.5 ° Cglobalwarmingcomparedto2 ° C\nFigure 13. Global mean percentage changes relative to 1981-2010 in ( a ) precipitation over land, ( b )meanrun-o/ff/flows,( c )low run-o/ff lows (10th percentile), at 2 ° Cand1.5 ° C global warming.\nthis comparison of the number of 'unprecedented' HCVI values at 1.5°C and 2°C should be treated with caution. Nevertheless, the finding that some countries see HCVI values higher at either or both 1.5°C and 2°C compared to the baseline may indicate that climate change has the potential to lead to unprecedented levels of vulnerability to food insecurity in some countries. More robustly, it can be concluded that by this metric, overall worldwide vulnerability to food insecurity generally increases with global warming, and for approximately three-quarters of countries assessed, this increase is larger at 2°C than 1.5°C.\nIn the ensemble mean, changes in mean, low and high flows are generally larger at 2°C global warming compared to 1.5°C (figure 20). This is often the case for both increases and decreases in flows-increasing the level of global warming magnifies the pattern of river flow changes, although not in all cases.\nThe range of projected mean run-off changes is larger for 2°C than 1.5°C in many basins, but this was not always the case, with many basins showing similar or smaller ranges at 2°C compared with 1.5°. Moreover, the ranges overlap substantially, so in terms of the set of\n19\nrsta.r o y alsociet ypublishing . or g P h i l .T r a n s .R . S o c .A 376 : 2 0160452 ........................................................\nensemble mean\nIPSL-CM5A-LR\nGFDL-ESM2M\nHadGEM2-ES\nIPSL-CM5A-MR\nMIROC-ESM-CHEM\nACCESS1-0", + "page_start": 18, + "page_end": 19, + "source_file": "pubmed11.pdf" + }, + { + "text": "1. Introduction\nWe examine the implications of our new climate projections by applying some commonly used indices of climate extremes, and a further index quantifying relative vulnerability to food insecurity which combines climate extremes indices with information on a range of factors representing sensitivity and adaptability of food systems to climate hazards. We also use the climate projections to drive a global land surface model to simulate changes in run-off as an indicator of freshwater availability. We assess whether regional extremes are projected to increase or decrease at 2°C global warming, and whether the consequent impact on drought and vulnerability to food insecurity become greater or smaller. We also assess whether these changes are reduced by limiting global warming to 1.5°C. We explore some of the uncertainties in these projections, and, in particular, examine whether the use of ensemble-mean projections is a useful simple guide to impacts projections or whether this can lead to a misleading impression for some impacts. Regarding vulnerability to food insecurity, we consider the impacts of global warming at 1.5°C and 2°C alongside socio-economic influences that affect the sensitivity to climate change. Wealso consider our climate-change impacts results in comparison with other studies using older, lower-resolution climate projections.\nA large number of previous studies have assessed potential impacts of future climate change using the 5th Coupled Model Intercomparison Project (CMIP5) ensemble or subsets of this [7], and some have framed this in terms of impacts at global warming of 1.5°C and/or 2°C [8,9]. We also base our study on a subset of CMIP5 projections, but use a new, higher-resolution atmosphere model to provide greater spatial detail and improved representation of atmospheric processes.", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed11.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed11.pdf", + "query": "Regarding climate change simulation, what is JULES ?", + "target_page": 7, + "target_passage": "Impacts on freshwater were assessed with a version of the JULES land surface model [24,25], a coupled ecosystem–hydrology–surface exchange model which simulates land-atmosphere fluxes of water, energy and carbon in an internally consistent way", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "(d) Freshwater resources: run-o/ff\nImpacts on freshwater were assessed with a version of the JULES land surface model [24,25], a coupled ecosystem-hydrology-surface exchange model which simulates land-atmosphere fluxes of water, energy and carbon in an internally consistent way, typically applied at global scales. Variants of JULES form the land surface scheme of Met Office Hadley Centre Earth System Models [26,27] and have been used to assess impacts of climate change on global terrestrial ecosystems and hydrology [28-30] within such models. JULES can also be used outside of the Earth System Model (ESM), driven by meteorological outputs of other ESMs to assess impacts of a wider range of climate projections [6,8]. Here we use a new, higher-resolution configuration of JULES on a global grid of 0.5° resolution [31].\nIt has been noted that hydrological impacts models driven by climate-change projections from climate models tend to give more severe drying than simulated in the climate models themselves [32-34]. This is largely attributed to the inclusion of plant stomatal closure in response to elevated CO2 in the climate model land surface schemes, which generally reduces evapotranspiration relative to climate projections without this process and hence further increases run-off/streamflow or ameliorates decreases [34]. This process is often omitted from standard hydrological models. Plant physiological responses to CO 2 are included in the JULES model, so our projections of changes in run-off here do account for this process.\nWe used each HadGEM3 simulation to drive JULES to simulate changes in run-off due to the effects of climate change and CO 2 rise on precipitation, evaporation and transpiration. We analysed 30 year periods centred around the year of crossing GWLs of 1.5°C and 2°C relative to pre-industrial. We examined changes in both mean flows and low flows (defined as the flows for the lowest 10% of time).", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed11.pdf" + }, + { + "text": "(b) Impacts at 1.5 ° Cglobalwarmingcomparedto2 ° C\nFigure 11. Distributions of changes in run-o/ff for low /flows (/flows for lowest 10% of time) simulated by the JULES ecosystemhydrology model under the ensemble of six climate projections at 1.5 ° C(blue)and2 ° C (orange) global warming. Boxes show the 25th and 75th percentile changes, whiskers show the range, circles show the four projections that do not de/fine the ends of the range, and crosses show the ensemble means. Numbers in square brackets show the ensemble-mean /flow in the baseline, in millimetres of rain equivalent.\nTable 6. Global mean changes at 1.5 ° C global warming compared to present day for individual ensemble members, for the ClimPACT indices, the /flood and drought proxies used as input to the HCVI calculations, and percentage change in mean precipitation (Pmean), mean run-o/ff (Rmean) and low run-o/ff (Rlow).", + "page_start": 16, + "page_end": 16, + "source_file": "pubmed11.pdf" + }, + { + "text": "(a) Climate-change impacts at 2 ° Cglobalwarming\nTable 4. Time of reaching GWLs of 1.5 ° Cand2 ° C in each bias-corrected output from the HadGEM3 climate simulations, driven by di/fferent sets of CMIP5 sea-surface temperatures. The dates are the centre year of a 20 year period for which the climate data is applied to the HCVI calculation and JULES simulations.\n.........................................................................................................................................................................................................., 2 = 2036. MIROC-ESM-CHEM", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed11.pdf" + }, + { + "text": "(a) Climate-change impacts at 2 ° Cglobalwarming\nTable 4. Time of reaching GWLs of 1.5 ° Cand2 ° C in each bias-corrected output from the HadGEM3 climate simulations, driven by di/fferent sets of CMIP5 sea-surface temperatures. The dates are the centre year of a 20 year period for which the climate data is applied to the HCVI calculation and JULES simulations.\n.........................................................................................................................................................................................................., 2 = 2035. GFDL-ESM2M", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed11.pdf" + }, + { + "text": "(a) Climate-change impacts at 2 ° Cglobalwarming\nTable 4. Time of reaching GWLs of 1.5 ° Cand2 ° C in each bias-corrected output from the HadGEM3 climate simulations, driven by di/fferent sets of CMIP5 sea-surface temperatures. The dates are the centre year of a 20 year period for which the climate data is applied to the HCVI calculation and JULES simulations.\n.........................................................................................................................................................................................................., 2 = 2051. HadGEM2-ES .........................................................................................................................................................................................................., 1", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed11.pdf" + }, + { + "text": "(a) Climate-change impacts at 2 ° Cglobalwarming\nTable 4. Time of reaching GWLs of 1.5 ° Cand2 ° C in each bias-corrected output from the HadGEM3 climate simulations, driven by di/fferent sets of CMIP5 sea-surface temperatures. The dates are the centre year of a 20 year period for which the climate data is applied to the HCVI calculation and JULES simulations.\n= 2019. HadGEM2-ES .........................................................................................................................................................................................................., 2 = 2033. IPSL-CM5A-MR", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed11.pdf" + }, + { + "text": "(a) Climate-change impacts at 2 ° Cglobalwarming\nTable 4. Time of reaching GWLs of 1.5 ° Cand2 ° C in each bias-corrected output from the HadGEM3 climate simulations, driven by di/fferent sets of CMIP5 sea-surface temperatures. The dates are the centre year of a 20 year period for which the climate data is applied to the HCVI calculation and JULES simulations.\n.........................................................................................................................................................................................................., 1 = 2036. GFDL-ESM2M", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed11.pdf" + }, + { + "text": "(a) Climate-change impacts at 2 ° Cglobalwarming\nTable 4. Time of reaching GWLs of 1.5 ° Cand2 ° C in each bias-corrected output from the HadGEM3 climate simulations, driven by di/fferent sets of CMIP5 sea-surface temperatures. The dates are the centre year of a 20 year period for which the climate data is applied to the HCVI calculation and JULES simulations.\n.........................................................................................................................................................................................................., 1 = 2020. MIROC-ESM-CHEM ..........................................................................................................................................................................................................,", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed11.pdf" + }, + { + "text": "(e) Correcting biases in climate model output and implications for de/fining levels of global warming\nThe ClimPACT extreme weather indices, HCVI and JULES run-off simulations were all performed using outputs from the higher-resolution HadGEM3 projections described in §2a. However, there were some differences in how these data were applied, with different approaches to the treatment of systematic biases in the climate model output. For the ClimPACT analysis, it was considered important to assess changes in the raw climate model output, because this directly represents the behaviour of the model itself. The main focus was on the changes relative to the presentday baseline climate, defined as 1981-2010, with absolute values in either the baseline or the GWLs of 1.5°C and 2°C being only of secondary interest. For the HCVI and JULES run-off analyses, however, it was considered important to correct for systematic biases in the climate model output, because these can lead to unrealistic representations of the key quantities in the present-day simulation [35]. A bias-correction methodology was, therefore, applied for these two parts of the analysis, whereby the model output was adjusted to make it consistent with an observed climatology [36]. We used a multi-segment statistical bias-correction methodology for precipitation [37], and a modification of this for other variables [37].\nThis difference in approach led to inconsistencies in the definitions of the dates of GWLs in the two parts of the study. In the extremes analysis using raw model output, the dates of passing GWLs were defined on the basis of the global mean temperatures in the driving CMIP5 models relative to those models' simulations of global mean temperature in 1870-1899 (table 3). However, in the HCVI and JULES analyses which used bias-corrected data, it was considered more appropriate for the GWLs to be defined using the warming in the observational dataset\n7\nrsta.r o y alsociet ypublishing . or g P h i l .T r a n s .R . S o c .A 376 : 2 0160452 ........................................................", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed11.pdf" + }, + { + "text": "(a) Climate-change impacts at 2 ° Cglobalwarming\nTable 4. Time of reaching GWLs of 1.5 ° Cand2 ° C in each bias-corrected output from the HadGEM3 climate simulations, driven by di/fferent sets of CMIP5 sea-surface temperatures. The dates are the centre year of a 20 year period for which the climate data is applied to the HCVI calculation and JULES simulations.\n2 = 2032. ACCESS1-0, 1 = 2026. ACCESS1-0, 2 = 2040", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed11.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed10.pdf", + "query": "Which of #climatechange and #globalwarming is the most used ?", + "target_page": 5, + "target_passage": "A total of 6,662,478 tweets were retained, of which 5,774,747 contained #climatechange, and 887,731 contained #globalwarming", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "4.1. General Descriptions\nAssociation networks surrounding #climatechange and #globalwarming showed di GLYPH<11> erent properties. The climate change discourse included 38,821 hashtags, whereas the global warming discourse only contained 8788 hashtags. Table 1 displays the 50 most significant hashtags in the two discourses based on centrality. As some hashtags were used in the form of an abbreviation or phrase, explanations are provided in the table. Two networks shared 32 out of the 50 most significant words. Hashtags 'canada', 'cdnpoli', 'sdgs', 'biodiversity', 'education', 'environmental', 'cop24', 'sustainable', 'auspol', 'food', 'agriculture', 'cleanenergy', 'renewableenergy', 'renewables', 'emissions', 'coal', 'fossilfuels', and 'cop21' only showed up on the top 50 list of the 'climate change' network. Hashtags 'tcot', 'california', 'p2', 'nyc', 'snow', 'agw', 'summer', 'global', 'winter', 'india', 'planet', 'heatwave', 'hoax', 'nasa', 'algore', 'world', 'oil', and 'eco' were unique on the top 50 list of the global warming network. The two lists only shared three out of the top five hashtags. In the #climatechange network, 'climateaction' was ranked third place and 'sustainability' was ranked fourth place, whereas they were ranked significantly lower, 17th and 22nd, respectxively, in the #globalwarming network. In the #globalwarming network, 'earth' and 'weather' were among the top five nodes, whereas they were ranked 14th and 24th in the #climatechange network, respectively.\nTable 1. The top 50 central hashtags on Twitter surrounding #climatechange and #globalwarming from 2009 to 2018. The hashtag with * is explained in Appendix A in ascending alphabetical order.", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed10.pdf" + }, + { + "text": "#Climatechange vs. #Globalwarming: Characterizing Two Competing Climate Discourses on Twitter with Semantic Network and Temporal Analyses\nAbstract: Distinct perceptions of the global climate is one of the factors preventing society from achieving consensus or taking collaborative actions on this issue. The public has not even reached an agreement on the naming of the global concern, showing preference for either 'climate change' or 'global warming', and few previous studies have addressed these two competing discourses resulting from distinct climate concerns by di GLYPH<11> erently linking numerous climate concepts. Based on the 6,662,478 tweets containing #climatechange or #globalwarming generated between 1 January 2009 and 31 December 2018, we constructed the semantic networks of the two discourses and examined their evolution over the decade. The findings indicate that climate change demonstrated a more scientific perspective and showed an attempt to condense climate discussions rather than di GLYPH<11> use the topic by frequently addressing sub-topics simultaneously. Global warming triggered more political responses and showed a greater connection with phenomena. Temporal analysis suggests that traditional political discussions were gradually fading in both discourses but more recently started to revive in the form of discourse alliance in the climate change discourse. The associations between global warming and weather abnormalitiessuddenly strengthened around 2012. Climate change is becoming more dominant than global warming in public discussions. Although two discourses have shown more similarities in the rank order of important climate concepts, apparent disagreements continue about how these concepts are associated. These findings lay the groundwork for researchers and communicators to narrow the discrepancy between diverse climate perceptions.\nKeywords: climate change; global warming; semantic network analysis; temporal analysis; public discourse; Twitter", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed10.pdf" + }, + { + "text": "4.3. Temporal Analysis of the Associations in the Two Discourses\nTable 2. Hashtags that remained on the top 50 list for the climate change or the global warming discourse from 2009 to 2018.\n#climatechange #globalwarming, Unique = china, solar, water, food, economy, coal, sustainability pollution, earth. #climatechange #globalwarming, Shared = co2, news, carbon, green, climate, us, energy, science, environment", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed10.pdf" + }, + { + "text": "4.3. Temporal Analysis of the Associations in the Two Discourses\nof the tweets with #globalwarming, whereas the ratio significantly since 2013 and reached 13.02 in 2018. The climate change network showed a stronger ability to incorporate diverse hashtags into discussions, according to Figure 1b. In 2009, the hashtags that co-occurred with #climatechange were 2.44 times those that co-occurred with #globalwarming, and the ratio climbed to 6.36 in 2018.", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed10.pdf" + }, + { + "text": "#Climatechange vs. #Globalwarming: Characterizing Two Competing Climate Discourses on Twitter with Semantic Network and Temporal Analyses\nWen Shi 1 , Haohuan Fu 1,2 , Peinan Wang 3 , Changfeng Chen 3 and Jie Xiong 4, *\n1 Ministry of Education Key Laboratory for Earth System Modeling, Department of Earth System Science, Tsinghua University, Beijing 100084, China; shi-w18@mails.tsinghua.edu.cn (W.S.); haohuan@tsinghua.edu.cn (H.F.)\n2 National Supercomputing Center in Wuxi, Wuxi 214000, China\n3 School of Journalism and Communication, Tsinghua University, Beijing 100084, China;\nwpn17@mails.tsinghua.edu.cn (P.W.); chencf@mail.tsinghua.edu.cn (C.C.)\n4 Strategy and Innovation Department, Rennes School of Business, 35065 Rennes, France\n* Correspondence: jie.xiong@rennes-sb.com; Tel.: + 33-(0)-2-99-54-46-79\nReceived: 5 December 2019; Accepted: 3 February 2020; Published: 7 February 2020", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed10.pdf" + }, + { + "text": "4.1. General Descriptions\nTable 1. The top 50 central hashtags on Twitter surrounding #climatechange and #globalwarming from 2009 to 2018. The hashtag with * is explained in Appendix A in ascending alphabetical order.\n1, #Climatechange.Hashtag = climate. 1, #Climatechange.Centrality = 0.466. 1, #Globalwarming.Hashtag = climate. 1, #Globalwarming.Centrality = 0.530. 2, #Climatechange.Hashtag = environment. 2, #Climatechange.Centrality = 0.465. 2, #Globalwarming.Hashtag = environment. 2, #Globalwarming.Centrality = 0.446. 3, #Climatechange.Hashtag = climateaction. 3, #Climatechange.Centrality = 0.391. 3, #Globalwarming.Hashtag = science. 3, #Globalwarming.Centrality = 0.319. 4, #Climatechange.Hashtag = sustainability. 4, #Climatechange.Centrality = 0.316. 4, #Globalwarming.Hashtag = earth. 4, #Globalwarming.Centrality = 0.296. 5, #Climatechange.Hashtag = science. 5, #Climatechange.Centrality = 0.314. 5, #Globalwarming.Hashtag = weather. 5, #Globalwarming.Centrality = 0.280. 6, #Climatechange.Hashtag = energy. 6, #Climatechange.Centrality = 0.283. 6, #Globalwarming.Hashtag = us *. 6, #Globalwarming.Centrality = 0.280. 7, #Climatechange.Hashtag = trump. 7, #Climatechange.Centrality = 0.257. 7, #Globalwarming.Hashtag = trump. 7, #Globalwarming.Centrality = 0.263. 8, #Climatechange.Hashtag = us *. 8, #Climatechange.Centrality = 0.247. 8, #Globalwarming.Hashtag = pollution. 8, #Globalwarming.Centrality = 0.256. 9, #Climatechange.Hashtag = cop21 *. 9, #Climatechange.Centrality = 0.232. 9, #Globalwarming.Hashtag =", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed10.pdf" + }, + { + "text": "4.1. General Descriptions\nTable 1. The top 50 central hashtags on Twitter surrounding #climatechange and #globalwarming from 2009 to 2018. The hashtag with * is explained in Appendix A in ascending alphabetical order.\nco2. 9, #Globalwarming.Centrality = 0.244. 10, #Climatechange.Hashtag = parisagreement *. 10, #Climatechange.Centrality = 0.232. 10, #Globalwarming.Hashtag = green. 10, #Globalwarming.Centrality = 0.239. 11, #Climatechange.Hashtag = actonclimate *. 11, #Climatechange.Centrality = 0.225. 11, #Globalwarming.Hashtag = tcot *. 11, #Globalwarming.Centrality = 0.229. 12, #Climatechange.Hashtag = water. 12, #Climatechange.Centrality = 0.221. 12, #Globalwarming.Hashtag = nature. 12, #Globalwarming.Centrality = 0.213. 13, #Climatechange.Hashtag = pollution. 13, #Climatechange.Centrality = 0.210. 13, #Globalwarming.Hashtag = news. 13, #Globalwarming.Centrality = 0.198. 14, #Climatechange.Hashtag = earth. 14, #Climatechange.Centrality = 0.207. 14, #Globalwarming.Hashtag = energy. 14, #Globalwarming.Centrality = 0.192. 15, #Climatechange.Hashtag = green. 15, #Climatechange.Centrality = 0.200. 15, #Globalwarming.Hashtag = climatechangeisreal. 15, #Globalwarming.Centrality = 0.187. 16, #Climatechange.Hashtag = climatechangeisreal. 16, #Climatechange.Centrality = 0.195. 16, #Globalwarming.Hashtag = obama. 16, #Globalwarming.Centrality = 0.181. 17, #Climatechange.Hashtag = renewableenergy *. 17, #Climatechange.Centrality = 0.194. 17, #Globalwarming.Hashtag = climateaction. 17, #Globalwarming.Centrality = 0.175. 18, #Climatechange.Hashtag =", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed10.pdf" + }, + { + "text": "4.1. General Descriptions\nTable 1. The top 50 central hashtags on Twitter surrounding #climatechange and #globalwarming from 2009 to 2018. The hashtag with * is explained in Appendix A in ascending alphabetical order.\nhealth. 18, #Climatechange.Centrality = 0.193. 18, #Globalwarming.Hashtag = algore *. 18, #Globalwarming.Centrality = 0.174. 19, #Climatechange.Hashtag = nature. 19, #Climatechange.Centrality = 0.187. 19, #Globalwarming.Hashtag = water. 19, #Globalwarming.Centrality = 0.171. 20, #Climatechange.Hashtag = renewables. 20, #Climatechange.Centrality = 0.186. 20, #Globalwarming.Hashtag = agw *. 20, #Globalwarming.Centrality = 0.164. 21, #Climatechange.Hashtag = cleanenergy. 21, #Climatechange.Centrality = 0.176. 21, #Globalwarming.Hashtag = carbon. 21, #Globalwarming.Centrality = 0.164. 22, #Climatechange.Hashtag = carbon. 22, #Climatechange.Centrality = 0.175. 22, #Globalwarming.Hashtag = sustainability. 22, #Globalwarming.Centrality = 0.163", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed10.pdf" + }, + { + "text": "3.2. Data\nIn this research, we were interested in tweets containing either #climatechange or #globalwarming, as these two hashtags exactly correspond to climate change and global warming, respectively, the two competing definitions of climate issues. We did not follow [79] to include #AGW (anthropogenic global warming) as query hashtags in our research because we think that this refers to global warming in a defined category so cannot be regarded in parallel with the two considered hashtags. We limited the scope of the search to English-language tweets generated between 1 January 2009 and 31 December 2018. We only collected tweets containing either of the two hashtags in the body of the tweets rather than those containing these hashtags in the retweeted or quoted text, as we think that retweeted text or quoted texts cannot directly represent the tweeter's usage pattern of the two terminologies. as these two hashtags exactly correspond to climate change and global warming, respectively, the two competing definitions of climate issues. We did not follow [79] to include #AGW (anthropogenic global warming) as query hashtags in our research because we think that this refers to global warming in a defined category so cannot be regarded in parallel with the two considered hashtags. We limited the scope of the search to English-language tweets generated between 1 January 2009 and 31 December 2018. We only collected tweets containing either of the two hashtags in the body of the tweets rather than those containing these hashtags in the retweeted or quoted text, as we think that retweeted text or quoted texts cannot directly represent the tweeter's usage pattern of the two terminologies.", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed10.pdf" + }, + { + "text": "4.3. Temporal Analysis of the Associations in the Two Discourses\nAs the climate change and global warming discourses evolved over the past years, their relative statuses in public discourse also changed. Although from 2009 to 2018, increasing numbers of people started to use Twitter, resulting in an overall rise in the number of tweets and hashtags, the ratio of #climatechange frequency and #globalwarming frequency still indicated the public's change in frame preference. Figure 1a displays that in 2009, the number of tweets with #climatechange was 2.69 times that of the tweets with #globalwarming, whereas the ratio significantly since 2013 and reached 13.02 in 2018. The climate change network showed a stronger ability to incorporate diverse hashtags into discussions, according to Figure 1b. In 2009, the hashtags that co-occurred with #climatechange were 2.44 times those that co-occurred with #globalwarming, and the ratio climbed to 6.36 in 2018. As the climate change and global warming discourses evolved over the past years, their relative statuses in public discourse also changed. Although from 2009 to 2018, increasing numbers of people started to use Twitter, resulting in an overall rise in the number of tweets and hashtags, the ratio of #climatechange frequency and #globalwarming frequency still indicated the public's change in frame preference. Figure 1a displays that in 2009, the number of tweets with #climatechange was 2.69 times that of the tweets with #globalwarming, whereas the ratio significantly since 2013 and reached 13.02 in 2018. The climate change network showed a stronger ability to incorporate diverse hashtags into discussions, according to Figure 1b. In 2009, the hashtags that co-occurred with #climatechange were 2.44 times those that co-occurred with #globalwarming, and the ratio climbed to 6.36 in 2018. As the climate change and global warming discourses evolved over the past years, their relative statuses in public discourse also changed. Although from 2009 to 2018, increasing numbers of people started to use Twitter, resulting in an overall rise in the number of tweets and hashtags, the ratio of #climatechange frequency and #globalwarming frequency still indicated the public's change in frame preference. Figure 1a displays that in 2009, the number of tweets with #climatechange was 2.69 times that", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed10.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed10.pdf", + "query": "Is the #climateaction hashtag more bound the #globalwarming of #climatechange ?", + "target_page": 7, + "target_passage": "In the #climatechange network, “climateaction” was ranked third place and “sustainability” was ranked fourth place, whereas they were ranked significantly lower, 17th and 22nd, respectxively, in the #globalwarming network", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "3.2. Data\nIn this research, we were interested in tweets containing either #climatechange or #globalwarming, as these two hashtags exactly correspond to climate change and global warming, respectively, the two competing definitions of climate issues. We did not follow [79] to include #AGW (anthropogenic global warming) as query hashtags in our research because we think that this refers to global warming in a defined category so cannot be regarded in parallel with the two considered hashtags. We limited the scope of the search to English-language tweets generated between 1 January 2009 and 31 December 2018. We only collected tweets containing either of the two hashtags in the body of the tweets rather than those containing these hashtags in the retweeted or quoted text, as we think that retweeted text or quoted texts cannot directly represent the tweeter's usage pattern of the two terminologies. as these two hashtags exactly correspond to climate change and global warming, respectively, the two competing definitions of climate issues. We did not follow [79] to include #AGW (anthropogenic global warming) as query hashtags in our research because we think that this refers to global warming in a defined category so cannot be regarded in parallel with the two considered hashtags. We limited the scope of the search to English-language tweets generated between 1 January 2009 and 31 December 2018. We only collected tweets containing either of the two hashtags in the body of the tweets rather than those containing these hashtags in the retweeted or quoted text, as we think that retweeted text or quoted texts cannot directly represent the tweeter's usage pattern of the two terminologies.", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed10.pdf" + }, + { + "text": "4.3. Temporal Analysis of the Associations in the Two Discourses\nof the tweets with #globalwarming, whereas the ratio significantly since 2013 and reached 13.02 in 2018. The climate change network showed a stronger ability to incorporate diverse hashtags into discussions, according to Figure 1b. In 2009, the hashtags that co-occurred with #climatechange were 2.44 times those that co-occurred with #globalwarming, and the ratio climbed to 6.36 in 2018.", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed10.pdf" + }, + { + "text": "4.1. General Descriptions\nAssociation networks surrounding #climatechange and #globalwarming showed di GLYPH<11> erent properties. The climate change discourse included 38,821 hashtags, whereas the global warming discourse only contained 8788 hashtags. Table 1 displays the 50 most significant hashtags in the two discourses based on centrality. As some hashtags were used in the form of an abbreviation or phrase, explanations are provided in the table. Two networks shared 32 out of the 50 most significant words. Hashtags 'canada', 'cdnpoli', 'sdgs', 'biodiversity', 'education', 'environmental', 'cop24', 'sustainable', 'auspol', 'food', 'agriculture', 'cleanenergy', 'renewableenergy', 'renewables', 'emissions', 'coal', 'fossilfuels', and 'cop21' only showed up on the top 50 list of the 'climate change' network. Hashtags 'tcot', 'california', 'p2', 'nyc', 'snow', 'agw', 'summer', 'global', 'winter', 'india', 'planet', 'heatwave', 'hoax', 'nasa', 'algore', 'world', 'oil', and 'eco' were unique on the top 50 list of the global warming network. The two lists only shared three out of the top five hashtags. In the #climatechange network, 'climateaction' was ranked third place and 'sustainability' was ranked fourth place, whereas they were ranked significantly lower, 17th and 22nd, respectxively, in the #globalwarming network. In the #globalwarming network, 'earth' and 'weather' were among the top five nodes, whereas they were ranked 14th and 24th in the #climatechange network, respectively.\nTable 1. The top 50 central hashtags on Twitter surrounding #climatechange and #globalwarming from 2009 to 2018. The hashtag with * is explained in Appendix A in ascending alphabetical order.", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed10.pdf" + }, + { + "text": "#Climatechange vs. #Globalwarming: Characterizing Two Competing Climate Discourses on Twitter with Semantic Network and Temporal Analyses\nAbstract: Distinct perceptions of the global climate is one of the factors preventing society from achieving consensus or taking collaborative actions on this issue. The public has not even reached an agreement on the naming of the global concern, showing preference for either 'climate change' or 'global warming', and few previous studies have addressed these two competing discourses resulting from distinct climate concerns by di GLYPH<11> erently linking numerous climate concepts. Based on the 6,662,478 tweets containing #climatechange or #globalwarming generated between 1 January 2009 and 31 December 2018, we constructed the semantic networks of the two discourses and examined their evolution over the decade. The findings indicate that climate change demonstrated a more scientific perspective and showed an attempt to condense climate discussions rather than di GLYPH<11> use the topic by frequently addressing sub-topics simultaneously. Global warming triggered more political responses and showed a greater connection with phenomena. Temporal analysis suggests that traditional political discussions were gradually fading in both discourses but more recently started to revive in the form of discourse alliance in the climate change discourse. The associations between global warming and weather abnormalitiessuddenly strengthened around 2012. Climate change is becoming more dominant than global warming in public discussions. Although two discourses have shown more similarities in the rank order of important climate concepts, apparent disagreements continue about how these concepts are associated. These findings lay the groundwork for researchers and communicators to narrow the discrepancy between diverse climate perceptions.\nKeywords: climate change; global warming; semantic network analysis; temporal analysis; public discourse; Twitter", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed10.pdf" + }, + { + "text": "4.3. Temporal Analysis of the Associations in the Two Discourses\nTable 2. Hashtags that remained on the top 50 list for the climate change or the global warming discourse from 2009 to 2018.\n#climatechange #globalwarming, Unique = china, solar, water, food, economy, coal, sustainability pollution, earth. #climatechange #globalwarming, Shared = co2, news, carbon, green, climate, us, energy, science, environment", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed10.pdf" + }, + { + "text": "5.1.3. Discourse Structure\nIn the discourse surrounding #climatechange, 'environment', 'energy', and 'global action' represented the themes of the three largest clusters in the network. However, three popularly recurring hashtags, '#environment', '#energy', and '#climateaction', did not belong to any of the three clusters above, but formed another small tight cluster together, sitting in the most central part of the semantic network, as shown in Figure 2b. As each of the three hashtags can almost represent one sub-theme of the climate change topic and these three hashtags were tightly bundled might indicate an attempt by #climatechange users to address all three communities together [91], consolidating climate change as a topic rather than a loosely organized topic. Previous communication studies also confirmed hashtags' function of serving as a hybrid forum [68], where heterogeneous individuals coordinate to solve\nInt. J. Environ. Res. Public Health 2020 , 17 , 1062\n14 of 22\nproblems at various levels of di GLYPH<11> erent domains [92]. No similar mechanism was observed in the global warming discourse, suggesting that global warming was less evocative of diverse adjacent sub-themes.", + "page_start": 12, + "page_end": 13, + "source_file": "pubmed10.pdf" + }, + { + "text": "4.1. General Descriptions\nTable 1. The top 50 central hashtags on Twitter surrounding #climatechange and #globalwarming from 2009 to 2018. The hashtag with * is explained in Appendix A in ascending alphabetical order.\n1, #Climatechange.Hashtag = climate. 1, #Climatechange.Centrality = 0.466. 1, #Globalwarming.Hashtag = climate. 1, #Globalwarming.Centrality = 0.530. 2, #Climatechange.Hashtag = environment. 2, #Climatechange.Centrality = 0.465. 2, #Globalwarming.Hashtag = environment. 2, #Globalwarming.Centrality = 0.446. 3, #Climatechange.Hashtag = climateaction. 3, #Climatechange.Centrality = 0.391. 3, #Globalwarming.Hashtag = science. 3, #Globalwarming.Centrality = 0.319. 4, #Climatechange.Hashtag = sustainability. 4, #Climatechange.Centrality = 0.316. 4, #Globalwarming.Hashtag = earth. 4, #Globalwarming.Centrality = 0.296. 5, #Climatechange.Hashtag = science. 5, #Climatechange.Centrality = 0.314. 5, #Globalwarming.Hashtag = weather. 5, #Globalwarming.Centrality = 0.280. 6, #Climatechange.Hashtag = energy. 6, #Climatechange.Centrality = 0.283. 6, #Globalwarming.Hashtag = us *. 6, #Globalwarming.Centrality = 0.280. 7, #Climatechange.Hashtag = trump. 7, #Climatechange.Centrality = 0.257. 7, #Globalwarming.Hashtag = trump. 7, #Globalwarming.Centrality = 0.263. 8, #Climatechange.Hashtag = us *. 8, #Climatechange.Centrality = 0.247. 8, #Globalwarming.Hashtag = pollution. 8, #Globalwarming.Centrality = 0.256. 9, #Climatechange.Hashtag = cop21 *. 9, #Climatechange.Centrality = 0.232. 9, #Globalwarming.Hashtag =", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed10.pdf" + }, + { + "text": "4.1. General Descriptions\nTable 1. The top 50 central hashtags on Twitter surrounding #climatechange and #globalwarming from 2009 to 2018. The hashtag with * is explained in Appendix A in ascending alphabetical order.\nco2. 9, #Globalwarming.Centrality = 0.244. 10, #Climatechange.Hashtag = parisagreement *. 10, #Climatechange.Centrality = 0.232. 10, #Globalwarming.Hashtag = green. 10, #Globalwarming.Centrality = 0.239. 11, #Climatechange.Hashtag = actonclimate *. 11, #Climatechange.Centrality = 0.225. 11, #Globalwarming.Hashtag = tcot *. 11, #Globalwarming.Centrality = 0.229. 12, #Climatechange.Hashtag = water. 12, #Climatechange.Centrality = 0.221. 12, #Globalwarming.Hashtag = nature. 12, #Globalwarming.Centrality = 0.213. 13, #Climatechange.Hashtag = pollution. 13, #Climatechange.Centrality = 0.210. 13, #Globalwarming.Hashtag = news. 13, #Globalwarming.Centrality = 0.198. 14, #Climatechange.Hashtag = earth. 14, #Climatechange.Centrality = 0.207. 14, #Globalwarming.Hashtag = energy. 14, #Globalwarming.Centrality = 0.192. 15, #Climatechange.Hashtag = green. 15, #Climatechange.Centrality = 0.200. 15, #Globalwarming.Hashtag = climatechangeisreal. 15, #Globalwarming.Centrality = 0.187. 16, #Climatechange.Hashtag = climatechangeisreal. 16, #Climatechange.Centrality = 0.195. 16, #Globalwarming.Hashtag = obama. 16, #Globalwarming.Centrality = 0.181. 17, #Climatechange.Hashtag = renewableenergy *. 17, #Climatechange.Centrality = 0.194. 17, #Globalwarming.Hashtag = climateaction. 17, #Globalwarming.Centrality = 0.175. 18, #Climatechange.Hashtag =", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed10.pdf" + }, + { + "text": "4.1. General Descriptions\nTable 1. The top 50 central hashtags on Twitter surrounding #climatechange and #globalwarming from 2009 to 2018. The hashtag with * is explained in Appendix A in ascending alphabetical order.\nhealth. 18, #Climatechange.Centrality = 0.193. 18, #Globalwarming.Hashtag = algore *. 18, #Globalwarming.Centrality = 0.174. 19, #Climatechange.Hashtag = nature. 19, #Climatechange.Centrality = 0.187. 19, #Globalwarming.Hashtag = water. 19, #Globalwarming.Centrality = 0.171. 20, #Climatechange.Hashtag = renewables. 20, #Climatechange.Centrality = 0.186. 20, #Globalwarming.Hashtag = agw *. 20, #Globalwarming.Centrality = 0.164. 21, #Climatechange.Hashtag = cleanenergy. 21, #Climatechange.Centrality = 0.176. 21, #Globalwarming.Hashtag = carbon. 21, #Globalwarming.Centrality = 0.164. 22, #Climatechange.Hashtag = carbon. 22, #Climatechange.Centrality = 0.175. 22, #Globalwarming.Hashtag = sustainability. 22, #Globalwarming.Centrality = 0.163", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed10.pdf" + }, + { + "text": "4.3. Temporal Analysis of the Associations in the Two Discourses\nhashtags in the global warming discourse was significantly higher than that in the climate change discourse according to the comparison between Figure 5a,b. From 2009 to 2018, the number of associations with political hashtags (blue nodes) faded, as shown in Figure 4, and its importance in the semantic network gradually decreased, as shown in Figure 5, except for variation in 2014. The yellow nodes describe the hesitation about climate facts and actions, where words describing global efforts, such as 'ipcc', 'cop15', and 'un', and words questioning global warming, such as 'hoax' and 'fraud', were both included. The associations between the yellow nodes were most salient in 2010 and 2011 but were less dominant in the following years. The green nodes occupied 50.7% of all the nodes representing talk about the scientific hashtags of climate issue, including words such as 'ecology', 'ocean', and 'cleanenergy'. Associations between scientific hashtags (green nodes) exploded and the centrality sum of this cluster also showed an obvious rising trend in dominating the theme of the global warming discourse, according to Figure 5. then the associations suddenly strengthened in 2012 when numerous hashtags about phenomena were included in the discourse. Notably, the red node in the top right-hand corner named '2012' refers to the Maya prediction that the year 2012 would be the end of the world and that the world would be destroyed by extreme natural events, and was linked to other climate hashtags for the first time in the graph exactly in 2012. The blue nodes included the political hashtags, such as 'maga', 'ows', 'p2', 'tcot', and 'obama'. The involvement of political hashtags in the global warming discourse was significantly higher than that in the climate change discourse according to the comparison between Figure 5a,b. From 2009 to 2018, the number of associations with political hashtags (blue nodes) faded, as shown in Figure 4, and its importance in the semantic network gradually decreased, as shown in Figure 5, except for variation in 2014. The yellow nodes describe the hesitation about climate facts and actions, where words describing global efforts, such as 'ipcc', 'cop15', and 'un', and words questioning global warming, such as 'hoax' and 'fraud', were both included. The associations between", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed10.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed10.pdf", + "query": "What are two main reasons for one's low climate concern ?", + "target_page": 13, + "target_passage": "As invisible causes and disbelief in actions have long been regarded as two key reasons for low climate concern", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "- What are the key issues with regard to - What are the key issues with regard to environment protection, and living in environment protection, and living in harmony with nature? harmony with nature? -\nAndo : Environmental issues are also : Environmental issues are also important. This is a global issue. People important. This is a global issue. People living around the world should link hands living around the world should link hands and find new ways of safeguarding the and find new ways of safeguarding the environment. We need to secure stable environment. We need to secure stable supplies of energy while protecting the supplies of energy while protecting the environment. With resources, energy and environment. With resources, energy and food supplies dwindling around the world, food supplies dwindling around the world, Japan could fill quite a lot of the gaps Japan could fill quite a lot of the gaps through its world-class energy-saving t h rough its world-class energy-saving technologies, from air-conditioning to technologies, from air-conditioning to refrigeration. I think people are going to refrigeration. I think people are going to be looking to Japan for such technologies. be looking to Japan for such technologies. Kunibe : I believe that energy is the most : I believe that energy is the most important thing governing a country i mportant thing governing a country's s competitiveness and industrial strength. competitiveness and industrial strength. Certainly, the tim Certainly, the timeframe is an issue. We f ra me is an issue. We must not engage in short-termism, nor be must not engage in short-termism, nor be self-serving, but should devise energy self-serving, but should devise energy strategies for the future needs of society strategies for the future needs of society", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "5.1.1. Phenomenon vs. Mechanism of Action 5.1.1. Phenomenon vs. Mechanism of Action 5.1.1. Phenomenon vs. Mechanism of Action\nEven when climate change and global warming shared concern about similar topics such as the cause of the climate issue, global warming tended to focus on carbon emission phenomena, whereas climate change preferred a more in-depth perspective, highlighting the importance of global action to mitigate the climate issue in its second-largest cluster, with energy structure as the contributor to carbon emissions in its third largest cluster. As invisible causes and disbelief in actions have long been regarded as two key reasons for low climate concern [90], the two terminologies' di GLYPH<11> erences in connotations suggest that introducing these absent sub-topics into global warming discourse or highlighting climate change for its inherent connotations may help communicators raise public concern about climate.", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed10.pdf" + }, + { + "text": "1. Introduction\nThe public's distinct understanding of the cause and e GLYPH<11> ect of the global climate issue is an obstacle to joint mitigation actions. In addition to a diversity of views co-existing in the public discourse [1,2], previous studies noticed that the public had even failed to reach an agreement on whether 'climate change' or 'global warming' is the most appropriate definition of the global climate concern [3-5]. According to the definition provided by [6], global warming describes global climate issues as a continuous increase in the average temperature of Earth's surface due to anthropogenic emissions of greenhouse gases, whereas climate change includes not only temperature rise but also a range of\nInt. J. Environ. Res. Public Health 2020 , 17 , 1062; doi:10.3390 / ijerph17031062\nwww.mdpi.com / journal / ijerph\n/gid00001\nInt. J. Environ. Res. Public Health 2020 , 17 , 1062\n2 of 22\ncomplex changes in the state of the climate [7], which may be caused by natural process, external forces, or human interventions [8]. By randomly assigning respondents to climate change or global warming questionnaires, scholars confirmed that the di GLYPH<11> erent connotations contained in the two definitions are likely to evoke distinct interpretations of the causes and impacts of the global climate issue [9], which may inhibit collaboration and joint e GLYPH<11> orts to mitigate the global challenge.\nPublic preference between climate change and global warming is even more apparent when considering the ideology spectrum [10]. Some scholars concluded that conservatives, who are less concerned with environmental issues, tended to use global warming as a narrative strategy because global warming has a more direct connection with temperature rise, making it easier to find contradictory cues such as freezing weather or heavy snowstorms to deny global climate change facts [11]. The associations between global warming and human activities may contribute to more controversies as well [12], connecting global warming more with the 'hoax' frame [5] and evoking greater negative sentiment [13].", + "page_start": 0, + "page_end": 1, + "source_file": "pubmed10.pdf" + }, + { + "text": "(a) Climate-change impacts at 2 ° Cglobalwarming\nFour countries show ensemble-mean HCVI values at 2°C global warming that are higher than any seen in the baseline climate; these are Oman, Bangladesh, Mauritania and Yemen. The implication of such HCVI values is that climate change at 2°C is projected to cause levels of vulnerability to food insecurity that are greater than any seen in the present day. For individual ensemble members, the number of countries with 'unprecedented' HCVI values at 2°C varies from three to seven. Conversely, many countries in the baseline climate have levels of vulnerability to food insecurity that are greater than those expected in other countries under 2°C global warming. This suggests that other factors are already posing greater risk for food insecurity than 2°C climate change is expected to cause in other countries, so the increased risk from climate change should not overshadow the need to reduce vulnerability to food insecurity arising from non-climatic factors. There is scope to reduce vulnerability to food insecurity by addressing various socio-economic issues in such counties.\nThe JULES simulations show a general tendency towards increased run-off over approximately half of the land surface (figure 9) and the majority of the major river basins assessed (figure 10), but with large regional uncertainties including the possibility of decreased flows in many basins. The ensemble-mean change in mean streamflow shows an increase of between 5 and 25% over most of the Northern Hemisphere land surface, with some regions seeing an increase of over 50% at 2°C global warming. Notable exceptions to this are western Europe and southcentral USA, which see less than a 5% change in run-off, and the already very dry region of the Sahara Desert where the existing very small run-off become even smaller.\nEnsemble-mean projected changes in low run-off flows are generally larger (figure 11), with the regions seeing an increase in mean run-off seeing a larger percentage increase in low run-off-over 75% increases over much of North America, Eastern Europe and Asia. Note that this does not necessarily imply a larger increase in absolute low flow compared to absolute mean flow, because the baseline is (by definition) smaller for low flows. In western Europe, where the changes in mean flows were less than 5%, the ensemble-mean low flow decreases by between 5\nGFDL-ESM2M\n14", + "page_start": 13, + "page_end": 13, + "source_file": "pubmed11.pdf" + }, + { + "text": "4. Discussion\nrsta.r o y alsociet ypublishing . or g P h i l .T r a n s .R . S o c .A 376 : 2 0160452 ........................................................\nA detailed investigation of these factors is beyond the scope of this paper; nevertheless, this result illustrates the important point that the nature and patterns of the climate forcing at a particular level of global warming can play an important role in determining the patterns of regional impacts.", + "page_start": 23, + "page_end": 24, + "source_file": "pubmed11.pdf" + }, + { + "text": "5.3. Discrepancy between the Two Discourses\nTo be specific, although 'ipcc', 'cop', and 'un' were mentioned in both discourses (yellow in Figures 3 and 4) in earlier years, the clusters to which they belonged had significantly di GLYPH<11> erent meanings. As mentioned in the results section, these hashtags were associated with a series of scientific hashtags in the climate change discourse, appealing to global e GLYPH<11> orts. In the global warming discourse, they were clustered with 'hoax' and 'frame', showing lack of belief in climate issue facts and hesitation about global e GLYPH<11> orts. More recently, when discussions about temperature, politics, and hesitation significantly shrank in the global warming discourse, the wo discourses showed more similarities about the importance of scientific concepts according to Figure 5a,b. However, links between global e GLYPH<11> orts and scientific facts were not constructed in the global warming discourse. According to a network model for cognition, the lack of associations means fewer psychological activations will spread to\nInt. J. Environ. Res. Public Health 2020 , 17 , 1062\n16 of 22\nmake global action salient for people talking about global warming than people talking about climate change [40], even though the facts of climate issues are highly recognized in both discourses.", + "page_start": 14, + "page_end": 15, + "source_file": "pubmed10.pdf" + }, + { + "text": "5. Conclusion\nFunding. This research received funding from the European Union Seventh Framework Programme FP7/20072013 under grant agreement no. 603864 (HELIX: 'High-End cLimate Impacts and eXtremes'; www. helixclimate.eu). The work of R.A.B., C.B., J.C., L.G., K.L. and K.R. was additionally supported by the Joint UK BEIS/Defra Met Office Hadley Centre Climate Programme (GA01101).\nAcknowledgements. The authors thank Ed Pope, Jason Lowe and Dann Mitchell for advice and discussion, Alissa Haward and Maria Pearce for project management and administration of HELIX, and two anonymous reviewers whose comments substantially improved the paper.", + "page_start": 24, + "page_end": 24, + "source_file": "pubmed11.pdf" + }, + { + "text": "Limitation and Future Directions\nconducted to reveal the interactions between public discourse and natural, scientific, social, or political events. In particular, factors promoting public consensus and factors resulting in discourse discrepancy should be further identified to help climate communicators narrow the public cognitive divergence about the global climate issue.\nSupplementary Materials: The following are available online at http: // www.mdpi.com / 1660-4601 / 17 / 3 / 1062 / s1.\nAuthor Contributions: W.S. designed the study, collected the data, conducted the analysis, and wrote the article. H.F. o GLYPH<11> ered suggestions to the part of temporal analysis. P.W. contributed to the hashtag co-occurrence part. C.C. helped with the design of the study. J.X. contributed to the framing of the article and helped with the revision. All authors have read and agreed to the published version of the manuscript.\nFunding: This work was supported in part by the National Key R&D Program of China (Grant No. 2017YFA0604500), by the National Natural Science Foundation of China (Grant No. 51761135015, 71772142 and U1839206), by the National Social Science Foundation of China (Grant No.18ZDA307), by the Center for High Performance Computing and System Simulation, and by the Pilot National Laboratory for Marine Science and Technology (Qingdao).\nConflicts of Interest: The authors declare no conflict of interest.", + "page_start": 16, + "page_end": 16, + "source_file": "pubmed10.pdf" + }, + { + "text": "(b) Impacts at 1.5 ° Cglobalwarmingcomparedto2 ° C\nFigure 13. Global mean percentage changes relative to 1981-2010 in ( a ) precipitation over land, ( b )meanrun-o/ff/flows,( c )low run-o/ff lows (10th percentile), at 2 ° Cand1.5 ° C global warming.\nthis comparison of the number of 'unprecedented' HCVI values at 1.5°C and 2°C should be treated with caution. Nevertheless, the finding that some countries see HCVI values higher at either or both 1.5°C and 2°C compared to the baseline may indicate that climate change has the potential to lead to unprecedented levels of vulnerability to food insecurity in some countries. More robustly, it can be concluded that by this metric, overall worldwide vulnerability to food insecurity generally increases with global warming, and for approximately three-quarters of countries assessed, this increase is larger at 2°C than 1.5°C.\nIn the ensemble mean, changes in mean, low and high flows are generally larger at 2°C global warming compared to 1.5°C (figure 20). This is often the case for both increases and decreases in flows-increasing the level of global warming magnifies the pattern of river flow changes, although not in all cases.\nThe range of projected mean run-off changes is larger for 2°C than 1.5°C in many basins, but this was not always the case, with many basins showing similar or smaller ranges at 2°C compared with 1.5°. Moreover, the ranges overlap substantially, so in terms of the set of\n19\nrsta.r o y alsociet ypublishing . or g P h i l .T r a n s .R . S o c .A 376 : 2 0160452 ........................................................\nensemble mean\nIPSL-CM5A-LR\nGFDL-ESM2M\nHadGEM2-ES\nIPSL-CM5A-MR\nMIROC-ESM-CHEM\nACCESS1-0", + "page_start": 18, + "page_end": 19, + "source_file": "pubmed11.pdf" + }, + { + "text": "(b) Impacts at 1.5 ° Cglobalwarmingcomparedto2 ° C\nOf the 122 countries assessed, 93 have smaller ensemble-mean HCVI calculated at 1.5°C global warming than at 2°C, indicating an ensemble consensus that 76% of assessed countries would see a smaller increase in vulnerability to food insecurity if global warming were limited to 1.5°C (figures 18 and 19). Conversely, 24% of countries would, by this metric, see the same or higher vulnerability to food insecurity at 1.5°C than 2°C. Of these, some are countries where HCVI is projected to be lower at 2°C global warming than in the baseline. For example, in Mali the ensemble-mean baseline HCVI of 0.83 increased slightly to 0.85 at 1.5°C then reduced to 0.81 at 2°C. In some countries, the ensemble-mean HCVI happened to be identical at both warming levels. In Chad, for example, the baseline HCVI of 0.89 increased to 0.91 at both 1.5°C and 2°C.\nAs noted above, four countries saw ensemble-mean HCVI values at 2°C above any seen in the baseline, and this number increased to seven at 1.5°C. The same four countries with 'unprecedented' HCVI values at 2°C also saw 'unprecedented' values at 1.5°C; these were Oman, Bangladesh, Mauritania and Yemen. These were joined by Myanmar, India and Cambodia as having 'unprecedented' values at 1.5°C. The role of internal climate variability in the HCVI results needs to be assessed, as does the effect of potential nonlinear interactions between the flood and drought metric. Until the reasons behind these country-specific results are understood,\n18\nrsta.r o y alsociet ypublishing . or g P h i l .T r a n s .R . S o c .A 376 : 2 0160452 ........................................................", + "page_start": 17, + "page_end": 17, + "source_file": "pubmed11.pdf" + } + ] + }, + { + "references": { + "source_file": "infographic3.pdf", + "query": "How many scholarly articles are published every year ?", + "target_page": 1, + "target_passage": "over 3 million scholarly articles published per year", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "For example (unaudited):\n· Wikipedia and the other projects operated by the Foundation receive more than 19.4 billion pageviews per month, making them one of the most popular Web properties worldwide. Wikipedia is available in more than 332 languages and contains more than 63 million articles contributed by a global volunteer community.\n· For the year ended June 30, 2024, the educational content of the Foundation's largest project, Wikipedia, grew by approximately 1.9 million articles to approximately 63.4 million articles.\n· For the year ended June 30, 2024, volunteers added approximately 12.2 million images, movies, and sound files to the Foundation's multimedia repository, making the total 106.7 million files.\n· Volunteers also contribute in several ways to the Foundation's wiki software: volunteer software developers add new functionality to the code base, and volunteer language specialists add to the code base by translating the wiki interface into different languages. During the year ended June 30, 2024, there were 47,773 commits merged, through the efforts of approximately 511 authors/contributors, of which 8,161 commits were through the efforts of approximately 244 volunteers.", + "page_start": 17, + "page_end": 17, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "DIRECT ORS' AND 37 Rem un er ati on d e k ey e x ecutives . BO ARD OF DIRECT 41 Dir ectors' bi ogr aphi GR OUP INTERESTS 42 San tos li cen ce ar ter ests . 10 YEAR Statisti cal summ perf orm an ce .\n.\nes\non activiti\n44\nd ew e\n.", + "page_start": 1, + "page_end": 1, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "Five-Year Summary (1)\nIn thousands (except per share data)", + "page_start": 95, + "page_end": 95, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "Ten Year Summary\n36,197 16,397 146,626 556, 04 = 5. 74,285 ( 5 5,74 3) (4,065), 2007 = 52,044 (64,908). 74,285 ( 5 5,74 3) (4,065), 2006 = 72,782 ( 4 7, 7 6 1). 74,285 ( 5 5,74 3) (4,065), 2005 = ( 4 7, 3 6 6 ). 74,285 ( 5 5,74 3) (4,065), 2004 = 84,410 (34,343). 74,285 ( 5 5,74 3) (4,065), 12 = . 74,285 ( 5 5,74 3) (4,065), 11 = . 74,285 ( 5 5,74 3) (4,065), 10 = . 74,285 ( 5 5,74 3) (4,065), 09 08 = . 74,285 ( 5 5,74 3) (4,065), 06 05 = . 74,285 ( 5 5,74 3) (4,065), 04 = . , 2007 = (2,264). , 2006 = ( 1,158). , 2005 = (1,404). , 2004 = (1,019). , 12 = . , 11 = . , 10 = . , 09 08 = . , 06 05 = . , 04 = . 46,653, 2007 = 10,413 (4,715). 46,653, 2006 = 1,361 25,224. 46,653, 2005 = 2,471", + "page_start": 8, + "page_end": 8, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "PUBLICATIONS\nThe Annual Report is the main source of information for shareholders.", + "page_start": 67, + "page_end": 67, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "ANNUAL REPORT 2004", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/351037551", + "page_start": 0, + "page_end": 0, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "Ten Year Summary\n- 181,013 824 457 18,657 - 92,680 51.7 -, 2007 = (15,705) 224,986 21,220 19,532 40,752 184,234 - 184,234 417 440 524 (19,888) 4,513 92,680 ( 17. 3 ) -. 47,872 203,249 1,599 20,637 22,236 181,013 - 181,013 824 457 18,657 - 92,680 51.7 -, 2006 = - 16,662 164,597 - 36,589 36,589 128,008 - 128,008 206 247 21,889 8,669 88,592 19.3 10.0. 47,872 203,249 1,599 20,637 22,236 181,013 - 181,013 824 457 18,657 - 92,680 51.7 -, 2005 = 136,008 - 14,779 14,779 121,229 - 121,229 401 212 262 22,184 11,973 85,949 9.8 7. 0. 47,872 203,249 1,599 20,637 22,236 181,013 - 181,013 824 457 18,657 - 92,680 51.7 -, 2004 = 143,413 - 8,367 8,367 135,046 - 135,046 385 135 189 49,294 17,6 31 85,329 45.5 22.0. 47,872 203,249 1,599 20,637 22,236 181,013 - 181,013 824 457 18,657 - 92,680 51.7 -, 12 = . 47,872 203,249 1,599 20,637 22,236 181,013 - 181,013 824 457 18,657 - 92,680 51.7 -, 11 = . 47,872 203,249 1,599 20,637 22,236 181,013 - 181,013 824 457 18,657 - 92,680 51.7 -, 10 = . 47,872 203,249 1,599 20,637 22,236 181,013", + "page_start": 8, + "page_end": 8, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Researchers are mobile!\nFor example,\n30% OF THE SCIENTISTS WHO GOT THEIR PhD IN THE UNITED KINGDOM NOW LIVE ELSEWHERE\nSource: Science Magazine\nResearch institutions and organizations therefore find it hard to\nBenchmark their organization against others\nIdentify, track, and report on researchers' a/ffiliations and contributions (publications, peer reviews, grants, and more)", + "page_start": 0, + "page_end": 0, + "source_file": "infographic3.pdf" + }, + { + "text": "ACKNOWLEDGMENTS\nThis paper represents the work of seven authors, but some were required by their employer to remove their names. The remaining listed authors are extremely grateful to our colleagues for the effort and wisdom they contributed to this paper.\nIn addition, in drafting and revising this paper, we benefited from thoughtful comments and discussion from many people: Alex Hanna, Amandalynne Paullada, Ben Hutchinson, Ben Packer, Brendan O'Connor, Dan Jurafsky, Ehud Reiter, Emma Strubell, Emily Denton, Gina-Anne Levow, Iason Gabriel, Jack Clark, Kristen Howell, Lucy Vasserman, Maarten Sap, Mark Díaz, Miles Brundage, Nick Doiron, Rob Munro, Roel Dobbe, Samy Bengio, Suchin Gururangan, Vinodkumar Prabhakaran, William Agnew, William Isaac, and Yejin Choi and our anonymous reviewers.\n623", + "page_start": 13, + "page_end": 13, + "source_file": "arxiv5_ccby4license.pdf" + } + ] + }, + { + "references": { + "source_file": "infographic3.pdf", + "query": "For what reason a researcher's name is not a good tools to track back its works and affiliations ?", + "target_page": 1, + "target_passage": "Many people have the same name Names may change through marriage or other circumstances Individuals use different alphabets, abbreviations, or naming conventions People use different versions of their name during their career", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Researchers are mobile!\nFor example,\n30% OF THE SCIENTISTS WHO GOT THEIR PhD IN THE UNITED KINGDOM NOW LIVE ELSEWHERE\nSource: Science Magazine\nResearch institutions and organizations therefore find it hard to\nBenchmark their organization against others\nIdentify, track, and report on researchers' a/ffiliations and contributions (publications, peer reviews, grants, and more)", + "page_start": 0, + "page_end": 0, + "source_file": "infographic3.pdf" + }, + { + "text": "RESEARCHERS\nImprove recognition and discoverability of their research\nSpend more time doing research, less time managing it\nControl and manage a trusted and easily shareable record of their research activities and a/ffiliations - for free", + "page_start": 0, + "page_end": 0, + "source_file": "infographic3.pdf" + }, + { + "text": "INSTITUTIONS\nSave time and reduce errors with automated information-sharing and cross-system interoperability\nManage your organization name and your researchers' connections with it\nMaintain links with your researchers - past, present, and future", + "page_start": 0, + "page_end": 0, + "source_file": "infographic3.pdf" + }, + { + "text": "4.4 Curation, Documentation & Accountability\nIn summary, LMs trained on large, uncurated, static datasets from the Web encode hegemonic views that are harmful to marginalized populations. We thus emphasize the need to invest significant resources into curating and documenting LM training data. In this, we follow Jo et al. [62], who cite archival history data collection methods as an example of the amount of resources that should be dedicated to this process, and Birhane and Prabhu [18], who call for a more justice-oriented data collection methodology. Birhane and Prabhu note, echoing Ruha Benjamin [15], 'Feeding AI systems on the world's beauty, ugliness, and cruelty, but expecting it to reflect only the beauty is a fantasy.' [p.1541]\nWhen we rely on ever larger datasets we risk incurring documentation debt , 18 i.e. putting ourselves in a situation where the datasets are both undocumented and too large to document post hoc. While documentation allows for potential accountability [13, 52, 86], undocumented training data perpetuates harm without recourse. Without documentation, one cannot try to understand training data characteristics in order to mitigate some of these attested issues or even unknown ones. The solution, we propose, is to budget for\n18 On the notion of documentation debt as applied to code, rather than data, see [154].\ndocumentation as part of the planned costs of dataset creation, and only collect as much data as can be thoroughly documented within that budget.", + "page_start": 5, + "page_end": 5, + "source_file": "arxiv5_ccby4license.pdf" + }, + { + "text": "Tackling Information Overload\nORCID is a non-profit organization, which provides a fully open and interoperable identifier to reliably connect researchers with their research contributions. The ORCID iD is a 16-digit identifier that researchers can register for and use for free.\nConnects individuals and their professional contributions across disciplines, organizations, and time\nEnables recognition of all types of research contributions and innovation\nHelps research institutions, funders, publishers, and other organizations better track and support research work", + "page_start": 0, + "page_end": 0, + "source_file": "infographic3.pdf" + }, + { + "text": "ACKNOWLEDGMENTS\nThis paper represents the work of seven authors, but some were required by their employer to remove their names. The remaining listed authors are extremely grateful to our colleagues for the effort and wisdom they contributed to this paper.\nIn addition, in drafting and revising this paper, we benefited from thoughtful comments and discussion from many people: Alex Hanna, Amandalynne Paullada, Ben Hutchinson, Ben Packer, Brendan O'Connor, Dan Jurafsky, Ehud Reiter, Emma Strubell, Emily Denton, Gina-Anne Levow, Iason Gabriel, Jack Clark, Kristen Howell, Lucy Vasserman, Maarten Sap, Mark Díaz, Miles Brundage, Nick Doiron, Rob Munro, Roel Dobbe, Samy Bengio, Suchin Gururangan, Vinodkumar Prabhakaran, William Agnew, William Isaac, and Yejin Choi and our anonymous reviewers.\n623", + "page_start": 13, + "page_end": 13, + "source_file": "arxiv5_ccby4license.pdf" + }, + { + "text": "Data availability statement\nThe datasets presented in this article are not readily available because of ethical and legal restrictions. Requests to access the datasets should be directed to stine.s.dahl@nord.no.", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed13.pdf" + }, + { + "text": "7 PATHS FORWARD\nAs a part of careful data collection practices, researchers must adopt frameworks such as [13, 52, 86] to describe the uses for which their models are suited and benchmark evaluations for a variety of conditions. This involves providing thorough documentation on the data used in model building, including the motivations underlying data selection and collection processes. This documentation should reflect and indicate researchers' goals, values, and motivations in assembling data and creating a given model. It should also make note of potential users and stakeholders, particularly those that stand to be negatively impacted by model errors or misuse. We note that just because a model might have many different applications doesn't mean that its developers don't need to consider stakeholders. An exploration of stakeholders for likely use cases can still be informative around potential risks, even when there is no way to guarantee that all use cases can be explored.\nWe also advocate for a re-alignment of research goals: Where much effort has been allocated to making models (and their training data) bigger and to achieving ever higher scores on leaderboards often featuring artificial tasks, we believe there is more to be gained by focusing on understanding how machines are achieving the tasks in question and how they will form part of socio-technical systems. To that end, LM development may benefit from guided evaluation exercises such as pre-mortems [68]. Frequently used in business settings before the deployment of new products or projects, pre-mortem analyses center hypothetical failures and ask team members to reverse engineer previously unanticipated causes. 25 Critically, pre-mortem analyses prompt team members to consider not only a range of potential known and unknown project risks, but also alternatives to current project plans. In this way, researchers can consider the risks and limitations of their LMs in a guided way while also considering fixes to current designs or alternative\n25 This would be one way to build a evaluation culture that considers not only averagecase performance (as measured by metrics) and best-case performance (cherry-picked examples), but also worst-case performance.\n618\nFAccT '21, March 3-10, 2021, Virtual Event, Canada\nBender and Gebru, et al.\nmethods of achieving a task-oriented goal in relation to specific pitfalls.", + "page_start": 8, + "page_end": 9, + "source_file": "arxiv5_ccby4license.pdf" + }, + { + "text": "How ORCID Works\nIt's a registry of unique persistent identifiers for researchers\nIt's a hub that connects researchers with their professional activities and contributions\nIt's a global community that enables researchers to share their data with other individuals, organizations, and systems", + "page_start": 0, + "page_end": 0, + "source_file": "infographic3.pdf" + }, + { + "text": "3.7. The privacy problem\n1. Most Open Data have nothing personal to begin with (examples: digital maps, budgets, air pollution measurements....)\n2. The majority of data that are directly related to individuals (e.g. things like names and address of people with specific diseases, or who were victims of some crime) have no reason to be published, nor there is any actual demand for them by Open Data advocates\n3. Exceptions that limit privacy for specific cases and categories of people (e.g. candidates to public offices, Government and Parliament members etc...) already exist in many countries\n4. Very often, in practice, Open Data struggles only happen about when and how to make available in the most effective way for society information that was already recognized as public. What to declare public, hence open, is indeed a serious issue (more on this in the next paragraph) but is a separate one.", + "page_start": 22, + "page_end": 22, + "source_file": "Open_Data_Report.pdf" + } + ] + }, + { + "references": { + "source_file": "infographic3.pdf", + "query": "What is an ORCID iD ?", + "target_page": 1, + "target_passage": "ORCID iD is a 16-digit identifier that researchers can register for and use for free.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Tackling Information Overload\nORCID is a non-profit organization, which provides a fully open and interoperable identifier to reliably connect researchers with their research contributions. The ORCID iD is a 16-digit identifier that researchers can register for and use for free.\nConnects individuals and their professional contributions across disciplines, organizations, and time\nEnables recognition of all types of research contributions and innovation\nHelps research institutions, funders, publishers, and other organizations better track and support research work", + "page_start": 0, + "page_end": 0, + "source_file": "infographic3.pdf" + }, + { + "text": "How ORCID Works\nIt's a registry of unique persistent identifiers for researchers\nIt's a hub that connects researchers with their professional activities and contributions\nIt's a global community that enables researchers to share their data with other individuals, organizations, and systems", + "page_start": 0, + "page_end": 0, + "source_file": "infographic3.pdf" + }, + { + "text": "Why Connect with ORCID?\nHundreds of members and systems use ORCID globally", + "page_start": 0, + "page_end": 0, + "source_file": "infographic3.pdf" + }, + { + "text": "An IDC Infographic, sponsored by ORCID | November 2018", + "page_start": 0, + "page_end": 0, + "source_file": "infographic3.pdf" + }, + { + "text": "5.5 MILLION+\nlive ORCID iDs registered since its 2012 launch\nSource: Orcid.org/statistics as of November 2018\nAll IDC research is ' 2018 by IDC. All rights reserved. All IDC materials are licensed with IDC's permission and in no way does the use or publication of IDC research indicate IDC's endorsement of ORCID's products/or strategies.\nNames may\nchange through\nmarriage or other\ncircumstances", + "page_start": 0, + "page_end": 0, + "source_file": "infographic3.pdf" + }, + { + "text": "Unique identifier\nA unique identifier (UID) is an identifier that is assigned to storage-system logical units when they are created. It is used to identify the logical unit regardless of the logical unit number (LUN), the status of the logical unit, or whether alternative paths exist to the same device. Typically, a UID is used only once.", + "page_start": 808, + "page_end": 808, + "source_file": "sg247938.pdf" + }, + { + "text": "Three Ways to Get Involved\n1. Encourage and support your researchers in getting, sharing, and using their ORCID iD\n2. Invest in integrating ORCID into your systems\n3. Connect data to and from your researchers' ORCID records to support information use and reuse across organizations\nSponsored by ORCID\nTo learn more go to https://orcid.org\nIDC #US44453318", + "page_start": 0, + "page_end": 0, + "source_file": "infographic3.pdf" + }, + { + "text": "6.5.3 SQL macro support\nTable 6-1 Available macros\n$ODUSERID, Description = The user ID that is used to log in to Content Manager OnDemand.. $ODALIAS, Description = The alias that is defined to Content Manager OnDemand for the user's session.. $ODAGNAME, Description = The application group name.. $ODAGID, Description = The application group internal identifier.", + "page_start": 168, + "page_end": 168, + "source_file": "sg246915.pdf" + }, + { + "text": "Application Group Identifier and the Application Group ID\nThe Application Group Identifier and the Application Group ID (AGID) are unique identifiers that are used by Content Manager OnDemand to identify the application group in system tables.", + "page_start": 127, + "page_end": 127, + "source_file": "sg246915.pdf" + }, + { + "text": "Host ID\nA host ID is a numeric identifier that is assigned to a group of host FC ports or internet Small Computer System Interface (iSCSI) host names for LUN mapping. For each host ID, SCSI IDs are mapped to volumes separately. The intent is to have a one-to-one relationship between hosts and host IDs, although this relationship cannot be policed.", + "page_start": 798, + "page_end": 798, + "source_file": "sg247938.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2669.pdf", + "query": "What type of instability causes rims in ruptured polystyrene thin films to decay into small drops ?", + "target_page": 3, + "target_passage": " The rims may further decay into lines of small drops due to a Rayleigh-type instability", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "I. INTRODUCTION\nThe patterns formed in dewetting processes have attracted strong interest since Reiter analysed the process quantitatively in the early nineties. In these experiments, that proved to be a paradigm in our understanding of dewetting, a uniform thin film of polystyrene (tens of nanometers thick) is deposited on a flat silicon oxide substrate is brought above the glass transition temperature. The film ruptures in several places, forming holes which subsequently grow, competing for space. As a result, a random polygonal network of liquid rims emerges. The rims may further decay into lines of small drops due to a Rayleigh-type instability [1-3]. The related problems of retracting contact lines on partially wetting substrates and the opening of single holes in rather thick films have also been studied [4, 5].\nSubsequent work has mainly focused on many different aspects of the dewetting process for simple non-volatile liquids and polymers (for reviews see Refs. [6-8]). All stages of the dewetting of a film are studied: the initial film rupture via nucleation or a surface instability (called spinodal dewetting) [1, 9-13], the growth process of individual holes [14-16], the evolution of the resulting hole pattern [3, 13], and the stability of the individual dewetting fronts [17-19]. We note in passing, that descriptions of dewetting patterns may also be found in historic papers, particularly for the dewetting of a liquid film on a liquid substrate. Tomlinson [20, footnote 18 on p. 40] considered turpentine on water and Marangoni [21, p. 352f] oil on water.", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2669.pdf" + }, + { + "text": "Acknowledgments\nAJA and MJR gratefully acknowledge RCUK and EPSRC, respectively, for financial support. We acknowledge support by the European Union via the FP6 and FP7 Marie Curie schemes [Grants MRTN-CT-2004005728 (PATTERNS) and PITN-GA-2008-214919 (MULTIFLOW)].\n[1] G. Reiter, 'Dewetting of thin polymer films,' Phys. Rev. Lett. 68 , 75-78 (1992).\n[2] G. Reiter, 'Mobility of polymers in films thinner than their unperturbed size,' Europhys. Lett. 23 , 579-584 (1993).\n[3] A. Sharma and G. Reiter, 'Instability of thin polymer films on coated substrates: Rupture, dewetting and drop formation,' J. Colloid Interface Sci. 178 , 383-399 (1996).\n[4] P.-G. de Gennes, 'Wetting: Statics and dynamics,' Rev. Mod. Phys. 57 , 827-863 (1985).\n25", + "page_start": 24, + "page_end": 24, + "source_file": "1001.2669.pdf" + }, + { + "text": "Acknowledgments\nBenard instability,' Phys. Rev. Lett. 88 , 164501 (2002).\n[50] J. Huang, F. Kim, A. R. Tao, S. Connor, and P. Yang, 'Spontaneous formation of nanoparticle stripe patterns through dewetting,' Nat. Mater. 4 , 896-900 (2005).\n[51] S. H. Lee, P. J. Yoo, S. J. Kwon, and H. H. Lee, 'Solvent-driven dewetting and rim instability,' J. Chem. Phys. 121 , 4346-4351 (2004).\n[52] L. Xu, T. F. Shi, P. K. Dutta, and L. An, 'Rim instability by solvent-induced dewetting,' J. Chem. Phys. 127 , 144704 (2007).\n[53] L. Xu, T. F. Shi, and L. J. An, 'The dewetting dynamics of the polymer thin film by solvent annealing,' J. Chem. Phys. 129 , 044904 (2008).\n[54] M. Elbaum and S. G. Lipson, 'How does a thin wetted film dry up?' Phys. Rev. Lett. 72 , 3562-3565 (1994).\n[55] N. Samid-Merzel, S. G. Lipson, and D. S. Tannhauser, 'Pattern formation in drying water films,' Phys. Rev. E 57 , 2906-2913 (1998).\n[56] A. Padmakar, K. Kargupta, and A. Sharma, 'Instability and dewetting of evaporating thin water films on partially and completely wettable substrates,' J. Chem. Phys. 110 , 1735-1744 (1999).\n[57] A. V. Lyushnin, A. A. Golovin, and L. M. Pismen, 'Fingering instability of thin evaporating liquid films,' Phys. Rev. E 65 , 021602 (2002).\n[58] L. M. Pismen, 'Spinodal dewetting in a volatile liquid film,' Phys. Rev. E 70 , 021601 (2004).", + "page_start": 28, + "page_end": 28, + "source_file": "1001.2669.pdf" + }, + { + "text": "Acknowledgments\n[13] J. Becker, G. Grun, R. Seemann, H. Mantz, K. Jacobs, K. R. Mecke, and R. Blossey, 'Complex dewetting scenarios captured by thin-film models,' Nat. Mater. 2 , 59-63 (2003).\n[14] C. Redon, F. Brochard-Wyart, and F. Rondelez, 'Dynamics of dewetting,' Phys. Rev. Lett. 66 , 715718 (1991).\n[15] R. Seemann, S. Herminghaus, and K. Jacobs, 'Shape of a liquid front upon dewetting,' Phys. Rev. Lett. 87 , 196101 (2001).\n[16] R. Fetzer, K. Jacobs, A. Munch, B. Wagner, and T. P. Witelski, 'New slip regimes and the shape of dewetting thin liquid films,' Phys. Rev. Lett. 95 , 127801 (2005).\n[17] F. Brochard-Wyart and C. Redon, 'Dynamics of liquid rim instabilities,' Langmuir 8 , 2324-2329 (1992).\n[18] G. Reiter and A. Sharma, 'Auto-optimization of dewetting rates by rim instabilities in slipping polymer films,' Phys. Rev. Lett. 87 , 166103 (2001).\n[19] A. Munch and B. Wagner, 'Contact-line instability of dewetting thin films,' Physica D 209 , 178-190 (2005).\n26", + "page_start": 25, + "page_end": 25, + "source_file": "1001.2669.pdf" + }, + { + "text": "Acknowledgments\n[97] U. Thiele, M. G. Velarde, K. Neuffer, and Y. Pomeau, 'Film rupture in the diffuse interface model coupled to hydrodynamics,' Phys. Rev. E 64 , 031602 (2001).\n[98] J. Heier, J. Groenewold, F. A. Castro, F. Nueesch, and R. Hany, 'Enlarged bilayer interfaces from liquid-liquid dewetting for photovoltaic applications,' P Soc Photo-Opt Instrum Eng 6999 , J9991J9991 (2008).\n[99] M. D. Haw, M. Gillie, and W. C. K. Poon, 'Effects of phase behavior on the drying of colloidal suspensions,' Langmuir 18 , 1626-1633 (2002).\n[100] L. V. Govor, J. Parisi, G. H. Bauer, and G. Reiter, 'Instability and droplet formation in evaporating thin films of a binary solution,' Phys. Rev. E 71 , 051603 (2005).\n[101] L. V. Govor, G. Reiter, G. H. Bauer, and J. Parisi, 'Self-assembled treelike patterns from an evaporating binary solution,' Phys. Rev. E 74 , 061603 (2006).\n[102] M. Yamamura, T. Nishio, T. Kajiwara, and K. Adachi, 'Evaporation-induced pattern formation in polymer films via secondary phase separation,' Chem. Eng. Sci. 57 , 2901-2905 (2002).\n[103] P. Muller-Buschbaum, E. Bauer, S. Pfister, S. V. Roth, M. Burghammer, C. Riekel, C. David, and U. Thiele, 'Creation of multi-scale stripe-like patterns in thin polymer blend films,' Europhys. Lett. 73 , 35-41 (2006).", + "page_start": 31, + "page_end": 31, + "source_file": "1001.2669.pdf" + }, + { + "text": "Acknowledgments\n[41] I. Vancea, U. Thiele, E. Pauliac-Vaujour, A. Stannard, C. P. Martin, M. O. Blunt, and P. J. Moriarty, 'Front instabilities in evaporatively dewetting nanofluids,' Phys. Rev. E 78 , 041601 (2008).\n[42] U. Thiele, Entnetzung von Kollagenfilmen , Ph.D. thesis, Technische Universitat Dresden (1998).\n[43] H. Yabu and M. Shimomura, 'Preparation of self-organized mesoscale polymer patterns on a solid substrate: Continuous pattern formation from a receding meniscus,' Adv. Funct. Mater. 15 , 575-581 (2005).\n[44] R. D. Deegan, O. Bakajin, T. F. Dupont, G. Huber, S. R. Nagel, and T. A. Witten, 'Capillary flow as the cause of ring stains from dried liquid drops,' Nature 389 , 827-829 (1997).\n[45] E. Adachi, A. S. Dimitrov, and K. Nagayama, 'Stripe patterns formed on a glass-surface during droplet evaporation,' Langmuir 11 , 1057-1060 (1995).\n[46] R. D. Deegan, 'Pattern formation in drying drops,' Phys. Rev. E 61 , 475-485 (2000).\n[47] R. D. Deegan, O. Bakajin, T. F. Dupont, G. Huber, S. R. Nagel, and T. A. Witten, 'Contact line deposits in an evaporating drop,' Phys. Rev. E 62 , 756-765 (2000).\n[48] L. Shmuylovich, A. Q. Shen, and H. A. Stone, 'Surface morphology of drying latex films: Multiple ring formation,' Langmuir 18 , 3441-3445 (2002).\n[49] V. X. Nguyen and K. J. Stebe, 'Patterning of small particles by a surfactant-enhanced Marangoni-\n28", + "page_start": 27, + "page_end": 27, + "source_file": "1001.2669.pdf" + }, + { + "text": "Acknowledgments\n[110] L. Rockford, Y. Liu, P. Mansky, T. P. Russell, M. Yoon, and S. G. J. Mochrie, 'Polymers on nanoperiodic, heterogeneous surfaces,' Phys. Rev. Lett. 82 , 2602-2605 (1999).\n[111] A. Sehgal, V. Ferreiro, J. F. Douglas, E. J. Amis, and A. Karim, 'Pattern-directed dewetting of ultrathin polymer films,' Langmuir 18 , 7041-7048 (2002).\n[112] M. Geoghegan and G. Krausch, 'Wetting at polymer surfaces and interfaces,' Prog. Polym. Sci. 28 , 261-302 (2003).\n[113] P. Lenz and R. Lipowsky, 'Morphological transitions of wetting layers on structured surfaces,' Phys. Rev. Lett. 80 , 1920-1923 (1998).\n[114] C. Bauer, S. Dietrich, and A. O. Parry, 'Morphological phase transitions of thin fluid films on chemically structured substrates,' Europhys. Lett. 47 , 474-480 (1999).\n[115] R. Konnur, K. Kargupta, and A. Sharma, 'Instability and morphology of thin liquid films on chemically heterogeneous substrates,' Phys. Rev. Lett. 84 , 931-934 (2000).\n[116] M. Brinkmann and R. Lipowsky, 'Wetting morphologies on substrates with striped surface domains,' J. Appl. Phys. 92 , 4296-4306 (2002).\n[117] L. Brusch, H. Kuhne, U. Thiele, and M. Bar, 'Dewetting of thin films on heterogeneous substrates: Pinning vs. coarsening,' Phys. Rev. E 66 , 011602 (2002).", + "page_start": 32, + "page_end": 32, + "source_file": "1001.2669.pdf" + }, + { + "text": "Acknowledgments\n[5] F. Brochard-Wyart and J. Daillant, 'Drying of solids wetted by thin liquid films,' Can. J. Phys. 68 , 1084-1088 (1989).\n[6] P. Muller-Buschbaum, 'Dewetting and pattern formation in thin polymer films as investigated in real and reciprocal space,' J. Phys.-Condes. Matter 15 , R1549-R1582 (2003).\n[7] R. Seemann, S. Herminghaus, C. Neto, S. Schlagowski, D. Podzimek, R. Konrad, H. Mantz, and K. Jacobs, 'Dynamics and structure formation in thin polymer melt films,' J. Phys.-Condes. Matter 17 , S267-S290 (2005).\n[8] U. Thiele, 'Structure formation in thin liquid films,' in S. Kalliadasis and U. Thiele, editors, 'Thin films of Soft Matter,' pages 25-93, Springer, Wien (2007).\n[9] R. Xie, A. Karim, J. F. Douglas, C. C. Han, and R. A. Weiss, 'Spinodal dewetting of thin polymer films,' Phys. Rev. Lett. 81 , 1251-1254 (1998).\n[10] R. Seemann, S. Herminghaus, and K. Jacobs, 'Dewetting patterns and molecular forces: A reconciliation,' Phys. Rev. Lett. 86 , 5534-5537 (2001).\n[11] U. Thiele, M. G. Velarde, and K. Neuffer, 'Dewetting: Film rupture by nucleation in the spinodal regime,' Phys. Rev. Lett. 87 , 016104 (2001).\n[12] M. Bestehorn and K. Neuffer, 'Surface patterns of laterally extended thin liquid films in three dimensions,' Phys. Rev. Lett. 87 , 046101 (2001).", + "page_start": 25, + "page_end": 25, + "source_file": "1001.2669.pdf" + }, + { + "text": "Acknowledgments\n[20] C. Tomlinson, 'On the motion of certain liquids on the surface of water,' Phil. Mag. Ser. 4 39 , 32-48 (1870).\n[21] C. G. Marangoni, 'Ueber die Ausbreitung der Tropfen einer Flussigkeit auf der Oberflache einer anderen,' Ann. Phys. (Poggendorf) 143 , 337-354 (1871).\n[22] O. Karthaus, L. Grasjo, N. Maruyama, and M. Shimomura, 'Formation of ordered mesoscopic polymer arrays by dewetting,' Chaos 9 , 308-314 (1999).\n[23] X. Gu, D. Raghavan, J. F. Douglas, and A. Karim, 'Hole-growth instability in the dewetting of evaporating polymer solution films,' J. Polym. Sci. Pt. B-Polym. Phys. 40 , 2825-2832 (2002).\n[24] S. W. Hong, J. F. Xia, and Z. Q. Lin, 'Spontaneous formation of mesoscale polymer patterns in an evaporating bound solution,' Adv. Mater. 19 , 1413-1417 (2007).\n[25] G. Liu, C. F. Zhang, J. Zhao, and Y. X. Zhu, 'Study of the morphology of the three-phase contact line and its evolution by morphological examination after droplet evaporation of aqueous polymer solutions,' Langmuir 24 , 7923-7930 (2008).\n[26] M. Mertig, U. Thiele, J. Bradt, G. Leibiger, W. Pompe, and H. Wendrock, 'Scanning force microscopy and geometrical analysis of two-dimensional collagen network formation,' Surface and Interface Analysis 25 , 514-521 (1997).\n[27] M. Mertig, U. Thiele, J. Bradt, D. Klemm, and W. Pompe, 'Dewetting of thin collagenous precursor films,' Appl. Phys. A 66 , S565-S568 (1998).", + "page_start": 26, + "page_end": 26, + "source_file": "1001.2669.pdf" + }, + { + "text": "IV. CONCLUSION\nWe have discussed recent work on pattern formation processes in films and drops of evaporating suspensions/solutions of polymers and particles. After reviewing experiments on suspensions of thiol-coated gold nanoparticles in toluene we have focused on the modelling of the transport and phase change processes involved. A theoretical approach to the modelling of the hydrodynamics on the mesoscale has been described as well as more microscopic models for the dynamics in the observed nanoscopic 'postcursor' film. In particular, we have introduced (i) a microscopic kinetic Monte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film model.\nThe kinetic Monte Carlo model and the dynamical density functional theory can both be used to investigate and understand the formation of polygonal networks, spinodal and branched structures resulting from the dewetting of an ultrathin 'postcursor' film that remains behind the mesoscopic dewetting front. They are, however, not capable of describing the dynamical processes in a meso-\n23\nscopic film. We have seen that the KMC model is able to describe the interplay of solute diffusion within the solvent and solvent evaporation/condensation. It also takes the liquid-liquid, liquidparticle and particle-particle interactions into account and therefore allows us to distinguish different regimes of the transverse (fingering) instability of the evaporative dewetting front: a transport regime where the instability is almost completely independent of the interaction strengths and a demixing regime where particles and liquid demix at the receding front thereby increasing its transverse instability.", + "page_start": 22, + "page_end": 23, + "source_file": "1001.2669.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2669.pdf", + "query": "Concerning the dewetting of nanoparticle solutions, how does the concentration of nanoparticle affect the main finger's width ?", + "target_page": 12, + "target_passage": "A quantitative analysis shows that the mean number of fingers depends only very weakly on the av- erage concentration of the nanoparticles ; only the mean finger width increases with increasing concentration", + "chunk_present": { + "presence": true, + "index": 3 + } + }, + "top_chunk": [ + { + "text": "II. EXPERIMENT WITH NANOPARTICLE SOLUTIONS\nWhen following the evolution of the branched patterns in situ (see the complementary video material of Ref. [40]), one clearly observes that different processes occur on different lenght scales. First, a macroscopic dewetting front recedes, leaving behind a seemingly dry substrate. The macroscopic front can be transversely unstable resulting in large-scale ( > 100 µ m) strongly anisotropic fingered structures. For fronts that move relatively quickly these macroscopic structures cover all the available substrate. However, when at a later stage the macroscopic front becomes slower, those fingers become scarce and 'macroscopic fingering' finally ceases. At this stage it is possible to appreciate that the seemingly dry region left behind by the front is not at all dry, but covered by an ultrathin 'postcursor' film that is itself unstable. The thickness of this film\n6\nis similar to the size of the nanoparticles. At a certain distance from the macroscopic front, the ultrathin film starts to evolve a locally isotropic pattern of holes. The holes themselves grow in an unstable manner resulting in an array of isotropically branched structures as shown, e.g., above in Fig. 1. This indicates that at least some of the patterns described in the literature may have arisen from processes in similar ultrathin 'postcursor' films.\nThe existence of the ultrathin 'postcursor' film is an experimental finding that can be drawn on when choosing a theoretical approach to account for the pattern formation (see below). Note however, that at the moment there exists no explanation for its existence. A possible hypothesis is that the substrate strongly attracts the nanoparticles. As a result they form a dense suspension layer having a thickness roughly equal to the diameter of the nanoparticles. The observed mesoscopic dewetting front then actually correspond to an autophobic dewetting of a low concentration suspension from the higher concentration suspension on the surface of the substrate.", + "page_start": 5, + "page_end": 6, + "source_file": "1001.2669.pdf" + }, + { + "text": "B. Dynamical Density Functional theory\nFig. 4 presents two pairs of snapshots from a purely evaporative dewetting process deep inside the parameter region of the phase diagram where spinodal dewetting occurs. For small times the film becomes unstable showing a typical spinodal labyrinthine pattern with a typical wavelength. The nanoparticles concentrate where the remaining liquid is situated. However, they are 'slow' in their reaction: when ρ l already takes values in the range 0.08 - 0.83, the nanoparticle concentration has only deviated by about 25% from its initial value. The film thins strongly forming many\n17\nsmall holes. The competition for space results in a fine-meshed polygonal network of nanoparticle deposits. The concentration of particles is much higher at the network nodes - an effect that can not been seen within the KMC model. As the particles attract the liquid there remains some liquid on the substrate where the nanoparticles are.\nFig. 5 gives snapshots of the evolution of a fingering instability for a retracting dewetting front. At early times the straight front shows a rather short-wave instability, about 16 wiggles can be seen. However, they are only a transient: the finger pattern coarsens rapidly till only about 7 fingers remain. The fingering then becomes stationary, i.e., just as in the KMC, the mean finger number remains constant, although new branches are continuously created and old branches join each other. In general, the results on fingering agree well with results obtained using the KMC model [41]. From this we conclude that jamming of discrete particles is not a necessary factor for causing the instability, since the fingering is seen here in a continuum model with a diffusion constant that is independent of the nanoparticle concentration. The DDFT is better suited than the KMC for investigations of the early instability stages: they are more easy to discern without the discrete background noise of the KMC. Furthermore, one may perform a linear stability analysis of the one-dimensional undisturbed streamwise front profiles with respect to transverse perturbations (in analogy to the approach used in Refs. [19, 86, 87]).", + "page_start": 16, + "page_end": 17, + "source_file": "1001.2669.pdf" + }, + { + "text": "C. Thin film hydrodynamics\nFIG. 6: Profiles of the final dried-in nanoparticle layer for the dewetting of a suspension of nanoparticles in a volatile solvent that partially wets the substrate for (a) high ( Ω = 10 -3 ), (b) medium ( Ω = 2 × 10 -6 ) and (c) low ( Ω = 0 . 78 × 10 -8 ) evaporation rates, for the case when χ = H/l 0 = 1 . 09 , the lateral length scale is glyph[lscript] = √ γ/κH with κ = ( S p /l 0 ) exp( d 0 /l 0 ) H being an energy scale related to wettability and the vertical length scale is H = √ 2 S LW /κd 0 . The remaining dimensionless parameters are the evaporation number Ω = Q e η 0 glyph[lscript] 2 /H 3 , the diffusion number Γ = D (0) η 0 /Hκ = 10 -4 and the dimensionless chemical potential M = Hµ/κ = -0 . 0035 . The system size is L = 19500 glyph[lscript] . Film thickness and h p in the plots are scaled by the precursor film thickness.\nx/L\ncircular throughout the dewetting and evaporation process. In this case one should interprete the coordinate x as the distance from the centre of the circular film.\nWe start with a film of height h 0 of finite length sitting on a precursor film and assume that the film contains nanoparticles at constant concentration φ 0 . The chosen parameter values ensure that the film of thickness h 0 is linearly stable. As we do not incorporate noise, no nucleation of additional holes can occur (even with noise the probability would be extremely low). Without evaporation the film dewets 'classically' by a retraction of the initially step-like front. After a short time, surface tension smoothes the profile of the receding front and a capillary rim forms that collects all the\n20\ndewetted liquid. The front recedes until all liquid is collected in a central drop. Since no liquid evaporates [ Q nc = 0 in Eq. (1)], the particle concentration does not change during the process.", + "page_start": 19, + "page_end": 20, + "source_file": "1001.2669.pdf" + }, + { + "text": "A. Kinetic Monte Carlo model\nAquantitative analysis shows that the mean number of fingers depends only very weakly on the average concentration of the nanoparticles ρ av n ; only the mean finger width increases with increasing concentration. However, decreasing the mobility (i.e., decreasing the diffusivity of the particles) leads to a much denser finger pattern and also causes the front instability to appear at an earlier stage, i.e., when the front instability is in its initial linear regime, it has a higher growth rate and a smaller characteristic wavelength (cf. Fig. 2(c) and (d)). Decreasing the effective chemical potential (increasing its absolute value) has a similar but less strong effect. For details see [41]. These findings lead to the conclusion that the determining factor for the front instability is the ratio of the time-scales of the different transport processes. In particular, the front becomes more unstable when the velocity of the dewetting front increases as compared to the mean diffusion velocity of the nanoparticles.\nIf the particle diffusivity is low, the front 'collects' the particles, resulting in a build up of the particles at the front that itself is slowed down. This makes the front unstable and any fluctuation along the front will trigger a transverse instability that results in an evolving fingering pattern. This happens even when the particle-liquid and particle-particle attractive interactions do not favour clustering (i.e. demixing of the liquid and the nanoparticles). In this regime, the instability is a purely dynamic effect and energetics plays no role in determining the number of fingers. We call this the 'transport regime'.", + "page_start": 11, + "page_end": 11, + "source_file": "1001.2669.pdf" + }, + { + "text": "A. Kinetic Monte Carlo model\nWe note also that the fingering process may be viewed as self-optimising the front motion - i.e. the front keeps its average velocity constant by expelling particles into the fingers. A similar effect exists for dewetting polymer films [18], where liquid is expelled from the growing moving rim which collects the dewetted polymer. There, the surplus liquid is left on the surface as a droplet pattern.\nThe kinetic Monte Carlo model is a very useful tool that helps one to understand the pattern formation in drying nanoparticle suspensions. One has, however, to keep in mind the restrictions\n13\non the model (see above). The purely two-dimensional character of the KMC was extended to a 'pseudo three-dimensional' one by making the effective chemical potential dependent on the mean liquid coverage [38]. As the latter is related to a mean film thickness, this corresponds to the introduction of a 'global' thickness-dependent disjoining pressure into the evaporation term without an explicit consideration of a film thickness. The amended model can reproduce bimodal structures that are beyond the scope of the purely two-dimensional model [38, 39]. Fully threedimensional models are also discussed in the literature [76, 77].", + "page_start": 12, + "page_end": 13, + "source_file": "1001.2669.pdf" + }, + { + "text": "I. INTRODUCTION\nMore recently, interest has turned to the dewetting processes of solutions and suspensions. However, these systems have not yet been investigated in any great depth. Such systems are complicated because their behaviour is determined by the interplay between the various solute (or colloid) and solvent transport processes. Furthermore, the solvents that are used often evaporate, i.e., one has to distinguish between 'normal' convective dewetting and evaporative dewetting. A number of experiments have been performed employing (colloidal) solutions of polymers [22-25], macromolecules like collagen and DNA [26-31] and nanoparticles [32-40]. The latter are sometimes referred to as 'nanofluids'. The initial focus of much of the research in the field has been on investigating the structures that are formed which are similar to the ones observed in the 'classical' dewetting of non-volatile liquids. Labyrinthine structures and polygonal networks result from spinodal dewetting and heterogeneous nucleation and growth, respectively. They are 'decorated' with the solute and therefore conserve the transient dewetting pattern as a dried-in structure when all the solvent has evaporated [28, 34]. The picture is, however, not complete. The solute may\n3\nalso shift the spinodal and binodal lines as compared to the locations of these lines in the phase diagram for the pure solvent [41]. As a consequence, the solute concentration influences the hole nucleation rate. More importantly, the solute particles may also destabilise the dewetting fronts. As a result, one may find strongly ramified structures in all three systems [23, 25, 40, 42]. A selection of images exhibiting some of the possible structures is displayed in Fig.1.", + "page_start": 2, + "page_end": 3, + "source_file": "1001.2669.pdf" + }, + { + "text": "II. EXPERIMENT WITH NANOPARTICLE SOLUTIONS\nTwo different procedures are employed for the deposition of the solution on to the substrate: spincoating or a meniscus technique [61, 62]. The choice is important as it strongly influences the evaporation rate and, as a result, the pattern formation process. When using spin-coating, one finds that directly after deposition, evaporation competes with dewetting until all the solvent has evaporated. The resulting deposits of nanoparticles are imaged by atomic force microscopy (AFM). For spin-coated films, the evaporation rate is high and structuring is normally finished before the spincoater is stopped. Conversely, the solvent evaporation rate is strongly decreased when employing the meniscus technique [61], i.e., by depositing a drop of solution on a Teflon ring that is wetted by the solvent. This allows for a better control of the process and enables the use of contrast-enhanced microscopy to observe the dewetting process in situ [40]. All pattern formation is confined to the region of the receding contact line of toluene, silicon and air. With both techniques one may find mono-modal or bi-modal polygonal networks [34], labyrinthine spinodal structures, or branched patterns (see Fig. 1). The meniscus technique allows for the study of branched structures in a more controlled manner. The work in Ref. [40] indicates that fingering strongly depends on the interaction strength of the particles, i.e., on the chain length of the thiol molecules coating the gold cores. For short chains (C 5 and C 8 ) no formation of branched structures is observed. At similar concentrations, well-developed branched structures are formed for longer chains (C 10 and C 12 ). For even longer chains (C 14 ), however, one again finds less branching. It also depends on the amount of excess thiol in the solvent (for details see Ref. [40]).", + "page_start": 5, + "page_end": 5, + "source_file": "1001.2669.pdf" + }, + { + "text": "A. Kinetic Monte Carlo model\nWithout nanoparticles, the behaviour of the model is well known as it reduces to the classical two-dimensional Ising model [74]. For kT < kT c ≈ 0 . 567 liquid and vapour coexist when µ = µ coex = -2 . For µ > -2 [ µ < -2 ] eventually the liquid [vapour] dominates. A straight liquidgas interface will recede [advance] for µ < -2 [ µ > -2 ], i.e. one finds evaporative dewetting [wetting] fronts. If one starts, however, with a substrate covered homogeneously by the liquid, for µ < -2 the film will dewet via a nucleation or spinodal-like process. If the nanoparticles are present, they form dried-in structures when all the liquid evaporates. The final structures do not normally change any further - at least on short time scales. However, if the liquid wets the particles (i.e. is attracted to the particles), over long times there might be a coarsening of the structures, facilitated by the adsorbed liquid. The dried-in patterns depend on the particular pathway taken by the evaporative dewetting process. They range from labyrinthine to polygonal network structures or holes in a dense particle layer. Some typical patterns are displayed in Fig. 2, for cases when the average surface coverage of the nanoparticles ρ av n = 0 . 2 . Panels (a) and (b) result from a spinodal-like and nucleation and growth process, respectively. At first sight they look very similar to the patterns seen for the pure solvent and one might argue that the particles solely act as passive tracers and preserve the transient volatile dewetting structures of the solvent. This was suggested in Refs. [26-28] for dewetting collagen solutions. However, panels (c) and (d) indicate that the particles may at times play a rather more significant role. When the diffusion of the particles is slow, the evaporative dewetting fronts become transversely unstable and may result in strongly ramified patterns. This instability is caused by the nanoparticles. The lower their mobility, the stronger the fingering effect, i.e., there are more fingers in (c) than in (d) because in the latter the mobility is larger.", + "page_start": 9, + "page_end": 9, + "source_file": "1001.2669.pdf" + }, + { + "text": "C. Thin film hydrodynamics\nThe situation changes when allowing for evaporation ( Q nc > 0 ). Now the front may retract by convection and/or evaporation. Evaporation leads to the possibility of a strong increase in the particle concentration at the contact line as evaporation is strongest there. Due to the strong nonlinear dependence of the viscosity on the particle concentration, this may lead to a dramatic decrease of the convective contribution to the front velocity. For moderate evaporation rates, this may result in a (temporary) self-pinning of the front. Within the present basic model, the process can (after complete dry-in) result in three different basic deposition patterns: (i) for very fast evaporation rates, all other processes occur over time scales that are much larger. In particular, the effects of convective redistribution of the liquid are neglectable. As a result one finds that a nearly homogeneous film of nanoparticles of thickness h p = φ 0 h 0 is deposited (see Fig. 6(a)). Convection only results in the small heap of material visible at the left hand side of Fig. 6(a). The decrease in h p on the right side of Fig. 6(a) arises due to the diffusion of particles to the right of the initial front position; (ii) for very low evaporation rates, the film dynamics is dominated by convective dewetting as this process acts on a much shorter time scale than evaporation. As a result, all the liquid is collected into a drop before evaporation slowly removes the remaining solvent. Under these conditions most of the nanoparticles are deposited in a single heap (see Fig. 6(c)). Depending on the diffusivity, the heap might be highest at the centre or show a depression there; (iii) at intermediate evaporation rates, one may observe the deposition of a nanoparticle ring around a region with a nanoparticle film of much lower height. At the centre deposition might increase again (see Fig. 6(b)).", + "page_start": 20, + "page_end": 20, + "source_file": "1001.2669.pdf" + }, + { + "text": "A. Kinetic Monte Carlo model\nTo illustrate the influence of energetics (characterized by the interaction parameters ε ij ) on fingering in Fig. 3 we display the dependence of the mean finger number on particle-liquid interaction strength ε nl . For ε nl ≥ 1 . 5 the mean finger number < f > is nearly constant; this is the transport regime. However, on decreasing ε nl below 1.5, we observe a marked increase in the value of < f > , indicating that energy plays an important role in determining the number of fingers in this regime. In this parameter range, demixing of particles and liquid occurs at the moving front and increases its transverse instability. In this 'demixing regime', the wavelength of the fingering instability is determined by the dynamics and the energetics of the system. Decreasing ε nl further (below 1 . 4 in Fig. 3) one first observes in regime (iii) a slight decrease in the average finger number. This is a geometric effect resulting from our one-dimensional finger counting routine: The fingers increasingly break up and the dried-in pattern looks progressively isotropic. In regime (iv), the measure 〈 f 〉 does not represent a finger number but instead indicates a decrease in the typical\n12\ndistance between particle clusters resulting from the demixing process that occurs already in the bulk liquid and is not related to the front instability at all. Note that one finds a similar sequence of regimes (i) to (iv) when increasing the particle-particle interaction strengths for fixed ε nl (see Ref. [41]) for further details.\nFIG. 3: (Colour online) Dependence of the mean finger number left behind by the unstable dewetting front on the particle-liquid interaction strength ε nl . The regions marked (i) to (iv) are discussed in the main text. The insets display typical snapshots obtained in the four different regions. Particles are black, liquid is grey (green online) and the empty substrate is white. The remaining parameters are kT = 0 . 2 , M = 20 , µ = -2 . 2 , ρ av n = 0 . 1 , glyph[epsilon1] nn = 2 . 0 , domain size 1200 × 1200 . For the insets, from left to right, glyph[epsilon1] nl = 1 . 2 , 1 . 4 , 1 . 45 , 1 . 8 .\nnl", + "page_start": 11, + "page_end": 12, + "source_file": "1001.2669.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2669.pdf", + "query": "Which of ultrathin film or mesoscale hydrodynamics are best explained by kinetic Monte Carlo models ? ", + "target_page": 18, + "target_passage": "lthough both the kinetic Monte Carlo model and the dynamical density functional theory are able to describe well the processes in the ultrathin film, they can not be employed to describe mesoscale hydrodynamics", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "C. Thin film hydrodynamics\nThe previous two sections focused on two approaches to describe the experimentally observed patterning dynamics in the ultrathin postcursor film left behind by a mesoscopic receding dewetting front. Although both the kinetic Monte Carlo model and the dynamical density functional theory are able to describe well the processes in the ultrathin film, they can not be employed to describe mesoscale hydrodynamics. A relatively simple model for the latter can be derived in the framework of a long-wave or lubrication equation [8, 63]. We will illustrate here the approach by considering an isothermal situation where the nanoparticles are not surface active, i.e., they do not act as surfactants. For a model incorporating the effects of latent heat generation and surfaceactive particles resulting in thermal and solutal Marangoni stresses, see Ref. [88]. A description of spreading particle solutions incorporating a structural disjoining pressure has also been considered [89]. For related work on particle-laden film flow on an incline see Refs. [90, 91].\nOne starts from the Stokes equations, together with continuity, no-slip boundary conditions at the\n18\nsubstrate and force equilibria at the free surface, and applies a long-wave approximation. Under the assumption that concentrations equilibrate rapidly over the film thickness, we obtain coupled non-linear evolution equations for the film thickness profile h ( x, t ) and the amount of nanoparticles per unit length h p = φh , where φ is the volume concentration of the nanoparticles. Note, that h p corresponds to the local thickness of the nanoparticle layer when all the solvent is evaporated. The resulting evolution equation for the film thickness is Eq. (1) above and focusing on the influence of particle-independent capillarity and wettability only, the energy functional F [ h ] is given by Eq. (2) above. Note that the viscosity η depends on the particle concentration. Following Refs. [88, 89, 91, 92] we use the Quemada law for dense suspensions [93-95]\nη ( φ ) = η 0 ( 1 -φ φ c ) -2 (8)", + "page_start": 17, + "page_end": 18, + "source_file": "1001.2669.pdf" + }, + { + "text": "III. MODELLING APPROACHES\nFor the present system a thin film description using Eq. (1) is not appropriate because the nanoparticles are not taken into account. However, under certain conditions one can augment equation (1) for the evolution of the film thickness by coupling it to an equation for the evolution of the mean particle concentration. The resulting model is able to describe the behaviour of an evaporating solution on the meso- and macroscale. Such an approach is briefly discussed below in Section III C. Weshould expect such a model to describe the mesoscopic dewetting front discussed above. However, the theory is less suited to a description of the dewetting dynamics of the ultrathin postcursor\nfilm.\nThe dewetting of the ultrathin film of highly concentrated suspension may be described by a discrete stochastic model such as, for instance, a kinetic Monte Carlo (KMC) model based solely on evaporation/condensation dynamics of the solvent and diffusion of the solute [35, 39, 41]. The validity of this strong assumption regarding the relevant transport processes can be confirmed from an estimate based on Eq. (1): The pressure p = δF/δh drives convection and evaporation. The convective mobility is proportional to h 3 , i.e., it is large for thick films but decreases strongly with reduced film thickness. The evaporative mobility, however, is a constant, implying that evaporation will dominate below a certain (cross-over) thickness. For the parameter values of Ref. [57] and a small contact angle ( ≈ 0 . 01 ), the cross-over thickness is in the range of 1-5 nanometers. This estimate justifies the neglect of convective transport in a description of the postcursor film and may explain why one has such good agreement between the experimentally observed patterns and the patterns obtained from a purely two-dimensional (single layer) kinetic Monte Carlo model [35]. We introduce the KMC model below in Section III A.", + "page_start": 7, + "page_end": 7, + "source_file": "1001.2669.pdf" + }, + { + "text": "A. Kinetic Monte Carlo model\nThe kinetic Monte Carlo model for two-dimensional dewetting nanofluids [33] was first proposed in Ref. [35] and extended to include next-nearest neighbour interactions in [37]. The two key assumptions used are: (i) the relevant processes can be mapped on to a two-dimensional lattice gas model, thereby neglecting continuous changes in the thickness of the evaporating film, and (ii) all relevant dynamics results from diffusing nanoparticles and evaporating/condensing solvent.\nThe model builds on an Ising-type model for the liquid-gas phase transition. The surface is divided up into a regular array of lattice sites whose size is dictated by the nanoparticles. One then considers each lattice site to be occupied either by a nanoparticle, liquid or vapour. This effectively maps the system onto a two-dimensional two-component lattice gas having two fields n and l . The resulting three possible states of a cell are: liquid ( l = 1 , n = 0 ), nanoparticle ( l = 0 , n = 1 ), and vapour ( l = 0 , n = 0 , i.e., cell empty). The energy of an overall configuration is given by the hamiltonian\nE = -ε nn 2 ∑ n i n j -ε nl 2 ∑ n i l j -ε ll 2 ∑ l i l j -µ ∑ i l i (3)\nwhere ∑ denotes a sum over nearest neighbour pairs and ε ll , ε nn and ε nl are the liquid-liquid, particle-particle and liquid-particle interaction energies, respectively. Fixing the three interaction strength parameters ε ll , ε nn , ε nl and the effective chemical potential µ determines the equilibrium state of the system. We choose ε ll as unit of energy - i.e. we set ε ll = 1 .", + "page_start": 8, + "page_end": 8, + "source_file": "1001.2669.pdf" + }, + { + "text": "IV. CONCLUSION\nWe have discussed recent work on pattern formation processes in films and drops of evaporating suspensions/solutions of polymers and particles. After reviewing experiments on suspensions of thiol-coated gold nanoparticles in toluene we have focused on the modelling of the transport and phase change processes involved. A theoretical approach to the modelling of the hydrodynamics on the mesoscale has been described as well as more microscopic models for the dynamics in the observed nanoscopic 'postcursor' film. In particular, we have introduced (i) a microscopic kinetic Monte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film model.\nThe kinetic Monte Carlo model and the dynamical density functional theory can both be used to investigate and understand the formation of polygonal networks, spinodal and branched structures resulting from the dewetting of an ultrathin 'postcursor' film that remains behind the mesoscopic dewetting front. They are, however, not capable of describing the dynamical processes in a meso-\n23\nscopic film. We have seen that the KMC model is able to describe the interplay of solute diffusion within the solvent and solvent evaporation/condensation. It also takes the liquid-liquid, liquidparticle and particle-particle interactions into account and therefore allows us to distinguish different regimes of the transverse (fingering) instability of the evaporative dewetting front: a transport regime where the instability is almost completely independent of the interaction strengths and a demixing regime where particles and liquid demix at the receding front thereby increasing its transverse instability.", + "page_start": 22, + "page_end": 23, + "source_file": "1001.2669.pdf" + }, + { + "text": "A. Kinetic Monte Carlo model\nWe note also that the fingering process may be viewed as self-optimising the front motion - i.e. the front keeps its average velocity constant by expelling particles into the fingers. A similar effect exists for dewetting polymer films [18], where liquid is expelled from the growing moving rim which collects the dewetted polymer. There, the surplus liquid is left on the surface as a droplet pattern.\nThe kinetic Monte Carlo model is a very useful tool that helps one to understand the pattern formation in drying nanoparticle suspensions. One has, however, to keep in mind the restrictions\n13\non the model (see above). The purely two-dimensional character of the KMC was extended to a 'pseudo three-dimensional' one by making the effective chemical potential dependent on the mean liquid coverage [38]. As the latter is related to a mean film thickness, this corresponds to the introduction of a 'global' thickness-dependent disjoining pressure into the evaporation term without an explicit consideration of a film thickness. The amended model can reproduce bimodal structures that are beyond the scope of the purely two-dimensional model [38, 39]. Fully threedimensional models are also discussed in the literature [76, 77].", + "page_start": 12, + "page_end": 13, + "source_file": "1001.2669.pdf" + }, + { + "text": "A. Kinetic Monte Carlo model\nThe hamiltonian determines the equilibrium state and the energy landscape of the system. However, as the system 'dries in' during the course of the solvent evaporation, the final nanoparticle configurations do not necessarily represent equilibrium structures. This implies that the system dynamics is of paramount importance. It is determined by the possible Monte Carlo moves, their relative frequencies, and the probabilities for their acceptance. Two types of moves are allowed: (i) evaporation/condensation of liquid and (ii) diffusion of nanoparticles within the liquid. A mobility M corresponds to the ratio of cycles of particle and solvent moves and reflects the physical ratio of\n9\ntime scales for evaporation and diffusion. A large mobility M indicates fast diffusion as compared to evaporation. A trial move is accepted with the probability p acc = min[1 , exp( -∆ E/kT )] where k is the Boltzmann constant, T the temperature and ∆ E is the change in energy resulting from the potential move. Note that particles are only allowed to move into wet areas of the substrate, i.e., onto cells with l = 1 . This models zero diffusivity of the particles on a dry substrate. The replaced liquid fills the site left by the nanoparticle.", + "page_start": 8, + "page_end": 9, + "source_file": "1001.2669.pdf" + }, + { + "text": "Abstract\nWe review recent experiments on dewetting thin films of evaporating colloidal nanoparticle suspensions (nanofluids) and discuss several theoretical approaches to describe the ongoing processes including coupled transport and phase changes. These approaches range from microscopic discrete stochastic theories to mesoscopic continuous deterministic descriptions. In particular, we focus on (i) a microscopic kinetic Monte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film model.\nModels (i) and (ii) are employed to discuss the formation of polygonal networks, spinodal and branched structures resulting from the dewetting of an ultrathin 'postcursor film' that remains behind a mesoscopic dewetting front. We highlight, in particular, the presence of a transverse instability in the evaporative dewetting front which results in highly branched fingering structures. The subtle interplay of decomposition in the film and contact line motion is discussed.\nFinally, we discuss a simple thin film model (iii) of the hydrodynamics on the mesoscale. We employ coupled evolution equations for the film thickness profile and mean particle concentration. The model is used to discuss the self-pinning and de-pinning of a contact line related to the 'coffee-stain' effect.\nIn the course of the review we discuss the advantages and limitations of the different theories, as well as possible future developments and extensions.\nThe paper is published in: J. Phys.-Cond. Mat. 21 , 264016 (2009), in the Volume 'Nanofluids on solid substrates' and can be obtained at http://dx.doi.org/10.1088/0953-8984/21/26/264016\n2", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2669.pdf" + }, + { + "text": "III. MODELLING APPROACHES\nIn several respects, however, the kinetic Monte Carlo model is rather simplistic, limiting its potential applications. For instance, the thermodynamic chemical potential as well as any wetting interaction of the solvent with the substrate are collected in a single parameter - an effective chemical potential. This implies that any influence of a disjoining pressure is 'smeared out' over the whole system and that no distinction between the short- and the long-range parts of the disjoining pressure is possible. It is furthermore based on the assumption that evaporation/condensation is\n8\nthe dominant dynamic process, but does not allow one to probe this assumption. In Section III B we show how one may develop a dynamical density functional theory (DDFT) that describes the system at a similar level to the KMC. However, the DDFT may also be easily extended to include other effects such as fluid diffusion, that the KMC does not incorporate.", + "page_start": 7, + "page_end": 8, + "source_file": "1001.2669.pdf" + }, + { + "text": "C. Thin film hydrodynamics\nwhere φ c = 0 . 64 corresponds to random close packing of spherical particles. For the nanoparticle volume per length h p = φh one obtains the following evolution equation:\n∂ t ( φh ) = ∇· [ φQ c ∇ δF δh ] + ∇· [ D ( φ ) h ∇ φ ] , (9)\nwhere the particle concentration dependent diffusion coefficient D ( φ ) is related to the viscosity by the Einstein relation D ( φ ) = kT/ 6 πRη ( φ ) , where R is the radius of the nanoparticles [96].\nWe illustrate results obtained employing this thin film theory using the single example of a receding dewetting front for a partially wetting film. We use the disjoining pressure and material constants for the liquid considered in Ref. [57], where the evaporative and convective dewetting of a film of volatile liquid is studied. We add, however, the nanoparticles to the system. The expression that we employ for the local free energy term in Eq. (2) is:\nf ( h ) = S LW d 2 0 h 2 + S P exp ( d 0 -h l 0 ) , (10)\nwhere the parameters characterising the interaction between the liquid film and the surface are the apolar and polar spreading coefficients S LW and S P , respectively, the Debye length l 0 and the Born repulsion length d 0 [57]. The resulting disjoining pressure Π = -∂ h f ( h ) allows for a stable precursor film (thickness h precursor ) and also has a second (larger) thickness ( h 0 ) that corresponds to a secondary minimum of the underlying energy functional. See Refs. [11, 97] for studies of film and drop states for similar disjoining pressures. Our results are calculated for a system where the profiles only vary in one Cartesian direction ( x ), corresponding to a straight dewetting front. However, our results may also be interpreted as applying to a circular flat drop whose front remains\n19\n1\n1", + "page_start": 18, + "page_end": 19, + "source_file": "1001.2669.pdf" + }, + { + "text": "B. Dynamical Density Functional theory\nThe limitations of the kinetic Monte Carlo model introduced in the previous Section are related to its character as a two-dimensional lattice gas with only three states: gas, liquid or particle. This implies that (i) no liquid can be transported to a site on the surface already filled with liquid, i.e., diffusion of the liquid can not be incorporated in a sensible way and (ii) one is not able to distinguish between the influence of the short- and the long-range parts of the interactions with the substrate, as all such interactions are absorbed into the effective chemical potential.\nHowever, using dynamical density functional theory (DDFT) [78-83] one can develop a model for the processes in the ultrathin postcursor film without these limitations, although here we limit ourselves to developing the theory at the level of the KMC and solely discuss how to extend it to incorporate the influence of the liquid diffusion over the surface. Such a DDFT model describes the coupled dynamics of the density fields of the liquid ρ l and the nanoparticles ρ n . The densities ρ l and ρ n are defined as the probabilities of finding a given lattice site on the surface to be occupied by a film of liquid or by a nanoparticle, respectively. Note that the probability densities correspond to number densities as we use the lattice spacing σ = 1 as our unit of length.\nTo develop the DDFT, one must first derive the underlying free energy functional F [ ρ l , ρ n ] , and secondly, devise dynamical equations for both density fields that account for the conserved and the non-conserved aspects of their dynamics, i.e., transport and phase change processes, respectively. For a system governed by the hamiltonian (3), we may construct a mean-field (Bragg-Williams) approximation for the free energy of the system [78, 84] which contains an entropic contribution and contributions from the interactions between the different species (nanoparticles and liquid). The free energy is a semi-grand free energy, since the liquid is treated grand canonically (it is coupled to a reservoir with chemical potential µ ), whereas the nanoparticles are treated in the\n14\ncanonical ensemble. The free energy functional is first defined on the original KMC lattice. However, after re-writing the interaction terms employing gradient operators [78] one finally obtains the free energy functional for a continuous system", + "page_start": 13, + "page_end": 14, + "source_file": "1001.2669.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed9.pdf", + "query": "What is AgMERRA ?", + "target_page": 2, + "target_passage": " historical daily weather data (1986–2005) are from the AgMERRA dataset. AgMERRA is a post-processing of the NASA Modern-Era Retrospective Analysis for Research and Applications (MERRA) data. The dataset is proved to be suitable for agricultural modelling and features consistent, daily time-series data", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Materials and methods\nData processing. In this study, historical daily weather data (1986-2005) are from the AgMERRA dataset. AgMERRA is a post-processing of the NASA Modern-Era Retrospective Analysis for Research and Applications (MERRA) data. /T_he dataset is proved to be suitable for agricultural modelling and features consistent, daily time-series data 45 .\nFor future (2020-2099), the original climate scenario data (Table 1) were extracted from output archives of /five ESMs (including GFDL-ESM2M, HadGEM2-ES, IPSL-CM5A-LR, MIROC-ESM-CHEM and NorESM1-M) under four RCPs (RCP2.6, RCP4.5, RCP6.0, RCP8.5) retrieved from the CMIP website. /T_he climate scenario data was interpolated into 0.5° × 0.5° horizontal resolution and bias-corrected with respect to historical observations to remove systematic errors 46 . /T_he data of maize-planting regions are from the gridded global dataset in 2000 by combining two data products 47,48 .\nSimulation of climate scenarios with global warming by ͷ.ͻ °C and ͸.Ͷ °C. In this study, climate data of global warming by 1.5 °C and 2.0 °C are determined according to the results of global climate models driven by typical concentration paths (RCPs) of greenhouse gas emissions. Eligible data are selected from a total of 20 sets of data under four RCP scenarios of /five ESMs (including GFDL-ESM2M, HadGEM2-ES, IPSLCM5A-LR, MIROC-ESM-CHEM and NorESM1-M), which estimate the temperature, precipitation and sunshine hours (Fig. 1).\n͸\nScientific Reports\n| (2022) 12:17268 |\nhttps://doi.org/ͷͶ.ͷͶ͹;/sͺͷͻͿ;-Ͷ͸͸-͸͸͸͸;-ͽ\nVol:.(1234567890)\nwww.nature.com/scientificreports/", + "page_start": 1, + "page_end": 2, + "source_file": "pubmed9.pdf" + }, + { + "text": "Environment\nFull details of all environmental monitoring reports and a detailed review of all environmental issues are contained within the 2013 Mining and Rehabilitation Compliance Report (MARCR). The MARCR can be downloaded from DMITRE's website www.minerals.dmitre.sa.gov. au and can be found using the search word 'Challenger'.", + "page_start": 25, + "page_end": 25, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Executive Director - Corporate - Appointed 12 August 1998\nDerrice Dillon has considerable experience in management, administration and finance acquired over the last 22 years and has held a number of senior positions in Australia and overseas. From the early 1990's Derrice developed a strong knowledge of the oil and gas industry from her previous position as a director and head of administration of Slimdrill Pty Ltd. She was responsible for the design\nand implementation of all accounting and administration systems, including complex databases to track information for the construction and manufacture of the Slimdrill oil drilling rigs. She was also responsible for all legal matters and the production of promotional and marketing material for worldwide distribution.\nDerrice took a leading role in the listing of Mermaid Marine in 1999 and has since headed up accounting, systems and administration. As Chairman of the Board of Management she plays a senior role in Mermaid's operations.\nDerrice has also recently been appointed to the Seacare Authority by the Minister of Employment, Workplace Relations and Small Business as National Representative for the Offshore Maritime Industry.\n27\n28", + "page_start": 30, + "page_end": 31, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "Application Group Identifier and the Application Group ID\nThe Application Group Identifier and the Application Group ID (AGID) are unique identifiers that are used by Content Manager OnDemand to identify the application group in system tables.", + "page_start": 127, + "page_end": 127, + "source_file": "sg246915.pdf" + }, + { + "text": "Gold and silver sales\nGold and silver revenue is recognised when the refinery process has been finalised at which point the sale transaction to a third party is also completed. Transportation and refinery costs are expensed when incurred.", + "page_start": 70, + "page_end": 70, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Environmental Audit\nAn independent environmental compliance audit was undertaken by specialist consultants Outback Ecology in March, 2013. The compliance report was submitted to DMITRE as part of the annual MARCR in April, 2013. The compliance audit identified action tasks which have now been completed.", + "page_start": 26, + "page_end": 26, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Global Mirror\nGlobal Mirror (GM) is a method of asynchronous replication that maintains data consistency across multiple volumes within or across multiple systems. Global Mirror is generally used where distances between the source site and target site cause increased latency beyond what the application can accept.", + "page_start": 798, + "page_end": 798, + "source_file": "sg247938.pdf" + }, + { + "text": "From the B Platform\nMARCH/MICRA", + "page_start": 32, + "page_end": 32, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "11.7.11 Starting Metro Mirror/Global Mirror consistency group\nUse the startrcconsistgrp command to start an MM/GM consistency group. You can issue this command only to a consistency group that is connected.\nFor a consistency group that is idling, this command assigns a copy direction (master and auxiliary roles) and begins the copy process. Otherwise, this command restarts a previous copy process that was stopped by a stop command or by an I/O error.", + "page_start": 568, + "page_end": 568, + "source_file": "sg247938.pdf" + }, + { + "text": "Challenger and Chatree* Mineral Resources (inclusive of Ore Reserves)\n(%) = -. Total Mineral Resources, Grade.Au Equiv (g/t) = 0.83. Total Mineral Resources, Grade.Ag Equiv (g/t) = 81.3. Total Mineral Resources, Contained Metal.Gold (M oz) = 4.77. Total Mineral Resources, Contained Metal.Silver (M oz) = 32.8. Total Mineral Resources, Contained Metal.Au Equiv (M oz) = 5.08. Total Mineral Resources, Contained Metal.Ag Equiv (M oz) = 498", + "page_start": 33, + "page_end": 33, + "source_file": "ASX_KCN_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed9.pdf", + "query": "In 2018, what was the global proportion of maize grown in the US ?", + "target_page": 5, + "target_passage": "According to statistics in 2018, the gross maize yield in the top 5 countries is almost 80% of the total maize yield of the whole world. The United States accounts for more than 32%", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Results\nAccording to statistics in 2018, the gross maize yield in the top 5 countries is almost 80% of the total maize yield of the whole world. /T_he United States accounts for more than 32%; China accounts for about 24%; Brazil, Argentina and Mexico account for about 23%. /T_he /fluctuation of maize production in these /five top countries will have a signi/ficant impact on the global maize trade. Based on the simulation results, comparing to 1986-2005, the maize yield in China, Brazil and Argentina would decrease under global warming by 1.5 °C; the yield loss rate would reach more than 20% in Brazil; Argentina would decrease by 14.7%; China would decrease by 3.7%. However, there would be increasing trends in the United States and Mexico; the change in the United States would not be signi/ficant and the maize yield would increase by 0.5%; the yield increasing rate would exceed 50% in Mexico. Overall, the gross maize yield in the top 5 countries would decrease by 2% under global warming\nScientific Reports | (2022) 12:17268 |\nhttps://doi.org/ͷͶ.ͷͶ͹;/sͺͷͻͿ;-Ͷ͸͸-͸͸͸͸;-ͽ\nVol:.(1234567890)\n;\nwww.nature.com/scientificreports/\nFigure 5. (continued)\nby 1.5 °C. According to the simulation results, comparing to 1986-2005, the maize yield in the United States, China and Brazil would decrease under global warming by 2.0 °C; the yield loss rate would reach more than 24% in Brazil; the United States would decrease by 13.3%; China would decrease by 11.5%. However, there would be increasing trends in Argentina and Mexico; the maize yield would increase by 16.8% in Argentina; the yield increasing rate would exceed 40% in Mexico. Overall, the gross maize yield in the top 5 countries would decrease by 11.4% under global warming by 2.0 °C. By comparing the maize production in di/fferent countries, it can be found that the reduction trend of total maize production in the top /five countries is more obvious, especially under the scenario of global warming by 2.0 °C, the global food trade and food security may face greater risks.", + "page_start": 7, + "page_end": 8, + "source_file": "pubmed9.pdf" + }, + { + "text": "Materials and methods\nFirst maize yields across the world during the historical period 1986-2005 were simulated at the 0.5° × 0.5° grid scale with two main production systems, including Spring maize and Summer maize. Historical national maize production is aggregated from simulated gridded yield and weighted by grid cell maize areas in 2000 from the gridded global dataset by combining two data products 47 . Second, genetic parameters of speci/fic cultivars of maize from previous works were adopted for the initial parameters; model parameters related to crop genotype characteristics were calibrated and tuned following the method in Xiong et al. 52 , in which the simulated yields from 1986-2005 were comparable to the statistical data. /T_hird, maize yields across the world were simulated under global warming by 1.5 °C and 2.0 °C. Finally, global and national maize yields were aggregated from gridded values; changes in national and global yields under global warming by 1.5 °C and 2.0 °C were calculated, comparing maize yield average for 1986-2005.\nSimulation of market price using GTAP. /T_he yield changes for maize from the DSSAT models under 1.5 °C and 2.0 °C temperature increase are used to carry out simulations using competitive market for changes in production, market price, and self-su/fficiency ratio of maize at national and global levels 53,54 . For this study, we use a comparative static analysis approach to simulate the impact of climate changes on the prices and trade of the major food crops under current economic conditions. Utilizing current economic conditions has the advantage of minimizing assumptions and model uncertainties related to future economic conditions 55,56 .\n/T_he original GTAP database doesn't include maize as a separate sector, rather it is combined with other coarse grains to form an 'other coarse grain' sector. For this study, we updated the GTAP database by splitting maize from the original sector in the database, design an appropriate sectoral and regional aggregation scheme to the original database. /T_he detailed method is given as follows:", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed9.pdf" + }, + { + "text": "Results\nFrom the results simulated by IPSL-CM5A-LR model under RCP 2.6 scenario, the gross yield of maize in the world between 2020 and 2039 would decrease by 6.8% relative to 1986-2005. /T_he area is 37.7% of the whole maize planting regions in the world, in which the yield loss would be less than 50%, mainly located in the low and middle latitude of South America and Asia, and the middle latitude of Africa and North America. /T_he area is 16.4% of the whole maize planting regions, in which the yield loss would be more than 50%, mainly located in the low latitude of South America and the middle latitude of Asia and Europe. /T_he area is 45.8% of the whole maize planting regions, in which the yield would increase, mainly located in the low latitude of Africa, Asia and North America, the high latitude of Europe. From the results simulated by the GFDL-ESM2M model under RCP 4.5 scenario, the gross yield of maize in the world between 2041 and 2060 would increase by 7.2% relative to 1986-2005. /T_here are opposite trends of maize yield under global warming by 1.5 °C, which are simulated by di/fferent global climate models. However, the spatial distributions of maize yield change are similar to each other. /T_he di/fference is that the regions of high yield loss rate are decreasing, and the regions of yield increasing are going up. In a comprehensive perspective, under global warming by 1.5 °C, maize yield in the whole world would increase 0.18% relative to 1986-2005 (Fig. 3). According to Paris Agreement, all countries should do their best to limit the global warming by 1.5 °C until the end of 21 century. If that objective could be accomplished, gross maize production of the whole world would not be in/fluenced so much by climate change, but the food\nͼ\nScientific Reports\n| (2022) 12:17268 |\nhttps://doi.org/ͷͶ.ͷͶ͹;/sͺͷͻͿ;-Ͷ͸͸-͸͸͸͸;-ͽ\nVol:.(1234567890)\nwww.nature.com/scientificreports/", + "page_start": 5, + "page_end": 6, + "source_file": "pubmed9.pdf" + }, + { + "text": "Results\nFrom the view of continents, there are di/fferent trends of maize yield changes in the 6 continents (except Antarctica) under global warming by 1.5 °C and 2.0 °C (Fig. 6). From the results of simulated by CRESE-maize under global warming by 1.5 °C, the maize yield in 3 continents would decline apparently, including South America, Europe and Oceania; the average yield loss rates are respectively - 15.6%, - 12.4%, - 36.4%; in the other 3 continents the average maize yield would go up, especially in Africa more than 30%; the increasing trends are slight in Asia and North America, in which the yield increasing rates are separately 0.7% and 0.4%. However, the yield change trends simulated by IPSL-CM5A-LR and GFDL-ESM2M models are di/fferent in 2 continents, including Asia and North America. From the results of simulated by CRESE-maize under global warming by 2.0 °C, the maize yield in 5 continents would decline apparently, except Africa; the average yield loss rates are respectively - 7.9% (Asia), - 14.1% (North America), - 9.3% (South America), - 22.5% (Europe), - 25.5% (Oceania); only in Africa the average maize yield would go up also more than 30%; meanwhile the yield change trends simulated by IPSL-CM5A-LR and GFDL-ESM2M models are the same in each continent. Comparing the two global warming scenarios, there would be apparent variations in maize yield in Asia and North America, in which the annual maize yield accounts for a great proportion of the whole world, leading to a much more serious yield loss under global warming by 2.0 °C than that under global warming by 1.5 °C. /T_here would be an obvious crisis of food supply under global warming by 2.0 °C with the increasing population in the future. So, it is important to make full preparation for adaptation to climate change in the whole world.\nͿ\nVol.:(0123456789)\nScientific Reports\n| (2022) 12:17268 |\nhttps://doi.org/ͷͶ.ͷͶ͹;/sͺͷͻͿ;-Ͷ͸͸-͸͸͸͸;-ͽ\nwww.nature.com/scientificreports/", + "page_start": 8, + "page_end": 9, + "source_file": "pubmed9.pdf" + }, + { + "text": "Results\nFigure 4. Distribution of yield loss rates on maize in the world under global warming by 2.0 °C (up: NorESM1-M model, RCP 4.5; down: GFDL-ESM2M model, RCP 6.0). /T_he /figure has been generated using ArcGIS 10.2 and Natural Earth-Free vector and raster map data @ https:// natur alear thdata. com.\nsecurity of the whole world would still be attacked violently. /T_here are huge di/fferences among the continents; South America, Asia and the Middle East are threatened seriously by yield loss seriously under global warming by 1.5 °C. /T_he changes in maize yield in di/fferent regions would in/fluence the maize price and food trades. So, it should be cautious to cope with the maize changes under global warming by 1.5 °C.", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed9.pdf" + }, + { + "text": "Materials and methods\nFirst, we improved the database by splitting maize from the existing sector 'other coarse grain', following similar work using GTAP 57-59 based on the routines from the Splitcom method 60 . In this procedure, the old /flows of data both at national and trade levels are allocated between the new /flows using weights. /T_he national weights include the division of each unsplit user's use of the original split commodity among the new commodities; the division of unsplit inputs to the original industry between the new industries; the splitting of new industry's use of each new commodity. Maize use is mainly shared between feed, food, processing and others (seed, waste, etc.).\nTrade shares allocate the original slice of the split commodity into the new commodity for all elements of basic price value, tax, and margin. Finally, we used the RAS method for balancing the newly created database. /T_he values for the national shares matrix were obtained from FAOSTAT. /T_he trade shares matrix was calculated based on the data from UN Comtrade Database.\nSecond, our sectoral aggregation scheme for GTAP ensures that all the competing and complimenting sectors for maize are present in the most disaggregated form. For example, for maize, other crops compete for inputs of production and both livestock and households are major users of maize. For regional aggregation, we kept the details for all the main producing, consuming, and trading regions, for maize.\n͹\nVol.:(0123456789)\nScientific Reports\n| (2022) 12:17268 |\nhttps://doi.org/ͷͶ.ͷͶ͹;/sͺͷͻͿ;-Ͷ͸͸-͸͸͸͸;-ͽ\nwww.nature.com/scientificreports/\nFigure 2. Distribution of temperature and precipitation changes under global warming by 1.5 °C and 2.0 °C ( a ) temperature, 1.5 °C; ( b ) temperature, 2.0 °C; ( c ) precipitation, 1.5 °C; ( d ) precipitation, 2.0 °C. /T_he /figure has been generated using ArcGIS 10.2 and Natural Earth-Free vector and raster map data @ https:// natur alear thdata. com.\n/T_hird, yield shocks for maize were incorporated into the GTAP model via changes in land e/fficiency for the production of the respective in each region.", + "page_start": 2, + "page_end": 3, + "source_file": "pubmed9.pdf" + }, + { + "text": "Discussion and conclusion\n/T_hirdly, there are relatively more researches on the prediction of climate change trend under the background of 1.5 °C and 2.0 °C; but the research on the impact assessment of the main grain crops including global trade in worldwide is few. In the meantime, we do not assess the e/ffect of future changes on agriculture, such as increases in farm productivity due to new technology. /T_he maize planting area in the future is assumed to be the same as the current situation of maize cultivation in the world.\nConclusion. According to the simulation results, the yield of maize under global warming by 2.0 °C would decrease between 3.0 and 18.7% in the worldwide relative to 1986-2005; the maize yield would /fluctuate between - 6.8 and 7.2% under global warming by 1.5 °C. From the spatial distribution, the gross maize yield in the top 5 high-yield countries (including the United States, China, Brazil, Argentina and Mexico) would decrease by 2% under global warming by 1.5 °C and 11.4% under global warming by 2.0 °C. At the global level, the market price for maize would increase by 0.7% and 3.4% under 1.5 °C scenario and 2.0 °C scenario, respectively, which would vary quite largely among di/fferent countries and regions. So, it is urgent for all countries to pay enough attention to the loss risk of maize yield and take actions of mitigation and adaptation to climate change. /T_he time le/f_t for changing our minds and actions is becoming less and less.", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed9.pdf" + }, + { + "text": "References\n40. Challinor, A. J., Koehler, A. K., Ramirez-Villegas, J., Whit/field, S. & Das, B. Current warming will reduce yields unless maize breeding and seed systems adapt immediately. Nat. Clim. Change 6 , 954-958 (2016).\n41. Cammarano, D. et al. Using historical climate observations to understand future climate change crop yield impacts in the Southeastern US. Clim. Change 134 , 311-326 (2016).\n42. Etten, J. V. et al. Crop variety management for climate adaptation supported by citizen science. PNAS 116 (10), 4194-4199 (2019).\n43. Urban, D. W., She/ffield, J. & Lobell, D. B. /T_he impacts of future climate and carbon dioxide changes on the average and variability of US maize yields under two emission scenarios. Environ. Res. Lett. 10 , 045003 (2015).\n44. IPCC. Summary for policymakers. In Global Warming of 1.5°C. An IPCC Special Report on the Impacts of Global Warming of 1.5°C Above Pre-industrial Levels and Related Global Greenhouse Gas Emission Pathways, in the Context of Strengthening the Global Response to the /T_hreat of Climate Change, Sustainable Development, and E/fforts to Eradicate Poverty 32 (World Meteorological Organization, 2018).\n45. Ruane, A. C., Goldberg, R. & Chryssanthacopoulos, J. Climate forcing datasets for agricultural modeling: Merged products for gap-/filling and historical climate series estimation. Agr. For. Meteorol. 200 , 233-248 (2015).\n46. Hempel, S., Frieler, K., Warszawski, L., Schewe, J. & Piontek, F. A trendpreserving bias correction-the ISI-MIP approach. Earth Syst. Dyn. 4 , 219-236 (2013).\n47. Monfreda, C., Ramankutty, N. & Foley, J. A. Farming the planet: 2. Geographic distribution of crop areas, yields, physiological types, and net primary production in the year 2000. Glob. Biogeochem. Cycles 22 , 1022 (2008).", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed9.pdf" + }, + { + "text": "Results\nFrom the results of simulated by the NorESM1-M model under RCP 4.5 scenario, the gross yield of maize in the world between 2060 and 2079 would decrease by 18.7% relative to 1986-2005. /T_he area is 41.7% of the whole maize planting regions in the world, in which the yield loss would be less than 50%. /T_he area is 15.6% of the whole maize planting regions, in which the yield loss would be more than 50%. /T_he area is 42.7% of the whole maize planting regions, in which the yield would increase. /T_he distribution of maize yield change is similar to that under global warming by 1.5 °C. From the results simulated by the GFDL-ESM2M model under RCP 6.0 scenario, the gross yield of maize in the world between 2065 and 2084 would decrease by 3% relative to 1986-2005. Comparing to the results of the NorESM1-M model, the regions of high yield loss rate are increasing, and the regions of yield increases are going down; but the per unit area yields are increasing quickly in the regions of yield increasing. So, the gross maize yield in the whole world simulated by the GFDL-ESM2M model is more than the NorESM1-M model. In a comprehensive perspective, under global warming by 2.0 °C, maize yield in the whole world would decrease 10.8% relative to 1986-2005 (Fig. 4). Compared to the results under global warming by 1.5 °C, the risk of yield loss is much higher. According to the new results from the Emission Gap Report in 2019, the target of global warming by 1.5 °C would not be implemented according to the reality of mitigation actions; the chance become much bigger for all countries in the world, who will be facing the severe challenge of global temperature rise of 2.0 °C or even higher (3.0 °C or 4.0 °C) in the future. So it is critical to cope with the serious condition\nͽ\nVol.:(0123456789)\nScientific Reports\n| (2022) 12:17268 |\nhttps://doi.org/ͷͶ.ͷͶ͹;/sͺͷͻͿ;-Ͷ͸͸-͸͸͸͸;-ͽ\nwww.nature.com/scientificreports/", + "page_start": 6, + "page_end": 7, + "source_file": "pubmed9.pdf" + }, + { + "text": "References\n24. Di/ffenbaugh, N. S., Hertel, T. W., Scherer, M. & Verma, M. Response of corn markets to climate volatility under alternative energy futures. Nat. Clim. Change 2 , 514-518 (2012).\n25. Jensen, H. G. & Anderson, K. Grain price spikes and beggar-thy-neighbor policy responses: A global economywide analysis. World Bank Econ. Rev. 31 , 158-175 (2017).\n26. Fraser, E. D. G., Simelton, E., Termansen, M., Gosling, S. N. & South, A. 'Vulnerability hotspots': Integrating socio-economic and hydrological models to identify where cereal production may decline in the future due to climate change induced drought. Agric. For. Meteorol. 170 , 195-205 (2013).\n27. Puma, M. J., Bose, S., Chon, S. Y. & Cook, B. I. Assessing the evolving fragility of the global food system. Environ. Res. Lett. 10 , 024007 (2015).\n28. Wheeler, T. & Braun, J. V. Climate change impacts on global food security. Science 341 (6145), 508-513 (2013).\n29. Lunt, T., Jones, A. W., Mulhern, W. S., Lezaks, D. P. M. & Jahn, M. M. Vulnerabilities to agricultural production shocks: An extreme, plausible scenario for assessment of risk for the insurance sector. Clim. Risk Manag. 13 , 1-9 (2016).\n30. Jägermeyr, J. & Frieler, K. Spatial variations in crop growing seasons pivotal to reproduce global /fluctuations in maize and wheat\nyields. Sci. Adv. 4 (11), eaat4517 (2018).\n31. Elliott, J. et al. Characterizing agricultural impacts of recent large-scale US droughts and changing technology and management. Agric. Syst. 159 , 275-281 (2017).", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed9.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed9.pdf", + "query": "What would be the price increase resulting from maize production changes due to 1.5°C and 2°C global temperature increase ?", + "target_page": 10, + "target_passage": "In response to production changes, the price of each commodity changes under both scenarios. At the global level, the market price for maize would increase by 0.7% and 3.4% under 1.5 °C scenario and 2.0 °C scenario, respectively", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Results\nIn response to production changes, the price of each commodity changes under both scenarios. At the global level, the market price for maize would increase by 0.7% and 3.4% under 1.5 °C scenario and 2.0 °C scenario, respectively, which would vary quite largely among di/fferent countries and regions under both climate change scenarios (Fig. 7). Particularly, the market price would increase by around 22% and 27% in Iran under 2.0 °C scenario and 1.5 °C scenario, respectively. Iran is also the region where the highest yield reduction is observed due to climate change. Market prices for maize in India, Mexico, Russia, South Africa and the Rest of Africa would decrease signi/ficantly under both scenarios, as their yields improve due to climate e/ffects. Along with the domestic production, the climate change will also induce changes in international trade of maize, resulting in changing levels of self-su/fficiency ratios (SSR) for each country/region. By SSR, we mean the ratio of domestically produced commodity, to the sum of net imports and domestic production. In our scenario analysis, generally, the countries that face positive e/ffects on yields and/or are relatively less dependent on imports, are positively (less negatively) a/ffected by climate change. For example, maize SSR for Ukraine, India, Russia and Mexico would improve under both scenarios (Fig. 8). Whereas the self-su/fficiency ratios of maize for Southeast Asia, Bangladesh and Iran will worsen under both scenarios. China's SSR for maize stays almost similar to the level as the baseline.", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed9.pdf" + }, + { + "text": "The impact of ͷ.ͻ °C and ͸.Ͷ °C global warming on global maize production and trade\nKuo Li ͷ * , Jie Pan ͷ , Wei Xiong ͸ , Wei Xie ͹ & Tariq Ali ͹\nClimate change is becoming more and more remarkable which has an obvious impact on crop yields all over the world. Future climate scenario data was simulated by ͻ climate models recommended by ISI-MIP under ͺ RCP scenarios, in which the approximate scenarios with global warming by ͷ.ͻ °C and ͸ °C were selected. Applying DSSAT and GTAP models, the per unit yield changes of maize in the world under global warming by ͷ.ͻ °C and ͸.Ͷ °C were analyzed and the market prices of maize at national and global levels were simulated. The results showed that, the risk of maize yield reduction under ͸.Ͷ °C scenario was much more serious than ͷ.ͻ °C scenario; the ratios of yield changes were separately Ͷ.ͷ;% and - ͷͶ.;% under ͷ.ͻ °C and ͸.Ͷ °C scenarios. The reduction trend of total maize production is obvious in the top five countries and the main producing regions of the world, especially under the ͸.Ͷ °C scenario. The market price of maize would increase by around Ͷ.ͽ% and ͹.ͺ% under ͷ.ͻ °C and ͸.Ͷ °C scenarios. With the quickly increasing population in the world, it is urgent for all countries to pay enough attention to the risk of maize yield and take actions of mitigation and adaptation to climate change.\nIn the past hundred years, the global climate has experienced great changes 1-4 . According to the sixth assessment report of IPCC, the global average surface temperature increased by 1.09 °C between 1850 and 2020, and almost all regions in the world experienced surface warming 5 . Due to global warming, the extreme climate events become more and more frequent, and the ecological environment problems caused by climate change are more and more serious, which restrict the sustainable development of human society and health 6-10 . Global warming has gradually changed from a scienti/fic issue to a major social issue of common concern to governments and people of all countries 11-13 . In 2016, nearly 200 parties of the United Nations Framework Convention on climate change reached the Paris Agreement at the climate change conference in Paris 14 . Paris Agreement has indicated and pursue e/fforts to limit the temperature increase to 1.5 °C above pre-industrial levels.", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed9.pdf" + }, + { + "text": "Discussion and conclusion\n/T_hirdly, there are relatively more researches on the prediction of climate change trend under the background of 1.5 °C and 2.0 °C; but the research on the impact assessment of the main grain crops including global trade in worldwide is few. In the meantime, we do not assess the e/ffect of future changes on agriculture, such as increases in farm productivity due to new technology. /T_he maize planting area in the future is assumed to be the same as the current situation of maize cultivation in the world.\nConclusion. According to the simulation results, the yield of maize under global warming by 2.0 °C would decrease between 3.0 and 18.7% in the worldwide relative to 1986-2005; the maize yield would /fluctuate between - 6.8 and 7.2% under global warming by 1.5 °C. From the spatial distribution, the gross maize yield in the top 5 high-yield countries (including the United States, China, Brazil, Argentina and Mexico) would decrease by 2% under global warming by 1.5 °C and 11.4% under global warming by 2.0 °C. At the global level, the market price for maize would increase by 0.7% and 3.4% under 1.5 °C scenario and 2.0 °C scenario, respectively, which would vary quite largely among di/fferent countries and regions. So, it is urgent for all countries to pay enough attention to the loss risk of maize yield and take actions of mitigation and adaptation to climate change. /T_he time le/f_t for changing our minds and actions is becoming less and less.", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed9.pdf" + }, + { + "text": "Discussion and conclusion\nDiscussion. Our analysis highlights the e/ffects of climate change on global- and regional-speci/fic maize yields and the associated economic consequences in 1.5 °C and 2.0 °C -warming scenarios. We /find that the reduction risk of maize yield under global warming by 2.0 °C is much more serious than that under global warming by 1.5 °C. On the one hand, the larger the temperature rise, the greater the evapotranspiration would be. Although the precipitation is also increasing, the evapotranspiration would become more intense. /T_he limitation of water supply for maize growth leads to the decline of yield. On the other hand, relative to global warming by 1.5 °C, maize production would be faced with more serious and frequent extreme climate events, such as drought and heat waves, which would increase the risk of corn yield reduction under global warming by 2.0 °C. In the\nͷͶ\nScientific Reports\n| (2022) 12:17268 |\nhttps://doi.org/ͷͶ.ͷͶ͹;/sͺͷͻͿ;-Ͷ͸͸-͸͸͸͸;-ͽ\nVol:.(1234567890)\nwww.nature.com/scientificreports/\nFigure 7. Price change on maize in main continents under global warming by 1.5 °C and 2.0 °C.\nFigure 8. Changes in Self-su/fficiency ratio of maize in main countries under global warming by 1.5 °C and 2.0 °C.\nmeantime, the huge di/fferences in yield changes in di/fferent regions provide a small chance for the world, especially under global warming by 1.5 °C. In the near future, if the global temperature can be e/ffectively controlled under 1.5 °C warming scenario, there would be an increase in the potential for maize yield in the worldwide. All regions and countries should take actions to reduce the yield loss risk. For the yield-increasing regions, the potentials of climate resources should be fully utilized to guarantee maize yield under future scenarios; for the yield-reducing regions, the targeted adaptation actions should be taken in advance under global warming by 1.5 °C and 2.0 °C.", + "page_start": 9, + "page_end": 10, + "source_file": "pubmed9.pdf" + }, + { + "text": "Results\nFigure 6. Yield loss rates on maize in 6 continents under global warming by 1.5 °C and 2.0 °C.\nMarket price of maize in main countries. In this study, we elaborate on the endogenous response of our economic models. /T_his response can be theoretically elaborated as: due to the e/ffect of climate change on yield reduction (improvement), the supply curve moves le/f_tward (rightward), reducing (increasing) production and raising (lowering) prices. In response, the consumers decrease (increase) their consumption of more expensive (cheaper) crops and shi/f_ting to other (increase the use of the same) crops. Producers, at the same time, respond by changing farm-level management practices and increasing (decreasing) the amount of acreage under these crops. At a global scale, the reallocation of production and consumption through international trade further alters climate change impacts on global agriculture. /T_his also alters the self-su/fficiency ratios of each country/ region due to climate change.", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed9.pdf" + }, + { + "text": "The impact of ͷ.ͻ °C and ͸.Ͷ °C global warming on global maize production and trade\nFigure 1. Changes of global temperature of 20 years moving average from 2020 to 2099 simulated by 5 ESMs under 4 RCP scenarios. Note: /T_he black horizontal dashed lines: global warming by 1.5 °C and 2.0 °C; the black vertical solid line: the years when global warming reaches 1.5 °C and 2.0 °C simulated by the selected models and scenarios.\nAlthough, so far there are plenty of research on the impacts of global warming by 1.5 °C temperature, including the impacts comparison of global warming by 1.5 °C versus 2.0 °C 44 . It is necessary to do more quantitative impacts assessments of global warming by 1.5 °C and 2.0 °C on crops yield and market price to address research gaps and support the requirement of the scienti/fic community and governments. In this paper, the future climate situations were selected and analyzed which are the approximate scenarios with global warming by 1.5 °C and 2.0 °C, based on the simulation results from 5 climate models recommended by ISI-MIP under 4 RCP scenarios. /T_hen the per unit yield changes of maize all over the world under global warming by 1.5 °C and 2.0 °C were analyzed and the spatial distributions of changes in maize yield were revealed relative to the baseline from 1985 to 2006, applying crop model DSSAT (Decision Support System for Agrotechnology Transfer). Next, we examine the e/ffects of the resulting maize production shocks in di/fferent countries; the market price of maize is simulated using GTAP to reveal the impacts of climate change on global crop trade. Finally, the future trend of maize yield and market price in the main breadbasket is assessed and the adaptation suggestions are put forward for maize cultivation.", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed9.pdf" + }, + { + "text": "Discussion and conclusion\nMeanwhile, the risk of price /fluctuations caused by global corn trade due to future climate change should be paid more attention to, especially for developing and undeveloped countries. In the view of supply and demand, the population would go up quickly in the next 30 years; the demand for maize would increase hugely; however, the supply of maize would go down in the future, especially under global warming by 2.0 °C; it would intensify the contradiction between supply and demand, which would threaten the food security and sustainable development in the whole world.\nIn this study, 5 climate models are selected, which are recommended by ISI-MIP (/T_he Inter-Sectoral Impact Model Intercomparison Project); compared with other climate models, the /five models could more e/ffectively support impact assessment in di/fferent sectors and provide more reliable results. Based on the simulation results\nͷͷ\nVol.:(0123456789)\nScientific Reports\n| (2022) 12:17268 |\nhttps://doi.org/ͷͶ.ͷͶ͹;/sͺͷͻͿ;-Ͷ͸͸-͸͸͸͸;-ͽ\nwww.nature.com/scientificreports/\nfrom 5 climate models under 4 RCP scenarios, the future climate situations were selected which are the approximate scenarios with global warming by 1.5 °C and 2.0 °C at the end of 21 century relative to pre-industrial levels; it could minimize the uncertainties of future climate data. /T_he inputs for DSSAT simulation include soil parameters, crop calendar data and management information are coped with carefully to improve the e/ffectiveness and reliability of maize yield simulation.", + "page_start": 10, + "page_end": 11, + "source_file": "pubmed9.pdf" + }, + { + "text": "Author contributions\nK.L. designed the framework of the article and analyzed the yield results and the maize price under future scenarios. J.P. simulated the climate data from 5 climate models recommended by ISI-MIP under 4 RCP scenarios. W.X. simulated the maize yields in whole world under di/fferent scenarios. W.X. simulated the market price of maize at national and global levels. T.A. helped the revision of language.", + "page_start": 13, + "page_end": 13, + "source_file": "pubmed9.pdf" + }, + { + "text": "Results\nFigure 4. Distribution of yield loss rates on maize in the world under global warming by 2.0 °C (up: NorESM1-M model, RCP 4.5; down: GFDL-ESM2M model, RCP 6.0). /T_he /figure has been generated using ArcGIS 10.2 and Natural Earth-Free vector and raster map data @ https:// natur alear thdata. com.\nsecurity of the whole world would still be attacked violently. /T_here are huge di/fferences among the continents; South America, Asia and the Middle East are threatened seriously by yield loss seriously under global warming by 1.5 °C. /T_he changes in maize yield in di/fferent regions would in/fluence the maize price and food trades. So, it should be cautious to cope with the maize changes under global warming by 1.5 °C.", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed9.pdf" + }, + { + "text": "Results\nFrom the view of continents, there are di/fferent trends of maize yield changes in the 6 continents (except Antarctica) under global warming by 1.5 °C and 2.0 °C (Fig. 6). From the results of simulated by CRESE-maize under global warming by 1.5 °C, the maize yield in 3 continents would decline apparently, including South America, Europe and Oceania; the average yield loss rates are respectively - 15.6%, - 12.4%, - 36.4%; in the other 3 continents the average maize yield would go up, especially in Africa more than 30%; the increasing trends are slight in Asia and North America, in which the yield increasing rates are separately 0.7% and 0.4%. However, the yield change trends simulated by IPSL-CM5A-LR and GFDL-ESM2M models are di/fferent in 2 continents, including Asia and North America. From the results of simulated by CRESE-maize under global warming by 2.0 °C, the maize yield in 5 continents would decline apparently, except Africa; the average yield loss rates are respectively - 7.9% (Asia), - 14.1% (North America), - 9.3% (South America), - 22.5% (Europe), - 25.5% (Oceania); only in Africa the average maize yield would go up also more than 30%; meanwhile the yield change trends simulated by IPSL-CM5A-LR and GFDL-ESM2M models are the same in each continent. Comparing the two global warming scenarios, there would be apparent variations in maize yield in Asia and North America, in which the annual maize yield accounts for a great proportion of the whole world, leading to a much more serious yield loss under global warming by 2.0 °C than that under global warming by 1.5 °C. /T_here would be an obvious crisis of food supply under global warming by 2.0 °C with the increasing population in the future. So, it is important to make full preparation for adaptation to climate change in the whole world.\nͿ\nVol.:(0123456789)\nScientific Reports\n| (2022) 12:17268 |\nhttps://doi.org/ͷͶ.ͷͶ͹;/sͺͷͻͿ;-Ͷ͸͸-͸͸͸͸;-ͽ\nwww.nature.com/scientificreports/", + "page_start": 8, + "page_end": 9, + "source_file": "pubmed9.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia1.pdf", + "query": "What is a formal fallacy ?", + "target_page": 8, + "target_passage": "For formal fallacies, the source of the error is found in the form of the argument", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Fallacies\nNot all arguments live up to the standards of correct reasoning. When they do not, they are usually referred to as fallacies. Their central aspect is not that their conclusion is false but that there is some flaw with the reasoning leading to this conclusion. [84] So the argument \"it is sunny today; therefore spiders have eight legs\" is fallacious even though the conclusion is true. Some theorists, like John Stuart Mill, give a more restrictive definition of fallacies by additionally requiring that they appear to be correct. [85] This way, genuine fallacies can be distinguished from mere mistakes of reasoning due to carelessness. This explains why people tend to commit fallacies: because they have an alluring element that seduces people into committing and accepting them. [86] However, this reference to appearances is controversial because it belongs to the field of psychology, not logic, and because appearances may be different for different people. [87]\nFallacies are usually divided into formal and informal fallacies. [38] For formal fallacies, the source of the error is found in the form of the argument. For example, denying the antecedent is one type of formal fallacy, as in \"if Othello is a bachelor, then he is male; Othello is not a bachelor; therefore Othello is not male\". [88] But most fallacies fall into the category of informal fallacies, of which a great variety is discussed in the academic literature. The source of their error is usually found in the content or the context of the argument. [89] Informal fallacies are sometimes categorized as fallacies of ambiguity, fallacies of presumption, or fallacies of relevance. For fallacies of ambiguity, the ambiguity and vagueness of natural language are\nYoung America's dilemma: Shall I be wise and great, or rich and powerful? (poster from 1901) This is an example of a false dilemma: an informal fallacy using a disjunctive premise that excludes viable alternatives.\nresponsible for their flaw, as in \"feathers are light; what is light cannot be dark; therefore feathers cannot be dark\". [90] Fallacies of presumption have a wrong or unjustified premise but may be valid otherwise. [91] In the case of fallacies of relevance, the premises do not support the conclusion because they are not relevant to it. [92]", + "page_start": 7, + "page_end": 7, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Informal\nInformal logic is usually carried out in a less systematic way. It often focuses on more specific issues, like investigating a particular type of fallacy or studying a certain aspect of argumentation. Nonetheless, some frameworks of informal logic have also been presented that try to provide a systematic characterization of the correctness of arguments. [141]\nThe pragmatic or dialogical approach to informal logic sees arguments as speech acts and not merely as a set of premises together with a conclusion. [142] As speech acts, they occur in a certain context, like a dialogue, which affects the standards of right and wrong arguments. [143] A prominent version by Douglas N. Walton understands a dialogue as a game between two players. The initial position of each player is characterized by the propositions to which they are committed and the conclusion they intend to prove. Dialogues are games of persuasion: each player has the goal of convincing the opponent of their own conclusion. [144] This is achieved by making arguments: arguments are the moves of the game. [145] They affect to which propositions the players are committed. A winning move is a successful argument that takes the opponent's commitments as premises and shows how one's own conclusion follows from them. This is usually not possible straight away. For this reason, it is normally necessary to formulate a sequence of arguments as intermediary steps, each of which brings the opponent a little closer to one's intended conclusion. Besides these positive arguments leading one closer to victory, there are also negative arguments preventing the opponent's victory by denying their conclusion. [144] Whether an argument is correct depends on whether it promotes the progress of the dialogue. Fallacies, on the other hand, are violations of the standards of proper argumentative rules. [146] These standards also depend on the type of dialogue. For example, the standards governing the scientific discourse differ from the standards in business negotiations. [147]", + "page_start": 12, + "page_end": 12, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Logic\nLogic is the study of correct reasoning. It includes both formal and informal logic. Formal logic is the study of deductively valid inferences or logical truths. It examines how conclusions follow from premises based on the structure of arguments alone, independent of their topic and content. Informal logic is associated with informal fallacies, critical thinking, and argumentation theory. Informal logic examines arguments expressed in natural language whereas formal logic uses formal language. When used as a countable noun, the term \"a logic\" refers to a specific logical formal system that articulates a proof system. Logic plays a central role in many fields, such as philosophy, mathematics, computer science, and linguistics.\nLogic studies valid forms of inference like modus ponens .\nLogic studies arguments, which consist of a set of premises that leads to a conclusion. An example is the argument from the premises \"it's Sunday\" and \"if it's Sunday then I don't have to work\" leading to the conclusion \"I don't have to work\". [1] Premises and conclusions express propositions or claims that can be true or false. An important feature of propositions is their internal structure. For example, complex propositions are made up of simpler propositions linked by logical vocabulary like (and) or (if...then). Simple propositions also have parts, like \"Sunday\" or \"work\" in the example. The truth of a proposition usually depends on the meanings of all of its parts. However, this is not the case for logically true propositions. They are true only because of their logical structure independent of the specific meanings of the individual parts.", + "page_start": 0, + "page_end": 0, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Informal logic\nA further approach is to define informal logic as the study of informal fallacies. [37] Informal fallacies are incorrect arguments in which errors are present in the content and the context of the argument. [38] A false dilemma, for example, involves an error of content by excluding viable options. This is the case in the fallacy \"you are either with us or against us; you are not with us; therefore, you are against us\". [39] Some theorists state that formal logic studies the general form of arguments while informal logic studies particular instances of arguments. Another approach is to hold that formal logic only considers the role of\nlogical constants for correct inferences while informal logic also takes the meaning of substantive concepts into account. Further approaches focus on the discussion of logical topics with or without formal devices and on the role of epistemology for the assessment of arguments. [40]", + "page_start": 2, + "page_end": 3, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Formal logic\nFormal logic is also known as symbolic logic and is widely used in mathematical logic. It uses a formal approach to study reasoning: it replaces concrete expressions with abstract symbols to examine the logical form of arguments independent of their concrete content. In this sense, it is topic-neutral since it is only concerned with the abstract structure of arguments and not with their concrete content. [10]\nFormal logic is interested in deductively valid arguments, for which the truth of their premises ensures the truth of their conclusion. This means that it is impossible for the premises to be true and the conclusion to be false. [11] For valid arguments, the logical structure of the premises and the conclusion follows a pattern called a rule of inference. [12] For example, modus ponens is a rule of inference according to which all arguments of the form \"(1) p , (2) if p then q , (3) therefore q \" are valid, independent of what the terms p and q stand for. [13] In this sense, formal logic can be defined as the science of valid inferences. An alternative definition sees logic as the study of logical truths. [14] A proposition is logically true if its truth depends only on the logical vocabulary used in it. This means that it is true in all possible worlds and under all interpretations of its non-logical terms, like the claim \"either it is raining, or it is not\". [15] These two definitions of formal logic are not identical, but they are closely related. For example, if the inference from p to q is deductively valid then the claim \"if p then q \" is a logical truth. [16]\nFormal logic uses formal languages to express and analyze arguments. [17] They normally have a very limited vocabulary and exact syntactic rules. These rules specify how their symbols can be combined to construct sentences, so-called well-formed formulas. [18] This simplicity and exactness of formal logic make it capable of formulating precise rules of inference. They determine whether a given argument is valid. [19] Because of the reliance on formal language, natural language arguments cannot be studied directly. Instead, they need to be translated into formal language before their validity can be assessed. [20]", + "page_start": 1, + "page_end": 1, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Informal\nThe epistemic approach to informal logic, on the other hand, focuses on the epistemic role of arguments. [148] It is based on the idea that arguments aim to increase our knowledge. They achieve this by linking justified beliefs to beliefs that are not yet justified. [149] Correct arguments succeed at expanding knowledge while fallacies are epistemic failures: they do not justify the belief in their conclusion. [150] For example, the fallacy of begging the question is a fallacy because it fails to provide independent justification for its conclusion, even though it is deductively valid. [151] In this sense, logical normativity consists in epistemic success or rationality. [149] The Bayesian approach is one example of an epistemic approach. [152] Central to Bayesianism is not just whether the agent believes something but the degree to which they believe it, the so-called credence . Degrees of belief are seen as subjective probabilities in the believed proposition, i.e. how certain the agent is that the proposition is true. [153] On this view, reasoning can be interpreted as a process of changing one's credences, often in reaction to new\nincoming information. [154] Correct reasoning and the arguments it is based on follow the laws of probability, for example, the principle of conditionalization. Bad or irrational reasoning, on the other hand, violates these laws. [155]", + "page_start": 12, + "page_end": 13, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Arguments and inferences\nLogic is commonly defined in terms of arguments or inferences as the study of their correctness. [59] An argument is a set of premises together with a conclusion. [60] An inference is the process of reasoning from these premises to the conclusion. [43] But these terms are often used interchangeably in logic. Arguments are correct or incorrect depending on whether their premises support their conclusion. Premises and conclusions, on the other hand, are true or false depending on whether they are in accord with reality. In formal logic, a sound argument is an argument that is both correct and has only true premises. [61] Sometimes a distinction is made between simple and complex arguments. A complex\nargument is made up of a chain of simple arguments. This means that the conclusion of one argument acts as a premise of later arguments. For a complex argument to be successful, each link of the chain has to be successful. [43]\nArguments and inferences are either correct or incorrect. If they are correct then their premises support their conclusion. In the incorrect case, this support is missing. It can take different forms corresponding to the different types of reasoning. [62] The strongest form of support corresponds to deductive reasoning. But even arguments that are not deductively valid may still be good arguments because their premises offer nondeductive support to their conclusions. For such cases, the term ampliative or inductive reasoning is used. [63] Deductive arguments are associated with formal logic in contrast to the\nArgument terminology used in logic\nrelation between ampliative arguments and informal logic. [64]", + "page_start": 4, + "page_end": 5, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Informal logic\nFormal logic needs to translate natural language arguments into a formal language, like first-order logic, to assess whether they are valid. In this example, the letter \"c\" represents Carmen while the letters \"M\" and \"T\" stand for \"Mexican\" and \"teacher\". The symbol \" ∧ \" has the meaning of \"and\".\nWhen understood in a wide sense, logic encompasses both formal and informal logic. [24] Informal logic uses non-formal criteria and standards to analyze and assess the correctness of arguments. Its main focus is on everyday discourse. [25] Its development was prompted by difficulties in applying the insights of formal logic to natural language arguments. [26] In this regard, it considers problems that formal logic on its own is unable to address. [27] Both provide criteria for assessing the correctness of arguments and distinguishing them from fallacies. [28]\nMany characterizations of informal logic have been suggested but there is no general agreement on its precise definition. [29] The most literal approach sees the terms \"formal\" and \"informal\" as applying to the language used to express arguments. On this view, informal logic studies arguments that are in informal or natural language. [30] Formal logic can only examine them indirectly by translating them first into a formal language while informal logic investigates them in their original form. [31] On this view, the argument \"Birds fly. Tweety is a bird. Therefore, Tweety flies.\" belongs to natural language and is examined by informal logic. But the formal translation \"(1) ; (2) ; (3) \" is studied by formal logic. [32] The study of natural language arguments comes with various difficulties. For example, natural language expressions are often ambiguous, vague, and context-dependent. [33] Another approach defines informal logic in a wide sense as the normative study of the standards, criteria, and procedures of argumentation. In this sense, it includes questions about the role of rationality, critical thinking, and the psychology of argumentation. [34]\nAnother characterization identifies informal logic with the study of non-deductive arguments. In this way, it contrasts with deductive reasoning examined by formal logic. [35] Non-deductive arguments make their conclusion probable but do not ensure that it is true. An example is the inductive argument from the empirical observation that \"all ravens I have seen so far are black\" to the conclusion \"all ravens are black\". [36]", + "page_start": 2, + "page_end": 2, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Citations\n20. Hintikka & Sandu 2006, pp. 22-3; Magnus 2005, pp. 8-9, 1.4 Deductive validity; Johnson 1999, p. 267.\n21. Haack 1978, pp. 1-2, 4, Philosophy of logics; Hintikka & Sandu 2006, pp. 16-17; Jacquette 2006, Introduction: Philosophy of logic today, pp. 1-12.\n22. Haack 1978, pp. 1-2, 4, Philosophy of logics; Jacquette 2006, pp. 1-12, Introduction: Philosophy of logic today.\n23. Haack 1978, pp. 5-7, 9, Philosophy of logics; Hintikka & Sandu 2006, pp. 31-2; Haack 1996, pp. 229-30.\n24. Haack 1978, pp. 1-10, Philosophy of logics; Groarke 2021, lead section; 1.1 Formal and Informal Logic.\n25. Johnson 2014, pp. 228-9.\n26. Groarke 2021, lead section; 1. History; Audi 1999a, Informal logic; Johnson 1999, pp. 265274.\n27. Craig 1996, Formal and informal logic; Johnson 1999, p. 267.\n28. Blair & Johnson 2000, pp. 93-97; Craig 1996, Formal and informal logic.\n29. Johnson 1999, pp. 265-270; van Eemeren et al., pp. 1-45, Informal Logic.\n30. Groarke 2021, 1.1 Formal and Informal Logic; Audi 1999a, Informal logic; Honderich 2005, logic, informal.\n31. Blair & Johnson 2000, pp. 93-107; Groarke 2021, lead section; 1.1 Formal and Informal Logic; van Eemeren et al., p. 169.\n32. Oaksford & Chater 2007, p. 47.\n33. Craig 1996, Formal and informal logic; Walton 1987, pp. 2-3, 6-8, 1. A new model of argument; Engel 1982, pp. 59-92, 2. The medium of language.\n34. Blair & Johnson 1987, pp. 147-51.\n35. Falikowski & Mills 2022, p. 98; Weddle 2011, pp. 383-8, 36. Informal logic and the eductiveinductive distinction; Blair 2011, p. 47.", + "page_start": 19, + "page_end": 19, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Definitory and strategic rules\nThe main focus of most logicians is to study the criteria according to which an argument is correct or incorrect. A fallacy is committed if these criteria are violated. In the case of formal logic, they are known as rules of inference . [93] They are definitory rules, which determine whether an inference is correct or which inferences are allowed. Definitory rules contrast with strategic rules. Strategic rules specify which inferential moves are necessary to reach a given conclusion based on a set of premises. This distinction does not just apply to logic but also to games. In chess, for example, the definitory rules dictate that bishops may only move diagonally. The strategic rules, on the other hand, describe how the allowed\nmoves may be used to win a game, for instance, by controlling the center and by defending one's king. [94] It has been argued that logicians should give more emphasis to strategic rules since they are highly relevant for effective reasoning. [93]", + "page_start": 7, + "page_end": 8, + "source_file": "wikipedia1.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia1.pdf", + "query": "In early Chinese philosophy, what were the major influences regarding the philosophy of logic ?", + "target_page": 18, + "target_passage": "In Chinese philosophy, the School of Names and Mohism were particularly influential", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "History\nDuring the Middle Ages, many translations and interpretations of Aristotelian logic were made. The works of Boethius were particularly influential. Besides translating Aristotle's work into Latin, he also produced textbooks on logic. [195] Later, the works of Islamic philosophers such as Ibn Sina and Ibn Rushd (Averroes) were drawn on. This expanded the range of ancient works available to medieval Christian scholars since more Greek work was available to Muslim scholars that had been preserved in Latin commentaries. In 1323, William of Ockham's influential Summa Logicae was released. It is a comprehensive treatise on logic that discusses many basic concepts of logic and provides a systematic exposition of types of propositions and their truth conditions. [196]\nIn Chinese philosophy, the School of Names and Mohism were particularly influential. The School of Names focused on the use of language and on paradoxes. For example, Gongsun Long proposed the white horse paradox, which defends the thesis that a white horse is not a horse. The school of Mohism also acknowledged the importance of language for logic and tried to relate the ideas in these fields to the realm of ethics. [197]\nIn India, the study of logic was primarily pursued by the schools of Nyaya, Buddhism, and Jainism. It was not treated as a separate academic discipline and discussions of its topics usually happened in the context of epistemology and theories of dialogue or argumentation. [198] In Nyaya, inference is understood as a source of knowledge (pramā ṇ a). It follows the perception of an object and tries to arrive at conclusions, for example, about the cause of this object. [199] A similar emphasis on the relation to epistemology is also found in Buddhist and Jainist schools of logic, where inference is used to expand the knowledge gained through other sources. [200] Some of the later theories of Nyaya, belonging to the Navya-Nyāya school, resemble modern forms of logic, such as Gottlob Frege's distinction between sense and reference and his definition of number. [201]", + "page_start": 16, + "page_end": 17, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Bibliography\nRošker, Jana S. (May 2015). \"Classical Chinese Logic: Philosophy Compass\". Philosophy Compass . 10 (5): 301-309. doi:10.1111/phc3.12226 (https://doi.org/10.1111%2Fphc3.1222 6).\nRunco, Mark A.; Pritzker, Steven R. (1999). Encyclopedia of Creativity . Academic Press. p. 155. ISBN 978-0-12-227075-8.\nRush, Penelope (2014). \"Introduction\". The Metaphysics of Logic (https://philpapers.org/rec/ RUSTMO-4). Cambridge University Press. pp. 1-10. ISBN 978-1-107-03964-3. Archived (htt ps://web.archive.org/web/20211207184954/https://philpapers.org/rec/RUSTMO-4) from the original on 7 December 2021. Retrieved 8 January 2022.\nSadegh-Zadeh, Kazem (2015). Handbook of Analytic Philosophy of Medicine . Springer. p. 983. ISBN 978-94-017-9579-1.\nSagüillo, José M. (2014). \"Hintikka on Information and Deduction\". Teorema: Revista Internacional de Filosofía . 33 (2): 75-88. ISSN 0210-1602 (https://search.worldcat.org/issn/ 0210-1602). JSTOR 43047609 (https://www.jstor.org/stable/43047609).\nSarukkai, Sundar; Chakraborty, Mihir Kumar (2022). Handbook of Logical Thought in India . Springer Nature. pp. 117-8. ISBN 978-81-322-2577-5.\nSchagrin, Morton L. \"Metalogic\" (https://www.britannica.com/topic/metalogic). Encyclopædia Britannica . Retrieved 23 September 2022.\nSchechter, Joshua. \"Epistemology of Logic - Bibliography\" (https://philpapers.org/browse/ep istemology-of-logic). PhilPapers . Retrieved 11 September 2022.", + "page_start": 34, + "page_end": 34, + "source_file": "wikipedia1.pdf" + }, + { + "text": "History\nLogic was developed independently in several cultures during antiquity. One major early contributor was Aristotle, who developed term logic in his Organon and Prior Analytics . [183] He was responsible for the introduction of the hypothetical syllogism [184] and temporal modal logic. [185] Further innovations include inductive logic [186] as well as the discussion of new logical concepts such as terms, predicables, syllogisms, and propositions. Aristotelian logic was highly regarded in classical and medieval times, both in Europe and the Middle East. It remained in wide use in the West until the early 19th century. [187] It has now been superseded by later work, though many of its key insights are still present in modern systems of logic. [188]\nIbn Sina (Avicenna) was the founder of Avicennian logic, which replaced Aristotelian logic as the dominant system of logic in the Islamic world. [189] It influenced Western medieval writers such as Albertus Magnus and William of Ockham. [190] Ibn Sina wrote on the hypothetical syllogism [191] and on the propositional calculus. [192] He developed an original \"temporally modalized\" syllogistic theory, involving temporal logic and modal logic. [193] He also made use of inductive logic, such as his methods of agreement, difference, and concomitant variation, which are critical to the scientific method. [191] Fakhr al-Din al-Razi was another influential Muslim logician. He criticized Aristotelian syllogistics and formulated an early system of inductive logic, foreshadowing the system of inductive logic developed by John Stuart Mill. [194]", + "page_start": 15, + "page_end": 16, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Citations\n172. Daintith & Wright 2008, Logic Gate (https://www.encyclopedia.com/computing/dictionaries-th esauruses-pictures-and-press-releases/logic-gate).\n173. Janssen & Zimmermann 2021, pp. 3-4; Partee 2016; King 2009, pp. 557-8; Aloni & Dekker 2016, pp. 22-23 (https://books.google.com/books?id=ltSgDAAAQBAJ&pg=PT22).\n174. Warren 2020, 6. The Epistemology of Logic; Schechter.\n175. Warren 2020, 6. The Epistemology of Logic.\n176. Schechter.\n177. Gómez-Torrente 2019.\n178. Warren 2020, 6. The Epistemology of Logic; Gómez-Torrente 2019; Warren 2020, 1. What is Conventionalism.\n179. Chua 2017, pp. 631-636; Wilce 2021; Putnam 1969, pp. 216-241.\n180. Lagerlund 2018.\n181. Spade & Panaccio 2019.\n182. Haaparanta 2009, pp. 4-6 (https://books.google.com/books?id=0jXavKsArnIC&pg=PA4), 1. Introduction; Hintikka & Spade, Modern logic, Logic since 1900.\n183. Kline 1972, \"A major achievement of Aristotle was the founding of the science of logic\", p. 53; Łukasiewicz 1957, p. 7; Liu & Guo 2023, p. 15.\n184. Lear 1980, p. 34.\n185. Knuuttila 1980, p. 71; Fisher, Gabbay & Vila 2005, p. 119.\n186. Berman 2009, p. 133.\n187. Frede; Groarke.\n188. Ewald 2019; Smith 2022.\n189. Hasse 2008; Lagerlund 2018.\n190. Washell 1973, pp. 445-50; Kneale & Kneale 1962, pp. 229, 266.\n191. Goodman 2003, p. 155.\n192. Goodman 1992, p. 188.\n193. Hintikka & Spade, Arabic Logic (https://www.britannica.com/topic/history-of-logic/Medieval-lo gic#ref65928).", + "page_start": 23, + "page_end": 23, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Bibliography\nWilbanks, Jan J. (1 March 2010). \"Defining Deduction, Induction, and Validity\" (https://link.sp ringer.com/article/10.1007/s10503-009-9131-5). Argumentation . 24 (1): 107-124. doi:10.1007/s10503-009-9131-5 (https://doi.org/10.1007%2Fs10503-009-9131-5). ISSN 1572-8374 (https://search.worldcat.org/issn/1572-8374). S2CID 144481717 (https://ap i.semanticscholar.org/CorpusID:144481717). Archived (https://web.archive.org/web/202201 08171721/https://link.springer.com/article/10.1007/s10503-009-9131-5) from the original on 8 January 2022. Retrieved 8 January 2022.\nWilce, Alexander (2021). \"Quantum Logic and Probability Theory: 2.1 Realist Quantum Logic\" (https://plato.stanford.edu/entries/qt-quantlog/#RealQuanLogi). The Stanford Encyclopedia of Philosophy . Metaphysics Research Lab, Stanford University. Retrieved 11 March 2023.\nWile, Bruce; Goss, John; Roesner, Wolfgang (2005). Comprehensive Functional Verification: The Complete Industry Cycle . Elsevier. p. 447. ISBN 978-0-08-047664-3.\nWillman, Marshall D. (2022). \"Logic and Language in Early Chinese Philosophy\" (https://plat o.stanford.edu/entries/chinese-logic-language/). The Stanford Encyclopedia of Philosophy . Metaphysics Research Lab, Stanford University. Introduction. Retrieved 11 March 2023.", + "page_start": 36, + "page_end": 36, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Bibliography\nHartmann, Stephan; Sprenger, Jan (2010). \"Bayesian Epistemology\". The Routledge Companion to Epistemology (https://philpapers.org/rec/BOVSIO). London: Routledge. pp. 609-620. ISBN 978-0-415-96219-3. Archived (https://web.archive.org/web/2021051609 5047/https://philpapers.org/rec/BOVSIO) from the original on 16 May 2021. Retrieved 4 January 2022.\nHasse, Dag Nikolaus (2008). \"Influence of Arabic and Islamic Philosophy on the Latin West\" (https://plato.stanford.edu/entries/arabic-islamic-influence/). The Stanford Encyclopedia of Philosophy . Metaphysics Research Lab, Stanford University. Retrieved 19 July 2023.\nHawthorne, James (2021). \"Inductive Logic\" (https://plato.stanford.edu/entries/logic-inductiv e/). The Stanford Encyclopedia of Philosophy . Metaphysics Research Lab, Stanford University. Archived (https://web.archive.org/web/20220121081805/https://plato.stanford.ed u/entries/logic-inductive/) from the original on 21 January 2022. Retrieved 6 January 2022.\nHintikka, Jaakko J. (2019). \"Philosophy of logic\" (https://www.britannica.com/topic/philosoph y-of-logic). Encyclopædia Britannica . Archived (https://web.archive.org/web/2015042810173 2/http://www.britannica.com/EBchecked/topic/346240/philosophy-of-logic) from the original on 28 April 2015. Retrieved 21 November 2021.", + "page_start": 29, + "page_end": 29, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Bibliography\nChua, Eugene (2017). \"An Empirical Route to Logical 'Conventionalism' \" (https://philpapers. org/rec/CHUAER). Logic, Rationality, and Interaction . Lecture Notes in Computer Science. Vol. 10455. pp. 631-636. doi:10.1007/978-3-662-55665-8_43 (https://doi.org/10.1007%2F9 78-3-662-55665-8_43). ISBN 978-3-662-55664-1.\nClocksin, William F.; Mellish, Christopher S. (2003). \"The Relation of Prolog to Logic\" (http s://link.springer.com/chapter/10.1007/978-3-642-55481-0_10). Programming in Prolog: Using the ISO Standard . Springer. pp. 237-257. doi:10.1007/978-3-642-55481-0_10 (http s://doi.org/10.1007%2F978-3-642-55481-0_10). ISBN 978-3-642-55481-0.\nCook, Roy T. (2009). Dictionary of Philosophical Logic . Edinburgh University Press. p. 124. ISBN 978-0-7486-3197-1.\nCopi, Irving M.; Cohen, Carl; Rodych, Victor (2019). Introduction to Logic . Routledge. ISBN 978-1-351-38697-5.\nCorkum, Philip (2015). \"Generality and Logical Constancy\". Revista Portuguesa de Filosofia . 71 (4): 753-767. doi:10.17990/rpf/2015_71_4_0753 (https://doi.org/10.17990%2Fr pf%2F2015_71_4_0753). ISSN 0870-5283 (https://search.worldcat.org/issn/0870-5283). JSTOR 43744657 (https://www.jstor.org/stable/43744657).", + "page_start": 26, + "page_end": 26, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Bibliography\nMcKeon, Matthew. \"Logical Consequence\" (https://iep.utm.edu/logcon/). Internet Encyclopedia of Philosophy . Archived (https://web.archive.org/web/20211112071437/https:// iep.utm.edu/logcon/) from the original on 12 November 2021. Retrieved 20 November 2021.\nMichaelson, Eliot; Reimer, Marga (2019). \"Reference\" (https://plato.stanford.edu/entries/refe rence/). The Stanford Encyclopedia of Philosophy . Metaphysics Research Lab, Stanford University. Archived (https://web.archive.org/web/20211207184705/https://plato.stanford.ed u/entries/reference/) from the original on 7 December 2021. Retrieved 4 December 2021.\nMills, Ethan (2018). Three Pillars of Skepticism in Classical India: Nagarjuna, Jayarasi, and Sri Harsa . Rowman & Littlefield. p. 121. ISBN 978-1-4985-5570-8. \"... for Nyāya all inference is ultimately rooted in perception ... Naiyāyikas typically accept four means of knowledge: perception, inference, comparison, and testimony.\"\nMonk, J. Donald (1976). \"Introduction\" (https://link.springer.com/chapter/10.1007/978-1-468 4-9452-5_1). Mathematical Logic . Springer. pp. 1-9. doi:10.1007/978-1-4684-9452-5_1 (http s://doi.org/10.1007%2F978-1-4684-9452-5_1). ISBN 978-1-4684-9452-5. Archived (https://w eb.archive.org/web/20220109131251/https://link.springer.com/chapter/10.1007/978-1-46849452-5_1) from the original on 9 January 2022. Retrieved 9 January 2022.", + "page_start": 32, + "page_end": 32, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Definition\nThe word \"logic\" originates from the Greek word logos , which has a variety of translations, such as reason, discourse, or language. [4] Logic is traditionally defined as the study of the laws of thought or correct reasoning, [5] and is usually understood in terms of inferences or arguments. Reasoning is the activity of drawing inferences. Arguments are the outward expression of inferences. [6] An argument is a set of premises together with a conclusion. Logic is interested in whether arguments are correct, i.e. whether their premises support the conclusion. [7] These general characterizations apply to logic in the widest sense, i.e., to both formal and informal logic since they are both concerned with assessing the correctness of arguments. [8] Formal logic is the traditionally dominant field, and some logicians restrict logic to formal logic. [9]", + "page_start": 1, + "page_end": 1, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Classical\nClassical logic is distinct from traditional or Aristotelian logic. It encompasses propositional logic and first-order logic. It is \"classical\" in the sense that it is based on basic logical intuitions shared by most logicians. [117] These intuitions include the law of excluded middle, the double negation elimination, the principle of explosion, and the bivalence of truth. [118] It was originally developed to analyze mathematical arguments and was only later applied to other fields as well. Because of this focus on\nmathematics, it does not include logical vocabulary relevant to many other topics of philosophical importance. Examples of concepts it overlooks are the contrast between necessity and possibility and the problem of ethical obligation and permission. Similarly, it does not address the relations between past, present, and future. [119] Such issues are addressed by extended logics. They build on the basic intuitions of classical logic and expand it by introducing new logical vocabulary. This way, the exact logical approach is applied to fields like ethics or epistemology that lie beyond the scope of mathematics. [120]", + "page_start": 9, + "page_end": 10, + "source_file": "wikipedia1.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia1.pdf", + "query": "What is considered a deductively valid argument regarding logic ?", + "target_page": 6, + "target_passage": "A deductively valid argument is one whose premises guarantee the truth of its conclusion", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Deductive\nA deductively valid argument is one whose premises guarantee the truth of its conclusion. [11] For instance, the argument \"(1) all frogs are amphibians; (2) no cats are amphibians; (3) therefore no cats are frogs\" is deductively valid. For deductive validity, it does not matter whether the premises or the conclusion are actually true. So the argument \"(1) all frogs are mammals; (2) no cats are mammals; (3) therefore no cats are frogs\" is also valid because the conclusion follows necessarily from the premises. [65]\nAccording to an influential view by Alfred Tarski, deductive arguments have three essential features: (1) they are formal, i.e. they depend only on the form of the premises and the conclusion; (2) they are a priori, i.e. no sense experience is needed to determine whether they obtain; (3) they are modal, i.e. that they hold by logical necessity for the given propositions, independent of any other circumstances. [66]\nBecause of the first feature, the focus on formality, deductive inference is usually identified with rules of inference. [67] Rules of inference specify the form of the premises and the conclusion: how they have to be structured for the inference to be valid. Arguments that do not follow any rule of inference are deductively invalid. [68] The modus ponens is a prominent rule of inference. It has the form \" p ; if p , then q ; therefore q \". [69] Knowing that it has just rained ( ) and that after rain the streets are wet ( ), one can use modus ponens to deduce that the streets are wet ( ). [70]\nThe third feature can be expressed by stating that deductively valid inferences are truth-preserving: it is impossible for the premises to be true and the conclusion to be false. [71] Because of this feature, it is often asserted that deductive inferences are uninformative since the conclusion cannot arrive at new information not already present in the premises. [72] But this point is not always accepted since it would mean, for example, that most of mathematics is uninformative. A different characterization distinguishes", + "page_start": 5, + "page_end": 5, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Arguments and inferences\nLogic is commonly defined in terms of arguments or inferences as the study of their correctness. [59] An argument is a set of premises together with a conclusion. [60] An inference is the process of reasoning from these premises to the conclusion. [43] But these terms are often used interchangeably in logic. Arguments are correct or incorrect depending on whether their premises support their conclusion. Premises and conclusions, on the other hand, are true or false depending on whether they are in accord with reality. In formal logic, a sound argument is an argument that is both correct and has only true premises. [61] Sometimes a distinction is made between simple and complex arguments. A complex\nargument is made up of a chain of simple arguments. This means that the conclusion of one argument acts as a premise of later arguments. For a complex argument to be successful, each link of the chain has to be successful. [43]\nArguments and inferences are either correct or incorrect. If they are correct then their premises support their conclusion. In the incorrect case, this support is missing. It can take different forms corresponding to the different types of reasoning. [62] The strongest form of support corresponds to deductive reasoning. But even arguments that are not deductively valid may still be good arguments because their premises offer nondeductive support to their conclusions. For such cases, the term ampliative or inductive reasoning is used. [63] Deductive arguments are associated with formal logic in contrast to the\nArgument terminology used in logic\nrelation between ampliative arguments and informal logic. [64]", + "page_start": 4, + "page_end": 5, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Citations\n20. Hintikka & Sandu 2006, pp. 22-3; Magnus 2005, pp. 8-9, 1.4 Deductive validity; Johnson 1999, p. 267.\n21. Haack 1978, pp. 1-2, 4, Philosophy of logics; Hintikka & Sandu 2006, pp. 16-17; Jacquette 2006, Introduction: Philosophy of logic today, pp. 1-12.\n22. Haack 1978, pp. 1-2, 4, Philosophy of logics; Jacquette 2006, pp. 1-12, Introduction: Philosophy of logic today.\n23. Haack 1978, pp. 5-7, 9, Philosophy of logics; Hintikka & Sandu 2006, pp. 31-2; Haack 1996, pp. 229-30.\n24. Haack 1978, pp. 1-10, Philosophy of logics; Groarke 2021, lead section; 1.1 Formal and Informal Logic.\n25. Johnson 2014, pp. 228-9.\n26. Groarke 2021, lead section; 1. History; Audi 1999a, Informal logic; Johnson 1999, pp. 265274.\n27. Craig 1996, Formal and informal logic; Johnson 1999, p. 267.\n28. Blair & Johnson 2000, pp. 93-97; Craig 1996, Formal and informal logic.\n29. Johnson 1999, pp. 265-270; van Eemeren et al., pp. 1-45, Informal Logic.\n30. Groarke 2021, 1.1 Formal and Informal Logic; Audi 1999a, Informal logic; Honderich 2005, logic, informal.\n31. Blair & Johnson 2000, pp. 93-107; Groarke 2021, lead section; 1.1 Formal and Informal Logic; van Eemeren et al., p. 169.\n32. Oaksford & Chater 2007, p. 47.\n33. Craig 1996, Formal and informal logic; Walton 1987, pp. 2-3, 6-8, 1. A new model of argument; Engel 1982, pp. 59-92, 2. The medium of language.\n34. Blair & Johnson 1987, pp. 147-51.\n35. Falikowski & Mills 2022, p. 98; Weddle 2011, pp. 383-8, 36. Informal logic and the eductiveinductive distinction; Blair 2011, p. 47.", + "page_start": 19, + "page_end": 19, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Notes\na. However, there are some forms of logic, like imperative logic, where this may not be the case. [42]\nb. Conductive arguments present reasons in favor of a conclusion without claiming that the reasons are strong enough to decisively support the conclusion.", + "page_start": 18, + "page_end": 18, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Logic\nArguments can be either correct or incorrect. An argument is correct if its premises support its conclusion. Deductive arguments have the strongest form of support: if their premises are true then their conclusion must also be true. This is not the case for ampliative arguments, which arrive at genuinely new information not found in the premises. Many arguments in everyday discourse and the sciences are ampliative arguments. They are divided into inductive and abductive arguments. Inductive arguments are statistical generalization-such as inferring that all ravens are black, based on many individual observations of black ravens. [2] Abductive arguments are inferences to the best explanation-for example, when a doctor concludes that a patient has a certain disease, as the best explanation for the symptoms that they are observed to suffer. [3] Arguments that fall short of the standards of correct reasoning often embody fallacies. Systems of logic are theoretical frameworks for assessing the correctness of arguments.\nLogic has been studied since antiquity. Early approaches include Aristotelian logic, Stoic logic, Nyaya, and Mohism. Aristotelian logic focuses on reasoning in the form of syllogisms. It was considered the main system of logic in the Western world until it was replaced by modern formal logic, which has its roots in the work of late 19th-century mathematicians such as Gottlob Frege. Today, the most commonly used system is classical logic. It consists of propositional logic and first-order logic. Propositional logic only considers logical relations between full propositions. First-order logic also takes the internal parts of\npropositions into account, like predicates and quantifiers. Extended logics accept the basic intuitions behind classical logic and apply it to other fields, such as metaphysics, ethics, and epistemology. Deviant logics, on the other hand, reject certain classical intuitions and provide alternative explanations of the basic laws of logic.", + "page_start": 0, + "page_end": 1, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Logic\nLogic is the study of correct reasoning. It includes both formal and informal logic. Formal logic is the study of deductively valid inferences or logical truths. It examines how conclusions follow from premises based on the structure of arguments alone, independent of their topic and content. Informal logic is associated with informal fallacies, critical thinking, and argumentation theory. Informal logic examines arguments expressed in natural language whereas formal logic uses formal language. When used as a countable noun, the term \"a logic\" refers to a specific logical formal system that articulates a proof system. Logic plays a central role in many fields, such as philosophy, mathematics, computer science, and linguistics.\nLogic studies valid forms of inference like modus ponens .\nLogic studies arguments, which consist of a set of premises that leads to a conclusion. An example is the argument from the premises \"it's Sunday\" and \"if it's Sunday then I don't have to work\" leading to the conclusion \"I don't have to work\". [1] Premises and conclusions express propositions or claims that can be true or false. An important feature of propositions is their internal structure. For example, complex propositions are made up of simpler propositions linked by logical vocabulary like (and) or (if...then). Simple propositions also have parts, like \"Sunday\" or \"work\" in the example. The truth of a proposition usually depends on the meanings of all of its parts. However, this is not the case for logically true propositions. They are true only because of their logical structure independent of the specific meanings of the individual parts.", + "page_start": 0, + "page_end": 0, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Definition\nThe word \"logic\" originates from the Greek word logos , which has a variety of translations, such as reason, discourse, or language. [4] Logic is traditionally defined as the study of the laws of thought or correct reasoning, [5] and is usually understood in terms of inferences or arguments. Reasoning is the activity of drawing inferences. Arguments are the outward expression of inferences. [6] An argument is a set of premises together with a conclusion. Logic is interested in whether arguments are correct, i.e. whether their premises support the conclusion. [7] These general characterizations apply to logic in the widest sense, i.e., to both formal and informal logic since they are both concerned with assessing the correctness of arguments. [8] Formal logic is the traditionally dominant field, and some logicians restrict logic to formal logic. [9]", + "page_start": 1, + "page_end": 1, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Formal logic\nFormal logic is also known as symbolic logic and is widely used in mathematical logic. It uses a formal approach to study reasoning: it replaces concrete expressions with abstract symbols to examine the logical form of arguments independent of their concrete content. In this sense, it is topic-neutral since it is only concerned with the abstract structure of arguments and not with their concrete content. [10]\nFormal logic is interested in deductively valid arguments, for which the truth of their premises ensures the truth of their conclusion. This means that it is impossible for the premises to be true and the conclusion to be false. [11] For valid arguments, the logical structure of the premises and the conclusion follows a pattern called a rule of inference. [12] For example, modus ponens is a rule of inference according to which all arguments of the form \"(1) p , (2) if p then q , (3) therefore q \" are valid, independent of what the terms p and q stand for. [13] In this sense, formal logic can be defined as the science of valid inferences. An alternative definition sees logic as the study of logical truths. [14] A proposition is logically true if its truth depends only on the logical vocabulary used in it. This means that it is true in all possible worlds and under all interpretations of its non-logical terms, like the claim \"either it is raining, or it is not\". [15] These two definitions of formal logic are not identical, but they are closely related. For example, if the inference from p to q is deductively valid then the claim \"if p then q \" is a logical truth. [16]\nFormal logic uses formal languages to express and analyze arguments. [17] They normally have a very limited vocabulary and exact syntactic rules. These rules specify how their symbols can be combined to construct sentences, so-called well-formed formulas. [18] This simplicity and exactness of formal logic make it capable of formulating precise rules of inference. They determine whether a given argument is valid. [19] Because of the reliance on formal language, natural language arguments cannot be studied directly. Instead, they need to be translated into formal language before their validity can be assessed. [20]", + "page_start": 1, + "page_end": 1, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Bibliography\nRathjen, Michael; Sieg, Wilfried (2022). \"Proof Theory\" (https://plato.stanford.edu/entries/pro of-theory/). The Stanford Encyclopedia of Philosophy . Metaphysics Research Lab, Stanford University. Retrieved 4 March 2023.\nRautenberg, Wolfgang (1 July 2010). A Concise Introduction to Mathematical Logic . Springer. p. 15. ISBN 978-1-4419-1221-3.\nRendsvig, Rasmus; Symons, John (2021). \"Epistemic Logic\" (https://plato.stanford.edu/entri es/logic-epistemic/). The Stanford Encyclopedia of Philosophy . Metaphysics Research Lab, Stanford University. Retrieved 11 March 2023.\nRestall, Greg; Standefer, Shawn (2023). Logical Methods . MIT Press. p. 91. ISBN 978-0262-54484-9.\nRichardson, Alan W. (1998). Carnap's Construction of the World: The Aufbau and the Emergence of Logical Empiricism . Cambridge University Press. p. 15. ISBN 978-0-52143008-1.\nRini, Adriane (13 December 2010). Aristotle's Modal Proofs: Prior Analytics A8-22 in Predicate Logic . Springer Science & Business Media. p. 26. ISBN 978-94-007-0050-5.\nRitola, Juho (1 December 2008). \"Walton's Informal Logic: A Pragmatic Approach\" (https://d oi.org/10.22329%2Fil.v28i4.2856). Informal Logic . 28 (4): 335. doi:10.22329/il.v28i4.2856 (h ttps://doi.org/10.22329%2Fil.v28i4.2856).\nRocci, Andrea (8 March 2017). Modality in Argumentation: A Semantic Investigation of the Role of Modalities in the Structure of Arguments with an Application to Italian Modal Expressions . Springer. p. 26. ISBN 978-94-024-1063-1.", + "page_start": 33, + "page_end": 34, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Citations\n60. Blackburn 2008, argument; Stairs 2017, p. 343.\n61. Copi, Cohen & Rodych 2019, p. 30 (https://books.google.com/books?id=38bADwAAQBAJ& pg=PA30).\n62. Hintikka & Sandu 2006, p. 20; Backmann 2019, pp. 235-255; IEP Staff.\n63. Hintikka & Sandu 2006, p. 16; Backmann 2019, pp. 235-255; IEP Staff.\n64. Groarke 2021, 1.1 Formal and Informal Logic; Weddle 2011, pp. 383-8, 36. Informal logic and the eductive-inductive distinction; van Eemeren & Garssen 2009, p. 191.\n65. Evans 2005, 8. Deductive Reasoning, p. 169 (https://books.google.com/books?id=znbkHaC 8QeMC&pg=PA169).\n66. McKeon.\n67. Hintikka & Sandu 2006, pp. 13-4.\n68. Hintikka & Sandu 2006, pp. 13-4; Blackburn 2016, rule of inference.\n69. Blackburn 2016, rule of inference.\n70. Dick & Müller 2017, p. 157.\n71. Hintikka & Sandu 2006, p. 13; Backmann 2019, pp. 235-255; Douven 2021.\n72. Hintikka & Sandu 2006, p. 14; D'Agostino & Floridi 2009, pp. 271-315.\n73. Hintikka & Sandu 2006, p. 14; Sagüillo 2014, pp. 75-88; Hintikka 1970, pp. 135-152.\n74. Hintikka & Sandu 2006, pp. 13-6; Backmann 2019, pp. 235-255; IEP Staff.\n75. Rocci 2017, p. 26; Hintikka & Sandu 2006, pp. 13, 16; Douven 2021.\n76. IEP Staff; Douven 2021; Hawthorne 2021.\n77. IEP Staff; Hawthorne 2021; Wilbanks 2010, pp. 107-124.\n78. Douven 2021.\n79. Groarke 2021, 4.1 AV Criteria; Possin 2016, pp. 563-593.", + "page_start": 20, + "page_end": 20, + "source_file": "wikipedia1.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed8.pdf", + "query": "What was the mean correctness score for LLM-generated handoff notes ?", + "target_page": 7, + "target_passage": "Correctness 4.52", + "chunk_present": { + "presence": true, + "index": 4 + } + }, + "top_chunk": [ + { + "text": "Discussion\nThe study demonstrated success in generating EM-to-IP handoff notes using both a fine tuned, pretrained LLM and rule-based approaches within an end user-developed note template. It is important to note that (largely due to time constraints within the EM care delivery model) the performance of EM-to-IP handoff notes was not the current standard of care in EM. The study site's unique electronic handoff process enabled a comparison between physician-written and LLM-generated handoff notes. Traditional automated evaluations of the model output suggested\nTable 3. Mean Clinical Quality Evaluation, Large Language Model (LLM)-Generated and Physician-Written", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed8.pdf" + }, + { + "text": "Abstract\nRESULTS In this study of 1600 EM patient records (832 [52%] female and mean [SD] age of 59.9 [18.9] years), LLM-generated handoff notes, compared with physician-written ones, had higher ROUGE(0.322 vs 0.088), BERTScore (0.859 vs 0.796), and SCALE scores (0.691 vs 0.456), indicating the LLM-generated summaries exhibited greater similarity and more detail. As reviewed by 3 board-certified EM physicians, a subsample of 50 LLM-generated summaries had a mean (SD) usefulness score of 4.04 (0.86) out of 5 (compared with 4.36 [0.71] for physician-written) and mean (SD) patient safety scores of 4.06 (0.86) out of 5 (compared with 4.50 [0.56] for physician-written). None of the LLM-generated summaries were classified as a critical patient safety risk.\nCONCLUSIONSANDRELEVANCE In this cohort study of 1600 EM patient medical records, LLM-generated EM-to-IP handoff notes were determined superior compared with physician-written summaries via conventional automated evaluation methods, but marginally inferior in usefulness\n(continued)\nOpenAccess. This is an open access article distributed under the terms of the CC-BY License.\nJAMANetwork Open. 2024;7(12):e2448723. doi:10.1001/jamanetworkopen.2024.48723\n(Reprinted)\nDecember 3, 2024\n1/12\nDownloaded from jamanetwork.com by guest on 01/13/2025", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed8.pdf" + }, + { + "text": "KeyPoints\nQuestion Can a large language model (LLM) generate emergency medicine (EM)-to-inpatient (IP) handoff notes that are useful and safe for EM care?\nFindings In this cohort study of 1600 EMpatient medical records using a novel evaluation framework, the LLM-generated EM-to-IP handoff notes had a mean usefulness of 4.04 out of 5 (compared with 4.36 for physician-written) and a mean patient safety of 4.06 out of 5 (compared with 4.50 for physician-written) with no critical patient safety risks.\nMeaning These findings suggest the value of a manual, patient safetyfocused clinical evaluation of LLM models and the potential of LLM-generated handoff notes to create a new standard of care in EM.\n+\nInvited Commentary", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed8.pdf" + }, + { + "text": "Abstract\nIMPORTANCE An emergency medicine (EM) handoff note generated by a large language model (LLM) has the potential to reduce physician documentation burden without compromising the safety of EM-to-inpatient (IP) handoffs.\nOBJECTIVE To develop LLM-generated EM-to-IP handoff notes and evaluate their accuracy and safety compared with physician-written notes.\nDESIGN, SETTING, AND PARTICIPANTS This cohort study used EM patient medical records with acute hospital admissions that occurred in 2023 at NewYork-Presbyterian/Weill Cornell Medical Center. A customized clinical LLM pipeline was trained, tested, and evaluated to generate templated EM-to-IP handoff notes. Using both conventional automated methods (ie, recall-oriented understudy for gisting evaluation [ROUGE], bidirectional encoder representations from transformers score [BERTScore], and source chunking approach for large-scale inconsistency evaluation [SCALE]) and a novel patient safety-focused framework, LLM-generated handoff notes vs physician-written notes were compared. Data were analyzed from October 2023 to March 2024.\nEXPOSURE LLM-generated EM handoff notes.\nMAINOUTCOMESANDMEASURES LLM-generated handoff notes were evaluated for (1) lexical similarity with respect to physician-written notes using ROUGE and BERTScore; (2) fidelity with respect to source notes using SCALE; and (3) readability, completeness, curation, correctness, usefulness, and implications for patient safety using a novel framework.", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed8.pdf" + }, + { + "text": "Discussion\nTable 3. Mean Clinical Quality Evaluation, Large Language Model (LLM)-Generated and Physician-Written\n1-5, No. (%) a.5 = 107 (71.3). Correctness, LLM-generated..Mean score (SD) = 4.52 (0.64). Correctness, LLM-generated.Likert rating 1-5, No. (%) a.1 = 0. Correctness, LLM-generated.Likert rating 1-5, No. (%) a.2 = 0. Correctness, LLM-generated.Likert rating 1-5, No. (%) a.3 = 13 (8.7). Correctness, LLM-generated.Likert rating 1-5, No. (%) a.4 = 39 (26). Correctness, LLM-generated.Likert rating 1-5, No. (%) a.5 = 98 (65.3). Correctness, Physician-written..Mean score (SD) = 4.90 (0.39). Correctness, Physician-written.Likert rating 1-5, No. (%) a.1 = 0. Correctness, Physician-written.Likert rating 1-5, No. (%) a.2 = 0. Correctness, Physician-written.Likert rating 1-5, No. (%) a.3 = 2 (1.3). Correctness, Physician-written.Likert rating 1-5, No. (%) a.4 = 12 (8). Correctness, Physician-written.Likert rating 1-5, No. (%) a.5 = 136 (90.7). Usefulness, LLM-generated..Mean score (SD) = 4.04 (0.86). Usefulness, LLM-generated.Likert rating 1-5, No. (%) a.1 = 0. Usefulness, LLM-generated.Likert rating 1-5, No. (%) a.2 = 12 (8). Usefulness, LLM-generated.Likert rating 1-5, No. (%) a.3 = 30 (20). Usefulness, LLM-generated.Likert rating 1-5, No. (%) a.4 = 59 (39.3). Usefulness,", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed8.pdf" + }, + { + "text": "Discussion\nTable 4. Mean Clinical Safety Evaluation, Large Language Model (LLM)-Generated and Physician-Written\nscore 1-5, No. (%) a.1 = 0. Correctness: faulty logic, Physician-written.Likert score 1-5, No. (%) a.2 = 0. Correctness: faulty logic, Physician-written.Likert score 1-5, No. (%) a.3 = 2 (1.3). Correctness: faulty logic, Physician-written.Likert score 1-5, No. (%) a.4 = 2 (1.3). Correctness: faulty logic, Physician-written.Likert score 1-5, No. (%) a.5 = 146 (97.3). Correctness: bias, LLM-generated..Mean (SD) = 5.00. Correctness: bias, LLM-generated.Likert score 1-5, No. (%) a.1 = 0. Correctness: bias, LLM-generated.Likert score 1-5, No. (%) a.2 = 0. Correctness: bias, LLM-generated.Likert score 1-5, No. (%) a.3 = 0. Correctness: bias, LLM-generated.Likert score 1-5, No. (%) a.4 = 0. Correctness: bias, LLM-generated.Likert score 1-5, No. (%) a.5 = 150 (100). Correctness: bias, Physician-written.Mean (SD).Mean (SD) = 5.00. Correctness: bias, Physician-written.Likert score 1-5, No. (%) a.1 = 0. Correctness: bias, Physician-written.Likert score 1-5, No. (%) a.2 = 0. Correctness: bias, Physician-written.Likert score 1-5, No. (%) a.3 = 0. Correctness: bias, Physician-written.Likert score 1-5, No. (%) a.4 = 0. Correctness: bias, Physician-written.Likert score 1-5, No. (%) a.5 = 150 (100). Overall safety risk, LLM-generated..Mean (SD) = 4.06", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed8.pdf" + }, + { + "text": "JAMANetworkOpen | EmergencyMedicine\nDeveloping and Evaluating LLM-Generated Emergency Medicine Handoff Notes", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed8.pdf" + }, + { + "text": "Discussion\nTable 4. Mean Clinical Safety Evaluation, Large Language Model (LLM)-Generated and Physician-Written\n1-5, No. (%) a.5 = 140 (93.3). Correctness: hallucination, LLM-generated..Mean (SD) = 4.96 (0.14). Correctness: hallucination, LLM-generated.Likert score 1-5, No. (%) a.1 = 0. Correctness: hallucination, LLM-generated.Likert score 1-5, No. (%) a.2 = 0. Correctness: hallucination, LLM-generated.Likert score 1-5, No. (%) a.3 = 0. Correctness: hallucination, LLM-generated.Likert score 1-5, No. (%) a.4 = 5 (3.3). Correctness: hallucination, LLM-generated.Likert score 1-5, No. (%) a.5 = 145 (96.7). Correctness: hallucination, Physician-written.Mean (SD).Mean (SD) = 5.00. Correctness: hallucination, Physician-written.Likert score 1-5, No. (%) a.1 = 0. Correctness: hallucination, Physician-written.Likert score 1-5, No. (%) a.2 = 0. Correctness: hallucination, Physician-written.Likert score 1-5, No. (%) a.3 = 0. Correctness: hallucination, Physician-written.Likert score 1-5, No. (%) a.4 = 0. Correctness: hallucination, Physician-written.Likert score 1-5, No. (%) a.5 = 150 (100). Correctness: knowledge gap, LLM-generated..Mean (SD) = 4.88 (0.48). Correctness: knowledge gap, LLM-generated.Likert score 1-5, No. (%) a.1 = 0. Correctness: knowledge gap, LLM-generated.Likert score 1-5, No. (%) a.2 = 3 (2). Correctness: knowledge gap, LLM-generated.Likert score 1-5, No. (%)", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed8.pdf" + }, + { + "text": "Discussion\nTable 4. Mean Clinical Safety Evaluation, Large Language Model (LLM)-Generated and Physician-Written\na.3 = 2 (1.3). Correctness: knowledge gap, LLM-generated.Likert score 1-5, No. (%) a.4 = 6 (4). Correctness: knowledge gap, LLM-generated.Likert score 1-5, No. (%) a.5 = 139 (92.7). Correctness: knowledge gap, Physician-written.Mean (SD).Mean (SD) = 4.90 (0.42). Correctness: knowledge gap, Physician-written.Likert score 1-5, No. (%) a.1 = 0. Correctness: knowledge gap, Physician-written.Likert score 1-5, No. (%) a.2 = 1 (0.7). Correctness: knowledge gap, Physician-written.Likert score 1-5, No. (%) a.3 = 5 (3.3). Correctness: knowledge gap, Physician-written.Likert score 1-5, No. (%) a.4 = 3 (2). Correctness: knowledge gap, Physician-written.Likert score 1-5, No. (%) a.5 = 141 (94). Correctness: faulty logic, LLM-generated..Mean (SD) = 4.60 (0.75). Correctness: faulty logic, LLM-generated.Likert score 1-5, No. (%) a.1 = 0. Correctness: faulty logic, LLM-generated.Likert score 1-5, No. (%) a.2 = 11 (7.3). Correctness: faulty logic, LLM-generated.Likert score 1-5, No. (%) a.3 = 12 (8). Correctness: faulty logic, LLM-generated.Likert score 1-5, No. (%) a.4 = 13 (8.7). Correctness: faulty logic, LLM-generated.Likert score 1-5, No. (%) a.5 = 114 (76). Correctness: faulty logic, Physician-written.Mean (SD).Mean (SD) = 4.94 (0.24). Correctness: faulty logic, Physician-written.Likert", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed8.pdf" + }, + { + "text": "Conclusions\nThis study's results suggest promise for future thoughtful integration of LLM-generated EM-to-IP handoff notes into clinical admission workflows, as well as the associated potential downstream quality and efficiency gains. Our novel clinical evaluation framework demonstrates an effective preimplementation strategy to measure potential patient safety implications of incorrectness identified in LLM-generated clinical care summaries, which will guide future model refinement and implementation strategies. In the absence of a current written standard of care in EM, this innovation could represent a transformative advancement in the quality of EM-to-IP transitions of care.", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed8.pdf" + } + ] + }, + { + "references": { + "source_file": "legal1_opengouvernementlicense.pdf", + "query": "What are the improvements made to possible to the HadGEM3 and CMIP5 climate change models by UKCP18 ?", + "target_page": 1, + "target_passage": "mprovements include better representation of the past climate, the inclusion of more cloud and aerosol processes and the ability to model important climate phenomena ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "What improvements does UKCP18 deliver?\nUKCP18 will benefit from a range of developments since the release of UKCP09, including:\n· Greater understanding of user needs as a result of the adaptation community's use of UKCP09 projections and the subsequent feedback - user workshops indicated that users supported the continued use of probabilistic projections and the importance of spatially coherent information 4 .\n· Advances in climate models in recent years, such as the Met Office Hadley Centre HadGEM3 5 model and the CMIP5 6 set of models. Improvements include better representation of the past climate, the inclusion of more cloud and aerosol processes and the ability to model important climate phenomena such as the El-Niño Southern Oscillation (ENSO).\n· Groundbreaking Met Office research on modelling of extreme events in high resolution regional climate models 7 .\n· The increased quantity and range of observations available since 2009.\n· Use of the new Met Office supercomputer, enabling a credible range of climate projections to be generated in greater spatial detail.\n1 The 2008 Climate Change Act allows UK government to mandate or invite certain organisations to produce reports to assess the impacts of climate change on their operations and present proposals for adaptation. https://www.gov.uk/government/collections/climate-changeadaptationreporting-second-round-reports\n2 Expected in 2018, the National Adaptation Programme will be supported by the Evidence Report of the Adaptation Sub-Committee of the Committee on Climate Change (ASC): https://www.theccc.org.uk/uk-climate-change-risk-assessment-2017/introduction-to-the-ccra/ 3 Under the 2008 Climate Change Act, organisations are invited to produce Adaptation Reporting Power reports to assess the impacts of climate change on their operations and present proposals for adaptation: https://www.gov.uk/government/collections/climate-change-adaptation-", + "page_start": 0, + "page_end": 0, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "(a) Global climate simulations at 1.5 ° Cand2 ° Cglobalwarming\nThe high-resolution simulations were performed using the HadGEM3A Global Atmosphere (GA) 3.0 model [12-14] at a resolution of N216 (0.556° of latitude by 0.833° of longitude with gridboxes of approx. 60 km length in mid-latitudes). This is the atmospheric component of the HadGEM3-GC2 coupled climate model [15,16], which is part of the HadGEM3 family of climate models [12]. This represents the third generation of HadGEM configurations, leading on from the HadGEM2 family of climate model configurations [13] which was used for CMIP5. Key improvements over the previous model, HadGEM2, include increased vertical levels in the atmosphere (85 compared to 38) and substantial changes to the model dynamics (ENDGame) [17]. This version of the HadGEM3 model lies in the transition from CMIP5 to CMIP6 versions. The Met Office is currently operationally running the coupled HadGEM3-GC2 model at N216 resolution for seasonal and decadal forecasting and clear benefits are emerging from this use at higher resolution [18,19].", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed11.pdf" + }, + { + "text": "(e) Correcting biases in climate model output and implications for de/fining levels of global warming\nTable 3. Time of reaching GWLs of 1.5 ° Cand2 ° C in the raw output from the HadGEM3 climate simulations, driven by di/fferent sets of CMIP5 sea-surface temperatures. The dates are the centre year of a 20-year period for which the climate data are applied to the calculation of the ClimPACT indices.\n.........................................................................................................................................................................................................., 2 = 2055. HadGEM2-ES", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed11.pdf" + }, + { + "text": "(a) Climate-change impacts at 2 ° Cglobalwarming\nTable 4. Time of reaching GWLs of 1.5 ° Cand2 ° C in each bias-corrected output from the HadGEM3 climate simulations, driven by di/fferent sets of CMIP5 sea-surface temperatures. The dates are the centre year of a 20 year period for which the climate data is applied to the HCVI calculation and JULES simulations.\n= 2019. HadGEM2-ES .........................................................................................................................................................................................................., 2 = 2033. IPSL-CM5A-MR", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed11.pdf" + }, + { + "text": "(e) Correcting biases in climate model output and implications for de/fining levels of global warming\nTable 3. Time of reaching GWLs of 1.5 ° Cand2 ° C in the raw output from the HadGEM3 climate simulations, driven by di/fferent sets of CMIP5 sea-surface temperatures. The dates are the centre year of a 20-year period for which the climate data are applied to the calculation of the ClimPACT indices.\n.........................................................................................................................................................................................................., 1 = 2027. HadGEM2-ES", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed11.pdf" + }, + { + "text": "(e) Correcting biases in climate model output and implications for de/fining levels of global warming\nTable 3. Time of reaching GWLs of 1.5 ° Cand2 ° C in the raw output from the HadGEM3 climate simulations, driven by di/fferent sets of CMIP5 sea-surface temperatures. The dates are the centre year of a 20-year period for which the climate data are applied to the calculation of the ClimPACT indices.", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed11.pdf" + }, + { + "text": "(e) Correcting biases in climate model output and implications for de/fining levels of global warming\nTable 3. Time of reaching GWLs of 1.5 ° Cand2 ° C in the raw output from the HadGEM3 climate simulations, driven by di/fferent sets of CMIP5 sea-surface temperatures. The dates are the centre year of a 20-year period for which the climate data are applied to the calculation of the ClimPACT indices.\n.........................................................................................................................................................................................................., 1 = 2020. IPSL-CM5A-MR", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed11.pdf" + }, + { + "text": "(e) Correcting biases in climate model output and implications for de/fining levels of global warming\nTable 3. Time of reaching GWLs of 1.5 ° Cand2 ° C in the raw output from the HadGEM3 climate simulations, driven by di/fferent sets of CMIP5 sea-surface temperatures. The dates are the centre year of a 20-year period for which the climate data are applied to the calculation of the ClimPACT indices.\n.........................................................................................................................................................................................................., 2 = 2039. IPSL-CM5A-MR", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed11.pdf" + }, + { + "text": "(e) Correcting biases in climate model output and implications for de/fining levels of global warming\nTable 3. Time of reaching GWLs of 1.5 ° Cand2 ° C in the raw output from the HadGEM3 climate simulations, driven by di/fferent sets of CMIP5 sea-surface temperatures. The dates are the centre year of a 20-year period for which the climate data are applied to the calculation of the ClimPACT indices.\n.........................................................................................................................................................................................................., 2 = 2030. GFDL-ESM2M", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed11.pdf" + }, + { + "text": "(e) Correcting biases in climate model output and implications for de/fining levels of global warming\nTable 3. Time of reaching GWLs of 1.5 ° Cand2 ° C in the raw output from the HadGEM3 climate simulations, driven by di/fferent sets of CMIP5 sea-surface temperatures. The dates are the centre year of a 20-year period for which the climate data are applied to the calculation of the ClimPACT indices.\n.........................................................................................................................................................................................................., 1 = 2023. MIROC-ESM-CHEM", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed11.pdf" + } + ] + }, + { + "references": { + "source_file": "legal1_opengouvernementlicense.pdf", + "query": "Which causes of the rise of sea level will be considered by UKCP18 ?", + "target_page": 2, + "target_passage": "Sea-level rise projections will extend to 2100 and will include contributions from glaciers, ice sheets, freshwater reservoirs, groundwater and thermal expansion", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Sea level rise. Storm surge. Past event case studies.\nSea-level rise projections will extend to 2100 and will include contributions from glaciers, ice sheets, freshwater reservoirs, groundwater and thermal expansion. Outputs will include an estimate of the year-to-year changes in sea level rise and a 'plausible but highly unlikely' scenario known as H++. A new feature of UKCP18 will be assessing the credibility of making sea level rise projections to 2300. The projections will use the latest information from the CMIP5 models and application of the methods used in the Intergovernmental Panel on Climate Change's (IPCC) Fifth Assessment Report 10 .\nThe UKCP09 storm surge projections will be updated to provide new estimates of the change in high water levels over the 21st Century. These estimates will be based on a combination of projected mean sea level change and projections of change in the extremes due to changes in atmospheric storminess. These 'storminess' projections will use the same surge model used in operational weather forecasting, using the wind and pressure from the CMIP5 ensemble to drive the surge. New understanding of the modification of large-scale sea level change signals as they pass from the open ocean onto the shelf sea around the UK will be incorporated into the UKCP18 marine projections. UKCP18 will also include storm surge historical case studies derived from applying plausible future sea level change to historical extreme events.\n8 The latest update can be found at http://www.metoffice.gov.uk/climate/uk/about/state-of-climate\n9 http://www.nationalarchives.gov.uk/doc/open-government-licence/version/3/\n10 https://www.ipcc.ch/report/ar5/", + "page_start": 1, + "page_end": 1, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "What can users expect from UKCP18?\nThere are three components to UKCP18: observations of historic climate, marine projections and projections over land. These components are described below and summarised in Table 1. UKCP18 will provide each of these components at a higher spatial and temporal resolution than UKCP09 and with more information on different types of uncertainty.", + "page_start": 1, + "page_end": 1, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "What is UKCP18 and why do we need it?\nFollowing the historic Paris Agreement on Climate Change in December 2015, the Department of Environment, Food and Rural Affairs announced a major upgrade to the UK Climate Projections.\nThe UKCP18 project will build upon the current set of projections (UKCP09) to provide the most up-todate assessment of how the climate of the UK may change over the 21st century. This information will be essential to future Climate Change Risk Assessments 1 and to equip the UK with information to help adapt to the challenges and opportunities of climate change in line with the National Adaptation Programme 2 .\nOrganisations and individual users will use UKCP18 to inform risk assessments and adaptation plans to ensure they are resilient to extreme weather and climate change. Some organisations will use UKCP18 in responding to the Adaptation Reporting Power 3 for example.", + "page_start": 0, + "page_end": 0, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "What improvements does UKCP18 deliver?\nUKCP18 will benefit from a range of developments since the release of UKCP09, including:\n· Greater understanding of user needs as a result of the adaptation community's use of UKCP09 projections and the subsequent feedback - user workshops indicated that users supported the continued use of probabilistic projections and the importance of spatially coherent information 4 .\n· Advances in climate models in recent years, such as the Met Office Hadley Centre HadGEM3 5 model and the CMIP5 6 set of models. Improvements include better representation of the past climate, the inclusion of more cloud and aerosol processes and the ability to model important climate phenomena such as the El-Niño Southern Oscillation (ENSO).\n· Groundbreaking Met Office research on modelling of extreme events in high resolution regional climate models 7 .\n· The increased quantity and range of observations available since 2009.\n· Use of the new Met Office supercomputer, enabling a credible range of climate projections to be generated in greater spatial detail.\n1 The 2008 Climate Change Act allows UK government to mandate or invite certain organisations to produce reports to assess the impacts of climate change on their operations and present proposals for adaptation. https://www.gov.uk/government/collections/climate-changeadaptationreporting-second-round-reports\n2 Expected in 2018, the National Adaptation Programme will be supported by the Evidence Report of the Adaptation Sub-Committee of the Committee on Climate Change (ASC): https://www.theccc.org.uk/uk-climate-change-risk-assessment-2017/introduction-to-the-ccra/ 3 Under the 2008 Climate Change Act, organisations are invited to produce Adaptation Reporting Power reports to assess the impacts of climate change on their operations and present proposals for adaptation: https://www.gov.uk/government/collections/climate-change-adaptation-", + "page_start": 0, + "page_end": 0, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "Author for correspondence:\nRichard A. Betts\ne-mail: richard.betts@meto/ffice.gov.uk\nChanges in climate extremes, fresh water availability and vulnerability to food insecurity projected at 1.5 ° C and 2 ° C global warming with a higher-resolution global climate model\nRichard A. Betts 1,2 , Lorenzo Al/fieri 3 , Catherine Bradshaw 2 ,JohnCaesar 2 ,LucFeyen 3 ,Pierre Friedlingstein 4 , Laila Gohar 2 , Aristeidis Koutroulis 5 , Kirsty Lewis 2 , Catherine Morfopoulos 1 , Lamprini Papadimitriou 5,6 ,KatyJ.Richardson 2 , Ioannis Tsanis 5 and Klaus Wyser 7\n1 College of Life and Environmental Sciences, University of Exeter, Exeter EX4 4PS, UK\n2 Met O/ffice Hadley Centre, FitzRoy Road, Exeter EX1 3PB, UK 3 European Commission - Joint Research Centre, 21027 Ispra, Italy\n4 College of Engineering, Mathematics and Physical Sciences, University of Exeter, Exeter EX4 4QE, UK\n5 School of Environmental Engineering, Technical University of Crete-TUC, Chania 73100, Greece\n6 Cran/field Water Science Institute, Cran/field University, Cran/field MK43 0AL, UK\n7 Rossby Centre, SMHI, 601 76 Norrköping, Sweden\nRAB, 0000-0002-4929-0307\nWe projected changes in weather extremes, hydrological impacts and vulnerability to food insecurity at global warming of 1.5°C and 2°C relative to pre-industrial, using a new global atmospheric general circulation model HadGEM3A-GA3.0 driven by patterns of sea-surface temperatures and sea ice from selected members of the 5th Coupled\n2018 The Authors. Published by the Royal Society under the terms of the Creative Commons Attribution License http://creativecommons.org/licenses/ by/4.0/, which permits unrestricted use, provided the original author and source are credited.", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed11.pdf" + }, + { + "text": "Summary of expected outputs\nTable 1 below indicates the likely dimensions of the outputs for each of the components as of July 2017.\nCharacteristics, Observations (UK State of the Climate) = Observed trends; long-term climatologies; weather events for the preceding year. Characteristics, Marine and coastal projections = Updated sea level rise and surge projections based on operational storm surge model (CS3) using CMIP5, EURO-CORDEX‡. Characteristics, Land.Global projections = Ensemble of ~20 spatially coherent time series of the Met Office Hadley Centre model and a similar number of CMIP5 models. Characteristics, Land.Probabilistic projections = Updated probability density functions presented as 30- year and monthly time series based on Met Office models (HadCM3, ESPPE) and CMIP5. Characteristics, Land.High resolution projections = Downscaled projections over the UK for ~10 spatially coherent time series. 2.2 km model provides realistic information on heavy rainfall events. Characteristics, Land.High resolution projections = Downscaled projections over the UK for ~10 spatially coherent time series. 2.2 km model provides realistic information on heavy rainfall events. Scale, Observations (UK State of the Climate) = UK. Scale, Marine and coastal projections = UK. Scale, Land.Global projections = Global. Scale, Land.Probabilistic projections = UK. Scale, Land.High resolution projections = UK. Scale, Land.High resolution projections = UK. Spatial resolution*, Observations (UK State of the Climate) = To match land projections. Spatial resolution*, Marine and coastal projections = UK Coastline †. Spatial resolution*, Land.Global projections = 60km. Spatial resolution*, Land.Probabilistic projections = 25km. Spatial resolution*, Land.High resolution projections = 12km +. Spatial resolution*, Land.High resolution projections = 2.2km. Highest temporal resolution, Observations (UK State of the Climate) = Daily / monthly. Highest temporal resolution, Marine and coastal projections = Annual. Highest temporal resolution, Land.Global projections = Daily. Highest temporal resolution, Land.Probabilistic projections = Monthly. Highest temporal resolution, Land.High resolution projections = Daily. Highest temporal resolution, Land.High resolution projections = Sub-daily. Period of data, Observations (UK State of the Climate) = bulk of 20th century to present day. Period of data, Marine and coastal", + "page_start": 3, + "page_end": 3, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "(a) Climate-change impacts at 2 ° Cglobalwarming\nTable 4. Time of reaching GWLs of 1.5 ° Cand2 ° C in each bias-corrected output from the HadGEM3 climate simulations, driven by di/fferent sets of CMIP5 sea-surface temperatures. The dates are the centre year of a 20 year period for which the climate data is applied to the HCVI calculation and JULES simulations.\n= 2019. HadGEM2-ES .........................................................................................................................................................................................................., 2 = 2033. IPSL-CM5A-MR", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed11.pdf" + }, + { + "text": "(e) Correcting biases in climate model output and implications for de/fining levels of global warming\nTable 3. Time of reaching GWLs of 1.5 ° Cand2 ° C in the raw output from the HadGEM3 climate simulations, driven by di/fferent sets of CMIP5 sea-surface temperatures. The dates are the centre year of a 20-year period for which the climate data are applied to the calculation of the ClimPACT indices.\n.........................................................................................................................................................................................................., 2 = 2035. ACCESS1-0", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed11.pdf" + }, + { + "text": "(e) Correcting biases in climate model output and implications for de/fining levels of global warming\nTable 3. Time of reaching GWLs of 1.5 ° Cand2 ° C in the raw output from the HadGEM3 climate simulations, driven by di/fferent sets of CMIP5 sea-surface temperatures. The dates are the centre year of a 20-year period for which the climate data are applied to the calculation of the ClimPACT indices.\n.........................................................................................................................................................................................................., 1 = 2034. ACCESS1-0", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed11.pdf" + }, + { + "text": "References\n2. Murphy JM et al. 2009 UKclimate projections science report: climate change projections . Exeter, UK: Met Office Hadley Centre. See http://ukclimateprojections.metoffice.gov.uk.\n3. United Nations. 2010 Report of the Conference Parties on its fifteenth session, held in Copenhagen, 7 to 19 December 2009. Addendum. Part Two: Action taken by the Conference of the Parties at its fifteenth session. See http://unfccc.int/resource/docs/2009/cop15/eng/ 11a01.pdf.\n4. United Nations. 2016 Report of the Conference Parties on its twenty-first session, held in Paris, 30 November to 13 December 2015. Addendum Part two: Action taken by the Conference of the Parties at its twenty-first session. See http://unfccc.int/resource/docs/2015/cop21/eng/ 10a01.pdf.\n5. Hewitson B et al. 2014 Regional context. In Climate change 2014: impacts, adaptation, and vulnerability. Part B: regional aspects. Contribution of Working Group II to the Fifth assessment report of the Intergovernmental Panel on Climate Change (eds VR Barros et al. ), pp. 1133-1197. Cambridge, UK: Cambridge University Press.\n6. Dankers R et al. 2013 First look at changes in flood hazard in the inter-sectoral impact model intercomparison project ensemble. Proc. Natl Acad. Sci. USA 111 , 3257-3261. (doi:10.1073/ pnas.1302078110)\n7. IPCC. 2014 Summary for policymakers. In Climate change 2014: impacts, adaptation, and vulnerability. Part A: global and sectoral aspects. Contribution of Working Group II to the Fifth Assessment Report of the Intergovernmental Panel on Climate Change (eds CB Field et al. ), pp. 1-32. Cambridge, UK: Cambridge University Press.\n8. Schewe J et al. 2014 Multimodel assessment of water scarcity under climate change. Proc. Natl Acad. Sci. USA 111 , 3245-3250. (doi:10.1073/pnas.1222460110)", + "page_start": 25, + "page_end": 25, + "source_file": "pubmed11.pdf" + } + ] + }, + { + "references": { + "source_file": "legal1_opengouvernementlicense.pdf", + "query": "What perdiod is covered by the 12 km resolution projection data of the UKCP18 ?", + "target_page": 4, + "target_passage": "1981-2080", + "chunk_present": { + "presence": true, + "index": 8 + } + }, + "top_chunk": [ + { + "text": "What can users expect from UKCP18?\nThere are three components to UKCP18: observations of historic climate, marine projections and projections over land. These components are described below and summarised in Table 1. UKCP18 will provide each of these components at a higher spatial and temporal resolution than UKCP09 and with more information on different types of uncertainty.", + "page_start": 1, + "page_end": 1, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "How can I get the information and when?\nAccess to the raw data, pre-prepared data and maps, headline messages and user guidance will be available through a dedicated website.\nA dedicated user interface will provide users with a means to download the data and produce customised visualisations. The exact nature of these outputs is still the subject of consultation with users.\nDetailed descriptions of the scientific basis of the projections will be available as the project progresses. For the latest information visit:\nhttp://ukclimateprojections.metoffice.gov.uk/24125\nUKCP Project Team\nJuly 2017", + "page_start": 3, + "page_end": 3, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "DOWNSCALED HIGH RESOLUTION PROJECTIONS\nDownscaled versions of the global model for the UK. For the most spatially detailed downscaling this includes hourly data. Simultaneous impacts captured at multiple UK locations.\nThe high resolution projections will provide information on types of weather of relevance to adaptation at two different resolutions. The 12 km model provides a downscaled product that is similar to UKCP09's 25 km simulations but driven by an improved global model and at a higher resolution. This may be especially useful for those interested in water availability and some aspects of agriculture. A key reason for providing this data is that users will be able to compare it directly with EURO-CORDEX 13 .\nThe global projections will also be downscaled to 2.2 km using a process of nesting models at finer resolution that maintains the integrity of the representation of evolving atmospheric processes. Key benefits of simulations at this resolution will be the information provided on high impact events such as localised heavy rainfall in summer and potential improvements in the diurnal cycle.\nThe output will be available at a time resolution of 3-hourly, possibly higher for some output, for a high emission scenario. Spatial coherence will be maintained. Specific time slices (e.g. 2061-2080) will be made available with the exact nature of these still to be confirmed.\n11 SRESA1B: IPCC future scenario based on rapid economic growth and a balance of energy sources\n12 30-year means can be created using the UKCP18 PDF data\n13 http://www.euro-cordex.net/", + "page_start": 2, + "page_end": 2, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "What is UKCP18 and why do we need it?\nFollowing the historic Paris Agreement on Climate Change in December 2015, the Department of Environment, Food and Rural Affairs announced a major upgrade to the UK Climate Projections.\nThe UKCP18 project will build upon the current set of projections (UKCP09) to provide the most up-todate assessment of how the climate of the UK may change over the 21st century. This information will be essential to future Climate Change Risk Assessments 1 and to equip the UK with information to help adapt to the challenges and opportunities of climate change in line with the National Adaptation Programme 2 .\nOrganisations and individual users will use UKCP18 to inform risk assessments and adaptation plans to ensure they are resilient to extreme weather and climate change. Some organisations will use UKCP18 in responding to the Adaptation Reporting Power 3 for example.", + "page_start": 0, + "page_end": 0, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "25KM PROBABILISTIC PROJECTIONS\nCaptures natural variability and climate change . Updated models and observations. Provides seasonal scale projections.\nBased on the established, peer-reviewed, ground-breaking method of UKCP09 for estimating uncertainty for use in risk-based analysis. Probabilistic projections will be updated using an up-to-date collection of Met Office climate simulations and the latest IPCC-assessed simulations to estimate the model uncertainties, incorporate the latest observations and estimate carbon cycle feedbacks. Projections will be on a 25 km grid for the UK at monthly intervals for several emission scenarios, including one used in UKCP09 11 . The new probabilistic projections will indicate the range of uncertainty in our knowledge of the climate system and natural variability through the 21st century, using probability density functions to provide information on how climate varies from month to month. This contrasts with UKCP09 for which only 30-year means were provided 12 .", + "page_start": 2, + "page_end": 2, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "Summary of expected outputs\nTable 1 below indicates the likely dimensions of the outputs for each of the components as of July 2017.\nCharacteristics, Observations (UK State of the Climate) = Observed trends; long-term climatologies; weather events for the preceding year. Characteristics, Marine and coastal projections = Updated sea level rise and surge projections based on operational storm surge model (CS3) using CMIP5, EURO-CORDEX‡. Characteristics, Land.Global projections = Ensemble of ~20 spatially coherent time series of the Met Office Hadley Centre model and a similar number of CMIP5 models. Characteristics, Land.Probabilistic projections = Updated probability density functions presented as 30- year and monthly time series based on Met Office models (HadCM3, ESPPE) and CMIP5. Characteristics, Land.High resolution projections = Downscaled projections over the UK for ~10 spatially coherent time series. 2.2 km model provides realistic information on heavy rainfall events. Characteristics, Land.High resolution projections = Downscaled projections over the UK for ~10 spatially coherent time series. 2.2 km model provides realistic information on heavy rainfall events. Scale, Observations (UK State of the Climate) = UK. Scale, Marine and coastal projections = UK. Scale, Land.Global projections = Global. Scale, Land.Probabilistic projections = UK. Scale, Land.High resolution projections = UK. Scale, Land.High resolution projections = UK. Spatial resolution*, Observations (UK State of the Climate) = To match land projections. Spatial resolution*, Marine and coastal projections = UK Coastline †. Spatial resolution*, Land.Global projections = 60km. Spatial resolution*, Land.Probabilistic projections = 25km. Spatial resolution*, Land.High resolution projections = 12km +. Spatial resolution*, Land.High resolution projections = 2.2km. Highest temporal resolution, Observations (UK State of the Climate) = Daily / monthly. Highest temporal resolution, Marine and coastal projections = Annual. Highest temporal resolution, Land.Global projections = Daily. Highest temporal resolution, Land.Probabilistic projections = Monthly. Highest temporal resolution, Land.High resolution projections = Daily. Highest temporal resolution, Land.High resolution projections = Sub-daily. Period of data, Observations (UK State of the Climate) = bulk of 20th century to present day. Period of data, Marine and coastal", + "page_start": 3, + "page_end": 3, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "What improvements does UKCP18 deliver?\nUKCP18 will benefit from a range of developments since the release of UKCP09, including:\n· Greater understanding of user needs as a result of the adaptation community's use of UKCP09 projections and the subsequent feedback - user workshops indicated that users supported the continued use of probabilistic projections and the importance of spatially coherent information 4 .\n· Advances in climate models in recent years, such as the Met Office Hadley Centre HadGEM3 5 model and the CMIP5 6 set of models. Improvements include better representation of the past climate, the inclusion of more cloud and aerosol processes and the ability to model important climate phenomena such as the El-Niño Southern Oscillation (ENSO).\n· Groundbreaking Met Office research on modelling of extreme events in high resolution regional climate models 7 .\n· The increased quantity and range of observations available since 2009.\n· Use of the new Met Office supercomputer, enabling a credible range of climate projections to be generated in greater spatial detail.\n1 The 2008 Climate Change Act allows UK government to mandate or invite certain organisations to produce reports to assess the impacts of climate change on their operations and present proposals for adaptation. https://www.gov.uk/government/collections/climate-changeadaptationreporting-second-round-reports\n2 Expected in 2018, the National Adaptation Programme will be supported by the Evidence Report of the Adaptation Sub-Committee of the Committee on Climate Change (ASC): https://www.theccc.org.uk/uk-climate-change-risk-assessment-2017/introduction-to-the-ccra/ 3 Under the 2008 Climate Change Act, organisations are invited to produce Adaptation Reporting Power reports to assess the impacts of climate change on their operations and present proposals for adaptation: https://www.gov.uk/government/collections/climate-change-adaptation-", + "page_start": 0, + "page_end": 0, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "60KM GLOBAL PROJECTIONS\n20 plausible climate futures. Latest Hadley Centre climate model. Simulations of extreme weather. Simultaneous impacts captured at multiple locations.\nThis resolution will enable more realistic simulations of climate for the UK and capture the drivers of extreme weather, a significant advance on the 300 km-resolution simulations of UKCP09. A set of 20 plausible global projections of 21st century climate will be generated using an ensemble of the Met Office Hadley Centre HadGEM3 climate model. These projections will be selected to represent a wide range of possible future climate states to reflect key uncertainties, informing a risk-based approach to planning. They will be generated to provide spatially coherent daily data at a horizontal resolution of 60 km for two greenhouse gas concentration scenarios. These will be compared with an ensemble of CMIP5 models to provide additional information on uncertainties in the projections relative to other climate models.", + "page_start": 2, + "page_end": 2, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "Summary of expected outputs\nTable 1 below indicates the likely dimensions of the outputs for each of the components as of July 2017.\nprojections = 1950-2100 RCP2.6, RCP4.5,. Period of data, Land.Global projections = 1900-2100 RCP8.5; additional. Period of data, Land.Probabilistic projections = 1961-2100 SRES A1B, RCP2.6, RCP4.5, RCP6.0 RCP8.5. Period of data, Land.High resolution projections = 1981-2080. Period of data, Land.High resolution projections = 1981-2000 2021-2040 2061-2080. Emissions scenarios, Observations (UK State of the Climate) = N/A. Emissions scenarios, Marine and coastal projections = RCP8.5 H ++. Emissions scenarios, Land.Global projections = lower scenario (for Met Office Hadley Centre model only). Emissions scenarios, Land.Probabilistic projections = Temperature, precipitation, solar radiation. Emissions scenarios, Land.High resolution projections = RCP8.5. Emissions scenarios, Land.High resolution projections = RCP8.5. Variables available ++, Observations (UK State of the Climate) = Temperature, precipitation (including snow), sunshine, wind. Variables available ++, Marine and coastal projections = Sea level rise, storm surge. Variables available ++, Land.Global projections = Temperature, precipitation, humidity, wind speed, wind direction, solar radiation. Variables available ++, Land.Probabilistic projections = humidity, wind speed,. Variables available ++, Land.High resolution projections = Temperature, precipitation, humidity, wind speed, wind direction, solar radiation. Variables available ++, Land.High resolution projections = Temperature, precipitation, humidity, wind speed, wind direction, solar radiation", + "page_start": 3, + "page_end": 3, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "Summary of expected outputs\n* Data also available for whole UK, administrative regions, devolved administrations and river basin regions. †Additional information on variability and observations available at Class A tide gauges (see http://www.ntslf.org/ data/uk-network-real-time ).\n‡An ensemble of regional climate model results over Europe (see http://www.euro-cordex.net ).\n+Now included due to user request and Peer Review Panel advice.\n++This is not an exhaustive list and further user-requested variables will be made available subject to evaluation of models.", + "page_start": 3, + "page_end": 3, + "source_file": "legal1_opengouvernementlicense.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv4.pdf", + "query": "How many articles compose the Syntec French collective bargaining agreement ?", + "target_page": 2, + "target_passage": "The Syntec French collective bargaining agree- ment comprises around 90 articles", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "3.1.1 Syntec (Retrieval)\nThe Syntec French collective bargaining agreement 3 comprises around 90 articles. Despite its topic, the language used does not feature the specificity of the legal vocabulary, making the data suitable for benchmarking general-purpose models. The articles have been scraped for use as documents. Four annotators were divided into two groups. Each group was given half of the articles and asked to choose an article and write a question about it. Each annotator wrote 25 questions. Thus, a hundred questions have been manually created and paired with the articles containing the answer 4 . Examples of the dataset are available in the appendix Figure 5. This dataset could also be used for text classification, clustering or topic modeling. Regarding quality checks, every article's integrity has been reviewed while manually creating questions. We also manually checked that the questions could only be answered using the annotated article.", + "page_start": 1, + "page_end": 1, + "source_file": "arxiv4.pdf" + }, + { + "text": "Document\nurl, article-14 = https://www.syntec.fr/convention- collective/resiliation-du-contrat- de-travail/#article-14. title, article-14 = Article 14 : Préavis pendant la péri- ode d'essai. section, article-14 = Résiliation du contrat de travail. content, article-14 = Modification Avenant n° 7 du 5/07/1991 Au cours de cette péri- ode, les deux parties peuvent se sé- parer avec un préavis d'une journée de travail pendant le premier mois. Après le premier mois, le temps de préavis réciproque sera d'une semaine par mois complet passé dans l'entreprise. Après le pre- mier mois, le temps de préavis ré- ciproque sera d'une semaine par mois passé dans l'entreprise. Le préavis donne droit au salarié de s'absenter pour la recherche d'un emploi dans les conditions fixées à", + "page_start": 14, + "page_end": 14, + "source_file": "arxiv4.pdf" + }, + { + "text": "Query\nFigure 5: Extracts of Syntec dataset.\nquestion, article-14 = . question, = Quel est le préavis en période", + "page_start": 14, + "page_end": 14, + "source_file": "arxiv4.pdf" + }, + { + "text": "Contents\n.............................. 8. Foreword by Nicolas Schmit, European Commissioner for Jobs and Social Rights .............................. 8, 2 = . Acknowledgements ................................................................................................................................ 9, 1 = Acknowledgements ................................................................................................................................ 9. Acknowledgements ................................................................................................................................ 9, 2 = . 1, 1 = Executive summary", + "page_start": 2, + "page_end": 2, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "Contents\n2 = Workforce structure ................................................................................................................. 109. 5.4, 1 = Globalisation and OSH ............................................................................................................ 114. 5.4, 2 = Globalisation and OSH ............................................................................................................ 114. , 1 = OSH legislation and OSH infrastructure in the EU .................................................................. 118. , 2 = OSH legislation and OSH infrastructure in the EU", + "page_start": 2, + "page_end": 2, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "https://committee.iso.org/home/tc283\nAktas, E., Bergbom, B., Godderis, L. et al. Migrant workers occupational health research: an OMEGA-NET working group position paper. Int Arch Occup Environ Health (2021). https://doi.org/10.1007/s00420-021-01803-x 464 'European platform tackling undeclared work', https://www.ela.europa.eu/european-platform-tacklingundeclared-work\n465 Eurofound: New Forms of Employment, 2020 Update, New Forms of Employment\n466 Fundamental Rights Agency FRA, https://fra.europa.eu/en, Section on 'Trafficking and labour exploitation\n467 European Labour Authority: https://www.ela.europa.eu/en/home\n468 Besamusca, J., Steinmetz, S.: Vulnerable Groups in European Data Sets, An inventory of the measurement of vulnerable groups in 27 data sets covering the European area, Working paper, Horizon project: InGRID-2, Integrating Research Infrastructure for European expertise on Inclusive Growth\nhttps://www.inclusivegrowth.eu/files/Output/D11.3_inventory_report.pdf", + "page_start": 158, + "page_end": 158, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "Note:\nThe following detailed editorial content -apart from the landing pages - is only available in English / French and some additional languages:\n-Practical Guide (formerly ' Goldbook ') : (en)\n-eLearning Modules: (en, fr, de, it, es, sv)\n-Training Companion: (en)\n-More Training Material: (en)\n-Reports about Open Data: (en)\n-Use Cases (en)\nEuropean Data Portal Version 4.3 -User Manual\nPage 21 of 57", + "page_start": 20, + "page_end": 20, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "References\n63. \"Avant d'être une compétition, le Trophée des champions est une vitrine pour la Ligue 1\" (https://web.archive. org/web/20150731090955/http://webfootballclub.fr/avant-detre-une-competition-le-trophee-des-champions-est -une-vitrine-pour-la-ligue-1-8274). webfootballclub.fr . Web Football Club. Archived from the original (http://web footballclub.fr/avant-detre-une-competition-le-trophee-des-champions-est-une-vitrine-pour-la-ligue-1-8274) on 31 July 2015. Retrieved 31 July 2015.\n64. Joly, Maxime. \"Le Grand Stade de Lyon pourrait rapporter 70 millions d'euros par an à l'OL\" (https://web.archi ve.org/web/20150905175715/http://sport24.lefigaro.fr/le-scan-sport/business/2015/03/27/27004-20150327AR TFIG00142-le-grand-stade-de-lyon-pourrait-rapporter-70-millions-d-euros-par-an-a-l-ol.php). lefigaro.fr . Le Figaro. Archived from the original (http://sport24.lefigaro.fr/le-scan-sport/business/2015/03/27/27004-2015032 7ARTFIG00142-le-grand-stade-de-lyon-pourrait-rapporter-70-millions-d-euros-par-an-a-l-ol.php) on 5 September 2015. Retrieved 31 July 2015.\n65. \"Lyon 2e : 60 ans de sport de glace\" (http://www.leprogres.fr/sortir/2015/05/26/lyon-2e-60-ans-de-sport-de-gla ce). leprogres.fr . Le Progres. Retrieved 31 July 2015.", + "page_start": 23, + "page_end": 23, + "source_file": "wikipedia4.pdf" + }, + { + "text": "https://committee.iso.org/home/tc283\n476 E European Agency for Safety and Health at Work,2013: European Risk Observatory, Analysis of the determinants of workplace occupational safety and health practice in a selection of EU Member States, https://osha.europa.eu/en/publications/reports/analysis-determinants-workplace-OSH-in-EU\n477 European Agency for Safety and Health at Work, 2019: The value of OSH and the societal costs of workrelated injuries and disease, Luxembourg;\nElsler D. et al: A review of case studies evaluating economic incentives to promote occupational safety and health. Scand J Work Environ Health 2010; 36: 289-298\n478 E European Agency for Safety and Health at Work, 2021: Improving compliance with occupational safety and health regulations: an overarching review\n479 Walters D, Johnstone R, Bluff E, Limborg HJ, Gensby U.: Improving compliance with occupational safety and health regulations: an overarching review EU-OSHA, 2021. Improving compliance with occupational safety and health regulations\n480 ILO and integration of OSH Into decent work https://www.ilo.org/global/topics/dw4sd/themes/osh/lang-en/index.htm\n481 Dijk, F., Yohama Caraballo-Arias, Y.: Where to Find Evidence-Based Information on Occupational Safety and Health? https://www.annalsofglobalhealth.org/articles/10.5334/aogh.3131/\nTrade union position, one example: Vogel L (2014), The point of view of the European trade unions: It is urgent to revitalise the EU occupational health and safety policy, http://www.osha.mddsz.gov.si/.../Laurent_VOGEL_EN.pdf Employer position, one example: Safer and healthier work for all - Modernisation of the EU occupational safety and health legislation and policy,\n482 Eurofound; Labour market change New forms of employment: 2020 update\n483 Eurofound, 2020: Working conditions in sectors, Publications Office of the European Union, Luxembourg, doi:10.2806/024695, p. 41", + "page_start": 159, + "page_end": 159, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "Foreword by Nicolas Schmit, European Commissioner for Jobs and Social Rights\nThe Framework is part of the Commission's commitment to building a strong social European Union that protects. This is the foundation of all the initiatives that we are proposing. Every action we take in social policy comes under the umbrella of the European Pillar of Social Rights Action Plan that we presented in March 2021. The protection of workers' health and safety, enshrined in the EU Treaties and in the Charter of Fundamental Rights, is one of the key elements of an EU economy that works for people. In particular, the right to a healthy and safe workplace is reflected in principle 10 of the European Pillar of Social Rights, and is fundamental for reaching the United Nations' sustainable development goals. Our determined action to improve occupational safety and health and to consolidate a culture of prevention represents a substantial contribution to the objectives of the abovementioned Pillar.\nThe work of EU-OSHA is essential in this respect and this publication is a good example of the strong commitment shown by EU governments - and also employer and trade union organisations - to continuously improve OSH in Europe.\nEuropean Agency for Safety and Health at Work - EU-OSHA\nNicolas Schmit\n8\nOccupational safety and health in Europe - state and trends 2023", + "page_start": 7, + "page_end": 8, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv4.pdf", + "query": "In the context of research publication, what is HAL ?", + "target_page": 3, + "target_passage": "Hyper Articles en Ligne (HAL) is a French open archive of scholarly documents from all academic fields.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "3.1.2 HAL (Clustering)\nHyper Articles en Ligne (HAL) is a French open archive of scholarly documents from all academic fields. Scrapping this resource, we fetched 85,000 publications in French 5 . We extracted IDs, titles and the author's choice among domain labels. The last 2 are provided by authors when submitting their papers to HAL. Since domain annotations are provided, the dataset can be used for many tasks, such as topic modeling or text classification. To ensure the dataset quality is suitable for a benchmark, further data cleaning has been performed:\n· Duplicates are eliminated, retaining unique publications for each field.\n· Irrelevant titles (due to API indexing mistakes) or titles in languages other than French have been manually removed.\n3 https://www.syntec.fr/convention-collective/\n4 https://huggingface.co/datasets/lyon-nlp/ mteb-fr-retrieval-syntec-s2p\n5 https://huggingface.co/datasets/lyon-nlp/ clustering-hal-s2s\nTable 1: New datasets details with the number of samples, the creation process, the annotation process and the quality checks. All datasets are test splits.", + "page_start": 1, + "page_end": 2, + "source_file": "arxiv4.pdf" + }, + { + "text": "3.1.2 HAL (Clustering)\nTable 1: New datasets details with the number of samples, the creation process, the annotation process and the quality checks. All datasets are test splits.\nSamples, Syntec = 100 queries. Samples, HAL = 26233 samples. Samples, SummEvalFr = 100 texts. , Syntec = 90 documents. , HAL = 10 classes. , SummEvalFr = 1100 human summaries. Creation process Annotation process, Syntec = Scraping of Syntec col- lective bargaining agree- ment with articles as doc- uments. Writing queries corresponding to articles. 4 annotators divided into. Creation process Annotation process, HAL = Scraping of HAL arti- cles with id , title and do- main . Further cleaning with deduplication, lan- guage filtering and class subsampling. Annotations provided by. Creation process Annotation process, SummEvalFr = 1600 machine summaries Translation from English to French with Deepl of the SummEval dataset. Detailed annotation pro-. Quality checks, Syntec = wrote 25 questions. Human verification of an- notations.. Quality checks, HAL = Baseline models for clas- sification and topic model- ing.. Quality checks, SummEvalFr = Correlation between BLEU and ROUGE scores of the French and the original English datasets. LLM as-a-judge translation rating and human verification.", + "page_start": 2, + "page_end": 2, + "source_file": "arxiv4.pdf" + }, + { + "text": "Query\nFigure 6: Extracts of HAL dataset.\nhal-02899209, Domain = shs. hal-02899209, Title = La transformation digitale du manage- ment des ressources humaines et de ses enjeux pour les entreprises. tel-03993881, Domain = math. tel-03993881, Title = Sur l'approximation numérique de quelques problèmes en mécanique des fluides", + "page_start": 14, + "page_end": 14, + "source_file": "arxiv4.pdf" + }, + { + "text": "3.1.2 HAL (Clustering)\n· Samples belonging to domain classes with less than 500 samples were removed, which leads us to keep only 10 classes.\n· Subsampling was performed on 2 classes containing more than 10k samples each to lower the number of samples and mitigate the unbalance of the dataset.\nMore details about this process are provided in the appendix A.2 along with some extracts in Figure 6. We make the dataset publicly available in both their raw and clean versions. We use this dataset in a clustering setup to cluster publications by their title and use the domain as ground truth. To ensure the quality of this dataset, we run 3 baseline models for classification: TF-IDF + SVM , a fine-tuned Camembert (Martin et al., 2019) and GPT-4 leveraging In-Context Learning (ICL). Furthermore, we run one baseline model for topic modeling: Latent Dirichlet Allocation (LDA) (Blei et al., 2003) and report scores in the appendix A.2.", + "page_start": 2, + "page_end": 2, + "source_file": "arxiv4.pdf" + }, + { + "text": "Query\nFigure 6: Extracts of HAL dataset.", + "page_start": 14, + "page_end": 14, + "source_file": "arxiv4.pdf" + }, + { + "text": "D Evaluation results\nTable 5: Baselines results for HAL on a classification task and topic modeling.\nClassification (F1-score), Model = TF-IDF + LR TF-IDF + SVC CamemBERT (fine-tuned)* GPT-4 (ICL)**. Classification (F1-score), Score = 0 . 60 ( ± 0 . 002) 0 . 61 ( ± 0 . 001) 0 . 6 ( ± 0 . 008) 0.30. Topic Modeling, Model = TF-IDF + LDA. Topic Modeling, Score = 0.49 (Coherence) -8.23 (Perplexity)", + "page_start": 13, + "page_end": 13, + "source_file": "arxiv4.pdf" + }, + { + "text": "D Evaluation results\nTable 5: Baselines results for HAL on a classification task and topic modeling.", + "page_start": 13, + "page_end": 13, + "source_file": "arxiv4.pdf" + }, + { + "text": "Researchers are mobile!\nFor example,\n30% OF THE SCIENTISTS WHO GOT THEIR PhD IN THE UNITED KINGDOM NOW LIVE ELSEWHERE\nSource: Science Magazine\nResearch institutions and organizations therefore find it hard to\nBenchmark their organization against others\nIdentify, track, and report on researchers' a/ffiliations and contributions (publications, peer reviews, grants, and more)", + "page_start": 0, + "page_end": 0, + "source_file": "infographic3.pdf" + }, + { + "text": "A.2 Created datasets\nSyntec Figure 5 shows an extract from the Syntec dataset with a document and a query relative to this document.\nHAL Figure 6 is an extract from the HAL dataset. Table 4 lists the distribution of classes ( domain field) for the HAL dataset on raw subset and mteb_eval subset, which is used for MTEB evaluation. Labels descriptions can be found at this URL: https://api.archivesouvertes.fr/ref/domain/?q=*:*&rows=393 or in Table 4. After pre-processing, mteb_eval covers titles from 10 domains as classes with less than 500 samples were removed. In the MTEB evaluation subset of the dataset, titles composed of 2 words or less have been removed (371 samples), resulting in an average word count of 13 . 4 . Figure 7 shows the word count distribution per title. Furthermore, the dataset has been cleaned up by manually removing all non-French titles. Additionally, it can be observed in Table 4 that in the original raw dataset, the shs and sdv classes represent by far the majority of the dataset samples with respectively 58706 samples (73%) and 11049 samples (13%). In order to\n12\nmitigate the class imbalance while preserving the majority of those classes, they have been randomly subsampled to 6701 and 4803 samples. Furthermore, baseline models have been trained and tested to assess the usability of this dataset in other tasks, such as classification and topic modeling. Table 5 shows the results obtained.\nSummEvalFr Extracts of humans and machine summaries translated in French from SummEvalFr and the original ones in English from SummEval (Fabbri et al., 2021) are shown in Figure 9. As explained in section 3.1.3, we use a LLM to evaluate the quality of translations for human summaries, we provide the prompt used with GPT-4 for this evaluation in Figure 8.", + "page_start": 11, + "page_end": 11, + "source_file": "arxiv4.pdf" + }, + { + "text": "(2018) 18:648\nLentz et al. BMC Health Services Research https://doi.org/10.1186/s12913-018-3470-6", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed5.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv4.pdf", + "query": "What is the effect of embedding dimension on embedding representation quality ?", + "target_page": 6, + "target_passage": "we observe a performance correla- tion with the embedding dimension and the model’s number of parameters, which are often correlated themselves", + "chunk_present": { + "presence": true, + "index": 5 + } + }, + "top_chunk": [ + { + "text": "1 Introduction\nEmbeddings are dense vector representations that capture the semantics of an input. The first emblematic example is Word2Vec, introduced by Mikolov et al. (2013). It consists of neural architectures trained to learn high-quality word representations from contextual relationships in vast amounts of text. Other models were proposed since then, leveraging the transformer architecture (Vaswani et al., 2017) to produce both generic and contextualized word embeddings using self-attention. Many models now exist with various architectures, monolingual or multilingual, pre-trained or fine-tuned (Naseem et al., 2021; Ding et al., 2023).\nIn this work, our primary objective is to introduce a large-scale embedding benchmark for\n1 French table on: https://huggingface.co/spaces/ mteb/leaderboard", + "page_start": 0, + "page_end": 0, + "source_file": "arxiv4.pdf" + }, + { + "text": "3.1.5 Similarity analysis\nWe investigate the proximity between the datasets' topics to give insights about the benchmark contents. The methodology introduced by Muennighoff et al. (2022), i.e. computing an average embedding of samples from each dataset, is used to build a dataset-similarity matrix (displayed in appendix Figure 3). The distances between averaged embedding vectors of each dataset (which range from 0 . 89 to 1 in Figure 3) remain hard to interpret into a dataset semantic proximity. Thus, we complement this by observing the dataset's clouds of embedding in a 2D plane using PCA in Figure 4.\nFigures 4 and 3 seem to correlate, showing high similarity between two datasets when the same underlying data is used in different tasks. Dataset topics are pretty close, with some exceptions, such as the Syntec dataset. As more datasets are added to the benchmark, this analysis will help select new data that do not produce redundant results. It may also help to understand the link between the results and the datasets' topics.", + "page_start": 3, + "page_end": 3, + "source_file": "arxiv4.pdf" + }, + { + "text": "Feature Prediction versus Pixel Reconstruction.\nApproaches that predict in pixel space must dedicate significant model capacity and compute to capture all the low-level detail in the visual input. By contrast, approaches that predict in latent space have the flexibility to eliminate irrelevant or unpredictable pixel-level details from the target representation (Vondrick et al., 2016). Predicting in representation space has been shown to lead to versatile representations that perform well across many downstream tasks through linear probing or lowshot adaptation (Assran et al., 2023; Oquab et al., 2023; Assran et al., 2022), while demonstrating an efficiency gain during pretraining compared to pixel level reconstruction (Assran et al., 2023; Baevski et al., 2022b,a). The works of Baevski et al. (2022a,b) additionally show that predicting in representation space results in competitive end-to-end fine-tuning performance in the image, audio and text domains. In this work, we extend these findings to the video modality.", + "page_start": 2, + "page_end": 2, + "source_file": "arxiv3.pdf" + }, + { + "text": "3.2 Models\nFor comparison on our benchmark, we selected various models to fulfil three objectives.\n· Quantity: The aim was to compare a substantial number of models (51 in total) to provide comprehensive results, facilitating the community in selecting effective French models.\n· Relevance: It was imperative to include top performers from the MTEB benchmark (Muennighoff et al., 2022). We mainly selected multilingual models and some English models to asses their language-transferring abilities. Additionally, we integrated natively French transformer-based models such as CamemBERT (Martin et al., 2019), FlauBERT (Le et al., 2020) and even the very recent CroissantLLM (Faysse et al., 2024).\n· Variety: Diverse model types were included to offer an insightful analysis across various model characteristics (dimension, training strategy, etc.).\nIn line with the third objective, we explicit below the studied characteristics of embedding models that will be discussed with the results.\n· Embedding dimension: This critical element influences the expressiveness of the represen-\ntion and, in practical applications, the underlying storage and compute costs. We selected models with embedding dimensions ranging from 384 to 4096.", + "page_start": 3, + "page_end": 4, + "source_file": "arxiv4.pdf" + }, + { + "text": "4.1 Predicting Representations versus Pixels\nWe first ablate the effect of computing the prediction loss in representation space. We train a pair of ViT-L/16 models using either a V-JEPA feature prediction loss, or a mean-squared error loss with the normalized pixel values, as in masked autoencoders (He et al., 2021), and perform a sweep over the learning rate and weight decay schedules for both approaches. All models are pretrained on VideoMix2M for 90K iterations with a batch size of 3072 using multi-block masking. We examine performance on Kinetics-400 (K400), Something-Something-v2 (SSv2), and ImageNet-1K (IN1K), using a frozen backbone with an attentive probe, and report top-1 accuracy using a single center view. We also examine end-to-end fine-tuning performance of the models on Kinetics-400.\nResults of this comparison are reported in Table 1 and indicate that predicting in feature space provides a consistent performance improvement over pixel space prediction in both frozen evaluation of the video backbone, as well as end-to-end fine-tuning.", + "page_start": 4, + "page_end": 4, + "source_file": "arxiv3.pdf" + }, + { + "text": "following:\n· Tuned for sentence similarity : 0.727\n· Finetuned vs pretrained : 0.544\n· Model number of parameters : 0.49\n· Embedding dimension : 0.452\n· Closed source : 0.449\n· Max sequence length : 0.336\n· Multilingual : 0.103\n· English : 0.025\n· English but tuned on other languages : -0.025\n· French : -0.134\n· Bilingual : -0.135\nAdditionally, all cross-correlations between characteristics are reported in appendix Figure 10.\nAs expected, the score most strongly correlates with whether the evaluated models were trained on a sentence similarity task. Of course, this criterion is connected to the more general Finetuned one. The only top-performing models solely pre-trained are from the E5 family, where the pre-training is, in fact, contrastive and optimized for similarity. Conversely, models pre-trained on token-level tasks and generating embeddings via pooling appear less well-suited for the benchmark tasks.\nFurthermore, we observe a performance correlation with the embedding dimension and the model's number of parameters, which are often correlated themselves. This appears very clearly on the relative ranking of E5 and T5 models (see Figure 1). However, some small models perform very well on the benchmark, such as the standard version of the multilingual universal sentence encoder or Solon-embeddings-base-1.0 . Notably, the maximum sequence length, while an important criterion for generative tasks with LLMs, is less correlated with performance than the other dimensions. This can be explained by many datasets containing relatively small texts (see appendix Table 3 showing that 14 datasets have less than 50 tokens).\nRegarding language, it is surprising that good performance is not particularly correlated with French models in particular. In reality, the other aspects of the models, such as being fine-tuned\nFigure 1: Critical difference diagram representing the significant rank gaps between models. The axis represents the normalized average rank of the models (lower is better). The black bars indicate that the difference in models' rank is not statistically significant, i.e. lower than the critical difference.\nfor similarity, prevail. Nevertheless, we can highlight the excellent performance of a few French models such as sentence-camembert and sentencecroissant and Solon-embeddings .", + "page_start": 5, + "page_end": 6, + "source_file": "arxiv4.pdf" + }, + { + "text": "D.2 Evaluation results per task\nTable 7: Models included in the benchmark with their main characteristics. The size in Gb is estimated using the number of parameters counted as float32 numbers. Sentence sim refers to the fact that the model was trained on a task that favors semantic similarity.\nEmb. dim. = 384. text2vec-base-multilingual, License = Apache-2.0. text2vec-base-multilingual, Sentence sim = Yes. text-embedding-ada-002, Finetuned = N/A. text-embedding-ada-002, Language = multilingual. text-embedding-ada-002, # params = N/A. text-embedding-ada-002, Size (Gb) = N/A. text-embedding-ada-002, Seq. Len. = 8191. text-embedding-ada-002, Emb. dim. = 1536. text-embedding-ada-002, License = Closed source. text-embedding-ada-002, Sentence sim = N/A. text-embedding-3-small, Finetuned = N/A. text-embedding-3-small, Language = multilingual. text-embedding-3-small, # params = N/A. text-embedding-3-small, Size (Gb) = N/A. text-embedding-3-small, Seq. Len. = 8191. text-embedding-3-small, Emb. dim. = 1536. text-embedding-3-small, License = Closed source. text-embedding-3-small, Sentence sim = N/A. text-embedding-3-large, Finetuned = N/A. text-embedding-3-large, Language = multilingual. text-embedding-3-large, # params = N/A. text-embedding-3-large, Size (Gb) = N/A. text-embedding-3-large, Seq. Len. = 8191. text-embedding-3-large, Emb. dim. = 3072.", + "page_start": 19, + "page_end": 19, + "source_file": "arxiv4.pdf" + }, + { + "text": "D.2 Evaluation results per task\nTable 9: Average performance of models per task category.\n0.29. text-embedding-3-large, A v erage = 0.71. text-embedding-3-large, BitextMining = 0.96. text-embedding-3-large, Classification = 0.74. text-embedding-3-large, Clustering = 0.48. text-embedding-3-large, P airClassification = 0.80. text-embedding-3-large, Reranking = 0.86. text-embedding-3-large, Retrie v al = 0.73. text-embedding-3-large, STS = 0.81. text-embedding-3-large, Summarization = 0.30. text-embedding-3-small, A v erage = 0.69. text-embedding-3-small, BitextMining = 0.95. text-embedding-3-small, Classification = 0.70. text-embedding-3-small, Clustering = 0.49. text-embedding-3-small, P airClassification = 0.77. text-embedding-3-small, Reranking = 0.81. text-embedding-3-small, Retrie v al = 0.68. text-embedding-3-small, STS = 0.79. text-embedding-3-small, Summarization = 0.30. text-embedding-ada-002, A v erage = 0.69. text-embedding-ada-002, BitextMining = 0.95. text-embedding-ada-002, Classification = 0.69. text-embedding-ada-002, Clustering = 0.51. text-embedding-ada-002, P airClassification = 0.77. text-embedding-ada-002, Reranking = 0.82. text-embedding-ada-002, Retrie v al = 0.67. text-embedding-ada-002, STS = 0.78. text-embedding-ada-002, Summarization", + "page_start": 20, + "page_end": 20, + "source_file": "arxiv4.pdf" + }, + { + "text": "D.2 Evaluation results per task\nTable 7: Models included in the benchmark with their main characteristics. The size in Gb is estimated using the number of parameters counted as float32 numbers. Sentence sim refers to the fact that the model was trained on a task that favors semantic similarity.\ntext-embedding-3-large, License = Closed source. text-embedding-3-large, Sentence sim = N/A. mistral-embed, Finetuned = N/A. mistral-embed, Language = multilingual. mistral-embed, # params = N/A. mistral-embed, Size (Gb) = N/A. mistral-embed, Seq. Len. = 16384. mistral-embed, Emb. dim. = 1024. mistral-embed, License = Closed source. mistral-embed, Sentence sim = N/A. universal-sentence-encoder-multilingual-3, Finetuned = Yes. universal-sentence-encoder-multilingual-3, Language = multilingual. universal-sentence-encoder-multilingual-3, # params = 6,89e+07. universal-sentence-encoder-multilingual-3, Size (Gb) = 0.28. universal-sentence-encoder-multilingual-3, Seq. Len. = N/A. universal-sentence-encoder-multilingual-3, Emb. dim. = 512. universal-sentence-encoder-multilingual-3, License = Apache-2.0. universal-sentence-encoder-multilingual-3, Sentence sim = Yes. universal-sentence-encoder-multilingual-large-3, Finetuned = Yes. universal-sentence-encoder-multilingual-large-3, Language = multilingual. universal-sentence-encoder-multilingual-large-3, # params = 8,52e+07. universal-sentence-encoder-multilingual-large-3, Size (Gb) = 0.34. universal-sentence-encoder-multilingual-large-3, Seq. Len. = N/A. universal-sentence-encoder-multilingual-large-3,", + "page_start": 19, + "page_end": 19, + "source_file": "arxiv4.pdf" + }, + { + "text": "3.2 Models\net al., 2019), their variants optimized for semantic similarity (Reimers and Gurevych, 2019), numerous multilingual models performing at the top on MTEB (e.g E5 and T5 ), Bloom variants (Zhang et al., 2023), models based on very recent powerful LLMs (Wang et al., 2023; Faysse et al., 2024) and finally the proprietary models of OpenAI, Cohere and Voyage. Certain models were selected in multiple sizes to isolate the dimensionality effect effectively. We provide information on the models' licenses as reported in the Hugging Face hub 10 . However, we encourage readers to conduct further research before utilizing a model.", + "page_start": 4, + "page_end": 4, + "source_file": "arxiv4.pdf" + } + ] + }, + { + "references": { + "source_file": "EN-Draft FWC for services 0142.pdf", + "query": "What is the maximum amount covered by the FWC of the europeean chemical agency ?", + "target_page": 6, + "target_passage": "The maximum amount covering all purchases under this FWC, including all renewals and reimbursement of expenses is EUR 1 000 000 (one million)", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "I.5.1. Maximum amount of the FWC and maximum prices\nThe maximum amount covering all purchases under this FWC, including all renewals and reimbursement of expenses is EUR 1 000 000 (one million). However, this does not bind the contracting authority to purchase for the maximum amount.\nThe maximum unit prices of the services are:\nSenior experts:\n[ ] EUR per man-day\nExperts:\n[ ] EUR per man-day", + "page_start": 5, + "page_end": 5, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "I.5.3. Reimbursement of expenses\nIn addition to the maximum price specified in each specific contract, if applicable, the contracting authority shall reimburse the following in accordance with Article II.22:\n6\nContract number: ECHA/2019/355\nFWC conditions of October 2018\n(a) travel, subsistence, accommodation and shipment expenses; and\n(b) any other expenses provided for in the tender specifications.\nThe daily subsistence allowance referred to in Article II.22.4 (d) and the accommodation flat-rate ceiling referred to in Article II.22.4(e) are listed in Annex IV", + "page_start": 5, + "page_end": 6, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "Contract number: ECHA/2019/355\nFWC conditions of October 2018", + "page_start": 0, + "page_end": 0, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "I.1.1.1.3. Article 3 Price\n3.1 The price payable under this specific contract excluding reimbursement of expenses is EUR [ amount in figures and in words ].\n[The maximum amount covering all services to be provided under this specific contract including reimbursement of expenses and excluding price revision is EUR [ amount in figures and in words ].]\n3.2 [Reimbursement of expenses is not applicable to this specific contract.] [Within the maximum amount, up to EUR [ amount in figures and in words ] is earmarked for expenses, which must be reimbursed in accordance with the FWC].\n***", + "page_start": 43, + "page_end": 43, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "NUMBER - ECHA/2019/355\n1. The European Chemicals Agency in Helsinki ('the contracting authority'), represented for the purposes of signing this framework contract by [ forename, surname, function, directorate of authorising officer ],\nof the one part and\n2. [ Full official name ]\n[ Official legal form ]\n[ Statutory registration number or ID or passport number ]\n[ Full official address ]\n[ VAT registration number ]\n[appointed as the leader of the group by the members of the group that submitted the joint tender]\n[ For joint tenders, r epeat these data as many times as there are contractors and continue numbering ]\n([collectively] 'the contractor'), represented for the purposes of the signature of this framework contract by [ forename, surname, function of legal representative and name of company in the case of a joint tender ],\non the other part,\nHAVE AGREED\nto the special conditions, the general conditions for framework contracts for services and the following annexes:\nAnnex I - Tender specifications (reference No [ complete ] of [ insert date ])\nAnnex II - Contractor's tender (reference No [ complete ] of [ insert date ])\nAnnex III - [Model for order forms] [and] [model for specific contracts]\n1\nContract number: ECHA/2019/355\nFWC conditions of October 2018\nAnnex IV - Daily subsistence allowances and accommodation flat rates for Finland\nAnnex V -\n(a) Declaration on list of pre-exisiting rights\n(b) Statement of the contractor concerning rights to delivered results and\n(c) Statement of creator (or right holder)\nwhich form an integral part of this framework contract ('the FWC').", + "page_start": 0, + "page_end": 1, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "ANNEX I - Tender specifications\n40\nContract number: ECHA/2019/355\nFWC conditions of October 2018", + "page_start": 39, + "page_end": 40, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "I.1.1.1.4. Article 4 communication details\nFor the purpose of this specific contract, communications must be sent to the following addresses:\nContracting authority:\nEuropean Chemicals Agency\n[Directorate [ complete ]]\n[Unit [ complete ]]\n[ Postcode and city ]\nE-mail: [ insert functional mailbox ]\n44\nContract number: ECHA/2019/355\nFWC conditions of October 2018\nContractor (or leader in the case of a joint tender):\n[ Full name ]\n[ Function ]\n[ Company name ]\n[ Full official address ]\nE-mail: [ complete ]", + "page_start": 43, + "page_end": 44, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "I.1.1.1.1. Article 1 Subject matter\n1.1 This specific contract implements framework contract (FWC) No ECHA/2019/355 signed by the parties on [ complete date ] .\n1.2 In accordance with the provisions set out in the FWC and in this specific contract and [its][their] annex[es], which form an integral part of it, the contractor must provide the [following services:] [services specified in Annex [ complete ] . ]\nI.1.1.1.2. Article 2 Entry into force and duration\n2.1 This specific contract enters into force on the date on which the last party signs it.\n2.2 The provision of the services starts from the date of entry into force of this specific contract.\n2.3 The provision of the services must not exceed [ complete ] [ days] [months ] . The parties may extend the duration by written agreement before it elapses and before expiry of the FWC.", + "page_start": 43, + "page_end": 43, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "implementing framework contract No ECHA/2019/355\n1. The European Chemicals Agency in Helsinki ('the contracting authority'), represented for the purposes of signing this specific contract by [ forename, surname, function, department of authorising officer ],\nand\n2. [ Full official name ]\n[ Official legal form ]\n[ Statutory registration number or ID or passport number ]\n[ Full official address ]\n[ VAT registration number ]\n[appointed as leader of the group by the members of the group that submitted the joint tender]\n[ repeat these data as many times as there are contractors in case of joint tender and continue numbering ]\n([collectively] \"the contractor\"), represented for the purposes of signing this specific contract by [ forename, surname and function of legal representative ,]\n43\nContract number: ECHA/2019/355\nFWC conditions of October 2018", + "page_start": 42, + "page_end": 43, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "ANNEX III\n Model for specific contracts\n Model for order forms\n42\nContract number: ECHA/2019/355\nFWC conditions of October 2018", + "page_start": 41, + "page_end": 42, + "source_file": "EN-Draft FWC for services 0142.pdf" + } + ] + }, + { + "references": { + "source_file": "EN-Draft FWC for services 0142.pdf", + "query": "How can I get compensation if the european chemical agency terminates a contract we have ?", + "target_page": 11, + "target_passage": "If the FWC or a specific contract is terminated: a) neither party is entitled to compensation", + "chunk_present": { + "presence": true, + "index": 4 + } + }, + "top_chunk": [ + { + "text": "II.18.4. Effects of termination\nThe contractor is liable for damage incurred by the contracting authority as a result of the termination of the FWC or a specific contract, including the additional cost of appointing and contracting another contractor to provide or complete the services, except if the damage is a result of a termination in accordance with Article II.18.1(j), (k) or (l) or Article II.18.2. The contracting authority may claim compensation for such damage.\nThe contractor is not entitled to compensation for any loss resulting from the termination of the FWC or a specific contract, including loss of anticipated profits, unless the loss was caused by the situation specified in Article II.18.2.\nThe contractor must take all appropriate measures to minimise costs, prevent damage and cancel or reduce its commitments.\nWithin 60 days of the date of termination, the contractor must submit any report, deliverable or result and any invoice required for services that were provided before the date of termination.\nIn the case of joint tenders, the contracting authority may terminate the FWC or a specific contract with each member of the group separately on the basis of points (d), (e) or (g) of Article II.18.1, under the conditions set out in Article II.11.2", + "page_start": 31, + "page_end": 31, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "II.18.3. Procedure for termination\nA party must formally notify the other party of its intention to terminate the FWC or a specific contract and the grounds for termination.\nThe other party has 30 days following the date of receipt to submit observations, including the measures it has taken or will take to continue fulfilling its contractual obligations. Failing that, the decision to terminate becomes enforceable the day after the time limit for submitting observations has elapsed.\nIf the other party submits observations, the party intending to terminate must formally notify it either of the withdrawal of its intention to terminate or of its final decision to terminate.\nIn the cases referred to in points (a) to (d), (g) to (i), (k) and (l) of Article II.18.1 and in Article II.18.2, the date on which the termination takes effect must be specified in the formal notification .\nIn the cases referred to in points (e), (f) and (j) of Article II.18.1, the termination takes effect on the day following the date on which the contractor receives notification of termination.\nIn addition, at the request of the contracting authority and regardless of the grounds for termination, the contractor must provide all necessary assistance, including information, documents and files, to allow the contracting authority to complete, continue or transfer the services to a new contractor or internally, without interruption or adverse effect on the\n31\nContract number: ECHA/2019/355\nFWC conditions of October 2018\nquality or continuity of the services. The parties may agree to draw up a transition plan detailing the contractor's assistance unless such plan is already detailed in other contractual documents or in the tender specifications. The contractor must provide such assistance at no additional cost, except if it can demonstrate that it requires substantial additional resources or means, in which case it must provide an estimate of the costs involved and the parties will negotiate an arrangement in good faith.", + "page_start": 30, + "page_end": 31, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "II.18.1. Grounds for termination by the contracting authority\nThe contracting authority may terminate the FWC or any on-going specific contract in the following circumstances:\n(a) if provision of the services under an on-going specific contract has not actually started within 15 days of the scheduled date and the contracting authority considers that the new date proposed, if any, is unacceptable, taking into account Article II.11.2;\n(b) if the contractor is unable, through its own fault, to obtain any permit or licence required for implementation of the FWC ;\n(c) if the contractor does not implement the FWC or perform the specific contract in accordance with the tender specifications or request for service or is in breach of another substantial contractual obligation or repeatedly refuses to sign specific contracts. Termination of three or more specific contracts in these circumstances also constitutes grounds for termination of the FWC;\n(d) if the contractor or any person that assumes unlimited liability for the debts of the contractor is in one of the situations provided for in points (a) and (b) of Article 136(1) of the Financial Regulation 6 ;\n(e) if the contractor or any related person is in one of the situations provided for in points (c) to (h) of Article 136(1) or to Article 136(2) of the Financial Regulation;\n(f) if the procedure for awarding the FWC or the implementation of the FWC prove to have been subject to irregularities , fraud or breach of obligations ;\n6 Regulation (EU, Euratom) 2018/1046 of the European Parliament and of the Council of 18 July 2018 on the financial rules applicable to the general budget of the Union, amending Regulations (EU) No 1296/2013, (EU) No 1301/2013, (EU) No 1303/2013, (EU) No 1304/2013, (EU) No 1309/2013, (EU) No 1316/2013, (EU) No 223/2014, (EU) No 283/2014, and Decision No 541/2014/EU and repealing Regulation (EU, Euratom) No 966/2012, OJ L 193 of 30.7.2018, p.1 https://eur-lex.europa.eu/legalcontent/EN/TXT/?uri=uriserv:OJ.L_.2016.119.01.0001.01.ENG\n30", + "page_start": 29, + "page_end": 29, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "implementing framework contract No ECHA/2019/355\n1. The European Chemicals Agency in Helsinki ('the contracting authority'), represented for the purposes of signing this specific contract by [ forename, surname, function, department of authorising officer ],\nand\n2. [ Full official name ]\n[ Official legal form ]\n[ Statutory registration number or ID or passport number ]\n[ Full official address ]\n[ VAT registration number ]\n[appointed as leader of the group by the members of the group that submitted the joint tender]\n[ repeat these data as many times as there are contractors in case of joint tender and continue numbering ]\n([collectively] \"the contractor\"), represented for the purposes of signing this specific contract by [ forename, surname and function of legal representative ,]\n43\nContract number: ECHA/2019/355\nFWC conditions of October 2018", + "page_start": 42, + "page_end": 43, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "I.11. Termination by either party 2\nEither party may terminate the FWC and/or the FWC and specific contracts by sending formal notification to the other party with three months written notice.\nIf the FWC or a specific contract is terminated:\na) neither party is entitled to compensation;\nb) the contractor is entitled to payment only for the services provided before termination takes effect.\nThe second, third and fourth paragraphs of Article II.18.4 apply.", + "page_start": 10, + "page_end": 10, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "I.1.1.1.4. Article 4 communication details\nFor the purpose of this specific contract, communications must be sent to the following addresses:\nContracting authority:\nEuropean Chemicals Agency\n[Directorate [ complete ]]\n[Unit [ complete ]]\n[ Postcode and city ]\nE-mail: [ insert functional mailbox ]\n44\nContract number: ECHA/2019/355\nFWC conditions of October 2018\nContractor (or leader in the case of a joint tender):\n[ Full name ]\n[ Function ]\n[ Company name ]\n[ Full official address ]\nE-mail: [ complete ]", + "page_start": 43, + "page_end": 44, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "NUMBER - ECHA/2019/355\n1. The European Chemicals Agency in Helsinki ('the contracting authority'), represented for the purposes of signing this framework contract by [ forename, surname, function, directorate of authorising officer ],\nof the one part and\n2. [ Full official name ]\n[ Official legal form ]\n[ Statutory registration number or ID or passport number ]\n[ Full official address ]\n[ VAT registration number ]\n[appointed as the leader of the group by the members of the group that submitted the joint tender]\n[ For joint tenders, r epeat these data as many times as there are contractors and continue numbering ]\n([collectively] 'the contractor'), represented for the purposes of the signature of this framework contract by [ forename, surname, function of legal representative and name of company in the case of a joint tender ],\non the other part,\nHAVE AGREED\nto the special conditions, the general conditions for framework contracts for services and the following annexes:\nAnnex I - Tender specifications (reference No [ complete ] of [ insert date ])\nAnnex II - Contractor's tender (reference No [ complete ] of [ insert date ])\nAnnex III - [Model for order forms] [and] [model for specific contracts]\n1\nContract number: ECHA/2019/355\nFWC conditions of October 2018\nAnnex IV - Daily subsistence allowances and accommodation flat rates for Finland\nAnnex V -\n(a) Declaration on list of pre-exisiting rights\n(b) Statement of the contractor concerning rights to delivered results and\n(c) Statement of creator (or right holder)\nwhich form an integral part of this framework contract ('the FWC').", + "page_start": 0, + "page_end": 1, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "II.18.1. Grounds for termination by the contracting authority\nContract number: ECHA/2019/355\nFWC conditions of October 2018\n(g) if the contractor does not comply with applicable obligations under environmental, social and labour law established by Union law, national law, collective agreements or by the international environmental, social and labour law provisions listed in Annex X to Directive 2014/24/EU;\n(h) if the contractor is in a situation that could constitute a conflict of interest or a professional conflicting interest as referred to in Article II.7;\n(i) if a change to the contractor's legal, financial, technical, organisational or ownership situation is likely to substantially affect the implementation of the FWC or substantially modify the conditions under which the FWC was initially awarded;\n(j) in the event of force majeure , where either resuming implementation is impossible or the necessary ensuing amendments to the FWC or a specific contract would mean that the tender specifications are no longer fulfilled or result in unequal treatment of tenderers or contractors;\n(k) if the needs of the contracting authority change and it no longer requires new services under the FWC; in such cases ongoing specific contracts remain unaffected;\n(l) if the termination of the FWC with one or more of the contractors means that the multiple FWC with reopening of competition no longer has the minimum required level of competition;\n(m) if the contractor is in breach of the data protection obligations resulting from Article II.9.2;\n(n) if the contractor does not comply with the applicable data protection obligations resulting from Regulation (EU) 2016/679.", + "page_start": 30, + "page_end": 30, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "Contract number: ECHA/2019/355\nFWC conditions of October 2018", + "page_start": 0, + "page_end": 0, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "II.17.2. Suspension by the contracting authority\nThe contracting authority may suspend the implementation of the FWC or performance of\n29\nContract number: ECHA/2019/355\nFWC conditions of October 2018\na specific contract or any part of it:\n(a) if the procedure for awarding the FWC or a specific contract or the implementation of the FWC proves to have been subject to irregularities, fraud or breach of obligations ;\n(b) in order to verify whether the presumed irregularities, fraud or breach of obligations have actually occurred.\nThe contracting authority must formally notify the contractor of the suspension and the reasons for it. Suspension takes effect on the date of formal notification , or at a later date if the formal notification so provides.\nThe contracting authority must notify the contractor as soon as the verification is completed whether:\n(a) it is lifting the suspension; or\n(b) it intends to terminate the FWC or a specific contract under Article II.18.1(f) or (j).\nThe contractor is not entitled to compensation for suspension of any part of the FWC or a specific contract.\nThe contracting authority may in addition suspend the time allowed for payments in accordance with Article II.21.7.", + "page_start": 28, + "page_end": 29, + "source_file": "EN-Draft FWC for services 0142.pdf" + } + ] + }, + { + "references": { + "source_file": "EN-Draft FWC for services 0142.pdf", + "query": "According to the european chemical agency contracts, what is considers a grave professional misconduct ?", + "target_page": 14, + "target_passage": "'Grave professional misconduct': a violation of applicable laws or regulations or ethical standards of the profession to which a contractor or a related person belongs, including any conduct leading to sexual or other exploitation or abuse, or any wrongful conduct of the contractor or a related person which has an impact on its professional credibility where such conduct denotes wrongful intent or gross negligence.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "implementing framework contract No ECHA/2019/355\n1. The European Chemicals Agency in Helsinki ('the contracting authority'), represented for the purposes of signing this specific contract by [ forename, surname, function, department of authorising officer ],\nand\n2. [ Full official name ]\n[ Official legal form ]\n[ Statutory registration number or ID or passport number ]\n[ Full official address ]\n[ VAT registration number ]\n[appointed as leader of the group by the members of the group that submitted the joint tender]\n[ repeat these data as many times as there are contractors in case of joint tender and continue numbering ]\n([collectively] \"the contractor\"), represented for the purposes of signing this specific contract by [ forename, surname and function of legal representative ,]\n43\nContract number: ECHA/2019/355\nFWC conditions of October 2018", + "page_start": 42, + "page_end": 43, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "NUMBER - ECHA/2019/355\n1. The European Chemicals Agency in Helsinki ('the contracting authority'), represented for the purposes of signing this framework contract by [ forename, surname, function, directorate of authorising officer ],\nof the one part and\n2. [ Full official name ]\n[ Official legal form ]\n[ Statutory registration number or ID or passport number ]\n[ Full official address ]\n[ VAT registration number ]\n[appointed as the leader of the group by the members of the group that submitted the joint tender]\n[ For joint tenders, r epeat these data as many times as there are contractors and continue numbering ]\n([collectively] 'the contractor'), represented for the purposes of the signature of this framework contract by [ forename, surname, function of legal representative and name of company in the case of a joint tender ],\non the other part,\nHAVE AGREED\nto the special conditions, the general conditions for framework contracts for services and the following annexes:\nAnnex I - Tender specifications (reference No [ complete ] of [ insert date ])\nAnnex II - Contractor's tender (reference No [ complete ] of [ insert date ])\nAnnex III - [Model for order forms] [and] [model for specific contracts]\n1\nContract number: ECHA/2019/355\nFWC conditions of October 2018\nAnnex IV - Daily subsistence allowances and accommodation flat rates for Finland\nAnnex V -\n(a) Declaration on list of pre-exisiting rights\n(b) Statement of the contractor concerning rights to delivered results and\n(c) Statement of creator (or right holder)\nwhich form an integral part of this framework contract ('the FWC').", + "page_start": 0, + "page_end": 1, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "II.7. Conflict of interest and professional conflicting interests\nII.7.1 The contractor must take all the necessary measures to prevent any situation of conflict of interest or professional conflicting interest .\nII.7.2 The contractor must notify the contracting authority in writing as soon as possible of any situation that could constitute a conflict of interest or a professional conflicting interest during the implementation of the FWC . The contractor must immediately take action to rectify the situation.\nThe contracting authority may do any of the following:\n(a) verify that the contractor's action is appropriate;\n(b) require the contractor to take further action within a specified deadline;\n(c) decide not to award a specific contract to the contractor.\nII.7.3 The contractor must pass on all the relevant obligations in writing to:\n(a) its personnel ;\n(b) any natural person with the power to represent it or take decisions on its behalf;\n(c) third parties involved in the implementation of the FWC , including subcontractors.\nThe contractor must also ensure that the persons referred to above are not placed in a situation which could give rise to conflicts of interest.\n19\nContract number: ECHA/2019/355\nFWC conditions of October 2018", + "page_start": 18, + "page_end": 19, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "II.18.1. Grounds for termination by the contracting authority\nContract number: ECHA/2019/355\nFWC conditions of October 2018\n(g) if the contractor does not comply with applicable obligations under environmental, social and labour law established by Union law, national law, collective agreements or by the international environmental, social and labour law provisions listed in Annex X to Directive 2014/24/EU;\n(h) if the contractor is in a situation that could constitute a conflict of interest or a professional conflicting interest as referred to in Article II.7;\n(i) if a change to the contractor's legal, financial, technical, organisational or ownership situation is likely to substantially affect the implementation of the FWC or substantially modify the conditions under which the FWC was initially awarded;\n(j) in the event of force majeure , where either resuming implementation is impossible or the necessary ensuing amendments to the FWC or a specific contract would mean that the tender specifications are no longer fulfilled or result in unequal treatment of tenderers or contractors;\n(k) if the needs of the contracting authority change and it no longer requires new services under the FWC; in such cases ongoing specific contracts remain unaffected;\n(l) if the termination of the FWC with one or more of the contractors means that the multiple FWC with reopening of competition no longer has the minimum required level of competition;\n(m) if the contractor is in breach of the data protection obligations resulting from Article II.9.2;\n(n) if the contractor does not comply with the applicable data protection obligations resulting from Regulation (EU) 2016/679.", + "page_start": 30, + "page_end": 30, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "II.24. Checks and audits\nII.24.5 In accordance with Council Regulation (Euratom, EC) No 2185/96 of 11 November 1996 concerning on-the-spot checks and inspection carried out by the Commission in order to protect the European Communities' financial interests against fraud and other irregularities and Regulation (EU, Euratom) No 883/2013 of the European Parliament and of the Council of 11 September 2013 concerning investigations conducted by the European Anti-Fraud Office, the European AntiFraud Office may carry out investigations, including on the spot checks and inspections, to establish whether there has been fraud , corruption or any other illegal activity under the contract affecting the financial interests of the Union. Findings arising from an investigation may lead to criminal prosecution under national law.\nThe investigations may be carried out at any moment during the provision of the services and up to five years starting from the payment of the balance of the last specific contract issued under this FWC.\nII.24.6 The Court of Auditors, the European Public Prosecutor's Office established by Council Regulation (EU) 2017/19397 7 ('the EPPO') and, for the processing of personal data, the European Data Protection Supervisor have the same rights as the contracting authority, particularly right of access, for the purpose of checks,\n7 Council Regulation (EU) 2017/1939 of 12 October 2017 implementing enhanced cooperation on the establishment of the European Public Prosecutor's Office\n38\nContract number: ECHA/2019/355\nFWC conditions of October 2018\naudits and investigations.\n39\nContract number: ECHA/2019/355\nFWC conditions of October 2018", + "page_start": 37, + "page_end": 39, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "II.17.2. Suspension by the contracting authority\nThe contracting authority may suspend the implementation of the FWC or performance of\n29\nContract number: ECHA/2019/355\nFWC conditions of October 2018\na specific contract or any part of it:\n(a) if the procedure for awarding the FWC or a specific contract or the implementation of the FWC proves to have been subject to irregularities, fraud or breach of obligations ;\n(b) in order to verify whether the presumed irregularities, fraud or breach of obligations have actually occurred.\nThe contracting authority must formally notify the contractor of the suspension and the reasons for it. Suspension takes effect on the date of formal notification , or at a later date if the formal notification so provides.\nThe contracting authority must notify the contractor as soon as the verification is completed whether:\n(a) it is lifting the suspension; or\n(b) it intends to terminate the FWC or a specific contract under Article II.18.1(f) or (j).\nThe contractor is not entitled to compensation for suspension of any part of the FWC or a specific contract.\nThe contracting authority may in addition suspend the time allowed for payments in accordance with Article II.21.7.", + "page_start": 28, + "page_end": 29, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "Contract number: ECHA/2019/355\nFWC conditions of October 2018", + "page_start": 0, + "page_end": 0, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "here\npublications/publications/safety-andhealth-micro-and-small-enterprises-eu-policy-practice/view\n398 European Commission / Senior Labour inspectors committee: Guidance for National Labour Inspectors on addressing risks from worker exposure to respirable crystalline silica (RCS) on construction sites, October 2016 399 Two of many examples: SME United, (Employers Federation)\nhttps://www.smeunited.eu/policies/policies/employment/health-safety , EFBWW European Federation of Building and Woodworkers (Trade Union), https://efbww.eu/activities/occupational-health-and-safety 400 OSHWiki: Section 'OSH System at national level', descriptions of the social dialogue in each EU Member State\nhttps://oshwiki.eu/wiki/Category:OSH_systems_at_national_level\n401 DG Employment: Website on 'Social Dialogue', https://ec.europa.eu/social/main.jsp?catId=329&langId=en\n402\nEurofound\n'Database\nof\nwages,\nworking\ntime\nand\ncollective\ndisputes',\nsee:\nhttps://www.eurofound.europa.eu/data/database-of-wages-working-time-and-collective-disputes\n403 E.g.: Prevent (Sweden), DGUV (Germany) AUVA (Austria), see for all EU Member Stress the OSHWiki article on 'OSH-systems at national level' https://oshwiki.eu/wiki/Category:OSH_systems_at_national_level\n404 European Agency for Safety and Health at Work, 2021: Improving compliance with occupational safety and health regulations: an overarching review - Executive summary, https://osha.europa.eu/en/publications/summaryimproving-compliance-occupational-safety-and-health-regulations-overarching\nEuropean Agency for Safety and Health at Work, 2021: Improving compliance with occupational safety and health regulations: an overarching review, Literature review; Chapter 3: Societal norms, social reporting, corporate social responsibility and support for securing compliance, https://osha.europa.eu/en/publications/literature-reviewimproving-compliance-occupational-safety-and-health-regulations-0", + "page_start": 155, + "page_end": 155, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "I.1.1.1.4. Article 4 communication details\nFor the purpose of this specific contract, communications must be sent to the following addresses:\nContracting authority:\nEuropean Chemicals Agency\n[Directorate [ complete ]]\n[Unit [ complete ]]\n[ Postcode and city ]\nE-mail: [ insert functional mailbox ]\n44\nContract number: ECHA/2019/355\nFWC conditions of October 2018\nContractor (or leader in the case of a joint tender):\n[ Full name ]\n[ Function ]\n[ Company name ]\n[ Full official address ]\nE-mail: [ complete ]", + "page_start": 43, + "page_end": 44, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "II.9.2 Processing of personal data by the contractor\n(a) nature of the personal data breach including where possible, the categories and approximate number of data subjects concerned and the categories and approximate number of personal data records concerned; (b) likely consequences of the breach; (c) measures taken or proposed to be taken to address the breach, including, where appropriate, measures to mitigate its possible adverse effects.\nThe contractor shall immediately inform the data controller if, in its opinion, an instruction infringes Regulation (EU) 2018/1725, Regulation (EU) 2016/679, or other Union or Member State data protection provisions as referred to in the tender specifications.\n21\nContract number: ECHA/2019/355\nFWC conditions of October 2018\nThe contractor shall assist the controller for the fulfilment of its obligations pursuant to Article 33 to 41 under Regulation (EU) 2018/1725 to:\n(a) ensure compliance with its data protection obligations regarding the security of the processing, and the confidentiality of electronic communications and directories of users; (b) notify a personal data breach to the European Data Protection Supervisor; (c) communicate a personal data breach without undue delay to the data subject, where applicable; (d) carry out data protection impact assessments and prior consultations as necessary.\nThe contractor shall maintain a record of all data processing operations carried on behalf of the controller, transfers of personal data, security breaches, responses to requests for exercising rights of people whose personal data is processed and requests for access to personal data by third parties.\nThe contracting authority is subject to Protocol 7 of the Treaty on the Functioning of the European Union on the privileges and immunities of the European Union, particularly as regards the inviolability of archives (including the physical location of data and services as set out in Article I.9.2) and data security, which includes personal data held on behalf of the contracting authority in the premises of the contractor or subcontractor.\nThe contractor shall notify the contracting authority without delay of any legally binding request for disclosure of the personal data processed on behalf of the contracting authority made by any national public authority, including an authority from a third country. The contractor may not give such access without the prior written authorisation of the contracting authority.", + "page_start": 20, + "page_end": 21, + "source_file": "EN-Draft FWC for services 0142.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_GLW_2002.pdf", + "query": "What or Corning's corporate values ?", + "target_page": 12, + "target_passage": "Quality, Integrity, Performance, Leadership, Innovation, Independence, and The Individual", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "AND CHIEF OPERATING OFFICER\nWe know that our shareholders are most eager to see a greater return on their investment with Corning, and of Wall Street's confidence. We are 100 percent committed to reaching that goal of profitability in 2003- and doing so within the rigorous compliance rules by which we have always been guided. Integrity characterizes all our relationships, both inside and outside of Corning, and we will never compromise that foundation of our reputation.\nWithin the context of our financial realities, however, we have not lost our sense of self. We will meet our goals…but the path we are taking to get there has been, and will continue to be, consistent with our Values. Integrity … quality … treating individuals with dignity and respect … these are the guiding principles of the decisions we make. We know that in adhering to our Values, solid business performance will follow.\n8", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "C OMMON S TOCK\n-changes in the mix of sales between premium and non-premium products,\n-facility expansions and new plant start-up costs,\n-adverse litigation or regulatory developments, including future or pending tax legislation,\n-adequacy and availability of insurance,\n-capital resource and cash flow activities,\n-capital spending,\n-equity company activities,\n-interest costs,\n-acquisition and divestiture activity,\n-the rate of technology change,\n-the ability to enforce patents,\nCorning Incorporated common stock is listed on the New York Stock Exchange and the SWX Swiss Exchange. In addition, it is traded on the Boston, Midwest, Pacific and Philadelphia stock exchanges. Common stock options are traded on the Chicago Board Options Exchange. The abbreviated ticker symbol for Corning Incorporated is 'GLW.'\nTRANSFER A GENT AND R EGISTRAR Computershare Investor Services LLC P.O. Box A-3504 Chicago, IL 60690-3504 Telephone: 800.255.0461 Website: www.computershare.com\nC HANGE OF A DDRESS\nReport change of address to Computershare Investor Services at the above address.\nINDEPENDENT A CCOUNTANTS PricewaterhouseCoopers LLP 1301 Avenue of the Americas New York, NY 10019\nCorning Incorporated\nOne Riverfront Plaza Corning, NY 14831-0001 607 974 9000\nwww.corning.com\n02BR24601EN\n-product performance issues,\n-stock price fluctuations, and\n-other risks detailed in Corning's SEC filings.\nNeither this report nor any statement contained herein is furnished in connection with any of\nCorning is an equal opportunity employer. Printed in USA\n© Corning Incorporated 2003\nTHE INTEGRATION OF OUR BELIEFS ,WISDOM ,CURIOSITY ,& KNOWLEDGE PROVIDES BALANCE & STABILITY .\nC ORPORATE VALUES :\nCorning's Values provide an unchanging moral and ethical compass that guides the actions of everyone in the company. The corporate values are: Quality, Integrity, Performance, Leadership, Innovation, Independence, and The Individual.\nquality integri performance leadership innovation independence i i i i i i i T OTAL Q UALITY : In alignment with the quality policy of thecorporation, our policy is to achieve Total Quality performance. Total Quality performance means understanding who the customer is, what the requirements are, and meeting those requirements better than anyone else, without error, on time, every time.", + "page_start": 10, + "page_end": 11, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "INVESTING IN OUR FUTURE\nI continue to be extremely excited about the future opportunities emerging from our 152-year legacy of scientific innovations. We are concentrating our efforts on high-impact, near-term growth initiatives with emphasis on our liquid-crystal display, diesel filter, and chemical processing projects.\nCorning Incorporated is more than the sum of its parts-much more than a commercial enterprise.\nWe are one company with a proud history of innovation spanning more than 150 years. That legacy has created a diverse business portfolio and strong market leadership.\nWe have a time-tested set of Values and we rely on them to guide our every action. We association that all who touch our corporation feel. Shareholders, customers and employees understand that your corporation has, for more than 150 years, produced useful and industry-creating products that have changed the lives of mankind.\nIn our long history, we've always come together in the face of a tough challenge - and you can count on us to continue and assure you that we will succeed!\nAnd we are certainly not giving up on optical communications. We have the biggest share of the optical fiber market, by far, and continue to be the low-cost producer for anyone needing to move information from place to place. So while we've scaled back on production of fiber and other optical products, we certainly believe that they will continue to be an important part of our product mix again in the future. The optical communications industry is still in its infancy and we will capitalize on our leadership position to grow both our earnings and return on shareholder equity.\nYes, we have trimmed our investment in research to a level appropriate with our lowered revenues. But we're committed to research today even more than we have been in the past. Sincerely,\nWe are applying more than 10 percent of our revenues toward research. Some may question this high level of commitment in these times … but we simply will not back away from it. We\n3\nC ORNING T ECHNOLOGIES\nCorning' vative technology company The businesses we classify as Corning T ductor optics operations with aggressive plans for significant growth during 2003.\nOur LCD glass business has been a star performer year-over-year volume gains of more than 45 percent. We monitors have doubled over the past year alone - and there' desktop displays sold in 2002 were LCD. And, LCD TVs are next big opportunities, as the number of LCD more than doubled in 2002. Our EAGLE 2000™ glass substrates turers to produce lighter, larger, thinner and higher displays more af", + "page_start": 4, + "page_end": 5, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "S CIENCE & TECHNOLOGY\nCorning' the context of managing the sensitive balance between the near alignment of R&D and business objectives, and longer discovery research and new opportunity creation.\nOver the past year with business conditions. markets and create life-changing innovations.\nWe opportunities more quickly and efficiently. We critical intellectual assets of our scientific organization.\nOur R&D or new product development, but also new process development. lowered cost and increased quality performance.\nInnovation is one of Corning's core V language and mindset of the company. Even in the face of dif commitment to research and development.\nC RITICAL T ECHNOLOGIES : CHEMICAL VAPOR DEPOSITION\nM ATERIALS R ESEARCH : OPTICAL PROPERTIES\n7\nW ENDELL P. WEEKS\nJ AMES B. FLAWS", + "page_start": 8, + "page_end": 9, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "B A L A N C E\nCorning Annual Report 2002", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "AND CHIEF OPERATING OFFICER\nVICE CHAIRMAN\nAND CHIEF FINANCIAL OFFICER\nIn our business operations during 2002 we invested a great deal of energy aligning our cost structure and business plans with our priority of restoring profitability. After massive restructuring - following restructuring efforts we launched in 2001-we feel we now have our cost structure and growth strategies in place to accomplish this goal.\nWe have re-balanced the company to take advantage of our broad and diverse set of businesses. And in charting our strategies, we have focused on ensuring that both our segments have solid business plans in place, enabling them to grow. Our people are rigorously committed to executing against these plans.\nWe take great pride in saying that Corning continues to be a financially sound company, thanks to the aggressive strategies we executed throughout 2002. Although it has been a very painful process, we have dramatically slowed the rate at which we are spending cash. We ended the year with a balance of cash and short-term investments of $2.1 billion. And we have access to $2 billion in credit that we haven't touched - and don't plan to. We also continue to pay down debt each quarter. This, combined a high degree of confidence in our ability to meet any future financial obligations. So, we feel very good about our liquidity position right now.\nAs you saw earlier in this report, our Corning Technologies businesses are in markets with solid growth potential. We have leading market positions in attractive businesses … we are ready to capitalize on that position of strength. Meanwhile, we are making these businesses even more cost-effective through significant manufacturing efficiency gains.\nIn telecommunications, we are not planning on a market recovery in 2003. We have aligned our cost structure to meet current demand levels after two very tough years of ongoing restructuring.\nThe ongoing economic weakness and uncertainty in world events continue to make the overall business environment to forecast revenues and expenses quarter-to-quarter, and we are encouraged by the near-term growth potential of our non-telecommunications businesses - especially our liquid-crystal display, environmental and semiconductor businesses. If these markets continue to grow as we expect, we are confident that we will be able to meet our goals.", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "R ETURNING TO PROFITABILITY\nIn 2003, we will focus our ener profitability. We explain a few of the reasons why.\nDespite these lowered revenues and net loss, I take great pride in saying that Corning continues to be a financially sound company. We developed a three-part plan for achieving this goal: maintaining significant cash balances; using excess cash to reduce our debt; and continuing to have access to our $2 billion revolving line of credit. And we have achieved significant success in each of these areas.\nAlthough it has been a very painful process, we have dramatically slowed the rate at which we are consuming cash and short term investments. Much of this, regrettably, was through a variety of plant closures and the elimination of about 7,100 jobs, in addition to the 12,000 jobs we eliminated last year. As a result, a major drain on cash has been due to severance\nOur Technologies segment has had a strong year, and has set aggressive goals for both sales and profit growth for 2003. to profitability - particularly our liquid-crystal display ronmental and semiconductor optics businesses. These are in which we participate expand as we expect, we have every We fixed cost structure. In October, we announced plans to\n2\n2002\nWORLDWIDE REVENUES\nhave more than 1,000 scientists and researchers in our laboratories. and they're going to stay that way!\noperations throughout the world. These actions are key to reaching this goal of profitability. The optical fiber and cable business remains challenging for the short term, but there is still a great deal of long-term value to be realized in this business. We believe our cost structure is coming in line with our current reduced revenue expectations.\nThe optical components market remains very weak and as a result our photonic technologies business will need to take further action to reduce costs. In this challenging environment, we have narrowed our product focus and continue to explore several strategic options.\nLastly, we are continuing to drive down costs in our administrative and staff functions by standardizing processes and centralizing activities wherever possible.", + "page_start": 3, + "page_end": 4, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "A NNUAL M EETING\nThe annual meeting of shareholders will be held on Thursday, April 24, 2003, in Corning, NY. A formal notice of the meeting together with a proxy statement will be mailed to shareholders on or about March 12, 2003. The proxy statement can also be accessed electronically through the Investor Relations category of the Corning home page on the Internet at www.corning.com. A summary report of the proceedings at the annual meeting will be available without charge upon written request to Ms. Denise A. Hauselt, Secretary and Assistant General Counsel, Corning Incorporated, HQ-E2-10, Corning, NY 14831.", + "page_start": 10, + "page_end": 10, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "A DDITIONAL INFORMATION\n'Safe Harbor' Statement under the Private Securities Litigation Reform Act of 1995 facts or information are forward-looking statements. These forward-looking statements involve risks and uncertainties that may cause the outcome to be materially different. Such risks and uncertainties include, but are not limited to:\n-global economic and political conditions,\n-currency fluctuations,\n-product demand and industry capacity,\n-competitive products and pricing,\n-\nsufficiency of manufacturing capacity and efficiencies,\n-cost reductions,\n-availability and costs of critical materials,\n-new product development and commercialization,\n-attracting and retaining key personnel,\n-order activity and demand from major customers,\n-fluctuations in capital spending by customers in the telecommunications industry and other business segments,\n-financial condition of customers,\nA copy of Corning's 2002 Annual Report on Form 10-K filed with the Securities and Exchange Commission is available upon written request to Ms. Denise A. Hauselt, Secretary and Assistant General Counsel, Corning Incorporated, HQ-E2-10, Corning, NY 14831. The Annual Report on Form 10-K can also be accessed electronically through the Investor Relations category of the home page on the Internet at: www.corning.com\nINVESTOR INFORMATION\nInvestment analysts who need additional information may contact Mr. Kenneth C. Sofio, Manager of Investor Relations, Corning Incorporated, HQ-E2-25, Corning, NY 14831; Telephone 607.974.9000", + "page_start": 10, + "page_end": 10, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "VALUES ARE IMPORTANT\nThere is another attribute of our forefathers that is still very relevant today, even though our\nworking environment is a vastly different place. People matter.\nValues are the essential building blocks for any successful company. If the basic building blocks are not in place then it doesn't matter whether you have a vision for change, a business will not go in the direction you want without them. In that context, the progress we have made under the restructuring program is most pleasing and there is an ongoing role for all of us to play in Santos' continuous improvement program.\nThis includes striving to operate our business in the safest possible manner. I applaud the great commitment and performance of everyone who rose to the challenges posed by the fire at the Moomba liquids recovery plant on New Year's Day 2004. The effort by everyone involved to repair and return the plant to full production was first class and a credit to their cooperation and professionalism.", + "page_start": 5, + "page_end": 5, + "source_file": "ASX_STO_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_GLW_2002.pdf", + "query": "As a Corning's investor, how can I get a summary of the annual meeting of shareholders ?", + "target_page": 11, + "target_passage": "A summary report of the proceedings at the annual meeting will be available without charge upon written request to Ms. Denise A. Hauselt, Secretary and Assistant General Counsel, Corning Incorporated, HQ-E2-10, Corning, NY 14831", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "A NNUAL M EETING\nThe annual meeting of shareholders will be held on Thursday, April 24, 2003, in Corning, NY. A formal notice of the meeting together with a proxy statement will be mailed to shareholders on or about March 12, 2003. The proxy statement can also be accessed electronically through the Investor Relations category of the Corning home page on the Internet at www.corning.com. A summary report of the proceedings at the annual meeting will be available without charge upon written request to Ms. Denise A. Hauselt, Secretary and Assistant General Counsel, Corning Incorporated, HQ-E2-10, Corning, NY 14831.", + "page_start": 10, + "page_end": 10, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "B A L A N C E\nCorning Annual Report 2002", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "ANNUAL MEETING\nThe Board of Directors extends an invitation to all shareholders to attend the Annual Meeting of Shareholders. The meeting will be held at 11:00 AM (EST) on April 20, 2004 in the Auditorium of the Company's offices at the Shentel Center, 500 Mill Road, Edinburg, Virginia.", + "page_start": 58, + "page_end": 58, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "C OMMON S TOCK\n-changes in the mix of sales between premium and non-premium products,\n-facility expansions and new plant start-up costs,\n-adverse litigation or regulatory developments, including future or pending tax legislation,\n-adequacy and availability of insurance,\n-capital resource and cash flow activities,\n-capital spending,\n-equity company activities,\n-interest costs,\n-acquisition and divestiture activity,\n-the rate of technology change,\n-the ability to enforce patents,\nCorning Incorporated common stock is listed on the New York Stock Exchange and the SWX Swiss Exchange. In addition, it is traded on the Boston, Midwest, Pacific and Philadelphia stock exchanges. Common stock options are traded on the Chicago Board Options Exchange. The abbreviated ticker symbol for Corning Incorporated is 'GLW.'\nTRANSFER A GENT AND R EGISTRAR Computershare Investor Services LLC P.O. Box A-3504 Chicago, IL 60690-3504 Telephone: 800.255.0461 Website: www.computershare.com\nC HANGE OF A DDRESS\nReport change of address to Computershare Investor Services at the above address.\nINDEPENDENT A CCOUNTANTS PricewaterhouseCoopers LLP 1301 Avenue of the Americas New York, NY 10019\nCorning Incorporated\nOne Riverfront Plaza Corning, NY 14831-0001 607 974 9000\nwww.corning.com\n02BR24601EN\n-product performance issues,\n-stock price fluctuations, and\n-other risks detailed in Corning's SEC filings.\nNeither this report nor any statement contained herein is furnished in connection with any of\nCorning is an equal opportunity employer. Printed in USA\n© Corning Incorporated 2003\nTHE INTEGRATION OF OUR BELIEFS ,WISDOM ,CURIOSITY ,& KNOWLEDGE PROVIDES BALANCE & STABILITY .\nC ORPORATE VALUES :\nCorning's Values provide an unchanging moral and ethical compass that guides the actions of everyone in the company. The corporate values are: Quality, Integrity, Performance, Leadership, Innovation, Independence, and The Individual.\nquality integri performance leadership innovation independence i i i i i i i T OTAL Q UALITY : In alignment with the quality policy of thecorporation, our policy is to achieve Total Quality performance. Total Quality performance means understanding who the customer is, what the requirements are, and meeting those requirements better than anyone else, without error, on time, every time.", + "page_start": 10, + "page_end": 11, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "Corporate Information\nCorporate Headquarters\nThe Hartford Financial Services Group, Inc. 690 Asylum Avenue Hartford, Connecticut 06115 860-547-5000\nInternet Address\nhttp://www.thehartford.com\nAnnual Meeting\nShareholders are cordially invited to attend The Hartford's Annual Meeting of Shareholders, which will be held on Thursday, April 18, 2002 at 9:00a.m. in the Wallace Stevens Theater at The Hartford Financial Services Group, Inc.'s home office at 690 Asylum Avenue, Hartford, Connecticut. Shareholders of record as of February 28, 2002 are entitled to notice of, and to vote at, the Annual Meeting.", + "page_start": 37, + "page_end": 37, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "ANNUAL MEETING\nThe Annual Meeting of Shareholders will be held at 10:00 a.m., Tuesday, October 23, 2012, at the Corporate Headquarters of Applied Industrial Technologies, 1 Applied Plaza, East 36th and Euclid Avenue, Cleveland, Ohio 44115.", + "page_start": 46, + "page_end": 46, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "INVESTING IN OUR FUTURE\nI continue to be extremely excited about the future opportunities emerging from our 152-year legacy of scientific innovations. We are concentrating our efforts on high-impact, near-term growth initiatives with emphasis on our liquid-crystal display, diesel filter, and chemical processing projects.\nCorning Incorporated is more than the sum of its parts-much more than a commercial enterprise.\nWe are one company with a proud history of innovation spanning more than 150 years. That legacy has created a diverse business portfolio and strong market leadership.\nWe have a time-tested set of Values and we rely on them to guide our every action. We association that all who touch our corporation feel. Shareholders, customers and employees understand that your corporation has, for more than 150 years, produced useful and industry-creating products that have changed the lives of mankind.\nIn our long history, we've always come together in the face of a tough challenge - and you can count on us to continue and assure you that we will succeed!\nAnd we are certainly not giving up on optical communications. We have the biggest share of the optical fiber market, by far, and continue to be the low-cost producer for anyone needing to move information from place to place. So while we've scaled back on production of fiber and other optical products, we certainly believe that they will continue to be an important part of our product mix again in the future. The optical communications industry is still in its infancy and we will capitalize on our leadership position to grow both our earnings and return on shareholder equity.\nYes, we have trimmed our investment in research to a level appropriate with our lowered revenues. But we're committed to research today even more than we have been in the past. Sincerely,\nWe are applying more than 10 percent of our revenues toward research. Some may question this high level of commitment in these times … but we simply will not back away from it. We\n3\nC ORNING T ECHNOLOGIES\nCorning' vative technology company The businesses we classify as Corning T ductor optics operations with aggressive plans for significant growth during 2003.\nOur LCD glass business has been a star performer year-over-year volume gains of more than 45 percent. We monitors have doubled over the past year alone - and there' desktop displays sold in 2002 were LCD. And, LCD TVs are next big opportunities, as the number of LCD more than doubled in 2002. Our EAGLE 2000™ glass substrates turers to produce lighter, larger, thinner and higher displays more af", + "page_start": 4, + "page_end": 5, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "ANNUAL MEETING\nThe Company's annual shareholders' meeting will be held at 10:30 a.m. on May 4, 2004, at the Holiday Inn, Highways 61 & 38 North, Muscatine, Iowa. Shareholders and other interested investors are encouraged to attend the meeting.", + "page_start": 62, + "page_end": 62, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "FOR MORE INFORMATION\nYou can find more information about us, including our Information Circular and Annual Information Form, on our website (rogers.com/ investors), on SEDAR (sedar.com) and on EDGAR (sec.gov), or you can e-mail us at investor.relations@rci.rogers.com. Information on or connected to these and any other websites referenced in this document is not part of this MD&A.\nYou can also go to rogers.com/investors for information about our governance practices, corporate social responsibility reporting, a glossary of communications and media industry terms, and additional information about our business.\n2013 ANNUAL REPORT ROGERS COMMUNICATIONS INC.\n25\nM A NA G E M E N T ' S D I SCU S SI O N AN D ANAL Y S IS\nMANAGEMENT'S DISCUSSION AND ANALYSIS", + "page_start": 28, + "page_end": 29, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "AND CHIEF OPERATING OFFICER\nVICE CHAIRMAN\nAND CHIEF FINANCIAL OFFICER\nIn our business operations during 2002 we invested a great deal of energy aligning our cost structure and business plans with our priority of restoring profitability. After massive restructuring - following restructuring efforts we launched in 2001-we feel we now have our cost structure and growth strategies in place to accomplish this goal.\nWe have re-balanced the company to take advantage of our broad and diverse set of businesses. And in charting our strategies, we have focused on ensuring that both our segments have solid business plans in place, enabling them to grow. Our people are rigorously committed to executing against these plans.\nWe take great pride in saying that Corning continues to be a financially sound company, thanks to the aggressive strategies we executed throughout 2002. Although it has been a very painful process, we have dramatically slowed the rate at which we are spending cash. We ended the year with a balance of cash and short-term investments of $2.1 billion. And we have access to $2 billion in credit that we haven't touched - and don't plan to. We also continue to pay down debt each quarter. This, combined a high degree of confidence in our ability to meet any future financial obligations. So, we feel very good about our liquidity position right now.\nAs you saw earlier in this report, our Corning Technologies businesses are in markets with solid growth potential. We have leading market positions in attractive businesses … we are ready to capitalize on that position of strength. Meanwhile, we are making these businesses even more cost-effective through significant manufacturing efficiency gains.\nIn telecommunications, we are not planning on a market recovery in 2003. We have aligned our cost structure to meet current demand levels after two very tough years of ongoing restructuring.\nThe ongoing economic weakness and uncertainty in world events continue to make the overall business environment to forecast revenues and expenses quarter-to-quarter, and we are encouraged by the near-term growth potential of our non-telecommunications businesses - especially our liquid-crystal display, environmental and semiconductor businesses. If these markets continue to grow as we expect, we are confident that we will be able to meet our goals.", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_GLW_2002.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_GLW_2002.pdf", + "query": "How many employees did Corning company count at the end of 2002 ?", + "target_page": 5, + "target_passage": "We are continuing to invest in our people — all 23,200 of them", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "B A L A N C E\nCorning Annual Report 2002", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "AND CHIEF OPERATING OFFICER\nVICE CHAIRMAN\nAND CHIEF FINANCIAL OFFICER\nIn our business operations during 2002 we invested a great deal of energy aligning our cost structure and business plans with our priority of restoring profitability. After massive restructuring - following restructuring efforts we launched in 2001-we feel we now have our cost structure and growth strategies in place to accomplish this goal.\nWe have re-balanced the company to take advantage of our broad and diverse set of businesses. And in charting our strategies, we have focused on ensuring that both our segments have solid business plans in place, enabling them to grow. Our people are rigorously committed to executing against these plans.\nWe take great pride in saying that Corning continues to be a financially sound company, thanks to the aggressive strategies we executed throughout 2002. Although it has been a very painful process, we have dramatically slowed the rate at which we are spending cash. We ended the year with a balance of cash and short-term investments of $2.1 billion. And we have access to $2 billion in credit that we haven't touched - and don't plan to. We also continue to pay down debt each quarter. This, combined a high degree of confidence in our ability to meet any future financial obligations. So, we feel very good about our liquidity position right now.\nAs you saw earlier in this report, our Corning Technologies businesses are in markets with solid growth potential. We have leading market positions in attractive businesses … we are ready to capitalize on that position of strength. Meanwhile, we are making these businesses even more cost-effective through significant manufacturing efficiency gains.\nIn telecommunications, we are not planning on a market recovery in 2003. We have aligned our cost structure to meet current demand levels after two very tough years of ongoing restructuring.\nThe ongoing economic weakness and uncertainty in world events continue to make the overall business environment to forecast revenues and expenses quarter-to-quarter, and we are encouraged by the near-term growth potential of our non-telecommunications businesses - especially our liquid-crystal display, environmental and semiconductor businesses. If these markets continue to grow as we expect, we are confident that we will be able to meet our goals.", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "EMPLOYEES\nDuring 2014, we employed approximately 67,000 employees on a full- or part-time basis. Due to the seasonal nature of our business, employment increased to approximately 68,000 employees in July 2014 and 73,500 in December 2014. All of our employees are non-union. We believe our relationship with our employees is good.", + "page_start": 16, + "page_end": 16, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "INVESTING IN OUR FUTURE\nI continue to be extremely excited about the future opportunities emerging from our 152-year legacy of scientific innovations. We are concentrating our efforts on high-impact, near-term growth initiatives with emphasis on our liquid-crystal display, diesel filter, and chemical processing projects.\nCorning Incorporated is more than the sum of its parts-much more than a commercial enterprise.\nWe are one company with a proud history of innovation spanning more than 150 years. That legacy has created a diverse business portfolio and strong market leadership.\nWe have a time-tested set of Values and we rely on them to guide our every action. We association that all who touch our corporation feel. Shareholders, customers and employees understand that your corporation has, for more than 150 years, produced useful and industry-creating products that have changed the lives of mankind.\nIn our long history, we've always come together in the face of a tough challenge - and you can count on us to continue and assure you that we will succeed!\nAnd we are certainly not giving up on optical communications. We have the biggest share of the optical fiber market, by far, and continue to be the low-cost producer for anyone needing to move information from place to place. So while we've scaled back on production of fiber and other optical products, we certainly believe that they will continue to be an important part of our product mix again in the future. The optical communications industry is still in its infancy and we will capitalize on our leadership position to grow both our earnings and return on shareholder equity.\nYes, we have trimmed our investment in research to a level appropriate with our lowered revenues. But we're committed to research today even more than we have been in the past. Sincerely,\nWe are applying more than 10 percent of our revenues toward research. Some may question this high level of commitment in these times … but we simply will not back away from it. We\n3\nC ORNING T ECHNOLOGIES\nCorning' vative technology company The businesses we classify as Corning T ductor optics operations with aggressive plans for significant growth during 2003.\nOur LCD glass business has been a star performer year-over-year volume gains of more than 45 percent. We monitors have doubled over the past year alone - and there' desktop displays sold in 2002 were LCD. And, LCD TVs are next big opportunities, as the number of LCD more than doubled in 2002. Our EAGLE 2000™ glass substrates turers to produce lighter, larger, thinner and higher displays more af", + "page_start": 4, + "page_end": 5, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "A NNUAL M EETING\nThe annual meeting of shareholders will be held on Thursday, April 24, 2003, in Corning, NY. A formal notice of the meeting together with a proxy statement will be mailed to shareholders on or about March 12, 2003. The proxy statement can also be accessed electronically through the Investor Relations category of the Corning home page on the Internet at www.corning.com. A summary report of the proceedings at the annual meeting will be available without charge upon written request to Ms. Denise A. Hauselt, Secretary and Assistant General Counsel, Corning Incorporated, HQ-E2-10, Corning, NY 14831.", + "page_start": 10, + "page_end": 10, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "annual report 2002", + "page_start": 0, + "page_end": 0, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "C OMMON S TOCK\n-changes in the mix of sales between premium and non-premium products,\n-facility expansions and new plant start-up costs,\n-adverse litigation or regulatory developments, including future or pending tax legislation,\n-adequacy and availability of insurance,\n-capital resource and cash flow activities,\n-capital spending,\n-equity company activities,\n-interest costs,\n-acquisition and divestiture activity,\n-the rate of technology change,\n-the ability to enforce patents,\nCorning Incorporated common stock is listed on the New York Stock Exchange and the SWX Swiss Exchange. In addition, it is traded on the Boston, Midwest, Pacific and Philadelphia stock exchanges. Common stock options are traded on the Chicago Board Options Exchange. The abbreviated ticker symbol for Corning Incorporated is 'GLW.'\nTRANSFER A GENT AND R EGISTRAR Computershare Investor Services LLC P.O. Box A-3504 Chicago, IL 60690-3504 Telephone: 800.255.0461 Website: www.computershare.com\nC HANGE OF A DDRESS\nReport change of address to Computershare Investor Services at the above address.\nINDEPENDENT A CCOUNTANTS PricewaterhouseCoopers LLP 1301 Avenue of the Americas New York, NY 10019\nCorning Incorporated\nOne Riverfront Plaza Corning, NY 14831-0001 607 974 9000\nwww.corning.com\n02BR24601EN\n-product performance issues,\n-stock price fluctuations, and\n-other risks detailed in Corning's SEC filings.\nNeither this report nor any statement contained herein is furnished in connection with any of\nCorning is an equal opportunity employer. Printed in USA\n© Corning Incorporated 2003\nTHE INTEGRATION OF OUR BELIEFS ,WISDOM ,CURIOSITY ,& KNOWLEDGE PROVIDES BALANCE & STABILITY .\nC ORPORATE VALUES :\nCorning's Values provide an unchanging moral and ethical compass that guides the actions of everyone in the company. The corporate values are: Quality, Integrity, Performance, Leadership, Innovation, Independence, and The Individual.\nquality integri performance leadership innovation independence i i i i i i i T OTAL Q UALITY : In alignment with the quality policy of thecorporation, our policy is to achieve Total Quality performance. Total Quality performance means understanding who the customer is, what the requirements are, and meeting those requirements better than anyone else, without error, on time, every time.", + "page_start": 10, + "page_end": 11, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "SELECTED FINANCIAL DATA ELEVEN-YEAR SUMMARY\n59,840. Members (Employees) at Year-End, 2003 = 8,926. Members (Employees) at Year-End, 2002 (a) = 8,828. Members (Employees) at Year-End, 2001 = 9,029 (b). Members (Employees) at Year-End, 2000 = 11,543 (b)\n(a) Per SFAS No. 142, 'Goodwill and Other Intangible Assets,' the Company has ceased recording of goodwill and indefinite-lived Intangible amortization.\n(b) Includes acquisitions completed during year.\n56", + "page_start": 55, + "page_end": 55, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "Employees\nAs of October 25, 2003, the Company had over 16,000 active employees.\n(d)\nExecutive Officers of the Registrant", + "page_start": 4, + "page_end": 5, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "Employees\nWith our subsidiary banks we employed approximately 750 full-time equivalent employees at February 1, 2003. Our management believes that our employee relations have been and will continue to be good.", + "page_start": 30, + "page_end": 30, + "source_file": "NASDAQ_FFIN_2002.pdf" + } + ] + }, + { + "references": { + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf", + "query": "What is the shortcut to mute myself in MS teams ?", + "target_page": 3, + "target_passage": "Use [Ctrl]+[Shift]+[M] for a shortcut to mute and unmute during meetings.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Meeting controls\nWhen you join meetings, a different window will pop-up. These are the controls you need to know:\nTip\nUse [Ctrl]+[Shift]+[M] for a shortcut to mute and unmute during meetings.", + "page_start": 2, + "page_end": 2, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "Teams and channels\nBy default, your chats will be arranged along the left-hand side of the chat panel, with the most recent messages at the top. You can right-click on any chat and select \"Pin,\" which will keep it at the top of your list for quick access.\nTip\nWhen you create group chats you can edit the name of the group by selecting the pen symbol next to the group icon in the chat. This will help you give it context and make it easier to find.\nWhen you are invited to a new Team, it will automatically appear on the left panel along with all its associated channels. You can choose to \"show\" the most relevant chanels and \"hide\" the rest.\nTeams\nGeneral\nMarketing\nShared Channel\nA\nteam\nis a broad group of people that work together to get something\ndone. You can choose who is part of the team, and people can only access\nshared content by invitation. All teams are created with an associated\nGeneral channel that includes all team members by default.\nChannels\nA\nchannel\nis a central hub for a specific topic, within the larger team, where\npeople can hold focused conversations and organize a library of files.\nChannels can be:\n· Standard (visible to everyone on the team)\n· Private (only visible to select team members)\n· Shared (visible to invited team members and external members of your\norganization who are not on the team)\nCreate a team for your organization with channels for your leadership team, each department, and one just for fun! Tip\nAN", + "page_start": 3, + "page_end": 3, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "Practice\nDownload the app for desktop and mobile to access Teams with the best performance anywhere you go.\nOnce you sign in, connect with your team in chat, channels, calls, and meetings.\nTry out the different features as you learn about them in this guide. You'll get the basics in no time!\nHit the ground running now!\nBuild confidence by trying things on your own. Go to the meet now button\n(at the top right corner on the Calendar tab) to play around and test all the meetings functionalities before you're in the spotlight!", + "page_start": 0, + "page_end": 0, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "Getting around\nNavigate Teams using the menu along the left side and the top bar of your Teams desktop app.\nTip\nYour Teams calendar automatically syncs with Outlook, and you can manage meetings through either app.", + "page_start": 1, + "page_end": 1, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "Respond\nTag a teammate in a message by typing the @ symbol followed by their name. They will receive a special notification calling for their attention. @\nReact to individual messages or quote them in a response.\nTip Going into format mode will prevent your message from sending when you hit [Enter], so it's a great way to draft and preview messages before sending them.\nTip If you want to revisit an important message later, hover on that message, select the three d , then choose 'Save.' Saved messages will be found under your profile picture dropdown menu.", + "page_start": 4, + "page_end": 4, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "Welcome to Microsoft Teams\nMicrosoft Teams is the app that brings your conversations, meetings, and files together in one place. This guide will help you get started with Teams, learn the basics, get tips to practice on your own, and discover ways to engage your team.", + "page_start": 0, + "page_end": 0, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "Present in meetings\nScreen share from the Share button at the top of your meeting window. 1.\nChoose what screen or window you want to share. Don't forget to include audio if you're sharing something with sound. 2.\nWhen you are finished, use the share button at the top of your meeting window to stop sharing. 3.", + "page_start": 2, + "page_end": 2, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "Contents\n................................................................................................................ 14. , 1 = 3.3.1 Add User ...................................................................................................................... 14. 3.3.2 Disable/Enable User ..................................................................................................... 15, 1 = 3.3.2 Disable/Enable User ..................................................................................................... 15. 3.3.3 View User", + "page_start": 1, + "page_end": 1, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "Button down:\nShort press to enter multi-sport mode.\nIn addition, when the watch is in the off-screen state, you can light up the screen by pressing any buttons.", + "page_start": 1, + "page_end": 1, + "source_file": "6126797.pdf" + }, + { + "text": "Volume settings\nBy default, each striped-type volume allows Easy Tier to manage its extents. If you need to fix the volume extent location (for example, to prevent extent demotes and to keep the volume in the higher-performing tier), you can turn off Easy Tier management for a particular volume copy.\nNote: Thin-provisioned and compressed volumes in a data reduction pool cannot have Easy Tier switched off. It is possible to switch off Easy Tier only at a pool level.\nThis can be done only by using the CLI. Use the lsvdisk command to check and the chvdisk command to modify Easy Tier function status on a volume copy, as shown in Example 10-4.\nExample 10-4 Checking and modifying Easy Tier settings on a volume\nIBM_Storwize:ITSO-V7k:superuser>lsvdisk vdisk0 |grep easy_tier easy_tier on easy_tier_status balanced IBM_Storwize:ITSO-V7k:superuser>chvdisk -easytier off vdisk0 IBM_Storwize:ITSOV7K:superuser>", + "page_start": 433, + "page_end": 434, + "source_file": "sg247938.pdf" + } + ] + }, + { + "references": { + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf", + "query": "How can I make a channel visible to an invited member ?", + "target_page": 4, + "target_passage": "Channels can be: • Shared (visible to invited team members and external members of your organization who are not on the team)", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Teams and channels\nBy default, your chats will be arranged along the left-hand side of the chat panel, with the most recent messages at the top. You can right-click on any chat and select \"Pin,\" which will keep it at the top of your list for quick access.\nTip\nWhen you create group chats you can edit the name of the group by selecting the pen symbol next to the group icon in the chat. This will help you give it context and make it easier to find.\nWhen you are invited to a new Team, it will automatically appear on the left panel along with all its associated channels. You can choose to \"show\" the most relevant chanels and \"hide\" the rest.\nTeams\nGeneral\nMarketing\nShared Channel\nA\nteam\nis a broad group of people that work together to get something\ndone. You can choose who is part of the team, and people can only access\nshared content by invitation. All teams are created with an associated\nGeneral channel that includes all team members by default.\nChannels\nA\nchannel\nis a central hub for a specific topic, within the larger team, where\npeople can hold focused conversations and organize a library of files.\nChannels can be:\n· Standard (visible to everyone on the team)\n· Private (only visible to select team members)\n· Shared (visible to invited team members and external members of your\norganization who are not on the team)\nCreate a team for your organization with channels for your leadership team, each department, and one just for fun! Tip\nAN", + "page_start": 3, + "page_end": 3, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "Share your work with others\nTo invite others to view or edit your documents, select the Share button in the top right corner of the app window. Then, you can choose to share a link to your document or send invitations directly to specific people. If someone doesn't have Word, they can use the free Word for the Web app to edit and comment.", + "page_start": 3, + "page_end": 3, + "source_file": "Word QS.pdf" + }, + { + "text": "Join meetings\nFrom the calendar tab, select the meeting you intend to join, then select join. . 1.\nA new screen will show up. Here you can choose how you want to appear in the meeting, and your audio preferences. 2.\n3. Then select join now. .", + "page_start": 2, + "page_end": 2, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "Creating Fibre Channel hosts\nTo create Fibre Channel hosts, complete the following steps:\n1. Select Fibre Channel . The Fibre Channel configuration window opens (see Figure 8-4).\nFigure 8-4 Fibre Channel host configuration\nChapter 8. Hosts\n329\n330\nImplementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\n2. Enter a host name and click the Host Port menu to get a list of all discovered WWPNs (see Figure 8-5).\nFigure 8-5 Available WWPNs\n3. Select one or more WWPNs for your host. The Storwize V7000 should have the host port WWPNs available if the host is prepared, as described in IBM Knowledge Center for host attachment. If they do not appear in the list, scan for new disks as required on the respective operating system and click the Rescan icon in the WWPN box. If they still do not appear, check the SAN zoning and repeat the scanning.\nCreating offline hosts: If you want to create hosts that are offline, or not connected at the moment, it is also possible to enter the WWPNs manually. Enter them into the Host Ports field to add them to the list.\n4. If you want to add more ports to your Host, click the Plus sign ( + ) to add all ports that belong to the specific host.\n5. If you are creating a Hewlett-Packard UNIX (HP-UX) or Target Port Group Support (TPGS) host, select the Host type (see Figure 8-6 on page 331). Select your host type. If your specific host type is not listed, select generic .\nFigure 8-6 Host type selection\n6. Click Add to create the host object.\n7. Click Close to return to the host window. Repeat these steps for all of your Fibre Channel hosts. Figure 8-7 shows the All Hosts window after creating a second host.\nFigure 8-7 Hosts view after creating a host\nAfter you complete the adding of Fibre Channel hosts, see Chapter 7, 'Volumes' on page 241 to create volumes and map them to the created hosts.", + "page_start": 350, + "page_end": 352, + "source_file": "sg247938.pdf" + }, + { + "text": "Creating Fibre Channel hosts\nTo create a Fibre Channel host, complete the following steps:\n1. Rescan the SAN on Storwize V7000 by using the detectmdisk command (see Example 8-14).\nExample 8-14 Rescanning the SAN\nIBM_Storwize:ITSO-V7000:superuser> detectmdisk\nNote: The detectmdisk command does not return any response.\nIf the zoning was implemented correctly, any new WWPNs are discovered by the Storwize V7000 system after running the detectmdisk command.\n2. List the candidate WWPNs and identify the WWPNs belonging to the new host, as shown in Example 8-15.\nExample 8-15 Available WWPNs\nIBM_Storwize:ITSO-V7000:superuser>lsfcportcandidate fc_WWPN 2100000E1E09E3E9 2100000E1E30E5E8 2100000E1E30E60F 2100000E1EC2E5A2 2100000E1E30E597 2100000E1E30E5EC\n3. Run the mkhost command with the required parameters, as shown in Example 8-16.\nExample 8-16 Host creation\nIBM_Storwize:ITSO-V7000:superuser> mkhost -name ITSO-VMHOST-03 -fcwwpn 2100000E1E30E597:2100000E1E30E5EC Host, id [3], successfully created IBM_Storwize:ITSO-V7000:superuser>", + "page_start": 395, + "page_end": 395, + "source_file": "sg247938.pdf" + }, + { + "text": "3.1.4 How to subscribe to the EDP Newsletter\nOn the Portal Home Page:\n-Either Click on the 'Newsletter' item in the page header:\nThen, on the 'Newsletter subscriptions' page:\n· Enter your E-Mail address\n· Click on the button 'Subscribe'\nThe system will display a notification message after successful subscription.\nOr\n-Enter your email address directly in the footer and clic k on the 'Subscribe' button.\nThe system will display a notification message after successful subscription.\nEuropean Data Portal Version 4.3 -User Manual\nPage 19 of 57", + "page_start": 18, + "page_end": 18, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "Adding a Fibre Channel port\nTo add a Fibre Channel port, complete the following steps:\n1. Click Fibre Channel Port (see Figure 8-52 on page 362). The Add Fibre Channel Ports window opens (see Figure 8-53).\nFigure 8-53 Add Fibre Channel Ports window\n2. Click the drop-down menu to display a list of all discovered Fibre Channel WWPNs. If the WWPN of your host is not available in the menu, enter it manually or check the SAN zoning to ensure that connectivity is configured. Then, rescan storage from the host.\nChapter 8. Hosts\n363\n364\nImplementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\n3. Select the WWPN that you want to add and click Add Port to List (see Figure 8-54).\nFigure 8-54 Add a port to list\nThis step can be repeated to add other ports to the host.\n4. To add an offline port (if the WWPN of your host is not available in the drop-down menu), manually enter the WWPN of the port into the Fibre Channel Ports field and click Add Port to List .\nThe port is unverified (see Figure 8-55) because it is not logged on to the Storwize V7000 system. The first time that it logs on, its state is automatically changed to online , and the mapping is applied to this port.\nFigure 8-55 Unverified port\n5. To remove a port from the adding list, click the red X next to the port. In this example, we delete the manually added FC port so only the detected port remains.\nChapter 8. Hosts\n365\n366\nImplementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\n6. Click Add Ports to Host to apply the changes and click Close .", + "page_start": 384, + "page_end": 387, + "source_file": "sg247938.pdf" + }, + { + "text": "Present in meetings\nScreen share from the Share button at the top of your meeting window. 1.\nChoose what screen or window you want to share. Don't forget to include audio if you're sharing something with sound. 2.\nWhen you are finished, use the share button at the top of your meeting window to stop sharing. 3.", + "page_start": 2, + "page_end": 2, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "8.4.1 Creating hosts\nThis section describes how to create Fibre Channel and iSCSI hosts by using the Storwize V7000 GUI. It is assumed that hosts are prepared for attachment, as described in IBM Knowledge Center, and that the host WWPNs or their iSCSI initiator names are known.\nFor more information, see IBM Knowledge Center.\nChapter 8. Hosts\n327\n328\nImplementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\nTo create a host, complete the following steps:\n1. Open the host configuration window by clicking Hosts (see Figure 8-3).\nFigure 8-3 Open the host window\n2. To create a host, click Add Host . If you want to create a Fibre Channel host, continue with 'Creating Fibre Channel hosts' on page 329. To create an iSCSI host, go to 'Creating iSCSI hosts' on page 331.", + "page_start": 348, + "page_end": 349, + "source_file": "sg247938.pdf" + }, + { + "text": "Recipient/List\nChoose your recipient. For our example, we add the newly created recipient from the drop-down menu.", + "page_start": 346, + "page_end": 346, + "source_file": "sg246915.pdf" + } + ] + }, + { + "references": { + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf", + "query": "How can I notify a collegue mentionned in a chat message in Teams ?", + "target_page": 5, + "target_passage": "Tag a teammate in a message by typing the @ symbol followed by their name. They will receive a special notification calling for their attention.", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "Teams and channels\nBy default, your chats will be arranged along the left-hand side of the chat panel, with the most recent messages at the top. You can right-click on any chat and select \"Pin,\" which will keep it at the top of your list for quick access.\nTip\nWhen you create group chats you can edit the name of the group by selecting the pen symbol next to the group icon in the chat. This will help you give it context and make it easier to find.\nWhen you are invited to a new Team, it will automatically appear on the left panel along with all its associated channels. You can choose to \"show\" the most relevant chanels and \"hide\" the rest.\nTeams\nGeneral\nMarketing\nShared Channel\nA\nteam\nis a broad group of people that work together to get something\ndone. You can choose who is part of the team, and people can only access\nshared content by invitation. All teams are created with an associated\nGeneral channel that includes all team members by default.\nChannels\nA\nchannel\nis a central hub for a specific topic, within the larger team, where\npeople can hold focused conversations and organize a library of files.\nChannels can be:\n· Standard (visible to everyone on the team)\n· Private (only visible to select team members)\n· Shared (visible to invited team members and external members of your\norganization who are not on the team)\nCreate a team for your organization with channels for your leadership team, each department, and one just for fun! Tip\nAN", + "page_start": 3, + "page_end": 3, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "Respond\nTag a teammate in a message by typing the @ symbol followed by their name. They will receive a special notification calling for their attention. @\nReact to individual messages or quote them in a response.\nTip Going into format mode will prevent your message from sending when you hit [Enter], so it's a great way to draft and preview messages before sending them.\nTip If you want to revisit an important message later, hover on that message, select the three d , then choose 'Save.' Saved messages will be found under your profile picture dropdown menu.", + "page_start": 4, + "page_end": 4, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "Compose\nFormat your messages, add bullet points, charts or hyperlinks.\nMark as important to call attention to specific messages.\nAttach files to share with your teammates.\nInclude gifs , emojis, stickers to bring lightness to your conversations.", + "page_start": 4, + "page_end": 4, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "Getting around\nNavigate Teams using the menu along the left side and the top bar of your Teams desktop app.\nTip\nYour Teams calendar automatically syncs with Outlook, and you can manage meetings through either app.", + "page_start": 1, + "page_end": 1, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "For example:\n'I would like to apply for the position of Graphic Designer, as advertised in the Career Times on 1 March 2015.'\nIf possible, mention a mutual contact or acquaintance.\n'Samantha Stevens mentioned that you are looking for an experienced Graphic Designer with a keen interest in the fashion industry.'", + "page_start": 46, + "page_end": 46, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "Connect through messages\nWhether you're in a meeting, channel, or a chat, your messaging box will look the same.", + "page_start": 4, + "page_end": 4, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "II.1. Definitions\n'Formal notification' (or 'formally notify'): form of communication between the parties made in writing by mail or email, which provides the sender with compelling evidence that the message was delivered to the specified recipient;\n'Fraud': an act or omission committed in order to make an unlawful gain for the perpetrator or another by causing a loss to the Union's financial interests, and relating to: i) the use or presentation of false, incorrect or incomplete statements or documents, which has as its effect the misappropriation or wrongful retention of funds or assets from the\n13\nContract number: ECHA/2019/355\nFWC conditions of October 2018\nUnion budget, ii) the non-disclosure of information in violation of a specific obligation, with the same effect or iii) the misapplication of such funds or assets for purposes other than those for which they were originally granted, which damages the Union's financial interests;\n'Grave professional misconduct': a violation of applicable laws or regulations or ethical standards of the profession to which a contractor or a related person belongs, including any conduct leading to sexual or other exploitation or abuse, or any wrongful conduct of the contractor or a related person which has an impact on its professional credibility where such conduct denotes wrongful intent or gross negligence.\n'Implementation of the FWC' : the purchase of services envisaged in the FWC through the signature and performance of specific contracts ;\n'Interface control document' : the guideline document which lays down the technical specifications, message standards, security standards, checks of syntax and semantics, etc. to facilitate machine-to-machine connection. This document is updated on a regular basis;\n'Irregularity' : any infringement of a provision of Union law resulting from an act or omission by an economic operator, which has, or would have, the effect of prejudicing the Union's budget.\n'Notification' (or 'notify'): form of communication between the parties made in writing including by electronic means;\n'Order form' : a simplified form of specific contract by which the contracting authority orders services under this FWC;\n'Performance of a specific contract' : the execution of tasks and delivery of the purchased services by the contractor to the contracting authority;\n'Personnel' : persons employed directly or indirectly or contracted by the contractor to implement the FWC;", + "page_start": 12, + "page_end": 13, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "Share your work with others\nTo invite others to view or edit your documents, select the Share button in the top right corner of the app window. Then, you can choose to share a link to your document or send invitations directly to specific people. If someone doesn't have Word, they can use the free Word for the Web app to edit and comment.", + "page_start": 3, + "page_end": 3, + "source_file": "Word QS.pdf" + }, + { + "text": "· Structure your message clearly, and include only the necessary information.\nTake care not to confuse the message by including too many topics in one e-mail. Respect your colleagues' time, and try to keep your messages as short as possible.", + "page_start": 52, + "page_end": 52, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "Practice\nDownload the app for desktop and mobile to access Teams with the best performance anywhere you go.\nOnce you sign in, connect with your team in chat, channels, calls, and meetings.\nTry out the different features as you learn about them in this guide. You'll get the basics in no time!\nHit the ground running now!\nBuild confidence by trying things on your own. Go to the meet now button\n(at the top right corner on the Calendar tab) to play around and test all the meetings functionalities before you're in the spotlight!", + "page_start": 0, + "page_end": 0, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + } + ] + }, + { + "references": { + "source_file": "Botswana-constitution.pdf", + "query": "What are the 3 prerequisites to be elligible as president of Botswana ?", + "target_page": 18, + "target_passage": "A person shall be qualified for election as President if, and shall not be qualified unless, he or she- (a) is a citizen of Botswana by birth or descent; (b) has attained the age of 30 years; and (c) is qualified to be elected as a Member of the National Assembly", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "61. Q ualifications for election to N ational A ssem bly\nSubject to the provisions of section 62 of this C onstitution, a person shall be qualified to be elected as a M em ber of the N ational A ssem bly if, and shall not be qualified to be so elected unless-\n( a ) he or she is a citizen of B otsw ana;\n( b ) he or she has attained the age of 18 years;\n( c ) he or she is qualified for registration as a voter for the purposes of the election of the E lected M em bers of the N ational A ssem bly and is so registered; and\n( d ) he or she is able to speak, and, unless incapacitated by blindness or other physical cause, to read E nglish w ell enough to take an active part in the proceedings of the A ssem bly.", + "page_start": 27, + "page_end": 27, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "79. Q ualifications for m em bership of N tlo ya D ikgosi\n(1) A person shall be qualified to be appointed under section 77(1)( b ) as a M em ber of the N tlo ya D ikgosi if he or she GLYPH<151>\n( a ) is a citizen of B otsw ana; and\n( b ) has attained the age of 21 years.\n(2) N o person shall be qualified to be appointed, selected or designated as a M em ber of the N tlo ya D ikgosi if he or she GLYPH<151>", + "page_start": 35, + "page_end": 35, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "44. C abinet\n(1) There shall be a C abinet w hich shall consist of the P resident, V ice-P resident and the M inisters.\n(2) There shall preside at m eetings of the C abinet-\n( a ) the P resident;\n( b ) in the absence of the P resident, the V ice-P resident; or\n( c ) in the absence of the P resident and the V ice-P resident, such M inister as the President m ay designate.\n(3) The C abinet m ay act notw ithstanding any vacancy in its m em bership.", + "page_start": 22, + "page_end": 22, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "32. Election of P resident after dissolution of P arliam ent\n(1) W henever P arliam ent is dissolved an election shall be held to the office of President in such m anner as is prescribed by this section and, subject thereto, by or under an A ct of P arliam ent.\n(2) N om inations in the election of a P resident shall be delivered to the returning officer on such day and at such tim e as m ay be prescribed by or under any law for the tim e being in force in B otsw ana; the nom ination of a candidate in an election of a President shall not be valid unless it is supported, in such m anner as m ay be prescribed by or under an A ct of P arliam ent, by not less than 1000 persons registered as voters for the purpose of elections to the A ssem bly.\n(3) The follow ing provisions shall then apply-\n( a ) a person nom inated as a P arliam entary candidate m ay, at the tim e of his or her nom ination and subject to the provisions of paragraph ( b ), declare in such m anner as m ay be prescribed by or under an A ct of P arliam ent w hich of the candidates in the election of P resident he or she supports, but the nom ination of a P arliam entary candidate shall be valid notw ithstanding that the nom ination paper does not contain such a declaration;\n( b ) such a declaration shall not be m ade in relation to any P residential candidate unless that candidate has signified, in such m anner as m ay be prescribed by or under an A ct of P arliam ent, his or her consent to the m aking of a declaration in his or her favour by that P arliam entary candidate;", + "page_start": 16, + "page_end": 16, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "33. Q ualification for election as P resident\n(1) A person shall be qualified for election as P resident if, and shall not be qualified unless, he or she-\n( a ) is a citizen of B otsw ana by birth or descent;\n( b ) has attained the age of 30 years; and\n( c ) is qualified to be elected as a M em ber of the N ational A ssem bly.\n(2) N otw ithstanding any other law to the contrary, for the purposes of this section and section 39-\n( a ) the term \"citizen by birth\" shall be understood to include only those persons w ho becam e citizens of B otsw ana prior to the am endm ent of the law relating to citizenship by the C itizenship A ct;\n( b ) any person w ho, although his or her father w as a citizen of B otsw ana at the tim e of that person's birth, had, by virtue of his or her having been born outside Botsw ana, to be registered as a citizen of B otsw ana, under the law relating to\nC opyright G overnm ent of B otsw ana\ncitizenship in force at that tim e, shall be regarded as a citizen by descent.", + "page_start": 17, + "page_end": 18, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "62. D isqualifications for m em bership of N ational A ssem bly\n(1) N o person shall be qualified to be elected as a M em ber of the N ational Assem bly w ho-\n( a ) is, by virtue of his or her ow n act, under any acknow ledgem ent of allegiance, obedience or adherence to a foreign pow er or state;\n( b ) has been declared insolvent or adjudged or otherw ise declared bankrupt under any law for the tim e being in force in B otsw ana and has not been discharged, or has m ade a com position w ith his or her creditors and has not paid his or her debts in full;\n( c ) is certified to be insane or otherw ise adjudged or declared to be of unsound m ind under any law for the tim e being in force in B otsw ana;\n( d ) is a M em ber of the N tlo ya D ikgosi ;\n( e ) subject to such exceptions as m ay be prescribed by P arliam ent, holds any public office, or is acting in any public office by virtue of a contract of service expressed to continue for a period exceeding six m onths;\n( f ) is under sentence of death im posed on him or her by a court in any part of the C om m onw ealth, or is under a sentence of im prisonm ent (by w hatever nam e called) exceeding six m onths im posed on him or her by such a court or substituted by com petent authority for som e other sentence im posed on him or her by such a court;\n( g ) holds, or is acting in, any office the functions of w hich involve any responsibility for, or in connection w ith, the conduct of any elections to the A ssem bly or the com pilation or revision of any electoral register for the purposes of such elections.\n(2) P arliam ent m ay provide that a person shall not be qualified for election to the N ational A ssem bly for such period (not exceeding five years) as m ay be prescribed if he or she is convicted of any such offence connected w ith elections to the A ssem bly as m ay be prescribed.", + "page_start": 27, + "page_end": 27, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "59. Speaker\n(1) There shall be a S peaker of the N ational A ssem bly w ho shall be elected by the M em bers of the A ssem bly from am ong persons w ho are M em bers of the A ssem bly or from am ong persons w ho are not M em bers of the A ssem bly.\n(2) The P resident, the V ice-P resident, a M inister, an A ssistant M inister or a public officer shall not be qualified to be elected as S peaker.\n(3) The S peaker shall vacate his or her office-\n( a ) if, having been elected from am ong the M em bers of the N ational A ssem bly, he or she ceases to be a M em ber of the A ssem bly otherw ise than by reason of a dissolution of P arliam ent or if he or she is required by virtue of section 68(2) to (3) of this C onstitution, to cease to perform his or her functions as a M em ber of the A ssem bly;\n( b ) if any circum stances arise that, if he or she w ere not S peaker, w ould disqualify him for election as such;\n( c ) w hen the A ssem bly first sits after any dissolution of P arliam ent; or\n( d ) if he or she is rem oved from office by a resolution of the A ssem bly supported by the votes of not less than tw o-thirds of all the M em bers thereof.\n(4) N o business shall be transacted in the N ational A ssem bly (other than an election to the office of S peaker) at any tim e w hen the office of S peaker is vacant.", + "page_start": 26, + "page_end": 26, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "35. Vacancy in office of P resident\n(3) A ny person perform ing the functions of the office of P resident by virtue of subsection (1) or (2) of this section shall not exercise the pow er of the P resident to revoke the appointm ent of V ice-P resident or to dissolve P arliam ent.\n(4) If the office of P resident becom es vacant, the N ational A ssem bly shall, unless Parliam ent is dissolved, and notw ithstanding that it m ay be prorogued, m eet on the seventh day after the office of P resident becom es vacant, or on such earlier day as m ay be appointed by the S peaker, and shall elect a person to the office in such m anner as is prescribed by the next follow ing subsection and, subject thereto, by or under an A ct of Parliam ent.\n(5) In an election of a P resident under this section-\n( a ) the S peaker shall preside at the m eeting and conduct the election;\n( b ) a person m ay be a candidate if and shall not be a candidate unless he or she has been nom inated as a candidate w ith his or her consent prior to the sitting of the N ational A ssem bly at w hich the election takes place, by not less than 10 M em bers of the N ational A ssem bly entitled to vote in that election;\n( c ) at the election every M em ber of the A ssem bly except the S peaker shall be entitled to vote;\n( d ) the votes of the M em bers of the A ssem bly w ho are entitled to vote shall be given by ballot in such m anner as not to disclose how any particular M em ber voted, and any person w ho receives the votes of m ore than one half of the total num ber of persons entitled to vote shall be declared elected as P resident;\n( e ) a person elected as P resident under this section shall assum e the office of President on the day upon w hich he or she is declared to be elected;\n( f ) not m ore than three ballots shall be taken unless in the opinion of the S peaker the holding of further ballots is likely to result in the election of a P resident, in", + "page_start": 18, + "page_end": 18, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "The President and the V ice-P resident\n30. O ffice of P resident\n31. First P resident\n32. Election of P resident after dissolution of P arliam ent\n33. Q ualification for election as P resident\n34. Tenure of office of P resident\n35. Vacancy in office of P resident\n36. D ischarge of functions of P resident during absence, illness, etc.\n37. O ath of P resident\n38. R eturning officer at elections of P resident\n39. Vice-P resident\n40. Salary and allow ances of P resident\n41. Protection of P resident in respect of legal proceedings", + "page_start": 0, + "page_end": 0, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "108. P ow er to specify qualifications for certain offices\nSubject to the provisions of this C onstitution and of any A ct of P arliam ent, pow er to specify the qualifications and disqualifications for holding such public offices as he or she m ay constitute shall vest in the P resident.", + "page_start": 45, + "page_end": 45, + "source_file": "Botswana-constitution.pdf" + } + ] + }, + { + "references": { + "source_file": "Botswana-constitution.pdf", + "query": "What is the condition to be allowing to access the position of Director of public prosecution in Botswana ?", + "target_page": 25, + "target_passage": "A person shall not be qualified to be appointed to the Office of Director of Public Prosecutions unless he or she is qualified to be appointed to the Office of a Judge of the High Court", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "79. Q ualifications for m em bership of N tlo ya D ikgosi\n(1) A person shall be qualified to be appointed under section 77(1)( b ) as a M em ber of the N tlo ya D ikgosi if he or she GLYPH<151>\n( a ) is a citizen of B otsw ana; and\n( b ) has attained the age of 21 years.\n(2) N o person shall be qualified to be appointed, selected or designated as a M em ber of the N tlo ya D ikgosi if he or she GLYPH<151>", + "page_start": 35, + "page_end": 35, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "Enforcement of requirement to self-isolate\n(b) where the authorised person is a constable, remove P to the place where P is selfisolating;\n(c) where the authorised person is a constable and it is not practicable or appropriate in the circumstances to take the action in sub-paragraph (a) or (b), remove P to accommodation facilitated by the Secretary of State for the purposes of P's self-isolation.\n(2) Where an authorised person has reasonable grounds to believe that P is a Schedule 11 passenger, an authorised person may do any of the following for the purpose of ensuring that P complies with the requirements in Schedule 11-\n(a) give a direction to P, including a direction-\n(i) that P remain in a particular area of a port to await transportation to accommodation designated for the purposes of Schedule 11,\n(ii) that P move to a particular place to board transportation designated for the purposes of Schedule 11,\n(iii) that P board transportation designated for the purposes of Schedule 11 to travel to accommodation designated for the purposes of Schedule 11,\n(iv) that P remain in the place where P is self-isolating;\n(b) remove P to accommodation designated for the purposes of Schedule 11.\n(3) Where an authorised person has reasonable grounds to believe that P is a Schedule 11 passenger and that P has committed an offence under regulation 19(1)(a) or (6), the authorised person may-\n(a) require P to produce their passport or travel document for examination;\n(b) detain P for up to three hours;\n(c) search P and any baggage belonging to P or under P's control, or any vehicle in which P has travelled, for evidence, other than items subject to legal privilege, that relates to the possible commission of an offence under regulation 19(6); and\n(d) seize and retain any document or article recovered by a search under sub-paragraph (c).\n(4) Paragraph (3) does not confer a power-\n(a) to detain or search an unaccompanied child; or\n(b) to conduct an intimate search.\n(5) Any search under paragraph (3) must be conducted by an authorised person of the same gender as P.", + "page_start": 17, + "page_end": 17, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "4. INDEMNITY, ACCESS TO INFORMATION AND INDEPENDENT PROFESSIONAL ADVICE\nInformation in respect to indemnity and insurance arrangements for Directors and senior executives appears in the Directors' Statutory Report on page 49 of this Annual Report.\nThe Board Guidelines set out the circumstances and procedures pursuant to which a Director, in furtherance of his or her duties, may seek independent professional advice at the Company's expense. Those procedures require prior consultation with, and approval by, the Chairman and assurances as to the qualifications and reasonableness of the fees of the relevant expert and, under normal circumstances, the provision of the expert's advice to the Board.\nPursuant to a deed executed by the Company and each Director, a Director also has the right to have access to all documents which have been presented to meetings of the Board or to any Committee of the Board or otherwise made available to the Director whilst in office. This right continues for a term of seven years after ceasing to be a Director or such longer period as is necessary to determine relevant legal proceedings that commenced during that term.", + "page_start": 32, + "page_end": 32, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "Obtaining Access to S upport S tructures and Municipal Rights of Way\nWe must have access to support structures and municipal rights of way for our cable facilities. We can apply to the CRTC to obtain a right of access under the Telecommunications Act in areas where we cannot secure access to municipal rights of way. Failure to obtain access could increase Cable costs and adversely affect our business.\nThe Supreme Court of Canada ruled in 2003, however, that the CRTC does not have the jurisdiction to establish the terms and conditions of accessing the poles of hydroelectric companies. As a result, we obtained access under orders from the Ontario Energy Board and the New Brunswick Public Utilities Board.", + "page_start": 79, + "page_end": 79, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Transitional provision\n5. A designation by the Secretary of State of a person as a designated officer under regulation 7(2) of the 2020 Regulations has effect as a designation of that person as a designated officer under regulation 20(9)(c)(i) of these Regulation.\n6. A designation by the Secretary of State of a person as an authorised person under regulation 7(10)(c) of the 2020 Regulations has effect as a designation of that person as an authorised person under regulation 20(9)(a)(iii) of these Regulations.\n7. A designation by the Secretary of State under regulation 8 of the 2020 Regulations as a person who may bring proceedings for an offence has effect as a designation under regulation 21(1) of these Regulations.\n8. A confirmation from the Foreign, Commonwealth and Development Office or other UK Government Department that a person is not required to comply with Schedule B1A to the 2020 Regulations is treated as confirmation that a person is not required to comply with Schedule 11 of these Regulations where the person arrives in England on or after 4.00 a.m. on 17th May 2021.\n9. A booking of a managed self-isolation package made before 4.00 a.m. on 17th May 2021 which satisfies the requirements of Schedule B1A to the 2020 Regulations is treated as satisfying the requirements of Schedule 11 to these Regulations where the person to whom the booking relates arrives in England after 4.00 a.m. on 17th May 2021.\n10. A designation by the Secretary of State under paragraph 9 of Schedule B1A to the 2020 Regulations as a person who may impose a charge under that Schedule has effect as a designation under paragraph 9 of Schedule 11 to these Regulations.\n11. Authorisation by the Secretary of State under paragraph 13(2)(a) of Schedule B1A to the 2020 Regulations as a person who may give a permission under that paragraph has effect as authorisation under paragraph 13(2)(a) of Schedule 11 to these Regulations.\n12. A designation by the Secretary of State of accommodation or transportation under paragraph 15 of Schedule B1A to the 2020 Regulations has effect as designation of accommodation or transportation, as the case may be, under paragraph 15 of Schedule 11 to these Regulations.", + "page_start": 89, + "page_end": 89, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "112. P ow ers of P resident in relation to certain public offices\n( b ) the tribunal shall enquire into the m atter and report on the facts thereof to the President and advise the P resident w hether the person holding the office of D irector of P ublic P rosecutions ought to be rem oved from office under this section for inability as aforesaid or for m isbehaviour or for incom petence.\n(4) W here a tribunal appointed under subsection (3) of this section advises the President that a person holding the office of D irector of P ublic P rosecutions ought to be rem oved from office for inability as aforesaid or for m isbehaviour or for incom petence, the P resident shall rem ove such person from office.\n(5) If the question of rem oving a person holding the office of D irector of P ublic Prosecutions from office has been referred to a tribunal under this section, the P resident m ay suspend that person from perform ing the functions of his or her office, and any such suspension m ay at any tim e be revoked by the P resident and shall in any case cease to have effect if the tribunal advises the P resident that the person ought not to be rem oved from office.", + "page_start": 48, + "page_end": 48, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "Modification of application of this Schedule where P is a relevant person\n18. -(1) Where P is a relevant person, this Schedule applies to P with the following modifications-\n(a) the reference in paragraph 6 to the means of transport designated in the managed selfisolation package booked for P is to be read as a reference to transport determined by the Secretary of State;\n(b) the references in paragraphs 6, 9 and 10 to a managed self-isolation package are to be read as references to a self-isolation package containing such provisions as to accommodation, transport and testing as the Secretary of State considers appropriate;\n(c) paragraph 7 does not apply to P.\n(2) P is a relevant person if-\n(a) P is-\n(i) a person requiring urgent medical assistance,\n(ii) a person on immigration bail,\n(iii) a person who has been detained by an immigration officer,\n(iv) a person who has been refused leave to enter the UK,\n(v) an illegal entrant,\n(vi) an asylum seeker,\n(vii) a person who is in police custody,\n(viii) a prisoner,\n(ix) an unaccompanied child, where it is not reasonable for a person with responsibility for P to reside with the child in accommodation designated by the Secretary of State for the purposes of this Schedule,\n(x) a potential victim of modern slavery; and\n(b) the Secretary of State has confirmed in writing that this paragraph applies in relation to P and has not withdrawn that confirmation.\n(3) P is also a relevant person if-\n(a) P is, or was on the 1st September 2020, a child;\n(b) P travels to the UK for the purposes of receiving education at a boarding school in England at which education and accommodation is due to be provided for P;\n(c) P is not accompanied into the UK by an individual who has responsibility for P, or if P is aged 18 or over, would have had such responsibility if P were a child; and\n(d) the Secretary of State has confirmed in writing that this paragraph applies in relation to P and has not withdrawn that confirmation.\n(4) P is also a relevant person if-\n(a) P is vulnerable as a result of a severe medical or health condition;\n(b) P would not receive appropriate support in designated accommodation and that condition would be severely detrimentally impacted if P were required to self-isolate in such accommodation;", + "page_start": 78, + "page_end": 78, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "Competent Persons Statement\nIn this report, information concerning Thailand operations relates to Exploration Results, Mineral Resources and Ore Reserve estimates and is based on and fairly represents information compiled by the following Competent Persons: Ron James, Brendan Bradley, Kevin Woodward and Suphanit Suphananthi who are employees of the Kingsgate Group - all except Brendan Bradley are members of The Australasian Institute of Mining and Metallurgy. Brendan Bradley is a member of the Australian Institute of Geoscientists. These people qualify as Competent Persons as defined in the 'Australasian Code for Reporting of Exploration Results, Mineral Resources and Ore Reserves' (the JORC Code, 2012 edition) and possess relevant experience in relation to the mineralisation being reported herein as Exploration Results, Mineral Resources and Ore Reserves. Each Competent Person has consented to the public reporting of these statements and the inclusion of the material in the form and context in which it appears.\nIn this report, the information concerning Challenger operations that relates to Exploration Results, Mineral Resources and Ore Reserves estimates is based on and fairly represents information compiled by Stuart Hampton and Luke Phelps who are full-time employees of the Kingsgate Group. Both are members of The Australasian Institute of Mining and Metallurgy. These persons have sufficient experience that is relevant to the mineralisation and type of deposit under consideration and to the activity that they are undertaking to qualify as Competent Persons as defined in the 2012 Edition of the 'Australasian Code for Reporting of Exploration Results, Mineral Resources and Ore Reserves'. Stuart Hampton and Luke Phelps consent to the inclusion in the report of the matters based on their information in the form in which it appears.\nThe information in this report that relates to Bowdens Mineral Resource estimation is based on and fairly represents work completed by Jonathon Abbott who is a full-time employee of MPR Geological Consultants and a member of the Australasian Institute of Geoscientists, and Ron James, who is a member of The Australasian Institute of Mining and Metallurgy. Mr Abbott and Mr James have sufficient experience that is relevant to the style of mineralisation and type of deposit under consideration and to the activity that they are undertaking to qualify as a Competent Person as defined in the 2012 Edition of the 'Australasian Code for Reporting of Exploration Results, Mineral Resources and Ore Reserves'. Mr Abbott and Mr James consent to the inclusion in the report of the matters based on their information in the form and context in which it appears.", + "page_start": 34, + "page_end": 34, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Bangkok Office\nAkara Resources Public Company Limited\n19th Floor, Sathorn Thani Building 2 No. 92/54-55 North Sathorn Road Kwaeng Silom, Khet Bangrak Bangkok 10500 Thailand\nTel:\n+66 2 233 9469\nFax:\n+66 2 236 5512", + "page_start": 117, + "page_end": 117, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "107. [ R epealed. ]\n(13) P rovision m ay be m ade by or under an A ct of P arliam ent prescribing the procedure of the C om m ission and, subject thereto, the C om m ission m ay regulate its\nC opyright G overnm ent of B otsw ana\now n procedure.\n(14) E xcept as m ay be otherw ise provided in its rules or procedure, the C om m ission m ay act notw ithstanding any vacancy in its m em bership or the absence of any m em ber and its proceedings shall not be invalidated by the presence or participation of any person not entitled to be present at or to participate in those proceedings.\n(15) A ny decision of the C om m ission shall require the concurrence of a m ajority of all the m em bers thereof.\n(16) A m em ber of the C om m ission shall not, during the tenure of his or her office or during the three years im m ediately follow ing such tenure, be eligible for appointm ent to any public office other than that of A m bassador, H igh C om m issioner or other principal representative of B otsw ana in any other country or accredited to any international organization.", + "page_start": 46, + "page_end": 47, + "source_file": "Botswana-constitution.pdf" + } + ] + }, + { + "references": { + "source_file": "Botswana-constitution.pdf", + "query": "What are considered \"disciplined force\" according to Botswana constitution ?", + "target_page": 16, + "target_passage": "\"disciplined force\" means- (a) a naval, military or air force; (b) a police force; or (c) a prison service", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "19. Interpretation and savings\n(1) In this C hapter, unless the context otherw ise requires-\n\"court\" m eans any court of law having jurisdiction in B otsw ana other than a court established by a disciplinary law , and in sections 4 and 6 of this C onstitution a court established by a disciplinary law ;\n\"disciplinary law \" m eans a law regulating the discipline of any disciplined force; \"disciplined force\" m eans-\n( a ) a naval, m ilitary or air force;\n( b ) a police force; or\n( c ) a prison service;\n\"legal representative\" m eans a person entitled to practise in B otsw ana as an advocate or attorney;\n\"m em ber\" , in relation to a disciplined force, includes any person w ho, under the law regulating the discipline of that force, is subject to that discipline.\n(2) In relation to any person w ho is a m em ber of a disciplined force raised under an A ct of P arliam ent, nothing contained in or done under the authority of the disciplinary law of that force shall be held to be inconsistent w ith or in contravention of any of the provisions of this C hapter other than sections 4, 6 and 7.\n(3) In relation to any person w ho is a m em ber of a disciplined force raised otherw ise than as aforesaid and law fully present in B otsw ana, nothing contained in or done under the authority of the disciplinary law of that force shall be held to be inconsistent w ith or in contravention of any of the provisions of this C hapter.\nC H A P TE R III\nC itizenship (ss 20-29: repealed)\n20 to 29 inclusive.\n[ R epealed. ]\nC H A P TE R IV\nThe Executive (ss 30-56)\nP A R T I\nThe President and the V ice-P resident (ss 30-41)", + "page_start": 15, + "page_end": 15, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "10. Provisions to secure protection of law\ncourt to try a m em ber of a disciplined force for a crim inal offence notw ithstanding any trial and conviction or acquittal of that m em ber under the disciplinary law of that force, so, how ever, that any court so trying such a m em ber and convicting him or her shall in sentencing him or her to any punishm ent take into account any punishm ent aw arded him or her under that disciplinary law ;\n( e ) subsection (8) of this section to the extent that the law in question authorizes a court to convict a person of a crim inal offence under any custom ary law to w hich, by virtue of that law , such person is subject.\n(13) In the case of any person w ho is held in law ful detention, the provisions of subsection (1), subsection (2)( d ) and ( e ) and subsection (3) of this section shall not apply in relation to his or her trial for a crim inal offence under the law regulating the discipline of persons held in such detention.\n(14) In this section \"crim inal offence\" m eans a crim inal offence under the law in force in B otsw ana.", + "page_start": 10, + "page_end": 10, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "Enforcement of requirement to self-isolate\n(b) where the authorised person is a constable, remove P to the place where P is selfisolating;\n(c) where the authorised person is a constable and it is not practicable or appropriate in the circumstances to take the action in sub-paragraph (a) or (b), remove P to accommodation facilitated by the Secretary of State for the purposes of P's self-isolation.\n(2) Where an authorised person has reasonable grounds to believe that P is a Schedule 11 passenger, an authorised person may do any of the following for the purpose of ensuring that P complies with the requirements in Schedule 11-\n(a) give a direction to P, including a direction-\n(i) that P remain in a particular area of a port to await transportation to accommodation designated for the purposes of Schedule 11,\n(ii) that P move to a particular place to board transportation designated for the purposes of Schedule 11,\n(iii) that P board transportation designated for the purposes of Schedule 11 to travel to accommodation designated for the purposes of Schedule 11,\n(iv) that P remain in the place where P is self-isolating;\n(b) remove P to accommodation designated for the purposes of Schedule 11.\n(3) Where an authorised person has reasonable grounds to believe that P is a Schedule 11 passenger and that P has committed an offence under regulation 19(1)(a) or (6), the authorised person may-\n(a) require P to produce their passport or travel document for examination;\n(b) detain P for up to three hours;\n(c) search P and any baggage belonging to P or under P's control, or any vehicle in which P has travelled, for evidence, other than items subject to legal privilege, that relates to the possible commission of an offence under regulation 19(6); and\n(d) seize and retain any document or article recovered by a search under sub-paragraph (c).\n(4) Paragraph (3) does not confer a power-\n(a) to detain or search an unaccompanied child; or\n(b) to conduct an intimate search.\n(5) Any search under paragraph (3) must be conducted by an authorised person of the same gender as P.", + "page_start": 17, + "page_end": 17, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "104. A ppointm ent, etc., of judicial officers\n(1) P ow er to appoint persons to hold or act in offices to w hich this section applies, to exercise disciplinary control over persons holding or acting in such offices and to rem ove such persons from office shall vest in the P resident acting in accordance w ith the advice of the Judicial S ervice C om m ission.\n(2) The offices to w hich this section applies are-\n( a ) the office of R egistrar of the C ourt of A ppeal and H igh C ourt;\n( b ) all offices of m agistrate;\n( c ) such other offices of P resident or m em ber of any court or connected w ith any court as m ay be prescribed by or under an A ct of P arliam ent.\n(3) In this section references to a court do not include references to a court m artial.", + "page_start": 45, + "page_end": 45, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "79. Q ualifications for m em bership of N tlo ya D ikgosi\n( a ) is, by virtue of his or her ow n act, under any acknow ledgem ent of allegiance, obedience or adherence to a foreign pow er or state;\n( b ) has been declared insolvent or adjudged or otherw ise declared bankrupt under any law in force in any part of the C om m onw ealth or any country w ith a com parable legal system and has not been discharged, or has m ade a com position w ith his or her creditors and has not paid his or her debts in full;\n( c ) is certified insane or otherw ise adjudged or declared to be of unsound m ind under any law for the tim e being in force in B otsw ana;\n( d ) subject to such exceptions as m ay be prescribed by P arliam ent, holds any public office, or is acting in any public office by virtue of a contract of service expressed to continue for a period exceeding six m onths;\n( e ) is under sentence of death im posed on him or her by a court in any part of the C om m onw ealth or any country w ith a com parable legal system , or is under a sentence of im prisonm ent (by w hatever nam e called) exceeding six m onths im posed on him or her by such a court or substituted by a com petent authority for som e other sentence im posed on him or her by such a court;\n( f ) holds, or is acting in,anyoffice the functions ofw hichinvolveany responsibility for, or in connection w ith, the conduct of any elections to the N ational A ssem bly or the com pilation or revision of any electoral register for the purposes of such elections; or\n( g ) is disqualified for election to the N ational A ssem bly by virtue of provision m ade in pursuance of section 62 (2) of this C onstitution.", + "page_start": 35, + "page_end": 35, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "65A . A ppointm ent of Independent E lectoral C om m ission\nbankrupt under any law in force in any part of the C om m onw ealth and has not been discharged, or has m ade a com position w ith his or her creditors and has not paid his or her debts in full; or\n( b ) he or she has been convicted of any offence involving dishonesty in any country.\n(7) A person appointed a m em ber of the C om m ission shall not enter upon the duties of the office of C om m issioner until he or she has taken and subscribed the oath of allegiance and such oath for the due execution of his or her office as m ay be prescribed by an A ct of P arliam ent.\n(8) The C om m ission shall regulate its ow n procedure and proceedings.\n(9) The C hairm an shall preside over all proceedings, and in his or her absence, the legal practitioner referred to in subsection (1)( b ) shall preside over the proceedings.\n(10) The quorum shall be four m em bers, one of w hom shall be the C hairm an or the said legal practitioner.\n(11) A ll issues shall be decided by the decision of the m ajority of the m em bers present and voting.\n(12) The C om m ission shall be responsible for-\n( a ) the conduct and supervision of elections of the E lected M em bers of the N ational Assem bly and m em bers of a local authority, and conduct of a referendum ;\n( b ) giving instructions and directions to the S ecretary of the C om m ission appointed under section 66 in regard to the exercise of his or her functions under the electoral law prescribed by an A ct of P arliam ent;\n( c ) ensuring that elections are conducted efficiently, properly, freely and fairly; and\n( d ) perform ing such other functions as m ay be prescribed by an A ct of P arliam ent. (13) The C om m ission shall on the com pletion of any election conducted by it,", + "page_start": 30, + "page_end": 30, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "77. Establishm ent and com position of N tlo ya D ikgosi\n78. D esignation and selection of M em bers to N tlo ya D ikgosi (1) E xcept for the areas of G hanzi, C hobe, K galagadi and N orth E ast, the M em bers for the areas referred to in section 77(1)( a ) shall be designated to the N tlo ya D ikgosi according to the established norm s and practices of those areas.\n(2)The M em bers for the G hanzi, C hobe, K galagadi and N orth-E ast areas referred to in section 77(1)( a ) shall be selected, from their ow n num ber, to the N tlo ya D ikgosi by persons for the tim e being perform ing the functions of the office of K gosi w ithin each of those areas.\n(3) For the purpose of selecting the M em bers under section 77(1)( c ), there shall be 20 regions, as listed in the S econd S chedule to this C onstitution, the boundaries of w hich shall be defined by an A ct of P arliam ent.\n(4) There shall be a R egional E lectoral C ollege for each region com posed of paid D ikgosana from that region up to and including a K gosi, w hich shall GLYPH<151>\n( a ) w hen necessary, m eet at a K gotla or other suitable venue;\n( b ) be chaired by a senior governm ent official appointed by the M inister responsible\nC opyright G overnm ent of B otsw ana\nfor local governm ent; and\n( c ) select a M em ber to the N tlo ya D ikgosi for that region by election or in such other m anner as the R egional E lectoral C ollege m ay agree.", + "page_start": 34, + "page_end": 35, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "87. M ode of exercising legislative pow ers\n(1) S ubject to the provisions of section 89(4) of this C onstitution the pow er of Parliam ent to m ake law s shall be exercised by B ills passed by the N ational A ssem bly, after reference in the cases specified in section 88(2) of this C onstitution to the N tlo ya D ikgosi , and assented to by the P resident.\n(2) W hen a B ill is presented to the P resident for assent he or she shall either assent or w ithhold his or her assent.\n(3) W here the P resident w ithholds his or her assent to a B ill, the B ill shall be returned to the N ational A ssem bly.\n(4) If w here the P resident w ithholds his or her assent to a B ill the A ssem bly resolves w ithin six m onths of the B ill being returned to it that the B ill should again be presented for assent, the P resident shall assent to the B ill w ithin 21 days of its being again presented to him or her, unless he or she sooner dissolves P arliam ent.\n(5) W hen a B ill that has been duly passed and presented for assent is assented to in accordance w ith the provisions of this C onstitution it shall becom e law and the President shall thereupon cause it to be published in the G azette as a law .\n(6) N o law m ade by P arliam ent shall com e into operation until it has been published in the G azette , but P arliam ent m ay postpone the com ing into operation of any such law and m ay m ake law s w ith retrospective effect.\n(7) A ll law s m ade by P arliam ent shall be styled \"A cts\" and the w ords of enactm ent shall be \"enacted by the P arliam ent of B otsw ana\".", + "page_start": 37, + "page_end": 37, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "15. Protection from discrim ination on the grounds of race, etc.\n( d ) for the application in the case of m em bers of a particular race, com m unity or tribe of custom ary law w ith respect to any m atter w hether to the exclusion of any law in respect to that m atter w hich is applicable in the case of other persons or not; or\n( e ) w hereby persons of any such description as is m entioned in subsection (3) of this section m ay be subjected to any disability or restriction or m ay be accorded any privilege or advantage w hich, having regard to its nature and to special circum stances pertaining to those persons or to persons of any other such description, is reasonably justifiable in a dem ocratic society.\n(5) N othing contained in any law shall be held to be inconsistent w ith or in contravention of subsection (1) of this section to the extent that it m akes reasonable provision w ith respect to qualifications for service as a public officer or as a m em ber of a disciplined force or for the service of a local governm ent authority or a body corporate established directly by any law .\n(6) S ubsection (2) of this section shall not apply to anything w hich is expressly or by necessary im plication authorized to be done by any such provision of law as is referred to in subsection (4) or (5) of this section.\n(7) N othing contained in or done under the authority of any law shall be held to be inconsistent w ith or in contravention of this section to the extent that the law in question m akes provision w hereby persons of any such description as is m entioned in subsection (3) of this section m ay be subjected to any restriction on the rights and freedom s guaranteed by sections 9, 11, 12, 13 and 14 of this C onstitution, being such a restriction as is authorized by section 9(2), 11(5), 12(2) 13(2), or 14(3), as the case m ay be.", + "page_start": 13, + "page_end": 13, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "63. C onstituencies\nBotsw ana shall be divided into as m any constituencies as there are E lected M em bers of the N ational A ssem bly and each of those constituencies shall return one M em ber to the N ational A ssem bly.\nC opyright G overnm ent of B otsw ana", + "page_start": 27, + "page_end": 27, + "source_file": "Botswana-constitution.pdf" + } + ] + }, + { + "references": { + "source_file": "serverless-core.pdf", + "query": "How much does AWS lambda charge when the function is not running ?", + "target_page": 52, + "target_passage": "there is no charge when your code is not running", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "What is Lambda?\nIn Lambda, you write function code. Lambda runs the functions. That's it. There are no servers.\nWhat is Lambda?\n47\nServerless\nDeveloper Guide\n'No Server Is Easier To Manage Than No Server' - Werner Vogels, VP and CTO\nThe Lambda service runs instances of your function only when needed and scales automatically from zero requests per day to thousands per second. You pay only for the compute time that's actually used - there is no charge when your code is not running.", + "page_start": 50, + "page_end": 51, + "source_file": "serverless-core.pdf" + }, + { + "text": "Related resources:\n· Accelerate Your Lambda Functions with Lambda SnapStart - an AWS Compute blog article by Jeff Barr from Nov 2022 that shows the configuration change and vast difference from roughly six seconds init time to 142 milliseconds of restore time with SnapStart\nAdvanced Topics\n59\nServerless\nDeveloper Guide", + "page_start": 62, + "page_end": 63, + "source_file": "serverless-core.pdf" + }, + { + "text": "Programming Model\nThe Lambda service provides the same event-based programming model for all languages. The Lambda runtime passes an invocation event and context to your Lambda function handler which does some work and produces a resulting event:\nThe invocation event contains data, as a JSON packet, which varies from service to service. For example, API gateway events include path, HTTP method, query string parameters, headers, cookies, and more. DynamoDB events could contain updated or delete record data. S3 events include the bucket name and object key, among other things.\nThe context contains information about the environment the function is running inside. Additional contextual information can be set in familiar environment variables (ENV).\nThe function handler is a method in your function code that processes the inbound event. The handler, which is a standard function in your language of choice, does some work and emits a result event .\nFundamentals\n51\nServerless\nDeveloper Guide\nAfter the handler finishes processing the first event, the runtime sends it another, and another. Each instance of your function could process thousands of requests.\nUnlike traditional servers, Lambda functions do not run constantly. When a function is triggered by an event, this is called an invocation . Lambda functions are limited to 15 minutes in duration, but on average, across all AWS customers, most invocations last for less than a second.\nThere are many types of invocation events. Some examples:\n· HTTP request from API Gateway\n· Schedule managed by an EventBridge rule\n· Message from an IOT device\n· Notification that a file was uploaded to an S3 bucket\nEven the smallest Lambda-based application uses at least one event that invokes your function.", + "page_start": 54, + "page_end": 55, + "source_file": "serverless-core.pdf" + }, + { + "text": "Launch functions faster with SnapStart\nLambda SnapStart for Java can improve startup performance by up to 10x at no extra cost, typically with no changes to your function code. The largest contributor to startup latency (often referred to as cold start time) is the time that Lambda spends initializing the function, which includes loading the function's code, starting the runtime, and initializing the function code.\nWith SnapStart, Lambda initializes your function when you publish a function version. Lambda takes a Firecracker microVM snapshot of the memory and disk state of the initialized execution environment, encrypts the snapshot, and caches it for low-latency access.\nNote: You can use SnapStart only on published function versions and aliases that point to versions. You can't use SnapStart on a function's unpublished version ($LATEST).", + "page_start": 62, + "page_end": 62, + "source_file": "serverless-core.pdf" + }, + { + "text": "How to write logs with serverless applications\nYou might have noticed the logging statements in the preceding handler code. Where do those log messages go?\nDuring invocation, the Lambda runtime automatically captures function output to Amazon CloudWatch.\nIn addition to logging your function's output, the runtime also logs entries when function invocation starts and ends. This includes a report log with the request ID, billed duration,\nFundamentals\n55\nServerless\nDeveloper Guide\ninitialization duration, and other details. If your function throws an error, the runtime returns that error to the invoker.\nTo help simplify troubleshooting, the AWS Serverless Application Model CLI (AWS SAM CLI) has a command called sam logs which will show you CloudWatch Logs generated by your Lambda function.\nFor example, the following terminal command would show the live tail of logs generated by the YourLambdaFunctionName Lambda function:\nsam logs -n YourLambdaFunctionName --tail\nLogging and debugging go hand in hand. Traces of events are available with Amazon X-Ray for debugging.", + "page_start": 58, + "page_end": 59, + "source_file": "serverless-core.pdf" + }, + { + "text": "Fundamentals\nServerless solutions are based on event-driven architecture, or EDA, where services send and receive events , which represent an update or change in state. The primary activity of Lambda functions is to process events.\nWithin the Lambda service, your function code is stored in a code package, deployed as a .zip or a container image. All interaction with the code occurs through the Lambda API. There is no direct invocation of functions from outside of the Lambda service.\nWhat you will learn on your journey to building applications with Lambda:\n· How the event-driven programming model invokes Lambda functions\n· How to create, invoke, test, update, package, and secure functions\n· How the execution and runtime environment runs your functions\n· How to view logs and monitor your functions\n· Where to find hands-on opportunities to learn how to invoke functions\nFundamentals\n48\nServerless\nDeveloper Guide", + "page_start": 51, + "page_end": 52, + "source_file": "serverless-core.pdf" + }, + { + "text": "Serverless development on AWS\nTo build serverless solutions, you need to shift your mindset to break up monoliths into loosely connected services. Consider how each service will do one thing well, with as few dependencies as possible.\nYou may have created microservices before, but it was probably inside a traditional framework. Imagine if your microservice existed, but without the framework. For that to happen, services need a way to get input, communicate with other services, and send outputs or errors.\nThe key to serverless apps is event-driven architecture.\nEvent-driven architecture (EDA) is a modern architecture pattern built from small, decoupled services that publish, consume, or route events. Events are messages sent between services. This architecture makes it easier to scale, update, and independently deploy separate components of a system.\nThe following diagram shows an event-driven serverless microservice. A client request is converted by an API Gateway into an event that is sent to a Lambda compute service. A Lambda function retrieves info from a DynamoDB data store. That data is returned in an event to API Gateway, which sends a response to the client with all the appropriate headers, cookies, and security tokens.\nServerless development on AWS\n20\nServerless\nDeveloper Guide\nMany traditional systems are designed to run periodically and process batches of transactions that have built up over time. For example, a banking application may run every hour to process ATM transactions into central ledgers. In Lambda-based applications, the custom processing should be triggered by every event, allowing the service to scale up concurrency as needed, to provide nearreal time processing of transactions.\nWhile you can run cron tasks in serverless applications by using Amazon EventBridge Scheduler, consider the size of each batch of data that your event sends to Lambda. In this scenario, there is potential for the volume of transactions to grow beyond what can be processed within the 15minute Lambda timeout. If the limitations of external systems force you to use a scheduler, you should generally schedule for the shortest reasonable recurring time period.\nFor example, it's not best practice to use a batch process that triggers a Lambda function to fetch a list of new Amazon S3 objects. This is because the service might receive more new objects in between batches than can be processed within a 15-minute Lambda function.\nServerless development on AWS\n21\nServerless\nDeveloper Guide", + "page_start": 23, + "page_end": 25, + "source_file": "serverless-core.pdf" + }, + { + "text": "How to process events with a Lambda handler\nConceptually, there are only three steps to processing events with Lambda:\n1. Configure the entry point to your function, known as the handler , and deploy the function.\n2. Lambda service initializes the function, then it invokes the handler with an invocation event and context.\n3. Your handler function processes the event and returns a response event.\nSubsequent events will invoke the handler again, without the initialization delay. During this cycle, the function stays in memory, so clients and variables declared outside of the handler method can be reused.\nAfter a period of time, Lambda will eventually tear down the runtime. This can happen for a variety of reasons; some examples: scaling down to conserve resources, updating the function, updating the runtime.\nThe function handler is the essential component of your function code. As noted previously, the handler is the entry point, but it may not be the only function in your code. In fact, a best practice is keeping the handler sparse and doing the actual processing in other functions in your code.\nHere are some example handlers :", + "page_start": 56, + "page_end": 56, + "source_file": "serverless-core.pdf" + }, + { + "text": "Stateless data\nWhen building Lambda functions, you should assume that the environment exists only for a single invocation. The function should initialize any required state when it is first started - for example, fetching a shopping cart from a DynamoDB table. It should commit any permanent data changes before exiting to a durable store such as Amazon S3, DynamoDB, or Amazon SQS. It should not rely on any existing data structures or temporary files, or any internal state that would be managed by multiple invocations (such as counters or other calculated, aggregate values).\nLambda provides an initializer before the handler where you can initialize database connections, libraries, and other resources. Since execution environments are reused where possible to improve performance, you can amortize the time taken to initialize these resources over multiple invocations. However, you should not store any variables or data used in the function within this global scope.\nStateless data\n7\nServerless\nDeveloper Guide", + "page_start": 10, + "page_end": 11, + "source_file": "serverless-core.pdf" + }, + { + "text": "Securing functions\nAWS Identity and Access Management (IAM) is the service used to manage access to AWS services. Lambda is fully integrated with IAM, allowing you to control precisely what each Lambda function can do within the AWS Cloud. There are two important things that define the scope of permissions in Lambda functions:\n· resource policy : Defines which events are authorized to invoke the function.\n· execution role policy : Limits what the Lambda function is authorized to do.\nUsing IAM roles to describe a Lambda function's permissions, decouples security configuration from the code. This helps reduce the complexity of a lambda function, making it easier to maintain.\nA Lambda function's resource and execution policy should be granted the minimum required permissions for the function to perform it's task effectively. This is sometimes referred to as the rule of least privilege. As you develop a Lambda function, you expand the scope of this policy to allow access to other resources as required.\nFundamentals\n56\nServerless\nDeveloper Guide", + "page_start": 59, + "page_end": 60, + "source_file": "serverless-core.pdf" + } + ] + }, + { + "references": { + "source_file": "serverless-core.pdf", + "query": "What is the role of resource policies of lambda functions ?", + "target_page": 60, + "target_passage": "resource policy: Defines which events are authorized to invoke the function.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Securing functions\nAWS Identity and Access Management (IAM) is the service used to manage access to AWS services. Lambda is fully integrated with IAM, allowing you to control precisely what each Lambda function can do within the AWS Cloud. There are two important things that define the scope of permissions in Lambda functions:\n· resource policy : Defines which events are authorized to invoke the function.\n· execution role policy : Limits what the Lambda function is authorized to do.\nUsing IAM roles to describe a Lambda function's permissions, decouples security configuration from the code. This helps reduce the complexity of a lambda function, making it easier to maintain.\nA Lambda function's resource and execution policy should be granted the minimum required permissions for the function to perform it's task effectively. This is sometimes referred to as the rule of least privilege. As you develop a Lambda function, you expand the scope of this policy to allow access to other resources as required.\nFundamentals\n56\nServerless\nDeveloper Guide", + "page_start": 59, + "page_end": 60, + "source_file": "serverless-core.pdf" + }, + { + "text": "Related resource:\n· Creating and sharing Lambda layers", + "page_start": 61, + "page_end": 61, + "source_file": "serverless-core.pdf" + }, + { + "text": "Get started with Lambda\nAll projects need a compute capability to handle processing tasks. Here are some examples:\n· Handling web application and API requests\n· Transforming batches of data\n· Processing messages from a queue\nAdditional resources\n46\nServerless\nDeveloper Guide\n· Resizing images\n· Generating dynamic PDFs from customer data\nIn traditional applications, you write code to do these tasks. You organize that code into functions . You put the function code inside an application framework. Whichever framework you picked will run inside a language dependent runtime environment. Finally, that runtime environment will be hosted on a virtual or physical server.\nSetting up, configuring and maintaining the frameworks, runtime environments, and virtual or physical infrastructure slows down your delivery of features, bug fixes, and improvements.", + "page_start": 49, + "page_end": 50, + "source_file": "serverless-core.pdf" + }, + { + "text": "Stateless data\nWhen building Lambda functions, you should assume that the environment exists only for a single invocation. The function should initialize any required state when it is first started - for example, fetching a shopping cart from a DynamoDB table. It should commit any permanent data changes before exiting to a durable store such as Amazon S3, DynamoDB, or Amazon SQS. It should not rely on any existing data structures or temporary files, or any internal state that would be managed by multiple invocations (such as counters or other calculated, aggregate values).\nLambda provides an initializer before the handler where you can initialize database connections, libraries, and other resources. Since execution environments are reused where possible to improve performance, you can amortize the time taken to initialize these resources over multiple invocations. However, you should not store any variables or data used in the function within this global scope.\nStateless data\n7\nServerless\nDeveloper Guide", + "page_start": 10, + "page_end": 11, + "source_file": "serverless-core.pdf" + }, + { + "text": "How Lambda invokes your function (runtime environment)\nLambda invokes your function in an execution environment , which contains a secure and isolated runtime environment .\n· A runtime provides a language-specific environment which relays invocation events, context information, and responses between the Lambda and your functions.\n· An execution environment manages the processes and resources that are required to run the function.\nFundamentals\n52\nServerless\nDeveloper Guide\nYou can use runtimes that Lambda provides for JavaScript (Node.js), TypeScript, Python, Java, Python, Go, C#, and PowerShell, or you can build your own custom runtime environment inside of a container.\nIf you package your code as a .zip file archive, you must configure your function to use a runtime that matches your programming language. For a container image, you include the runtime when you build the image.", + "page_start": 55, + "page_end": 56, + "source_file": "serverless-core.pdf" + }, + { + "text": "Programming Model\nThe Lambda service provides the same event-based programming model for all languages. The Lambda runtime passes an invocation event and context to your Lambda function handler which does some work and produces a resulting event:\nThe invocation event contains data, as a JSON packet, which varies from service to service. For example, API gateway events include path, HTTP method, query string parameters, headers, cookies, and more. DynamoDB events could contain updated or delete record data. S3 events include the bucket name and object key, among other things.\nThe context contains information about the environment the function is running inside. Additional contextual information can be set in familiar environment variables (ENV).\nThe function handler is a method in your function code that processes the inbound event. The handler, which is a standard function in your language of choice, does some work and emits a result event .\nFundamentals\n51\nServerless\nDeveloper Guide\nAfter the handler finishes processing the first event, the runtime sends it another, and another. Each instance of your function could process thousands of requests.\nUnlike traditional servers, Lambda functions do not run constantly. When a function is triggered by an event, this is called an invocation . Lambda functions are limited to 15 minutes in duration, but on average, across all AWS customers, most invocations last for less than a second.\nThere are many types of invocation events. Some examples:\n· HTTP request from API Gateway\n· Schedule managed by an EventBridge rule\n· Message from an IOT device\n· Notification that a file was uploaded to an S3 bucket\nEven the smallest Lambda-based application uses at least one event that invokes your function.", + "page_start": 54, + "page_end": 55, + "source_file": "serverless-core.pdf" + }, + { + "text": "Fundamentals\nServerless solutions are based on event-driven architecture, or EDA, where services send and receive events , which represent an update or change in state. The primary activity of Lambda functions is to process events.\nWithin the Lambda service, your function code is stored in a code package, deployed as a .zip or a container image. All interaction with the code occurs through the Lambda API. There is no direct invocation of functions from outside of the Lambda service.\nWhat you will learn on your journey to building applications with Lambda:\n· How the event-driven programming model invokes Lambda functions\n· How to create, invoke, test, update, package, and secure functions\n· How the execution and runtime environment runs your functions\n· How to view logs and monitor your functions\n· Where to find hands-on opportunities to learn how to invoke functions\nFundamentals\n48\nServerless\nDeveloper Guide", + "page_start": 51, + "page_end": 52, + "source_file": "serverless-core.pdf" + }, + { + "text": "Secure\n· Execution role\nFundamentals\n50\nServerless\nDeveloper Guide\n· Policies that grant least privilege to your functions\nWorkshop - Intro to Serverless - Before diving too deep, you can choose to try out serverless in a workshop or tutorial. Connect to a data source and create a REST API with your first Lambda function.'\n· Services used: AWS Management Console, Lambda, DynamoDB, API Gateway", + "page_start": 53, + "page_end": 54, + "source_file": "serverless-core.pdf" + }, + { + "text": "Additional resources\nOfficial AWS documentation:\n· AWS Identity and Access Management Documentation\n· Example IAM identity-based policies - an extensive list of example policies, including AWS Lambda: Allows a lambda function to access an Amazon DynamoDB table which is useful in microservices\n· Grant least privilege section of the Policies and permissions chapter suggests a method to refine permissions for increased security\nResources from the serverless community:\n· Simplifying serverless permissions with AWSAWS SAM Connectors - AWS Compute blog post by Kurt Tometich, Senior Solutions Architect, AWS, from Oct 2022 that introduces a AWS SAM abstraction that creates minimally scoped IAM policies\n· Building AWS Lambda governance and guardrails - AWS Compute blog post by Julian Wood, Senior Solutions Architect, AWS, from Aug 2022 that highlights how Lambda, as a serverless service, simplifies cloud security and compliance so you can concentrate on your business logic.", + "page_start": 49, + "page_end": 49, + "source_file": "serverless-core.pdf" + }, + { + "text": "Add code with Layers\nA Lambda layer is a .zip file archive that can contain additional code or other content. A layer can contain libraries, a custom runtime, data, or configuration files. Layers are also necessary if your function .zip archive exceeds the size limit.\nLayers provide a convenient way to package libraries and other dependencies that you can use with your Lambda functions. Using layers reduces the size of uploaded deployment archives and makes it faster to deploy your code. Layers also promote code sharing and separation of responsibilities so that you can iterate faster on writing business logic.", + "page_start": 61, + "page_end": 61, + "source_file": "serverless-core.pdf" + } + ] + }, + { + "references": { + "source_file": "serverless-core.pdf", + "query": "Why can't I use SnapStart on my function tagged with $LATEST ?", + "target_page": 63, + "target_passage": " You can use SnapStart only on published function versions and aliases that point to versions. You can't use SnapStart on a function's unpublished version ($LATEST)", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Launch functions faster with SnapStart\nLambda SnapStart for Java can improve startup performance by up to 10x at no extra cost, typically with no changes to your function code. The largest contributor to startup latency (often referred to as cold start time) is the time that Lambda spends initializing the function, which includes loading the function's code, starting the runtime, and initializing the function code.\nWith SnapStart, Lambda initializes your function when you publish a function version. Lambda takes a Firecracker microVM snapshot of the memory and disk state of the initialized execution environment, encrypts the snapshot, and caches it for low-latency access.\nNote: You can use SnapStart only on published function versions and aliases that point to versions. You can't use SnapStart on a function's unpublished version ($LATEST).", + "page_start": 62, + "page_end": 62, + "source_file": "serverless-core.pdf" + }, + { + "text": "Related resources:\n· Accelerate Your Lambda Functions with Lambda SnapStart - an AWS Compute blog article by Jeff Barr from Nov 2022 that shows the configuration change and vast difference from roughly six seconds init time to 142 milliseconds of restore time with SnapStart\nAdvanced Topics\n59\nServerless\nDeveloper Guide", + "page_start": 62, + "page_end": 63, + "source_file": "serverless-core.pdf" + }, + { + "text": "10.Reboot the VMs:\n0:00:02.605 ***** skipping: [mstnode01.domain.example.com] skipping: [wrknode01.domain.example.com] skipping: [wrknode02.domain.example.com] PLAY [Initialization Checkpoint Start] **************************************************************************************** TASK [Set install initialization 'In Progress'] **************************************************************************************** Thursday 28 November 2019 20:00:37 +0000 (0:00:00.268)", + "page_start": 148, + "page_end": 148, + "source_file": "sg248459.pdf" + }, + { + "text": "2. Click the Upload Support Package button.\nAssuming that the problem encountered was an unexpected node restart that logged a 2030 error, we collect the default logs and the most recent statesave from each node to capture the most relevant data for support.\nNote: When a node unexpectedly reboots, it first dumps its current statesave information before it restarts to recover from an error condition. This statesave is critical for IBM Support to analyze what occurred. Collecting a snap type 4 creates statesaves at the time of the collection, which is not useful for understanding the restart event.\n728\nImplementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\n3. The Upload Support Package window provides four options for data collection. If you were contacted by IBM Support because your system called home or you manually opened a call with IBM Support, you receive a PMR number . Enter that PMR number into the PMR field and select the snap type (often referred to as an option 1, 2, 3, 4 snap ) as requested by IBM Support (see Figure 13-69). In our example, we entered our PMR number, selected snap type 3 (option 3) because this automatically collects the statesave that were created at the time the node restarted, and clicked Upload .\nTip: To open a service request online, see the IBM Support Service requests and PMRs web page.\nFigure 13-69 Upload Support Package window\nChapter 13. RAS, monitoring, and troubleshooting\n729\n730\nImplementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\n4. The procedure to generate the snap on a Storwize V7000 system, including the most recent statesave from each node canister, starts. This process might take a few minutes (see Figure 13-70).\nFigure 13-70 Task detail window", + "page_start": 749, + "page_end": 751, + "source_file": "sg247938.pdf" + }, + { + "text": "Invoke/Test\n· Synchronous invocation\n· Testing locally and in the cloud with the help of AWS SAM templates and AWS SAM CLI", + "page_start": 53, + "page_end": 53, + "source_file": "serverless-core.pdf" + }, + { + "text": "Update / Package\n· Updating code and dependencies\n· Packaging with the help of AWS SAM templates and AWS SAM CLI", + "page_start": 53, + "page_end": 53, + "source_file": "serverless-core.pdf" + }, + { + "text": "A. Watch function description\nButton description:", + "page_start": 0, + "page_end": 0, + "source_file": "6126797.pdf" + }, + { + "text": "11.4.3 Print exit for Multiplatforms\n# #################################### datum='date +%Y-%m-%d' blank=\" \" #################################### # Update this document with count # # of reprints and current date # #################################### arsdoc update -h $host -g $applgrp -f $folder -n log=\"$log$blank$datum\" -n reprint=I -u admin -p ondemand -i \"where account-number='$account-number'\" -v fi #################################### # Done, remove the .cntl file", + "page_start": 285, + "page_end": 285, + "source_file": "sg246915.pdf" + }, + { + "text": "Advanced Topics\nYou can do a lot by just creating a function and connecting it to an event source like API Gateway or S3 triggers.\nAs you progress on your journey, you should explore the following more advanced topics.\n· Connect services with event source mapping\n· Deploy code in containers\n· Add additional code with layers\n· Augment functions with extensions\n· Launch functions faster with SnapStart\n· Connect to functions with Function URLs", + "page_start": 60, + "page_end": 60, + "source_file": "serverless-core.pdf" + }, + { + "text": "18.1.5 Installation and migration issues\nReason or resolution : The arsdb command cannot open a temporary file for messages. ARS_TMP from the ARCHIVE instance is not being used. If ARS_TMP is not present, root '/' is used. To resolve this error, define the directories correctly so that they are pointed to by the ARS_TMP= parm in the ars.cfg file.", + "page_start": 411, + "page_end": 411, + "source_file": "sg246915.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_SHEN_2003.pdf", + "query": "At Shentel company, what determines an employees pension ?", + "target_page": 22, + "target_passage": "Pension benefits are based primarily on the employee's compensation and years of service", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "9. RETIREMENT BENEFIT PLANS\nThe Company and its domestic consolidated subsidiaries have defined benefit plans, i.e., welfare pension fund plans ('WPFP'), tax-qualified pension plans and lump-sum payment plans, covering substantially all employees who are entitled to lump-sum or annuity payments, the amounts of which are determined by reference to their basic rates of pay, length of service, and the conditions under which termination occurs. Certain foreign consolidated subsidiaries have defined benefit and contribution plans.\nThe following table sets forth the funded and accrued status of the plans, and the amounts recognized in the consolidated balance sheets as of March 31, 2005 and 2004 for the Company's and the consolidated subsidiaries' defined benefit plans:", + "page_start": 83, + "page_end": 83, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "SHENTEL SERVICE AREAS", + "page_start": 1, + "page_end": 1, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "Note 9. Retirement Plans\nThe Company maintains a noncontributory defined benefit pension plan and a separate defined contribution plan. The following table presents the defined benefit plan's funded status and amounts recognized in the Company's consolidated balance sheets.", + "page_start": 31, + "page_end": 31, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "12. PENSION AND PROFIT SHARING PLANS:\nThe Company has a defined benefit pension plan covering substantially all of its employees. The benefits are based on years of service and a percentage of the employee's qualifying compensation during the final years of employment. The Company's funding policy is to contribute annually the amount necessary to satisfy the Internal Revenue Service's funding standards. Contributions are intended to provide not only for benefits attributed to service to date but also for those expected to be earned in the future.\nF-21", + "page_start": 84, + "page_end": 84, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "Defined Benefit Pension Plans\nOur defined benefit pension plan obligation is actuarially determined at the end of the year, and we recognize remeasurements in other comprehensive income and retained earnings.", + "page_start": 123, + "page_end": 123, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Qualified Defined Benefit Retirement Plan\nThe Company has a qualified defined benefit retirement plan that provides benefits to certain hourly associates at retirement. These associates do not participate in the Retirement Savings Plan. The benefits are based on length of service and date of retirement.\nApplied Industrial Technologies, Inc. and Subsidiaries\n31", + "page_start": 32, + "page_end": 32, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "FORMS 10-K, 10-Q, and 8-K\nThe Company files periodic reports with the Securities and Exchange Commission. The Company's Annual Report on Form 10-K, Quarterly Reports on Form 10-Q, and Current Reports on Form 8-K, along with any amendments to these reports, are available to shareholders through the Company's website, www.shentel.com. This website also has recent news releases and other information potentially of interest to shareholders.\nA copy of the Company's Annual Report on Form 10-K, without exhibits, may be obtained, without charge, by writing to Shenandoah Telecommunications Company, 124 South Main Street, P.O. Box 459, Edinburg, Virginia 22824, Attention: Secretary.", + "page_start": 58, + "page_end": 58, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "LETTER TO THE SHAREHOLDERS\nIn addition to the normal challenges of managing a growing business, our Board of Directors and members of management have spent considerable time and effort to ensure compliance with the numerous new rules and requirements resulting from the various corporate scandals over the past few years. While a valid argument can be made as to whether all the new requirements are necessary, or even if they would have avoided the scandals that were uncovered, we have approached these efforts as an additional opportunity to further improve what we hope is already a well governed organization. The cost of complying with the new rules will be significant, but the cost of not doing what is right would be worse, and certainly not acceptable to you as owners of the Company.\nAs announced last October, the Board of Directors declared a two-for-one stock split to shareholders of record as of January 30, 2004. The certificates for the new shares were distributed to shareholders February 20, 2004 and the stock began trading on a post-split basis February 23, 2004. With the split, shareholders received one new share for each existing share they held on the record date. While the split results in no change to a shareholder's ownership of the Company, it is hoped that the lower post-split trading price will make the shares more affordable to a larger number of potential investors.\nWhile we cannot predict how our stock's price will perform, we know that over the long term the price should be a function of our ability to steadily increase earnings for our shareholders. We have generally been successful at doing that in the past, and while our future is always uncertain, generating long-term earnings growth will remain our primary objective.\nFor the Board of Directors,\nChristopher E. French\nPresident\nSHENANDOAH TELECOMMUNICATIONS COMPANY\n■\n2\nPEOPLE OF SHENTEL\nF or over 100 years Shenandoah Telecommunications Company has been committed to providing outstanding service to our customers. Our employees take that same dedication after hours to make a difference in their community.\nWe take this opportunity to share with you, our shareholders, the stories of just a few of your dedicated employees.\nPatty Pomeroy", + "page_start": 3, + "page_end": 4, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "Note 10. Stock Incentive Plan\nThe Company has a shareholder approved Company Stock Incentive Plan (the 'Plan'), providing for the grant of incentive compensation to essentially all employees in the form of stock options. The Plan authorizes grants of options to purchase up to 480,000 shares of common stock over a ten-year period beginning in 1996. The option price for all grants has been at the current market price at the time of the grant. The grants have generally provided that one-half of the options exercisable on each of the first and second anniversaries of the date of grant, with the options expiring five years after they are granted. In 2003, the Company issued grants where the options are vested over a five-year period beginning on the third anniversary date of the grant of the options. The participant may exercise 20% of the total grant after each anniversary date through the eighth year, with the options expiring after ten years.\nThe fair value of each grant is estimated at the grant date using the Black-Scholes option-pricing model with the following weighted average assumptions:\nSHENANDOAH TELECOMMUNICATIONS COMPANY\n■\n32\nSHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES NOTES TO CONSOLIDATED FINANCIAL STATEMENTS", + "page_start": 33, + "page_end": 34, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "Remuneration Structure\nCompany performance is measured over a three year period based on the Company's Total Shareholder Return ('TSR') relative to one or more comparator groups as determined by the Board at the commencement of the performance period including, without limitation, any combination of the ASX100, energy companies in ASX100, the ASX Energy Index and international exploration and production companies. If performance is below the 50th percentile, no award is made. A proportionate award is made for performance between the 50th to 75th percentile and the maximum award is made for performance at or above the 75th percentile.\nIn relation to the current financial year, awards may be taken only in the form of shares pursuant to SESPP or, at the election of an executive, options pursuant to SESOP, details of which are described in notes 18(c) and 18(d) of the financial statements. In future periods, awards may be taken in the form of rights over shares pursuant to SESPP or options granted under SESOP, at the election of executives.\nRights to shares and options are granted at no cost to the executives with the number of shares awarded being determined by dividing the amount of the award by the volume weighted average price of the Company's shares over the five business days up to and including the award date. The number of options awarded is of equivalent value calculated by an independent expert based on an acceptable valuation method.\nThe exercise price of the options is the volume weighted average price of the Company's shares over the five business days up to and including the award date.\nThe Board intends that LTI awards be made on an annual basis using a three year measurement period for the applicable performance hurdles. However, the Board reserves the right to suspend or modify the LTI program in light of circumstances appropriate to the Company from time to time.\nThe maximum number of shares that may be issued under all of the Company's executive and employee share and option plans cannot exceed the limit of 5% of the issued capital, as approved by shareholders at the 2000 Annual General Meeting.", + "page_start": 77, + "page_end": 77, + "source_file": "ASX_STO_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_SHEN_2003.pdf", + "query": "At the end of 2003, how many available-for-sales investments did Shenandoah company count in its portfolio ?", + "target_page": 53, + "target_passage": "The Company’s available-for-sale portfolio at December 31, 2003 is made up of two investments", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Years Ended December 31, 2003, 2002 and 2001\nof retirements, 2001 = (27,972) $. Purchase of investment securities, 2003 = (796). Purchase of investment securities, 2002 = (1,775). Purchase of investment securities, 2001 = (1,250). Proceeds from sale of equipment, 2003 = 109. Proceeds from sale of equipment, 2002 = 77. Proceeds from sale of equipment, 2001 = 482. Proceeds from sale of radio spectrum license, 2003 = -. Proceeds from sale of radio spectrum license, 2002 = -. Proceeds from sale of radio spectrum license, 2001 = 1,133. Proceeds from investment activities (Note 3), 2003 = 714. Proceeds from investment activities (Note 3), 2002 = 3,301. Proceeds from investment activities (Note 3), 2001 = 5,842. Net cash used in investing activities, 2003 = (12,449) $. Net cash used in investing activities, 2002 = $ (21,009). Net cash used in investing activities, 2001 = $ (21,765)\n(Continued)\nSHENANDOAH TELECOMMUNICATIONS COMPANY\n■\n16\nSHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES CONSOLIDATED STATEMENTS OF CASH FLOWS\nin thousands", + "page_start": 17, + "page_end": 18, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES MANAGEMENT'S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS\nis the intent of the Company to evaluate whether to hold or sell parts or all of each investment on an individual basis. At December 31, 2003, the Company had external investments totaling $7.5 million.\nIn 2004, the Company anticipates taking advantage of a conversion feature on its Rural Telephone Bank stock. The Company will convert a portion of its holdings into a different class of stock that will pay cash dividends each year. The bank declares a dividend rate that varies, each year. The range of the dividend has been between 4.2% and 5.65% over the last 5 years. The rate in the two most recent years was 4.2%. This transaction is estimated to provide the Company with approximately $0.3 million in dividend income each year, based on the 2003 dividend rate of 4.2% and assuming we had converted the stock at the beginning of 2003.", + "page_start": 53, + "page_end": 53, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "Significant Transactions\nThe Company had several significant transactions during 2003. The largest was the sale of its 66% interest in the Virginia 10 RSA cellular operation, as described above. The Company originally entered into the agreement with Verizon Wireless in November 2002. The Company was the general partner of the limited partnership which operated an analog cellular network in the six-county area of Northwestern Virginia, including Clarke, Frederick, Page, Rappahannock, Shenandoah, and Warren counties, and the city of Winchester. The sales price was $37.0 million plus the Company's 66% share of the partnership's working capital, which was approximately $1.7 million. The Company was required to do a working capital true up following the closing, from which the Company recorded a charge for $23 thousand after taxes. In the fourth quarter the Company recorded an additional charge for taxes of $0.2 million to reflect the consolidated effective tax rate based on the final operating results for the year.\nThe sale of this business is reflected in the discontinued operations section of the income statement along with the results of operations for the two months of 2003 that the operation remained a part of the Company.\nSHENANDOAH TELECOMMUNICATIONS COMPANY\n■\n40\nSHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES MANAGEMENT'S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS\nReflected in the 2003 results are several unusual items, which should be noted in understanding the financial results of the Company for 2003.", + "page_start": 41, + "page_end": 42, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "December 31, 2003, 2002 and 2001\nshares in 2002, and 7,530 shares in 2001, 2003 = $ 5,733. issued and outstanding 7,593 shares in 2003, 7,552 shares in 2002, and 7,530 shares in 2001, 2002 = $ 5,246. issued and outstanding 7,593 shares in 2003, 7,552 shares in 2002, and 7,530 shares in 2001, 2001 = $ 4,950. Retained earnings, 2003 = 100,449. Retained earnings, 2002 = 71,335. Retained earnings, 2001 = 69,610. Accumulated other comprehensive income (loss) (Note 3), 2003 = 26. Accumulated other comprehensive income (loss) (Note 3), 2002 = (4). Accumulated other comprehensive income (loss) (Note 3), 2001 = 42. Total shareholders' equity, 2003 = $106,208. Total shareholders' equity, 2002 = $ 76,577. Total shareholders' equity, 2001 = $ 74,602\nSee accompanying notes to consolidated financial statements.\n13\n■\n2003 ANNUAL REPORT\nSHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES CONSOLIDATED STATEMENTS OF INCOME", + "page_start": 14, + "page_end": 15, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "Years Ended December 31, 2003, 2002 and 2001\nexercise of incentive stock options, Shares = 41. Common stock issued through exercise of incentive stock options, Common Stock = 487. Common stock issued through exercise of incentive stock options, Retained Earnings = -. Common stock issued through exercise of incentive stock options, Accumulated Other Comprehensive Income (loss) = -. Common stock issued through exercise of incentive stock options, Total = 487. Balance, December 31, 2003, Shares = 7,593. Balance, December 31, 2003, Common Stock = $5,733. Balance, December 31, 2003, Retained Earnings = $100,449. Balance, December 31, 2003, Accumulated Other Comprehensive Income (loss) = $ 26. Balance, December 31, 2003, Total = $106,208\nSee accompanying notes to consolidated financial statements.\n15\n■\n2003 ANNUAL REPORT\nSHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES CONSOLIDATED STATEMENTS OF CASH FLOWS\nin thousands", + "page_start": 16, + "page_end": 17, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "Note 3. Securities and Investments (Continued)\nIn 2003, the Company received distributions from its equity investments totaling $0.5 million in cash and invested $0.7 million in two equity investments, Dolphin Communications Parallel Fund, LP and Dolphin Communications Fund II, LP. These two investments recorded losses of approximately $0.4 million for the 2003 year. The Company recorded a loss from the Virginia Independent Telephone Alliance investment of $19 thousand, for 2003. The Company recorded a gain from the ValleyNet partnership of $84 thousand and received distributions of $84 thousand. Other equity investments lost an additional $0.4 million for 2003.\nThe Company was committed to invest an additional $1.8 million at December 31, 2003 in various equity method investees pursuant to capital calls from the fund managers. It is not practical to estimate the fair value of the other investments due to their limited market and restrictive nature of their transferability.\nThe Company's ownership interests in Virginia Independent Telephone Alliance and ValleyNet are approximately 22% and 20%, respectively. The Company purchases services from Virginia Independent Telephone Alliance and ValleyNet at rates comparable with other customers. The Company's ownership in NTC Communications is approximately 18%. Other equity method investees are investment limited partnerships which are approximately 2% owned each.\n25\n■\n2003 ANNUAL REPORT\nSHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES NOTES TO CONSOLIDATED FINANCIAL STATEMENTS", + "page_start": 26, + "page_end": 27, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "December 31, 2003, 2002 and 2001\n(Note 4), 2001 = $154,345. Plant under construction, 2003 = 2,261. Plant under construction, 2002 = 5,209. Plant under construction, 2001 = 14,960. , 2003 = $ 199,692. , 2002 = $189,278. , 2001 = $169,305. Less accumulated depreciation, 2003 = 72,006. Less accumulated depreciation, 2002 = 57,126. Less accumulated depreciation, 2001 = 44,473. Net property, plant and equipment, 2003 = $ 127,686. Net property, plant and equipment, 2002 = $132,152. Net property, plant and equipment, 2001 = $124,832. Other Assets, 2003 = . Other Assets, 2002 = . Other Assets, 2001 = . Assets held for sale (Note 2), 2003 = $ -. Assets held for sale (Note 2), 2002 = $ -. Assets held for sale (Note 2), 2001 = $ 3,272. Cost in excess of net assets of business acquired, 2003 = 5,105. Cost in excess of net assets of business acquired, 2002 = 5,105. Cost in excess of net assets of business acquired, 2001 = 5,105. Deferred charges and other assets (Notes 1 and 2), 2003 = 5,999. Deferred charges and other assets (Notes 1 and 2), 2002 = 667. Deferred charges and other assets (Notes 1 and 2), 2001 = 1,452. , 2003 = $ 11,104. , 2002 = $ 5,772. , 2001 = $ 9,829. Less accumulated amortization, 2003 = 1,856. Less accumulated amortization, 2002 = 1,837. Less accumulated amortization, 2001 = 2,361. Net other assets, 2003 = $ 9,248. Net other assets, 2002 = $ 3,935. Net other assets, 2001 = $ 7,468. Total assets, 2003 = $ 185,364. Total assets, 2002 = $164,004. Total assets, 2001 = $167,372\nSee accompanying notes to consolidated financial statements.\nSHENANDOAH TELECOMMUNICATIONS COMPANY\n■\n12\nSHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES CONSOLIDATED BALANCE SHEETS\nin thousands", + "page_start": 13, + "page_end": 14, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES MANAGEMENT'S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS\nThe $5.0 million placed in escrow, as part of the sales agreement on the Virginia 10 RSA limited partnership, should be released after February 28, 2005. There are no known claims that have been filed against the amount in escrow.\nThe Company spent $12.5 million on capital projects in 2003, or about $7.0 million below what was budgeted for the year. The variance was primarily due to postponing construction of an additional diverse fiber route and the delay of the second phase of renovations on the Shentel Center in Edinburg, Virginia.\nThe Company has no other off-balance sheet arrangements and has not entered into any transactions involving unconsolidated, limited purpose entities or commodity contracts.\nCapital expenditures budgeted for 2004 total approximately $30 million, including approximately $20 million for additional PCS base stations, additional towers, and switch upgrades to enhance the PCS network. Improvements and replacements of approximately $5 million are planned for the telephone operation. The remaining $5 million covers building renovations, vehicles, office equipment, and other miscellaneous capital needs.\nThe Company anticipates using funds from operations, to the extent they are available to fund the capital expenditures and the payment of debt and interest. Due to lower than expected tax expenses in 2003, the Company will apply the tax receivable to the 2004-year tax liability. It is anticipated by no later than second quarter of 2004, additional federal tax payments will be due based on anticipated profits expected to be generated in the operation.", + "page_start": 54, + "page_end": 54, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES MANAGEMENT'S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS\nInterstate, 2003 2003..Originating Originating = 29,373. Interstate, 2003 2003..Terminating Terminating = 87,539. Interstate, 2002 2002.2002.Originating Originating Originating = 42,929 42,929. Interstate, 2002 2002..Terminating Terminating Terminating = 63,959 63,959. Intrastate, 2003 2003..Originating Originating = 37,190. Intrastate, 2003 2003..Terminating Terminating = 49,103. Intrastate, 2002 2002.2002.Originating Originating Originating = 22,684 22,684. Intrastate, 2002 2002..Terminating Terminating Terminating = 36,712 36,712. Total, 2003 2003..Originating Originating = 66,563. Total, 2003 2003..Terminating Terminating = 136,642. Total, 2002 2002.2002.Originating Originating Originating = 65,613 65,613. Total, 2002 2002..Terminating Terminating Terminating = 100,671 100,671. Access revenue (in thousands), 2003 2003..Originating Originating = 2003 2003. Access revenue (in thousands), 2003 2003..Terminating Terminating = 2003 2003. Access revenue (in thousands), 2002 2002.2002.Originating Originating Originating = 2002 2002 2002. Access revenue (in thousands), 2002 2002..Terminating Terminating Terminating = 2002 2002 2002. (net of intercompany usage), 2003 2003..Originating Originating = As reported As reported. (net of intercompany usage), 2003 2003..Terminating Terminating = Pro forma Pro forma. (net of intercompany usage), 2002 2002.2002.Originating Originating Originating = As reported Pro forma As reported As reported. (net of intercompany usage), 2002 2002..Terminating Terminating Terminating = Pro forma Pro forma. Traffic sensitive (1), 2003 2003..Originating Originating = $", + "page_start": 47, + "page_end": 47, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "Note 15. Quarterly Results (unaudited)\n(b) Second quarter results of 2002 include the loss of $4.9 million, net of tax effects on the other than temporary writedown of the VeriSign stock.\nPer share earnings may not add to the full year values as each per share calculation stands on its own.\nSHENANDOAH TELECOMMUNICATIONS COMPANY\n■\n38\nSHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES MANAGEMENT'S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS\nThis annual report contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of 1934, including statements regarding our expectations, hopes, intentions, or strategies regarding the future. These statements are subject to certain risks and uncertainties that could cause actual results to differ materially from those anticipated in the forward-looking statements. Factors that might cause such a difference include, but are not limited to, changes in the interest rate environment, management's business strategy, national, regional and local market conditions, and legislative and regulatory conditions. The Company undertakes no obligation to publicly revise these forward-looking statements to reflect subsequent events or circumstances, except as required by law.", + "page_start": 39, + "page_end": 40, + "source_file": "NASDAQ_SHEN_2003.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_SHEN_2003.pdf", + "query": "What was the main reason of the decrease of customer base of the Shenandoah and Virginia 10 RSA partnership ?", + "target_page": 51, + "target_passage": "he decline was the result of competition with digital technologies and increased competition from national carriers in the area", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "DISCONTINUED OPERATIONS\nThe Company invested $2.0 million in the Virginia 10 RSA limited partnership in the early 1990's. The partnership's local customer base peaked in early 2000 with nearly 12,000 subscribers, then steadily declined to 6,700 by December 31, 2002. The decline was the result of competition with digital technologies and increased competition from national carriers in the area. As a result of the decline in the subscriber base, and the need for extensive capital expenditures to transform the analog network into a digital cellular network, the Company elected to sell its 66% interest in the partnership to one of the minority partners. The agreement was signed in November 2002, and closing was February 28, 2003. The Company's portion of the net income from its operations for 2003, 2002 and 2001 was $1.2 million, $7.4 million and $6.7 million, respectively.", + "page_start": 50, + "page_end": 50, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES MANAGEMENT'S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS\nThe $5.0 million placed in escrow, as part of the sales agreement on the Virginia 10 RSA limited partnership, should be released after February 28, 2005. There are no known claims that have been filed against the amount in escrow.\nThe Company spent $12.5 million on capital projects in 2003, or about $7.0 million below what was budgeted for the year. The variance was primarily due to postponing construction of an additional diverse fiber route and the delay of the second phase of renovations on the Shentel Center in Edinburg, Virginia.\nThe Company has no other off-balance sheet arrangements and has not entered into any transactions involving unconsolidated, limited purpose entities or commodity contracts.\nCapital expenditures budgeted for 2004 total approximately $30 million, including approximately $20 million for additional PCS base stations, additional towers, and switch upgrades to enhance the PCS network. Improvements and replacements of approximately $5 million are planned for the telephone operation. The remaining $5 million covers building renovations, vehicles, office equipment, and other miscellaneous capital needs.\nThe Company anticipates using funds from operations, to the extent they are available to fund the capital expenditures and the payment of debt and interest. Due to lower than expected tax expenses in 2003, the Company will apply the tax receivable to the 2004-year tax liability. It is anticipated by no later than second quarter of 2004, additional federal tax payments will be due based on anticipated profits expected to be generated in the operation.", + "page_start": 54, + "page_end": 54, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "Note 2. Discontinued Operations\nIn November 2002, the Company entered into an agreement to sell its 66% General Partner interest in the Virginia 10 RSA Limited Partnership (cellular operation) to Verizon Wireless for $37.0 million. The closing of the sale took place at the close of business on February 28, 2003. The total proceeds received were $38.7 million, including $5.0 million held in escrow, and a $1.7 million adjustment for estimated working capital at the time of closing. There was a post closing adjustment based on the actual working capital balance as of the closing date, which resulted in a $39 thousand charge for the Company. The $5.0 million escrow was established for any contingencies and indemnification issues that may arise during the two-year post-closing period and is included in deferred charges and other assets in the 2003 consolidated balance sheet. The Company's gain on the transaction was approximately $35 million. Post closing, the Company provided transition services to Verizon for a period of approximately three months, with compensation for those services being approximately $40 thousand per month during the transition period.\nThe assets and liabilities attributable to the cellular operation have been classified as held for sale in the consolidated balance sheets and consist of the following at December 31, 2002 and 2001:", + "page_start": 24, + "page_end": 24, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES MANAGEMENT'S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS\nNon-operating income was a gain of $0.4 million, an increase of $0.5 million, due to an increase in patronage equity earned from CoBank, the Company's primary lender, and due to interest income from the proceeds on the sale of the Virginia 10 RSA Limited partnership, offset by losses recorded for the Company's portfolio of investments.\nThe Company provided for income taxes of $5.3 million in 2003, which is an effective tax rate of 35.2% due to the effect of state tax apportionment rules and reduction in the liability for tax exposures. On a normalized basis the Company would have recorded taxes at an effective tax rate of approximately 39%. Last year's effective tax rate was 42.2% due to the impact of net operating loss carry forwards generated in several states with higher tax rates. The Company currently operates in four states. Due to apportionment rules and geographic operations of subsidiaries where the Company's profits and losses arise, the Company is generating profits in states with lower tax rates, while generating losses in states with higher tax rates. The Company cautions readers that the current effective tax rate may not be the same rate at which tax benefits or tax expenses are recorded in the future. The Company's state apportionments, profits and losses and state tax rates may change, therefore changing the effective rate at which taxes are provided for or at which tax benefits accrue. In the near term, under existing operating results and current tax rates, the Company anticipates a normalized effective tax rate will be approximately 39%.\nNet income from continuing operations was $9.8 million, an increase of $12.7 million from 2002. The results are primarily made up of the improvement in the PCS operation and the one-time impact of the losses on the sale of VeriSign stock in 2002.\nSHENANDOAH TELECOMMUNICATIONS COMPANY\n■\n48\nSHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES MANAGEMENT'S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS\nIncome from discontinued operations was $22.4 million after taxes, an increase of $15.0 million or 202%. The income from discontinued operations in 2003 includes the sale of the partnership interest in February 2003 and results from the two months of its operations in 2003.", + "page_start": 49, + "page_end": 50, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "Significant Transactions\nThe Company had several significant transactions during 2003. The largest was the sale of its 66% interest in the Virginia 10 RSA cellular operation, as described above. The Company originally entered into the agreement with Verizon Wireless in November 2002. The Company was the general partner of the limited partnership which operated an analog cellular network in the six-county area of Northwestern Virginia, including Clarke, Frederick, Page, Rappahannock, Shenandoah, and Warren counties, and the city of Winchester. The sales price was $37.0 million plus the Company's 66% share of the partnership's working capital, which was approximately $1.7 million. The Company was required to do a working capital true up following the closing, from which the Company recorded a charge for $23 thousand after taxes. In the fourth quarter the Company recorded an additional charge for taxes of $0.2 million to reflect the consolidated effective tax rate based on the final operating results for the year.\nThe sale of this business is reflected in the discontinued operations section of the income statement along with the results of operations for the two months of 2003 that the operation remained a part of the Company.\nSHENANDOAH TELECOMMUNICATIONS COMPANY\n■\n40\nSHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES MANAGEMENT'S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS\nReflected in the 2003 results are several unusual items, which should be noted in understanding the financial results of the Company for 2003.", + "page_start": 41, + "page_end": 42, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES MANAGEMENT'S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS\nNet income was $4.5 million, a decrease of $11.9 million or 72.4%. The decrease is primarily the result of the $21.7 million decline in investment results due to the impact of the VeriSign gain recorded in 2001, and the loss on the sale of the VeriSign stock in 2002.", + "page_start": 52, + "page_end": 52, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES MANAGEMENT'S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS\n4,274. Traffic sensitive (1), 2003 2003..Terminating Terminating = $ 4,974. Traffic sensitive (1), 2002 2002.2002.Originating Originating Originating = $ 4,676 $ 4,676. Traffic sensitive (1), 2002 2002..Terminating Terminating Terminating = $ 3,976 $ 3,976. Special access revenues, 2003 2003..Originating Originating = 1,606. Special access revenues, 2003 2003..Terminating Terminating = 1,606. Special access revenues, 2002 2002.2002.Originating Originating Originating = 1,247 1,247. Special access revenues, 2002 2002..Terminating Terminating Terminating = 1,247 1,247. Carrier common line settlement, 2003 2003..Originating Originating = 5,750. Carrier common line settlement, 2003 2003..Terminating Terminating = 5,750. Carrier common line settlement, 2002 2002.2002.Originating Originating Originating = 4,978 4,978. Carrier common line settlement, 2002 2002..Terminating Terminating Terminating = 4,978 4,978. Total, 2003 2003..Originating Originating = $ 11,630. Total, 2003 2003..Terminating Terminating = $ 12,330. Total, 2002 2002.2002.Originating Originating Originating = $ 10,901 $ 10,901. Total, 2002 2002..Terminating Terminating Terminating = $ 10,201 $ 10,201\n(1) Traffic sensitive revenue has been normalized in the proforma column to remove the impact of the access billing dispute adjustment and the impact of the NECA settlement adjustments.\nSHENANDOAH TELECOMMUNICATIONS COMPANY\n■\n46\nFacility lease revenue contributed $5.5 million to wireline revenues, a decrease of $0.2 million or 3.5%. The decrease was primarily the result of the prolonged decline of lease rates associated with competitive pricing pressures and the economic downturn in the telecommunications industry. During 2002 the Company completed a second, diverse fiber route to its existing interconnection point in the Dulles airport area of Northern Virginia. This fiber route provides increased reliability for customers in the event of fiber cuts or breaks, and extends the availability of the Company's fiber network to additional market locations but to date has not added additional revenue to the Company's operation.", + "page_start": 47, + "page_end": 48, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES MANAGEMENT'S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS\nWireless revenues from the Company's paging operation were $0.2 million, a decrease of $0.1 million as the customer base increasingly chose alternative wireless services. Paging service subscribers declined by 32.3% in 2003 from 2,940 subscribers to 1,989 subscribers. The paging operation continues to decline as more areas are covered by wireless voice services, which have features that surpass those of paging technologies. The Company anticipates that its paging customer base will continue to decline in the future.\nWithin wireline revenues, the Telephone operation contributed $22.7 million, an increase of $0.3 million, or 1.2%. Telephone access revenues were $11.6 million, an increase of $0.7 million or 6.7%. During 2003, the Company recorded a $1.2 million reduction to access revenue, of which $0.7 million was related to 2002, resolving disputes with interexchange carriers on the rating of long distance calls transiting the Telephone switching network for termination on wireless networks.\nOriginating access revenue increased in 2003 due in part to a shift from interstate to intrastate traffic. On similar traffic volume in both years, the Company generated an additional $0.4 million due to a favorable rate differential of $0.03 per minute on the increase in the mix of intrastate traffic. The Company's increased access revenue was also a result of the benefit gained through terminating more minutes through the switch, which increased 36.0 million minutes or 35.7% over 2002. The rates for terminating traffic were similar in both years, although the percentage of terminating traffic to total traffic increased from 58% in 2002 to 65% in 2003.\nThe shift in originating traffic is the result of implementing software capable of identifying actual interstate and intrastate traffic specifically delivered to the wireline switch, where previously usage was allocated between interstate and intrastate traffic types by the interexchange carriers.\nThe following table shows the access traffic minutes of use for the two years of 2003 and 2002.", + "page_start": 47, + "page_end": 47, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES MANAGEMENT'S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS\nBilling and collection services and other revenues contributed $0.4 million to wireline revenues, which was the same as 2002 results. Revenues from this service had declined in recent years, with interexchange carriers now issuing a greater proportion of their bills directly to their customers.\nWireline revenues from cable television services were $4.4 million, an increase of $0.1 million or 1.7%. The number of subscribers and service plan prices remained relatively constant during 2003.\nOther revenues, primarily consisting of Internet and 511Virginia service revenues were $5.8 million in 2003, an increase of $0.7 million or 13.5%. The Company had 17,420 dial-up Internet subscribers at December 31, 2003, compared to 18,050 at the end of the previous year. During 2003, the Company's DSL high-speed Internet access subscriber count increased to 1,298 from 646. Total Internet service revenue was $4.5 million, an increase of $0.3 million or 10.7%. The 511Virginia contract with the Virginia Department of Transportation contributed $1.3 million to other revenues, an increase of $0.4 million or 41.3%. Telecommunications equipment sales, services and lease revenues were $1.1 million, which reflects a $0.1 million decrease from 2002 results.\nTotal operating expenses were $87.2 million, an increase of $3.6 million or 4.3%. The primary driver in the increase in operating expenses is continued growth in the PCS operation somewhat offset by a significant decline in bad debt expense compared to 2002.\nLate in 2003, the Company made an employee benefits policy change, which eliminated the requirement for the Company to accrue a vacation liability in advance of the year in which the benefit was used. The result of this change was a reduction of benefit expense of $0.5 million for the year compared to 2002. Benefit expenses impact all operating departments based on the amount of direct labor charged to the department. The change has a one-time impact on the financial statements of the Company. The benefits policy now provides that employees earn and use their paid time off in the same period. In the future, under this policy, unused hours can be banked but only used for extended illness, not carried over for use as vacation.", + "page_start": 48, + "page_end": 48, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "SHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES MANAGEMENT'S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS\nSelling, general and administrative expenses were $26.1 million, an increase of $9.3 million or 55.0%. Customer support costs were $7.8 million, an increase of $2.8 million or 55.3%. The growth in Sprint wireless subscribers was the primary driver for this increase. Advertising expense was $4.3 million, an increase of $1.5 million or 55.8%. This change was primarily due to the stepped-up and ongoing marketing efforts to support the PCS operations in the Quad State market and particularly the Central Penn market. PCS sales staff expenses were $2.7 million, an increase of $0.7 million or 32.7%. The increase was principally due to the full year operations of the three retail locations and adding additional sales staff.\nThe Company experienced significant bad debt losses in its PCS operations related to the Sprint Clear PaySM program. The program was initially targeted at customers in sub-prime credit classes and did not require a deposit upon activation of service. As a result of default rates that exceeded projections, the Company experienced a substantial increase in bad debt expense, which rose from $1.2 million in 2001 to $4.4 million in 2002. The reinstatement of deposit requirements in April 2002 caused some moderation in bad debt expense by the end of the year. Total PCS bade debt expense for 2002 was $3.7 million of this expense is associated with several large telecommunications customers who filed bankruptcies in 2002. program. sm\nSHENANDOAH TELECOMMUNICATIONS COMPANY\n■\n50\nSHENANDOAH TELECOMMUNICATIONS COMPANY AND SUBSIDIARIES MANAGEMENT'S DISCUSSION AND ANALYSIS OF FINANCIAL CONDITION AND RESULTS OF OPERATIONS\nOperating income grew to $9.3 million, an increase of $2.9 million or 45.4%. Revenue growth, primarily in the PCS operation, was greater than the increase in operating expense, and the overall operating margin was 10.0%, compared to 9.4% in 2001. The elevated bad debt expense in the PCS and telephone operations had a dampening effect on the operating margin improvement.", + "page_start": 51, + "page_end": 52, + "source_file": "NASDAQ_SHEN_2003.pdf" + } + ] + }, + { + "references": { + "source_file": "maiis-user-manual.pdf", + "query": "As a product manager, how can I reject an inventory in NAIIS ?", + "target_page": 38, + "target_passage": "Log in as PM. Click on “View Inventories Progress” under sub menu “Submission Management”. The “View Inventories Progress” screen appears. Select the appropriate inventory by clicking the Inventory name under column “Name” Press the “Reject” button ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "10.4.2 Rejection of an Inventory\n1. Log in as PM.\n2. Click on 'View Inventories Progress' under sub menu 'Submission Management'.\n3. The 'View Inventories Progress' screen appears.\n4. Select the appropriate inventory by clicking the Inventory name under column 'Name' (figure 62, a).\n5. Press the 'Reject' button (figure 62, b).\n*** Note: A notification email will be sent to the PM, once the 'Reject' button has been pressed. And the status changed to 'Awaiting_rejection_check' (figure 63).\nNAIIS-User-Manual.Docx\nPage 38\n10/02/2013\nFigure 62. Work on Inventories screen -Reject - Status = check\nNAIIS-User-Manual.Docx\nPage 39\n10/02/2013", + "page_start": 37, + "page_end": 38, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "10.5.2 Rejection of an inventory\n1. Log in as NFP.\n2. Click on 'View Inventories Progress' under sub menu 'Submission Management'.\n3. The 'View Inventories Progress' screen appears.\n4. Select the appropriate inventory by clicking the Inventory name under column 'Name' (figure 66).\n5. Press the 'Send for Rejection' button (figure 66, b).\nOnce the 'Send for Rejection' button was pressed, the status of the selected inventory changes to 'awaiting_rejection' (figure 67, a).\n*** Note: A notification email will be sent to the PM that the inventory has been rejected. Therefore, the PM will be able to reject the submission. Proceed to section 10.4.2.\nFigure 66. Work on Inventories screen - Rejection of an inventory - Status = awaiting_approval\nFigure 67. Work on Inventories screen - Rejection of an inventory - Status = rejected_approval\nNAIIS-User-Manual.Docx\nPage 41\n10/02/2013", + "page_start": 40, + "page_end": 40, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "10.5.1 Approval of an inventory\n1. Log in as NFP.\n2. Click on 'View Inventories Progress' under sub menu 'Submission Management'.\n3. The 'View Inventories Progress' screen appears.\n4. Select the appropriate inventory by clicking the Inventory name under column 'Name' (figure 64).\n5. Press the 'Approve' button (figure 64, b).\nOnce the 'Approve' button was pressed, the status of the selected inventory changes to 'approved' (figure 65, b).\n*** Note: A notification email will be sent to the PM that the inventory has been approved. Therefore, the PM may proceed to selecting the tables for preparing the official submission (See section 10.6).\nFigure 64. Work on Inventories screen - Approve an inventory - Status = awaiting_approval\nFigure 65. Work on Inventories screen - Approve an inventory - Status = approved\nNAIIS-User-Manual.Docx\nPage 40\n10/02/2013", + "page_start": 39, + "page_end": 39, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "10.2 Start of inventory/submission (NFP or PM)\nThis procedure allows the NFP or PM to start a new (created) inventory. The existing data for the inventory year identified will be made available in the new inventory/submission.\nThese are the steps to start a new inventory:\n1. Click on 'View Inventories Progress' under sub menu 'Submission Management' (figure 53).\nFigure 53. View Inventories Progress sub menu\n2. The 'View Inventories Progress' screen appears (figure 54).\n3. Select the appropriate inventory by clicking the box under column 'Working Inventory' (figure 54, a).\n*** Note: The selected appropriate inventory should be in status 'created' (figure 54, b)\nNAIIS-User-Manual.Docx\nPage 35\n10/02/2013", + "page_start": 34, + "page_end": 34, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "10.6.1 Submit select tables for preparing the general submission\n1. Log in as PM.\n2. Click on 'View Inventories Progress' under sub menu 'Submission Management'.\n3. The 'View Inventories Progress' screen appears.\n4. Select the appropriate inventory by clicking the box under column 'Working inventory' (figure 68, a).\n*** Note: The selected inventory year to be submitted should be in status 'approved' (figure 68, b).\n5. Click on 'Work on Inventories' under Submission Management (figure 68, c).\nThis opens the Submit Inventory initial screen (figure 69).\n6. Click the inventory year to be submitted (figure 69, a).\n7. Press the 'Generate Official Submission' button (figure 69, c).\nFigure 69. Submit select tables for the preparation for the general submission\nFigure 68. View Inventories Progress screen - select inventory for the preparation for the general submission\nNAIIS-User-Manual.Docx\nPage 42\n10/02/2013\nOnce the 'Generate Official Submission' button has been pressed the 'Submit Inventory' initial screen for selecting the tables appears (figure 70).\n8. Select or deselect by clicking the appropriate year(s) under 'Inventory Years' box (figure 70, c) or the sector grids under the 'Table' box (figure 70, d) to generate the official submission.\n9. Press the 'Submit' button (figure 70, e). An official submission will be generated in the NAIIS system.\nFigure 70. Submit - select tables and grids for the general submission\nNAIIS-User-Manual.Docx\nPage 43\n10/02/2013", + "page_start": 41, + "page_end": 42, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "10.4.1 Send for approval of an Inventory\n1. Log in as PM.\n2. Click on 'View Inventories Progress' under sub menu 'Submission Management'.\n3. The 'View Inventories Progress' screen appears.\n4. Select the appropriate inventory by clicking the Inventory name under column 'Name' (figure 60, a).\n5. Press the 'Send for Approval' button to send it to NFP for his/her review and approval of the inventory (figure 60, b).\n*** Note: A notification email will be sent to the PM, once the 'Send for Approval' has been pressed. And the status changed to 'Awaiting_approval' (figure 61).\nFigure 60. Work on Inventories screen - Send for Approval - Status = check\nFigure 61. Work on Inventories screen - Status = awaiting_approval", + "page_start": 37, + "page_end": 37, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "10.4 Send for approval/rejection of an Inventory (PM)\nThis section describes on how the PM approves or rejects an inventory after being checked by the PM.", + "page_start": 37, + "page_end": 37, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "Figure 55. Work on Inventories sub menu\n5. Click the appropriate Inventory year on 'Work on Inventories' under 'Submission' (figure 56, a).\n6. Press the 'Start Inventory' button to start the inventory (figure 56, b). Once pressed, the status changes to 'started' (figure 57).\n*** Once the 'Start Inventory' button has been pressed by the NFP or PM, a notification email will be sent to all SE's with the information that a new inventory was created. SE's and PM's can start entering their data into the NAIIS software. More details on how to do the data entry please see section 4.1 above.\nFigure 57. Work on Inventories screen - Status = Started\nNAIIS-User-Manual.Docx\nPage 36\n10/02/2013", + "page_start": 35, + "page_end": 35, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "10.3 Send for checking (PM)\nOnce the SE's/or PM's have prepared the national GHG inventory, by entering data into the sectoral grids and the PM of the Party has checked the complete GHG inventory for consistency and correctness, the following steps allows the PM to send the inventory for checking:\n1. Log in as PM.\n2. Click on 'View Inventories Progress' under sub menu 'Submission Management'.\n3. The 'View Inventories Progress' screen appears.\n4. Select the appropriate inventory by clicking the Inventory name under column 'Name' (figure 58, a).\n5. Press the 'Send for Checking by NFP' button to send it to the NFP for his review and approval (figure 58, b). *** Note: A notification email will be sent to the NFP email address, and the status changed to 'check' (figure 59).\nFigure 58. Work on Inventories screen - Status = Started\nNAIIS-User-Manual.Docx\nPage 37\n10/02/2013", + "page_start": 36, + "page_end": 36, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "10.1 Workflow\nCreating and preparing an inventory, generating tables for checking by the NFP and approving and/or rejecting submission, follows a number of steps known collectively as a workflow. This chapter describes the workflow relating to the submission of the GHG inventory/(ies), which users should follow to create, prepare, and send GHG inventories for internal checking, and approval/rejection of the submission by the NFP, within the NAIIS web application (figure 52).\nFigure 52: Non-Annex I Inventory Software workflow", + "page_start": 34, + "page_end": 34, + "source_file": "maiis-user-manual.pdf" + } + ] + }, + { + "references": { + "source_file": "maiis-user-manual.pdf", + "query": "What is the global warming potential of Perfluorohexane ?", + "target_page": 48, + "target_passage": "7,400", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Annex 3: Global Warming Potentials (GWPs)\nformula = C2F6. Perfluroethane, 1995 IPCC GWP = 9,200. Perfluoropropape, Chemical formula = C3F8. Perfluoropropape, 1995 IPCC GWP = 7,000. Perfluorobutane, Chemical formula = C2F10. Perfluorobutane, 1995 IPCC GWP = 7,000. Perfluorocyclobutane, Chemical formula = c-c4F8. Perfluorocyclobutane, 1995 IPCC GWP = 8,700. Perfluoropentane, Chemical formula = C5F12. Perfluoropentane, 1995 IPCC GWP = 7,500. Perfluorohexane, Chemical formula = C6F14. Perfluorohexane, 1995 IPCC GWP = 7,400. Sulphur hexafluoride, Chemical formula = SF6. Sulphur hexafluoride, 1995 IPCC GWP = 23,900\nSource: Climate Change 1995, The Science of Climate Change: Summary for Policymakers and Technical Summary of the Working Group I Report, page 22.\nNAIIS-User-Manual.Docx\nPage 48\n07/08/2013", + "page_start": 47, + "page_end": 47, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "Annex 3: Global Warming Potentials (GWPs)\nCarbon dioxide, Chemical formula = CO2. Carbon dioxide, 1995 IPCC GWP = 1. Methane, Chemical formula = CH4. Methane, 1995 IPCC GWP = 21. Nitrous oxide, Chemical formula = N2O. Nitrous oxide, 1995 IPCC GWP = 310. HFC-23, Chemical formula = CHF3. HFC-23, 1995 IPCC GWP = 11,700. HFC-32, Chemical formula = CH2F2. HFC-32, 1995 IPCC GWP = 650. HFC-41, Chemical formula = CH3F. HFC-41, 1995 IPCC GWP = 150. HFC-43-10mee, Chemical formula = C5H2F10. HFC-43-10mee, 1995 IPCC GWP = 1,300. HFC-125, Chemical formula = C2HF5. HFC-125, 1995 IPCC GWP = 2,800. HFC-134, Chemical formula = C2H2F4. HFC-134, 1995 IPCC GWP = 1,000. HFC-134a, Chemical formula = CH2FCF3. HFC-134a, 1995 IPCC GWP = 1,300. HFC-152a, Chemical formula = C2H4F2. HFC-152a, 1995 IPCC GWP = 140. HFC-143, Chemical formula = C2H3F3. HFC-143, 1995 IPCC GWP = 300. HFC-143a, Chemical formula = CF3CH3. HFC-143a, 1995 IPCC GWP = 3,800. HFC-227ea, Chemical formula = C3HF7. HFC-227ea, 1995 IPCC GWP = 2,900. HFC-236fa, Chemical formula = C3H2F6. HFC-236fa, 1995 IPCC GWP = 6,300. HFC-254ca, Chemical formula = C3H3F5. HFC-254ca, 1995 IPCC GWP = 560. Perfluoromethane, Chemical formula = CF4. Perfluoromethane, 1995 IPCC GWP = 6,500. Perfluroethane, Chemical", + "page_start": 47, + "page_end": 47, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "Keywords:\n1.5 ° C, Paris Agreement, 2 ° C, global climate impacts, water resources, terrestrial ecosystems", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed11.pdf" + }, + { + "text": "Author for correspondence:\nRichard A. Betts\ne-mail: richard.betts@meto/ffice.gov.uk\nChanges in climate extremes, fresh water availability and vulnerability to food insecurity projected at 1.5 ° C and 2 ° C global warming with a higher-resolution global climate model\nRichard A. Betts 1,2 , Lorenzo Al/fieri 3 , Catherine Bradshaw 2 ,JohnCaesar 2 ,LucFeyen 3 ,Pierre Friedlingstein 4 , Laila Gohar 2 , Aristeidis Koutroulis 5 , Kirsty Lewis 2 , Catherine Morfopoulos 1 , Lamprini Papadimitriou 5,6 ,KatyJ.Richardson 2 , Ioannis Tsanis 5 and Klaus Wyser 7\n1 College of Life and Environmental Sciences, University of Exeter, Exeter EX4 4PS, UK\n2 Met O/ffice Hadley Centre, FitzRoy Road, Exeter EX1 3PB, UK 3 European Commission - Joint Research Centre, 21027 Ispra, Italy\n4 College of Engineering, Mathematics and Physical Sciences, University of Exeter, Exeter EX4 4QE, UK\n5 School of Environmental Engineering, Technical University of Crete-TUC, Chania 73100, Greece\n6 Cran/field Water Science Institute, Cran/field University, Cran/field MK43 0AL, UK\n7 Rossby Centre, SMHI, 601 76 Norrköping, Sweden\nRAB, 0000-0002-4929-0307\nWe projected changes in weather extremes, hydrological impacts and vulnerability to food insecurity at global warming of 1.5°C and 2°C relative to pre-industrial, using a new global atmospheric general circulation model HadGEM3A-GA3.0 driven by patterns of sea-surface temperatures and sea ice from selected members of the 5th Coupled\n2018 The Authors. Published by the Royal Society under the terms of the Creative Commons Attribution License http://creativecommons.org/licenses/ by/4.0/, which permits unrestricted use, provided the original author and source are credited.", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed11.pdf" + }, + { + "text": "(b) Impacts at 1.5 ° Cglobalwarmingcomparedto2 ° C\nFigure 13. Global mean percentage changes relative to 1981-2010 in ( a ) precipitation over land, ( b )meanrun-o/ff/flows,( c )low run-o/ff lows (10th percentile), at 2 ° Cand1.5 ° C global warming.\nthis comparison of the number of 'unprecedented' HCVI values at 1.5°C and 2°C should be treated with caution. Nevertheless, the finding that some countries see HCVI values higher at either or both 1.5°C and 2°C compared to the baseline may indicate that climate change has the potential to lead to unprecedented levels of vulnerability to food insecurity in some countries. More robustly, it can be concluded that by this metric, overall worldwide vulnerability to food insecurity generally increases with global warming, and for approximately three-quarters of countries assessed, this increase is larger at 2°C than 1.5°C.\nIn the ensemble mean, changes in mean, low and high flows are generally larger at 2°C global warming compared to 1.5°C (figure 20). This is often the case for both increases and decreases in flows-increasing the level of global warming magnifies the pattern of river flow changes, although not in all cases.\nThe range of projected mean run-off changes is larger for 2°C than 1.5°C in many basins, but this was not always the case, with many basins showing similar or smaller ranges at 2°C compared with 1.5°. Moreover, the ranges overlap substantially, so in terms of the set of\n19\nrsta.r o y alsociet ypublishing . or g P h i l .T r a n s .R . S o c .A 376 : 2 0160452 ........................................................\nensemble mean\nIPSL-CM5A-LR\nGFDL-ESM2M\nHadGEM2-ES\nIPSL-CM5A-MR\nMIROC-ESM-CHEM\nACCESS1-0", + "page_start": 18, + "page_end": 19, + "source_file": "pubmed11.pdf" + }, + { + "text": "Research\nCite this article: Betts RA et al . 2018 Changes in climate extremes, fresh water availability and vulnerability to food insecurity projected at 1.5 ° Cand2 ° C global warming with a higher-resolution global climate model. Phil. Trans. R. Soc. A 376 : 20160452.\nhttp://dx.doi.org/10.1098/rsta.2016.0452\nAccepted:13February2018\nOne contribution of 20 to a theme issue 'The Paris Agreement: understanding the physical and social challenges for a warming world of 1.5 ° C above pre-industrial levels'.", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed11.pdf" + }, + { + "text": "4. Discussion\nrsta.r o y alsociet ypublishing . or g P h i l .T r a n s .R . S o c .A 376 : 2 0160452 ........................................................\nA detailed investigation of these factors is beyond the scope of this paper; nevertheless, this result illustrates the important point that the nature and patterns of the climate forcing at a particular level of global warming can play an important role in determining the patterns of regional impacts.", + "page_start": 23, + "page_end": 24, + "source_file": "pubmed11.pdf" + }, + { + "text": "(b) Impacts at 1.5 ° Cglobalwarmingcomparedto2 ° C\nTable 6. Global mean changes at 1.5 ° C global warming compared to present day for individual ensemble members, for the ClimPACT indices, the /flood and drought proxies used as input to the HCVI calculations, and percentage change in mean precipitation (Pmean), mean run-o/ff (Rmean) and low run-o/ff (Rlow).\nTXx ( ° C) .........................................................................................................................................................................................................., IPSL- CM5A-LR = 1.2. TXx ( ° C)", + "page_start": 16, + "page_end": 16, + "source_file": "pubmed11.pdf" + }, + { + "text": "References\n9. Dong, W. H., Liu, Z., Liao, H., Tang, Q. H. & Li, X. E. New climate and socio-economic scenarios for assessing global human health challenges due to heat risk. Clim. Change 130 (4), 505-518 (2015).\n10. Brown, S. C., Wigley, T. M. L., Otto-Bliesner, B. L., Rahbek, C. & Fordham, D. A. Persistent Quaternary climate refugia are hospices for biodiversity in the Anthropocene. Nat. Clim. Change 10 , 244-248 (2020).\n11. Fischer, H., Amelung, D. & Said, N. /T_he accuracy of German citizens' con/fidence in their climate change knowledge. Nat. Clim. Change 9 , 776-780 (2020).\n12. Hasegawa, T. et al. Risk of increased food insecurity under stringent global climate change mitigation policy. Nat. Clim. Change 8 , 699-703 (2018).\n13. Lobell, D. B., Schlenker, W. & Costa-Roberts, J. Climate trends and global crop production since 1980. Science 333 , 616-620 (2011).\n14. UNFCCC. /T_he Paris Agreement. 2015, https:// unfccc. int/ proce ss- and- meeti ngs/ the- paris- agree ment/ the- paris- agree ment.", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed9.pdf" + }, + { + "text": "Materials and methods\nFirstly, the period of 1986-2005 is de/fined as the baseline, of which the simulated average value is recognized as 0.61 °C above pre-industrial (the period of 1850-1900) levels; the baseline is selected according to the accessibility and operability of data, which is used for the determination of the periods with global warming by 1.5 °C and 2.0 °C and the comparison of maize yield between di/fferent periods. Secondly, the simulated values of global mean temperature in the future years are subtracted from the simulated average value of 1986-2005; then the values should be plus with 0.61 °C, which are the global warming results above pre-industrial levels; then 20 years moving average of the above results are calculated. /T_hirdly, the climate data of global warming by 1.5 °C is de/fined according to the principles provided in the /fi/f_th IPCC Assessment Report, for which it should be within 1.5-2.0 °C above pre-industrial levels at the end of the twenty-/first century; the climate data of global warming by 2.0 °C is de/fined according to the principles provided in the /fi/f_th IPCC Assessment Report, for which it should be within 2.0-2.5 °C above pre-industrial levels at the end of the twenty-/first century and the period of global warming by 2.0 °C should not be earlier than 2050. Finally, the climate models, scenarios and periods of global warming by 1.5 °C and 2.0 °C are separately con/firmed; the data of global warming by 1.5 °C, simulated by IPSL-CM5A-LR under RCP2.6 scenario during 2020-2039 and simulated by GFDL-ESM2M under RCP4.5 scenario during 2041-2060; the data of global warming by 2.0 °C, simulated by NorESM1-M under RCP4.5 scenario during 2060-2079 and simulated by GFDL-ESM2M under RCP6.0 scenario during 2065-2084.", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed9.pdf" + } + ] + }, + { + "references": { + "source_file": "maiis-user-manual.pdf", + "query": "How can I request access to NAIIS ?", + "target_page": 5, + "target_passage": "Requests for access to, inquiries on the use of the software, and comments on the design and functionalities of the application should be sent to the dedicated e-mail address naiisapp@unfccc.int.", + "chunk_present": { + "presence": true, + "index": 5 + } + }, + "top_chunk": [ + { + "text": "NAIIS Web Application\n(Release version 1.1.3)", + "page_start": 0, + "page_end": 0, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "3.2.1 How to access the NAIIS application\nOpen any internet browser (i.e. Internet Explorer, Firefox, etc.) and type in the following URL http://unfccc.int/7627 on the browser's address bar. (figure 1 and figure 2)\nFigure 1. Using Internet Explorer browser\nFigure 2. Using Firefox browser\nNAIIS-User-Manual.Docx\nPage 6\n10/02/2013\nPress the 'Enter key' and the non-Annex I Greenhouse Gas Inventories web page appears.\nTo access the NAIIS application, click on the image NAIIS Web Application, the right hand side of the screen. (figure 3, number 1) and the log-in page will be displayed. (figure 4)", + "page_start": 5, + "page_end": 6, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "2 General information\nThe NAIIS is a web-based application designed to enable non-Annex I Parties estimate their national GHG inventories according to the UNFCCC guidelines and using the IPCC methodologies, and to report the results in their national communications and biennial update reports.", + "page_start": 3, + "page_end": 3, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "List of pending functionalities in NAIIS:\n-----------------------------------------\n1. Web services integration for help desk\n2. Display of information in 5 remaining UN languages.", + "page_start": 4, + "page_end": 4, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "Contents\nNAIIS-User-Manual.Docx\nPage 3\n10/02/2013", + "page_start": 2, + "page_end": 2, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "2.3 Contact\nRequests for access to, inquiries on the use of the software, and comments on the design and functionalities of the application should be sent to the dedicated e-mail address naiisapp@unfccc.int .\nNAIIS-User-Manual.Docx\nPage 5\n10/02/2013", + "page_start": 4, + "page_end": 4, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "Figure 3. UNFCCC non-Annex I Greenhouse Gas Inventories web page\nFigure 4. Log-in page of the NAIIS Web Application\nTo log-in , enter the username and password and click on the 'Sign in' button.\nNAIIS-User-Manual.Docx\nPage 7\n10/02/2013", + "page_start": 6, + "page_end": 6, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "NAIIS-User-Manual.Docx\nPage 1\n10/02/2013", + "page_start": 0, + "page_end": 0, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "Figure 18. Users Administration\nFigure 19. Initial screen of Users Administration\n Click the '+' sign (figure 19a) creates a new user (figure 20 new User).\n Double click on the cell of the newly created user name and enter a new user name (must be unique and contain at least 3 characters).\nOnce done, press the enter key and the new user name will be saved in the respective table of the NAIIS database.\nNote: New user name(s) will be generated by the system as default [Non-Annex I Party name] + 'newUser' (e.g. UgandanewUser, PhilippinesnewUser, ArgentinanewUser)\nNAIIS-User-Manual.Docx\nPage 14\n10/02/2013", + "page_start": 13, + "page_end": 13, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "10.5.1 Approval of an inventory\n1. Log in as NFP.\n2. Click on 'View Inventories Progress' under sub menu 'Submission Management'.\n3. The 'View Inventories Progress' screen appears.\n4. Select the appropriate inventory by clicking the Inventory name under column 'Name' (figure 64).\n5. Press the 'Approve' button (figure 64, b).\nOnce the 'Approve' button was pressed, the status of the selected inventory changes to 'approved' (figure 65, b).\n*** Note: A notification email will be sent to the PM that the inventory has been approved. Therefore, the PM may proceed to selecting the tables for preparing the official submission (See section 10.6).\nFigure 64. Work on Inventories screen - Approve an inventory - Status = awaiting_approval\nFigure 65. Work on Inventories screen - Approve an inventory - Status = approved\nNAIIS-User-Manual.Docx\nPage 40\n10/02/2013", + "page_start": 39, + "page_end": 39, + "source_file": "maiis-user-manual.pdf" + } + ] + }, + { + "references": { + "source_file": "creative_common_ai.pdf", + "query": "What is the problem regarding the use of the Book3 dataset ?", + "target_page": 2, + "target_passage": "The Books3 dataset contains text from over 170,000 books,2 which are a mix of in-copyright and out-of-copyright works. It is believed to have been originally sourced from a website that was not authorized to distribute all of the works", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "7. Conclusion\nThis paper is a snapshot of an idea that is as underexplored as it is rooted in decades of existing work. The concept of mass digitization of books, including to support text and data mining, of which AI is a subset, is not new. But AI training is newly of the zeitgeist, and its transformative use makes questions about how we digitize, preserve, and make accessible knowledge and cultural heritage salient in a distinct way.\nAs such, efforts to build a books data commons need not start from scratch; there is much to glean from studying and engaging existing and previous efforts. Those learnings might inform substantive decisions about how to build a books data commons for AI training. For instance, looking at the design decisions of HathiTrust may inform how the technical infrastructure and data management practices for AI training might be designed, as well as how to address challenges to building a comprehensive, diverse, and useful corpus. In addition, learnings might inform the process by which we get to a books data commons for example, illustrating ways to attend to the interests of those likely to be impacted by the dataset's development. 41\nWhile this paper does not prescribe a particular path forward, we do think finding a path (or paths) to extend access to books for AI training is critical. In the status quo, large swaths of knowledge contained in books are effectively locked up and inaccessible to most everyone. Google is an exception - it can reap the benefits of their 40 million books dataset for research, development, and deployment of AI models. Large, well-resourced entities could theoretically try to replicate Google's digitization efforts, although it would be incredibly expensive, impractical, and largely duplicative for each entity to individually pursue their own efforts. Even then, it isn't clear how everyone else - independent researchers, entrepreneurs, and smaller entities - will have access. The controversy around the Books3 dataset discussed at the outset should not, then, be an argument in favor of preserving the status quo. Instead, it should highlight the urgency of building a books data commons to support an AI ecosystem that provides broad benefits beyond the privileged few.", + "page_start": 20, + "page_end": 20, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "Performance and Quality\n· Breadth, Diversity, and Mitigating Bias: Books can serve a critical role in ensuring AI models are inclusive of a broad range of topics and categories that may be underrepresented in other content. For all that the Internet has generated an explosion in human creativity and information sharing, it generally represents only a few decades of information and a small portion of the world's creative population. A books dataset, by comparison, is capable of representing centuries of human knowledge. As a result such a dataset can help ensure AI systems behavior is based on centuries of historical information from modern books. It can help ensure broad geographic and linguistic diversity. What's more, the greater breadth and diversity of high-quality content help mitigate challenges around bias and misinformation. Using a more diverse pool of training data can help support the production of a model and outputs of the model that are more representative of that diversity. Books can be useful in evaluation datasets to test existing models for memorization capabilities, which can help prevent unintended reproduction of existing works. Of course, this is all contingent on actual composition of the corpus; in order to have the benefits described, the books would need to be curated and included with characteristics like time, geographic and linguistic diversity.\n· Other Modalities: Finally, books do not just contain text, they often contain images and captions of those images. As such, they can be an important training source for multi-modal LLMs, which can receive and generate data in media other than text.", + "page_start": 6, + "page_end": 6, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "1. Introduction 1\nWhile the field of artificial intelligence research and technology has a long history, broad public attention grew over the last year in light of the wide availability of new generative AI systems, including large language models (LLMs) like GPT-4, Claude, and LLaMA-2. These tools are developed using machine learning and other techniques that analyze large datasets of written text, and they are capable of generating text in response to a user's prompts.\nWhile many large language models rely on website text for training, books have also played an important role in developing and improving AI systems. Despite the widespread use of ebooks and growth of sales in that market, books remain difficult for researchers and entrepreneurs to access at scale in digital form for the purposes of training AI.\nIn 2023, multiple news publications reported on the availability and use of a dataset of books called 'Books3' to train LLMs. The Books3 dataset contains text from over 170,000 books, 2 which are a mix of in-copyright and out-of-copyright works. It is believed to have been originally sourced from a website that was not authorized to distribute all of the works contained in the dataset. In lawsuits brought against OpenAI, Microsoft, Meta, and Bloomberg related to their LLMs, the use of Books3 as training data was specifically cited. 3\nThe Books3 controversy highlights a critical question at the heart of generative AI: what role do books play in training AI models, and how might digitized books be made widely accessible for the purposes of training AI? What dataset of books could be constructed and under what circumstances?\nIn February 2024, Creative Commons, Open Future and Proteus Strategies convened a series of workshops to investigate the concept of a responsibly designed, broadly accessible dataset of digitized books to be used in training AI models. Conducted under the Chatham House Rule, we set out to ask if there is a possible future in which a 'books data commons for AI training' might exist, and what such a commons might look like. The workshops brought together practitioners on the front lines of building next-generation AI models, as well as legal and policy scholars with expertise in the copyright and licensing challenges surrounding digitized books. Our goal was also to bridge the perspective of stewards of", + "page_start": 1, + "page_end": 1, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "What dataset management practices are necessary?\nNo matter how a books data commons gets built, it will be important to consider broader aspects of data governance. For example:\n· Dataset documentation and transparency: Transparent documentation is important for any dataset used for AI training. A datasheet is a standardized form of documentation that includes information about provenance and composition of data, and includes information on management practices, recommended uses or collection process.\n· Quality assurance: Above, we note the many features that make books useful for AI training, as compared with web data, for example. That said, the institution managing a books commons dataset may still want to collect and curate the collection to meet the particular purposes of its users. For instance, it may want to take steps to mitigate biases inherent in the dataset, by ensuring books are representative of a variety of languages and geographies.\n· Understanding uses: The institution managing a books commons dataset could measure and study how the dataset is used, to inform future improvements. Such monitoring may also enable accountability measures with respect to uses of the dataset. Introducing community norms for disclosing datasets used in AI training and other forms of AI research would facilitate such monitoring.\n· Governance mechanisms: In determining matters like acceptable and ethical use, the fundamental question is 'who decides.' While this might be settled simply by whoever sets up and operates the dataset and related infrastructure, participatory mechanisms - such as advisory bodies bringing together a broad range of users and stakeholders of a collection - could also be incorporated.\nTowards a Books Data Commons for AI Training\n19", + "page_start": 19, + "page_end": 19, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "Data availability statement\nThe datasets presented in this article are not readily available because of ethical and legal restrictions. Requests to access the datasets should be directed to stine.s.dahl@nord.no.", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed13.pdf" + }, + { + "text": "Existing Project Example : The Pile v2 27\nIn 2020, the nonprofit research group EleutherAI constructed and released The Pile - a large, diverse, open dataset for AI training. EleutherAI developed it not only to support their own training of LLMs, but also to lower the barriers for others. 28\nAlong with data drawn from the web at large, The Pile included books from three datasets. The first dataset was the Books3 corpus referenced at the outset of this paper. The second and third books datasets were smaller: BookCorpus2, which is a collection of 17,868 books by otherwise unpublished authors; and a 28,752 books in the public domain and published prior to 1919, drawn from a volunteer effort to digitize public domain works called Project Gutenberg.\nAs the awareness about The Pile dataset grew, certain rightsholders began sending copyright notices to have the dataset taken down from various websites.\nDespite the takedown requests, the importance of books to EleutherAI and the broader community's AI research remained. In hoping to forge a path forward EleutherAI announced in 2024 that they would create a new version of the dataset, which they will call The Pile v2. 29 Among other things, v2 would 'have many more books than the original Pile had, for example, and more diverse representation of non-academic non-fiction domains.' At the same time, it would only seek to include public domain books and permissively licensed content. As before, this corpus focuses on English language books.\nThis is an illustrative example, and there are also other projects of this ilk. For instance, see the 27 Common Corpus project, which includes an array of public domain books from a number of countries, at https://huggingface.co/blog/Pclanglais/common-corpus; see also https://huggingface.co/datasets/ storytracer/internet_archive_books_en ('This dataset contains more than 650,000 English public domain books (~ 61 billion words) which were digitized by the Internet Archive and cataloged as part of the Open Library project.')\nSee Gao et al, supra note 8. 28", + "page_start": 12, + "page_end": 12, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "Implications of Overall Approach\nSee Testimony of Chris Callison-Burch, July 2023, https://docs.house.gov/meetings/JU/ 37 JU03/20230517/115951/HHRG-118-JU03-Wstate-Callison-BurchC-20230517.pdf ('As the amount of training data increases, AI systems' capabilities for language understanding and their other skills improve.'); Brown, Tom, et al. Language Models Are Few-Shot Learners . 22 July 2020, at https://arxiv.org/ pdf/2005.14165.pdf ('we find that performance scales very smoothly with model size').\nTowards a Books Data Commons for AI Training\n15\nengagement. And, at least in the U.S., it could generate billions of dollars in damages if the specific design choices and technical constraints are not adequate to justify a finding of fair use.\nThis sort of books dataset could be built by expanding use of in-copyright books that have already been digitized from existing libraries and other sources. Specifically, workshop participants mentioned that the Internet Archive, HathiTrust, and Google as entities that have digitized books and could repurpose their use to build a books commons, although challenges with using these datasets were noted. The Internet Archive is in the midst of litigation brought by book publishers for its program for lending digital books; while not directly relevant to the issue of AI training using their corpus of books, this sort of litigation creates a chilling effect on organizations seeking to make new uses of these digitized books. Meanwhile, Google encumbered HathiTrust's digital copies with certain contractual restrictions, which would need to be addressed to develop a books dataset for AI training, and Google itself is unlikely to share its own copies while it provides them a competitive advantage.\nPerhaps as a matter of public policy, these existing copies could be made more freely available. For instance, to ensure robust competition around AI and advance other public interests, policymakers could remove legal obstacles to the sharing of digitized book files for use in AI training. Alternatively, policymakers could go further and affirmatively compel sharing access to these digital book files for AI training.", + "page_start": 15, + "page_end": 16, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "1. Introduction 1\nWe use 'commons' here in the sense of a resource that is broadly shared and accessible, and thus obviates the need for each individual actor to acquire, digitize, and format their own corpus of books for AI training. This resource could be collectively and intentionally managed, though we do not mean to select a particular form of governance in this paper. 4\nThis paper is descriptive, rather than prescriptive, mapping possible paths to building a books data commons as defined above and key questions relevant to developers, repositories, and other stakeholders, building on our workshop discussions. We first explain why books matter for AI training and how broader access could be beneficial. We then summarize two tracks that might be considered for developing such a resource, highlighting existing projects that help foreground both the potential and challenges. Finally, we present several key design choices, and next steps that could advance further development of this approach. 5\nIn this way, we do not use 'commons' in the narrow sense of permissively licensed. What's more, this 4 resource could also be governed as more of a data 'trust,' and, indeed, we discuss extensively the work of HathiTrust as a relevant project in this domain. However, our use of the word 'commons' is not meant to preclude this or other arrangements.\nThere are, of course, a range of other types of texts that are not on the web and/or not digital at all 5 e.g., periodicals, journals, government documents. These are out of scope for this paper, but also worthy of further analysis.\nTowards a Books Data Commons for AI Training\n2", + "page_start": 2, + "page_end": 2, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "Implications of Overall Approach\nBy relying on existing limitations and exceptions in copyright law, the number of books one could include in the corpus of a books data commons is far greater and more diverse. Of course, a bigger dataset doesn't necessarily mean a higher quality dataset for all uses of AI models; as HathiTrust shows, even a multimillion book corpus can skew in various directions. Still, dataset size generally remains significant to an LLM's performance - the more text one can train on, or rather the more tokens for training the model, the better, at least along a number of performance metrics. 37\nWhile holding the potential for a broader and more diverse dataset, a key limitation in pursuing this approach is that it is only feasible where relevant copyright limitations and exceptions exist. Even then, legal uncertainty means that going down this path is likely to generate, at a minimum, expensive and time-consuming litigation and regulatory\nThis is explained explicitly in the appeals court's decision: Authors Guild v. HathiTrust, 755 F.3d 87 (2d 35 Cir. 2014).\nHathiTrust has also made available some data derived from books, such as the Extracted Features 36 set: 'HTRC releases research datasets to facilitate text analysis using the HathiTrust Digital Library. While copyright-protected texts are not available for download from HathiTrust, fruitful research can still be performed on the basis of non-consumptive analysis of transformative datasets, such as in HTRC's flagship Extracted Features Dataset, which includes features extracted from full-text volumes. These features include volume-level metadata, page-level metadata, part-of-speech-tagged tokens, and token counts:' https://analytics.hathitrust.org/datasets#top.", + "page_start": 15, + "page_end": 15, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "Lowering Barriers to Entry & Facilitating Competition\nBroad access to books for AI training is critical to ensure powerful AI models are not concentrated in the hands of only a few companies. Access to training data, in general, has been cited as a potential competitive concern in the AI field because of the performance 11 benefits to be gained by training on larger and larger datasets. But this competitive wedge is even more acute when we look specifically at access to book datasets.\nThe largest technology companies building commercial AI models have the resources and capacity to mass digitize books for AI training. Google has scanned 40 million books, many of which came from digitization partnerships they formed with libraries. They may already use some or all of these books to train their AI systems. It's unclear to what extent other 12 companies already have acquired books for AI training (for instance, whether Amazon's existing licenses with publishers or self-published authors may permit such uses);\nSee e.g. Trendacosta, Katherine and Doctorow, Cory. 'AI Art Generators and the Online Image Market.' 11 Electronic Frontier Foundation , 3 Apr. 2023, www.eff.org/deeplinks/2023/04/ai-art-generators-andonline-image-market; Narechania, Tejas N., and Sitaraman, Ganesh. 'An Antimonopoly Approach to Governing Artificial Intelligence.' SSRN Electronic Journal , 2023, cdn.vanderbilt.edu/vu-URL/wp-content/ uploads/sites/412/2023/10/09151452/Policy-Brief-2023.10.08-.pdf, https://doi.org/10.2139/ ssrn.4597080. Accessed 25 Feb. 2024.\nSee white paper for Google's Gemini models https://arxiv.org/pdf/2312.11805.pdf - 'Gemini models 12 are trained on a dataset that is both multimodal and multilingual. Our pretraining dataset uses data from web documents, books, and code, and includes image, audio, and video data.'\nTowards a Books Data Commons for AI Training\n6\nregardless, comparable efforts to Google's would cost many hundreds of millions of dollars. 13", + "page_start": 6, + "page_end": 7, + "source_file": "creative_common_ai.pdf" + } + ] + }, + { + "references": { + "source_file": "creative_common_ai.pdf", + "query": "In the United States, before which date is book out of copyright for sure ?", + "target_page": 9, + "target_passage": "In the United States, all books published or released before 1929 are in the public domain. While use of these books provides maximal certainty for the AI developer to train on", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "4. Copyright, Licensing, & Access to Books for Training\nEven if books can be acquired, digitized, and made technically useful for AI training, the development of a books data commons would necessarily need to navigate and comply with copyright law.\nOut-of-Copyright Books: A minority of books are old enough to be in the public domain and out of copyright, and an AI developer could use them in training without securing any copyright permission. In the United States, all books published or released before 1929 are in the public domain. While use of these books provides maximal certainty for the AI developer to train on, it is worth noting that the status of whether a book is in the public domain can be difficult to determine. For instance, books released between 1929 and 1963 in the U.S. are 14 out of copyright if they were not subject to a copyright renewal; however, data on copyright renewals is not easily accessible.\nWhat's more, copyright definitions and term lengths vary among countries. Even if a work is in the public domain in the US, it may not be in other countries. Countries generally use the 15 life of the last living author + 'x' years to determine the term of copyright protection. For most countries, 'x' is either 50 years (the minimum required by the Berne Convention) or 70 years (this is the case for all member states of the European Union and for all works published in the U.S. after 1978). This approach makes it difficult to determine copyright terms with certainty because it requires information about the date of death of each author, which is often not readily available.\nIn-Copyright Books: The vast majority of books are in copyright, and, insofar as the training process requires making a copy of the book, the use in AI training may implicate copyright law. Our workshop covered three possible paths for incorporating such works.", + "page_start": 8, + "page_end": 8, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "Permissively licensed works\nSee e.g. Heald, Paul J. 'How Copyright Makes Books and Music Disappear (and How Secondary 16 Liability Rules Help Resurrect Old Songs).' Illinois Program in Law, Behavior and Social Science Paper No. LBSS14-07 Illinois Public Law Research Paper No. 13-54 https://doi.org/10.2139/ssrn.2290181. Accessed 4 Jan. 2020, at https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2290181; Rosen, Rebecca J. 'Why Are so Few Books from the 20th Century Available as Ebooks?' The Atlantic , 18 Mar. 2014, www.theatlantic.com/business/archive/2014/03/why-are-so-few-books-from-the-20th-centuryavailable-as-ebooks/284486/. See also 'Google Book Search Settlement and Access to Out of Print Books.' Google Public Policy Blog , publicpolicy.googleblog.com/2009/06/google-book-searchsettlement-and.html. Accessed 20 Mar. 2024 (discussing this issue in the context of the failed classaction settlement between Google, the Authors Guild, and the Association of American Publishers). Google's final brief in the settlement proceedings notes the 'prohibitive transaction costs of identifying and locating individual Rightsholders of these largely older, out-of-print books' - see this brief at https:// web.archive.org/web/20130112060651/http://thepublicindex.org/docs/amended_settlement/ google_final_approval_support.pdf. The Authors Guild and Association of American Publishers also justified the settlement's terms in light of the fact that 'the transaction costs involved in finding copyright owners and clearing the rights are too high'; while they argued that most works are not truly 'orphans,' they note that total transaction costs as a whole (including, for example, determining whether the author or publisher holds the rights and then negotiating rates) are so high as to block uses of outof-print works anyway - see this brief at https://web.archive.org/web/20130112060213/http://", + "page_start": 9, + "page_end": 9, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "Reliance on Copyright Limitations and Exceptions\nSee Hansen, Dave. 'Fair Use Week 2023: How to Evade Fair Use in Two Easy Steps.' Authors Alliance , 23 23 Feb. 2023, www.authorsalliance.org/2023/02/23/fair-use-week-2023-how-to-evade-fair-use-in-twoeasy-steps/. Accessed 20 Mar. 2024.\nSee Band, Jonathan. 'Protecting User Rights against Contract Override.' Joint PIJIP/TLS Research 24 Paper Series , 1 May 2023, digitalcommons.wcl.american.edu/research/97/. Accessed 20 Mar. 2024.\nIn the U.S. the Copyright Office has recognized the importance of allowing particular exceptions for 25 researchers engaged in text and data mining. See their rulemaking in 2021 https:// www.federalregister.gov/documents/2021/10/28/2021-23311/exemption-to-prohibition-oncircumvention-of-copyright-protection-systems-for-access-control. These rules are reviewed triennially and are currently under review, with submissions suggesting both contraction and expansion; see the Authors' Alliance comments in January 2024 https://www.authorsalliance.org/2024/01/29/authorsalliance-submits-long-form-comment-to-copyright-office-in-support-of-petition-to-expand-existing-textand-data-mining-exemption/. It is possible that one could argue for these exceptions to be expanded, and then work to renew that exception every three years. The EU's text and data mining exception may also limit use of DRM to impede data mining, but only for particular covered research and heritage institutions; commercial and other users are not covered, however.\nNote that CC licenses forbid use of DRM - but that doesn't address most all books sold by publishers. 26\nTowards a Books Data Commons for AI Training\n11", + "page_start": 11, + "page_end": 11, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "Permissively licensed works\nthepublicindex.org/docs/amended_settlement/Supplemental_memorandum_oflaw.pdf.\nIn the EU, the 2019 Copyright Directive introduced specific provisions on the \"use of out-of-commerce 17 works and other subject matter by cultural heritage institutions\" (Articles 8-11 CDSMD). These provisions allow cultural heritage institutions to \"make available, for non-commercial purposes, out-ofcommerce works or other subject matter permanently in their collections\". The limitation to noncommercial purposes means that works made available under these provisions would be of limited use in building a books data commons.\nFor one assessment of the difficulties of complying with the CC licenses in this context, to the extent 18 they are applicable, see Lee, K., A. Feder Cooper, & Grimmelmann, J. (2023). Talkin' 'Bout AI Generation: Copyright and the Generative AI Supply Chain. Forthcoming, Journal of the Copyright Society 2024. https://doi.org/10.2139/ssrn.4523551.\nTowards a Books Data Commons for AI Training\n9", + "page_start": 9, + "page_end": 9, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "ALSO FOR …\nthe work that is already in the Public Domain.\nFor those who want to waive their rights from copyright protection, use CC0 (\"CC Zero\").", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "Implications of the The Overall Approach\nStepping back from The Pile v2 specifically, or any particular existing collection of books or dataset built on their basis, we want to understand the implications of relying on public domain works and expressly licensed works in building a books commons.\nThe benefits are relatively straightforward. Both categories, by definition come with express permission to use the books in AI training. The cost of acquiring the books for this use may be effectively zero or close to it, when considering public domain and 'openly' licensed books that allow redistribution and that have already been digitized.\nBut this approach comes with some clear limitations. First, as noted above, for many books in the public domain, their status as such is not always clear. And with respect to permissively licensed books, it is not always clear whether and how to comply with the license obligations in this context.\nSetting aside those challenges, the simple fact is that relying on public domain and existing permissively licensed books would limit the quantity and diversity of data available for training, impacting performance along different dimensions. Only a small fraction of books ever published fall into this category, and the corpus of books in this category is likely to be skewed heavily towards older public domain books. This skew would, in turn, impact the content available for AI training. For instance, relying on books from before 1929 would not 30 only incorporate outdated language patterns, but also a range of biases and misconceptions about race and gender, among other things. Efforts could be made to get people to permissively license more material - a book drive for permissive licensing, so to speak; this approach would still not encompass most books, at least when it comes to past works. 31", + "page_start": 13, + "page_end": 13, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "Reliance on Copyright Limitations and Exceptions\nEven if a book is in copyright, it's possible that copying books for AI training may be covered by existing limitations and exceptions to copyright law in particular jurisdictions. For example:\n· In the United States, many argue using existing works to train generative AI is 'fair use,' consistent with existing law and legal precedents. This is the subject of a 19 number of currently active court cases, and different actors and tools may yield different results, as fair use is applied case-by-case using a flexible balancing test.\n· In the European Union, there are explicit exceptions in the law for 'text and data mining' uses of in-copyright works, both for non-commercial research and for commercial purposes. However, for commercial uses and for users outside of research and heritage institutions, they must respect the rights of rightsholders who choose to 'reserve their rights' (i.e., opt-out of allowing text and data mining) via machine readable mechanisms. The exception also requires that users have 'lawful 20 access' to the works.\n· Finally, Japan provides a specific text and data mining exception, without any comparable opt-out requirement for commercial uses as is embedded in EU law. 21\nWhile exceptions that allow AI training exist in several other countries, such as Singapore and Israel, most countries do not provide exceptions that appear to permit AI training. Even where potentially available, as in the United States, legal uncertainty and risk create a hurdle for anyone building a books commons. 22\nSee e.g. Comments from Sprigman, Samuelson, Sag to Copyright Office, October 2023, at https:// 19 www.regulations.gov/comment/COLC-2023-0006-10299 as well as many other submissions to the US copyright office; see also Advocacy, Katherine Klosek, Director of Information Policy and Federal Relations, Association of Research Libraries (ARL), and Marjory S. Blumenthal, Senior Policy Fellow, American Library Association (ALA) Office of Public Policy and. 'Training Generative AI Models on Copyrighted Works Is Fair Use.' Association of Research Libraries , 23 Jan. 2024, www.arl.org/blog/ training-generative-ai-models-on-copyrighted-works-is-fair-use/.", + "page_start": 10, + "page_end": 10, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "Reliance on Copyright Limitations and Exceptions\nThe first important limitation is that almost every digital book published today comes with a set of contractual terms that restrict what users can do with it. In many cases, those terms will explicitly restrict text data mining or AI uses of the content, meaning that even where copyright law allows for reuse (for example, under fair use), publishers by contract can impose restrictions anyway. In the United States, those contract terms are generally thought to override the applicability of fair use or other limitations and exceptions. Other 23 jurisdictions, such as those in the EU, provide that certain limitations and exceptions cannot be contractually overridden, though experience to date varies with how those anti-contractual override protections work in practice. 24\nThe second limitation is the widespread adoption of 'anti-circumvention' rules in copyright laws and the interplay of these with a choice to rely on copyright limitations and exceptions. Digital books sold by major publishers are generally encumbered with 'digital rights management' (DRM) that limits how someone can use the digital file. For instance, DRM can limit the ability to make a copy of the book, or even screenshot or excerpt from it, among other things. Anti-circumvention laws restrict someone's ability to evade these technical restrictions, even if it is for an ultimately lawful use.\nWhat this means for our purposes is that even if one acquires a digital book from, for example, Amazon, and it is lawful under copyright law to use that book in AI training, it can still generally be unlawful to circumvent the DRM to do so, outside narrow exceptions. 25 Thus, the ability to use in-copyright books encumbered by DRM - that is, most all books sold by major publishers - is generally limited. 26\nPractically, using in-copyright books to build a books commons for AI training - while relying on copyright's limitations and exceptions - requires turning a physical book into digital form, or otherwise engaging in the laborious process of manually re-creating a book's text (i.e., retyping the full text of the book) without circumventing the technical restrictions themselves.", + "page_start": 11, + "page_end": 11, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "Would authors, publishers, and other relevant rightsholders and creators have any ability to exclude their works?\nIn fact, as noted above, to the extent an AI model developer intends for their model to abide by the 38 EU's legal regime, they will have to abide by such opt-outs, at least if they are engaged in text and data mining for commercial uses and/or are users outside of the covered set of research and heritage institutions. A books data commons may incorporate opt-outs in particular to serve such EU-focused AI developers.\nTowards a Books Data Commons for AI Training\n17\ndifferent rightsholders and authors. Managing opt-outs for so many different interests within one book may get overly complicated very fast.\nIn any event, creating an opt-out system will need some ways of authenticating whether someone has the relevant authority to make choices about inclusion of a work.", + "page_start": 17, + "page_end": 18, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "Direct licensing\nOne could directly license books from rightsholders. There may be some publishers who are willing to license their works for this purpose, but it is hard to determine the scale of such access, and, in any event, there are significant limits on this approach. Along with the challenge (and expense) of reaching agreements with relevant rightsholders, there is also the practical difficulty of simply identifying and finding the rightsholder that one must negotiate\nFor a sense of the complexity, see e.g. Melissa Levine, Richard C. Adler. Finding the Public Domain: 14 Copyright Review Management System Toolkit . 2016, quod.lib.umich.edu/c/crmstoolkit/ 14616082.0001.001. Accessed 20 Mar. 2024.; Kopel, Matthew. 'LibGuides: Copyright at Cornell Libraries: Copyright Term and the Public Domain.' guides.library.cornell.edu/copyright/publicdomain; Mannapperuma, Menesha, et al. Is It in the Public Domain? A HANDBOOK for EVALUATING the COPYRIGHT STATUS of a WORK CREATED in the UNITED STATES . 1923.\nSee e.g. Moody, Glyn. 'Project Gutenberg Blocks Access in Germany to All Its Public Domain Books 15 because of Local Copyright Claim on 18 of Them.' Techdirt , 7 Mar. 2018, www.techdirt.com/ 2018/03/07/project-gutenberg-blocks-access-germany-to-all-public-domain-books-because-localcopyright-claim-18-them/. Accessed 20 Mar. 2024.\nTowards a Books Data Commons for AI Training\n8\nwith. The vast majority of in-copyright books are out-of-print or out-of-commerce, and most are not actively managed by their rightsholders. There is no official registry of copyrighted works and their owners, and existing datasets can be incomplete or erroneous. 16\nAs a result, there may be no way to license the vast majority of in-copyright books, especially those that have or have had limited commercial value. Put differently, the barrier to using 17 most books is not simply to pay publishers; even if one had significant financial resources, licensing would not enable access to most works.", + "page_start": 8, + "page_end": 9, + "source_file": "creative_common_ai.pdf" + } + ] + }, + { + "references": { + "source_file": "creative_common_ai.pdf", + "query": "What of the main imporvement of the Pile v2 dataset in comparison to its first version ?", + "target_page": 13, + "target_passage": "Among other things, v2 would “have many more books than the original Pile had, for example, and more diverse representation of non-academic non-fiction domains.” At the same time, it would only seek to include public domain books and permissively licensed content", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Existing Project Example : The Pile v2 27\nIn 2020, the nonprofit research group EleutherAI constructed and released The Pile - a large, diverse, open dataset for AI training. EleutherAI developed it not only to support their own training of LLMs, but also to lower the barriers for others. 28\nAlong with data drawn from the web at large, The Pile included books from three datasets. The first dataset was the Books3 corpus referenced at the outset of this paper. The second and third books datasets were smaller: BookCorpus2, which is a collection of 17,868 books by otherwise unpublished authors; and a 28,752 books in the public domain and published prior to 1919, drawn from a volunteer effort to digitize public domain works called Project Gutenberg.\nAs the awareness about The Pile dataset grew, certain rightsholders began sending copyright notices to have the dataset taken down from various websites.\nDespite the takedown requests, the importance of books to EleutherAI and the broader community's AI research remained. In hoping to forge a path forward EleutherAI announced in 2024 that they would create a new version of the dataset, which they will call The Pile v2. 29 Among other things, v2 would 'have many more books than the original Pile had, for example, and more diverse representation of non-academic non-fiction domains.' At the same time, it would only seek to include public domain books and permissively licensed content. As before, this corpus focuses on English language books.\nThis is an illustrative example, and there are also other projects of this ilk. For instance, see the 27 Common Corpus project, which includes an array of public domain books from a number of countries, at https://huggingface.co/blog/Pclanglais/common-corpus; see also https://huggingface.co/datasets/ storytracer/internet_archive_books_en ('This dataset contains more than 650,000 English public domain books (~ 61 billion words) which were digitized by the Internet Archive and cataloged as part of the Open Library project.')\nSee Gao et al, supra note 8. 28", + "page_start": 12, + "page_end": 12, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "3.1 New Datasets\nWeidentified 7 datasets relevant to French in the existing MTEB, which we assume are of good quality. We complemented these with 8 external relevant datasets proposed in the literature, such as BSARD (Louis and Spanakis, 2022) and Alloprof (LefebvreBrossard et al., 2023), which are proven to be good quality. We created 3 new ones presented in Table 1 and assessed their quality with various procedures and metrics. In addition to all performed checks, we run multiple models on these datasets and provide results to show that they are neither trivial nor impossible to solve (see Tables 10, 11, 12 and 13).\nTherefore, as of today, our French MTEB runs on 18 datasets. Some datasets are framed differently according to the task category they are used with. For example, MasakhaNEWS dataset (Adelani et al., 2023) is used for both Classification ( MasakhaNEWSClassification ) and Clustering ( MasakhaNEWSClusteringS2S and\n2 Models on the HuggingFace hub: sentence-camebert , sentence_croissant_alpha_v0.3 , Solon-embeddings-large-0.1 .\n2\nMasakhaNEWSClusteringP2P ). Table 3 shows details of each task data used for running the benchmark.\nThis section describes the 3 new datasets we introduce, quality checks performed and an analysis of the semantic similarities between datasets.", + "page_start": 1, + "page_end": 1, + "source_file": "arxiv4.pdf" + }, + { + "text": "E.2 Finetuning\nIn Table 15, we evaluate V-JEPA using finetuning (separately) on K400 and SSv2. We compare V-JEPA with VideoMAEv2 (Wang et al., 2023a), VideoMAE (Tong et al., 2022) and MVD (Wang et al., 2023b) using a ViT-L/16 or a ViT-H/16 architecture. V-JEPA obtains competitive performance using a finetuning protocol. With a ViTiH/16 architecture, V-JEPA outperforms by 1 . 2% VideoMAE and +0 . 3% VideoMAEv2 on the SSv2 dataset, while obtaining comparable performance on K400. V-JEPA also obtains performance similar to MVD on the SSv2 dataset. The MVD model achieves the best performance across models on the K400 dataset, and is trained using the image dataset ImageNet1K, in contrast to the other methods in the table, which only use video data. Additionally MVD requires the processing of significantly more samples during pretraining due to the cost of training the teacher encoder networks in a pre-pre-training step.", + "page_start": 20, + "page_end": 20, + "source_file": "arxiv3.pdf" + }, + { + "text": "4.4 Prediction Task: Predicting y from x\nTable 5 Comparison with Pixel Prediction Methods. We compare V-JEPA with OmniMAE (Girdhar et al., 2023), VideoMAE (Tong et al., 2022), and Hiera (Ryali et al., 2023), which leverage a pixel-reconstruction loss. All models are trained using a ViT-L architecture or a comparable Hiera-L. We evaluate the approaches on downstream image tasks (IN1K, Places205, iNat201) and video tasks (K400, SSv2, AVA) in both frozen evaluation (with a frozen backbone), and end-to-end fine-tuning. All models are evaluated at resolution 224. On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. In frozen evaluation, V-JEPA outperforms the baselines on all downstream tasks, except ImageNet, where the model achieves 74 . 8% compared to 75 . 1% of an OmniMAE model trained directly on ImageNet. V-JEPA also achieves the best fine-tuning performance amongs all ViT-L models and matches the Hiera-L on SSv2. The V-JEPA results are achieved while processing significantly fewer examples during pretraining.\nTable 6 Comparison with State-of-the-Art Models. We compare V-JEPA with state-of-the-art baselines in frozen evaluation with an attentive probe on downstream image tasks (IN1K, Place205, iNat21) and video tasks (K400, SSv2, AVA). All models are evaluated at resolution 224, except I-JEPA 512 and V-JEPA 384 which are evaluated respectively at resolution 512 and 384 . On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. Compared to other video baselines, V-JEPA exhibits a consistent improvement across all downstream tasks. Compared to image-models that excel under the frozen evaluation, V-JEPA shows a significant performance improvement on tasks requiring motion understanding (+21 points on SSv2), and reduces the gap between video and image models on tasks requiring static appearance-based features.\n= Hiera-L. Hiera, #Samples Seen = 770M. Hiera, Iter. = 1500K.", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv3.pdf" + }, + { + "text": "4.4 Prediction Task: Predicting y from x\nTable 5 Comparison with Pixel Prediction Methods. We compare V-JEPA with OmniMAE (Girdhar et al., 2023), VideoMAE (Tong et al., 2022), and Hiera (Ryali et al., 2023), which leverage a pixel-reconstruction loss. All models are trained using a ViT-L architecture or a comparable Hiera-L. We evaluate the approaches on downstream image tasks (IN1K, Places205, iNat201) and video tasks (K400, SSv2, AVA) in both frozen evaluation (with a frozen backbone), and end-to-end fine-tuning. All models are evaluated at resolution 224. On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. In frozen evaluation, V-JEPA outperforms the baselines on all downstream tasks, except ImageNet, where the model achieves 74 . 8% compared to 75 . 1% of an OmniMAE model trained directly on ImageNet. V-JEPA also achieves the best fine-tuning performance amongs all ViT-L models and matches the Hiera-L on SSv2. The V-JEPA results are achieved while processing significantly fewer examples during pretraining.\nTable 6 Comparison with State-of-the-Art Models. We compare V-JEPA with state-of-the-art baselines in frozen evaluation with an attentive probe on downstream image tasks (IN1K, Place205, iNat21) and video tasks (K400, SSv2, AVA). All models are evaluated at resolution 224, except I-JEPA 512 and V-JEPA 384 which are evaluated respectively at resolution 512 and 384 . On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. Compared to other video baselines, V-JEPA exhibits a consistent improvement across all downstream tasks. Compared to image-models that excel under the frozen evaluation, V-JEPA shows a significant performance improvement on tasks requiring motion understanding (+21 points on SSv2), and reduces the gap between video and image models on tasks requiring static appearance-based features.\n87.3. Hiera, Fine-Tuning.SSv2-ft (16 × 2 × 3) =", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv3.pdf" + }, + { + "text": "4.4 Prediction Task: Predicting y from x\nTable 5 Comparison with Pixel Prediction Methods. We compare V-JEPA with OmniMAE (Girdhar et al., 2023), VideoMAE (Tong et al., 2022), and Hiera (Ryali et al., 2023), which leverage a pixel-reconstruction loss. All models are trained using a ViT-L architecture or a comparable Hiera-L. We evaluate the approaches on downstream image tasks (IN1K, Places205, iNat201) and video tasks (K400, SSv2, AVA) in both frozen evaluation (with a frozen backbone), and end-to-end fine-tuning. All models are evaluated at resolution 224. On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. In frozen evaluation, V-JEPA outperforms the baselines on all downstream tasks, except ImageNet, where the model achieves 74 . 8% compared to 75 . 1% of an OmniMAE model trained directly on ImageNet. V-JEPA also achieves the best fine-tuning performance amongs all ViT-L models and matches the Hiera-L on SSv2. The V-JEPA results are achieved while processing significantly fewer examples during pretraining.\nTable 6 Comparison with State-of-the-Art Models. We compare V-JEPA with state-of-the-art baselines in frozen evaluation with an attentive probe on downstream image tasks (IN1K, Place205, iNat21) and video tasks (K400, SSv2, AVA). All models are evaluated at resolution 224, except I-JEPA 512 and V-JEPA 384 which are evaluated respectively at resolution 512 and 384 . On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. Compared to other video baselines, V-JEPA exhibits a consistent improvement across all downstream tasks. Compared to image-models that excel under the frozen evaluation, V-JEPA shows a significant performance improvement on tasks requiring motion understanding (+21 points on SSv2), and reduces the gap between video and image models on tasks requiring static appearance-based features.\nFine-Tuning.SSv2-ft (16 × 2 × 3) = 74.3. Hiera, Arch.", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv3.pdf" + }, + { + "text": "4.4 Prediction Task: Predicting y from x\nTable 5 Comparison with Pixel Prediction Methods. We compare V-JEPA with OmniMAE (Girdhar et al., 2023), VideoMAE (Tong et al., 2022), and Hiera (Ryali et al., 2023), which leverage a pixel-reconstruction loss. All models are trained using a ViT-L architecture or a comparable Hiera-L. We evaluate the approaches on downstream image tasks (IN1K, Places205, iNat201) and video tasks (K400, SSv2, AVA) in both frozen evaluation (with a frozen backbone), and end-to-end fine-tuning. All models are evaluated at resolution 224. On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. In frozen evaluation, V-JEPA outperforms the baselines on all downstream tasks, except ImageNet, where the model achieves 74 . 8% compared to 75 . 1% of an OmniMAE model trained directly on ImageNet. V-JEPA also achieves the best fine-tuning performance amongs all ViT-L models and matches the Hiera-L on SSv2. The V-JEPA results are achieved while processing significantly fewer examples during pretraining.\nTable 6 Comparison with State-of-the-Art Models. We compare V-JEPA with state-of-the-art baselines in frozen evaluation with an attentive probe on downstream image tasks (IN1K, Place205, iNat21) and video tasks (K400, SSv2, AVA). All models are evaluated at resolution 224, except I-JEPA 512 and V-JEPA 384 which are evaluated respectively at resolution 512 and 384 . On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. Compared to other video baselines, V-JEPA exhibits a consistent improvement across all downstream tasks. Compared to image-models that excel under the frozen evaluation, V-JEPA shows a significant performance improvement on tasks requiring motion understanding (+21 points on SSv2), and reduces the gap between video and image models on tasks requiring static appearance-based features.\nSeen = 270M. V-JEPA, Iter. = 90K. V-JEPA, Frozen Evaluation w/", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv3.pdf" + }, + { + "text": "4.4 Prediction Task: Predicting y from x\nTable 5 Comparison with Pixel Prediction Methods. We compare V-JEPA with OmniMAE (Girdhar et al., 2023), VideoMAE (Tong et al., 2022), and Hiera (Ryali et al., 2023), which leverage a pixel-reconstruction loss. All models are trained using a ViT-L architecture or a comparable Hiera-L. We evaluate the approaches on downstream image tasks (IN1K, Places205, iNat201) and video tasks (K400, SSv2, AVA) in both frozen evaluation (with a frozen backbone), and end-to-end fine-tuning. All models are evaluated at resolution 224. On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. In frozen evaluation, V-JEPA outperforms the baselines on all downstream tasks, except ImageNet, where the model achieves 74 . 8% compared to 75 . 1% of an OmniMAE model trained directly on ImageNet. V-JEPA also achieves the best fine-tuning performance amongs all ViT-L models and matches the Hiera-L on SSv2. The V-JEPA results are achieved while processing significantly fewer examples during pretraining.\nTable 6 Comparison with State-of-the-Art Models. We compare V-JEPA with state-of-the-art baselines in frozen evaluation with an attentive probe on downstream image tasks (IN1K, Place205, iNat21) and video tasks (K400, SSv2, AVA). All models are evaluated at resolution 224, except I-JEPA 512 and V-JEPA 384 which are evaluated respectively at resolution 512 and 384 . On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. Compared to other video baselines, V-JEPA exhibits a consistent improvement across all downstream tasks. Compared to image-models that excel under the frozen evaluation, V-JEPA shows a significant performance improvement on tasks requiring motion understanding (+21 points on SSv2), and reduces the gap between video and image models on tasks requiring static appearance-based features.\n67.8. V-JEPA, Fine-Tuning.K400-ft (16 × 5 × 3) =", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv3.pdf" + }, + { + "text": "4.4 Prediction Task: Predicting y from x\nTable 5 Comparison with Pixel Prediction Methods. We compare V-JEPA with OmniMAE (Girdhar et al., 2023), VideoMAE (Tong et al., 2022), and Hiera (Ryali et al., 2023), which leverage a pixel-reconstruction loss. All models are trained using a ViT-L architecture or a comparable Hiera-L. We evaluate the approaches on downstream image tasks (IN1K, Places205, iNat201) and video tasks (K400, SSv2, AVA) in both frozen evaluation (with a frozen backbone), and end-to-end fine-tuning. All models are evaluated at resolution 224. On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. In frozen evaluation, V-JEPA outperforms the baselines on all downstream tasks, except ImageNet, where the model achieves 74 . 8% compared to 75 . 1% of an OmniMAE model trained directly on ImageNet. V-JEPA also achieves the best fine-tuning performance amongs all ViT-L models and matches the Hiera-L on SSv2. The V-JEPA results are achieved while processing significantly fewer examples during pretraining.\nTable 6 Comparison with State-of-the-Art Models. We compare V-JEPA with state-of-the-art baselines in frozen evaluation with an attentive probe on downstream image tasks (IN1K, Place205, iNat21) and video tasks (K400, SSv2, AVA). All models are evaluated at resolution 224, except I-JEPA 512 and V-JEPA 384 which are evaluated respectively at resolution 512 and 384 . On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. Compared to other video baselines, V-JEPA exhibits a consistent improvement across all downstream tasks. Compared to image-models that excel under the frozen evaluation, V-JEPA shows a significant performance improvement on tasks requiring motion understanding (+21 points on SSv2), and reduces the gap between video and image models on tasks requiring static appearance-based features.\nAtt. Pooling.K400 (16 × 8 × 3) = 80.8. V-JEPA, Frozen", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv3.pdf" + }, + { + "text": "4.4 Prediction Task: Predicting y from x\nTable 5 Comparison with Pixel Prediction Methods. We compare V-JEPA with OmniMAE (Girdhar et al., 2023), VideoMAE (Tong et al., 2022), and Hiera (Ryali et al., 2023), which leverage a pixel-reconstruction loss. All models are trained using a ViT-L architecture or a comparable Hiera-L. We evaluate the approaches on downstream image tasks (IN1K, Places205, iNat201) and video tasks (K400, SSv2, AVA) in both frozen evaluation (with a frozen backbone), and end-to-end fine-tuning. All models are evaluated at resolution 224. On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. In frozen evaluation, V-JEPA outperforms the baselines on all downstream tasks, except ImageNet, where the model achieves 74 . 8% compared to 75 . 1% of an OmniMAE model trained directly on ImageNet. V-JEPA also achieves the best fine-tuning performance amongs all ViT-L models and matches the Hiera-L on SSv2. The V-JEPA results are achieved while processing significantly fewer examples during pretraining.\nTable 6 Comparison with State-of-the-Art Models. We compare V-JEPA with state-of-the-art baselines in frozen evaluation with an attentive probe on downstream image tasks (IN1K, Place205, iNat21) and video tasks (K400, SSv2, AVA). All models are evaluated at resolution 224, except I-JEPA 512 and V-JEPA 384 which are evaluated respectively at resolution 512 and 384 . On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. Compared to other video baselines, V-JEPA exhibits a consistent improvement across all downstream tasks. Compared to image-models that excel under the frozen evaluation, V-JEPA shows a significant performance improvement on tasks requiring motion understanding (+21 points on SSv2), and reduces the gap between video and image models on tasks requiring static appearance-based features.\nHiera, Frozen Evaluation w/ Att. Pooling.IN1K = 68.9. Hiera, Frozen Evaluation", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv3.pdf" + } + ] + }, + { + "references": { + "source_file": "news1.pdf", + "query": "Where will the 2024 AI + Energy summit take place ?", + "target_page": 1, + "target_passage": "The AI + Energy Summit, scheduled for September 26, 2024, in Washington, D.C.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "New Artificial Intelligence Summit Series Begins With Energy\n07/31/2024\n(AI) continues to transform the United States and the world. To promote and inform rapid advancements in AI and maintain America's global competitiveness, the Special Competitive Studies Project (SCSP), a nonprofit and nonpartisan initiative with a goal of making recommendations to strengthen America's long-term competitiveness in AI, announces the AI+ Summit Series.\nThe series kicks off with the topic of energy. The AI + Energy Summit, scheduled for September 26, 2024, in Washington, D.C., will bring together policy makers, energy industry leaders, top government and academic energy researchers, and technologists to address the challenges of AI's energy consumption and develop solutions for a resilient and abundant energy future. The event also aims to address the implications of AI and energy for national security and promote partnerships between AI and energy stakeholders.\nAI and other emerging technologies can help the United States take the lead in energy areas including maximizing energy efficiencies, discovering new materials, and enabling new forms of power generation. AI also has a role to play in overcoming energy challenges. The Department of Energy (DOE) already uses AI in several areas including advanced computing, emergency response, environmental modeling, climate forecasting, and materials research.\nSCSP's recent 'Action Plan for U.S. Leadership in Next-Generation Energy,' raises many issues related to AI and energy, including recommendations for the government to bring America forward. The AI+ Energy Summit will highlight these and other issues, and promote collaboration to solve problems. The stakes are high; if the U.S. falls short on energy, American adversaries could gain the upper hand in AI leadership, according to SCSP experts.\nVisit scsp.ai to learn more about the AI+Energy Summit and the SCSP's Next-Generation Energy Action Plan.\nArticle Link\nhttps://about.newsusa.com/new-artificial-intelligence-summit-series-begins-with…", + "page_start": 0, + "page_end": 0, + "source_file": "news1.pdf" + }, + { + "text": "Log in\nHOME\nCATEGORIES\n\n\nHome / Arts and Entertainment / New Artificial Intelligence Summit Series Begins With Energy\nARTS AND ENTERTAINMENT", + "page_start": 0, + "page_end": 0, + "source_file": "news1.pdf" + }, + { + "text": "References\n208. Hiller, Jennifer (1 July 2024). \"Tech Industry Wants to Lock Up Nuclear Power for AI\" (https:// www.wsj.com/business/energy-oil/tech-industry-wants-to-lock-up-nuclear-power-for-ai-6cb7 5316?mod=djem10point). Wall Street Journal . Dow Jones. Archived (https://web.archive.or g/web/20241005165650/https://www.wsj.com/business/energy-oil/tech-industry-wants-to-loc k-up-nuclear-power-for-ai-6cb75316?mod=djem10point) from the original on 5 October 2024. Retrieved 5 October 2024.\n209. Kendall, Tyler (28 September 2024). \"Nvidia's Huang Says Nuclear Power an Option to Feed Data Centers\" (https://www.bloomberg.com/news/articles/2024-09-27/nvidia-s-huang-s ays-nuclear-power-an-option-to-feed-data-centers). Bloomberg .\n210. Halper, Evan (20 September 2024). \"Microsoft deal would reopen Three Mile Island nuclear plant to power AI\" (https://www.washingtonpost.com/business/2024/09/20/microsoft-three-mi le-island-nuclear-constellation). Washington Post .", + "page_start": 41, + "page_end": 41, + "source_file": "wikipedia3.pdf" + }, + { + "text": "References\n201. Fung, Brian (19 December 2023). \"Where the battle to dominate AI may be won\" (https://ww w.cnn.com/2023/12/19/tech/cloud-competition-and-ai/index.html). CNN Business . Archived (https://web.archive.org/web/20240113053332/https://www.cnn.com/2023/12/19/tech/cloudcompetition-and-ai/index.html) from the original on 13 January 2024.\n202. Metz, Cade (5 July 2023). \"In the Age of A.I., Tech's Little Guys Need Big Friends\" (https://w ww.nytimes.com/2023/07/05/business/artificial-intelligence-power-data-centers.html). The New York Times . Archived (https://web.archive.org/web/20240708214644/https://www.nytim es.com/2023/07/05/business/artificial-intelligence-power-data-centers.html) from the original on 8 July 2024. Retrieved 5 October 2024.\n203. \"Electricity 2024 - Analysis\" (https://www.iea.org/reports/electricity-2024). IEA . 24 January 2024. Retrieved 13 July 2024.\n204. Calvert, Brian (28 March 2024). \"AI already uses as much energy as a small country. It's only the beginning\" (https://www.vox.com/climate/2024/3/28/24111721/ai-uses-a-lot-of-ener gy-experts-expect-it-to-double-in-just-a-few-years). Vox . New York, New York. Archived (http s://web.archive.org/web/20240703080555/https://www.vox.com/climate/2024/3/28/2411172 1/ai-uses-a-lot-of-energy-experts-expect-it-to-double-in-just-a-few-years) from the original on 3 July 2024. Retrieved 5 October 2024.", + "page_start": 41, + "page_end": 41, + "source_file": "wikipedia3.pdf" + }, + { + "text": "References\n205. Halper, Evan; O'Donovan, Caroline (21 June 2024). \"AI is exhausting the power grid. Tech firms are seeking a miracle solution\" (https://www.washingtonpost.com/business/2024/06/2 1/artificial-intelligence-nuclear-fusion-climate/?utm_campaign=wp_post_most&utm_medium =email&utm_source=newsletter&wpisrc=nl_most&carta-url=https%3A%2F%2Fs2.washingto npost.com%2Fcar-ln-tr%2F3e0d678%2F6675a2d2c2c05472dd9ec0f4%2F596c09009bbc0f 20865036e7%2F12%2F52%2F6675a2d2c2c05472dd9ec0f4). Washington Post .\n206. Davenport, Carly. \"AI Data Centers and the Coming YS Power Demand Surge\" (https://web. archive.org/web/20240726080428/https://www.goldmansachs.com/intelligence/pages/gs-res earch/generational-growth-ai-data-centers-and-the-coming-us-power-surge/report.pdf) (PDF). Goldman Sachs . Archived from the original (https://www.goldmansachs.com/intellige nce/pages/gs-research/generational-growth-ai-data-centers-and-the-coming-us-power-surg e/report.pdf) (PDF) on 26 July 2024. Retrieved 5 October 2024.\n207. Ryan, Carol (12 April 2024). \"Energy-Guzzling AI Is Also the Future of Energy Savings\" (http s://www.wsj.com/business/energy-oil/ai-data-centers-energy-savings-d602296e). Wall Street Journal . Dow Jones.", + "page_start": 41, + "page_end": 41, + "source_file": "wikipedia3.pdf" + }, + { + "text": "References\n211. Hiller, Jennifer (20 September 2024). \"Three Mile Island's Nuclear Plant to Reopen, Help Power Microsoft's AI Centers\" (https://www.wsj.com/business/energy-oil/three-mile-islands-n uclear-plant-to-reopen-help-power-microsofts-ai-centers-aebfb3c8?mod=Searchresults_pos 1&page=1). Wall Street Journal . Dow Jones. Archived (https://web.archive.org/web/2024100 5170152/https://www.wsj.com/business/energy-oil/three-mile-islands-nuclear-plant-to-reope n-help-power-microsofts-ai-centers-aebfb3c8?mod=Searchresults_pos1&page=1) from the original on 5 October 2024. Retrieved 5 October 2024.\n212. Niva Yadav (19 August 2024). \"Taiwan to stop large data centers in the North, cites insufficient power\" (https://www.datacenterdynamics.com/en/news/taiwan-to-stop-large-data -centers-in-the-north-cites-insufficient-power/). DatacenterDynamics.\n213. Mochizuki, Takashi; Oda, Shoko (18 October 2024). \" エヌビディア出資の⽇本企業、原発近 くでAIデ-タセンタ-新設検討 \" (https://www.bloomberg.co.jp/news/articles/2024-10-18/S LHGKKT0AFB400). Bloomberg (in Japanese).\n214. Naureen S Malik and Will Wade (5 November 2024). \"Nuclear-Hungry AI Campuses Need New Plan to Find Power Fast\" (https://www.bloomberg.com/news/articles/2024-11-04/nucle ar-hungry-ai-campuses-need-new-strategy-to-find-power-fast). Bloomberg.\n215. Nicas (2018).", + "page_start": 42, + "page_end": 42, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Power needs and environmental impacts\nIn January 2024, the International Energy Agency (IEA) released Electricity 2024, Analysis and Forecast to 2026 , forecasting electric power use. [203] This is the first IEA report to make projections for data centers and power consumption for artificial intelligence and cryptocurrency. The report states that power demand for these uses might double by 2026, with additional electric power usage equal to electricity used by the whole Japanese nation. [204]\nProdigious power consumption by AI is responsible for the growth of fossil fuels use, and might delay closings of obsolete, carbon-emitting coal energy facilities. There is a feverish rise in the construction of data centers throughout the US, making large technology firms (e.g., Microsoft, Meta, Google, Amazon) into voracious consumers of electric power. Projected electric consumption is so immense that there is concern that it will be fulfilled no matter the source. A ChatGPT search involves the use of 10 times the electrical energy as a Google search. The large firms are in haste to find power sources - from nuclear energy to geothermal to fusion. The tech firms argue that - in the long view - AI will be eventually kinder to the environment, but they need the energy now. AI makes the power grid more efficient and \"intelligent\", will assist in the growth of nuclear power, and track overall carbon emissions, according to technology firms. [205]\nA 2024 Goldman Sachs Research Paper, AI Data Centers and the Coming US Power Demand Surge , found \"US power demand (is) likely to experience growth not seen in a generation....\" and forecasts that, by 2030, US data centers will consume 8% of US power, as opposed to 3% in 2022, presaging growth for the electrical power generation industry by a variety of means. [206] Data centers' need for more and more electrical power is such that they might max out the electrical grid. The Big Tech companies counter that AI can be used to maximize the utilization of the grid by all. [207]\nIn 2024, the Wall Street Journal reported that big AI companies have begun negotiations with the US nuclear power providers to provide electricity to the data centers. In March 2024 Amazon purchased a Pennsylvania nuclear-powered data center for $650 Million (US). [208] Nvidia CEO Jen-Hsun Huang said nuclear power is a good option for the data centers. [209]", + "page_start": 13, + "page_end": 13, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Regulation\nIn a 2022 Ipsos survey, attitudes towards AI varied greatly by country; 78% of Chinese citizens, but only 35% of Americans, agreed that \"products and services using AI have more benefits than drawbacks\". [304] A 2023 Reuters/Ipsos poll found that 61% of Americans agree, and 22% disagree, that AI poses risks to humanity. [311] In a 2023 Fox News poll, 35% of Americans thought it \"very important\", and an additional 41% thought it \"somewhat important\", for the federal government to regulate AI, versus 13% responding \"not very important\" and 8% responding \"not at all important\". [312][313]\nIn November 2023, the first global AI Safety Summit was held in Bletchley Park in the UK to discuss the near and far term risks of AI and the possibility of mandatory and voluntary regulatory frameworks. [314] 28 countries including the United States, China, and the European Union issued a declaration at the start of the summit, calling for international co-operation to manage the challenges and risks of artificial intelligence. [315][316] In May 2024 at the AI Seoul Summit, 16 global AI tech companies agreed to safety commitments on the development of AI. [317][318]", + "page_start": 20, + "page_end": 21, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Further reading\nFrank, Michael (22 September 2023). \"US Leadership in Artificial Intelligence Can Shape the 21st Century Global Order\" (https://thediplomat.com/2023/09/us-leadership-in-artificial-intelli gence-can-shape-the-21st-century-global-order). The Diplomat . Archived (https://web.archiv e.org/web/20240916014433/https://thediplomat.com/2023/09/us-leadership-in-artificial-intelli gence-can-shape-the-21st-century-global-order/) from the original on 16 September 2024. Retrieved 8 December 2023. \"Instead, the United States has developed a new area of dominance that the rest of the world views with a mixture of awe, envy, and resentment: artificial intelligence... From AI models and research to cloud computing and venture capital, U.S. companies, universities, and research labs - and their affiliates in allied countries appear to have an enormous lead in both developing cutting-edge AI and commercializing it. The value of U.S. venture capital investments in AI start-ups exceeds that of the rest of the world combined.\"\nGertner, Jon. (2023) \"Wikipedia's Moment of Truth: Can the online encyclopedia help teach A.I. chatbots to get their facts right - without destroying itself in the process?\" New York Times Magazine (July 18, 2023) online (https://www.nytimes.com/2023/07/18/magazine/wikipediaai-chatgpt.html) Archived (https://web.archive.org/web/20230720125400/https://www.nytime s.com/2023/07/18/magazine/wikipedia-ai-chatgpt.html) 20 July 2023 at the Wayback Machine", + "page_start": 66, + "page_end": 66, + "source_file": "wikipedia3.pdf" + }, + { + "text": "References\n318. \"Frontier AI Safety Commitments, AI Seoul Summit 2024\" (https://web.archive.org/web/2024 0523201611/https://www.gov.uk/government/publications/frontier-ai-safety-commitments-aiseoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-2024). gov.uk. 21 May 2024. Archived from the original (https://www.gov.uk/government/publications/frontier-ai-safe ty-commitments-ai-seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-202 4) on 23 May 2024. Retrieved 23 May 2024.\n319. Russell & Norvig 2021, p. 9.\n320. Copeland, J., ed. (2004). The Essential Turing: the ideas that gave birth to the computer age . Oxford, England: Clarendon Press. ISBN 0-1982-5079-7.\n321. \"Google books ngram\" (https://books.google.com/ngrams/graph?content=electronic+brain& year_start=1930&year_end=2019&corpus=en-2019&smoothing=3). Archived (https://web.ar chive.org/web/20241005170209/https://books.google.com/ngrams/graph?content=electronic +brain&year_start=1930&year_end=2019&corpus=en-2019&smoothing=3) from the original on 5 October 2024. Retrieved 5 October 2024.\n322. AI's immediate precursors: McCorduck (2004, pp. 51-107), Crevier (1993, pp. 27-32), Russell & Norvig (2021, pp. 8-17), Moravec (1988, p. 3)\n323. Turing's original publication of the Turing test in \"Computing machinery and intelligence\": Turing (1950) Historical influence and philosophical implications: Haugeland (1985, pp. 69), Crevier (1993, p. 24), McCorduck (2004, pp. 70-71), Russell & Norvig (2021, pp. 2, 984)\n324. Crevier (1993), pp. 47-49.", + "page_start": 47, + "page_end": 47, + "source_file": "wikipedia3.pdf" + } + ] + }, + { + "references": { + "source_file": "news1.pdf", + "query": "What is the United States SCSP ?", + "target_page": 1, + "target_passage": "he Special Competitive Studies Project (SCSP), a nonprofit and nonpartisan initiative with a goal of making recommendations to strengthen America's long-term competitiveness in AI", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "New Artificial Intelligence Summit Series Begins With Energy\n07/31/2024\n(AI) continues to transform the United States and the world. To promote and inform rapid advancements in AI and maintain America's global competitiveness, the Special Competitive Studies Project (SCSP), a nonprofit and nonpartisan initiative with a goal of making recommendations to strengthen America's long-term competitiveness in AI, announces the AI+ Summit Series.\nThe series kicks off with the topic of energy. The AI + Energy Summit, scheduled for September 26, 2024, in Washington, D.C., will bring together policy makers, energy industry leaders, top government and academic energy researchers, and technologists to address the challenges of AI's energy consumption and develop solutions for a resilient and abundant energy future. The event also aims to address the implications of AI and energy for national security and promote partnerships between AI and energy stakeholders.\nAI and other emerging technologies can help the United States take the lead in energy areas including maximizing energy efficiencies, discovering new materials, and enabling new forms of power generation. AI also has a role to play in overcoming energy challenges. The Department of Energy (DOE) already uses AI in several areas including advanced computing, emergency response, environmental modeling, climate forecasting, and materials research.\nSCSP's recent 'Action Plan for U.S. Leadership in Next-Generation Energy,' raises many issues related to AI and energy, including recommendations for the government to bring America forward. The AI+ Energy Summit will highlight these and other issues, and promote collaboration to solve problems. The stakes are high; if the U.S. falls short on energy, American adversaries could gain the upper hand in AI leadership, according to SCSP experts.\nVisit scsp.ai to learn more about the AI+Energy Summit and the SCSP's Next-Generation Energy Action Plan.\nArticle Link\nhttps://about.newsusa.com/new-artificial-intelligence-summit-series-begins-with…", + "page_start": 0, + "page_end": 0, + "source_file": "news1.pdf" + }, + { + "text": "Service Location Protocol\nThe Service Location Protocol (SLP) is an internet service discovery protocol that enables computers and other devices to find services in a local area network (LAN) without prior configuration. It was defined in the request for change (RFC) 2608.", + "page_start": 806, + "page_end": 806, + "source_file": "sg247938.pdf" + }, + { + "text": "UNITED STATES SECURITIES AND EXCHANGE COMMISSION\nWashington, D.C. 20549", + "page_start": 0, + "page_end": 0, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Fiscal 2011 Acquisitions\nIn May 2011, the Company acquired Gulf Coast Bearing & Supply Co., a full line bearing and power transmission distributor, located in the U.S. In July 2010, the Company acquired UZ Engineered Products, a distributor of industrial supply products for maintenance, repair, and operational needs, in the government and commercial sectors, throughout the U.S. and Canada. In August 2010, the Company acquired SCS Supply Group, a distributor of bearings, power transmission components, electrical components, fluid power products and industrial supplies located in Ontario, Canada.", + "page_start": 23, + "page_end": 23, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "Serial-attached SCSI\nSAS is a method that is used in accessing computer peripheral devices that employs a serial (1 bit at a time) means of digital data transfer over thin cables. The method is specified in the American National Standard Institute standard called SAS. In the business enterprise, SAS is useful for access to mass storage devices, particularly external hard disk drives.", + "page_start": 806, + "page_end": 806, + "source_file": "sg247938.pdf" + }, + { + "text": "9. RETIREMENT BENEFIT PLANS\nThe Company and its domestic consolidated subsidiaries have defined benefit plans, i.e., welfare pension fund plans ('WPFP'), tax-qualified pension plans and lump-sum payment plans, covering substantially all employees who are entitled to lump-sum or annuity payments, the amounts of which are determined by reference to their basic rates of pay, length of service, and the conditions under which termination occurs. Certain foreign consolidated subsidiaries have defined benefit and contribution plans.\nThe following table sets forth the funded and accrued status of the plans, and the amounts recognized in the consolidated balance sheets as of March 31, 2005 and 2004 for the Company's and the consolidated subsidiaries' defined benefit plans:", + "page_start": 83, + "page_end": 83, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "SMBC GLOBAL FOUNDATION\nBased in the United States, SMBC Global Foundation has Based in the United States, SMBC Global Foundation has provided scholarships to more than 5,000 university students provided scholarships to more than 5,000 university students in Asian countries since its establishment in 1994. In the in Asian countries since its establishment in 1994. In the United States, it supports educational trips to Japan United States, it supports educational trips to Japan organized by a high school located in Harlem, New York City, organized by a high school located in Harlem, New York City, and volunteer employees of SMBC and JRI to participate in and volunteer employees of SMBC and JRI to participate in school beautification programs. The foundation also provides school beautification programs. The foundation also provides matching gifts for SMBC employees. matching gifts for SMBC employees.\nChina", + "page_start": 14, + "page_end": 14, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "SRI Indexes on which SMFG is listed\n■ Dow Jones Sustainability Index\nThis index was jointly developed by Dow Jones of the United States, and the Swiss SRI research company SAM Group. It was the first SRI index in the world.\n■ FTSE 4 Good Global Index Series\nThe FTSE 4 Good Global Index Series was created by FTSE International Limited, a joint venture set up by the Financial Times newspaper of the United Kingdom and the London Stock Exchange.\n■ Ethibel Sustainability Index\nAn index compiled by the Belgian SRI company Ethibel", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "Small Computer System Interface (SCSI)\nSmall Computer System Interface (SCSI) is an ANSI-standard electronic interface with which personal computers can communicate with peripheral hardware, such as disk drives, tape drives, CD-ROM drives, printers, and scanners, faster and more flexibly than with previous interfaces.", + "page_start": 806, + "page_end": 806, + "source_file": "sg247938.pdf" + }, + { + "text": "S\nstate overview 535, 1 = . state transitions 464, 1 = . fixed 709, 1 = . link 676, 1 = . starting 676, 1 = . Statistics file naming 742, 1 = . STOP_COMPLETED 464 storage 72 storage area networks (SAN) clustered systems 30 creating 30 strand 679 stripe VDisks 80 striped VDisk 290 subnet mask IP address 88 summary reports 34 superuser 689, 1 = stop FlashCopy consistency group 495. failure 29 zoning 330, 363, 1 = . data 16 definition 30 migrating volumes 285 striped volumes 31, 1 = . storage pools adding drives 27 adding MDisks 33 capacity 30, 1 = . storage cache 21, 1 = . storage capacity 45, 1 = . target 283, 286, 1 = . SVC configuration 44, 1 = . SVC device 788, 1 = . svctask mkfcmap 482, 542, 544-546, 1 = . symmetrical 2, 1 = . symmetrical network 781, 1 = . symmetrical virtualization 2, 1 = . synchronized 520, 537, 1 = . syslog, 1 = . manager 41, 1 = . messages 40-41 protocol 41, 1 = syslog messages sender 41", + "page_start": 820, + "page_end": 820, + "source_file": "sg247938.pdf" + } + ] + }, + { + "references": { + "source_file": "news1.pdf", + "query": "What are some example of uses AI by the US departement of energy ?", + "target_page": 1, + "target_passage": "The Department of Energy (DOE) already uses AI in several areas including advanced computing, emergency response, environmental modeling, climate forecasting, and materials research", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "New Artificial Intelligence Summit Series Begins With Energy\n07/31/2024\n(AI) continues to transform the United States and the world. To promote and inform rapid advancements in AI and maintain America's global competitiveness, the Special Competitive Studies Project (SCSP), a nonprofit and nonpartisan initiative with a goal of making recommendations to strengthen America's long-term competitiveness in AI, announces the AI+ Summit Series.\nThe series kicks off with the topic of energy. The AI + Energy Summit, scheduled for September 26, 2024, in Washington, D.C., will bring together policy makers, energy industry leaders, top government and academic energy researchers, and technologists to address the challenges of AI's energy consumption and develop solutions for a resilient and abundant energy future. The event also aims to address the implications of AI and energy for national security and promote partnerships between AI and energy stakeholders.\nAI and other emerging technologies can help the United States take the lead in energy areas including maximizing energy efficiencies, discovering new materials, and enabling new forms of power generation. AI also has a role to play in overcoming energy challenges. The Department of Energy (DOE) already uses AI in several areas including advanced computing, emergency response, environmental modeling, climate forecasting, and materials research.\nSCSP's recent 'Action Plan for U.S. Leadership in Next-Generation Energy,' raises many issues related to AI and energy, including recommendations for the government to bring America forward. The AI+ Energy Summit will highlight these and other issues, and promote collaboration to solve problems. The stakes are high; if the U.S. falls short on energy, American adversaries could gain the upper hand in AI leadership, according to SCSP experts.\nVisit scsp.ai to learn more about the AI+Energy Summit and the SCSP's Next-Generation Energy Action Plan.\nArticle Link\nhttps://about.newsusa.com/new-artificial-intelligence-summit-series-begins-with…", + "page_start": 0, + "page_end": 0, + "source_file": "news1.pdf" + }, + { + "text": "References\n205. Halper, Evan; O'Donovan, Caroline (21 June 2024). \"AI is exhausting the power grid. Tech firms are seeking a miracle solution\" (https://www.washingtonpost.com/business/2024/06/2 1/artificial-intelligence-nuclear-fusion-climate/?utm_campaign=wp_post_most&utm_medium =email&utm_source=newsletter&wpisrc=nl_most&carta-url=https%3A%2F%2Fs2.washingto npost.com%2Fcar-ln-tr%2F3e0d678%2F6675a2d2c2c05472dd9ec0f4%2F596c09009bbc0f 20865036e7%2F12%2F52%2F6675a2d2c2c05472dd9ec0f4). Washington Post .\n206. Davenport, Carly. \"AI Data Centers and the Coming YS Power Demand Surge\" (https://web. archive.org/web/20240726080428/https://www.goldmansachs.com/intelligence/pages/gs-res earch/generational-growth-ai-data-centers-and-the-coming-us-power-surge/report.pdf) (PDF). Goldman Sachs . Archived from the original (https://www.goldmansachs.com/intellige nce/pages/gs-research/generational-growth-ai-data-centers-and-the-coming-us-power-surg e/report.pdf) (PDF) on 26 July 2024. Retrieved 5 October 2024.\n207. Ryan, Carol (12 April 2024). \"Energy-Guzzling AI Is Also the Future of Energy Savings\" (http s://www.wsj.com/business/energy-oil/ai-data-centers-energy-savings-d602296e). Wall Street Journal . Dow Jones.", + "page_start": 41, + "page_end": 41, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Other sources\nAI & ML in Fusion (https://suli.pppl.gov/2023/course/Rea-PPPL-SULI2023.pdf)\nAI & ML in Fusion, video lecture (https://drive.google.com/file/d/1npCTrJ8XJn20ZGDA_DfMpAN uQZFMzKPh/view?usp=drive_link) Archived (https://web.archive.org/web/20230702164332/ https://drive.google.com/file/d/1npCTrJ8XJn20ZGDA_DfMpANuQZFMzKPh/view?usp=drive _link) 2 July 2023 at the Wayback Machine\nAlter, Alexandra; Harris, Elizabeth A. (20 September 2023), \"Franzen, Grisham and Other Prominent Authors Sue OpenAI\" (https://www.nytimes.com/2023/09/20/books/authors-open ai-lawsuit-chatgpt-copyright.html?campaign_id=2&emc=edit_th_20230921&instance_id=103 259&nl=todaysheadlines®i_id=62816440&segment_id=145288&user_id=ad24f3545dae 0ec44284a38bb4a88f1d), The New York Times , archived (https://web.archive.org/web/2024 0914155020/https://www.nytimes.com/2023/09/20/books/authors-openai-lawsuit-chatgpt-co pyright.html?campaign_id=2&emc=edit_th_20230921&instance_id=103259&nl=todaysheadl ines®i_id=62816440&segment_id=145288&user_id=ad24f3545dae0ec44284a38bb4a88 f1d) from the original on 14 September 2024, retrieved 5 October 2024", + "page_start": 52, + "page_end": 52, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Other industry-specific tasks\nThere are also thousands of successful AI applications used to solve specific problems for specific industries or institutions. In a 2017 survey, one in five companies reported having incorporated \"AI\" in some offerings or processes. [178] A few examples are energy storage, medical diagnosis, military logistics, applications that predict the result of judicial decisions, foreign policy, or supply chain management.\nAI applications for evacuation and disaster management are growing. AI has been used to investigate if and how people evacuated in large scale and small scale evacuations using historical data from GPS, videos or social media. Further, AI can provide real time information on the real time evacuation conditions. [179][180][181]\nIn agriculture, AI has helped farmers identify areas that need irrigation, fertilization, pesticide treatments or increasing yield. Agronomists use AI to conduct research and development. AI has been used to predict the ripening time for crops such as tomatoes, monitor soil moisture, operate agricultural robots, conduct predictive analytics, classify livestock pig call emotions, automate greenhouses, detect diseases and pests, and save water.\nArtificial intelligence is used in astronomy to analyze increasing amounts of available data and applications, mainly for \"classification, regression, clustering, forecasting, generation, discovery, and the development of new scientific insights.\" For example, it is used for discovering exoplanets, forecasting solar activity, and distinguishing between signals and instrumental effects in gravitational wave astronomy. Additionally, it could be used for activities in space, such as space exploration, including the analysis of data from space missions, real-time science decisions of spacecraft, space debris avoidance, and more autonomous operation.\nDuring the 2024 Indian elections, US$50 millions was spent on authorized AI-generated content, notably by creating deepfakes of allied (including sometimes deceased) politicians to better engage with voters, and by translating speeches to various local languages. [182]", + "page_start": 11, + "page_end": 12, + "source_file": "wikipedia3.pdf" + }, + { + "text": "INVESTING IN OUR WORLD AND OUR PEOPLE »\nAs we explore for and produce clean, affordable, abundant, American natural gas, we provide an important solution to our nation's energy challenges and its quest for energy independence. With at least a 200year supply of natural gas located right here in the U.S., this versatile fuel can be used to not only heat homes, create electricity and meet America's transportation needs, but also to fuel the country's future by creating jobs and stimulating local and national economies through investment and taxes.", + "page_start": 27, + "page_end": 27, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "Applications\nAI and machine learning technology is used in most of the essential applications of the 2020s, including: search engines (such as Google Search), targeting online advertisements, recommendation systems (offered by Netflix, YouTube or Amazon), driving internet traffic, targeted advertising (AdSense, Facebook), virtual assistants (such as Siri or Alexa), autonomous vehicles (including drones, ADAS and self-driving cars), automatic language translation (Microsoft Translator, Google Translate), facial recognition (Apple's Face ID or Microsoft's DeepFace and Google's FaceNet) and image labeling (used by Facebook, Apple's iPhoto and TikTok). The deployment of AI may be overseen by a Chief automation officer (CAO).", + "page_start": 8, + "page_end": 8, + "source_file": "wikipedia3.pdf" + }, + { + "text": "References\n201. Fung, Brian (19 December 2023). \"Where the battle to dominate AI may be won\" (https://ww w.cnn.com/2023/12/19/tech/cloud-competition-and-ai/index.html). CNN Business . Archived (https://web.archive.org/web/20240113053332/https://www.cnn.com/2023/12/19/tech/cloudcompetition-and-ai/index.html) from the original on 13 January 2024.\n202. Metz, Cade (5 July 2023). \"In the Age of A.I., Tech's Little Guys Need Big Friends\" (https://w ww.nytimes.com/2023/07/05/business/artificial-intelligence-power-data-centers.html). The New York Times . Archived (https://web.archive.org/web/20240708214644/https://www.nytim es.com/2023/07/05/business/artificial-intelligence-power-data-centers.html) from the original on 8 July 2024. Retrieved 5 October 2024.\n203. \"Electricity 2024 - Analysis\" (https://www.iea.org/reports/electricity-2024). IEA . 24 January 2024. Retrieved 13 July 2024.\n204. Calvert, Brian (28 March 2024). \"AI already uses as much energy as a small country. It's only the beginning\" (https://www.vox.com/climate/2024/3/28/24111721/ai-uses-a-lot-of-ener gy-experts-expect-it-to-double-in-just-a-few-years). Vox . New York, New York. Archived (http s://web.archive.org/web/20240703080555/https://www.vox.com/climate/2024/3/28/2411172 1/ai-uses-a-lot-of-energy-experts-expect-it-to-double-in-just-a-few-years) from the original on 3 July 2024. Retrieved 5 October 2024.", + "page_start": 41, + "page_end": 41, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Other sources\nBuiten, Miriam C (2019). \"Towards Intelligent Regulation of Artificial Intelligence\" (https://doi.org/ 10.1017%2Ferr.2019.8). European Journal of Risk Regulation . 10 (1): 41-59. doi:10.1017/err.2019.8 (https://doi.org/10.1017%2Ferr.2019.8). ISSN 1867-299X (https://sea rch.worldcat.org/issn/1867-299X).\nBushwick, Sophie (16 March 2023), \"What the New GPT-4 AI Can Do\" (https://www.scientificam erican.com/article/what-the-new-gpt-4-ai-can-do/), Scientific American , archived (https://we b.archive.org/web/20230822233655/https://www.scientificamerican.com/article/what-the-ne w-gpt-4-ai-can-do/) from the original on 22 August 2023, retrieved 5 October 2024\nButler, Samuel (13 June 1863). \"Darwin among the Machines\" (https://nzetc.victoria.ac.nz/tm/sc holarly/tei-ButFir-t1-g1-t1-g1-t4-body.html). Letters to the Editor. The Press . Christchurch, New Zealand. Archived (https://web.archive.org/web/20080919172551/http://www.nzetc.org/ tm/scholarly/tei-ButFir-t1-g1-t1-g1-t4-body.html) from the original on 19 September 2008. Retrieved 16 October 2014 - via Victoria University of Wellington.\nButtazzo, G. (July 2001). \"Artificial consciousness: Utopia or real possibility?\". Computer . 34 (7): 24-30. doi:10.1109/2.933500 (https://doi.org/10.1109%2F2.933500).", + "page_start": 53, + "page_end": 53, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Artificial intelligence\nArtificial intelligence ( AI ), in its broadest sense, is intelligence exhibited by machines, particularly computer systems. It is a field of research in computer science that develops and studies methods and software that enable machines to perceive their environment and use learning and intelligence to take actions that maximize their chances of achieving defined goals. [1] Such machines may be called AIs.\nHigh-profile applications of AI include advanced web search engines (e.g., Google Search); recommendation systems (used by YouTube, Amazon, and Netflix); virtual assistants (e.g., Google Assistant, Siri, and Alexa); autonomous vehicles (e.g., Waymo); generative and creative tools (e.g., ChatGPT and AI art); and superhuman play and analysis in strategy games (e.g., chess and Go). However, many AI applications are not perceived as AI: \"A lot of cutting edge AI has filtered into general applications, often without being called AI because once something becomes useful enough and common enough it's not labeled AI anymore.\" [2][3]\nVarious subfields of AI research are centered around particular goals and the use of particular tools. The traditional goals of AI research include reasoning, knowledge representation, planning, learning, natural language processing, perception, and support for robotics. [a] General intelligence-the ability to complete any task performed by a human on an at least equal level-is among the field's long-term goals. [4] To reach these goals, AI researchers have adapted and integrated a wide range of techniques, including search and mathematical optimization, formal logic, artificial neural networks, and methods based on statistics, operations research, and economics. [b] AI also draws upon psychology, linguistics, philosophy, neuroscience, and other fields. [5]", + "page_start": 0, + "page_end": 0, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Agents\nArtificial intelligent (AI) agents are software entities designed to perceive their environment, make decisions, and take actions autonomously to achieve specific goals. These agents can interact with users, their environment, or other agents. AI agents are used in various applications, including virtual assistants, chatbots, autonomous vehicles, game-playing systems, and industrial robotics. AI agents operate within the constraints of their programming, available computational resources, and hardware limitations. This means they are restricted to performing tasks within their defined scope and have finite memory and processing capabilities. In real-world applications, AI agents often face time constraints for decision-making and action execution. Many AI agents incorporate learning algorithms, enabling them to improve their performance over time through experience or training. Using machine learning, AI agents can adapt to new situations and optimise their behaviour for their designated tasks. [175][176][177]\nVincent van Gogh in watercolour created by generative AI software", + "page_start": 11, + "page_end": 11, + "source_file": "wikipedia3.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_HNI_2003.pdf", + "query": "How can I contact Investor Relations of HON industries through email ?", + "target_page": 63, + "target_passage": "E-mail: investorrelations@honi.com", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "I NVESTOR RELATIONS\nSend inquiries to:\nInvestor Relations\nHON INDUSTRIES Inc.\n414 East Third Street\nMuscatine, IA 52761\nTelephone: 563.264.7400\nFax: 563.264.7655\nE-mail: investorrelations@honi.com", + "page_start": 62, + "page_end": 62, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "T O O U R S T A K E H O L D E R S :\nWhen our company is appreciated by its members, favored by its customers, supported by its suppliers, respected by the public, and admired by its shareholders, this Vision is fulfilled.\nHON INDUSTRIES Inc. (HNI) 414 East Third Street, P.O. Box 1109, Muscatine, IA 52761-0071\nwww.honi.com", + "page_start": 63, + "page_end": 63, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "CORPORATE HEADQUARTERS\nHON INDUSTRIES Inc.\n414 East Third Street\nP.O. Box 1109\nMuscatine, IA 52761-0071\nTelephone: 563.264.7400\nFax: 563.264.7217\nWebsite: www.honi.com", + "page_start": 62, + "page_end": 62, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "Dear Shareholders:\nWe, the members of the HON INDUSTRIES Board of Directors, believe that integrity is central to good corporate governance. This belief is reflected in the HON INDUSTRIES vision statement (shown on the back of this annual report), adopted many years ago. Our Vision statement represents much more than a traditional 'mission,' and it goes much deeper than company policy. The beliefs and values represented in that document are the very foundation of our corporate culture, and guide the attitude and actions of every member, every day.\nFrom its beginnings, HON INDUSTRIES has sought to implement its vision through sound policies and practices, and by maintaining a strong Board composed predominantly of outside directors. We are fully committed to executing our responsibilities, and we will continue to maintain the company's long-standing tradition of an independent, well-informed, active, and engaged Board of Directors.\nOur board meetings and procedures have been developed and refined to encourage open and informed communication. The company's accounting policies have always been conservative and straightforward. The Board's three committees - Audit; Human Resources and Compensation; Public Policy and Corporate Governance - have consisted entirely of non-management directors for many years.\nDuring 2003, we have given significant attention to the newly released rules emanating from the Sarbanes-Oxley Act of 2002 and the New York Stock Exchange listing requirements - rules intended to improve corporate governance across the country. It is gratifying to report that HON INDUSTRIES governance practices were already in accord with the spirit of the rules.\nIt is an honor to serve as directors of HON INDUSTRIES. We are very proud to represent you, the shareholder, as we oversee the management of this great company. Please be assured that we intend to remain vigilant and focused on good corporate governance.", + "page_start": 60, + "page_end": 60, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "Stan A. Askren\nPresident, HON INDUSTRIES Inc.", + "page_start": 61, + "page_end": 61, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "Sincerely,\nThe HON INDUSTRIES Board of Directors\nStan A. Askren\nGary M. Christensen\nCheryl A. Francis\nRobert L. Katz\nDennis J. Martin\nJack D. Michaels\nJoseph Scalzo\nAbbie J. Smith\nRichard H. Stanley\nBrian E. Stern\nRonald V. Waters, III\n61\nHON INDUSTRIES Inc. and SUBSIDIARIES", + "page_start": 60, + "page_end": 61, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "TO OUR SHAREHOLDERS:\nLEFT: Stan A. Askren, PRESIDENT\nRIGHT: Jack D. Michaels, CHAIRMAN AND CHIEF EXECUTIVE OFFICER\nAs we celebrate our 60th year, HON INDUSTRIES has seen much change. The industry has changed. The world has changed. Our business has changed. What has not changed are the culture and values on which we were founded: integrity, fairness, and respect - in the treatment of others, continuous improvement, and responsiveness to those who buy our products and services. In our unique and powerful member-owner culture, throughout our history, every member has had an opportunity to participate in making the business better. We did so again in 2003.\nWe outperformed our peers. We grew our sales and profits. We gained market share by providing strong brands, innovative products and services, and greater value to our endusers. We continued to increase our gross margins, a direct result of our ongoing commitment to lean initiatives. We used our strong, positive cash flow to invest in our business for the long term and returned profits to shareholders. We accomplished all of this in a very challenging economy and market.\nAlthough we are proud of what we achieved, our philosophy of constructive discontent drives us to continue to challenge ourselves to do better. We believe to succeed in a business environment of ongoing change and continuous transformation we also must continue to change. Today, we are\nleaner, more focused, and have more clearly defined brands than ever before. Our challenge is to grow, aggressively and profitably, through market-driven solutions while maintaining focus on what we do best - operational excellence. Our transformation continues:", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "HON INDUSTRIES INC. OFFICERS\nJack D. Michaels\nChairman and Chief Executive Officer", + "page_start": 61, + "page_end": 61, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "Nature of Operations\nHON INDUSTRIES Inc., with its subsidiaries (the 'Company'), is a provider of office furniture and hearth products. Both industries are reportable segments; however, the Company's office furniture business is its principal line of business. Refer to the Operating Segment Information note for further information. Office furniture products are sold through a national system of dealers, wholesalers, mass merchandisers, warehouse clubs, retail superstores, end-user customers, and to federal and state governments. Dealer, wholesaler, and retail superstores are the major channels based on sales. Hearth products include electric, wood-, pellet-, and gas-burning factory-built fireplaces, fireplace inserts, stoves, and gas logs. These products are sold through a national system of dealers, wholesalers, large regional contractors, and Company-owned retail outlets. The Company's products are marketed predominantly in the United States and Canada. The Company exports select products to a limited number of markets outside North America, principally Latin America and the Caribbean, through its export subsidiary; however, based on sales, these activities are not significant.", + "page_start": 42, + "page_end": 42, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "afkljdf aojvoaipddddS EEKING I N V E S T O R S FOR A PERFECT MATCH\nJoin us in the dynamic, aggressive, profitable growth of HON INDUSTRIES.\nTHE BEST IS YET TO COME!\nManagement's Discussion and Analysis … 32 Consolidated Financial Statements and Notes … 39 Eleven-Year Summary … 56 Reports of Independent Auditors … 58 A Message from the Board of Directors … 61 Board of Directors and Officers … 62\nHON INDUSTRIES Inc. and SUBSIDIARIES", + "page_start": 30, + "page_end": 31, + "source_file": "NYSE_HNI_2003.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_HNI_2003.pdf", + "query": "What explains the decrease in net sales of HON industries in 2002 ?", + "target_page": 34, + "target_passage": "The decrease in 2002 was due to the decline in the office furniture market due to unstable economic conditions and the deletion of less profitable product lines in the hearth products segment", + "chunk_present": { + "presence": true, + "index": 3 + } + }, + "top_chunk": [ + { + "text": "HON INDUSTRIES Inc. and SUBSIDIARIES\n1993 = 54,156 6.43%. , = 45,127 5.78%. $, 1999 = 23,112. $, 1998 = $ 19,730. $, 1997 = $ 16,736. $, = $ 14,970. $, 1996 1995 = $ 14,536. $, 1994 1993 = $ 13,601. $, = $ 12,587. , 1999 = 64,248. , 1998 = 86,583. , 1997 = 37,838. , = 33,860. , 1996 1995 = 18,863. , 1994 1993 = 13,563. , = 17,338. , 1999 = . , 1998 = 106,313. , 1997 = 86,955. , = 68,094. , 1996 1995 = 41,098. , 1994 1993 = . , = 45,127. , 1999 = 87,360 18.14%. , 1998 = 25.20%. , 1997 = 27.43%. , = 29.06%. , 1996 1995 = 20.00%. , 1994 1993 = 54,156 28.95%. , = 26.35%. $, 1999 = 65,453. $, 1998 = $ 52,999. $, 1997 = $ 35,610. $, = $ 25,252. $, 1996 1995 = $ 21,416. $, 1994 1993 = $ 19,042. $, = $ 16,631. , 1999 = 26.46%. , 1998 = 18.56%. , 1997 = 19.25%. , = 21.98%. , 1996 1995 = 35.37%. , 1994 1993 = 25.11%. , = 27.89%. , 1999 = 73.54%. , 1998 = 81.44%. , 1997 = 80.75%. , = 78.02%. , 1996 1995 = 64.63%. , 1994 1993 = 74.89%. , = 72.11%. $, 1999 = 316,556. $, 1998 = $ 290,329. $, 1997 = $ 295,150. $, = $ 205,527. $, 1996 1995 = $ 194,183. $, 1994", + "page_start": 56, + "page_end": 56, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "HON INDUSTRIES Inc. and SUBSIDIARIES\n1993 = $ 188,810. $, = $ 188,419. , 1999 = 225,123. , 1998 = 217,438. , 1997 = 200,759. , = 152,553. , 1996 1995 = 128,915. , 1994 1993 = 111,093. , = 110,759. , 1999 = 91,433. , 1998 = 72,891. , 1997 = 94,391. , = 52,974. , 1996 1995 = 65,268. , 1994 1993 = 77,717. , = 77,660. , 1999 = 455,591. , 1998 = 444,177. , 1997 = 341,030. , = 234,616. , 1996 1995 = 210,033. , 1994 1993 = 177,844. , = 157,770. , 1999 = 906,723. , 1998 = 864,469. , 1997 = 754,673. , = 513,514. , 1996 1995 = 409,518. , 1994 1993 = 372,568. , = 352,405. , 1999 = 16.94%. , 1998 = 23.74%. , 1997 = 28.27%. , = 25.93%. , 1996 1995 = 17.91%. , 1994 1993 = 24.72%. , = 22.14%. $, 1999 = . $, 1998 = $ 135,563. $, 1997 = $ 134,511. $, = $ 77,605. $, 1996 1995 = $ 42,581. $, 1994 1993 = $ 45,877. $, = $ 45,916. , 1999 = 124,173 501,271. , 1998 = 462,022. , 1997 = 381,662. , = 252,397. , 1996 1995 = 216,235. , 1994 1993 = 194,640. , = 179,553. , 1999 = 416,034. , 1998 = 351,786. , 1997 = 265,203. , = 227,365. , 1996 1995 = 193,505. , 1994 1993 = 174,642. , = 161,079. , 1999 = 1.41. , 1998 = 1.34. , 1997 = 1.47. , = 1.35. , 1996", + "page_start": 56, + "page_end": 56, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "HON INDUSTRIES Inc. and SUBSIDIARIES\n1993 = 573,392. , = 537,828. , 1999 = 564,319. , 1998 = 533,632. , 1997 = 429,556. , = 318,639. , 1996 1995 = 268,419. , 1994 1993 = 272,606. , = 242,498. , 1999 = 9,712. , 1998 = 10,658. , 1997 = 8,179. , = 4,173. , 1996 1995 = 3,569. , 1994 1993 = 3,248. , = 3,120. , 1999 = 137,575. , 1998 = 170,109. , 1997 = 139,128. , = 105,267. , 1996 1995 = 65,517. , 1994 1993 = 86,338. , = 70,854. , 1999 = 7.64%. , 1998 = 9.97%. , 1997 = 10.21%. , = 10.55%. , 1996 1995 = 7.34%. , 1994 1993 = 10.21%. , = 9.08%. $, 1999 = 50,215. $, 1998 = $ 63,796. $, 1997 = $ 52,173. $, = $ 37,173. $, 1996 1995 = $ 24,419. $, 1994 1993 = $ 31,945. $, = $ 26,216. , 1999 = 36.5%. , 1998 = 37.50%. , 1997 = 37.50%. , = 35.31%. , 1996 1995 = 37.27%. , 1994 1993 = 37.00%. , = 37.00%. $, 1999 = 87,360. $, 1998 = $ 106,313. $, 1997 = $ 86,955. $, = $ 68,094. $, 1996 1995 = $ 41,098. $, 1994 1993 = $ 54,393. $, = $ 44,638. , 1999 = 87,360 4.85%. , 1998 = 106,313 6.23%. , 1997 = 86,955 6.38%. , = 68,094 6.82%. , 1996 1995 = 41,098 4.60%. , 1994", + "page_start": 56, + "page_end": 56, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "NET SALES\nNet sales increased 3.7% in 2003 and decreased 5.6% in 2002. The increase in 2003 was due to the extra week in 2003 as a result of the Company's 52/53-week fiscal year and strong performance in the hearth products segment. The decrease in 2002 was due to the decline in the office furniture market due to unstable economic conditions and the deletion of less profitable product lines in the hearth products segment.", + "page_start": 33, + "page_end": 33, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "HON INDUSTRIES Inc. and SUBSIDIARIES\n1995 = 1.51. , 1994 1993 = 1.70. , = 1.70. , 1999 = 60,171,753. , 1998 = 61,289,618. , 1997 = 61,659,316. , = 59,426,530. , 1996 1995 = 60,788,674. , 1994 1993 = 61,349,206. , = 63,351,692. , 1999 = 60,854,579. , 1998 = . , 1997 = 59,779,508. , = 60,228,590. , 1996 1995 = 60,991,284. , 1994 1993 = . , = 64,181,088. , 1999 = . , 1998 = 61,649,531. , 1997 = . , = . , 1996 1995 = . , 1994 1993 = 62,435,450. , = . , 1999 = 6,737. , 1998 = 5,877. , 1997 = 5,399. , = 5,319 $ 44,684. , 1996 1995 = 5,479 $ 53,879. , 1994 1993 = 5,556. , = 4,653. $, 1999 = 71,474. $, 1998 = $ 149,717. $, 1997 = $ 85,491. $, = . $, 1996 1995 = . $, 1994 1993 = $ 35,005. $, = $ 27,541. , 1999 = 10,095. , 1998 = 9,824 (b). , 1997 = 9,390 (b). , = 6,502 (b). , 1996 1995 = 5,933. , 1994 1993 = 6,131. , = 6,257\n(a) Per SFAS No. 142, 'Goodwill and Other Intangible Assets,' the Company has ceased recoding of goodwill and indefinite-lived Intangible amortization.\n(b) Includes acquisitions completed during year.\n57\nHON INDUSTRIES Inc. and SUBSIDIARIES", + "page_start": 56, + "page_end": 57, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "HON INDUSTRIES Inc. and SUBSIDIARIES\n$, 1999 = 1.44. $, 1998 = $ 1.72. $, 1997 = $ 1.45. $, = $ 1.13. $, 1996 1995 = $ .67. $, 1994 1993 = $ .87. $, = $ .69. , 1999 = -. , 1998 = -. , 1997 = -. , = -. , 1996 1995 = -. , 1994 1993 = -. , = .01. , 1999 = 1.44. , 1998 = 1.72. , 1997 = 1.45. , = 1.13. , 1996 1995 = .67. , 1994 1993 = .87. , = .70. , 1999 = 1.44. , 1998 = 1.72. , 1997 = 1.45. , = 1.13. , 1996 1995 = .67. , 1994 1993 = .87. , = .70. , 1999 = .38. , 1998 = .32. , 1997 = .28. , = .25. , 1996 1995 = .24. , 1994 1993 = .22. , = .20. , 1999 = 8.33. , 1998 = 7.54. , 1997 = 6.19. , = 4.25. , 1996 1995 = 3.56. , 1994 1993 = 3.17. , = 2.83. , 1999 = 1.52. , 1998 = 1.19. , 1997 = 1.53. , = .89. , 1996 1995 = 1.07. , 1994 1993 = 1.27. , = 1.23. $, 1999 = . $, 1998 = . $, 1997 = $. $, = $ 998,135. $, 1996 1995 = $ 893,119. $, 1994 1993 = . $, = . , 1999 = 1,800,931 1,236,612. , 1998 = $ 1,706,628 1,172,997. , 1997 = 1,362,713. , = . , 1996 1995 = . , 1994 1993 = $ 845,998. , = $ 780,326. , 1999 = . , 1998 = . , 1997 = 933,157. , = 679,496. , 1996 1995 = 624,700. , 1994", + "page_start": 56, + "page_end": 56, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "Shareholders' Equity and Earnings Per Share\nForeign currency translation adjustments - net of tax, 2003 = $ 45. Foreign currency translation adjustments - net of tax, 2002 = $ -. Foreign currency translation adjustments - net of tax, 2001 = $ 109. Change in unrealized gains (losses) on marketable securities - net of tax, 2003 = (690). Change in unrealized gains (losses) on marketable securities - net of tax, 2002 = (322). Change in unrealized gains (losses) on marketable securities - net of tax, 2001 = 42. Other comprehensive income (loss), 2003 = $ (645). Other comprehensive income (loss), 2002 = $ (322). Other comprehensive income (loss), 2001 = $ 151\nHON INDUSTRIES Inc. and SUBSIDIARIES\nIn May 1997, the Company registered 400,000 shares of its common stock under its 1997 Equity Plan for Non-Employee Directors. This plan permits the Company to issue to its non-employee directors options to purchase shares of Company common stock, restricted stock of the Company, and awards of Company stock. The plan also permits non-employee directors to elect to receive all or a portion of their annual retainers and other compensation in the form of shares of Company common stock. During 2003, 2002, and 2001, 10,922; 11,958; and 8,662 shares of Company common stock were issued under the plan, respectively.\nCash dividends declared and paid per share for each year are:\nCommon shares, 2003 = $ .52. Common shares, 2002 = $ .50. Common shares, 2001 = $ .48", + "page_start": 48, + "page_end": 49, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "TO OUR SHAREHOLDERS:\nLEFT: Stan A. Askren, PRESIDENT\nRIGHT: Jack D. Michaels, CHAIRMAN AND CHIEF EXECUTIVE OFFICER\nAs we celebrate our 60th year, HON INDUSTRIES has seen much change. The industry has changed. The world has changed. Our business has changed. What has not changed are the culture and values on which we were founded: integrity, fairness, and respect - in the treatment of others, continuous improvement, and responsiveness to those who buy our products and services. In our unique and powerful member-owner culture, throughout our history, every member has had an opportunity to participate in making the business better. We did so again in 2003.\nWe outperformed our peers. We grew our sales and profits. We gained market share by providing strong brands, innovative products and services, and greater value to our endusers. We continued to increase our gross margins, a direct result of our ongoing commitment to lean initiatives. We used our strong, positive cash flow to invest in our business for the long term and returned profits to shareholders. We accomplished all of this in a very challenging economy and market.\nAlthough we are proud of what we achieved, our philosophy of constructive discontent drives us to continue to challenge ourselves to do better. We believe to succeed in a business environment of ongoing change and continuous transformation we also must continue to change. Today, we are\nleaner, more focused, and have more clearly defined brands than ever before. Our challenge is to grow, aggressively and profitably, through market-driven solutions while maintaining focus on what we do best - operational excellence. Our transformation continues:", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "Nature of Operations\nHON INDUSTRIES Inc., with its subsidiaries (the 'Company'), is a provider of office furniture and hearth products. Both industries are reportable segments; however, the Company's office furniture business is its principal line of business. Refer to the Operating Segment Information note for further information. Office furniture products are sold through a national system of dealers, wholesalers, mass merchandisers, warehouse clubs, retail superstores, end-user customers, and to federal and state governments. Dealer, wholesaler, and retail superstores are the major channels based on sales. Hearth products include electric, wood-, pellet-, and gas-burning factory-built fireplaces, fireplace inserts, stoves, and gas logs. These products are sold through a national system of dealers, wholesalers, large regional contractors, and Company-owned retail outlets. The Company's products are marketed predominantly in the United States and Canada. The Company exports select products to a limited number of markets outside North America, principally Latin America and the Caribbean, through its export subsidiary; however, based on sales, these activities are not significant.", + "page_start": 42, + "page_end": 42, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "Restructuring Related Charges\nDuring the second quarter of 2001, the Company recorded a pretax charge of $24.0 million or $0.26 per diluted share for a restructuring plan that involved consolidating physical facilities, discontinuing low-volume product lines, and reductions of workforce. Included in the charge was the closedown of three of its office furniture facilities located in Williamsport, Pennsylvania; Tupelo, Mississippi; and Santa Ana, California. Approximately 500 members were terminated and received severance due to the closedown of these facilities. During the second quarter of 2002, a restructuring credit of approximately $2.4 million was taken back into income relating to this charge. This was mainly due to the fact that the Company was able to exit a lease with a lessor at more favorable terms than originally estimated and the Company's ability to minimize the number of members terminated as compared to the original plan.\nThe following table details the change in restructuring reserve for the last three years:\n46\nHON INDUSTRIES Inc. and SUBSIDIARIES", + "page_start": 45, + "page_end": 46, + "source_file": "NYSE_HNI_2003.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_ATRI_2003.pdf", + "query": "What operations were discontinued in 1997 by Atrion Corp ?", + "target_page": 17, + "target_passage": "During 1997, the Company sold all of its natural gas operations. ", + "chunk_present": { + "presence": true, + "index": 3 + } + }, + "top_chunk": [ + { + "text": "C o r p o r a t e O f f i c e :\nAtrion Corporation One Allentown Parkway Allen, Texas 75002 (972) 390-9800\nwww.atrioncorp.com", + "page_start": 30, + "page_end": 30, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "DISCONTINUED OPERATIONS\nDuring 1997, the Company sold all of its natural gas operations. The financial statements presented herein reflect the Company's natural gas operations as discontinued operations for all periods presented. The financial statements also reflect an after-tax gain on disposal of these discontinued operations of $ .2 million, or $ .10 per basic and $ .09 per diluted share, in both 2003 and 2002, and $5.5 million, or $2.70 per basic and $2.42 per diluted share, in 2001.\nIn addition to the initial consideration received in 1997 upon the sale of the natural gas operations, certain annual contingent deferred payments of up to $250,000 per year were to be paid to the Company over an eight-year period which began in 1999, with the amount paid each year to be dependent upon revenues received by the purchaser from certain gas transportation contracts. The Company received deferred payments of $250,000 each, before tax, from the purchaser in April 2003, 2002 and 2001 which are reflected in each year as a gain from discontinued operations of $165,000, net of tax. The 2001 gain also includes a $5,327,000 non-cash gain from reversal of a reserve established when the Company disposed of its natural gas operations in 1997. This reversal in the third quarter of 2001 followed the resolution of an outstanding contingency related to the sale of those assets.\n25\nM A N A G E M E N T ' S D I S C U S S I O N", + "page_start": 26, + "page_end": 27, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES\nAtrion Corporation designs, develops, manufactures and markets products primarily for the medical and health care industry. The Company markets its products throughout the United States and internationally. The Company's customers include hospitals, distributors, and other manufacturers. As of December 31, 2003, the principal subsidiaries of the Company through which it conducted its operations were Atrion Medical Products, Inc. ('Atrion Medical Products'), Halkey-Roberts Corporation ('Halkey-Roberts') and Quest Medical, Inc. ('Quest Medical').", + "page_start": 13, + "page_end": 13, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "DISCONTINUED OPERATIONS 3\nDuring 1997, the Company sold all of its natural gas operations. The consolidated financial statements presented herein reflect the Company's natural gas operations as discontinued operations for all periods presented. The consolidated financial statements reflect a gain on disposal of these discontinued operations of $165,000 in 2003 and 2002, and $5.5 million in 2001. These amounts are net of income tax expense of $85,000 in 2003 and 2002, and include an income tax benefit of $5.1 million in 2001.\nIn addition to the initial consideration received in 1997 upon the sale of the natural gas operations, certain annual contingent deferred payments of up to $250,000 per year were to be paid to the Company over an eight-year period which began in 1999, with the amount paid each year to be dependent upon revenues received by the purchaser from certain gas transportation contracts. The Company received deferred payments of $250,000 each, before tax, from the purchaser in April 2003, 2002 and 2001 which are reflected in each year as a gain from discontinued operations of $165,000, net of tax. The 2001 gain also includes a $5.3 million non-cash gain from reversal of a reserve established when the Company disposed of its natural gas operations in 1997. This reversal in the third quarter of 2001 followed the resolution of an outstanding contingency related to the sale of those assets.", + "page_start": 16, + "page_end": 16, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "To the Stockholders and the Board of Directors of Atrion Corporation:\nWe have audited the accompanying consolidated balance sheets of Atrion Corporation (a Delaware corporation) and Subsidiaries as of December 31, 2003 and 2002, and the related consolidated statements of income, changes in stockholders' equity and cash flows for the years then ended. These financial statements are the responsibility of the Company's management. Our responsibility is to express an opinion on these financial statements based on our audit. The financial statements of Atrion Corporation and Subsidiaries as of and for the year in the period ended December 31, 2001, were audited by other auditors who have ceased operations. Those auditors expressed an unqualified opinion on those financial statements in their report dated February 25, 2002.\nWe conducted our audits in accordance with auditing standards generally accepted in the United States of America. Those standards require that we plan and perform the audit to obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit includes examining, on a test basis, evidence supporting the amounts and disclosures in the financial statements. An audit also includes assessing the accounting principles used and significant estimates made by management as well as evaluating the overall financial statement presentation. We believe that our audits provide a reasonable basis for our opinion.\nIn our opinion, the financial statements referred to above present fairly, in all material respects, the consolidated financial position of Atrion Corporation and Subsidiaries as of December 31, 2003 and 2002, and the consolidated results of their operations and their consolidated cash flows for the years then ended in conformity with accounting principles generally accepted in the United States of America.", + "page_start": 24, + "page_end": 24, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "Discontinued Operations\nA discontinued operation is a component of our business that has operations and cash flows that are clearly distinguished from the rest of Rogers and:\nGLYPH<129> represents a separate major line of business\nGLYPH<129> is part of a single coordinated plan to dispose of a separate major line of business, or\nGLYPH<129> is a subsidiary we have acquired with the intention to re-sell.\nWhen we classify a component as a discontinued operation, we restate our comparative income and comprehensive income as though the operation had been discontinued from the start of the comparative year.\nSee note 6 for information about discontinued operations.", + "page_start": 104, + "page_end": 104, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "NOTE 3 - DISCONTINUED OPERATIONS\nIn June 2003, the Company entered into an agreement to sell the Golden Nugget Subsidiaries, including substantially all of the assets and liabilities of those resorts, for approximately $215 million, subject to certain working capital adjustments. This transaction closed in January 2004, with net proceeds to the Company of $210 million. Also in June 2003, the Company ceased operations of PLAYMGMMIRAGE.com, its online gaming website ('Online'). In February 2004, the Company entered into an agreement to sell the subsidiaries that own\nand operate MGM Grand Australia. This transaction closed in July 2004 with net proceeds to the Company of $136 million.\nThe results of the Golden Nugget Subsidiaries, Online and MGM Grand Australia are classified as discontinued operations in the accompanying consolidated statements of income for all periods presented. Net revenues of discontinued operations were $45 million, $231 million and $222 million, respectively, for the years ended December 31, 2004, 2003 and 2002. Included in income from discontinued operations is an allocation of interest expense based on the ratio of the net assets of the discontinued operations to the total consolidated net assets and debt of the Company. Interest allocated to discontinued operations was $2 million, $9 million and $9 million for the years ended December 31, 2004, 2003 and 2002, respectively. Included in discontinued operations for the year ended December 31, 2003 is a loss on disposal of Online of $7 million relating primarily to unrecoverable costs of computer hardware and software. Included in the tax benefit from discontinued operations for the year ended December 31, 2003 is $2 million of previously unrecognized tax benefits relating to prior year operating losses of Online. Included in discontinued operations for the year ended December 31, 2004 is a gain on the sale of the Golden Nugget Subsidiaries of $8 million and a gain on sale of the MGM Grand Australia Subsidiaries of $74 million.", + "page_start": 61, + "page_end": 62, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "To the Stockholders and the Board of Directors of Atrion Corporation:\nAs discussed above, the financial statements of Atrion Corporation and Subsidiaries as of December 31, 2001, and for the year then ended were audited by other auditors who have ceased operations. As described in Note 2, these financial statements have been revised to include the transitional disclosures required by Statement of Financial Accounting Standards No. 142, Goodwill and Other Intangible Assets, which was adopted by the Company as of January 1, 2002. Our audit procedures with respect to the disclosures in Note 2 with respect to 2001 included agreeing the previously reported net income to the previously issued financial statements and the adjustments to reported net income representing amortization expense (including any related tax effects) recognized in those periods related to goodwill to the Company's underlying records obtained from management. We also tested the mathematical accuracy of the reconciliation of adjusted net income to reported net income, and the related income-per-share amounts. In our opinion, the disclosures for 2001 in Note 2 are appropriate. However, we were not engaged to audit, review, or apply any procedures to the 2001 financial statements of the Company other than with respect to such disclosures and, accordingly, we do not express an opinion or any other form of assurance on the 2001 financial statements taken as a whole.\nGrant Thornton LLP Dallas, Texas February 13, 2004\nThis is a copy of the audit report previously issued by Arthur Andersen LLP in connection with Atrion Corporation and Subsidiaries Annual Report for the year ended December 31, 2001. This audit report has not been reissued by Arthur Andersen LLP in connection with this Annual Report. The consolidated balance sheets as of December 31, 2001 and 2000 and the consolidated statements of income and cash flows for the years ended December 31, 2000 and 1999 referred to in this report have not been included in the accompanying financial statements.\nWe have audited the accompanying consolidated balance sheets of Atrion Corporation (a Delaware corporation) and subsidiaries as of December 31, 2001 and 2000 and the related consolidated statements of income and cash flows for each of the three years in the period ended December 31, 2001. These financial statements are the responsibility of the Company's management. Our responsibility is to express an opinion on these financial statements based on our audits.", + "page_start": 24, + "page_end": 24, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "F o r m 1 0 - K\nA copy of the Company's 2003 Annual Report on Form 10-K, as filed with the Securities and Exchange Commission, may be obtained by any stockholder without charge by written request to: Corporate Secretary Atrion Corporation One Allentown Parkway Allen, Texas 75002", + "page_start": 30, + "page_end": 30, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "Discontinued Operations\nIn 2012, we closed our Video store operations, which offered DVD and video game rentals of equipment and sales in many of our corporateowned retail locations. The results of the Video business were treated as discontinued operations for accounting and reporting purposes. See 'Review of Consolidated Performance'.", + "page_start": 47, + "page_end": 47, + "source_file": "NYSE_RCI_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_ATRI_2003.pdf", + "query": "How much share of Atrion's revenues did its major customer representin in 2003 ? ", + "target_page": 21, + "target_passage": "The Company had one major customer which represented approximately $9.1 million (14.4 percent", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "2003 Revenues by Product Line\nOur financial performance earned recognition from Investors Business Daily , which ranked Atrion sixth on its list of Market-Leading Medical Stocks in November 2003. During the year, our stock price more than doubled, ending the year at $45.44, up from $22.50 at year-end 2002. Over the last five years, our stock price has increased by 468 percent.", + "page_start": 5, + "page_end": 5, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "REVENUES FROM MAJOR CUSTOMERS 9\nThe Company had one major customer which represented approximately $9.1 million (14.4 percent), $7.4 million (12.4 percent) and $11.0 million (19.1 percent) of the Company's operating revenues during the years 2003, 2002 and 2001, respectively.", + "page_start": 20, + "page_end": 20, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "We exceeded last year's earnings by more than 15%.\nAgain.\n2003 A N N U A L R E P O R T\nIn recent years, the economic climate has presented significant challenges to growth-and, in some cases, survival-for American businesses. The companies that have fared well are those with solid financial foundations and sound growth strategies that provide a measure of protection against the changing winds of the economy. Atrion is one of those companies. For the past five years, we have produced earnings per share growth of more than 15 percent each year. Despite fluctuations in our markets and product demand, we have continued to return value to our stockholders through strong earnings growth, year after year. As a leading provider of medical devices and components to niche markets in the health care industry, we are committed to doing everything we can to continue that level of performance.\nF I N A N C I A L H I G H L I G H T S\n1\nL E T T E R T O S T O C K H O L D E R S\n2\nF I N A N C I A L I N F O R M A T I O N\n7\nC O R P O R A T E I N F O R M A T I O N 2 8\n2 0 0 3 F I N A N C I A L H I G H L I G H T S", + "page_start": 0, + "page_end": 2, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "F o r m 1 0 - K\nA copy of the Company's 2003 Annual Report on Form 10-K, as filed with the Securities and Exchange Commission, may be obtained by any stockholder without charge by written request to: Corporate Secretary Atrion Corporation One Allentown Parkway Allen, Texas 75002", + "page_start": 30, + "page_end": 30, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES\nAtrion Corporation designs, develops, manufactures and markets products primarily for the medical and health care industry. The Company markets its products throughout the United States and internationally. The Company's customers include hospitals, distributors, and other manufacturers. As of December 31, 2003, the principal subsidiaries of the Company through which it conducted its operations were Atrion Medical Products, Inc. ('Atrion Medical Products'), Halkey-Roberts Corporation ('Halkey-Roberts') and Quest Medical, Inc. ('Quest Medical').", + "page_start": 13, + "page_end": 13, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "S t o c k I n f o r m a t i o n\nThe Company's common stock is traded on The Nasdaq Stock Market (Symbol: ATRI). As of March 8, 2004, there were approximately 1,200 stockholders, including beneficial owners holding shares in nominee or 'street' name. The table below sets forth the high and low closing prices on The Nasdaq Stock Market and the quarterly dividends per share declared by the Company for each quarter of 2002 and 2003.\nMarch 31, = $. March 31, High = 38.14. March 31, Low = 26.91. March 31, Dividends = $ -. June 30, = . June 30, High = 32.51. June 30, Low = 26.82. June 30, Dividends = -. September 30, = . September 30, High = 28.09. September 30, Low = 18.31. September 30, Dividends = -. December 31, = . December 31, High = 23.90. December 31, Low = 17.31. December 31, Dividends = -. 2003 Quarter Ended, = . 2003 Quarter Ended, High = High. 2003 Quarter Ended, Low = Low. 2003 Quarter Ended, Dividends = Dividends. March 31, = $. March 31, High = 22.85. March 31, Low = 17.95. March 31, Dividends = $ -. June 30, = . June 30, High = 30.80. June 30, Low = 22.75. June 30, Dividends = -. September 30, = . September 30, High = 45.20. September 30, Low = 26.80. September 30, Dividends = .12. December 31, = . December 31, High = 50.00. December 31, Low = 40.00. December 31, Dividends = .12\nThe Company paid no cash dividends on its common stock during 2002. In the third quarter of 2003 the Company began paying quarterly cash dividends and presently plans to pay quarterly cash dividends in the future.\nMPS and LacriCATH are registered trademarks of Atrion Corporation", + "page_start": 30, + "page_end": 30, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "To the Stockholders and the Board of Directors of Atrion Corporation:\nWe have audited the accompanying consolidated balance sheets of Atrion Corporation (a Delaware corporation) and Subsidiaries as of December 31, 2003 and 2002, and the related consolidated statements of income, changes in stockholders' equity and cash flows for the years then ended. These financial statements are the responsibility of the Company's management. Our responsibility is to express an opinion on these financial statements based on our audit. The financial statements of Atrion Corporation and Subsidiaries as of and for the year in the period ended December 31, 2001, were audited by other auditors who have ceased operations. Those auditors expressed an unqualified opinion on those financial statements in their report dated February 25, 2002.\nWe conducted our audits in accordance with auditing standards generally accepted in the United States of America. Those standards require that we plan and perform the audit to obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit includes examining, on a test basis, evidence supporting the amounts and disclosures in the financial statements. An audit also includes assessing the accounting principles used and significant estimates made by management as well as evaluating the overall financial statement presentation. We believe that our audits provide a reasonable basis for our opinion.\nIn our opinion, the financial statements referred to above present fairly, in all material respects, the consolidated financial position of Atrion Corporation and Subsidiaries as of December 31, 2003 and 2002, and the consolidated results of their operations and their consolidated cash flows for the years then ended in conformity with accounting principles generally accepted in the United States of America.", + "page_start": 24, + "page_end": 24, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "We manage our assets and resources carefully.\nOur financial strategy centers on building the strength and stability that will position our company for ongoing growth. We approach the management of our resources with discipline and diligence, striking the balance that allows us to accomplish our objectives: Funding the current needs of the business, maintaining a strong financial foundation, and investing in the resources, technology and assets that will ensure operating efficiency and fuel future growth. The soundness of this strategy was reflected once again in our financial results for 2003.\nFor the fifth consecutive year, Atrion's earnings per diluted share from continuing operations increased by more than 15 percent, rising from $2.18 in 2002 to $2.66 in 2003, a 22 percent improvement. In light of the economic pressures which have challenged virtually every business in recent years, we view five consecutive years of EPS growth-ranging from 16 percent to over 50 percent-as a sign of solid financial strength and a testament to the viability of our strategy. Including a gain from discontinued operations of $ .09 per share, net income totaled $2.75 per diluted share for 2003.\nRevenues for 2003 increased five percent to $62.8 million, from $59.5 million in the prior year. Return on equity (a) , which provides a good indication of how well we are utilizing investors' dollars, has steadily increased in recent years, from five percent in 1999 to 12 percent in 2003. This compares favorably to the average return on equity for our industry, reported at 10.7 percent by statistical research sources.\nThe company's ability to generate strong cash flow continued to flourish in 2003. This is a key strength for our company, as it enables us to pursue a number of value-creating initiatives.\n· We initiated the payment of quarterly dividends on the company's common stock in September 2003. Recent changes in tax laws make this an efficient avenue for providing a return to our shareholders and, with continuing growth in earnings and cash flow, we plan to increase the dividend periodically.\n· We repurchased 193,814 shares of our common stock in 2003. Over the last five years, we have repurchased nearly two million shares of our stock, a strategy we regard as a wise investment for our company and our stockholders.\n· We reduced debt by $6 million, from $10.3 million at the end of 2002 to $4.3 million at year-end 2003.\n2", + "page_start": 3, + "page_end": 3, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "2003 compared to 2002\nTotal revenue was $105.9 million in 2003, an increase of $12.9 million or 13.9%. Total revenues included $70.0 million of wireless revenues, an increase of $12.0 million or 20.7%; wireline revenues of $29.0 million, an increase of $0.3 million or 0.9%; and other revenues of $7.0 million, an increase of $0.6 million or 9.7%.\nWithin wireless revenues, the PCS operation contributed $69.8 million, an increase of $11.6 million, or 20.8%. PCS service revenues were $44.4 million, an increase of $10.9 million or 32.4%. Service revenue growth was driven by the increase in subscribers, totaling 85,139 at December 31, 2003, an increase of 17,297 or 25.5%, compared to 67,842 subscribers at year-end 2002. The company had churn of 2.1% in 2003 compared to 2.8% in 2002. The decline in the churn rate is the result of tightening the credit screening for new subscribers as well as continued efforts to improve the after sales support. Competition in the wireless industry continues to have a significant impact on the results of the Company's PCS operation.\nPCS travel revenue, including reseller revenue, which is compensation between Sprint and its PCS Affiliates for use of the other party's network, was $16.8 million, an increase of $0.3 million or 1.8%. Travel revenue is impacted by the geographic size of the Company's network service area, the overall number of Sprint wireless customers, their travel patterns and the travel exchange rate. The rate received on travel was $0.058 per minute in 2003, compared to $0.10 per minute in 2002. As a part of the amended management agreement signed on January 30, 2004, Sprint and the Company agreed to maintain the travel rate at $0.058 per minute through December 31, 2006.\n45\n■\n2003 ANNUAL REPORT", + "page_start": 46, + "page_end": 46, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "Significant Customer\nOne office furniture customer accounted for approximately 13% of consolidated net sales in 2003 and 14% in 2002 and 2001.", + "page_start": 52, + "page_end": 52, + "source_file": "NYSE_HNI_2003.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_ATRI_2003.pdf", + "query": "What was Atrion's gross profit in 2003 (in thousands) ? ", + "target_page": 10, + "target_passage": "Gross Profit 22,239", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "2003 Revenues by Product Line\nOur financial performance earned recognition from Investors Business Daily , which ranked Atrion sixth on its list of Market-Leading Medical Stocks in November 2003. During the year, our stock price more than doubled, ending the year at $45.44, up from $22.50 at year-end 2002. Over the last five years, our stock price has increased by 468 percent.", + "page_start": 5, + "page_end": 5, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "We exceeded last year's earnings by more than 15%.\nAgain.\n2003 A N N U A L R E P O R T\nIn recent years, the economic climate has presented significant challenges to growth-and, in some cases, survival-for American businesses. The companies that have fared well are those with solid financial foundations and sound growth strategies that provide a measure of protection against the changing winds of the economy. Atrion is one of those companies. For the past five years, we have produced earnings per share growth of more than 15 percent each year. Despite fluctuations in our markets and product demand, we have continued to return value to our stockholders through strong earnings growth, year after year. As a leading provider of medical devices and components to niche markets in the health care industry, we are committed to doing everything we can to continue that level of performance.\nF I N A N C I A L H I G H L I G H T S\n1\nL E T T E R T O S T O C K H O L D E R S\n2\nF I N A N C I A L I N F O R M A T I O N\n7\nC O R P O R A T E I N F O R M A T I O N 2 8\n2 0 0 3 F I N A N C I A L H I G H L I G H T S", + "page_start": 0, + "page_end": 2, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "F o r m 1 0 - K\nA copy of the Company's 2003 Annual Report on Form 10-K, as filed with the Securities and Exchange Commission, may be obtained by any stockholder without charge by written request to: Corporate Secretary Atrion Corporation One Allentown Parkway Allen, Texas 75002", + "page_start": 30, + "page_end": 30, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "S t o c k I n f o r m a t i o n\nThe Company's common stock is traded on The Nasdaq Stock Market (Symbol: ATRI). As of March 8, 2004, there were approximately 1,200 stockholders, including beneficial owners holding shares in nominee or 'street' name. The table below sets forth the high and low closing prices on The Nasdaq Stock Market and the quarterly dividends per share declared by the Company for each quarter of 2002 and 2003.\nMarch 31, = $. March 31, High = 38.14. March 31, Low = 26.91. March 31, Dividends = $ -. June 30, = . June 30, High = 32.51. June 30, Low = 26.82. June 30, Dividends = -. September 30, = . September 30, High = 28.09. September 30, Low = 18.31. September 30, Dividends = -. December 31, = . December 31, High = 23.90. December 31, Low = 17.31. December 31, Dividends = -. 2003 Quarter Ended, = . 2003 Quarter Ended, High = High. 2003 Quarter Ended, Low = Low. 2003 Quarter Ended, Dividends = Dividends. March 31, = $. March 31, High = 22.85. March 31, Low = 17.95. March 31, Dividends = $ -. June 30, = . June 30, High = 30.80. June 30, Low = 22.75. June 30, Dividends = -. September 30, = . September 30, High = 45.20. September 30, Low = 26.80. September 30, Dividends = .12. December 31, = . December 31, High = 50.00. December 31, Low = 40.00. December 31, Dividends = .12\nThe Company paid no cash dividends on its common stock during 2002. In the third quarter of 2003 the Company began paying quarterly cash dividends and presently plans to pay quarterly cash dividends in the future.\nMPS and LacriCATH are registered trademarks of Atrion Corporation", + "page_start": 30, + "page_end": 30, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "GROSS PROFIT\nGross profit as a percent of net sales improved 1.0 percentage point in 2003 as compared to fiscal 2002 and 1.3 percentage points in 2002 as compared to 2001. The improvement in both periods was a result of the continued net benefits of rapid continuous improvement, restructuring initiatives, business simplification, new products, and improved price realization. Included in 2003 gross profit was $6.7 million of accelerated depreciation, which reduced gross profits 0.4 percentage points. The Company expects to mitigate any future increases in material costs through various initiatives, including alternative materials and suppliers and its rapid continuous improvement program.", + "page_start": 33, + "page_end": 33, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "RESULTS OF OPERATIONS\nThe Company's cost of goods sold was $40.6 million in 2003, compared with $39.2 million in 2002 and $35.8 million in 2001. The increase in cost of goods sold for 2003 over 2002 was primarily related to the increase in revenues discussed above and increased insurance costs partially offset by an improvement in manufacturing variances resulting from increased production volumes. The increase in cost of goods sold for 2002 over 2001 was primarily related to a shift in product mix, which resulted in lower gross margins, and the increase in revenues discussed above.\nGross profit was $22.2 million in 2003, compared with $20.3 million in 2002 and $21.8 million in 2001. The Company's gross profit in 2003 was 35 percent of revenues compared with 34 percent of revenues in 2002 and 38 percent of revenues in 2001. The increase in gross profit percentage in 2003\n24\nfrom the prior year was primarily due to the above-mentioned improvement in manufacturing variances. The decline in gross profit percentage in 2002 from the prior year was primarily due to the unfavorable shift in product mix.", + "page_start": 25, + "page_end": 26, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "To the Stockholders and the Board of Directors of Atrion Corporation:\nWe have audited the accompanying consolidated balance sheets of Atrion Corporation (a Delaware corporation) and Subsidiaries as of December 31, 2003 and 2002, and the related consolidated statements of income, changes in stockholders' equity and cash flows for the years then ended. These financial statements are the responsibility of the Company's management. Our responsibility is to express an opinion on these financial statements based on our audit. The financial statements of Atrion Corporation and Subsidiaries as of and for the year in the period ended December 31, 2001, were audited by other auditors who have ceased operations. Those auditors expressed an unqualified opinion on those financial statements in their report dated February 25, 2002.\nWe conducted our audits in accordance with auditing standards generally accepted in the United States of America. Those standards require that we plan and perform the audit to obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit includes examining, on a test basis, evidence supporting the amounts and disclosures in the financial statements. An audit also includes assessing the accounting principles used and significant estimates made by management as well as evaluating the overall financial statement presentation. We believe that our audits provide a reasonable basis for our opinion.\nIn our opinion, the financial statements referred to above present fairly, in all material respects, the consolidated financial position of Atrion Corporation and Subsidiaries as of December 31, 2003 and 2002, and the consolidated results of their operations and their consolidated cash flows for the years then ended in conformity with accounting principles generally accepted in the United States of America.", + "page_start": 24, + "page_end": 24, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "S E L E C T E D F I N A N C I A L D A T A\nRevenues, 2003 = $ 62,803. Revenues, 2002 = $ 59,533. Revenues, 2001 = $ 57,605. Revenues, 2000 = $ 51,447. Revenues, 1999 = $ 49,917. Income from continuing operations, 2003 = 4,892. Income from continuing operations, 2002 = 4,065. Income from continuing operations, 2001 = 4,262. Income from continuing operations, 2000 = 2,663. Income from continuing operations, 1999 = 2,128. Net income, 2003 = 5,057. Net income, 2002 = 2,589 (b). Net income, 2001 = 9,754 (c). Net income, 2000 = 2,792. Net income, 1999 = 2,293. Total assets, 2003 = 60,050. Total assets, 2002 = 60,807. Total assets, 2001 = 65,555. Total assets, 2000 = 63,690. Total assets, 1999 = 64,640. Long-term debt, 2003 = 4,287. Long-term debt, 2002 = 10,337. Long-term debt, 2001 = 17,125. Long-term debt, 2000 = 7,400. Long-term debt, 1999 = 10,417. Income from continuing operations, per diluted share, 2003 = 2.66. Income from continuing operations, per diluted share, 2002 = 2.18. Income from continuing operations, per diluted share, 2001 = 1.88. Income from continuing operations, per diluted share, 2000 = 1.25. Income from continuing operations, per diluted share, 1999 = .81. Net income per diluted share, 2003 = 2.75. Net income per diluted share, 2002 = 1.39 (b). Net income per diluted share, 2001 = 4.30 (c). Net income per diluted share, 2000 = 1.31. Net income per diluted share, 1999 = .87. Cash dividends per common share, 2003 = .24 (a). Cash dividends per common share, 2002 = -. Cash dividends per common share, 2001 = -. Cash dividends per common share, 2000 = -. Cash dividends per common share, 1999 = -. Average diluted shares outstanding, 2003 = 1,839. Average diluted shares outstanding,", + "page_start": 8, + "page_end": 8, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "RESULTS OF OPERATIONS\nThe Company's operating income for 2003 was $6.9 million, compared with $5.8 million in 2002 and $5.8 million in 2001. Revenue growth, manufacturing efficiency improvements, cost containment and cost reduction activities were the major contributors to the operating income improvements during 2003. Revenue growth, cost containment and cost reduction activities during 2002 were offset by lower gross margins compared with 2001, which combined to cause relatively flat operating results.\nInterest expense was $195,000 in 2003 compared to $432,000 in 2002 and $300,000 in 2001. The decrease in 2003 is primarily related to lower average borrowings during 2003 as compared with 2002. The increase in 2002 is primarily related to higher average borrowings during 2002 as compared with 2001 partially offset by a significant reduction in interest rates in 2002. The higher average borrowings during 2002 is primarily related to borrowing of funds under the Company's credit facility in late December 2001 in connection with its repurchase of outstanding common stock of the Company under a tender offer. The other income in 2001 was primarily related to the Company's one-time pre-tax gain of $428,000 on the sale of a patent.\nIncome tax expense in 2003 totaled $1.9 million, compared with $1.4 million in 2002 and $1.8 million in 2001. The effective tax rates for 2003, 2002 and 2001 were 27.8 percent, 25.7 percent and 29.7 percent, respectively. Benefits from tax incentives for exports and R&D expenditures totaled $350,000 in 2003, $408,000 in 2002 and $404,000 in 2001. The higher effective tax rate in 2003 is primarily a result of benefits from tax incentives for exports and R&D expenditures being a lesser percentage of taxable income in 2003 than in 2002. The lower effective tax rate in 2002 is primarily a result of benefits from tax incentives for exports and R&D expenditures being a larger percentage of taxable income in 2002 than in 2001 and the utilization of capital loss carryforwards in 2002.", + "page_start": 26, + "page_end": 26, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "We manage our assets and resources carefully.\nOur financial strategy centers on building the strength and stability that will position our company for ongoing growth. We approach the management of our resources with discipline and diligence, striking the balance that allows us to accomplish our objectives: Funding the current needs of the business, maintaining a strong financial foundation, and investing in the resources, technology and assets that will ensure operating efficiency and fuel future growth. The soundness of this strategy was reflected once again in our financial results for 2003.\nFor the fifth consecutive year, Atrion's earnings per diluted share from continuing operations increased by more than 15 percent, rising from $2.18 in 2002 to $2.66 in 2003, a 22 percent improvement. In light of the economic pressures which have challenged virtually every business in recent years, we view five consecutive years of EPS growth-ranging from 16 percent to over 50 percent-as a sign of solid financial strength and a testament to the viability of our strategy. Including a gain from discontinued operations of $ .09 per share, net income totaled $2.75 per diluted share for 2003.\nRevenues for 2003 increased five percent to $62.8 million, from $59.5 million in the prior year. Return on equity (a) , which provides a good indication of how well we are utilizing investors' dollars, has steadily increased in recent years, from five percent in 1999 to 12 percent in 2003. This compares favorably to the average return on equity for our industry, reported at 10.7 percent by statistical research sources.\nThe company's ability to generate strong cash flow continued to flourish in 2003. This is a key strength for our company, as it enables us to pursue a number of value-creating initiatives.\n· We initiated the payment of quarterly dividends on the company's common stock in September 2003. Recent changes in tax laws make this an efficient avenue for providing a return to our shareholders and, with continuing growth in earnings and cash flow, we plan to increase the dividend periodically.\n· We repurchased 193,814 shares of our common stock in 2003. Over the last five years, we have repurchased nearly two million shares of our stock, a strategy we regard as a wise investment for our company and our stockholders.\n· We reduced debt by $6 million, from $10.3 million at the end of 2002 to $4.3 million at year-end 2003.\n2", + "page_start": 3, + "page_end": 3, + "source_file": "NASDAQ_ATRI_2003.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_EEFT_2000.pdf", + "query": "What the name of the first bridge buildt over Danube ?", + "target_page": 16, + "target_passage": "he Chain Bridge was the first bridge over the Danube", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "CHAIN BRIDGE, Budapest\nThe Chain Bridge, built from 1839 to 1849, was the first bridge over the Danube, linking the cities Buda and Pest. Measuring 380 meters long and 15.7 meters wide, it is supported by pillars shaped like antique triumphal arches.", + "page_start": 15, + "page_end": 15, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "RIVER TYNE BRIDGES, Newcastle\nSix bridges dominate the Tyne between Newcastle and Gateshead, enabling innovative railway and roadway advances over the past two centuries. At the time of its completion in 1929, the Tyne Bridge was the world's longest single span bridge.", + "page_start": 27, + "page_end": 27, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "CHARLES BRIDGE, Prague\nDating back to the 14th century, the Charles Bridge is one of the jewels of Gothic architecture. This stone bridge, built by Charles IV, the Czech King and Holy Roman Emperor, created a reliable connection between the Lesser and the Old Town and gave way to the merging of life of both banks.\n2 3\n2 4", + "page_start": 24, + "page_end": 25, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "B R O O K LYN BRIDGE, New Yo r k\nThe Brooklyn Bridge, proudly standing over the East River and connecting the boroughs of Brooklyn and Manhattan, endures as one of the most famous bridges in America. When completed in May 1883, the 5989-foot-long Brooklyn Bridge was the largest suspension bridge in the world.\n2 7\n2 8", + "page_start": 28, + "page_end": 29, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "Ancient Lyon\nAccording to the historian Dio Cassius, in 43 BC, the Roman Senate ordered the creation of a settlement for Roman refugees of war with the Allobroges. These refugees had been expelled from Vienne and were now encamped at the confluence of the Saône and Rhône rivers. The foundation was built on Fourvière hill and officially called Colonia Copia Felix Munatia , a name invoking prosperity and the blessing of the gods. The city became increasingly referred to as Lugdunum (and occasionally Lugudunum [25] ). [26] The earliest translation of this Gaulish place-name as \"Desired Mountain\" is offered by the 9th-century Endlicher Glossary . [27] In contrast, some modern scholars have proposed a Gaulish hill-fort named Lug[o]dunon, after the Celtic god Lugus (cognate with Old Irish Lugh , Modern Irish Lú ), and dúnon (hillfort).\nThe Romans recognised that Lugdunum's strategic location at the convergence of two navigable rivers made it a natural communications hub. The city became the starting point of main Roman roads in the area, and it quickly became the capital of the province, Gallia Lugdunensis. Two Emperors were born in this city: Claudius, whose speech is preserved in the Lyon Tablet in which he justifies the nomination of Gallic Senators, and Caracalla.\nCoordinates: 45°46'N 4°50'E", + "page_start": 1, + "page_end": 1, + "source_file": "wikipedia4.pdf" + }, + { + "text": "SYDNEY HARBOUR BRIDGE, Sydney\nSince its opening in March 1932, the Sydney Harbour Bridge has held a special place for immigrants upon their arrival to Australia. This grand arch remains a distinctive landmark for what many consider to be the most beautiful harbour in the world.\n2 5\n2 6", + "page_start": 26, + "page_end": 27, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "History\nToponymy", + "page_start": 0, + "page_end": 0, + "source_file": "wikipedia4.pdf" + }, + { + "text": "Prefecture and commune\nSkyline of Lyon in La Part-Dieu\nBasilica of NotreDame de Fourvière\nPlace des Terreaux with the Fontaine Bartholdi\nParc de la Tête d'or\nConfluence District\nVieux Lyon\nPont Lafayette\nCoat of arms\nMotto(s): Avant, avant, Lion le melhor (old Franco-Provençal for \"Forward, forward, Lyon the best\") [a] Virtute duce, comite fortuna (\"With virtue as guide and fortune as companion\") [b]\nLocation of Lyon\nThe name of the city has taken the forms Lugdon , Luon , and since the 13th century, Lyon . The Gallic Lugdun or Lugdunon that was Latinized in Roman as Lugdunum is composed of two words. The first may be the name of the Celtic god Lug (in charge of order and law), or the derived word lugon , meaning \"crow\" (the crow being the messenger of Lug), but might also be another word lug , meaning \"light\". The second is dunos ('fortress', 'hill'). The name thus may designate the hill of Fourvière, on which the ancient city of Lyon is founded, but could mean \"hill of the god Lug\", \"hill of the crows\" or \"shining hill\". [21] [22]\nAlternatively Julius Pokorny associates the first part of the word with the Indo-European radical * lūg ('dark, black, swamp'), the basis of the toponyms Ludza in Latvia, Lusatia in Germany (from Sorbian Łužica ), and several places in the Czech Republic named Lužice; [23] it could then also be compared to Luze in Franche-Comté and various hydronyms such as Louge.\nFurther down, in the current Saint-Vincent district, was the Gallic village of Condate, probably a simple hamlet of sailors or fishermen living on the banks of the Saône. Condate is a Gallic word meaning \"confluence\", from which the Confluence district gets its name.\nIn Roman times the city was called Caput Galliæ , meaning \"capital of the Gauls\". As an homage to this title, the Archbishop of Lyon is still called the Primate of Gaul.", + "page_start": 0, + "page_end": 1, + "source_file": "wikipedia4.pdf" + }, + { + "text": "19th century and modern city\nOpéra Nouvel (1831), renovated in 1993 by Jean Nouvel\nThéâtre des Célestins (1877), designed by Gaspard André\nBasilica of Notre-Dame de Fourvière, large 19th-century basilica on the top of Fourvière Hill\nTour métallique de Fourvière (1894)\nVacherie du Parc (1904-1905), designed by Tony Garnier.\nLa Mouche Cattle Market and Abattoir (1914, 1928), also by Garnier\nÉglise Saint-Polycarpe\nSainte Marie de La Tourette monastery (1960) designed by Le Corbusier\nSaint-Exupéry International Airport (formerly Satolas Airport), designed by Guillaume Gillet\nGare de Lyon Saint-Exupéry (1994) by Santiago Calatrava\nPalais des congrès de Lyon (1998), designed by Renzo Piano and a group of buildings for various functions\nTour du Crédit Lyonnais\nTour Oxygène\nTour Incity\nGreat mosque of Lyon\nPalais de la Bourse, Lyon\nBasilica of Notre-Dame de Fourvière\nMetallic tower of Fourvière\nFountain, place des Jacobins\nThéâtre des Célestins\nMuseum of Institut Lumière\nGrande mosquée de Lyon", + "page_start": 11, + "page_end": 12, + "source_file": "wikipedia4.pdf" + }, + { + "text": "Article\nIn southern Germany, the genetic ancestry of individuals from early medieval Bavaria probably associated with the historical Germanic-language-speaking Baiuvarii 59 cannot be modelled as deriving ancestry solely from earlier groups in Iron Age central Germany ( P ≪ 1 × 10 -36 ). The Baiuvarii probably appeared in the region in the fifth century CE 59 , but their origins remain unresolved. Our current best model indicates a mixture with ancestry derived from EIA Peninsular Scandinavia and central Europe, suggesting an expansion of Scandinavian-related ancestry producing a regional ancestry shift (Figs. 2c and 3c).\nIn Italy, southward expansions of northern and central European ancestries appear by the Late Antiquity (approximately fourth century CE), where a clear diversification of ancestry can be observed compared with preceding time periods (Fig. 3d). However, no individuals with near 100% Scandinavian ancestry can be observed in the sampling data available so far.\nIn Britain, the ancestries of Iron Age and Roman individuals form a tight cluster in our MDS analysis (Fig. 3e), shifted relative to available preceding Bronze Age individuals from Ireland and Orkney, and adjacent to, but distinct from, available individuals in Iron Age and Roman central Europe. However, two first- to second-century CE burials from a Roman military fortress site in Austria (Klosterneuburg) 5 carry ancestry that is currently indistinguishable from Iron Age or Roman populations of Britain, to the exclusion of other groups (qpWave cladality P = 0.11). One option is that they had ancestry from Britain; alternatively, currently unsampled populations from western continental Europe carried ancestries similar to Iron Age southern Britain.", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed3.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_EEFT_2000.pdf", + "query": "What was the total amount of operating expenses of 2000 by Network Wordwide in 2000 ?", + "target_page": 17, + "target_passage": "Total operating expenses increased to $88.1 million for the year ended December 31, 2000", + "chunk_present": { + "presence": true, + "index": 6 + } + }, + "top_chunk": [ + { + "text": "Years Ended December 31, 2003, 2002 and 2001\n(Notes 7 and 8), 2001 = $ 36,133. Wireline, 2003 = 29,022. Wireline, 2002 = 28,755. Wireline, 2001 = 27,486. Other, 2003 = 6,967. Other, 2002 = 6,352. Other, 2001 = 5,103. Total operating revenues, 2003 = $105,861. Total operating revenues, 2002 = $ 92,974. Total operating revenues, 2001 = $ 68,722. Operating expenses:, 2003 = . Operating expenses:, 2002 = . Operating expenses:, 2001 = . Cost of goods and services (Note 7), 2003 = $ 10,943. Cost of goods and services (Note 7), 2002 = $ 10,502. Cost of goods and services (Note 7), 2001 = $ 7,410. Network operating costs (Note 8), 2003 = 33,630. Network operating costs (Note 8), 2002 = 32,512. Network operating costs (Note 8), 2001 = 26,756. Depreciation and amortization, 2003 = 16,631. Depreciation and amortization, 2002 = 14,482. Depreciation and amortization, 2001 = 11,263. Selling, general and administrative (Note 7), 2003 = 26,029. Selling, general and administrative (Note 7), 2002 = 26,140. Selling, general and administrative (Note 7), 2001 = 16,869. Total operating expenses, 2003 = $ 87,233. Total operating expenses, 2002 = $ 83,636. Total operating expenses, 2001 = $ 62,298. Operating income, 2003 = $ 18,628. Operating income, 2002 = $ 9,338. Operating income, 2001 = $ 6,424. Other income (expense):, 2003 = . Other income (expense):, 2002 = . Other income (expense):, 2001 = . Interest expense, 2003 = $ (3,510). Interest expense, 2002 = $ (4,195). Interest expense, 2001 = $ (4,127). Net gain (loss) on investments (Note 3), 2003 = (443). Net gain (loss) on investments (Note 3), 2002 = (10,004). Net gain (loss) on investments (Note 3), 2001 =", + "page_start": 15, + "page_end": 15, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "(18) Stock Plans\nTotal Revenues, Year Ended December 31, 2000 Network Serv i c e s.Central E u rope.(in thousands) = $ 1 8 , 5 9 9.. Total Revenues, Year Ended December 31, 2000 Network Serv i c e s.We s t e rn E u rope.(in thousands) = $ 1 6 , 6 1 5.. Total Revenues, Year Ended December 31, 2000 Network Serv i c e s.O t h e r.(in thousands) = $ 1 , 7 0 0.. Total Revenues, Year Ended December 31, 2000 Network Serv i c e s.N e t w o r k S e rvices To t a l.(in thousands) = $ 3 6 , 9 1 4.. Total Revenues, Year Ended December 31, 2000 Network Serv i c e s.S o f t w a re Solutions.(in thousands) = $ 1 6 , 0 0 6.. Total Revenues, Year Ended December 31, 2000 Network Serv i c e s.C o r p o r a t e S e rvices.(in thousands) = $ -.. Total Revenues, Year Ended December 31, 2000 Network Serv i c e s.To t a l.(in thousands) = $ 5 2 , 9 2 0.. Total operating expenses, Year Ended December 31, 2000 Network Serv i c e s.Central E u rope.(in thousands) = ( 2 1 , 6 6 9 ). Total operating expenses, Year Ended December 31, 2000 Network Serv i c e s.We s t e rn E u rope.(in thousands) = ( 1 8 , 9 0 1 ). Total operating expenses, Year Ended December 31, 2000 Network Serv i c e s.O t h e r.(in thousands) = ( 2 , 4 0 9 ). Total operating expenses, Year Ended December 31, 2000 Network Serv i c e s.N e t w o r k S e rvices To t a l.(in thousands) = ( 4 2 , 9 7 9 ). Total operating expenses, Year Ended December 31, 2000 Network Serv i c e s.S o f t w a re", + "page_start": 42, + "page_end": 42, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "(18) Stock Plans\nTotal Revenues, Year Ended December 31, 2000 Network Serv i c e s.Central E u rope.(in thousands) = $ 1 2 , 6 6 4.. Total Revenues, Year Ended December 31, 2000 Network Serv i c e s.We s t e rn E u rope.(in thousands) = $ 1 2 , 6 3 7.. Total Revenues, Year Ended December 31, 2000 Network Serv i c e s.O t h e r.(in thousands) = $ 1 , 2 0 2.. Total Revenues, Year Ended December 31, 2000 Network Serv i c e s.N e t w o r k S e rvices To t a l.(in thousands) = $ 2 6 , 5 0 3.. Total Revenues, Year Ended December 31, 2000 Network Serv i c e s.S o f t w a re Solutions.(in thousands) = $ 1 5 , 1 4 9.. Total Revenues, Year Ended December 31, 2000 Network Serv i c e s.C o r p o r a t e S e rvices.(in thousands) = $ -.. Total Revenues, Year Ended December 31, 2000 Network Serv i c e s.To t a l.(in thousands) = $ 4 1 , 6 5 2.. Total operating expenses, Year Ended December 31, 2000 Network Serv i c e s.Central E u rope.(in thousands) = ( 2 0 , 6 8 3 ). Total operating expenses, Year Ended December 31, 2000 Network Serv i c e s.We s t e rn E u rope.(in thousands) = ( 1 6 , 4 7 7 ). Total operating expenses, Year Ended December 31, 2000 Network Serv i c e s.O t h e r.(in thousands) = ( 2 , 2 5 0 ). Total operating expenses, Year Ended December 31, 2000 Network Serv i c e s.N e t w o r k S e rvices To t a l.(in thousands) = ( 3 9 , 4 1 0 ). Total operating expenses, Year Ended December 31, 2000 Network Serv i c e s.S o f t w a re", + "page_start": 42, + "page_end": 42, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "(18) Stock Plans\nSolutions.(in thousands) = ( 2 2 , 2 9 0 ). Total operating expenses, Year Ended December 31, 2000 Network Serv i c e s.C o r p o r a t e S e rvices.(in thousands) = ( 6 , 7 5 0 ). Total operating expenses, Year Ended December 31, 2000 Network Serv i c e s.To t a l.(in thousands) = ( 6 8 , 4 5 0 ). Operating loss., Year Ended December 31, 2000 Network Serv i c e s.Central E u rope.(in thousands) = ( 8 , 0 1 9 ). Operating loss., Year Ended December 31, 2000 Network Serv i c e s.We s t e rn E u rope.(in thousands) = ( 3 , 8 4 0 ). Operating loss., Year Ended December 31, 2000 Network Serv i c e s.O t h e r.(in thousands) = ( 1 , 0 4 8 ). Operating loss., Year Ended December 31, 2000 Network Serv i c e s.N e t w o r k S e rvices To t a l.(in thousands) = ( 1 2 , 9 0 7 ). Operating loss., Year Ended December 31, 2000 Network Serv i c e s.S o f t w a re Solutions.(in thousands) = ( 7 , 1 4 1 ). Operating loss., Year Ended December 31, 2000 Network Serv i c e s.C o r p o r a t e S e rvices.(in thousands) = ( 6 , 7 5 0 ). Operating loss., Year Ended December 31, 2000 Network Serv i c e s.To t a l.(in thousands) = ( 2 6 , 7 9 8 ). I n t e rest income, Year Ended December 31, 2000 Network Serv i c e s.Central E u rope.(in thousands) = 4 4 8.. I n t e rest income, Year Ended December 31, 2000 Network Serv i c e s.We s t e rn", + "page_start": 42, + "page_end": 42, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "(18) Stock Plans\nSolutions.(in thousands) = ( 3 7 , 4 7 5 ). Total operating expenses, Year Ended December 31, 2000 Network Serv i c e s.C o r p o r a t e S e rvices.(in thousands) = ( 7 , 8 6 2 ). Total operating expenses, Year Ended December 31, 2000 Network Serv i c e s.To t a l.(in thousands) = ( 8 8 , 3 1 6 ). Operating loss., Year Ended December 31, 2000 Network Serv i c e s.Central E u rope.(in thousands) = ( 3 , 0 7 0 ). Operating loss., Year Ended December 31, 2000 Network Serv i c e s.We s t e rn E u rope.(in thousands) = ( 2 , 2 8 6 ). Operating loss., Year Ended December 31, 2000 Network Serv i c e s.O t h e r.(in thousands) = ( 7 0 9 ). Operating loss., Year Ended December 31, 2000 Network Serv i c e s.N e t w o r k S e rvices To t a l.(in thousands) = ( 6 , 0 6 5 ). Operating loss., Year Ended December 31, 2000 Network Serv i c e s.S o f t w a re Solutions.(in thousands) = ( 2 1 , 4 6 9 ). Operating loss., Year Ended December 31, 2000 Network Serv i c e s.C o r p o r a t e S e rvices.(in thousands) = ( 7 , 8 6 2 ). Operating loss., Year Ended December 31, 2000 Network Serv i c e s.To t a l.(in thousands) = ( 3 5 , 3 9 6 ). I n t e rest income, Year Ended December 31, 2000 Network Serv i c e s.Central E u rope.(in thousands) = 2 8 9.. I n t e rest income, Year Ended December 31, 2000 Network Serv i c e s.We s t e rn", + "page_start": 42, + "page_end": 42, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "Comparison of Operation Results for the Years Ended December 31, 2000 and 1999\nD i rect operating costs in the Network Services Segment consist primarily of: ATM installation costs; ATM site rentals; and costs associated with maintaining ATMs, ATM telecommunications, interest on network cash and cash delivery and security services to ATMs. Such costs increased to $24.4 million for the year ended December 31, 2000 from $21.9 million for the year ended December 31, 1999. The increase in direct operating costs is primarily attributable to costs associated with operating the increased number of ATMs in the network during the periods. Also, i n t e rcompany allocations were made to charge the ATM operations with transaction switching and bank connection fees associated with the operations central processing center in Budapest. These allocations totalled $3.5 million and $2.9 million for the years ended December 31, 2000 and 1999, re s p e c t i v e l y. Direct operating costs for 2000 include a one-time gain of $1.2 million due to a change in Hungarian law that eliminates a major portion of the Company's liability for import taxes on ATM hard w a re. Direct operating costs also include a $657,000 gain realized in 1999 f rom the sale of the Croatian network assets. The components of direct operating costs for the years ended December 31, 2000 and 1999 were:", + "page_start": 18, + "page_end": 18, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "Comparison of Results of Operations for the Years Ended December 31, 2000, 1999 and 1998\nRevenues The Company's total revenues increased to $52.7 million for the year ended December 31, 2000 from $41.5 million for the year ended December 31, 1999 and $11.9 million for the year ended December 31, 1998. The increase in revenues from 1999 to 2000 is primarily due to two factors: (1) a $10.4 million increase in Network Services Segment revenues resulting from the i n c rease in transaction volumes in the Company owned ATMs and an increase in the number of AT M s operated by the Company during this period; and (2) an increase of $800,000 in Software Solutions Segment revenues. The increase in revenues from 1998 to 1999 is primarily due to two factors: (1) a $15.0 million increase in Network Services Segment revenues resulting from the increase in transaction volume attributable to an increase in the number of ATMs operated by the Company during this period; and (2) the addition of $14.6 million of Software Solutions Segment re v e n u e s . Revenues for the years ended December 31, 2000 and 1999 are discussed more fully in the Segment Results of Operations sections below.\nOperating Expenses Total operating expenses increased to $88.1 million for the year ended December 31, 2000 from $68.3 million for the year ended December 31, 1999 and from $34.5 million for the year ended December 31, 1998. The increase from 1999 to 2000 can be broken down\nby segment as follows: (1) a $3.5 million increase in Network Services Segment operating costs due to growth in the size of the network operations; (2) a $15.2 million increase in Software Services Segment due to write down of intangibles of $11.2 million and investment in personnel and re s o u rces; and (3) a $1.1 million increase in Corporate Services Segment operating costs due to the expended operations. The i n c rease from 1998 to 1999 can be broken down by segment as follows: (1) a $13.0 million increase in Network Services Segment operating costs, (2) the addition of $19.6 million of Software Solutions Segment operating costs, and (3) a $1.2 million increase in Corporate Services Segment operating costs. Operating expenses for the years ended December 31, 2000 and 1999 are discussed more fully in the Segment Results of Operations sections below.", + "page_start": 16, + "page_end": 16, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "FOR THE FINANCIAL YEAR ENDED 30 JUNE 2000\nCompany.2000.$ = . Proceeds from sale of property,, Company.1999.$ = . plant and equipment, Consolidated.2000.$ = 225,000. plant and equipment, Consolidated.1999.$ = -. plant and equipment, Company.2000.$ = -. plant and equipment, Company.1999.$ = -. Net Cash Provided By (Used In), Consolidated.2000.$ = . Net Cash Provided By (Used In), Consolidated.1999.$ = . Net Cash Provided By (Used In), Company.2000.$ = . Net Cash Provided By (Used In), Company.1999.$ = . Investing Activities, Consolidated.2000.$ = (3,120,578). Investing Activities, Consolidated.1999.$ = (2,420,510). Investing Activities, Company.2000.$ = -. Investing Activities, Company.1999.$ = 76,384. Cash Flows from Financing Activities, Consolidated.2000.$ = . Cash Flows from Financing Activities, Consolidated.1999.$ = . Cash Flows from Financing Activities, Company.2000.$ = . Cash Flows from Financing Activities, Company.1999.$ = . Proceeds on refinancing of vessel, Consolidated.2000.$ = 500,000. Proceeds on refinancing of vessel, Consolidated.1999.$ = 2,200,000. Proceeds on refinancing of vessel, Company.2000.$ = -. Proceeds on refinancing of vessel, Company.1999.$ = -. Hire purchase principal payments, Consolidated.2000.$ = (1,151,665). Hire purchase principal payments, Consolidated.1999.$ = (1,153,854). Hire purchase principal payments, Company.2000.$ = -. Hire purchase principal payments, Company.1999.$ = -. Repayment of borrowings, Consolidated.2000.$ = -. Repayment of borrowings, Consolidated.1999.$ = (4,602,464). Repayment of borrowings, Company.2000.$ = -. Repayment of borrowings, Company.1999.$ = (4,000,000). Repayment of loans - other persons, Consolidated.2000.$ = 5,590. Repayment of loans - other persons, Consolidated.1999.$ = 58,683. Repayment of loans - other persons,", + "page_start": 40, + "page_end": 40, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "Corporate Services Segment\nOperating Expenses Operating expenses for the Corporate Services Segment increased to $7.9 million for the year ended December 31, 2000 f rom $6.8 million for the year ended December 31, 1999. The components of corporate services operating costs for the years ended December 31, 2000 and 1999 were:\nSalaries and benefits, Years ending December 31,.2 0 0 0 = $ 3 , 8 1 3. Salaries and benefits, Years ending December 31,.1 9 9 9 = $ 3 , 3 3 5. Selling, general and administrative, Years ending December 31,.2 0 0 0 = 3 , 8 4 1. Selling, general and administrative, Years ending December 31,.1 9 9 9 = 3 , 2 7 0. D e p reciation and amort i z a t i o n, Years ending December 31,.2 0 0 0 = 2 0 8. D e p reciation and amort i z a t i o n, Years ending December 31,.1 9 9 9 = 1 4 5. Total direct operating expenses, Years ending December 31,.2 0 0 0 = $ 7 , 8 6 2. Total direct operating expenses, Years ending December 31,.1 9 9 9 = $ 6 , 7 5 0\nThe Company's expansion of its network infrastru c t u re, and increases in corporate and administrative capabilities are the primary reasons for these i n c reased expenditures.", + "page_start": 20, + "page_end": 20, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "FOR THE FINANCIAL YEAR ENDED 30 JUNE 2000\nCash Flows from Operating Activities, Consolidated.2000.$ = . Cash Flows from Operating Activities, Consolidated.1999.$ = . Cash Flows from Operating Activities, Company.2000.$ = . Cash Flows from Operating Activities, Company.1999.$ = . Receipts from customers, Consolidated.2000.$ = 16,077,952. Receipts from customers, Consolidated.1999.$ = 26,287,361. Receipts from customers, Company.2000.$ = -. Receipts from customers, Company.1999.$ = -. Interest received, Consolidated.2000.$ = 210,840. Interest received, Consolidated.1999.$ = 44,551. Interest received, Company.2000.$ = 185,959. Interest received, Company.1999.$ = 21,319. Payments to suppliers and employee, Consolidated.2000.$ = (12,871,266). Payments to suppliers and employee, Consolidated.1999.$ = (20,296,167). Payments to suppliers and employee, Company.2000.$ = (162,376). Payments to suppliers and employee, Company.1999.$ = (10,527). Income tax paid, Consolidated.2000.$ = (589,953). Income tax paid, Consolidated.1999.$ = (2,116,458). Income tax paid, Company.2000.$ = 64,716. Income tax paid, Company.1999.$ = -. Borrowing costs paid, Consolidated.2000.$ = (1,165,742). Borrowing costs paid, Consolidated.1999.$ = (1,093,244). Borrowing costs paid, Company.2000.$ = -. Borrowing costs paid, Company.1999.$ = -. Net Cash Provided By, Consolidated.2000.$ = . Net Cash Provided By, Consolidated.1999.$ = . Net Cash Provided By, Company.2000.$ = . Net Cash Provided By, Company.1999.$ = . Operating Activities 19(a), Consolidated.2000.$ = 1,661,831. Operating Activities 19(a), Consolidated.1999.$ = 2,826,043. Operating Activities 19(a), Company.2000.$ = 88,299. Operating Activities 19(a), Company.1999.$ = 10,792. Cash Flows from Investing Activities,", + "page_start": 40, + "page_end": 40, + "source_file": "ASX_MRM_2000.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_EEFT_2000.pdf", + "query": "What was the share of revenues of Netwrok Wordwide made in Poland and Hungary in 2000 ?", + "target_page": 24, + "target_passage": "In 2000, 30% of the Company’s revenues were generated in Poland and Hungary", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Foreign Exchange Exposure\nIn 2000, 30% of the Company's revenues were generated in Poland and Hungary, as compared to 27% in 1999 and 73% in 1998. The 2000 f i g u re has increased due to the increase in revenues for the Polish operations. In Hungary the majority of revenues received are denominated in Hungarian Forint and in Poland, the majority of revenues are denominated in Polish Zloty. However the majority of these foreign curre n c y denominated contracts are linked either to inflation or the retail price index. While it remains the case that a significant portion of the Company's e x p e n d i t u res are made in or are denominated in U.S. Dollars the Company is also striving to achieve more of its expenses in local currencies to match its revenues.\nThe Company estimates that a further 10% depreciation in foreign exchange rates of the Deutsche Mark, Hungarian Forint, Polish Zloty and the British Pound Sterling against the U.S. dollar, would have the combined effect of a $7.1 million decrease in the re p o rted net loss. This was estimated using 10% of the Company's net losses after adjusting for unusual impairment and other items including U.S. dollar denominated or indexed expenses. The Company believes that this quantitative measure has inherent limitations. It does not take into account any govern m e n t a l actions or changes in either customer purchasing patterns or the Company's financing or operating strategies.\nAs a result of continued European economic convergence, including the increased influence of the Deutsche Mark, as opposed to the U.S. Dollar, on the Central European currencies, the Company expects that the currencies of the markets where it invests will fluctuate less against the Deutsche Mark than against the Dollar. Accord i n g l y, the Company believes that its Deutsche Mark denominated debt provides, in the medium to long term, for a closer matching of assets and liabilities than would Dollar denominated debt.", + "page_start": 23, + "page_end": 23, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "BA L A N C E SH E E T IT E M S\nIntangible Assets The decrease in net intangible assets to $2.6 million at December 31, 2000 from $16.3 million at December 31, 1999 is due primarily to the $11.2 million write-down of goodwill and other identifiable intangible assets associated with the Software Solutions Segment (see Note 9 to the Consolidated Financial Statements - Intangibles). In addition, the decrease is the result of amortization of purchased intangibles a c q u i red in the Euronet USA acquisition in 1998, and the SBK and Dash acquisitions in 1999.\nCurrent Liabilities C u rrent liabilities decreased to $20.5 million at December 31, 2000 from $26.9 million at December 31, 1999. This decre a s e is due primarily to decreases in accrued expenses, billings in excess of costs and estimated earnings on software installation costs and settlement of the forw a rd foreign exchange contracts.\nCapital Lease Total capital lease obligations including current installments increased to $11.5 million at December 31, 2000 from $10.6 million at December 31, 1999. This increase is due primarily to additional capital leases resulting from the Company's purchase of Budapest Bank's AT M network, consisting of 147 ATMs on May 1, 2000.\nNotes Payable Notes payable increased to $77.2 million at December 31, 2000 from $72.8 million at December 31, 1999. This is the result of several transactions as follows:\n, 1 = (in millions). Balance at December 31, 1999, 1 = $ 7 2 . 8.. U n realized foreign exchange gain (DEM vs. US$), 1 = (4.4). A c c retion of bond intere s t, 1 = 8 . 8.. Balance at December 31, 2000, 1 = $ 7 7 . 2.", + "page_start": 22, + "page_end": 22, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "Web Site\nFor further information, visit:\nw w w.euronetworldwide.com", + "page_start": 46, + "page_end": 46, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "(18) Stock Plans\nAs the Network Services Segment continued to grow throughout 1999, the Company's management began to divide the internal org a n i z a t i o n of the segment into Sub-segments. Accord i n g l y, beginning in January 2000, the Company divided the Network Services Segment into thre e Sub-segments: 'Central European Sub-segment' (including Hungary, Poland, the Czech Republic, Croatia, Greece and Romania), 'We s t e rn E u ropean Sub-segment' (including Germ a n y, France, and the United Kingdom) and 'Other Operations Sub-segment' (including the United States and unallocated processing center costs). Where practical, certain amounts have been reclassified to reflect the change in intern a l re p o rting. The Company is unable to present Network Services Segment assets by Sub-segment as of December 31, 1999. Prior to January 1, 2000, certain assets that were used to provide support services to the Company as a whole were included in the assets in the balance sheet of the Company's wholly owned Hungarian subsidiary, Bank Tech. In order to segregate corporate assets from those of the Hungarian operations, these assets were transferred as of December 31, 1999, from Bank Tech to an existing Hungarian shell company, Administrative S e rvices. Those assets are now shown under the Other Operations Sub-segment.\nThe following tables present the segment results of the Company's operations for the years ended December 31, 2000, 1999 and 1998.", + "page_start": 42, + "page_end": 42, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "(12) Private Placement of Common Shares\nIn July 2000, the Company entered into subscription agreements for the sale of 877,946 new common shares of the Company. Closing with respect to such sale took place on July 14, 2000 and August 29, 2000. These agreements were signed with accredited investors in transactions exempt from registration pursuant to the exemptions provided in Section 4(2) and Regulation D of the Act. The purchase price of each share was $6.97. The aggregate amount of proceeds to the Company from the private placement was $6.1 million.\nIn April 2000, the Company entered into two separate subscription agreements for the sale of an aggregate of 354,777 new common share s of the Company. Of the total new shares, closing with respect to 254,777 shares took place on April 10, 2000, and closing with respect to 100,000 shares took place on May 4, 2000. These agreements were signed with certain foreign persons in transactions exempt fro m registration under the United States Securities Act of 1933 (the 'Act') pursuant the exemption provided in Regulation S of the Act. The weighted average purchase price of each share was $7.50. The aggregate amount of proceeds to the Company from the private placement was $2.7 million. Under each of the agreements, for each two shares of common stock purchased in the private placement, the accre d i t e d investors were issued one warrant, expiring in each case on the one year anniversary date of the subscription agreement, to purchase a share of Euronet common stock at a weighted average exercise price of $12.50.", + "page_start": 36, + "page_end": 36, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "Five-Year Summary (1)\nIn thousands (except per share data)", + "page_start": 95, + "page_end": 95, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "( 1 ) O r g a n i z a t i o n\n- EFT Services Holding B.V., incorporated in the Netherlands\n- Euronet Banktechnikai Szolgaltato Kft. ('Bank Tech'), incorporated in Hungary\n- Euronet Adminisztracios Szolgaltato Kft. ('Administrative Services') (formerly SatComNet), incorporated in Hungary\n- Bankomat 24/Euronet Sp. z o.o. ('Bankomat'), incorporated in Poland\n- EFT-Usluge d o.o., incorporated in Croatia\n- Euronet Services GmbH, incorporated in Germany\n- EFT Services France SAS, incorporated in France\n- Euronet Services spol. s.r.o., incorporated in the Czech Republic\n- Euronet Services SRL, incorporated in Romania\n- Euronet Services (UK) Limited, incorporated in the United Kingdom\n- Euronet USA Inc. (formerly Arkansas Systems, Inc.) ('Euronet USA') incorporated in Arkansas, United States of America\n- EFT Network Services LLC ('Dash'), incorporated in Arkansas, United States of America\n- Euronet Holding N.V., incorporated in the Netherlands Antilles (in liquidation)\n- Euronet Eft Services Hellas, incorporated in Greece", + "page_start": 30, + "page_end": 30, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "LI Q U I D I T Y A N D CA P I TA L RE S O U R C E S\nOn Febru a ry 25, 2000 the Company entered into two subscription agreements for the sale of an aggregate of 650,000 new common shares of the C o m p a n y. Closing under those agreements took place on March 13, 2000. These agreements were signed with certain accredited investors in transactions exempt from registration under the exemptions provided in Section 4(2) and Regulation D of the Act. The purchase price of each s h a re was $6.615, which re p resents ninety percent of the average closing price for the ten trading days prior to and including Febru a ry 15, 2000. The aggregate amount of proceeds to the Company from the private placement was $4.3 million. Under each of the agreements, for each two s h a res of common stock purchased in the private placement, the purchasers were issued one warrant to purchase a share of Euronet common stock at an exercise price of $11.615, expiring in each case on the one year anniversary date of the subscription agreement.\nIn April 2000 the Company entered into two separate subscription agreements for the sale of an aggregate of 354,777 new common shares of the C o m p a n y. Of the total new shares, closing with respect to 254,777 shares took place on April 10, 2000, and closing with respect to 100,000 share s took place on May 4, 2000. These agreements were signed with certain foreign persons in transactions exempt from registration under the exemption provided in Regulation S of the Act. The weighted average purchase price of each share was $7.50. The aggregate amount of pro c e e d s to the Company from the private placement was $2.7 million. Under each of the agreements, for each two shares of common stock purchased in the private placement, the purchaser was issued one warrant to purchase a share of Euronet common stock at a weighted average exercise price of $12.50, expiring in each case on the one year anniversary date of the subscription agreement.", + "page_start": 21, + "page_end": 21, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "Net Sales\n(Billion Yen)", + "page_start": 2, + "page_end": 2, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "Inflation and Functional Currencies\nIn recent years, Hungary, Poland and the Czech Republic have experienced high levels of inflation. Consequently, these countries' currencies have continued to decline in value against the major currencies of the OECD over this time period. However, due to the significant reduction in the inflation rate of these countries in recent years, none of these countries are considered to have a hyper- i n f l a t i o n a ry economy. Furt h e r, the majority of all three subsidiaries' revenues are denominated in the local curre n c y. Thus all three subsidiaries use their local currency as the functional c u rre n c y. The Polish and Czech subsidiaries changed their functional currency to the respective local currency as of January 1, 1998 and January 1, 1999, re s p e c t i v e l y, and the Hungarian subsidiary changed as of July 1, 1999.\nG e rm a n y, France and the United Kingdom have experienced relatively low and stable inflation rates in recent years. There f o re, the local curre n c y in each of these markets is the functional curre n c y. Although Croatia, like Germany and France, has maintained relatively stable inflation and exchange rates, the functional currency of the Croatian company is the U.S. dollar due to the significant level of U.S. dollar denominated re v e n u e s and expenses. Due to the factors mentioned above, the Company does not believe that inflation will have a significant effect on results of operations or financial condition. The Company continually reviews inflation and the functional currency in each of the countries that it operates in.", + "page_start": 23, + "page_end": 23, + "source_file": "NASDAQ_EEFT_2000.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_AIT_2012.pdf", + "query": "Under which name was the Applied company initially fouded ?", + "target_page": 6, + "target_passage": "The Company was founded in 1923 by Joseph M. Bruening as The Ohio Ball Bearing Company", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "OVERVIEW\nWith more than 4,600 associates across North America, Applied Industrial Technologies ('Applied,' the 'Company,' 'We,' 'Us' or 'Our') is a leading industrial distributor serving MRO and OEM customers in virtually every industry. In addition, Applied provides engineering, design and systems integration for industrial and fluid power applications, as well as customized mechanical, fabricated rubber and fluid power shop services. Applied also offers maintenance training and inventory management solutions that provide added value to its customers. We have a long tradition of growth dating back to 1923, the year our business was founded in Cleveland, Ohio. At June 30, 2012, business was conducted in the United States, Canada, Mexico and Puerto Rico from 476 facilities.\nWhen reviewing the discussion and analysis set forth below, please note that the majority of SKUs we sell in any given year were not sold in the prior year, resulting in the inability to quantify certain commonly used comparative metrics analyzing sales, such as changes in product mix and volume.\nOur fiscal 2012 sales were $2.4 billion, an increase of $162.6 million or 7.3% compared to the prior year. Net sales from acquired businesses added $16.6 million or 0.7% to the current year. Gross margin of 27.6% compares to 27.7% in the prior year. Our operating margin increased to 7.1% compared to the prior year's 6.8%. Our earnings per share was $2.54 versus $2.24 in fiscal year 2011, an increase of 13.4%.\nOur consolidated balance sheet remains strong. Shareholders' equity is $672.1 million, up from $633.6 million at June 30, 2011. Working capital increased $31.4 million from June 30, 2011 to $435.6 million at June 30, 2012. Our current ratio remains strong at 2.9 to 1, consistent with the June 30, 2011 level.", + "page_start": 6, + "page_end": 6, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "Business\nApplied Industrial Technologies, Inc. and subsidiaries (the 'Company' or 'Applied') is a leading industrial distributor serving Maintenance Repair Operations (MRO) and Original Equipment Manufacturing (OEM) customers in virtually every industry. In addition, Applied provides engineering, design and systems integration for industrial and fluid power applications, as well as customized mechanical, fabricated rubber and fluid power shop services. Applied also offers maintenance training and inventory management solutions that provide added value to its customers. Although the Company does not generally manufacture the products it sells, it does assemble and repair certain products and systems.", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "NOTE 15: SUBSEQUENT EVENT\nOn August 1, 2012, the Company acquired SKF's company-owned distribution businesses in Australia and New Zealand for cash consideration. These businesses will expand Applied's global capabilities and are part of the Service Center Based Distribution segment. The Company funded the acquisition from its available cash and existing revolving credit facilities. Results of operations acquired will be included in the Company's results of operations from the date of closing.\nApplied Industrial Technologies, Inc. and Subsidiaries\n37\nREPORT OF INDEPENDENT REGISTERED PUBLIC ACCOUNTING FIRM", + "page_start": 38, + "page_end": 39, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "SUBSEQUENT EVENT\nOn August 1, 2012, the Company acquired SKF's companyowned distribution businesses in Australia and New Zealand for cash consideration. These businesses will expand Applied's global capabilities and are part of the Service Center Based Distribution segment. The Company funded the acquisition from its available cash and existing revolving credit facilities. Results of operations acquired will be included in the Company's results of operations from the date of closing.", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "Applied at a Glance\nHeadquarters:\nCleveland, Ohio, USA\nOperating Facilities: More than 500 in the United States, Canada, Mexico, Puerto Rico, Australia and New Zealand\nE-Commerce:\nwww.Applied.com\nDistribution Centers:\n9", + "page_start": 1, + "page_end": 1, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "SHAREHOLDER INFORMATION\nApplied Industrial Technologies, Inc. common stock is listed on the New York Stock Exchange under the symbol AIT. The Company is identified in most financial listings as 'AppliedIndlTch.'", + "page_start": 46, + "page_end": 46, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "MARK O. EISELE\nVice President - Chief Financial Officer\n& Treasurer\nApplied Industrial Technologies\n1 Applied Plaza\nCleveland, OH 44115-5014\nTelephone: 216/426-4000, Fax: 216/426-4845\nCorporate Headquarters\n1 Applied Plaza Cleveland, Ohio 44115 216/426-4000 Applied.com", + "page_start": 46, + "page_end": 47, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "Translating Potential Into Results\nWe remain proud of our past achievements, and we are encouraged - and energized - by the realm of future opportunities. We are especially excited about the shared belief among our management, our associates and our suppliers that we can do even more to generate profitable growth. Applied has strong capabilities, great potential and room to grow.\nApplied Industrial Technologies, Inc. and Subsidiaries\n3", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "PEOPLE\nPURPOSE\nPRODUCT\nPERFORMANCE\nThis report contains statements that are forward-looking, as that term is defined by the Securities and Exchange Commission in its rules, regulations and releases. Applied intends that such forward-looking statements be subject to the safe harbors created thereby. All forwardlooking statements are based on current expectations regarding important risk factors, including those identified on page 12 of this report and in our Annual Report on Form 10-K for the fiscal year ended June 30, 2012. Accordingly, actual results may differ materially from those expressed in the forward-looking statements, and the making of such statements should not be regarded as a representation by Applied or any other person that results expressed therein will be achieved.\nPURPOSE PRODUCT PERFORMANCE PEOPLE\nApplied Industrial Technologies is a leading industrial distributor that offers more than four million parts to serve the needs of MRO and OEM customers in virtually every industry. In addition, Applied ® provides engineering, design and systems integration for industrial and fluid power applications, as well as customized mechanical, fabricated rubber and fluid power shop services. Applied also offers maintenance training and inventory management solutions that provide added value to its customers.", + "page_start": 0, + "page_end": 1, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "Expanding Our Value-Add\nAt every level of the organization, our associates are committed to our customers' success. Simply stated, we keep industry running - productively - and our efforts and performance are regularly acknowledged. For the twelfth consecutive year, we earned Supplier of the Year status from Vulcan Materials Company for our strong execution in the areas of product quality, service, support, ease of transaction and value. And, just recently, Applied was named the recipient of Excellence, Innovation, and Sustainability awards from Eastman Chemical Company. This marks the first time in Eastman Chemical history that one company was selected to receive all three awards in a single year.\nWhile our Company is proud of these past achievements and our associates have earned well-deserved recognition for their hard work and dedication, we are not satisfied. We are committed to expanding our product offering, fully leveraging our service capabilities and delivering value-added solutions to our existing customers - and to new customers.\nNaturally, our success is greatly aided by the partnerships with our suppliers. We represent leading manufacturers with the highest quality brands - delivering innovative solutions for our customers' needs. Across our collective supply chain, we are committed to expanding our value-add and to generating success for our customers.", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_AIT_2012.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_AIT_2012.pdf", + "query": "By how much does Applied company plan to contribute to its pension benefits between 2018 and 2022 ?", + "target_page": 36, + "target_passage": "2018 through 2022 15,200", + "chunk_present": { + "presence": true, + "index": 4 + } + }, + "top_chunk": [ + { + "text": "Employer Contributions\nThe Company expects to contribute $6,000 to its pension benefit plans and $240 to its retiree health care benefit plans in 2013. Contributions do not equal estimated future payments as certain payments are made from plan assets.", + "page_start": 35, + "page_end": 35, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "Actuarial assumptions used to determine net periodic pension cost were as follows:\nIt is the Company's investment policy to maintain 66 percent to 79 percent of the plan's assets in equity securities and 21 percent to 31 percent of its assets in debt securities with the balance invested in a money market account to meet liquidity requirements for distributions. The asset allocation at December 31, 2003 represents the targeted asset allocation at that time. Based upon the plan's current over-funded position, the Company expects to make no contributions to its pension plan in 2004.\nThe Company also sponsors a defined contribution plan for all employees. Each participant may contribute certain amounts of eligible compensation. The Company makes a matching contribution to the plan. The Company's contribution under this plan was $202,000 in 2003, $302,000 in 2002 and $258,000 in 2001.", + "page_start": 23, + "page_end": 23, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "Retirement Benefits\nThe Company has defined contribution profit-sharing plans covering substantially all employees who are not participants in certain defined benefit plans. The Company's annual contribution to the defined contribution plans is based on employee eligible earnings and results of operations and amounted to $26,489,000, $23,524,000, and $24,826,000 in 2003, 2002, and 2001, respectively.\nThe Company sponsors defined benefit plans which include a limited number of salaried and hourly employees at certain subsidiaries. The Company's funding policy is generally to contribute annually the minimum actuarially computed amount. Net pension costs relating to these plans were $176,000; $0; and $0 for 2003, 2002, and 2001, respectively. The actuarial present value of obligations, less related plan assets at fair value, is not significant.\nThe Company also participates in a multiemployer plan, which provides defined benefits to certain of the Company's union\nemployees. Pension expense for this plan amounted to $309,000, $309,000, and $310,000 in 2003, 2002, and 2001, respectively.", + "page_start": 50, + "page_end": 50, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "Retirement Savings Plan\nSubstantially all U.S. associates participate in the Applied Industrial Technologies, Inc. Retirement Savings Plan. Participants may elect to contribute up to 50% of their compensation, subject to Internal Revenue Code maximums. The Company makes a discretionary profit-sharing contribution to the Retirement Savings Plan generally based upon a percentage of the Company's U.S. income before income taxes and before the amount of the contribution (5% for fiscal 2012, 2011 and 2010). The Company partially matches 401(k) contributions by participants; this match was suspended from January 1, 2009 to June 30, 2010. The Company's expense for profit sharing and matching of associates' 401(k) contributions was $10,866, $11,251 and $4,891 during fiscal 2012, 2011 and 2010, respectively.", + "page_start": 32, + "page_end": 32, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "Estimated Future Benefit Payments\nThe following benefit payments, which reflect expected future service, as applicable, are expected to be paid in each of the next five years and in the aggregate for the subsequent five years:\n2013, Pension Benefits = $ 6,200. 2013, Retiree Health Care Benefits = $ 240. 2014, Pension Benefits = 5,900. 2014, Retiree Health Care Benefits = 240. 2015, Pension Benefits = 5,700. 2015, Retiree Health Care Benefits = 240. 2016, Pension Benefits = 4,500. 2016, Retiree Health Care Benefits = 240. 2017, Pension Benefits = 1,700. 2017, Retiree Health Care Benefits = 260. 2018 through 2022, Pension Benefits = 15,200. 2018 through 2022, Retiree Health Care Benefits = 1,420\n34\nApplied Industrial Technologies, Inc. and Subsidiaries", + "page_start": 35, + "page_end": 35, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "Note 9. Retirement Plans (Continued)\nThe accumulated benefit obligation for the qualified retirement plan was $7,872, $6,551 and $5,399 at December 31, 2003, 2002 and 2001, respectively.\nWeighted average assumptions used by the Company in the determination of benefit obligations at December 31, 2003, 2002 and 2001 were as follows:\nDiscount rate, 2003 2003 = 6.00% 6.00%. Discount rate, 2002 2002 = 6.50% 6.50%. Discount rate, 2001 2001 = 7.00% 7.00%. Rate of increase in compensation levels, 2003 2003 = 4.50% 4.50%. Rate of increase in compensation levels, 2002 2002 = 4.50% 4.50%. Rate of increase in compensation levels, 2001 2001 = 5.00% 5.00%\nWeighted average assumptions used by the Company in the determination of net pension cost for the years ended December 31, 2003, 2002, and 2001 were as follows:\nDiscount Rate, 2003 2003 = 6.50% 6.50%. Discount Rate, 2002 2002 = 7.00% 7.00%. Discount Rate, 2001 2001 = 7.50% 7.50%. Rate of increase in compensation level, 2003 2003 = 4.50% 4.50%. Rate of increase in compensation level, 2002 2002 = 5.00% 5.00%. Rate of increase in compensation level, 2001 2001 = 5.00% 5.00%. Expected long-term rate of return on plan assets, 2003 2003 = 7.50% 7.50%. Expected long-term rate of return on plan assets, 2002 2002 = 8.00% 8.00%. Expected long-term rate of return on plan assets, 2001 2001 = 8.00% 8.00%\nThe Company's pension plan asset allocations based on market value at December 31, 2003 and 2002, by asset category were as follows:", + "page_start": 32, + "page_end": 32, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "9. RETIREMENT BENEFIT PLANS\nMainly 3.0%. Expected return on assets, 2003 Mar. 31, 2004 = Mainly 3.0%. , For the years ended = Foreign companies ..................................................................................................................................... , 2004 Mar. 31, 2005 = 2.2% - 9.5%. , 2003 Mar. 31, 2004 = 7.0% - 9.0%", + "page_start": 84, + "page_end": 84, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "24. Employee benefits and share-based payments continued\nend of year Number = . Year ended 30 June 2012 - Employees, Vested and exercisable at end of year Number = . 07 Jul 2006, Expiry date = 01 Jul 2011. 07 Jul 2006, Exercise price $ = $6.00. 07 Jul 2006, Balance start of year Number = 50,000. 07 Jul 2006, Granted during year Number = -. 07 Jul 2006, Expired during year Number = (50,000). 07 Jul 2006, Balance end of year Number = -. 07 Jul 2006, Vested and exercisable at end of year Number = -. 04 Apr 2008, Expiry date = 03 Apr 2013. 04 Apr 2008, Exercise price $ = $4.68. 04 Apr 2008, Balance start of year Number = 58,535. 04 Apr 2008, Granted during year Number = -. 04 Apr 2008, Expired during year Number = (58,535). 04 Apr 2008, Balance end of year Number = -. 04 Apr 2008, Vested and exercisable at end of year Number = -. 04 Apr 2008, Expiry date = 03 Apr 2013. 04 Apr 2008, Exercise price $ = $6.00. 04 Apr 2008, Balance start of year Number = 566,001. 04 Apr 2008, Granted during year Number = -. 04 Apr 2008, Expired during year Number = (85,001). 04 Apr 2008, Balance end of year Number = 481,000. 04 Apr 2008, Vested and exercisable at end of year Number = 481,000. Total, Expiry date = . Total, Exercise price $ = . Total, Balance start of year Number = 674,536. Total, Granted during year Number = -. Total, Expired during year Number = (193,536). Total, Balance end of year Number = 481,000. Total, Vested and exercisable at end of year Number = 481,000. Weighted average exercise price, Expiry date = Weighted average exercise price. Weighted average exercise price, Exercise price $ = . Weighted average exercise price, Balance start of year Number = $5.89. Weighted average exercise price, Granted during year Number = -. Weighted average exercise price, Expired during year Number = $5.60. Weighted average exercise price, Balance end of year Number = $6.00. Weighted average exercise price, Vested and", + "page_start": 97, + "page_end": 97, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Future Benefit Payments and Contributions\nAs of January 31, 2015, the expected future benefit payments based upon the assumptions described above and including benefits attributable to estimated future employee service are as follows:\n, 1 = Fiscal year. 2015, 1 = $8. 2016, 1 = 9. 2017, 1 = 9. 2018, 1 = 9. 2019, 1 = 10. 2020 - 2024, 1 = 59", + "page_start": 63, + "page_end": 63, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Salary Continuation Benefits\nThe Company has agreements with certain retirees of acquired companies to pay monthly retirement benefits through fiscal 2020.", + "page_start": 33, + "page_end": 33, + "source_file": "NYSE_AIT_2012.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_AIT_2012.pdf", + "query": "What does Applied has to say regarding the potential creadit risk it could be exposed to ?", + "target_page": 21, + "target_passage": "The Company has a broad customer base representing many diverse industries primarily across North America. As such, the Company does not believe that a significant concentration of credit risk exists in its accounts receivable", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "RISKS AND UNCERTAINTIES AFFECTING OUR BUSINESS\nThis section describes the principal risks and uncertainties that could have a material adverse effect on our business and financial results.", + "page_start": 77, + "page_end": 77, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Item 1A. Risk Factors.\nOur business faces many risks. We believe the risks described below outline the items of most concern to us.", + "page_start": 17, + "page_end": 17, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Other Claims\nThere are certain other claims and potential claims against us. We do not expect any of these to have materially adverse effect on our consolidated financial position.\nThe outcome of all the proceedings and claims against us, including the matters described above, is subject to future resolution that includes the uncertainties of litigation. Based on information currently known to us, we believe that it is not probable that the ultimate resolution of any of these proceedings and claims, individually or in total, will have a material adverse effect on our consolidated financial position or results of operations. If it becomes probable that we are liable, we will record a provision in the period the change in probability occurs, and it could be material to our consolidated financial position and results of operations.", + "page_start": 128, + "page_end": 128, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Other Claims\nThere are certain other claims and potential claims against us. We do not expect any of these to have a materially adverse effect on our consolidated financial position.\nThe outcome of all the proceedings and claims against us, including the matters described above, is subject to future resolution that includes the uncertainties of litigation. Based on information currently known to us, we believe that it is not probable that the ultimate resolution of any of these proceedings and claims, individually or in total, will have a material adverse effect on our consolidated financial position or results of operations. If it becomes probable that we are liable, we will record a provision in the period the change in probability occurs and it would be material to our consolidated financial position and results of operations.", + "page_start": 81, + "page_end": 81, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Other Litigation Related to Our Products and Services\nThe Company intends to vigorously defend itself in these matters; however, we cannot predict the outcome or impact. We are unable to reasonably estimate the possible loss or range of loss, if any, associated with these claims, unless noted.\n23\n29 sur 49\n10/01/2025, 14:3\ntsla-20240930\nhttps://www.sec.gov/Archives/edgar/data/1318605/00016282802404..", + "page_start": 28, + "page_end": 29, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Liability Insurance and Bonding\nThe nature of our business exposes our company to the risk of liabilities arising out of our operations, including possible damages to the environment. Such potential liabilities could involve, for example, claims for remediation costs, personal injury, property damage and damage to the environment in cases where we may be held responsible for the escape of harmful materials; claims of employees, customers or third parties for personal injury or property damage occurring in the course of our operations; or claims alleging negligence in the planning or performance of work. We could also be subject to Ñnes and civil and criminal penalties in connection with alleged violations of regulatory requirements. Because of the nature and scope of the possible environmental damages, liabilities imposed in environmental litigation can be signiÑcant. Our solid waste operations have third party environmental liability insurance with limits in excess of those required by permit regulations, subject to certain limitations and exclusions. However, we cannot assure you that the limits of such environmental liability insurance would be adequate in the event of a major loss, nor can we assure you that we would continue to carry excess environmental liability insurance should market conditions in the insurance industry make such coverage costs prohibitive.\nWe have general liability, vehicle liability, employment practices liability, pollution liability, directors and oÇcers liability, worker's compensation and employer's liability coverage, as well as umbrella liability policies to provide excess coverage over the underlying limits contained in these primary policies. We also carry property insurance. Although we try to operate safely and prudently and while we have, subject to limitations and exclusions, substantial liability insurance, no assurance can be given that we will not be exposed to uninsured liabilities which could have a material adverse eÅect on our Ñnancial condition, results of operations or cash Öows.\n12\nOur insurance programs for worker's compensation, general liability, vehicle liability and employeerelated health care beneÑts are eÅectively self-insured. Claims in excess of self-insurance levels are fully insured subject to policy limits. Accruals are based on claims Ñled and actuarial estimates of claims development and claims incurred but not reported. Due to the variable condition of the insurance market, we have experienced, and may continue to experience in the future, increased self-insurance retention levels and increased premiums. As we assume more risk for self-insurance through higher retention levels, we may experience more variability in our self-insurance reserves and expense.", + "page_start": 19, + "page_end": 20, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "Mining risks and insurance risks\nThe mining industry is subject to significant risks and hazards, including environmental hazards, industrial accidents, unusual or unexpected geological conditions, unavailability of materials and unplanned equipment failures. These risks and hazards could result in significant costs or delays that could have a material adverse impact on the Group's financial performance and position.\nThe Group maintains insurance to cover some of these risks and hazards at levels that are believed to be appropriate for the circumstances surrounding each identified risk, however there remains the possibility that the level of insurance may not provide sufficient coverage for losses related to specific loss events.\ncontinued\nu\nDirect or s' Report", + "page_start": 46, + "page_end": 46, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Even if we take appropriate measures to safeguard our information security and privacy environment from security breaches, our customers and our business could still be exposed to risk.\nOur Retail and Credit segments involve the collection, storage and transmission of customers' personal information, consumer preferences and credit card information. In addition, our operations involve the collection, storage and transmission of employee information and company financial and strategic data. Any measures we implement to prevent a security or cybersecurity threat may not be totally effective and may have the potential to harm relations with our customers or decrease activity on our websites by making them more difficult to use. In addition, the regulatory environment surrounding information security, cybersecurity and privacy is increasingly demanding, with new and constantly changing requirements. Security breaches and cyber incidents and their remediation, whether at our company, our third-party providers or other retailers, could expose us to a risk of loss or misappropriation of this information, litigation, potential liability, reputation damage and loss of customers' trust and business, which could adversely impact our sales. Any such breaches or incidents could subject us to investigation, notification and remediation costs, and if there is additional information that is later discovered related to such security breach or incident, there could be further loss of customers' trust and business, based upon their reactions to this additional information. Additionally, as a credit card issuer, we could be subject to credit card fraud losses due to external credit card fraud.", + "page_start": 18, + "page_end": 18, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "CAUTIONARY STATEMENT UNDER PRIVATE SECURITIES LITIGATION REFORM ACT\nImportant risk factors include, but are not limited to, the following: risks relating to the operations levels of our customers and the economic factors that affect them; changes in the prices for products and services relative to the cost of providing them; reduction in supplier inventory purchase incentives; loss of key supplier authorizations, lack of product availability, or changes in supplier distribution programs; the cost of products and energy and other operating costs; changes in customer preferences for products and services of the nature and brands sold by us; changes in customer procurement policies and practices; competitive pressures; our reliance on information systems; our ability to implement our ERP system in a timely, cost-effective, and competent manner, and to capture its planned benefits while maintaining an adequate internal control environment; the impact of economic conditions on the collectability of trade receivables; reduced demand for our products in targeted markets due to reasons including consolidation in customer industries and the transfer of manufacturing capacity to foreign countries; our ability to retain and attract qualified sales and customer service personnel; our ability to identify and complete acquisitions, integrate them effectively, and realize their anticipated benefits; the variability and timing of new business opportunities including acquisitions, alliances, customer relationships, and supplier authorizations; the incurrence of debt and contingent liabilities in connection with acquisitions; our ability to access capital markets as needed on reasonable terms; disruption of operations at our headquarters or distribution centers; risks and uncertainties associated with our foreign operations, including volatile economic conditions, political instability, cultural and legal differences, and currency exchange fluctuations; the potential for goodwill and intangible asset impairment; changes in accounting policies and practices; organizational changes within the Company; the volatility of our stock price and the resulting impact on our consolidated financial statements; risks related to legal proceedings to which we are a party; adverse regulation and legislation, including potential changes in tax regulations (e.g., those affecting the use of the LIFO inventory accounting method and the taxation of foreignsourced income); and the occurrence of extraordinary events (including prolonged labor disputes, natural events and acts of God, terrorist acts, fires, floods, and accidents). Other factors and unanticipated events could also adversely affect our business, financial condition or results of operations.", + "page_start": 13, + "page_end": 13, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "ain elate ers f on\naisal f elds or s fr om od u ctive aisal eci ati on, g, plan t evelopm en t will. alent ditur e per et o f infr astru ctur e an d oper atin g m eth ods . Pr oven un d eveloped r eserves r equir e d evelopm en t. Pr o v en plus Pr obable r eserv es (2P) Pr oven plus Pr obable r eserves (2P) ar e th ose r eserves that an alysis o f g eologi cal an d en gin eerin g d ata sugg ests ar o r e lik ely than n ot to be r ecover able . Th er e is at least a 50% pr obability that r eserves r ecover ed will e x ceed Pr oven plus Pr obable r eserves Pr o v en, Pr obable plus P ossible r eserv es (3P) Pr oven, Pr obable plus P ossible r eserves (3P) ar e th ose r eserves that, to a low d ee o f certain ty (10% confi d e n ce), ar ecover able . Th er e is r elatively hi gh risk associ ated with th ese r eserves . PSC Pr od u cti on sharin g con tr act. r eserv e r eplacement cost per barr el o f oil equiv alent Explor ati on, d elin eati\ne than\nailur\nf\nf\ner risk o\ngh\nd have a hi\naps an\nor tr\n.", + "page_start": 94, + "page_end": 94, + "source_file": "ASX_STO_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf", + "query": "To what system of logic do OWL ontologies belong to ?", + "target_page": 7, + "target_passage": "OWL ontologies are an implementation of Description Logic (DL) which is a decidable subset of First Order Logic", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "A Practical Guide to Building OWL Ontologies Using Protégé 5.5 and Plugins\nPreprint · April 2021\nCITATIONS\n0", + "page_start": 0, + "page_end": 0, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "3.1 Components of OWL Ontologies\nAn OWL ontology consists of Classes, Properties, and Individuals. OWL ontologies are an implementation of Description Logic (DL) which is a decidable subset of First Order Logic. A class in OWL is a set, a property is a binary relation, and an individual is an element of a set. Other concepts from set theory are also implemented in OWL such as Disjoint sets, the Empty set ( owl:Nothing ), inverse\n1 http://protege.stanford.edu\n6\nrelations, transitive relations, and many more. An understanding of the basic concepts of set theory will help the user get the most out of OWL but is not required. One of the benefits of Protégé is that it presents an intuitive GUI that enables domain experts to define models without a background in set theory. However, developers are encouraged to refresh their knowledge on logic and set theory. A good source is the first 3 chapters in Elements of the Theory of Computation by Lewis and Papadamitrious. Another good source is the PDF document Overview of Set Theory available at:\nhttps://www.michaeldebellis.com/post/owl-theoretical-basics", + "page_start": 6, + "page_end": 7, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "Chapter 3 What are OWL Ontologies?\nOntologies are used to capture knowledge about some domain of interest. An ontology describes the concepts in the domain and also the relationships that hold between those concepts. Different ontology languages provide different facilities. The most recent development in standard ontology languages is OWL from the World Wide Web Consortium (W3C). A good primer on the basic concepts of OWL can be found at: https://www.w3.org/TR/owl2-primer/\nOWL makes it possible to describe concepts in an unambiguous manner based on set theory and logic. Complex concepts can be built up out of simpler concepts. The logical model allows the use of a reasoner which can check whether all of the statements and definitions in the ontology are mutually consistent and can also recognize which concepts fit under which definitions. The reasoner can therefore help to maintain the hierarchy correctly. This is particularly useful when dealing with cases where classes can have more than one parent. The reasoner can also infer additional information. For example, if two properties are inverses only one value needs to be asserted by the user and the inverse value will be automatically inferred by the reasoner.", + "page_start": 6, + "page_end": 6, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "Chapter 1 Introduction\nThis introduces Protégé 5 for creating OWL ontologies as well as various plugins. If you have questions specific to this tutorial, please feel free to email me directly: mdebellissf@gmail.com However, if you have general questions about Protégé, OWL, or plugins you should subscribe to and send an email to the User Support for Protégé and Web Protégé email list. This list has many people (including me) who monitor it and can contribute their knowledge to help you understand how to get the most out of this technology. To subscribe to the list, go to: https://protege.stanford.edu/support.php and click on the first orange Subscribe button. That will enable you to subscribe to the list and give you the email to send questions to.\nThis chapter covers licensing and describes conventions used in the tutorial. Chapter 2 covers the requirements for the tutorial and describes the Protégé user interface. Chapter 3 gives a brief overview of the OWL ontology language. Chapter 4 focuses on building an OWL ontology with classes and object properties. Chapter 4 also describes using a Description Logic Reasoner to check the consistency of the ontology and automatically compute the ontology class hierarchy.\nChapter 5 describes data properties. Chapter 6 describes design patterns and shows one design pattern: adding an order to an enumerated class. Chapter 7 describes the various concepts related to the name of an OWL entity.\nChapter 8 introduces an extended version of the Pizza tutorial developed in chapters 1-7. This ontology has a small number of instances and property values already created which can be used to illustrate the tools in the later chapters for writing rules, doing queries, and defining constraints.\nChapter 9 describes two tools for doing queries: Description Logic queries and SPARQL queries. Chapter 10 introduces the Semantic Web Rule Language (SWRL) and walks you through creating SWRL and SQWRL rules. Chapter 11 introduces the Shapes Constraint Language (SHACL) and discusses the difference between defining logical axioms in Description Logic and data integrity constraints in SHACL. Chapter 12 has some concluding thoughts and opinions and Chapter 13 provides a bibliography.", + "page_start": 4, + "page_end": 4, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "Chapter 4 Building an OWL Ontology\nThis chapter describes how to create an ontology of Pizzas. We use Pizzas because it is something almost everyone is familiar with.", + "page_start": 10, + "page_end": 10, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "OLAF : Ontology Learning Applied Framework\n= Activity Optional. Formal concept Analysis Term subsumption algorithm Hierarchical clustering Inductive Logic Programming We only work on unstructured textual data . We apply the framework in two different use cases and datasets to validate our results :, = : Iterative process. Formal concept Analysis Term subsumption algorithm Hierarchical clustering Inductive Logic Programming We only work on unstructured textual data . We apply the framework in two different use cases and datasets to validate our results :, OLAF IN A PRACTICAL CONTEXT.Ontology = : Iterative process. Formal concept Analysis Term subsumption algorithm Hierarchical clustering Inductive Logic Programming We only work on unstructured textual data . We apply the framework in two different use cases and datasets to validate our results :, = : Iterative process. , Pros and cons Ontologies can be exported in = Hierarchisation. , = Axiom Ontology. , Ontology based-system = Artifact. , = . , = CAPTION. , OLAF IN A PRACTICAL CONTEXT.Ontology = CAPTION. , = CAPTION. Rule-based axiom extraction, Pros and cons Ontologies can be exported in = . Rule-based axiom extraction, = Axiom Ontology. Rule-based axiom extraction, Ontology based-system = Artifact. Rule-based axiom extraction, = Different serialization techniques\ncan be used to export and leverage the learned ontology in an application system.. Rule-based axiom extraction, = Different serialization techniques can be used to export and leverage the learned ontology in an application system.. Rule-based axiom extraction, OLAF IN A PRACTICAL CONTEXT.Ontology = Different serialization techniques can be used to export and leverage the learned ontology in an application system.. Rule-based axiom extraction, = Different serialization techniques can be used to export and leverage the learned ontology in an application system.", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + }, + { + "text": "4.1 Named Classes\nThe main building blocks of an OWL ontology are classes. In Protégé 5, editing of classes can be done in the Entities tab. The Entities tab has a number of sub-tabs. When you select it, the default should be the Class hierarchy view as shown in Figure 4.5. 4 All empty ontologies contains one class called owl:Thing . OWL classes are sets of individuals. The class owl:Thing is the class that represents the set containing all individuals. Because of this all classes are subclasses of owl:Thing .\n4 Each of the sub-tabs in the Entities tab also exists as its own major tab. In the tutorial we will refer to tabs like the Class hierarchy tab or Object properties tab and it is up to the user whether to access them from the Entities tab or to create them as independent tabs.\n13", + "page_start": 13, + "page_end": 13, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "OLAF : Ontology Learning Applied Framework\n= Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE. Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE, Ontology based-system = Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE. Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE, = Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE. Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE, = Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE. Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE, OLAF IN A PRACTICAL CONTEXT.Ontology = Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE. Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE, = Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE. Our framework", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + }, + { + "text": "OLAF : Ontology Learning Applied Framework\nMarion SCHAEFFER (marion.schaeffer@insa-rouen.fr) - Matthias SESBOUE (matthias.sesboue@insa-rouen.fr) Jean-Philippe KOTOWICZ - Nicolas DELESTRE - Cecilia ZANNI-MERK\nSince the beginning of the century, research on ontology learning has gained popularity. Automatically extracting and structuring knowledge relevant to a domain of interest from unstructured data is a major scientific challenge. We propose a new approach with a modular ontology learning framework considering tasks from data pre-processing to axiom extraction. Whereas previous contributions considered ontology learning systems as tools to help the domain expert, we developed the proposed framework with full automation in mind. An implementation as an opensource and collaborative python library is available at https://gitlab.insa-rouen.fr/msesboue/ontology-learning.", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + }, + { + "text": "OLAF : Ontology Learning Applied Framework\nWe designed the proposed framework focusing on automation with very little, if any, human involvement in mind. Unlike most existing approaches, particular attention is brought to the learned ontology final production use case . We implement the framework as an open-source and openaccess python library. We aim to gather feedback and grow a community to develop and test multiple algorithms. Various satellite tools could be developed to enhance the framework implementation. However, we should focus on developing axiom extraction and automatic ontology evaluation . One exciting research area might be the adaptation of the software industry's \"DevOps\" concepts to knowledge management. The latter field is known as \"SemOps\".\nCimiano P, Völker J. Text2Onto. Natural Language Processing and Information Systems. Berlin, Heidelberg: Springer Berlin Heidelberg; 2005.p. 227-238. ISBN: 978-3-540-32110-1 1.\nDrymonas E, Zervanou K, Petrakis EGM. Unsupervised Ontology Acquisition from Plain Texts: The OntoGain System. Natural Language Processing and Information Systems. Berlin, Heidelberg: Springer Berlin Heidelberg; 2010. p. 277-87. ISBN: 978-3-642-13881-2 2.\nPaola Velardi, Stefano Faralli, Roberto Navigli; OntoLearn Reloaded: A Graph-Based Algorithm for Taxonomy Induction. Computational Linguistics 2013; 39 (3): 665-707. DOI: 10.1162/COLI_a_00146 3.\nMuhammad Nabeel Asim, Muhammad Wasim, Muhammad Usman Ghani Khan, Waqar Mahmood, Hafiza Mahnoor Abbasi, A survey of ontology learning techniques and applications, Database, Volume 2018, 2018, bay101, DOI: 10.1093/database/bay101 4.", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + } + ] + }, + { + "references": { + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf", + "query": "Concerning ontologies, what is an anonymous class ?", + "target_page": 30, + "target_passage": "They are created by the reasoner when you use class expressions. For example, if you define the range of a property to be PizzaTopping or PizzaBase then the reasoner will create an anonymous class representing the intersection of those two classes", + "chunk_present": { + "presence": true, + "index": 4 + } + }, + "top_chunk": [ + { + "text": "4.1 Named Classes\nThe main building blocks of an OWL ontology are classes. In Protégé 5, editing of classes can be done in the Entities tab. The Entities tab has a number of sub-tabs. When you select it, the default should be the Class hierarchy view as shown in Figure 4.5. 4 All empty ontologies contains one class called owl:Thing . OWL classes are sets of individuals. The class owl:Thing is the class that represents the set containing all individuals. Because of this all classes are subclasses of owl:Thing .\n4 Each of the sub-tabs in the Entities tab also exists as its own major tab. In the tutorial we will refer to tabs like the Class hierarchy tab or Object properties tab and it is up to the user whether to access them from the Entities tab or to create them as independent tabs.\n13", + "page_start": 13, + "page_end": 13, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "4.10.1 Property restrictions\n· Existential restrictions describe classes of individuals that participate in at least one relation along a specified property. For example, the class of individuals who have at least one (or some) hasTopping relation to instances of VegetableTopping . In OWL the keyword some is used to denote existential restrictions.\n· Universal restrictions describe classes of individuals that for a given property only have relations along a property to individuals that are members of a specific class. For example, the class of individuals that only have hasTopping relations to instances of the class VegetableTopping . In OWL they keyword only is used for universal restrictions.\nLet's take a closer look at an example of an existential restriction. The restriction hasTopping some MozzarellaTopping is an existential restriction (as indicated by the some keyword), which restricts the hasTopping property, and has a filler MozzarellaTopping . This restriction describes the class of individuals that have at least one hasTopping relationship to an individual that is a member of the class MozzarellaTopping .\nA restriction always describes a class. Sometimes (as we will soon see) it can be a defined class. Other times it may be an anonymous class. In all cases the class contains all of the individuals that satisfy the restriction, i.e., all of the individuals that have the relationships required to be a member of the class. In section 9.2 one of our SPARQL queries will return several anonymous classes.\n6 These have the same meaning as existential and universal quantification in First Order Logic.\n30\nThe restrictions for a class are displayed and edited using the Class Description View shown in Figure 4.17. The Class Description View holds most of the information used to describe a class. The Class Description View is a powerful way of describing and defining classes. It is one of the most important differences between describing classes in OWL and in other models such as most object-oriented programming languages. In other models there is no formal definition that describes why one class is a subclass of another, in OWL there is. Indeed, the OWL classifier can actually redefine the class hierarchy based on the logical restrictions defined by the user. We will see an example of this later in the tutorial.", + "page_start": 30, + "page_end": 31, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "4.14 Defining an Enumerated Class\nA powerful tool in the object-oriented programming (OOP) community is the concept of design patterns. The idea of a design pattern is to capture a reusable model that is at a higher level of abstraction than a specific code library. One of the first and most common design patterns was the Model-View-Controller pattern first used in Smalltalk and now almost the default standard for good user interface design. Since there are significant differences between OWL and standard OOP the many excellent books on OOP design patterns don't directly translate into OWL design patterns. Also, since the use of OWL is more recent than OOP there does not yet exist the excellent documentation of OWL patterns that the OOP community has. However, there are already many design patterns that have been documented for OWL and that can provide users with ways to save time and to standardize their designs according to best practices.\nOne of the most common OWL design patterns is an enumerated class. When a property has only a few possible values it can be useful to create a class to represent those values and to explicitly define the class by listing each possible value. We will show an example of such an enumerated class by creating a new\n44\nproperty called hasSpiciness with only a few possible values ranging from Mild to Hot . In this section we will also create the first individuals in our ontology.\nExercise 24: Create an Enumerated Class to Represent the Spiciness of a Pizza\n_____________________________________________________________________________________", + "page_start": 44, + "page_end": 45, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "9.21 Some SPARQL Pizza Queries\nHowever, classes and properties themselves are also represented as triples. So for example, when you create the class Pizza what Protégé does for you is to add the triple: Pizza rdf:type owl:Class to the ontology. I.e., the Pizza entity is of type (is an instance of) owl:Class . Similarly when you add NamedPizza as a subclass of Pizza , Protégé adds the triple: NamedPizza rdfs: s ubClassOf Pizza .\nHopefully, now you can make some sense of this initial query. The query is looking for all the entities that are the subjects of triples where the predicate is rdfs: s ubClassOf and the object is any other entity. The ? before a name indicates that the name is a wildcard that can match anything that fits with the rest of the pattern. This is part of the power of SPARQL, one can match a Subject, an Object, a Predicate or even all three. Making all 3 parts of the pattern wildcards would return every triple in the graph (in this case our entire Pizza ontology) being searched. You may notice that in some cases the object is simply the name of a class while in others it is a class expression with an orange circle in front of it. This is because when defining classes using DL axioms Protégé creates anonymous classes that correspond to various DL axioms.\nThe SELECT part of a SPARQL query determines what data to display. The WHERE part of a query determines what to match in the query. If you want to display everything matched in the WHERE clause you can just use a * for the SELECT clause. The initial default query in this tab is set up with no knowledge of the specific ontology. I.e., it will return all the classes that are subclasses of other classes regardless of the ontology. To get information about Pizzas the first thing we need to do is to add another prefix to the beginning of the query. In our case the Pizza ontology has been set up with a mapping to the prefix pizza (you can see this in the ontology prefixes tab in the Active ontology tab discussed in chapter 7). So, add the following to the SPARQL query after the last PREFIX statement:", + "page_start": 68, + "page_end": 68, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "4.10 Describing and Defining Classes\nNow that we have defined some properties, we can use these properties to define some more interesting classes. There are 3 types of classes in OWL:\n1. Primitive classes. These are classes that are defined by conditions that are necessary (but not sufficient) to hold for any individuals that are instances of that class or its subclasses. The condition may be as simple as: Class A is a subclass of class B . To start with we will define primitive classes first and then defined classes. When the reasoner encounters an individual that is an instance of a primitive class it infers that all the conditions defined for that class must hold for that individual.\n2. Defined classes. These are classes that are defined by both necessary and sufficient conditions. When the reasoner encounters an individual that satisfies all the conditions for a defined class it will make the inference that the individual is an instance of that class. The reasoner can also use the conditions defined on classes to change the class hierarchy, e.g., to infer that Class A is a subclass of Class B . We will see examples of this later in the tutorial.\n3. Anonymous classes. These are classes that you won't encounter much and that won't be discussed much in this tutorial, but it is good to know about them. They are created by the reasoner when you use class expressions. For example, if you define the range of a property to be PizzaTopping or PizzaBase then the reasoner will create an anonymous class representing the intersection of those two classes.", + "page_start": 29, + "page_end": 29, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "4.3 Disjoint Classes\nHaving added the classes Pizza , PizzaTopping , and PizzaBase to the ontology, we now want to say that these classes are disjoint . I.e., no individual can be an instance of more than one of those classes. In set theory terminology the intersection of these three classes is the empty set: owl:Nothing .", + "page_start": 16, + "page_end": 16, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "8.1 Get Familiar with the Larger Ontology\nFinally, viewing the Individuals by class tab will help to understand the additional data in the ontology. If you go to that tab, you will see many new individuals. In addition to Employees and Customers there are instances of the Pizza class. You can see all these individuals in the Individuals by type (inferred) view in the upper right corner.\nNow with more instances you can see the value of the Individuals by type (inferred) view. You can expand and contract various classes and see the instances for them 10 . Notice that the 4 HighCaloriePizzas are also instances of Pizza but they aren't shown under Pizza because all instances of HighCaloriePizza are always instances of the Pizza class. There is only one instance of the Pizza class displayed because all the other instances of Pizza are also instances of subclasses of Pizza so they are shown under those subclasses rather than under Pizza . If there are two or more classes that an Individual is an instance of that aren't subclasses of each other then they will all be shown. For example, MargheritaPizza1 is an instance of both MargheritaPizza and LowCaloriePizza and it shows up under each class because neither is a subclass of the other. It is possible for a Pizza to be a LowCaloriePizza and not be a MargheritaPizza and vice-versa.\n10 Note that if you have an instance of a class selected in the Individuals by type (inferred) view, you won't be able to collapse that class. E.g., i n figure 8.2 we wouldn't be able to collapse the Employee class because one of its instances ( Chef ) is selected. To collapse it just select a different instance that isn't an instance of the class you want to collapse.\n64\nFigure 8.2 Viewing the New Instances in the Individuals by Class tab\n65", + "page_start": 64, + "page_end": 65, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "Chapter 8 A Larger Ontology with some Individuals\nThe rest of the tutorial requires some data loaded into your ontology. So far, we have mostly been dealing with defining classes and properties. This type of information is known in the semantic web community as T-Box information. The T stands for Terminological. Individuals or instances are known as A-Box. The A stands for Assertional as in specific facts that are asserted about the domain. Typically, there will be a much larger amount of A-Box information than T-Box. The A-Box information is often uploaded from spreadsheets, relational databases or other sources. One tool that is not covered in this tutorial that is useful is called Cellfie. Cellfie is a tool that can take data from spreadsheets and upload it into an ontology mapping the table-based data into objects and property values. For a tutorial on Cellfie see: https://github.com/protegeproject/cellfie-plugin/wiki/Grocery-Tutorial\nIn addition to using Cellfie, you can use the Individuals by class tab introduced in chapter 5 to create new instances and to create object and data property values for those instances as you did with the Hot and Medium individuals in chapter 6. However, that can be tedious so to spare you that uninteresting work I've developed a version of the Pizza ontology that has many individuals already created. That ontology should be identical to the ontology you have developed so far except with many additional individuals. You can find this populated Pizza ontology at: https://tinyurl.com/PizzaWDataV2 Go to this URL and download the file to your local machine and then use File>Open. Before you do that, it is probably a good idea to close the current file so that there is no possible confusion between the Pizza ontology you developed and the new one with extra data.\n62", + "page_start": 62, + "page_end": 62, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "Chapter 1 Introduction\nThis introduces Protégé 5 for creating OWL ontologies as well as various plugins. If you have questions specific to this tutorial, please feel free to email me directly: mdebellissf@gmail.com However, if you have general questions about Protégé, OWL, or plugins you should subscribe to and send an email to the User Support for Protégé and Web Protégé email list. This list has many people (including me) who monitor it and can contribute their knowledge to help you understand how to get the most out of this technology. To subscribe to the list, go to: https://protege.stanford.edu/support.php and click on the first orange Subscribe button. That will enable you to subscribe to the list and give you the email to send questions to.\nThis chapter covers licensing and describes conventions used in the tutorial. Chapter 2 covers the requirements for the tutorial and describes the Protégé user interface. Chapter 3 gives a brief overview of the OWL ontology language. Chapter 4 focuses on building an OWL ontology with classes and object properties. Chapter 4 also describes using a Description Logic Reasoner to check the consistency of the ontology and automatically compute the ontology class hierarchy.\nChapter 5 describes data properties. Chapter 6 describes design patterns and shows one design pattern: adding an order to an enumerated class. Chapter 7 describes the various concepts related to the name of an OWL entity.\nChapter 8 introduces an extended version of the Pizza tutorial developed in chapters 1-7. This ontology has a small number of instances and property values already created which can be used to illustrate the tools in the later chapters for writing rules, doing queries, and defining constraints.\nChapter 9 describes two tools for doing queries: Description Logic queries and SPARQL queries. Chapter 10 introduces the Semantic Web Rule Language (SWRL) and walks you through creating SWRL and SQWRL rules. Chapter 11 introduces the Shapes Constraint Language (SHACL) and discusses the difference between defining logical axioms in Description Logic and data integrity constraints in SHACL. Chapter 12 has some concluding thoughts and opinions and Chapter 13 provides a bibliography.", + "page_start": 4, + "page_end": 4, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "A Practical Guide to Building OWL Ontologies Using Protégé 5.5 and Plugins\nPreprint · April 2021\nCITATIONS\n0", + "page_start": 0, + "page_end": 0, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + } + ] + }, + { + "references": { + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf", + "query": "When to use an enumerated class in OWL ontologies ?", + "target_page": 46, + "target_passage": "When a property has only a few possible values it can be useful to create a class to represent those values and to explicitly define the class by listing each possible value", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "4.14 Defining an Enumerated Class\nA powerful tool in the object-oriented programming (OOP) community is the concept of design patterns. The idea of a design pattern is to capture a reusable model that is at a higher level of abstraction than a specific code library. One of the first and most common design patterns was the Model-View-Controller pattern first used in Smalltalk and now almost the default standard for good user interface design. Since there are significant differences between OWL and standard OOP the many excellent books on OOP design patterns don't directly translate into OWL design patterns. Also, since the use of OWL is more recent than OOP there does not yet exist the excellent documentation of OWL patterns that the OOP community has. However, there are already many design patterns that have been documented for OWL and that can provide users with ways to save time and to standardize their designs according to best practices.\nOne of the most common OWL design patterns is an enumerated class. When a property has only a few possible values it can be useful to create a class to represent those values and to explicitly define the class by listing each possible value. We will show an example of such an enumerated class by creating a new\n44\nproperty called hasSpiciness with only a few possible values ranging from Mild to Hot . In this section we will also create the first individuals in our ontology.\nExercise 24: Create an Enumerated Class to Represent the Spiciness of a Pizza\n_____________________________________________________________________________________", + "page_start": 44, + "page_end": 45, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "4.14 Defining an Enumerated Class\n1. Create a new subclass of owl:Thing called Spiciness .\n2. Make sure that Spiciness is selected. Click on the Add icon (+) next to the Instances field in the Description view.\n3. You will be prompted with a window that looks like figure 4.24. The diamond icon at the top is for creating a new individual. The circle with an X through it is for deleting an individual. Use the diamond icon to create 3 individuals: Hot, Medium, and Mild, so your UI looks like figure 4.24, then click on OK.\n4. You may notice that only one of the new individuals was actually created as an instance of Spiciness . That's okay. The next step will supply the reasoner with enough information to make the other two also be instances of Spiciness .\n5. Make sure that Spiciness is still selected. Click on the Add icon (+) next to the Equivalent To field in the Description view. This time we will create a defined class by directly entering the definition for the class into this field. Select the Class expression editor tab and enter the DL axiom: {Hot, Medium, Mild}. Select OK.\n6. Now run the reasoner. You should see that Spiciness is now a defined class and all three individuals: Hot , Medium , and Mild , are now instances of that class.\n_____________________________________________________________________________________\nFigure 4.24 Creating Individuals for an Enumerated Class", + "page_start": 45, + "page_end": 45, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "4.1 Named Classes\nThe main building blocks of an OWL ontology are classes. In Protégé 5, editing of classes can be done in the Entities tab. The Entities tab has a number of sub-tabs. When you select it, the default should be the Class hierarchy view as shown in Figure 4.5. 4 All empty ontologies contains one class called owl:Thing . OWL classes are sets of individuals. The class owl:Thing is the class that represents the set containing all individuals. Because of this all classes are subclasses of owl:Thing .\n4 Each of the sub-tabs in the Entities tab also exists as its own major tab. In the tutorial we will refer to tabs like the Class hierarchy tab or Object properties tab and it is up to the user whether to access them from the Entities tab or to create them as independent tabs.\n13", + "page_start": 13, + "page_end": 13, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "A Practical Guide to Building OWL Ontologies Using Protégé 5.5 and Plugins\nPreprint · April 2021\nCITATIONS\n0", + "page_start": 0, + "page_end": 0, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "Chapter 6 Adding Order to an Enumerated Class\nIn this chapter we will expand on the enumerated class that we created to model spiciness in chapter 4.14. This chapter will highlight some of the power of object properties in OWL. We are going to create an ordering for the instances of Spiciness . I.e., Hot isSpicierThan Medium which isSpicierThan Mild . To start go to the Object properties tab. Create a new property that is a sub-property of owl:topObjectProperty. Call this property isSpicierThan. Make its domain and range the Spiciness class. Make the property transitive. Transitive means that if X isSpicierThan Y and Y isSpicierThan Z then X isSpicierThan Z. This is of course similar to the greater than and less than relations in math. Create another property called isMilderThan. Make one property the inverse of the other. It doesn't matter which one, you only have to specify that one property is the inverse of another, and the reasoner will realize that both are inverses. Run the reasoner. You will see that the reasoner has inferred the domain and range for isMilderThan than as well as the fact that it is transitive and the inverse of isSpicierThan .\nFigure 6.1 Setting isSpicierThan property in the Individuals by class tab\n58", + "page_start": 58, + "page_end": 58, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "4.10 Describing and Defining Classes\nNow that we have defined some properties, we can use these properties to define some more interesting classes. There are 3 types of classes in OWL:\n1. Primitive classes. These are classes that are defined by conditions that are necessary (but not sufficient) to hold for any individuals that are instances of that class or its subclasses. The condition may be as simple as: Class A is a subclass of class B . To start with we will define primitive classes first and then defined classes. When the reasoner encounters an individual that is an instance of a primitive class it infers that all the conditions defined for that class must hold for that individual.\n2. Defined classes. These are classes that are defined by both necessary and sufficient conditions. When the reasoner encounters an individual that satisfies all the conditions for a defined class it will make the inference that the individual is an instance of that class. The reasoner can also use the conditions defined on classes to change the class hierarchy, e.g., to infer that Class A is a subclass of Class B . We will see examples of this later in the tutorial.\n3. Anonymous classes. These are classes that you won't encounter much and that won't be discussed much in this tutorial, but it is good to know about them. They are created by the reasoner when you use class expressions. For example, if you define the range of a property to be PizzaTopping or PizzaBase then the reasoner will create an anonymous class representing the intersection of those two classes.", + "page_start": 29, + "page_end": 29, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "Chapter 1 Introduction\nThis introduces Protégé 5 for creating OWL ontologies as well as various plugins. If you have questions specific to this tutorial, please feel free to email me directly: mdebellissf@gmail.com However, if you have general questions about Protégé, OWL, or plugins you should subscribe to and send an email to the User Support for Protégé and Web Protégé email list. This list has many people (including me) who monitor it and can contribute their knowledge to help you understand how to get the most out of this technology. To subscribe to the list, go to: https://protege.stanford.edu/support.php and click on the first orange Subscribe button. That will enable you to subscribe to the list and give you the email to send questions to.\nThis chapter covers licensing and describes conventions used in the tutorial. Chapter 2 covers the requirements for the tutorial and describes the Protégé user interface. Chapter 3 gives a brief overview of the OWL ontology language. Chapter 4 focuses on building an OWL ontology with classes and object properties. Chapter 4 also describes using a Description Logic Reasoner to check the consistency of the ontology and automatically compute the ontology class hierarchy.\nChapter 5 describes data properties. Chapter 6 describes design patterns and shows one design pattern: adding an order to an enumerated class. Chapter 7 describes the various concepts related to the name of an OWL entity.\nChapter 8 introduces an extended version of the Pizza tutorial developed in chapters 1-7. This ontology has a small number of instances and property values already created which can be used to illustrate the tools in the later chapters for writing rules, doing queries, and defining constraints.\nChapter 9 describes two tools for doing queries: Description Logic queries and SPARQL queries. Chapter 10 introduces the Semantic Web Rule Language (SWRL) and walks you through creating SWRL and SQWRL rules. Chapter 11 introduces the Shapes Constraint Language (SHACL) and discusses the difference between defining logical axioms in Description Logic and data integrity constraints in SHACL. Chapter 12 has some concluding thoughts and opinions and Chapter 13 provides a bibliography.", + "page_start": 4, + "page_end": 4, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "3.1 Components of OWL Ontologies\nAn OWL ontology consists of Classes, Properties, and Individuals. OWL ontologies are an implementation of Description Logic (DL) which is a decidable subset of First Order Logic. A class in OWL is a set, a property is a binary relation, and an individual is an element of a set. Other concepts from set theory are also implemented in OWL such as Disjoint sets, the Empty set ( owl:Nothing ), inverse\n1 http://protege.stanford.edu\n6\nrelations, transitive relations, and many more. An understanding of the basic concepts of set theory will help the user get the most out of OWL but is not required. One of the benefits of Protégé is that it presents an intuitive GUI that enables domain experts to define models without a background in set theory. However, developers are encouraged to refresh their knowledge on logic and set theory. A good source is the first 3 chapters in Elements of the Theory of Computation by Lewis and Papadamitrious. Another good source is the PDF document Overview of Set Theory available at:\nhttps://www.michaeldebellis.com/post/owl-theoretical-basics", + "page_start": 6, + "page_end": 7, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "3.1.3 Classes\nOWL classes are sets that contain individuals. They are described using formal (mathematical) descriptions that rigorously define the requirements for membership of the class. For example, the class Cat would contain all the individuals that are cats in our domain of interest. 2 Classes may be organized into a superclass-subclass hierarchy, which is also known as a taxonomy. However, taxonomies are often trees. I.e., each node has only one parent node. Class hierarchies in OWL are not restricted to be trees and multiple inheritance can be a powerful tool to represent data in an intuitive manner.\nSubclasses specialize (aka are subsumed by ) their superclasses. For example, consider the classes Animal and Dog -Dog might be a subclass of Animal (so Animal is the superclass of Dog ). This says that All dogs are animals , All members of the class Dog are members of the class Animal . OWL and Protégé\n2 Individuals can belong to more than one class and classes can have more than one superclass. Unlike OOP where multiple inheritance is typically unavailable or discouraged it is common in OWL.\n8\nprovide a language that is called Description Logic or DL for short. One of the key features of DL is that these superclass-subclass relationships (aka subsumption relationships) can be computed automatically by a reasoner - more on this later. Figure 3.3 shows a representation of some classes containing individuals classes are represented as ovals, like sets in Venn diagrams.\nIn OWL classes can be built up of descriptions that specify the conditions that must be satisfied by an individual for it to be a member of the class. How to formulate these descriptions will be explained as the tutorial progresses.\n9", + "page_start": 8, + "page_end": 9, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "Exercise 1: Create a new OWL Ontology\n____________________________________________________________________________________\nAs with any file you work on it is a good idea to save your work at regular intervals so that if something goes wrong you don ' t lose your work. At certain points in the tutorial where saving is especially important the tutorial will prompt you to do so but it is a good idea to save your work often, not just when prompted.\nThe next step is to set some preferences related to the names of new entities. Remember than in Protégé any class, individual, object property, data property, annotation property, or rule is referred to as an entity. The term name in OWL can actually refer to two different concepts. It can be the last part of the IRI 3 or it can refer to the annotation property (usually rdfs:label ) used to provide a more user friendly name for the entity. We will discuss this in more detail below in chapter 7. For now, we just want to set the parameters correctly so that future parts of the tutorial (especially the section on SPARQL queries) will work appropriately.\n3 An IRI is similar to a URL. This will be discussed in detail below in chapter 7.\n10", + "page_start": 10, + "page_end": 10, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + } + ] + }, + { + "references": { + "source_file": "sg246915.pdf", + "query": "Howcan I specify to Content Manager OnDemand to store the data on the server on which the program runs ?", + "target_page": 121, + "target_passage": "Local: Content Manager OnDemand stores data in a primary storage node on the server on which the data loading program runs", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "10.2.3 Storing the resource data\nIf data caching is enabled, Content Manager OnDemand stores resources in the cache. Two locations on the Storage Management tab affect how resources are stored:\n/SM590000 Resource Data\n/SM590000 Document Data", + "page_start": 247, + "page_end": 247, + "source_file": "sg246915.pdf" + }, + { + "text": "2.1 Introduction\nA Content Manager OnDemand instance is a logical server environment. The base system components are a library server and one or more object servers. Optional components include one or more archive managers and one or more Full Text servers.", + "page_start": 39, + "page_end": 39, + "source_file": "sg246915.pdf" + }, + { + "text": "Load Type parameter\nThe Load Type parameter determines where Content Manager OnDemand stores data. Two values are possible (Figure 5-5):\n/SM590000 Fixed: Content Manager OnDemand stores data in the primary storage node that has the load data field selected. When Load Type is set to Fixed , you must select the load data check box for one primary storage node. Content Manager OnDemand loads data to only one primary storage node regardless of the number of primary nodes that are defined in the storage set.\n/SM590000 Local: Content Manager OnDemand stores data in a primary storage node on the server on which the data loading program runs. When the Load Type is Local , the load data check box must be selected for a primary storage node on each of the object servers that is identified in the storage set. A storage set can contain one or more primary storage nodes that are on one or more object servers.\nNext, we examine several parameters on the Add a Primary Node window (Figure 5-6 on page 98).\nChapter 5. Storage management\n97\n98\nIBM Content Manager OnDemand Guide\nFigure 5-6 Primary storage node definition", + "page_start": 120, + "page_end": 121, + "source_file": "sg246915.pdf" + }, + { + "text": "1.3.2 Content Manager OnDemand server components\nA Content Manager OnDemand server environment contains several components:", + "page_start": 34, + "page_end": 34, + "source_file": "sg246915.pdf" + }, + { + "text": "10.1 Introduction\nFor this chapter, unless explicitly stated otherwise, the term 'data' is used to refer to the report data, the extracted documents or segments, and their related indexes and the extracted resources.\nA Content Manager OnDemand system logically stores data in application groups . An application group is defined by the Content Manager OnDemand administrator. It consists of data that has the same indexing, data storage, and expiration requirements. The application group definition also specifies where the report and document data are stored, how long the data is stored, and how the data expires. The method or methods that can be used to expire the data are a function of the application group parameters that are defined before the data is loaded into Content Manager OnDemand. In a Content Manager OnDemand system, data typically goes through a lifecycle of loading, storing, migration, and an expiration process.", + "page_start": 243, + "page_end": 243, + "source_file": "sg246915.pdf" + }, + { + "text": "Content Manager OnDemand Client programs\nContent Manager OnDemand Client programs operate on various environments, including personal computers that are running on Windows, web browsers, and mobile devices. By using the client program, users can search for and retrieve reports that are stored on the system. Specifically, users can construct queries and search for reports, retrieve documents from Content Manager OnDemand, view, print, and fax copies or pages of documents, and attach electronic notes to the pages of a document.\nChapter 1. Overview and concepts\n5\nContent Manager OnDemand servers manage control information and index data, store and retrieve documents and resource group files, and process query requests from Content Manager OnDemand Client programs. The documents can be on disk and tape storage volumes. New reports can be loaded into Content Manager OnDemand every day. This way, Content Manager OnDemand can retrieve the latest information that is generated by application programs.\nWhen a user submits a query, the client program sends a search request to the Content Manager OnDemand library server. The library server returns a list of the documents that match the query to the user. When the user selects a document for viewing, the client program retrieves a copy of the document from the object server where the document is stored, opens a viewing window, and displays the document.\nFull text search allows users to search the full content of stored documents. For example, users can perform wildcard searches, fuzzy (or similar) searches, proximity searches, and boolean searches.\nDocuments or reports can also be automatically distributed to users through email or network printers. The distributions can be scheduled to occur at the time that the data is loaded or at specific times during the day.", + "page_start": 28, + "page_end": 29, + "source_file": "sg246915.pdf" + }, + { + "text": "Server commands\nIn addition to the API options, which are exposed through Java, OLE, or Web Services, Content Manager OnDemand provides console (command-line) applications that provide specific functions, such as searching, retrieving, or deleting documents, and sophisticated functions, such as placing holds and working with the full text engine. Most of this functionality is exposed through the ARSDOC application.\nSimpler custom applications, for example, shell scripts, can use these server console applications to interact with Content Manager OnDemand systems. The applications are available only as part of a Content Manager OnDemand server installation. Because most of them (namely ARSDOC ) communicate with the server through TCP/IP, you can connect and interact with Content Manager OnDemand servers remotely on other platforms. When you call remote servers, ensure that the local installation that provides the ARS applications and the actual Content Manager OnDemand server are on the same version level.\nFor more information about the administrative commands, see the specific command descriptions in the IBM Content Manager OnDemand Knowledge Center:\nhttp://www.ibm.com/support/knowledgecenter/SSEPCD_9.0.0/com.ibm.ondemandtoc.doc/ad ministering.htm", + "page_start": 228, + "page_end": 228, + "source_file": "sg246915.pdf" + }, + { + "text": "1.3 Content Manager OnDemand server and its components\nOn IBM z/OSfi and Multiplatforms (MP) systems, the Content Manager OnDemand server can be implemented as a library server and one or more object servers that are on one or more nodes that are connected to a Internet Protocol network. For the Content Manager OnDemand system overview, see Figure 1-1 on page 5.", + "page_start": 33, + "page_end": 33, + "source_file": "sg246915.pdf" + }, + { + "text": "System Logging\nThis setting specifies the messages that Content Manager OnDemand saves in the system log. Content Manager OnDemand provides the system log to help you track activity and monitor the system. Content Manager OnDemand saves messages that are generated by the various programs, such as the ARSLOAD program. Content Manager OnDemand can save a message in the system log when the following events occur:\n/SM590000 A user logs on to the system.\n/SM590000 A user logs off the system.\n/SM590000 A user logon fails.\n/SM590000 Application group data is queried, retrieved, loaded, updated, deleted, or maintained.", + "page_start": 166, + "page_end": 166, + "source_file": "sg246915.pdf" + }, + { + "text": "Content Manager OnDemand for i server\nBy default, the Content Manager OnDemand for i server activates the security exit and uses IBM i security. If the security exit is not enabled, the Content Manager OnDemand user ID and password have no relationship to the IBM i user ID and password, and all of the Content Manager OnDemand system parameter settings are honored. You can enable or disable this exit at an individual instance level.", + "page_start": 176, + "page_end": 176, + "source_file": "sg246915.pdf" + } + ] + }, + { + "references": { + "source_file": "sg246915.pdf", + "query": "Does the XML indexer of Content Manager OnDemand support large objects ?", + "target_page": 188, + "target_passage": "No", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "1.3.2 Content Manager OnDemand server components\n- The XML Indexer allows the rapid increase in XML archiving mandates that are based on ISO 20022 standards with XML (including SEPA in Europe). The XML Indexer is optimized for high-volume batch archiving of XML, batch PDF, AFP, Line Data, and check images.\n- The Full Text Indexer provides the capability to index the full text of a document (or report). You can search through an indexed document.\n/SM590000 Data loading programs can be set up to automatically store report data into application groups and update the database. The data loading programs can run on any Content Manager OnDemand server.\n/SM590000 Report Distribution Facility provides an easy way to automatically group reports and portions of reports and distribute the reports to multiple users. Distributions can be printed, created as an output file, or emailed as an attachment.\n/SM590000 Both the archived reports and their resources are stored in the Content Manager OnDemand Archive. The Content Manager OnDemand system manages the stored data throughout its lifetime. It provides authorized users rapid access to the data and allows the data to be converted into different formats for display or print.\n/SM590000 A server print facility allows users to reprint a large volume of documents at high speed. Print servers, such as Infoprint (on AIX), can be started to manage the server print devices. These print servers are not part of Content Manager OnDemand and must be purchased separately.\n/SM590000 Content Manager OnDemand management programs maintain the Content Manager OnDemand database and documents in cache storage.\n/SM590000 A system logging facility provides administrators with tools to monitor server activity and respond to specific events as they occur. The interface to the system logging facility is through the system log folder and the system log user exit.\nSPONSORSHIP PROMOTION\nenChoice\nTHE ABOVE IS A PAID PROMOTION. IT DOES NOT CONSTITUTE AN ENDORSEMENT OF ANY OF THE ABOVE COMPANY'S PRODUCTS, SERVICES OR WEBSITES BY IBM. NOR DOES IT REFLECT THE OPINION OF IBM, IBM MANAGEMENT, SHAREHOLDERS OR OFFICERS. IBM DISCLAIMS ANY AND ALL WARRANTEES FOR GOODS OR SERVICES RECEIVED THROUGH OR PROMOTED BY THE ABOVE COMPANY.\nTHIS PAGE INTENTIONALLY LEFT BLANK\nChapter 2.", + "page_start": 35, + "page_end": 38, + "source_file": "sg246915.pdf" + }, + { + "text": "7.1.3 Choosing an indexer\nTable 7-1 Indexers that are available for use with Content Manager OnDemand\nGeneric, Input data type = All. Generic, Available platforms = All. Generic, Conversion = No. Generic, Resource collection = No. Generic, Large object support = No. Generic, Floating triggers = No. ACIF, Input data type = Line, AFP. ACIF, Available platforms = All, except IBM i. ACIF, Conversion = Line to AFP. ACIF, Resource collection = Yes. ACIF, Large object support = Yes. ACIF, Floating triggers = Yes. PDF, Input data type = PDF. PDF, Available platforms = All, except z/OS. PDF, Conversion = No. PDF, Resource collection = Yes. PDF, Large object support = No. PDF, Floating triggers = Yes. OS/400, Input data type = Line, AFP, SCS, and SCS-Ext. OS/400, Available platforms = IBM i. OS/400, Conversion = SCS to AFP. OS/400, Resource collection = Yes. OS/400, Large object support = Yes. OS/400, Floating triggers = Yes. OS/390, Input data type = Line, AFP. OS/390, Available platforms = z/OS and AIX. OS/390, Conversion = No. OS/390, Resource collection = Yes. OS/390, Large object support = Yes. OS/390, Floating triggers = Yes. XML, Input data type = XML. XML, Available platforms = All. XML, Conversion = No. XML, Resource collection = Yes. XML, Large object support = No. XML, Floating triggers = No", + "page_start": 187, + "page_end": 187, + "source_file": "sg246915.pdf" + }, + { + "text": "Large object\nIn the File Format section, you can set support for large objects. Content Manager OnDemand large object support provides enhanced usability and better retrieval performance for reports that contain large documents.\nFor example, suppose that a report contains statements that typically exceed 1,000 pages. With large object support, the statements can be divided into parts of 100 pages. When a user views a statement, Content Manager OnDemand retrieves and uncompresses the first part of the statement. To view a specific page of a statement, the user can choose the Go To command in the viewer window and enter the page number. Content Manager OnDemand automatically retrieves and uncompresses the part of the statement that contains the requested page. When the user moves from page to page of a statement, Content Manager OnDemand automatically retrieves and uncompresses parts of the statement as needed.\nWhen you use large object support, users experience consistent response time when they move from page to page of the document.\nYou must consider several factors when you use large object support:", + "page_start": 75, + "page_end": 76, + "source_file": "sg246915.pdf" + }, + { + "text": "Carriage controls\nChapter 7. Indexing and loading\n175\n176\nIBM Content Manager OnDemand Guide", + "page_start": 198, + "page_end": 199, + "source_file": "sg246915.pdf" + }, + { + "text": "1.3.2 Content Manager OnDemand server components\n- The IBM OS/390 Indexer is a high-performance indexer that can be used to index various data types and is available on both IBM z/OS and IBM AIXfi.\n- The IBM OS/400 Indexer can be used to index various data types. It is the most common Content Manager OnDemand indexer for IBM i spooled files.\n- The Content Manager OnDemand PDF Indexer can be used to create index data for Adobe Portable Document File (PDF) files.\n- The Content Manager OnDemand Generic Index File Format can be used to provide index data for almost any other type of data, such as HTML documents, word-processing documents, and Tagged Image File Format (TIFF) files.\nChapter 1. Overview and concepts\n11\n12\nIBM Content Manager OnDemand Guide", + "page_start": 34, + "page_end": 35, + "source_file": "sg246915.pdf" + }, + { + "text": "10.2 Loading and storing the data\nThe Content Manager OnDemand architecture allows the control and management of the data throughout its lifecycle. The data lifecycle begins with running an efficient load process. Each load process invocation ingests report data for a specified application group.\nDuring a load process, Content Manager OnDemand stores report (document) data, its resources, and index data, as shown in Figure 10-1.\nFigure 10-1 Data and index storage locations\nThe Content Manager OnDemand load process identifies, segments, and compresses groups of documents into storage objects that are then stored in the Content Manager OnDemand archive, as illustrated in Figure 10-1. To improve the efficiency of the storage process, Content Manager OnDemand aggregates the stored documents (typically a few kilobytes in size) into storage objects. This aggregation provides efficient, high-volume storage, retrieval, and expiration performance.\n220\nIBM Content Manager OnDemand Guide\nThe object size is defined by clicking Advanced on the Storage Manager tab of the Application Group window. The object size is the size of a storage object in kilobytes (KB). By default, Content Manager OnDemand segments and compresses report data into 10 MB storage objects. For most use cases, the default value is appropriate. Valid values are 1 KB - 150 MB.\nObject size value: Exercise caution when you change the object size value. Specifying too large or too small a value can adversely affect performance when you load data.\nThe storage objects are stored in storage sets . The storage sets contain one or more primary storage nodes . The storage node points to the location where the data is stored, which can be cache, the storage manager (Tivoli Storage Manager, object access method (OAM), or Archive Storage Manager (ASM)), or a combination.\nThe primary storage nodes can be on one or more object servers. When the Load Type is Local , Content Manager OnDemand loads data on the server on which the data loading program runs in the primary storage node with the Load Data property specified. If the Load Type is Local , and the storage set contains primary nodes on different object servers, you must select the Load Data check box for one primary node on each object server.", + "page_start": 243, + "page_end": 244, + "source_file": "sg246915.pdf" + }, + { + "text": "Large object\n/SM590000 The report must be indexed with an indexing program that generates a large object by dividing large documents into smaller parts and defining the indexing information that is used to retrieve the documents.\n/SM590000 The amount of data per page and the number of pages that you divide documents into affects retrieval and viewing response time. The number of bytes per page typically dictates the number of pages that you can divide documents into. In general, the larger the page size in bytes, the smaller the number of pages that you can divide your documents into. For example, if the average page in the document contains 2.5 KB of data, choose 100 - 1000 pages per Large Object (LO) segment; if the average page in the document contains 50 KB of data, choose 1 - 100 pages per LO segment.\n/SM590000 The capacity of your network and the traffic in the network might determine the number of pages that you need to divide your documents into. Larger document sizes (large byte size even when compressed) require more network bandwidth (or more time if the bandwidth is not available) to transfer from a Content Manager OnDemand server to a client. The number of users that are concurrently accessing Content Manager OnDemand and the sizes of the documents that are being retrieved determine the overall load in the network.\n/SM590000 Response time requirements. The goal of Content Manager OnDemand large objects is to provide better performance and usability. Large object support clearly provides enhanced usability. However, you must implement large object support so that dividing your documents into parts provides better overall performance than other methods of segmenting the input data.\nWhen you choose a large object, Content Manager OnDemand displays the Number of Pages field. Specify the number of pages that you want Content Manager OnDemand to divide documents into in the Number of Pages field.\nTo generate large objects, the indexer that is specified on the Indexing Information page must be AFP Conversion and Indexing Facility (ACIF), OS/390, or OS/400. When you select the Large Object check box, Content Manager OnDemand automatically adds the INDEXOBJ=ALL parameter to the indexing parameters (which causes the indexing program to generate the large object indexing information).", + "page_start": 76, + "page_end": 76, + "source_file": "sg246915.pdf" + }, + { + "text": "7.1 Introduction\nBefore documents can be loaded into Content Manager OnDemand, they must be indexed. These indexes can be created during the load process (OS/390 indexer), directly before the load process (Advanced Function Presentation (AFP) Conversion and Indexing Facility (ACIF), OS/400, XML, and Portable Document Format (PDF) indexers), or before the load process (Generic indexer). When the indexes are not created as part of the load process, they are stored in an index file . The index file contains the index values that are associated with the document and 'pointers' to the documents. You cannot load documents into Content Manager OnDemand without index values.\nThe index values are text strings that occur in the documents, for example, 'John Doe', or 'Account 1234'. One or more index values identify a unique document in Content Manager OnDemand.\nAn indexer extracts the index values and optionally stores them in the index file by examining the documents and copying the index values into the index file according to criteria that are specified by the user. Depending on the indexer that is used, the data and indexes are either directly loaded into Content Management OnDemand or are stored in a set of files that are then read by the load process to store the data to Content Manager OnDemand. The indexer creates the following files:\n/SM590000 Output file (. out file extension), which contains the documents to load\n/SM590000 Index file (. ind file extension), which contains the index values for the documents\nThe indexer might also create a resource file with a .res extension, which contains the resources that are extracted from the documents.\nOperationally, the loading process arsload calls the indexer that is specified on the Indexer Information tab for the specified application. Depending on the indexer type, arsload performs one of the following tasks:\n/SM590000 Creates a set of files that is then loaded by the arsload program into the Content Manager OnDemand System\n/SM590000 Directly passes the indexing and document information to the arsload program so that they can be loaded into the Content Manager OnDemand System", + "page_start": 185, + "page_end": 185, + "source_file": "sg246915.pdf" + }, + { + "text": "10.2.2 Storing the index data\nThe Content Manager OnDemand load process extracts document indexes from the report data and stores the indexes in the Content Manager OnDemand database application group data tables . With these indexes, users can efficiently locate, select, and retrieve documents. Typically, indexes are expired when the document data is expired.\nEach application group is segmented into multiple physical tables by using a date or a date and time field. The size of each physical table is determined by the Max rows setting. Each row in the table contains a set of user-defined and system-defined indexes that enable the search for a report segment or a document. Index data is loaded into a table. When the Max rows value is reached, the table is closed and a new table is created. The number of physical tables that represent an application group might grow from 1 to n .", + "page_start": 247, + "page_end": 247, + "source_file": "sg246915.pdf" + }, + { + "text": "7.7 Getting started with XML Indexing\nThe XML indexer enables the high-volume archiving of XML data in a scalable and extensible manner.\nThe XML indexer was developed to support the growing need to efficiently and effectively store large quantities of XML data, for example:\n/SM590000 The European Union's implementation of a Single Euro Payments Area (SEPA). SEPA replaced the existing domestic retail credit transfers and direct debits with standardized European payments that are based on Extensible Markup Language (XML) International Organization for Standardization (ISO) 20022 messages. ISO 20022 provides a more efficient way of developing and implementing messaging standards that financial institutions and clients use to exchange massive amounts of transactional information.\n/SM590000 Other XML standards exist and continued to be developed, such as ACORD (Insurance industry), AgXML (Agriculture), and Health Level Seven (Health industry).\n/SM590000 XML document formats were developed, such as Office Open XML (OOXML) and Open Document (OASIS).\nWith XML indexing, you can automatically batch index and archive XML transactional messages and statements into the Content Manager OnDemand repository. Documents are identified and extracted during indexing. Resources are extracted, and, together with the data, compressed and archived. Multiple stylesheets can be specified to meet device and accessibility requirements.\nXML steeliest (resource) archiving is critical. Content Manager OnDemand optimizes the storage of XML data by storing only a single version of a resource and then associating it with all of the archived documents. Document resources can be automatically collected and managed.\nXML data is loaded into Content Manager OnDemand by using the arsload command. For example, the following statement loads the bamboo.in file and its .res file (if found):\narsload -I localhost -u userName -p load.stach -g ci_stmts bamboo,in\nThe XML indexer uses the 'Generic XML Index File Format' (GXIFF). The GXIFF format is functionally similar to the Generic Index File Format in that it allows the loading of any type of data into Content Manager OnDemand.\nFor more information about using the XML indexer, see IBM Content Manager OnDemand Indexing Reference , SC19-3354.", + "page_start": 205, + "page_end": 206, + "source_file": "sg246915.pdf" + } + ] + }, + { + "references": { + "source_file": "sg246915.pdf", + "query": "Considering storage efficiency, should I store my AFP documents as PDF to distribute them over the web ?", + "target_page": 232, + "target_passage": "If a requirement exists to present AFP documents in the Portable Document Format (PDF) format over the web, from a storage perspective, it is more efficient to store the documents in their native format and then convert them to PDF at retrieval tim", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "AFP to PDF\nIf a requirement exists to present AFP documents in the Portable Document Format (PDF) format over the web, from a storage perspective, it is more efficient to store the documents in their native format and then convert them to PDF at retrieval time. AFP documents are stored more efficiently than PDF documents.\nThe PDF print stream, when it is divided into separate customer statements, is larger than AFP because each statement contains its own set of structures that are required by the PDF architecture to define a document.\nElapsed time and processor time are also essential factors in the decision-making process. The amount of time (elapsed and CPU) that is needed to convert the document depends on how large the document is and how many resources or fonts are associated with the document.\n208\nIBM Content Manager OnDemand Guide", + "page_start": 231, + "page_end": 231, + "source_file": "sg246915.pdf" + }, + { + "text": "7.1.2 Understanding input data types\nYou can also run the arsafpd command to display the contents of an AFP document, index, or resource file. For more information about ARSAFPD, see the Content Manager OnDemand for Multiplatforms Administration Guide, SC19-3352.", + "page_start": 187, + "page_end": 187, + "source_file": "sg246915.pdf" + }, + { + "text": "Reloading ad hoc stored documents\nIf you choose not to take advantage of the ability of Content Manager OnDemand to aggregate documents but instead you choose to load documents ad hoc by using the storeDocument Java API, StoreDoc Object Linking and Embedding (OLE) API, or CommonStore, you must migrate the data later.\nIf you choose not to take advantage of the ability of Content Manager OnDemand to aggregate documents into 10 MB storage objects, this decision might result in millions of small objects that are stored in your storage manager, which might cause the storage manager to experience performance problems when it migrates these small objects to tape.\nNote: Consider aggregating these smaller objects into larger objects for performance reasons.\nFor you to aggregate all of these tiny objects into larger objects after they are stored individually requires that you retrieve and reload them as larger objects. You might want to engage IBM Lab Services to assist you with this task.\nAnother option is to not migrate objects to tape, but to use another random access hardware device instead.\nChapter 10. Migration and expiring data and indexes\n229", + "page_start": 252, + "page_end": 252, + "source_file": "sg246915.pdf" + }, + { + "text": "13.4.3 AFP data\nAFP data is a multi-part data type. In addition to the variable data, external resources, such as images, fonts, and logos, are also referenced by the AFP data stream. When Content Manager OnDemand stores AFP data, the resources are also archived. When the data is viewed, the referenced resources are displayed.\nIt is a common misconception that if fonts are collected when the data is loaded, they are available for viewing in the Windows client. However, Windows does not recognize AFP fonts. It is not possible to use these fonts even if they are sent to the client as part of the resource. Windows clients require a mapping from AFP fonts to Adobe Type Manager (ATM) fonts or TrueType (TT) fonts. Content Manager OnDemand provides this mapping for most standard fonts. For more information about mapping custom fonts, see IBM Content Manager Windows Client Customization Guide and Reference , SC27-0837.\nOne possibly useful implementation of storing fonts with the resource group is when server reprint is necessary. If the fonts are stored with the resource group, they can be retrieved from Content Manager OnDemand and used by AFP printers. However, if fonts are collected, they are also sent to the client as part of the resources group and then discarded. Storing the fonts with the resource group serves only to increase network traffic when transferring the resource to the workstation. A more practical option for server printing is to store the font in a fontlib and to keep only the reference (path) to the fontlib . Although the font is accessible on the server, Print Services Facility (PSF) or InfoPrint does not need the font to be inline (stored in the resource group). The use of this approach also allows all AFP data that references the font to use the single instance of the font without redundant inline storage.\nFigure 13-5 on page 311 shows the indexer information in the application where you can select the resources to collect with the Restype= parameter. Unless reprints to AFP printers with 100% fidelity is a requirement, do not collect the fonts.\nFigure 13-5 Collecting AFP fonts", + "page_start": 333, + "page_end": 334, + "source_file": "sg246915.pdf" + }, + { + "text": "13.4.1 PDF data\nPortable Document Format (PDF) data is an increasingly common data type that can be archived within Content Manager OnDemand. The following key advantages are available by using this data type as a document format:\n/SM590000 It is a read-only format that does not require any external resources, such as images or fonts. It is self-contained.\n/SM590000 The viewer for PDF can be downloaded at no charge from the Adobe website and the browser plug-ins for PDF are also available at no charge.\nDuring PDF document creation, resources, such as images and custom fonts, are placed in the data stream once and then referenced many times from within the PDF file. If a large report is produced from many small documents, that report requires only one copy of the resources.\nHowever, when the PDF is indexed, the PDF Indexer creates many PDF documents from the input file. Each of these documents requires a certain number of PDF structures, which define a document. These documents are concatenated together in the .out file, and then loaded into Content Manager OnDemand as separate documents. Because the resources are extracted and placed into a separate resource file, they are not included in each document. For an illustration of the process, see Figure 13-3.\nFigure 13-3 PDF indexing\nIf no resources are collected, the size of the .out file, which contains all of the individual documents, might be larger than the original file. For tips about how to reduce the size of the output file, see 7.3.5, 'PDF indexing: Using internal indexes (Page Piece Dictionary)' on page 173.\n308\nIBM Content Manager OnDemand Guide\nThe size of the input file and the output file can create problems during the load process:\n/SM590000 The temporary space that is used during indexing can be too small and the load fails.\n/SM590000 The maximum input file size that the PDF Indexer can process is 4 GB, but the recommended maximum size for a single document (after indexing) is 50 MB. If this size is exceeded, the system might run out of disk space or memory.", + "page_start": 331, + "page_end": 332, + "source_file": "sg246915.pdf" + }, + { + "text": "Index size calculation\nAlthough the disk space usage depends on the text in each document, this usage is linear to the original size of the indexed data. Typically, the size of the index on the disk is 50% - 150% of the original text size as illustrated in the following formulas:\nminimum disk space = Number of documents x document size x 50%\nmaximum disk space required = Number of documents x document size x 150%\nThe actual percentage, 50% through 150%, is data-dependent. So, an exact number can be obtained only by testing with your data.\nFor example, 100,000 documents of 20 KB each can require about 1500 MB (100,000 x 20 KB x 75%) of disk space.\nTip: To determine the text size for AFP and Line Data documents, extract a sample document and use the arsview server command to determine the text size.\nThe size of the index is not limited. However, when data is added to or removed from a text index, the text index structure is merged to improve query performance. The required processing time to complete the merger depends on several factors, such as index size and absolute throughput (which in turn depends on the data type and index format). These factors result in practical limits on the total text index size.\nFor query performance, the biggest impact is the number of matching results, not the size of the text index.", + "page_start": 364, + "page_end": 364, + "source_file": "sg246915.pdf" + }, + { + "text": "FILEFORMAT parameter\nFor AFP data, the FILEFORMAT parameter is not needed, unless the file is AFP in record format. For a description of record format, see 'AFP Structured Fields' on page 176.\nThe FILEFORMAT parameter has the following values:\n/SM590000 record,n :\n- For example: FILEFORMAT=record,100 .\n- Fixed-length line data.\n- This type of file has no delimiter.\n/SM590000 stream :\n- For example: fileformat = stream,(newline=X'0A') or (newline=X ' 0D0A ' ) .\n- For variable record files that are created on UNIX platforms.\n- Specify the delimiter in the FILEFORMAT parameter.\n/SM590000 record :\n- For example: FILEFORMAT=record .\n- Each record has a 2-byte prefix, which contains the length of the record. This length is exclusive, which means that it does not include the length of the 2-byte prefix itself. A download for z/OS adds this prefix when it downloads files.\n- This type of file has no delimiter.", + "page_start": 198, + "page_end": 198, + "source_file": "sg246915.pdf" + }, + { + "text": "Web viewing considerations\n/SM590000 For Line Data:\n- The line data applet supports annotations. It can work with large object (LOB) reports if the large object functionality is employed at load time.\n- The Ajax viewer and direct rendering capabilities of Content Navigator work only on shorter reports. Additionally, the viewing of annotations and large object documents is not supported.\n/SM590000 For AFP data:\n- The AFP plug-in is the best choice, because it is almost identical to the client. However, it does not support annotations.\nThe only viewers that use this functionality are the line data applet, the AFP plug-in viewer, and the Content Manager OnDemand Windows client.\n- AFP to PDF is a choice that does not require a plug-in rollout at the users' computers if the Acrobat plug-in is installed on their workstations. Font mappings must be configured at a central location. The additional workload on a rendering system and additional license costs must be considered. Large reports might not be able to be rendered or viewed.\nNote: The AFP viewer plug-in, which is available with ODWEK and Content Manager OnDemand, is a version of the AFP viewer plug-in from the InfoPrint Solutions Company. Although the standard InfoPrint viewer can be used for viewing AFP, the ODWEK version uses direct communication with the Content Manager OnDemand server, enabling segmented document transfer for LOB documents.", + "page_start": 212, + "page_end": 212, + "source_file": "sg246915.pdf" + }, + { + "text": "Installation\nContent Manager OnDemand provides the ARSPDF32.API file to enable PDF viewing from the client.\nIf you install the client after you install Adobe Acrobat, the installation program copies the application programming interface (API) file to the Acrobat plug-in directory.\nIf you install the client before you install Adobe Acrobat, you must copy the API file to the Acrobat plug-in directory manually.\nIf you upgrade to a new version of Acrobat, you must copy the API file to the new Acrobat plug-in directory.\nThe default location of the ARSPDF32.API file is:\nC:\\Program Files (x86)\\IBM\\OnDemand Clients\\V9.5\\PDF\nThe default Acrobat plug-in directory is C:\\Program Files (x86)\\Adobe\\Acrobat x.y \\Acrobat\\plug_ins . The variables x.y represent the version of Acrobat, for example, C:\\Program Files (x86)\\Adobe\\Acrobat 10.0\\Acrobat\\plug_ins .", + "page_start": 192, + "page_end": 192, + "source_file": "sg246915.pdf" + }, + { + "text": "AFP Structured Fields\nAFP, which is also called Mixed Object Document Content Architecture (MODCA), is a printing architecture that was designed and created by IBM. The beginning of each AFP record is called the AFP Structured Field Introducer . The following sample shows an example and description of an AFP Structured Field Introducer (which is shown in the hexadecimal):\n5A 00 10 D3 A8 A8 00 00 00\n/SM590000 The first byte is always x'5A'.\n/SM590000 The second and third bytes are the length (maximum length of 32767).\n/SM590000 The fourth byte is always x'D3'.\n/SM590000 The fourth, fifth, and sixth bytes are the Structured Field Identifier, for example, x'D3A8A8' or x'D3A8AF'.\n/SM590000 The seventh byte is the flag byte. The last two bytes are reserved and usually zeros.\n/SM590000 The information that follows the reserved bytes depends on the Structured Field.\n/SM590000 The length does not include the x'5A'.\nFor more information, see the Mixed Object Document Content Architecture (MO:DCA) Reference , AFPC-0004-08, at the following website:\nhttp://afpcinc.org/afp-publications/\nThe following two examples in hexadecimal of the AFP Structured Field Introducer show the most common Structured Fields that you might see at the beginning of an AFP file:\n5A 00 10 D3 A8 A8 00 00 00 Begin Document (BDT)\n5A 00 5B D3 A8 C6 00 00 00 Begin Resource Group (BRG)\nAn AFP Structured Field can begin with the 2-byte length prefix (which is called record format ):\n00 11 5A 00 10 D3 A8 A8 00 00 00\nThe length in the 2-byte prefix is one greater than the length in the Structured Field because the 2-byte prefix includes the x'5A', but it does not include itself.\nWhen you work with ACIF, it is important to know the format of the data. Use the arsafpd utility or look at the input in a hex editor to be sure.", + "page_start": 199, + "page_end": 199, + "source_file": "sg246915.pdf" + } + ] + }, + { + "references": { + "source_file": "uksi_20200438_en.pdf", + "query": "Where can I consult a summary of the impact of the International tax compliance regulations ?", + "target_page": 3, + "target_passage": "A Tax Information and Impact Note covering the International Tax Compliance Regulations 2015 was published on 18th March 2015 and is available on the HMRC website at https://www.gov.uk/government/publications/tax-administration-regulations-to-implement-the- uks-automatic-exchange-of-information-agreements", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "Amendments to the International Tax Compliance Regulations 2015\n2. -(1) The International Tax Compliance Regulations 2015( b ) are amended as follows.\n(2) In regulation 1(3)(b)(i), for '16th May 2019' substitute '19th April 2020'( c ).\n(3) In regulation 3(4A)(a), at the beginning insert 'subject to regulation 24(3)'.\n(4) In regulation 24-\n(a) in the table in paragraph (2), in the column headed 'the CRS'-\n(i) at the beginning of the entry for 'new account' insert 'subject to paragraph (3)', and\n(ii) at the beginning of the entry for 'pre-existing account' insert 'subject to regulation 3(4A)(a) and paragraph (3)', and\n(b) after paragraph (2) insert-\n'(3) In respect of the accounts listed in paragraph (4)-\n( a ) 2013 c. 29; section 222 was amended by section 50 of the Finance (No. 2) Act 2015 (c. 33) but the amendments are not relevant to these Regulations.\n( b ) S.I. 2015/878 (referred to in these footnotes as 'the principal Regulations'); relevant amending instruments are S.I. 2017/598, 2018/490 and 2019/881.\n( c ) In accordance with the common reporting standard for automatic exchange of financial account information developed by the Organisation for Economic Co-operation and Development and adopted by the United Kingdom, the United Kingdom exchanges information received from financial institutions under the principal Regulations with a territory which is a 'Reportable Jurisdiction' under the CRS and with which the United Kingdom has entered into international exchange arrangements for that year. Reportable Jurisdictions are identified in a published list available at https://www.gov.uk/hmrcinternal-manuals/international-exchange-of-information/ieim402340. A hard copy of this list is available for inspection at the offices of HMRC at 10 South Colonnade, 9th Floor, Canary Wharf, London E14 4PU.", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20200438_en.pdf" + }, + { + "text": "Citation and commencement\n1. These Regulations may be cited as the International Tax Compliance (Amendment) Regulations 2020 and come into force on 13th May 2020.", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20200438_en.pdf" + }, + { + "text": "EXPLANATORY NOTE\n(This note is not part of the Regulations)\nThe Regulations amend the International Tax Compliance Regulations 2015 ('the principal Regulations') which give effect to agreements and arrangements reached between the United Kingdom and other jurisdictions to improve international tax compliance.\nRegulation 2(2) extends the application of the principal Regulations to arrangements entered into by the United Kingdom for the exchange of financial account information with other jurisdictions up to 19th April 2020, the date before the Regulations are made.\nRegulation 2(5) omits various accounts from the category of excluded accounts. Regulation 2(4)(b) amends the definitions of 'new account' and 'pre-existing account' in relation to those\n( a ) 'Financial account' and 'reporting financial institution' are defined in the table in regulation 24(2) of the principal Regulations.\n( b ) 'The DAC' is defined in regulation 1(3)(a) of the principal Regulations.\n2\naccounts so that these terms are defined by reference to the date that those accounts ceased to be excluded accounts. Regulation 2(3) and (4)(a) make consequential amendments.\nRegulation 3 makes a transitional provision for the calendar year 2020 in relation to accounts which were previously excluded accounts.\nA Tax Information and Impact Note covering the International Tax Compliance Regulations 2015 was published on 18th March 2015 and is available on the HMRC website at https://www.gov.uk/government/publications/tax-administration-regulations-to-implement-theuks-automatic-exchange-of-information-agreements. It remains an accurate summary of the impacts that apply to this instrument.\n' Crown copyright 2020\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, Controller of Her Majesty's Stationery Office and Queen's Printer of Acts of Parliament.\n3\n£4.90\nUK202004201005 04/2020 19585\nhttp://www.legislation.gov.uk/id/uksi/2020/438", + "page_start": 1, + "page_end": 3, + "source_file": "uksi_20200438_en.pdf" + }, + { + "text": "The International Tax Compliance (Amendment) Regulations 2020\nMade\n-\n-\n-\n-\n20th April 2020\nLaid before the House of Commons\n21st April 2020\nComing into force\n- -\n13th May 2020\nThe Treasury make these Regulations in exercise of the powers conferred by section 222 of the Finance Act 2013( a ):", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20200438_en.pdf" + }, + { + "text": "ITEM 6. SELECTED FINANCIAL DATA (in millions, except per share data)\ntaxesÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ, Years Ended December 31,.2000 = 356.4. Provision for income taxes ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ, Years Ended December 31,.2004 = 145.8. Provision for income taxes ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ, Years Ended December 31,.2003 = 132.0. Provision for income taxes Ï��ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ, Years Ended December 31,.2002 = 146.9. Provision for income taxes ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ, Years Ended December 31,.2001 = 83.8. Provision for income taxes ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ, Years Ended December 31,.2000 = 135.4. Income before cumulative eÅect of changes in accounting principlesÏÏÏÏÏÏÏ, Years Ended December 31,.2004 = 237.9. Income before cumulative eÅect of changes in accounting principlesÏÏÏÏÏÏÏ, Years Ended December 31,.2003 = 215.4. Income before cumulative eÅect of changes in accounting principlesÏÏÏÏÏÏÏ, Years Ended December 31,.2002 = 239.6. Income before cumulative eÅect of changes in accounting principlesÏÏÏÏÏÏÏ, Years Ended December 31,.2001 = 125.5. Income before cumulative eÅect of changes in accounting principlesÏÏÏÏÏÏÏ, Years Ended December 31,.2000 = 221.0. Cumulative eÅect of changes in accounting principles ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ, Years Ended December 31,.2004 = Ì. Cumulative eÅect of changes in accounting principles ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ, Years Ended December 31,.2003 = (37.8). Cumulative eÅect of changes in accounting principles ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ, Years Ended December 31,.2002 = Ì. Cumulative eÅect of changes in accounting principles ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ, Years Ended December 31,.2001 = Ì. Cumulative eÅect of changes in accounting principles ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ, Years Ended December 31,.2000 = Ì. Basic earnings per share:, Years Ended December 31,.2004 = . Basic earnings per share:, Years Ended December 31,.2003 = . Basic earnings per share:, Years Ended December 31,.2002 = . Basic earnings per", + "page_start": 29, + "page_end": 29, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "13. INCOME TAXES\n(1.9). Decrease in valuation allowance ................................................................................................................................................................, 2003 Mar. 31, 2004 = (5.5). Different tax rates applied to foreign subsidiaries ......................................................................................................................., For the years ended = Different tax rates applied to foreign subsidiaries ........................................................................................................................ Different tax rates applied to foreign subsidiaries", + "page_start": 85, + "page_end": 85, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "QUARTERLY CONSOLIDATED FINANCIAL SUMMARY\nQ1. = -. Gain on sale of TVtropolis, Q4 Q3 Q2 Q1. = -. Gain on sale of TVtropolis, Q4 Q3 Q2 Q1. = -. Gain on spectrum distribution, Q4 Q3 Q2.Full Year = -. Gain on spectrum distribution, Q4 Q3 Q2. = -. Gain on spectrum distribution, Q4 Q3 Q2. = -. Gain on spectrum distribution, Q4 Q3 Q2. = -. Gain on spectrum distribution, Q4 Q3 Q2.Q1 = -. Gain on spectrum distribution, Q4 Q3 Q2 Q1.Full Year = (233). Gain on spectrum distribution, Q4 Q3 Q2 Q1. = (233). Gain on spectrum distribution, Q4 Q3 Q2 Q1. = -. Gain on spectrum distribution, Q4 Q3 Q2 Q1. = -. Gain on spectrum distribution, Q4 Q3 Q2 Q1. = -. Income tax impact of above items, Q4 Q3 Q2.Full Year = (30). Income tax impact of above items, Q4 Q3 Q2. = (5). Income tax impact of above items, Q4 Q3 Q2. = (8). Income tax impact of above items, Q4 Q3 Q2. = (11). Income tax impact of above items, Q4 Q3 Q2.Q1 = (6). Income tax impact of above items, Q4 Q3 Q2 Q1.Full Year = (14). Income tax impact of above items, Q4 Q3 Q2 Q1. = 12. Income tax impact of above items, Q4 Q3 Q2 Q1. = (4). Income tax impact of above items, Q4 Q3 Q2 Q1. = (10). Income tax impact of above items, Q4 Q3 Q2 Q1. = (12). Income tax adjustment, legislative tax change, Q4 Q3 Q2.Full Year = 8. Income tax adjustment, legislative tax change, Q4 Q3 Q2. = -. Income tax adjustment, legislative tax change, Q4 Q3 Q2. = -. Income tax adjustment, legislative tax change, Q4 Q3 Q2. = 8. Income tax adjustment, legislative tax change, Q4 Q3", + "page_start": 57, + "page_end": 57, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "We are subject to certain laws, litigation, regulatory matters and ethical standards, and our failure to comply with or adequately address developments as they arise could adversely affect our reputation and operations.\nOur policies, procedures and practices and the technology we implement are designed to comply with federal, state, local and foreign laws, rules and regulations, including those imposed by the SEC and other regulatory agencies, the marketplace, the banking industry and foreign countries, as well as responsible business, social and environmental practices, all of which may change from time to time. Significant legislative changes, including those that relate to employment matters and health care reform, could impact our relationship with our workforce, which could increase our expenses and adversely affect our operations. In addition, if we fail to comply with applicable laws and regulations or implement responsible business, social, environmental and supply chain practices, we could be subject to damage to our reputation, class action lawsuits, legal and settlement costs, civil and criminal liability, increased cost of regulatory compliance, restatements of our financial statements, disruption of our business and loss of customers. Any required changes to our employment practices could result in the loss of employees, reduced sales, increased employment costs, low employee morale and harm to our business and results of operations. In addition, political and economic factors could lead to unfavorable changes in federal, state and foreign tax laws, which may increase our tax liabilities. An increase in our tax liabilities could adversely affect our results of operations. We are also regularly involved in various litigation matters that arise in the ordinary course of business. Litigation or regulatory developments could adversely affect our business and financial condition.", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Transitional provision\n3. -(1) For the purposes of the International Tax Compliance Regulations 2015, in relation to an account that by virtue of regulation 2(5) ceases to be an excluded account, the calendar year 2020 is treated as beginning on 13th May 2020 and ending on 31st December 2020.\n(2) Where in consequence of paragraph (1) it is necessary to apportion an amount for the calendar year 2020 to the period ending immediately before 13th May 2020 and the period beginning with that date, it is to be apportioned-\n(a) on a time basis according to the respective length of the periods, or\n(b) if that method would produce a result that is unjust or unreasonable, on a just and reasonable basis.\nDavid Rutley Maggie Throup\n20th April 2020\nTwo of the Lords Commissioners of Her Majesty's Treasury", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20200438_en.pdf" + }, + { + "text": "NOTES TO THE FINANCIAL STATEMENTS\nof the tax consolidation system, Consolidated.2004 $million = . Impact of the tax consolidation system, Consolidated.2003 $million = . Impact of the tax consolidation system, Santos Ltd.2004 $million = . Impact of the tax consolidation system, Santos Ltd.2003 $million = . Income tax expense allocated to wholly-owned controlled entities under\ntax funding agreement, Consolidated.2004 $million = -. Income tax expense allocated to wholly-owned controlled entities under tax funding agreement, Consolidated.2003 $million = -. Income tax expense allocated to wholly-owned controlled entities under tax funding agreement, Santos Ltd.2004 $million = (64.0). Income tax expense allocated to wholly-owned controlled entities under tax funding agreement, Santos Ltd.2003 $million = (131.1). Income tax expense relating to transactions, events and balances of wholly-owned controlled entities in the tax-consolidated group, Consolidated.2004 $million = -. Income tax expense relating to transactions, events and balances of wholly-owned controlled entities in the tax-consolidated group, Consolidated.2003 $million = -. Income tax expense relating to transactions, events and balances of wholly-owned controlled entities in the tax-consolidated group, Santos Ltd.2004 $million = 60.5. Income tax expense relating to transactions, events and balances of", + "page_start": 58, + "page_end": 58, + "source_file": "ASX_STO_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed12.pdf", + "query": "What was the muscle volume of the knee flexors of the 2024 word's strongest man ?", + "target_page": 7, + "target_passage": "Knee flexors 3,060 ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Quadriceps Femoris and Hamstring Size\nTable 2. Muscle volume of all muscles, 5 functional muscle groups, and 22 individual muscles/compartments of a World ' s Strongest Man and deadlift champion and comparative elite sprinters, subelite sprinters, and untrained control participants\nAll muscles, Muscle Volume, cm 3.WSM = 14,922. All muscles, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 11,323 ± 1,328. All muscles, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 9,164 ± 1,207. All muscles, Muscle Volume, cm 3.Untrained ( n 5 11) = 7,628 ± 1,548. Hip /uniFB02 exors, Muscle Volume, cm 3.WSM = 1,704. Hip /uniFB02 exors, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 1,620 ± 200. Hip /uniFB02 exors, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 1,314 ± 216. Hip /uniFB02 exors, Muscle Volume, cm 3.Untrained ( n 5 11) = 1,031 ± 151. Hip extensors, Muscle Volume, cm 3.WSM = 4,724. Hip extensors, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 4,002±489. Hip extensors, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 3,029±422. Hip extensors, Muscle Volume, cm 3.Untrained ( n 5 11) = 2,257 ± 220. Knee /uniFB02 exors, Muscle Volume, cm 3.WSM = 3,060. Knee /uniFB02 exors, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 2,304 ± 178. Knee /uniFB02 exors, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 1,859 ± 301. Knee /uniFB02 exors, Muscle Volume, cm 3.Untrained ( n 5 11) = 1,460 ± 196. Knee extensors, Muscle Volume, cm", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed12.pdf" + }, + { + "text": "Quadriceps Femoris and Hamstring Size\nTable 2. Muscle volume of all muscles, 5 functional muscle groups, and 22 individual muscles/compartments of a World ' s Strongest Man and deadlift champion and comparative elite sprinters, subelite sprinters, and untrained control participants\nfasciae latae, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 86±25. Tensor fasciae latae, Muscle Volume, cm 3.Untrained ( n 5 11) = 73±24. Adductor magnus, Muscle Volume, cm 3.WSM = 1,334. Adductor magnus, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 1,056 ± 83. Adductor magnus, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 828±128. Adductor magnus, Muscle Volume, cm 3.Untrained ( n 5 11) = 624±81. Gracilis, Muscle Volume, cm 3.WSM = 235. Gracilis, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 180±37. Gracilis, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 142 ± 37. Gracilis, Muscle Volume, cm 3.Untrained ( n 5 11) = 98±23. Gluteus maximus, Muscle Volume, cm 3.WSM = 1,980. Gluteus maximus, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 1,797 ± 376. Gluteus maximus, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 1,257 ± 197. Gluteus maximus, Muscle Volume, cm 3.Untrained ( n 5 11) = 931 ± 108. Gluteus medius and minimus, Muscle Volume, cm 3.WSM = 1,172. Gluteus medius and minimus, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 626±129. Gluteus medius and minimus, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 575±97. Gluteus medius and minimus, Muscle Volume, cm 3.Untrained ( n 5", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed12.pdf" + }, + { + "text": "Quadriceps Femoris and Hamstring Size\nTable 2. Muscle volume of all muscles, 5 functional muscle groups, and 22 individual muscles/compartments of a World ' s Strongest Man and deadlift champion and comparative elite sprinters, subelite sprinters, and untrained control participants\n3.WSM = 4,386. Knee extensors, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 3,218 ± 400. Knee extensors, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 2,636±401. Knee extensors, Muscle Volume, cm 3.Untrained ( n 5 11) = 2,202±315. Plantar /uniFB02 exors, Muscle Volume, cm 3.WSM = 1,888. Plantar /uniFB02 exors, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 1,112 ± 181. Plantar /uniFB02 exors, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 943±156. Plantar /uniFB02 exors, Muscle Volume, cm 3.Untrained ( n 5 11) = 860±172. Iliopsoas, Muscle Volume, cm 3.WSM = 681. Iliopsoas, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 702±97. Iliopsoas, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 618±101. Iliopsoas, Muscle Volume, cm 3.Untrained ( n 5 11) = 514 ± 75. Sartorius, Muscle Volume, cm 3.WSM = 429. Sartorius, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 306±46. Sartorius, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 209±50. Sartorius, Muscle Volume, cm 3.Untrained ( n 5 11) = 142 ± 25. Tensor fasciae latae, Muscle Volume, cm 3.WSM = 142. Tensor fasciae latae, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 135 ± 41. Tensor", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed12.pdf" + }, + { + "text": "Quadriceps Femoris and Hamstring Size\nTable 2. Muscle volume of all muscles, 5 functional muscle groups, and 22 individual muscles/compartments of a World ' s Strongest Man and deadlift champion and comparative elite sprinters, subelite sprinters, and untrained control participants\n310. Lateral gastrocnemius, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 202±34. Lateral gastrocnemius, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 170 ± 37. Lateral gastrocnemius, Muscle Volume, cm 3.Untrained ( n 5 11) = . Medial gastrocnemius, Muscle Volume, cm 3.WSM = 515. Medial gastrocnemius, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 300±38. Medial gastrocnemius, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 262±58. Medial gastrocnemius, Muscle Volume, cm 3.Untrained ( n 5 11) = 251 ± 52. Soleus, Muscle Volume, cm 3.WSM = 1,063. Soleus, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 610±137. Soleus, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 510±76. Soleus, Muscle Volume, cm 3.Untrained ( n 5 11) = 453±95. Anterior compartment Lateral compartment, Muscle Volume, cm 3.WSM = 445 253. Anterior compartment Lateral compartment, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 302±59 147 ± 32. Anterior compartment Lateral compartment, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 273±47 161 ± 42. Anterior compartment Lateral compartment, Muscle Volume, cm 3.Untrained ( n 5 11) = 291 ± 47. Posterior compartment, Muscle Volume, cm 3.WSM = 406. Posterior compartment, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = . Posterior compartment, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 345±71. Posterior compartment, Muscle Volume, cm 3.Untrained ( n 5 11) = 153 ± 35. , Muscle Volume, cm", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed12.pdf" + }, + { + "text": "Quadriceps Femoris and Hamstring Size\nOverall hamstring volume of the WSM (1,545 cm 3 ) was 109% greater than a large pooled population of untrained controls (739 ± 142 cm 3 ; n ¼ 50), 44% greater than subelite sprinters (1,075 ± 178 cm 3 ), 53% greater than long-term resistancetrained individuals (1,011 ± 142 cm 3 ), and 17% greater than elite sprinters (1,315 ± 130 cm 3 ; Fig. 5 A ). The WSM ' shamstringvolume was also marginally larger ( þ 3%) than the most muscular individual we have previously assessed (subelite sprinter, 1,495 cm 3 ). The ST (563 cm 3 )andBFlh(454cm 3 )volumesof the WSM were 132 -182% larger than that of the pooled population of untrained controls (ST: 200 ± 48 cm 3 ;BFlh:196±47 cm 3 ; Fig. 5, C and D ) and greater than the mean of any trained/athletic group we have previously assessed (Fig. 5, C and D ). SM (392 cm 3 ) volume of the WSM was 66% greater than untrained controls (SM 236 ± 46 cm 3 )andgreaterthan the mean for trained/athletic groups we have previously\nWORLD STRONGMAN AND DEADLIFT CHAMPION\nTable 2. Muscle volume of all muscles, 5 functional muscle groups, and 22 individual muscles/compartments of a World ' s Strongest Man and deadlift champion and comparative elite sprinters, subelite sprinters, and untrained control participants", + "page_start": 5, + "page_end": 6, + "source_file": "pubmed12.pdf" + }, + { + "text": "Quadriceps Femoris and Hamstring Size\nTable 2. Muscle volume of all muscles, 5 functional muscle groups, and 22 individual muscles/compartments of a World ' s Strongest Man and deadlift champion and comparative elite sprinters, subelite sprinters, and untrained control participants\n11) = 583±76. Rectus femoris, Muscle Volume, cm 3.WSM = 453. Rectus femoris, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 476±45. Rectus femoris, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 401±78. Rectus femoris, Muscle Volume, cm 3.Untrained ( n 5 11) = 303±55. Vastus lateralis, Muscle Volume, cm 3.WSM = 1,508. Vastus lateralis, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 1,132 ± 180. Vastus lateralis, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 925±156. Vastus lateralis, Muscle Volume, cm 3.Untrained ( n 5 11) = 743±98. Vastus intermedius, Muscle Volume, cm 3.WSM = 1,336. Vastus intermedius, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 962±145. Vastus intermedius, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 789±140. Vastus intermedius, Muscle Volume, cm 3.Untrained ( n 5 11) = 680±115. Vastus medialis, Muscle Volume, cm 3.WSM = 1,088. Vastus medialis, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 649±97. Vastus medialis, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 521±79. Vastus medialis, Muscle Volume, cm 3.Untrained ( n 5 11) = 476±111. Semimembranosus, Muscle Volume, cm 3.WSM = 392. Semimembranosus, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 359±60.", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed12.pdf" + }, + { + "text": "DISCUSSION\nDownloaded from journals.physiology.org/journal/jappl (2A01:CB14:14BE:A500:0140:57A7:E3E3:A412) on January 21, 2025.\nWORLD STRONGMAN AND DEADLIFT CHAMPION\nA\nFigure 4. Quadriceps femoris (QF; A ), vastus medialis (VM; B ), vastus lateralis (VL; C ), vastus intermedius (VI; D ), and rectus femoris (RF; E ) muscle volume of a World ' s Strongest Man and deadlift champion (WSM) compared with long-term resistance-trained ( n ¼ 16, from the work by Maden-Wilkinson et al. (10)], elite sprint runners [ n ¼ 5, from the work by Miller et al. (13)], subelite sprint runners [ n ¼ 26, from the work by Miller et al. (13)], and untrained control populations [ n ¼ 102, pooled population from the works by Miller et al. (13)( n ¼ 11), Balshaw et al. (11) ( n ¼ 52), and Balshaw et al. (14)(pretest data n ¼ 39)].", + "page_start": 6, + "page_end": 7, + "source_file": "pubmed12.pdf" + }, + { + "text": "Quadriceps Femoris and Hamstring Size\nTable 2. Muscle volume of all muscles, 5 functional muscle groups, and 22 individual muscles/compartments of a World ' s Strongest Man and deadlift champion and comparative elite sprinters, subelite sprinters, and untrained control participants\n3.WSM = . , Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 401±76. , Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = . , Muscle Volume, cm 3.Untrained ( n 5 11) = 326±93", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed12.pdf" + }, + { + "text": "Quadriceps Femoris and Hamstring Size\nTable 2. Muscle volume of all muscles, 5 functional muscle groups, and 22 individual muscles/compartments of a World ' s Strongest Man and deadlift champion and comparative elite sprinters, subelite sprinters, and untrained control participants\nSemimembranosus, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 327±59. Semimembranosus, Muscle Volume, cm 3.Untrained ( n 5 11) = 262±18. Semitendinosus, Muscle Volume, cm 3.WSM = 563. Semitendinosus, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 449±70. Semitendinosus, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 350±79. Semitendinosus, Muscle Volume, cm 3.Untrained ( n 5 11) = 219 ± 39. Biceps femoris long head, Muscle Volume, cm 3.WSM = 454. Biceps femoris long head, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 340±31. Biceps femoris long head, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 267±47. Biceps femoris long head, Muscle Volume, cm 3.Untrained ( n 5 11) = 221±42. Biceps femoris short head, Muscle Volume, cm 3.WSM = 135. Biceps femoris short head, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 167 ± 26. Biceps femoris short head, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 131 ± 34. Biceps femoris short head, Muscle Volume, cm 3.Untrained ( n 5 11) = 110 ± 28. Popliteus, Muscle Volume, cm 3.WSM = 27. Popliteus, Muscle Volume, cm 3.Elite Sprinters ( n 5 5) = 23±5. Popliteus, Muscle Volume, cm 3.Subelite Sprinters ( n 5 26) = 17 ± 5. Popliteus, Muscle Volume, cm 3.Untrained ( n 5 11) = 19 ± 6 156±41. Lateral gastrocnemius, Muscle Volume, cm 3.WSM =", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed12.pdf" + }, + { + "text": "DISCUSSION\nThis study is the /uniFB01 rst to document the lower-body muscle and tendon morphology of a World ' s Strongest Man and deadlift champion (i.e., an exceptionally strong individual), and these are presented alongside functional whole body assessments, which exceeded the highest IMTP force (gross\nand net) and CMJ power values previously reported by 54%, 100%, and 164%, respectively. The WSM had overall lowerbodymuscularityapproximatelytwicethatofuntrainedcontrols ( þ 96%) and 32% greater than that of elite 100-m sprinters. However, there was substantial anatomical variability in the magnitude of the differences, ranging from the plantar /uniFB02 exors ( þ 120% vs. untrained) to the hip /uniFB02 exors ( þ 65% vs. untrained). Similarly, some speci /uniFB01 c muscles, such as the guy rope muscles that stabilize the femur and pelvis, were 2.5 -3.0 times the volume of untrained individuals (gracilis þ 140%, semitendinosus þ 157%, and sartorius þ 202%) but others displayed more marginal differences (BFsh þ 23%, iliopsoas þ 32% vs. untrained). Considering the knee extensors, the WSM had both quadriceps femoris volume greater than or equal to twofold that of untrained controls and a greater patella tendon moment arm than we have previously measured ( þ 18% vs. untrained), which would be expected to combine to facilitate extraordinary strength. Furthermore, despite the WSM ' sextremelylargequadricepsfemoris,theirpatellartendonCSAwasonly30%greaterthanthatofuntrainedcontrols and not outside the range of tendons we have previously assessed. The results of this study provide novel insights into the muscle and tendon characteristics, as well as the strength and power capabilities, of an extraordinarily strong individual that may be toward the upper limit of human variation in these characteristics.\nJ Appl Physiol /C15 doi:10.1152/japplphysiol.00342.2024 /C15 www.jappl.org\n795", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed12.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed12.pdf", + "query": "What are the nutritionnal added components to the word's strongest man regime ?", + "target_page": 2, + "target_passage": "The WSM’s nutritional supplement consumption included protein, branched-chain amino acids, and electrolytes", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "INTRODUCTION\nFeats of strength have fascinated man since the early stages of human civilization, as shown by the archeological evidence of inscribed heavy stones at Olympia and Thera in Greece, dated to the 6th century BC, detailing the way they were lifted by Bybon and Eumastus, respectively (1). Over the centuries, many types of strength competitions have existed; some of which have been codi /uniFB01 ed and endured within modern sporting competitions (e.g., weightlifting, powerlifting, and shot put).Inaddition,professionalstrongmancompetitions,such as the annually contested ' World ' s Strongest Man ' event, generate extensive global interest (2). Moreover, scienti /uniFB01 c understanding of muscular strength is important because of its role in athletic performance (3), injury prevention (4), and\nhealthy aging (5). However, our knowledge of extreme human strength is limited.\nTo date, there is little scienti /uniFB01 c information on the characteristics of extremely strong humans in terms of laboratorybased tests of strength and power, particularly the size and distribution of their muscle mass, as well as tendon size and joint mechanics (moment arm). Kraemer et al. (6)examinedthe body composition of elite strongman competitors using dualenergy X-ray absorptiometry scanning and found that they had a body mass (153±19 kg) and lean mass (118±12 kg) approximately twice that of an average untrained healthy young man. Whole body skeletal muscle mass of athletes from strength- and power-based sports has also been estimated using ultrasound measurements at a limited number of anatomical locations (7, 8). However, neither ultrasound-derived\nCorrespondence: T. G. Balshaw (t.g.balshaw@lboro.ac.uk). Submitted 8 May 2024 / Revised 2 July 2024 / Accepted 16 July 2024\nwww.jappl.org\n8750-7587/24 Copyright © 2024 The Authors. Licensed under Creative Commons Attribution CC-BY 4.0.\nPublished by the American Physiological Society. Downloaded from journals.physiology.org/journal/jappl (2A01:CB14:14BE:A500:0140:57A7:E3E3:A412) on January 21, 2025.\n789\nWORLD STRONGMAN AND DEADLIFT CHAMPION", + "page_start": 0, + "page_end": 1, + "source_file": "pubmed12.pdf" + }, + { + "text": "REFERENCES\n1. Crowther NB. Weightlifting in antiquity: achievement and training. Greece Rome 24: 111 -120, 1977. doi:10.1017/s0017383500018416.\n2. Dixon E. How Wave.tv is making the World ' s Strongest Man think bigger with its digital plans (Online). SportsPro, 2020.https://www. sportspromedia.com/insights/analysis/worlds-strongest-man-wavetvthe-pump-snapchat-brian-verne-interview/ [Apr 6, 2024].\n3. Suchomel TJ , Nimphius S , Stone MH. The importance of muscular strength in athletic performance. Sports Med 46: 1419 -1449, 2016. doi:10.1007/s40279-016-0486-0.\n4. Opar DA , Williams MD , Timmins RG , Hickey J , Duhig SJ , Shield AJ. Eccentric hamstring strength and hamstring injury risk in Australian footballers. Med Sci Sports Exerc 47: 857 -865, 2015. doi:10.1249/ mss.0000000000000465.\n5. McLeod M , Breen L , Hamilton DL , Philp A. Live strong and prosper: the importance of skeletal muscle strength for healthy ageing. Biogerontology 17: 497 -510, 2016. doi:10.1007/s10522-015-9631-7.\n6. Kraemer WJ , Caldwell LK , Post EM , DuPont WH , Martini ER , Ratamess NA , Szivak TK , Shurley JP , Beeler MK , Volek JS , Maresh CM , Todd JS , Walrod BJ , Hyde PN , Fairman C , Best TM. Body composition in elite strongman competitors. JStrengthCondRes 34: 3326 -3330, 2020. doi:10.1519/jsc.0000000000003763.", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed12.pdf" + }, + { + "text": "DISCUSSION\nThis study is the /uniFB01 rst to document the lower-body muscle and tendon morphology of a World ' s Strongest Man and deadlift champion (i.e., an exceptionally strong individual), and these are presented alongside functional whole body assessments, which exceeded the highest IMTP force (gross\nand net) and CMJ power values previously reported by 54%, 100%, and 164%, respectively. The WSM had overall lowerbodymuscularityapproximatelytwicethatofuntrainedcontrols ( þ 96%) and 32% greater than that of elite 100-m sprinters. However, there was substantial anatomical variability in the magnitude of the differences, ranging from the plantar /uniFB02 exors ( þ 120% vs. untrained) to the hip /uniFB02 exors ( þ 65% vs. untrained). Similarly, some speci /uniFB01 c muscles, such as the guy rope muscles that stabilize the femur and pelvis, were 2.5 -3.0 times the volume of untrained individuals (gracilis þ 140%, semitendinosus þ 157%, and sartorius þ 202%) but others displayed more marginal differences (BFsh þ 23%, iliopsoas þ 32% vs. untrained). Considering the knee extensors, the WSM had both quadriceps femoris volume greater than or equal to twofold that of untrained controls and a greater patella tendon moment arm than we have previously measured ( þ 18% vs. untrained), which would be expected to combine to facilitate extraordinary strength. Furthermore, despite the WSM ' sextremelylargequadricepsfemoris,theirpatellartendonCSAwasonly30%greaterthanthatofuntrainedcontrols and not outside the range of tendons we have previously assessed. The results of this study provide novel insights into the muscle and tendon characteristics, as well as the strength and power capabilities, of an extraordinarily strong individual that may be toward the upper limit of human variation in these characteristics.\nJ Appl Physiol /C15 doi:10.1152/japplphysiol.00342.2024 /C15 www.jappl.org\n795", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed12.pdf" + }, + { + "text": "Conclusions\nIn conclusion, this novel investigation documented the muscle and tendon morphology and whole body strength and power characteristics of an exceptionally strong individual, relative to comparative athletic, trained, and untrained\n798\npopulations. Overall leg muscle volume of the WSM was approximately twice that of untrained controls but with pronounced anatomical variability in the extent of muscular development. The plantar /uniFB02 exor muscle group and the guy rope muscles (sartorius, gracilis, and semitendinosus: þ 140 to þ 202%), which stabilize the pelvis and femur, demonstrated the largest differences. The pronounced quadriceps femoris size of the WSM (greater than or equal to twice that of untrained) was accompanied by a more modest difference in patella tendon moment arm ( þ 18%) and was not matched by a proportional difference in tendon size ( þ 30%).", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed12.pdf" + }, + { + "text": "REFERENCES\n8. Abe T , Buckner SL , Mattocks KT , Jessee MB , Dankel SJ , Mouser JG , Bell ZW , Loenneke JP. Skeletal muscle mass and architecture of the world ' s strongest raw powerlifter: a case study. Asian J Sports Med 9: e61763, 2018. doi:10.5812/asjsm.61763.\n9. Powell PL , Roy RR , Kanim P , Bello MA , Edgerton VR. Predictability of skeletal muscle tension from architectural determinations in guinea pig hindlimbs. J Appl Physiol Respir Environ Exerc Physiol 57: 1715 -1721, 1984. doi:10.1152/jappl.1984.57.6.1715.\n10. Maden-Wilkinson TM , Balshaw TG , Massey G , Folland JP. What makes long-term resistance-trained individuals so strong? A comparison of skeletal muscle morphology, architecture, and joint mechanics. J Appl Physiol (1985) 128: 1000 -1011, 2019. doi:10.1152/ japplphysiol.00224.2019.\n11. Balshaw TG , Maden-Wilkinson TM , Massey GJ , Folland JP. The human muscle size and strength relationship: effects of architecture, muscle force, and measurement location. Med Sci Sports Exerc 53: 2140 -2151, 2021. doi:10.1249/mss.0000000000002691.\n12. Baxter JR , Piazza SJ. Plantar /uniFB02 exor moment arm and muscle volume predict torque-generating capacity in young men. J Appl Physiol (1985) 116: 538 -544, 2014. doi:10.1152/japplphysiol.01140.2013.\n13. Miller R , Balshaw TG , Massey GJ , Maeo S , Lanza MB , Johnston M , Allen SJ , Folland JP. The muscle morphology of elite sprint running. Med Sci Sports Exerc 53: 804 -815, 2021. doi:10.1249/ mss.0000000000002522.", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed12.pdf" + }, + { + "text": "Abstract\nNEW & NOTEWORTHY Lower-body muscle size of an extraordinarily strong individual, a World ' s Strongest Man and deadlift champion (WSM), was approximately twice that of controls but was underpinned by pronounced anatomical variability in the extent of muscular development ( þ 23 -202%): the plantar /uniFB02 exor group and guy rope muscles demonstrating the largest differences. The WSM ' s quadriceps size (more than or equal to twice that of controls) contrasted with modest differences in patella tendon moment arm ( þ 18%) and was uncoupled from patellar tendon size ( þ 30%).\nisometric force; magnetic resonance imaging; power; strength", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed12.pdf" + }, + { + "text": "Muscle and tendon morphology of a world strongman and deadlift champion\nThomas G. Balshaw, 1 Garry J. Massey, 1,2 Robert Miller, 1,3,4 Emmet J. McDermott, 1,5\nThomas M. Maden-Wilkinson, 6 and Jonathan P. Folland 1\n1 School of Sport, Exercise, and Health Sciences, Loughborough University, Loughborough, United Kingdom; 2 College of Life and Environmental Sciences, University of Exeter, Exeter, United Kingdom; 3 UK Athletics, Loughborough University, Loughborough, United Kingdom; 4 Department of Sport Science, Aspire Academy, Doha, Qatar; 5 Department of Physical Education and Sport Sciences, University of Limerick, Limerick, Ireland; and 6 Academy of Sport and Physical Activity, Faculty of Health and Wellbeing, Shef /uniFB01 eld Hallam University, Shef /uniFB01 eld, United Kingdom", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed12.pdf" + }, + { + "text": "Abstract\nThis study compared the muscle and tendon morphology of an extraordinarily strong individual, a World ' sStrongestMananddeadlift champion (WSM), with that of various other athletic, trained, and untrained populations. The WSM completed the following: 1 )3.0-T MRI scans, to determine the volume of 22 individual lower limb muscles, 5 functional muscle groups, patellar tendon (PT) cross-sectional area (CSA), and PT moment arm; and 2 ) countermovement jumps (CMJ) and isometric midthigh pull (IMTP) contractions. The WSM was compared with previously assessed groups from our laboratory (muscle and tendon) and the wider research literature (CMJ and IMTP). The WSM ' s CMJ peak power (9,866 W) and gross (9,171 N) and net (7,480 N) IMTP peak forces were higher than any previously published values. The WSM ' s overall measured leg muscle volume was approximately twice that of untrained controls ( þ 96%) but with pronounced anatomical variability in the extent of muscular development. The plantar /uniFB02 exor group ( þ 120%) and the guy rope muscles (sartorius, gracilis, and semitendinosus: þ 140% to þ 202%), which stabilize the pelvis and femur, demonstrated the largest differences relative to that of untrained controls. The WSM ' s pronounced quadriceps size (greater than or equal to twofold vs. untrained) was accompanied by modest PT moment arm differences and, notably, was not matched by an equivalent difference in PT CSA ( þ 30%). These results provide novel insight into the musculotendinous characteristics of an extraordinarily strong individual, which may be toward the upper limit of human variation, such that the WSM ' s very pronounced lower limb muscularity also exhibited distinct anatomical variability and with muscle size largely uncoupled from tendon size.", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed12.pdf" + }, + { + "text": "MRI Measurement of Muscle Tendon Unit Morphology and Moment Arm\nTable 1. Descriptive characteristics of a World ' s Strongest Man and deadlift champion and populations featured within this study for the purposes of providing comparative muscle and tendon morphology data\nyr = 22±2. Long-term resistance-trained, Height, m = 1.83 ± 0.06. Long-term resistance-trained, Body Mass, kg = 90±10. Long-term resistance-trained, Source of Comparative Data = Massey et al. (15). Untrained controls, n = 39. Untrained controls, Age, yr = 25±2. Untrained controls, Height, m = 1.76 ± 0.06. Untrained controls, Body Mass, kg = 72±9. Untrained controls, Source of Comparative Data = ", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed12.pdf" + }, + { + "text": "MRI Measurement of Muscle Tendon Unit Morphology and Moment Arm\nTable 1. Descriptive characteristics of a World ' s Strongest Man and deadlift champion and populations featured within this study for the purposes of providing comparative muscle and tendon morphology data\nWSM, n = 1. WSM, Age, yr = 30.6. WSM, Height, m = 1.90. WSM, Body Mass, kg = 172.0. WSM, Source of Comparative Data = . Overall muscle morphology, n = . Overall muscle morphology, Age, yr = . Overall muscle morphology, Height, m = . Overall muscle morphology, Body Mass, kg = . Overall muscle morphology, Source of Comparative Data = . Elite sprint runners, n = 5. Elite sprint runners, Age, yr = 27.4 ± 4.1. Elite sprint runners, Height, m = 1.83 ± 0.06. Elite sprint runners, Body Mass, kg = 86.4 ± 6.7. Elite sprint runners, Source of Comparative Data = Miller et al. (13). Subelite sprint runners, n = 26. Subelite sprint runners, Age, yr = 22.0 ± 2.2. Subelite sprint runners, Height, m = 1.78 ± 0.06. Subelite sprint runners, Body Mass, kg = 75.4 ± 7.3. Subelite sprint runners, Source of Comparative Data = . Untrained controls, n = 11. Untrained controls, Age, yr = 25.8 ± 2.6. Untrained controls, Height, m = 1.80 ± 0.08. Untrained controls, Body Mass, kg = 75.2 ± 5.6. Untrained controls, Source of Comparative Data = . Quadriceps femoris muscle morphology, n = . Quadriceps femoris muscle morphology, Age, yr = . Quadriceps femoris muscle morphology, Height, m = . Quadriceps femoris muscle morphology, Body Mass, kg = . Quadriceps femoris muscle morphology, Source of Comparative Data = . Long-term resistance-trained, n = 16. Long-term resistance-trained, Age, yr = 22±2. Long-term resistance-trained, Height, m = 1.83 ± 0.06. Long-term resistance-trained, Body Mass, kg = 91 ± 10. Long-term resistance-trained, Source of Comparative Data", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed12.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed12.pdf", + "query": "Why constraint made the scanning of the word's strongest man's upper body impossible using a MRI ?", + "target_page": 10, + "target_passage": "Despite using a wide-bore MRI scanner, due to the size of the WSM’s shoulders and arms, it was not possible to scan their upper body", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Limitations\nAlthough the current investigation provides a detailed assessment of an individual at/toward the upper limit of human strength performance, it is important to appreciate study limitations. First, the participant was not measured immediately before their World ' sStrongestManchampionship success or other landmark performances, and it is entirely possible the functional and structural characteristics we assessed mayhavebeenevenhigherdirectlypriortopeakperformances. Despite using a wide-bore MRI scanner, due to the size of the WSM ' s shoulders and arms, it was not possible to scan their upperbody.Thus,wewerenotabletoinvestigatethisaspectof the WSM ' s muscle morphology; although given that greater hypertrophy occurs in the upper body compared with the lower body (42), it is possible that the WSM ' s upper-body muscle size relative to untrained controls may have been even more pronounced than what we have documented for the lower body. In the current study to provide the most representative data on untrained control participants, the largest available untrained control populations were used for each category of measurements. Thus, different untrained control populations were used [e.g., comparison of quadricep and hamstring size ( n ¼ 102) vs. comparison of all the leg muscles ( n ¼ 11)], which led to some subtle discrepancies in the contrasts between these groups and the WSM [e.g., quadriceps femoris/knee extensors, þ 127% and þ 99% relative to our large pooled ( n ¼ 102) and smaller ( n ¼ 11) untrained control samples, respectively]. Importantly, however, this discrepancy does not appear to meaningfully affect the interpretation of the /uniFB01 ndings. There were subtle differences in the precise scanning and analysis approaches used with the reference populations featured in this study, including 1 )magnetic /uniFB01 eld strength [1.5 T (10, 11, 15) vs. 3.0 T, WSM and (13, 14)]; 2 ) the interslice distance used to quantify quadriceps femoris and hamstrings muscle volume [1.5 cm (10, 11, 14)vs.2.0cm,WSMand(13)]; 3 )thecalculation of muscle volume [area under the cubic spline", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed12.pdf" + }, + { + "text": "MRI Measurement of Muscle Tendon Unit Morphology and Moment Arm\nThe participant reported for their MRI scan [3.0-T Discovery MR750W (70-cm-wide bore), GE Medical] having not completed any strenuous physical activity in /C21 24 h and had received prior instruction to arrive in a relaxed state having eaten and drunk normally. The participant sat quietly for 15 min prior to their scan. The participant lay supine for the MRI scan of the lower-body musculature from T12 to the lateral malleolus. A body coil (GE Medical) allowed axial T1weighted images (time of repetition/time to echo 600/8.144 ms, image matrix 512 /C2 512, /uniFB01 eld of view 500 /C2 500 mm, pixel size 0.9766 /C2 0.9766 mm, slice thickness 5 mm, and interslice gap 5 mm) to be acquired in /uniFB01 ve overlapping blocks. Images of both sides of the body were acquired within a single scan for blocks 1 (T12 to pelvis), 4 (knee joint space to midshank), and 5 (midshank to lateral malleolus). However, due to the size of the participant ' s thighs, it was necessary to scan each thigh individually for blocks 2 (pelvis to midthigh) and 3 (midthigh to knee joint space); this involved the radiographer repositioning the /uniFB01 eld of view between scanning the /uniFB01 rst and the second thigh but not physically moving the coil or the participant. Oil/uniFB01 lled capsules were secured to the surface of the participant ' sskin with Transpore tape at intervals along the length of the lower body prior to the scan and in an of /uniFB02 ine analysis used to verify the alignment of the blocks (Horos software, Version 3.36, https://horosproject.org/).", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed12.pdf" + }, + { + "text": "MRI Measurement of Muscle Tendon Unit Morphology and Moment Arm\nTable 1. Descriptive characteristics of a World ' s Strongest Man and deadlift champion and populations featured within this study for the purposes of providing comparative muscle and tendon morphology data\n= Maden-Wilkinson et al. (10). Untrained controls, n = 102. Untrained controls, Age, yr = 25±3. Untrained controls, Height, m = 1.78 ± 0.08. Untrained controls, Body Mass, kg = 73±10. Untrained controls, Source of Comparative Data = Pooled sample from Miller et al. (13)( n ¼ 11), Balshaw et al. (11)( n ¼ 52), and pretest of Balshaw et al. (14)( n ¼ 39). Hamstrings muscle morphology, n = . Hamstrings muscle morphology, Age, yr = . Hamstrings muscle morphology, Height, m = . Hamstrings muscle morphology, Body Mass, kg = . Hamstrings muscle morphology, Source of Comparative Data = . Long-term resistance-trained, n = 16. Long-term resistance-trained, Age, yr = 22±2. Long-term resistance-trained, Height, m = 1.83 ± 0.06. Long-term resistance-trained, Body Mass, kg = 91 ± 10. Long-term resistance-trained, Source of Comparative Data = Unpublished observations from the sample in Maden-Wilkinson et al. (10). Untrained controls, n = 50. Untrained controls, Age, yr = 26±4. Untrained controls, Height, m = 1.79 ± 0.08. Untrained controls, Body Mass, kg = 75±11. Untrained controls, Source of Comparative Data = Pooled sample from Miller et al. (13)( n ¼ 11) and pretest of Balshaw et al. (14)( n ¼ 39). Patellar tendon CSA and moment arm, n = . Patellar tendon CSA and moment arm, Age, yr = . Patellar tendon CSA and moment arm, Height, m = . Patellar tendon CSA and moment arm, Body Mass, kg = . Patellar tendon CSA and moment arm, Source of Comparative Data = . Long-term resistance-trained, n = 16. Long-term resistance-trained, Age,", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed12.pdf" + }, + { + "text": "DISCUSSION\nThis study is the /uniFB01 rst to document the lower-body muscle and tendon morphology of a World ' s Strongest Man and deadlift champion (i.e., an exceptionally strong individual), and these are presented alongside functional whole body assessments, which exceeded the highest IMTP force (gross\nand net) and CMJ power values previously reported by 54%, 100%, and 164%, respectively. The WSM had overall lowerbodymuscularityapproximatelytwicethatofuntrainedcontrols ( þ 96%) and 32% greater than that of elite 100-m sprinters. However, there was substantial anatomical variability in the magnitude of the differences, ranging from the plantar /uniFB02 exors ( þ 120% vs. untrained) to the hip /uniFB02 exors ( þ 65% vs. untrained). Similarly, some speci /uniFB01 c muscles, such as the guy rope muscles that stabilize the femur and pelvis, were 2.5 -3.0 times the volume of untrained individuals (gracilis þ 140%, semitendinosus þ 157%, and sartorius þ 202%) but others displayed more marginal differences (BFsh þ 23%, iliopsoas þ 32% vs. untrained). Considering the knee extensors, the WSM had both quadriceps femoris volume greater than or equal to twofold that of untrained controls and a greater patella tendon moment arm than we have previously measured ( þ 18% vs. untrained), which would be expected to combine to facilitate extraordinary strength. Furthermore, despite the WSM ' sextremelylargequadricepsfemoris,theirpatellartendonCSAwasonly30%greaterthanthatofuntrainedcontrols and not outside the range of tendons we have previously assessed. The results of this study provide novel insights into the muscle and tendon characteristics, as well as the strength and power capabilities, of an extraordinarily strong individual that may be toward the upper limit of human variation in these characteristics.\nJ Appl Physiol /C15 doi:10.1152/japplphysiol.00342.2024 /C15 www.jappl.org\n795", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed12.pdf" + }, + { + "text": "Abstract\nNEW & NOTEWORTHY Lower-body muscle size of an extraordinarily strong individual, a World ' s Strongest Man and deadlift champion (WSM), was approximately twice that of controls but was underpinned by pronounced anatomical variability in the extent of muscular development ( þ 23 -202%): the plantar /uniFB02 exor group and guy rope muscles demonstrating the largest differences. The WSM ' s quadriceps size (more than or equal to twice that of controls) contrasted with modest differences in patella tendon moment arm ( þ 18%) and was uncoupled from patellar tendon size ( þ 30%).\nisometric force; magnetic resonance imaging; power; strength", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed12.pdf" + }, + { + "text": "INTRODUCTION\nFeats of strength have fascinated man since the early stages of human civilization, as shown by the archeological evidence of inscribed heavy stones at Olympia and Thera in Greece, dated to the 6th century BC, detailing the way they were lifted by Bybon and Eumastus, respectively (1). Over the centuries, many types of strength competitions have existed; some of which have been codi /uniFB01 ed and endured within modern sporting competitions (e.g., weightlifting, powerlifting, and shot put).Inaddition,professionalstrongmancompetitions,such as the annually contested ' World ' s Strongest Man ' event, generate extensive global interest (2). Moreover, scienti /uniFB01 c understanding of muscular strength is important because of its role in athletic performance (3), injury prevention (4), and\nhealthy aging (5). However, our knowledge of extreme human strength is limited.\nTo date, there is little scienti /uniFB01 c information on the characteristics of extremely strong humans in terms of laboratorybased tests of strength and power, particularly the size and distribution of their muscle mass, as well as tendon size and joint mechanics (moment arm). Kraemer et al. (6)examinedthe body composition of elite strongman competitors using dualenergy X-ray absorptiometry scanning and found that they had a body mass (153±19 kg) and lean mass (118±12 kg) approximately twice that of an average untrained healthy young man. Whole body skeletal muscle mass of athletes from strength- and power-based sports has also been estimated using ultrasound measurements at a limited number of anatomical locations (7, 8). However, neither ultrasound-derived\nCorrespondence: T. G. Balshaw (t.g.balshaw@lboro.ac.uk). Submitted 8 May 2024 / Revised 2 July 2024 / Accepted 16 July 2024\nwww.jappl.org\n8750-7587/24 Copyright © 2024 The Authors. Licensed under Creative Commons Attribution CC-BY 4.0.\nPublished by the American Physiological Society. Downloaded from journals.physiology.org/journal/jappl (2A01:CB14:14BE:A500:0140:57A7:E3E3:A412) on January 21, 2025.\n789\nWORLD STRONGMAN AND DEADLIFT CHAMPION", + "page_start": 0, + "page_end": 1, + "source_file": "pubmed12.pdf" + }, + { + "text": "T2-weighted MTL scans:\nVolumes were visually assessed for QC. Volumes were removed from the analysis if unable to be reliably segmented.", + "page_start": 16, + "page_end": 16, + "source_file": "pubmed4.pdf" + }, + { + "text": "MRI Measurement of Muscle Tendon Unit Morphology and Moment Arm\nTable 1. Descriptive characteristics of a World ' s Strongest Man and deadlift champion and populations featured within this study for the purposes of providing comparative muscle and tendon morphology data\nWSM, n = 1. WSM, Age, yr = 30.6. WSM, Height, m = 1.90. WSM, Body Mass, kg = 172.0. WSM, Source of Comparative Data = . Overall muscle morphology, n = . Overall muscle morphology, Age, yr = . Overall muscle morphology, Height, m = . Overall muscle morphology, Body Mass, kg = . Overall muscle morphology, Source of Comparative Data = . Elite sprint runners, n = 5. Elite sprint runners, Age, yr = 27.4 ± 4.1. Elite sprint runners, Height, m = 1.83 ± 0.06. Elite sprint runners, Body Mass, kg = 86.4 ± 6.7. Elite sprint runners, Source of Comparative Data = Miller et al. (13). Subelite sprint runners, n = 26. Subelite sprint runners, Age, yr = 22.0 ± 2.2. Subelite sprint runners, Height, m = 1.78 ± 0.06. Subelite sprint runners, Body Mass, kg = 75.4 ± 7.3. Subelite sprint runners, Source of Comparative Data = . Untrained controls, n = 11. Untrained controls, Age, yr = 25.8 ± 2.6. Untrained controls, Height, m = 1.80 ± 0.08. Untrained controls, Body Mass, kg = 75.2 ± 5.6. Untrained controls, Source of Comparative Data = . Quadriceps femoris muscle morphology, n = . Quadriceps femoris muscle morphology, Age, yr = . Quadriceps femoris muscle morphology, Height, m = . Quadriceps femoris muscle morphology, Body Mass, kg = . Quadriceps femoris muscle morphology, Source of Comparative Data = . Long-term resistance-trained, n = 16. Long-term resistance-trained, Age, yr = 22±2. Long-term resistance-trained, Height, m = 1.83 ± 0.06. Long-term resistance-trained, Body Mass, kg = 91 ± 10. Long-term resistance-trained, Source of Comparative Data", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed12.pdf" + }, + { + "text": "Endocrine procedures\nMRI acquisition . MRI scanning sessions at the University of California, Santa Barbara and Irvine were conducted on 3T Prisma scanners equipped with 64-channel phased-array head/neck coil (of which 50 coils are used for axial brain imaging). High-resolution anatomical scans were acquired using a T1-weighted (T1w) magnetization prepared rapid gradient echo (MPRAGE) sequence (repetition time (TR) = 2,500 ms, time to echo (TE) = 2.31 ms, inversion time (TI) = 934 ms, flip angle = 7°, 0.8 mm thickness) followed by a gradient echo field map (TR = 758 ms, TE1 = 4.92 ms, TE2 = 7.38 ms, flip angle = 60°). A T2-weighted (T2w) turbo spin echo scan was also acquired with an oblique coronal orientation positioned orthogonally to the main axis of the hippocampus (TR/ TE = 9,860/50 ms, flip angle = 122°, 0.4 × 0.4 mm 2 in-plane resolution, 2-mm slice thickness, 38 interleaved slices with no gap, total acquisition time = 5 min and 42 sec). The Diffusion Spectrum Imaging (DSI) protocol sampled the entire brain with the following parameters: single phase, TR = 4,300 ms, echo time = 100.2 ms, 139 directions, b -max = 4,990, FoV = 259 × 259 mm, 78 slices, 1.7986 × 1.7986 × 1.8 mm voxel resolution. These images were linearly registered to the whole-brain T1w MPRAGE image. A custom foam headcase was used to provide extra padding around the head and neck, as well as to minimize head motion. Additionally, a custom-built sound-absorbing foam girdle was placed around the participant's waist to attenuate sound near the fetus during second-trimester and third-trimester scanning.", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed4.pdf" + }, + { + "text": "MRI Measurement of Muscle Tendon Unit Morphology and Moment Arm\nOnce muscle MRI scanning had been completed, a /uniFB02 ex coil (GE Medical) was used to acquire unilateral T1-weighted axial (time of repetition/time to echo 650/9.476 ms, image matrix 512 /C2 512, /uniFB01 eld of view 180 /C2 180 mm, pixel size 0.3516 /C2 0.3516 mm, slice thickness 2 mm, and interslice gap 0 mm) and sagittal images (time of repetition/time to echo 606/9.512 ms, image matrix 512 /C2 512, /uniFB01 eld of view 180 /C2 180 mm, pixel size 0.3516 /C2 0.3516 mm, slice thickness 2 mm, and interslice gap ¼ 0 mm) from both knee joints. The axial images were obtained perpendicular to the line of the tendon from /C24 2 cm superior to the apex of the patella to /C24 2cm\ninferior to the patellar tendon ' s inferior insertion. Patellar tendon CSA was measured in each contiguous image along the length of the tendon (i.e., from the /uniFB01 rst image where the patella was no longer visible to the /uniFB01 nal image before the tibial insertion). The axial images of the patellar tendon were viewed in grayscale, sharpened, and the perimeter manually outlined. The average of all measured axial patellar tendon CSAs was calculated to produce a mean tendon CSA (mm 2 ) for each leg. The moment arm length of the patellar tendon for each leg was estimated from sagittal plane images as the perpendicular distance from the patellar tendon to the midpoint of tibiofemoral contact (17).", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed12.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed13.pdf", + "query": "What is typical age at which multiple sclerosis is diagnosed ?", + "target_page": 2, + "target_passage": "Multiple sclerosis (MS) is a progressive inflammatory disease of the central nervous system (CNS) that is typically diagnosed at 30– 40 years of ag", + "chunk_present": { + "presence": true, + "index": 3 + } + }, + "top_chunk": [ + { + "text": "References\n1. Walton C, King R, Rechtman L, Kaye W, Leray E, Marrie RA, et al. Rising prevalence of multiple sclerosis worldwide: insights from the Atlas of MS, third edition. Mult Scler . (2020) 26(14):1816 -21. doi: 10.1177/1352458520970841\n2. Casey B, Coote S, Galvin R, Donnelly A. Objective physical activity levels in people with multiple sclerosis: meta-analysis. Scand J Med Sci Sports . (2018) 28 (9):1960 -9. doi: 10.1111/sms.13214\n3. Kinnett-Hopkins D, Adamson B, Rougeau K, Motl RW. People with MS are less physically active than healthy controls but as active as those with other chronic diseases: an updated meta-analysis. Mult Scler Relat Disord . (2017) 13:38 -43. doi: 10.1016/j.msard.2017.01.016\n4. Hoang PD, Lord S, Gandevia S, Menant J. Exercise and sports science Australia (ESSA) position statement on exercise for people with mild to moderate multiple sclerosis. J Sci Med Sport . (2022) 25(2):146 -54. doi: 10.1016/j.jsams.2021.08.015\n5. Dalgas U, Langeskov-Christensen M, Stenager E, Riemenschneider M, Hvid LG. Exercise as medicine in multiple sclerosis -time for a paradigm shift: preventive, symptomatic, and disease-modifying aspects and perspectives. Curr Neurol Neurosci Rep . (2019) 19(11):1 -12. doi: 10.1007/s11910-019-1002-3", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed13.pdf" + }, + { + "text": "2.6 Data collection\nTABLE 3 Participant demographic information.\nTABLE 4 Interview guide.\nVariable, 1 = Total ( n =15). Age in years, 1 = Mean 47.6 (SD 6.04). Gender (women/men), 1 = 12 woman/3 men (80%/20%). Type of MS, 1 = Relapsing remitting 15 (100%). EDSS, 1 = Mean 1.8 (SD 0.9). Years since diagnosis, 1 = Mean 10.4 (SD 7.8). Participation in the outdoor group, 1 = Mean 4.6 sessions/total mean attendance 57.3%", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed13.pdf" + }, + { + "text": "2.5 Recruitment and participants\nPrior to recruitment, the study was introduced to individuals with multiple sclerosis (pwMS) through a seminar hosted by the Nordland MS Association. Additionally, seminars were conducted for health professionals in community healthcare and at the regional hospital. Written information about this study (and the RCT) was sent from the MS clinic at the regional hospital by post to all eligible individuals af /uniFB01 liated with the hospital. Individuals who wished to participate signed the attached consent form and returned it in the pre-stamped envelope. The inclusion criteria were as follows: had been diagnosed with MS, had a score on the Expanded Disability Status Scale (EDSS) (29)of ≤ 3.5, was ≥ 18 years, was employed (10% -100% of full-time) and residential address in the two prede /uniFB01 ned municipalities. The exclusion criteria were as follows: pregnancy, exacerbation of symptoms within two weeks prior to enrollment and other serious conditions compromising balance, walking or work capacity. All participants in the intervention group of the RCT ( n = 15) were included (Table 3).", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed13.pdf" + }, + { + "text": "1 Introduction\nMultiple sclerosis (MS) is a progressive in /uniFB02 ammatory disease of the central nervous system (CNS) that is typically diagnosed at 30 -40 years of age (1). A great concern is the signi /uniFB01 cantly lower levels of physical activity (PA) in people with MS (pwMS) across disability levels than in their healthy counterparts (2, 3).\nEarly promotion of PA and exercise is recommended due to numerous established bene /uniFB01 ts in health, symptom management and well-being for pwMS (4). In particular, high-intensity training is endorsed, as it has possible neuroprotective effects in the disease course (5, 6). In addition, exercises addressing sensorimotor impairments (e.g., reduced muscle strength, reduced neuromuscular control) are recommended, as they target individuals ' capability to remain physically active (7). Sensorimotor impairments can in /uniFB02 uence trunk control, which is commonly disturbed in pwMS, even when disability is low (8, 9), and correlate with impaired balance, walking capacity and distance (10, 11). PwMS ' s knowledge of exercise bene /uniFB01 ts, attitudes and motivations, as well as contextual aspects such as lack of optimal exercise interventions, accessibility and support, affect the level of PA and exercise participation (12).\nCoreDISTparticipation (Table 1) is a new comprehensive intervention addressing sensorimotor function, trunk control, high-intensity running/walking and work participation in pwMS with low disability (13). It is based on the GroupCoreDIST 1 intervention, which has been shown to have signi /uniFB01 cant shortand long-term effects on trunk control, balance and walking among pwMS (14, 15). However, no effects of the intervention on objectively measured PA have been identi /uniFB01 ed, even though the participants reported perceptions of new possibilities to be", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed13.pdf" + }, + { + "text": "Publisher ' s note\n41. Baird JF, Motl RW. Response heterogeneity with exercise training and physical activity interventions among persons with multiple sclerosis. Neurorehabil Neural Repair . (2019) 33(1):3 -14. doi: 10.1177/1545968318818904\n42. Sandroff BM, Baird JF, Silveira SL, Motl RW. Response heterogeneity in /uniFB01 tness, mobility and cognition with exercise-training in MS. Acta Neurol Scand . (2019) 139 (2):183 -91. doi: 10.1111/ane.13041\n43. Lahelle AF, Øberg GK, Normann B. Group dynamics in a group-based, individualized physiotherapy intervention for people with multiple sclerosis: a qualitative study. Physiother Res Int . (2019) 25(3):e1829. doi: 10.1002/pri.1829\n44. Normann B. Facilitation of movement: new perspectives provide expanded insights to guide clinical practice. Physiother Theory Pract . (2020) 36(7):769 -78. doi: 10.1080/09593985.2018.1493165\n45. Øberg GK, Normann B, Gallagher S. Embodied-enactive clinical reasoning in physical therapy. Physiother Theory Pract . (2015) 31(4):244 -52. doi: 10.3109/ 09593985.2014.1002873\n46. Anens E, Zetterberg L, Urell C, Emtner M, Hellström K. Self-reported physical activity correlates in Swedish adults with multiple sclerosis: a cross-sectional study. BMC Neurol . (2017) 17(1):204. doi: 10.1186/s12883-0170981-4\n47. Herring TE, Knowles LM, Alschuler KN. Outdoor adventure programs for persons with multiple sclerosis: a review and agenda for future research. Int J MS Care . (2021) 23(4):186 -92. doi: 10.7224/1537-2073.2020-066", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed13.pdf" + }, + { + "text": "References\n6. Riemenschneider M, Hvid LG, Ringgaard S, Nygaard MKE, Eskildsen SF, Gaemelke T, et al. Investigating the potential disease-modifying and neuroprotective ef /uniFB01 cacy of exercise therapy early in the disease course of multiple sclerosis: the early multiple sclerosis exercise study (EMSES). Mult Scler . (2022) 28(10):1620 -9. doi: 10. 1177/13524585221079200\n7. Kalb R, Brown TR, Coote S, Costello K, Dalgas U, Garmon E, et al. Exercise and lifestyle physical activity recommendations for people with multiple sclerosis throughout the disease course. Mult Scler . (2020) 26(12):1459 -69. doi: 10.1177/ 1352458520915629\n8. Moreno-Navarro P, Manca A, Martinez G, Ventura L, Barbado D, Vera-García FJ, et al. Test-retest reliability and known-groups validity of trunk muscle tests in people with multiple sclerosis: a cross-sectional, case-control study. Phys Ther . (2021) 101 (5):1 -9. doi: 10.1093/ptj/ptzab049\n9. Raats J, Arntzen EC, Lamers I, Feys P, Normann B. What is the distribution of trunk impairments and its relationship with disability level in individuals with multiple sclerosis? Mul Scler Relat Disord . (2021) 57:103325. doi: 10.1016/j.msard. 2021.103325\n10. Normann B, Arntzen EC. What are the relationships between trunk control, balance and walking in individuals with multiple sclerosis with minor to moderate disability? Eur J Physiother . (2021) 23(6):377 -83. doi: 10.1080/21679169.2020.1772870\nFrontiers in Rehabilitation Sciences\n10\nfrontiersin.org", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed13.pdf" + }, + { + "text": "Publisher ' s note\n11. Unluer NO, Ozkan T, Yasa ME, Ates Y, Anlar O. Investigation of the relationship between trunk motor control and balance, functional mobility, and gait capacity in patients with multiple sclerosis/multipl sklerozlu hastalarda govde motor kontrolu ile denge, fonksiyonel mobilite ve yuruyus kapasitesi arasindaki iliskinin incelenmesi. Türk Nöroloji Dergisi . (2021) 27(3):283. doi: 10.4274/tdn.2021.41017\n12. Learmonth YC, Motl RW. Physical activity and exercise training in multiple sclerosis: a review and content analysis of qualitative research identifying perceived determinants and consequences. Disabil Rehabil . (2016) 38(13):1227 -42. doi: 10. 3109/09638288.2015.1077397\n13. Fikke HK, Normann B, Sivertsen M, Dahl SSH, Arntzen EC. Optimizing sensorimotor function, physical activity and employment for people with MS -a feasibility study. Fysioterapeuten . (2023) 90(1):32 -42. doi: 10.52705/ c14a8ca05f7546dabc18bd0275cf2edd\n14. Arntzen EC, Straume B, Odeh F, Feys P, Normann B. Group-based, individualized, comprehensive core stability and balance intervention provides immediate and long-term improvements in walking in individuals with multiple sclerosis: a randomized controlled trial. Physiother Res Int . (2019) 25(1):e1798. doi: 10.1002/pri.1798\n15. Arntzen EC, Straume BK, Odeh F, Feys P, Zanaboni P, Normann B. Groupbased individualized comprehensive core stability intervention improves balance in persons with multiple sclerosis: a randomized controlled trial. Phys Ther . (2019) 99 (8):1027 -38. doi: 10.1093/ptj/pzz017", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed13.pdf" + }, + { + "text": "1. Drug Interventions Programme Data\nThe mean age at test is 32 and the mean year of birth is 1977, implying that most of these individuals were in their mid-to-late teens during the crime peak of the mid-1990s. 9 Given evidence suggesting that the average age of initiation for opiate/crack use is around 18-20 (Millar et al ., 2001), this age profile would tentatively suggest that OCU incidence also peaked in the 1990s and that this created a large cohort of users who would be approaching 40 today.\nThe minimum and maximum years of birth are fixed by construction, because anyone born\n9 Note that the dataset counts tests, not unique individuals, so the same person can appear more than once.\nNew opiate and crack-cocaine users: characteristics and trends\n9\nbefore 1960 was removed and because DIP tests are only administered to those aged 18 and over, so only using data to 2013 means it would not be possible for anyone to be born in 1996 or afterwards to be included. Even so, it is clear from the year-of-birth distribution (Figure 2) that positive opiate tests drop off sharply for those born after 1982. This is in line with other evidence suggesting that the number of new users of opiates decreased sharply in the 2000s. This needs to be considered when interpreting the analysis that follows. When DIP and the NDTMS treatment system began in the mid-2000s, there already existed a cohort of around 320,000 OCUs, according to available estimates by Hay et al ., (2013). And most of these individuals began using opiates/crack during the epidemic years of the 1980s and 1990s. In terms of data capture this means it is hard to separate the gradual inclusion of more and more individuals from this original cohort from genuinely new users of these drugs.\nFigure 2: Year of birth distribution for all opiate-only/positive-for-both tests.\nFigure 3, which shows the age of the individual at a positive test, also reveals that although the average age at positive test is 32, the peak is quite flat, with high numbers of positive tests still being recorded by individuals in their late 30s and even into their 40s.\nNew opiate and crack-cocaine users: characteristics and trends\n10\nFigure 3: Distribution of tester's age at positive test for all opiate-only/positive-for-both tests.", + "page_start": 8, + "page_end": 10, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "Charts showing age-of-onset distributions (by percentage of total cohort) for different cohorts based on year of first treatment\nNew opiate and crack-cocaine users: characteristics and trends\n31\nNew opiate and crack-cocaine users: characteristics and trends\n32", + "page_start": 30, + "page_end": 31, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "4.3 Methodological considerations\nThe design and methods were adequate for deriving knowledge from individuals ' experiences. The participants selfreferred to the intervention and were recruited based on pre-set criteria. This approach yielded rich information from people with mild to moderate disabilities due to MS who were\nFrontiers in Rehabilitation Sciences\n09\nfrontiersin.org\nmotivated for physical activity (PA), employed, and residing in northern Norway. Ethnicity or socio-economic class were not recorded. However, considering that all these factors can in /uniFB02 uence PA engagement (46), it is possible that additional aspects of the phenomenon could be uncovered in a different sample (48). There was a higher percentage of women participating than men; however, this corresponds to the gender distribution in the MS population (1).\nThe use of enactive theory was innovative within the /uniFB01 eld and allowed for, in particular, new aspects of importance for selfef /uniFB01 cacy to be identi /uniFB01 ed. Transference of our results to similar populations can be achieved through theoretical generalization (28).", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed13.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed13.pdf", + "query": "What was the average year of the group that participated to the study concerning the impact of outdoor pysiotherapy on patient with multiple sclerosis", + "target_page": 4, + "target_passage": "Age in years Mean 47.6", + "chunk_present": { + "presence": true, + "index": 5 + } + }, + "top_chunk": [ + { + "text": "Publisher ' s note\n41. Baird JF, Motl RW. Response heterogeneity with exercise training and physical activity interventions among persons with multiple sclerosis. Neurorehabil Neural Repair . (2019) 33(1):3 -14. doi: 10.1177/1545968318818904\n42. Sandroff BM, Baird JF, Silveira SL, Motl RW. Response heterogeneity in /uniFB01 tness, mobility and cognition with exercise-training in MS. Acta Neurol Scand . (2019) 139 (2):183 -91. doi: 10.1111/ane.13041\n43. Lahelle AF, Øberg GK, Normann B. Group dynamics in a group-based, individualized physiotherapy intervention for people with multiple sclerosis: a qualitative study. Physiother Res Int . (2019) 25(3):e1829. doi: 10.1002/pri.1829\n44. Normann B. Facilitation of movement: new perspectives provide expanded insights to guide clinical practice. Physiother Theory Pract . (2020) 36(7):769 -78. doi: 10.1080/09593985.2018.1493165\n45. Øberg GK, Normann B, Gallagher S. Embodied-enactive clinical reasoning in physical therapy. Physiother Theory Pract . (2015) 31(4):244 -52. doi: 10.3109/ 09593985.2014.1002873\n46. Anens E, Zetterberg L, Urell C, Emtner M, Hellström K. Self-reported physical activity correlates in Swedish adults with multiple sclerosis: a cross-sectional study. BMC Neurol . (2017) 17(1):204. doi: 10.1186/s12883-0170981-4\n47. Herring TE, Knowles LM, Alschuler KN. Outdoor adventure programs for persons with multiple sclerosis: a review and agenda for future research. Int J MS Care . (2021) 23(4):186 -92. doi: 10.7224/1537-2073.2020-066", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed13.pdf" + }, + { + "text": "2.3 Study context\nThis interview study was nested within a randomized controlled trial (RCT) comparing the CoreDISTparticipation intervention to usual care (26) and conducted at a regional hospital MS-outpatient clinic (Nordland Hospital Trust) and in two af /uniFB01 liated municipalities in the northern Norway. The current study investigates participants in the intervention group ' s experiences of the four-week outdoor group, which was part of this new intervention (Table 2). The outdoor sessions were conducted by three trained physiotherapists working in the\nDahl et al.\n10.3389/fresc.2024.1303094\ncommunity healthcare in the two municipalities. The project team included three individuals representing users from the Nordland MS Association, along with an MS nurse and a neurologist from the MS-outpatient clinic, and three physiotherapists/ researchers.", + "page_start": 2, + "page_end": 3, + "source_file": "pubmed13.pdf" + }, + { + "text": "1 Introduction\nTABLE 1 Overview of the CoreDISTparticipation intervention.\nTABLE 2 Description of the outdoor group.\nWeek 1: MS outpatient clinic, 1 = Consultation with the MS nurse (20 min) to address work-related issues based on a structured guide comprising the following themes: knowledge of MS at the workplace, experienced work-related challenges due to MS, potential needs and facilitators . Physiotherapy assessment (60 min) to explore the potential for changes in balance and walking aiming to turn focus toward possibilities and thus,. , 1 = Based on these assessments the MS nurse and the physiotherapist indicated the aspects of importance on a standardized form to inform the municipal physiotherapist.. , 1 = Standardized testing (baseline, for the RCT).. Week 2 - 5: Municipality, 1 = Physiotherapy assessment (60 - 90 min) to explore the patient ' s impairments and potential for improvements in a clinical examination prior to group-training.. , 1 = Indoor group (60 min × 2 weekly, for 4 weeks). There were three to /uniFB01 ve participants in each group and one physiotherapist. Trunk control, balance and physical activity were addressed (GroupCoreDIST). Participants received a link to CoreDIST digital exercise-videos and were advised to do them 1 × weekly throughout the intervention. (videos can be accessed here: https://www.nord.no/en/node/35,098). , 1 = Digital meeting with a multidisciplinary team (pwMS, employer, physiotherapist & MS nurse) (20 min) regarding barriers to work participation and needs for adaptations regarding work and physical activity, according to a structured meeting-guide (one meeting).. Week 6, 1 = Standardized testing (midway, for the RCT).. Week 7 - 10: Municipality, 1 = Outdoor group (60 min × 2 weekly, for 4 weeks). A maximum of ten participants and two physiotherapists were included in each group. Trunk control and balance (GroupCoreDIST exercises) were addressed, and high-intensity walking or running was performed. The intervention was conducted in a city park where both /uniFB02 at and uneven surfaces and hilly terrain were available (Table 2).. , 1 = Additionally, participants were encouraged to comply with the exercise-videos", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed13.pdf" + }, + { + "text": "EDITED BY\nJacqui H Morris,\nUniversity of Dundee, United Kingdom\nREVIEWED BY\nNicola Saywell,\nAuckland University of Technology,\nNew Zealand\nVerna Stavric,\nAuckland University of Technology,\nNew Zealand\n* CORRESPONDENCE\nStine Susanne Haakonsen Dahl stine.s.dahl@nord.no\nRECEIVED 27 September 2023\nACCEPTED\n06 March 2024\nPUBLISHED 18 March 2024\nCITATION\nDahl SSH, Arntzen EC and Normann B (2024) The meaningfulness of exploring one ' s own limits through interactions and enjoyment in outdoor high-intensity physiotherapy for people with multiple sclerosis: a qualitative study.\nFront. Rehabil. Sci. 5:1303094. doi: 10.3389/fresc.2024.1303094\nCOPYRIGHT\n©2024 Dahl, Arntzen and Normann. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.\nFrontiers in Rehabilitation Sciences\n01\nfrontiersin.org\nTYPE Original Research PUBLISHED 18 March 2024 DOI 10.3389/fresc.2024.1303094\n|\nThe meaningfulness of exploring one ' s own limits through interactions and enjoyment in outdoor high-intensity physiotherapy for people with multiple sclerosis: a qualitative study\nStine Susanne Haakonsen Dahl 1 * , Ellen Christin Arntzen 1 and Britt Normann 1,2\n1 Faculty of Nursing and Health Sciences, Nord University, Bodø, Norway, 2 Department of Physiotherapy, Nordland Hospital Trust, Bodø, Norway\nBackground and purpose: Physical activity (PA) is often reduced in people with MS (pwMS), even when disability is low. Understanding the perspectives of pwMS on interventions aiming to improve PA is important to inform the development of such services. The aim of this study was to explore the experiences of pwMS participating in an outdoor, high-intensity and balance exercise group intervention.", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed13.pdf" + }, + { + "text": "Publisher ' s note\n11. Unluer NO, Ozkan T, Yasa ME, Ates Y, Anlar O. Investigation of the relationship between trunk motor control and balance, functional mobility, and gait capacity in patients with multiple sclerosis/multipl sklerozlu hastalarda govde motor kontrolu ile denge, fonksiyonel mobilite ve yuruyus kapasitesi arasindaki iliskinin incelenmesi. Türk Nöroloji Dergisi . (2021) 27(3):283. doi: 10.4274/tdn.2021.41017\n12. Learmonth YC, Motl RW. Physical activity and exercise training in multiple sclerosis: a review and content analysis of qualitative research identifying perceived determinants and consequences. Disabil Rehabil . (2016) 38(13):1227 -42. doi: 10. 3109/09638288.2015.1077397\n13. Fikke HK, Normann B, Sivertsen M, Dahl SSH, Arntzen EC. Optimizing sensorimotor function, physical activity and employment for people with MS -a feasibility study. Fysioterapeuten . (2023) 90(1):32 -42. doi: 10.52705/ c14a8ca05f7546dabc18bd0275cf2edd\n14. Arntzen EC, Straume B, Odeh F, Feys P, Normann B. Group-based, individualized, comprehensive core stability and balance intervention provides immediate and long-term improvements in walking in individuals with multiple sclerosis: a randomized controlled trial. Physiother Res Int . (2019) 25(1):e1798. doi: 10.1002/pri.1798\n15. Arntzen EC, Straume BK, Odeh F, Feys P, Zanaboni P, Normann B. Groupbased individualized comprehensive core stability intervention improves balance in persons with multiple sclerosis: a randomized controlled trial. Phys Ther . (2019) 99 (8):1027 -38. doi: 10.1093/ptj/pzz017", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed13.pdf" + }, + { + "text": "2.6 Data collection\nTABLE 3 Participant demographic information.\nTABLE 4 Interview guide.\nVariable, 1 = Total ( n =15). Age in years, 1 = Mean 47.6 (SD 6.04). Gender (women/men), 1 = 12 woman/3 men (80%/20%). Type of MS, 1 = Relapsing remitting 15 (100%). EDSS, 1 = Mean 1.8 (SD 0.9). Years since diagnosis, 1 = Mean 10.4 (SD 7.8). Participation in the outdoor group, 1 = Mean 4.6 sessions/total mean attendance 57.3%", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed13.pdf" + }, + { + "text": "2.5 Recruitment and participants\nPrior to recruitment, the study was introduced to individuals with multiple sclerosis (pwMS) through a seminar hosted by the Nordland MS Association. Additionally, seminars were conducted for health professionals in community healthcare and at the regional hospital. Written information about this study (and the RCT) was sent from the MS clinic at the regional hospital by post to all eligible individuals af /uniFB01 liated with the hospital. Individuals who wished to participate signed the attached consent form and returned it in the pre-stamped envelope. The inclusion criteria were as follows: had been diagnosed with MS, had a score on the Expanded Disability Status Scale (EDSS) (29)of ≤ 3.5, was ≥ 18 years, was employed (10% -100% of full-time) and residential address in the two prede /uniFB01 ned municipalities. The exclusion criteria were as follows: pregnancy, exacerbation of symptoms within two weeks prior to enrollment and other serious conditions compromising balance, walking or work capacity. All participants in the intervention group of the RCT ( n = 15) were included (Table 3).", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed13.pdf" + }, + { + "text": "1 Introduction\nMultiple sclerosis (MS) is a progressive in /uniFB02 ammatory disease of the central nervous system (CNS) that is typically diagnosed at 30 -40 years of age (1). A great concern is the signi /uniFB01 cantly lower levels of physical activity (PA) in people with MS (pwMS) across disability levels than in their healthy counterparts (2, 3).\nEarly promotion of PA and exercise is recommended due to numerous established bene /uniFB01 ts in health, symptom management and well-being for pwMS (4). In particular, high-intensity training is endorsed, as it has possible neuroprotective effects in the disease course (5, 6). In addition, exercises addressing sensorimotor impairments (e.g., reduced muscle strength, reduced neuromuscular control) are recommended, as they target individuals ' capability to remain physically active (7). Sensorimotor impairments can in /uniFB02 uence trunk control, which is commonly disturbed in pwMS, even when disability is low (8, 9), and correlate with impaired balance, walking capacity and distance (10, 11). PwMS ' s knowledge of exercise bene /uniFB01 ts, attitudes and motivations, as well as contextual aspects such as lack of optimal exercise interventions, accessibility and support, affect the level of PA and exercise participation (12).\nCoreDISTparticipation (Table 1) is a new comprehensive intervention addressing sensorimotor function, trunk control, high-intensity running/walking and work participation in pwMS with low disability (13). It is based on the GroupCoreDIST 1 intervention, which has been shown to have signi /uniFB01 cant shortand long-term effects on trunk control, balance and walking among pwMS (14, 15). However, no effects of the intervention on objectively measured PA have been identi /uniFB01 ed, even though the participants reported perceptions of new possibilities to be", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed13.pdf" + }, + { + "text": "4.3 Methodological considerations\nThe design and methods were adequate for deriving knowledge from individuals ' experiences. The participants selfreferred to the intervention and were recruited based on pre-set criteria. This approach yielded rich information from people with mild to moderate disabilities due to MS who were\nFrontiers in Rehabilitation Sciences\n09\nfrontiersin.org\nmotivated for physical activity (PA), employed, and residing in northern Norway. Ethnicity or socio-economic class were not recorded. However, considering that all these factors can in /uniFB02 uence PA engagement (46), it is possible that additional aspects of the phenomenon could be uncovered in a different sample (48). There was a higher percentage of women participating than men; however, this corresponds to the gender distribution in the MS population (1).\nThe use of enactive theory was innovative within the /uniFB01 eld and allowed for, in particular, new aspects of importance for selfef /uniFB01 cacy to be identi /uniFB01 ed. Transference of our results to similar populations can be achieved through theoretical generalization (28).", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed13.pdf" + }, + { + "text": "4.2 Interactions and environment shape meaning making\nParticipants perceived the group setting to increase motivation, support, and commitment, which has been found in previously published work (16, 31).\nThe physiotherapist-participant interaction is acknowledged in exercise interventions for pwMS, pointing to professionals ' role in informing participants of exercise bene /uniFB01 ts in the management of MS, including the prescribing mode, frequency, intensity, and duration of exercise (40). Tailored interventions are supported\nDahl et al.\n10.3389/fresc.2024.1303094\ngiven the heterogenic pathology and symptoms of MS (41, 42). However, our /uniFB01 ndings illuminate qualitative aspects of how to achieve tailored and meaningful intersubjective interactions in an exercise intervention.", + "page_start": 7, + "page_end": 8, + "source_file": "pubmed13.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed13.pdf", + "query": "What were the prerequisites allowing to be involved in the study concerning the impact of outdoor sport on patients witg multiple sclerosis ?", + "target_page": 4, + "target_passage": "The inclusion criteria were as follows: had been diagnosed with MS, had a score on the Expanded Disability Status Scale (EDSS) (29) of ≤3.5, was ≥18 years, was employed (10%–100% of full-time) and residential address in the two predefined municipalities", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "2.5 Recruitment and participants\nPrior to recruitment, the study was introduced to individuals with multiple sclerosis (pwMS) through a seminar hosted by the Nordland MS Association. Additionally, seminars were conducted for health professionals in community healthcare and at the regional hospital. Written information about this study (and the RCT) was sent from the MS clinic at the regional hospital by post to all eligible individuals af /uniFB01 liated with the hospital. Individuals who wished to participate signed the attached consent form and returned it in the pre-stamped envelope. The inclusion criteria were as follows: had been diagnosed with MS, had a score on the Expanded Disability Status Scale (EDSS) (29)of ≤ 3.5, was ≥ 18 years, was employed (10% -100% of full-time) and residential address in the two prede /uniFB01 ned municipalities. The exclusion criteria were as follows: pregnancy, exacerbation of symptoms within two weeks prior to enrollment and other serious conditions compromising balance, walking or work capacity. All participants in the intervention group of the RCT ( n = 15) were included (Table 3).", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed13.pdf" + }, + { + "text": "2.3 Study context\nThis interview study was nested within a randomized controlled trial (RCT) comparing the CoreDISTparticipation intervention to usual care (26) and conducted at a regional hospital MS-outpatient clinic (Nordland Hospital Trust) and in two af /uniFB01 liated municipalities in the northern Norway. The current study investigates participants in the intervention group ' s experiences of the four-week outdoor group, which was part of this new intervention (Table 2). The outdoor sessions were conducted by three trained physiotherapists working in the\nDahl et al.\n10.3389/fresc.2024.1303094\ncommunity healthcare in the two municipalities. The project team included three individuals representing users from the Nordland MS Association, along with an MS nurse and a neurologist from the MS-outpatient clinic, and three physiotherapists/ researchers.", + "page_start": 2, + "page_end": 3, + "source_file": "pubmed13.pdf" + }, + { + "text": "References\n1. Walton C, King R, Rechtman L, Kaye W, Leray E, Marrie RA, et al. Rising prevalence of multiple sclerosis worldwide: insights from the Atlas of MS, third edition. Mult Scler . (2020) 26(14):1816 -21. doi: 10.1177/1352458520970841\n2. Casey B, Coote S, Galvin R, Donnelly A. Objective physical activity levels in people with multiple sclerosis: meta-analysis. Scand J Med Sci Sports . (2018) 28 (9):1960 -9. doi: 10.1111/sms.13214\n3. Kinnett-Hopkins D, Adamson B, Rougeau K, Motl RW. People with MS are less physically active than healthy controls but as active as those with other chronic diseases: an updated meta-analysis. Mult Scler Relat Disord . (2017) 13:38 -43. doi: 10.1016/j.msard.2017.01.016\n4. Hoang PD, Lord S, Gandevia S, Menant J. Exercise and sports science Australia (ESSA) position statement on exercise for people with mild to moderate multiple sclerosis. J Sci Med Sport . (2022) 25(2):146 -54. doi: 10.1016/j.jsams.2021.08.015\n5. Dalgas U, Langeskov-Christensen M, Stenager E, Riemenschneider M, Hvid LG. Exercise as medicine in multiple sclerosis -time for a paradigm shift: preventive, symptomatic, and disease-modifying aspects and perspectives. Curr Neurol Neurosci Rep . (2019) 19(11):1 -12. doi: 10.1007/s11910-019-1002-3", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed13.pdf" + }, + { + "text": "4.2 Interactions and environment shape meaning making\nThe appreciation of being active outdoors in the study sample aligns with that in the general population (47). The outdoors provided a natural environment, which both invited participants to actively explore abilities thought of as left behind after their diagnosis with MS, such as running, and provided an appreciated break from focusing on MS symptoms. We also suggest that the positive experiences of mastering the challenging weather conditions and the added meaning of exercising among other people in the city park can be explained according to such terms. These positive experiences show how we are enmeshed in our history, context and social encounters (35) and how these aspects should also be accounted for when designing exercise interventions.", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed13.pdf" + }, + { + "text": "4.3 Methodological considerations\nThe design and methods were adequate for deriving knowledge from individuals ' experiences. The participants selfreferred to the intervention and were recruited based on pre-set criteria. This approach yielded rich information from people with mild to moderate disabilities due to MS who were\nFrontiers in Rehabilitation Sciences\n09\nfrontiersin.org\nmotivated for physical activity (PA), employed, and residing in northern Norway. Ethnicity or socio-economic class were not recorded. However, considering that all these factors can in /uniFB02 uence PA engagement (46), it is possible that additional aspects of the phenomenon could be uncovered in a different sample (48). There was a higher percentage of women participating than men; however, this corresponds to the gender distribution in the MS population (1).\nThe use of enactive theory was innovative within the /uniFB01 eld and allowed for, in particular, new aspects of importance for selfef /uniFB01 cacy to be identi /uniFB01 ed. Transference of our results to similar populations can be achieved through theoretical generalization (28).", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed13.pdf" + }, + { + "text": "1 Introduction\nTABLE 1 Overview of the CoreDISTparticipation intervention.\nTABLE 2 Description of the outdoor group.\nWeek 1: MS outpatient clinic, 1 = Consultation with the MS nurse (20 min) to address work-related issues based on a structured guide comprising the following themes: knowledge of MS at the workplace, experienced work-related challenges due to MS, potential needs and facilitators . Physiotherapy assessment (60 min) to explore the potential for changes in balance and walking aiming to turn focus toward possibilities and thus,. , 1 = Based on these assessments the MS nurse and the physiotherapist indicated the aspects of importance on a standardized form to inform the municipal physiotherapist.. , 1 = Standardized testing (baseline, for the RCT).. Week 2 - 5: Municipality, 1 = Physiotherapy assessment (60 - 90 min) to explore the patient ' s impairments and potential for improvements in a clinical examination prior to group-training.. , 1 = Indoor group (60 min × 2 weekly, for 4 weeks). There were three to /uniFB01 ve participants in each group and one physiotherapist. Trunk control, balance and physical activity were addressed (GroupCoreDIST). Participants received a link to CoreDIST digital exercise-videos and were advised to do them 1 × weekly throughout the intervention. (videos can be accessed here: https://www.nord.no/en/node/35,098). , 1 = Digital meeting with a multidisciplinary team (pwMS, employer, physiotherapist & MS nurse) (20 min) regarding barriers to work participation and needs for adaptations regarding work and physical activity, according to a structured meeting-guide (one meeting).. Week 6, 1 = Standardized testing (midway, for the RCT).. Week 7 - 10: Municipality, 1 = Outdoor group (60 min × 2 weekly, for 4 weeks). A maximum of ten participants and two physiotherapists were included in each group. Trunk control and balance (GroupCoreDIST exercises) were addressed, and high-intensity walking or running was performed. The intervention was conducted in a city park where both /uniFB02 at and uneven surfaces and hilly terrain were available (Table 2).. , 1 = Additionally, participants were encouraged to comply with the exercise-videos", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed13.pdf" + }, + { + "text": "Publisher ' s note\n41. Baird JF, Motl RW. Response heterogeneity with exercise training and physical activity interventions among persons with multiple sclerosis. Neurorehabil Neural Repair . (2019) 33(1):3 -14. doi: 10.1177/1545968318818904\n42. Sandroff BM, Baird JF, Silveira SL, Motl RW. Response heterogeneity in /uniFB01 tness, mobility and cognition with exercise-training in MS. Acta Neurol Scand . (2019) 139 (2):183 -91. doi: 10.1111/ane.13041\n43. Lahelle AF, Øberg GK, Normann B. Group dynamics in a group-based, individualized physiotherapy intervention for people with multiple sclerosis: a qualitative study. Physiother Res Int . (2019) 25(3):e1829. doi: 10.1002/pri.1829\n44. Normann B. Facilitation of movement: new perspectives provide expanded insights to guide clinical practice. Physiother Theory Pract . (2020) 36(7):769 -78. doi: 10.1080/09593985.2018.1493165\n45. Øberg GK, Normann B, Gallagher S. Embodied-enactive clinical reasoning in physical therapy. Physiother Theory Pract . (2015) 31(4):244 -52. doi: 10.3109/ 09593985.2014.1002873\n46. Anens E, Zetterberg L, Urell C, Emtner M, Hellström K. Self-reported physical activity correlates in Swedish adults with multiple sclerosis: a cross-sectional study. BMC Neurol . (2017) 17(1):204. doi: 10.1186/s12883-0170981-4\n47. Herring TE, Knowles LM, Alschuler KN. Outdoor adventure programs for persons with multiple sclerosis: a review and agenda for future research. Int J MS Care . (2021) 23(4):186 -92. doi: 10.7224/1537-2073.2020-066", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed13.pdf" + }, + { + "text": "EDITED BY\nJacqui H Morris,\nUniversity of Dundee, United Kingdom\nREVIEWED BY\nNicola Saywell,\nAuckland University of Technology,\nNew Zealand\nVerna Stavric,\nAuckland University of Technology,\nNew Zealand\n* CORRESPONDENCE\nStine Susanne Haakonsen Dahl stine.s.dahl@nord.no\nRECEIVED 27 September 2023\nACCEPTED\n06 March 2024\nPUBLISHED 18 March 2024\nCITATION\nDahl SSH, Arntzen EC and Normann B (2024) The meaningfulness of exploring one ' s own limits through interactions and enjoyment in outdoor high-intensity physiotherapy for people with multiple sclerosis: a qualitative study.\nFront. Rehabil. Sci. 5:1303094. doi: 10.3389/fresc.2024.1303094\nCOPYRIGHT\n©2024 Dahl, Arntzen and Normann. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.\nFrontiers in Rehabilitation Sciences\n01\nfrontiersin.org\nTYPE Original Research PUBLISHED 18 March 2024 DOI 10.3389/fresc.2024.1303094\n|\nThe meaningfulness of exploring one ' s own limits through interactions and enjoyment in outdoor high-intensity physiotherapy for people with multiple sclerosis: a qualitative study\nStine Susanne Haakonsen Dahl 1 * , Ellen Christin Arntzen 1 and Britt Normann 1,2\n1 Faculty of Nursing and Health Sciences, Nord University, Bodø, Norway, 2 Department of Physiotherapy, Nordland Hospital Trust, Bodø, Norway\nBackground and purpose: Physical activity (PA) is often reduced in people with MS (pwMS), even when disability is low. Understanding the perspectives of pwMS on interventions aiming to improve PA is important to inform the development of such services. The aim of this study was to explore the experiences of pwMS participating in an outdoor, high-intensity and balance exercise group intervention.", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed13.pdf" + }, + { + "text": "1 Introduction\nMultiple sclerosis (MS) is a progressive in /uniFB02 ammatory disease of the central nervous system (CNS) that is typically diagnosed at 30 -40 years of age (1). A great concern is the signi /uniFB01 cantly lower levels of physical activity (PA) in people with MS (pwMS) across disability levels than in their healthy counterparts (2, 3).\nEarly promotion of PA and exercise is recommended due to numerous established bene /uniFB01 ts in health, symptom management and well-being for pwMS (4). In particular, high-intensity training is endorsed, as it has possible neuroprotective effects in the disease course (5, 6). In addition, exercises addressing sensorimotor impairments (e.g., reduced muscle strength, reduced neuromuscular control) are recommended, as they target individuals ' capability to remain physically active (7). Sensorimotor impairments can in /uniFB02 uence trunk control, which is commonly disturbed in pwMS, even when disability is low (8, 9), and correlate with impaired balance, walking capacity and distance (10, 11). PwMS ' s knowledge of exercise bene /uniFB01 ts, attitudes and motivations, as well as contextual aspects such as lack of optimal exercise interventions, accessibility and support, affect the level of PA and exercise participation (12).\nCoreDISTparticipation (Table 1) is a new comprehensive intervention addressing sensorimotor function, trunk control, high-intensity running/walking and work participation in pwMS with low disability (13). It is based on the GroupCoreDIST 1 intervention, which has been shown to have signi /uniFB01 cant shortand long-term effects on trunk control, balance and walking among pwMS (14, 15). However, no effects of the intervention on objectively measured PA have been identi /uniFB01 ed, even though the participants reported perceptions of new possibilities to be", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed13.pdf" + }, + { + "text": "References\n6. Riemenschneider M, Hvid LG, Ringgaard S, Nygaard MKE, Eskildsen SF, Gaemelke T, et al. Investigating the potential disease-modifying and neuroprotective ef /uniFB01 cacy of exercise therapy early in the disease course of multiple sclerosis: the early multiple sclerosis exercise study (EMSES). Mult Scler . (2022) 28(10):1620 -9. doi: 10. 1177/13524585221079200\n7. Kalb R, Brown TR, Coote S, Costello K, Dalgas U, Garmon E, et al. Exercise and lifestyle physical activity recommendations for people with multiple sclerosis throughout the disease course. Mult Scler . (2020) 26(12):1459 -69. doi: 10.1177/ 1352458520915629\n8. Moreno-Navarro P, Manca A, Martinez G, Ventura L, Barbado D, Vera-García FJ, et al. Test-retest reliability and known-groups validity of trunk muscle tests in people with multiple sclerosis: a cross-sectional, case-control study. Phys Ther . (2021) 101 (5):1 -9. doi: 10.1093/ptj/ptzab049\n9. Raats J, Arntzen EC, Lamers I, Feys P, Normann B. What is the distribution of trunk impairments and its relationship with disability level in individuals with multiple sclerosis? Mul Scler Relat Disord . (2021) 57:103325. doi: 10.1016/j.msard. 2021.103325\n10. Normann B, Arntzen EC. What are the relationships between trunk control, balance and walking in individuals with multiple sclerosis with minor to moderate disability? Eur J Physiother . (2021) 23(6):377 -83. doi: 10.1080/21679169.2020.1772870\nFrontiers in Rehabilitation Sciences\n10\nfrontiersin.org", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed13.pdf" + } + ] + }, + { + "references": { + "source_file": "ASX_STO_2004.pdf", + "query": "What was the sales revenue of Santos in 2004 ?", + "target_page": 12, + "target_passage": " Sales revenue was a record $1,501 million", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "2004 WAS A YEAR OF GOOD OPERATING RESULTS\nOverall the increase in 2004 profit of 16% reflected a year of sound operating performance. Sales revenue was a record $1,501 million, up 2.5% on 2003, reflecting higher prices across most products and was achieved despite lower production as a result of the Moomba incident and declining output from late life fields.\nSantos benefited from higher world oil prices and realised US$51.83 per boe in 2004, an increase of 19% over 2003. The benefit of higher world oil prices substantially offset the impact of lower production volumes.\nSantos was also able to negotiate higher domestic gas prices (up 4% on average) and deliver new revenue streams from project start-ups and acquisitions during the year.", + "page_start": 11, + "page_end": 11, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "10 YEAR SUMMARY 1995-2004\nto the shareholders of Santos Ltd, 2004 = 379.9. Financial position ($million), 1995 = . Financial position ($million), 1996 = . Financial position ($million), 1997 = . Financial position ($million), 1998 = . Financial position ($million), 1999 = . Financial position ($million), 2000 = . Financial position ($million), 2001 = . Financial position ($million), 2002 = . Financial position ($million), 2003 = . Financial position ($million), 2004 = . Total assets, 1995 = 2,915.5. Total assets, 1996 = 3,443.4. Total assets, 1997 = 4,036.2. Total assets, 1998 = 4,236.1. Total assets, 1999 = 4,338.7. Total assets, 2000 = 4,659.8. Total assets, 2001 = 5,048.7. Total assets, 2002 = 5,320.8. Total assets, 2003 = 5,218.3. Total assets, 2004 = 5,956.0. Net debt, 1995 = 642.0. Net debt, 1996 = 938.6. Net debt, 1997 = 1,114.2. Net debt, 1998 = 1,280.0. Net debt, 1999 = 1,301.1. Net debt, 2000 = 866.6. Net debt, 2001 = 1,060.8. Net debt, 2002 = 1,162.9. Net debt, 2003 = 897.6. Net debt, 2004 = 1,131.4. Total equity, 1995 = 1,519.3. Total equity, 1996 = 1,586.3. Total equity, 1997 = 1,919.0. Total equity, 1998 = 1,939.2. Total equity, 1999 = 2,056.7. Total equity, 2000 = 2,310.9. Total equity, 2001 = 2,726.6. Total equity, 2002 = 2,863.9. Total equity, 2003 = 3,087.9. Total equity, 2004 = 3,498.3. Reserves and production (mmboe), 1995 = . Reserves and production (mmboe), 1996 = . Reserves and production (mmboe), 1997 = . Reserves and production (mmboe), 1998 = . Reserves and", + "page_start": 45, + "page_end": 45, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "STATEMENTS OF FINANCIAL PERFORMANCE\nProduct sales, Note = 2. Product sales, Consolidated.2004 $million = 1,500.9. Product sales, Consolidated.2003 $million = 1,465.0. Product sales, Santos Ltd.2004 $million = 568.8. Product sales, Santos Ltd.2003 $million = 616.3. Cost of sales, Note = 3. Cost of sales, Consolidated.2004 $million = (1,049.8). Cost of sales, Consolidated.2003 $million = (974.4). Cost of sales, Santos Ltd.2004 $million = (414.5). Cost of sales, Santos Ltd.2003 $million = (356.6). Gross profit, Note = . Gross profit, Consolidated.2004 $million = 451.1. Gross profit, Consolidated.2003 $million = 490.6. Gross profit, Santos Ltd.2004 $million = 154.3. Gross profit, Santos Ltd.2003 $million = 259.7. Other revenue, Note = 2. Other revenue, Consolidated.2004 $million = 252.3. Other revenue, Consolidated.2003 $million = 154.4. Other revenue, Santos Ltd.2004 $million = 858.0. Other revenue, Santos Ltd.2003 $million = 126.2. Other expenses, Note = 3. Other expenses, Consolidated.2004 $million = (129.0). Other expenses, Consolidated.2003 $million = (179.5). Other expenses, Santos Ltd.2004 $million = (221.0). Other expenses, Santos Ltd.2003 $million = (108.3). Borrowing costs, Note = 4. Borrowing costs, Consolidated.2004 $million = (33.6). Borrowing costs, Consolidated.2003 $million = (34.6). Borrowing costs, Santos Ltd.2004 $million = (91.1). Borrowing costs, Santos Ltd.2003 $million = (84.0). Profit from ordinary activities before income tax expense, Note = . Profit from ordinary activities before income tax expense, Consolidated.2004 $million = 540.8. Profit from ordinary activities before income tax expense, Consolidated.2003 $million = 430.9. Profit from ordinary activities before income tax expense, Santos Ltd.2004 $million = 700.2. Profit from ordinary activities before income tax expense, Santos Ltd.2003 $million = 193.6. Income tax expense relating to ordinary activities, Note =", + "page_start": 51, + "page_end": 51, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "10 YEAR SUMMARY 1995-2004\nto the shareholders of Santos Ltd, 1995 = 110.6. Net profit after income tax attributable to the shareholders of Santos Ltd, 1996 = 195.9. Net profit after income tax attributable to the shareholders of Santos Ltd, 1997 = 206.2. Net profit after income tax attributable to the shareholders of Santos Ltd, 1998 = 176.3. Net profit after income tax attributable to the shareholders of Santos Ltd, 1999 = 309.1. Net profit after income tax attributable to the shareholders of Santos Ltd, 2000 = 486.8. Net profit after income tax attributable to the shareholders of Santos Ltd, 2001 = 445.9. Net profit after income tax attributable to the shareholders of Santos Ltd, 2002 = 322.1. Net profit after income tax attributable to the shareholders of Santos Ltd, 2003 = 327.0. Net profit after income tax attributable", + "page_start": 45, + "page_end": 45, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "A STRONG FINANCIAL PERFORMANCE\nIt was pleasing that Santos was able to conclude 2004 on a higher note than it started.\nWe achieved record annual revenue thanks to higher oil and gas prices combined with the return of full production at Moomba to produce a 21.5% jump in second half sales: the best result for any six-month period in Santos' history.\nThe average realised price for crude oil was up nearly 19% to A$51.83 per barrel.\nThese results have left Santos well positioned to continue its strong investment program which saw capital expenditure peak at $930 million in 2004.\nIn 2005 we expect to invest around $850 million of new capital in projects and our strategy is to plan for firm developments based on affordability at relatively low oil prices. If higher prices continue and some projects mature quickly and can be given the green light, our overall capital expenditure may be higher.\nProduction is expected to rise in 2005 when, as usual, our financial performance will be subject to oil prices, exchange rates and interest rates. These factors have a significant effect on our bottom line. A US$1 per barrel change in the oil price equates to a A$16 million change in net profit after tax in 2005.\nA one US cent movement in the Australia-US dollar exchange rate would produce a change in profit after tax of A$8 million, and a 1% change in interest rates equates to a change in net profit after tax of A$9 million.\n2004 has also been an important period for shareholders, with a significant improvement in the Santos share price combined with an increase in the dividend.", + "page_start": 6, + "page_end": 6, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "PRODUCTION COSTS UNDER CONTROL\nProduction costs in 2004 were $309 million, up $45 million or 17% on 2003. Analysis shows that Santos was able to continue", + "page_start": 11, + "page_end": 11, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "NOTES TO THE FINANCIAL STATEMENTS\nContingent Assets', Santos Ltd.2003 $million = 93.3. Net profit after income tax attributable to the shareholders of Santos Ltd, Consolidated.2004 $million = 379.9. Net profit after income tax attributable to the shareholders of Santos Ltd, Consolidated.2003 $million = 327.0. Net profit after income tax attributable to the shareholders of Santos Ltd, Santos Ltd.2004 $million = 643.1. Net profit after income tax attributable to the shareholders of Santos Ltd, Santos Ltd.2003 $million = 182.9. Dividends recognised during the year, Consolidated.2004 $million = (212.8). Dividends recognised during the year, Consolidated.2003 $million = (198.0). Dividends recognised during the year, Santos Ltd.2004 $million = (212.8). Dividends recognised during the year, Santos Ltd.2003 $million = (198.0). Premium paid on buy-back of reset convertible preference share, Consolidated.2004 $million = (2.4). Premium paid on buy-back of reset convertible preference share, Consolidated.2003 $million = -. Premium paid on buy-back of reset convertible preference share, Santos Ltd.2004 $million = (2.4). Premium paid on buy-back of reset convertible preference share, Santos Ltd.2003 $million = -. Balance at the end of the year, Consolidated.2004 $million = 1,368.3. Balance at the end of the year, Consolidated.2003 $million = 1,203.6. Balance at the end of the year, Santos Ltd.2004 $million = 1,299.8. Balance at the end of the year, Santos Ltd.2003 $million = 871.9. Dividends provided for and paid by the Company, Consolidated.2004 $million = . Dividends provided for and paid by the Company, Consolidated.2003 $million = . Dividends provided for and paid by the Company, Santos Ltd.2004 $million = . Dividends provided for and paid by the Company, Santos Ltd.2003 $million = . Special dividend of $5.00 per redeemable convertible preference share paid on 7 October 2004 on 2,865,821 shares, fully franked, Consolidated.2004 $million = 14.3. Special dividend of $5.00 per redeemable convertible preference share paid on", + "page_start": 69, + "page_end": 69, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "STATEMENTS OF FINANCIAL PERFORMANCE\nto the shareholders of Santos Ltd, Note = . Total changes in equity from non-owner related transactions attributable to the shareholders of Santos Ltd, Consolidated.2004 $million = 379.7. Total changes in equity from non-owner related transactions attributable to the shareholders of Santos Ltd, Consolidated.2003 $million = 322.3. Total changes in equity from non-owner related transactions attributable to the shareholders of Santos Ltd, Santos Ltd.2004 $million = 643.1. Total changes in equity from non-owner related transactions attributable to the shareholders of Santos Ltd, Santos Ltd.2003 $million = 182.9. Earnings per share (cents), Note = . Earnings per share (cents), Consolidated.2004 $million = . Earnings per share (cents), Consolidated.2003 $million = . Earnings per share (cents), Santos Ltd.2004 $million = . Earnings per share (cents), Santos Ltd.2003 $million = . Basic, Note = 21. Basic, Consolidated.2004 $million = 58.6. Basic, Consolidated.2003 $million = 52.1. Basic, Santos Ltd.2004 $million = . Basic, Santos Ltd.2003 $million = . Diluted, Note = 21. Diluted, Consolidated.2004 $million = 58.5. Diluted, Consolidated.2003 $million = 51.5. Diluted, Santos Ltd.2004 $million = . Diluted, Santos Ltd.2003 $million = \nThe statements of financial performance are to be read in conjunction with the notes to the financial statements.\nAnnual Report 2004", + "page_start": 51, + "page_end": 51, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "10 YEAR SUMMARY 1995-2004\nSantos average realised oil price (A$/bbl), 1995 = 24.96. Santos average realised oil price (A$/bbl), 1996 = 27.43. Santos average realised oil price (A$/bbl), 1997 = 27.42. Santos average realised oil price (A$/bbl), 1998 = 20.95. Santos average realised oil price (A$/bbl), 1999 = 27.57. Santos average realised oil price (A$/bbl), 2000 = 46.54. Santos average realised oil price (A$/bbl), 2001 = 45.53. Santos average realised oil price (A$/bbl), 2002 = 44.74. Santos average realised oil price (A$/bbl), 2003 = 43.59. Santos average realised oil price (A$/bbl), 2004 = 51.83. Financial performance ($million), 1995 = . Financial performance ($million), 1996 = . Financial performance ($million), 1997 = . Financial performance ($million), 1998 = . Financial performance ($million), 1999 = . Financial performance ($million), 2000 = . Financial performance ($million), 2001 = . Financial performance ($million), 2002 = . Financial performance ($million), 2003 = . Financial performance ($million), 2004 = . Product sales revenue, 1995 = 671.6. Product sales revenue, 1996 = 729.2. Product sales revenue, 1997 = 778.5. Product sales revenue, 1998 = 769.4. Product sales revenue, 1999 = 944.5. Product sales revenue, 2000 = 1,497.1. Product sales revenue, 2001 = 1,459.7. Product sales revenue, 2002 = 1,478.4. Product sales revenue, 2003 = 1,465.0. Product sales revenue, 2004 = 1,500.9. Total operating revenue, 1995 = 740.1. Total operating revenue, 1996 = 804.0. Total operating revenue, 1997 = 859.5. Total operating revenue, 1998 = 1,000.8. Total operating revenue, 1999 = 995.6. Total operating revenue, 2000 = 1,556.2. Total operating revenue, 2001 = 1,561.8. Total operating revenue, 2002 = 1,542.3. Total operating", + "page_start": 45, + "page_end": 45, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "NOTES TO THE FINANCIAL STATEMENTS\nfor the year ended 31 December 2004\nReconciliation of profit from ordinary activities after income tax to net cash provided by operating activities, Consolidated.2004 $million = . Reconciliation of profit from ordinary activities after income tax to net cash provided by operating activities, Consolidated.2003 $million = . Reconciliation of profit from ordinary activities after income tax to net cash provided by operating activities, Santos Ltd.2004 $million = . Reconciliation of profit from ordinary activities after income tax to net cash", + "page_start": 75, + "page_end": 75, + "source_file": "ASX_STO_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "1002.2525.pdf", + "query": "How have been confirmed nonvanishing neutrino ?", + "target_page": 2, + "target_passage": "The nonvanishing neutrino masses have been confirmed by various neutrino oscillation phenomena and indicate the evidence of new physics beyond the Standard Model.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "I. INTRODUCTION\nThe nonvanishing neutrino masses have been confirmed by various neutrino oscillation phenomena and indicate the evidence of new physics beyond the Standard Model. The most attractive idea to naturally explain the tiny neutrino masses is the seesaw mechanism [1], in which the right-handed (RH) neutrinos singlet under the SM gauge group are introduced. The minimal gauged U (1) B -L model based on the gauge group SU (3) C × SU (2) L × U (1) Y × U (1) B -L [2] is an elegant and simple extension of the SM, in which the RH neutrinos of three generations are necessarily introduced because of the gauge and gravitational anomaly cancellations. In addition, the mass of RH neutrinos arises associated with the U (1) B -L gauge symmetry breaking.\nAlthough the scale of the B -L gauge symmetry breaking is basically arbitrary as long as phenomenological constraints are satisfied, one interesting option is to take it to be the TeV scale [3]. It has been recently pointed out [4] that when the classical conformal invariance is imposed on the minimal U (1) B -L model, the symmetry breaking scale appears to be the TeV scale naturally. If this is the case, all new particles, the Z ' gauge boson, the B -L Higgs boson H and the RH neutrinos appear at the TeV scale unless the U (1) B -L gauge coupling is extremely small, and they can be discovered at Large Hadron Collider [5-8]. Then we may be able to understand the relation between the gauge symmetry breaking and the origin of neutrino masses.", + "page_start": 1, + "page_end": 1, + "source_file": "1002.2525.pdf" + }, + { + "text": "B. Direct detection of dark matter\nOur RH neutrino DM can elastically scatter off with nucleon, unlike another RH neutrino DM model has been proposed by Krauss et. al. [21] and studied [22, 23]. The main process is Higgs exchange and the resultant cross section for a proton is given by\nσ ( p ) SI = 4 π ( m p m N m p + m N ) 2 f 2 p , (17)\nwith the hadronic matrix element\nf p m p = ∑ q = u,d,s f ( p ) Tq α q m q + 2 27 f ( p ) TG ∑ c,b,t α q m q , (18)\nand the effective vertex (see Appendix for notations)\nα q = -λ N y q ( ∂ Φ ∂h 1 M 2 h ∂ Ψ ∂h + ∂ Φ ∂H 1 M 2 H ∂ Ψ ∂H ) , (19)\nwhere m q is a mass of a quark with a Yukawa coupling y q , and f ( p ) Tq and f ( p ) TG are constants.\n7\nFrom Eq. (19), one can see that σ ( p ) SI ∝ (sin 2 θ/v ' ) 2 for a given DM mass m N . Fig. 3 shows the spin-independent cross section of RH neutrino with a proton. The resultant cross section is found to be far below the current limits reported by XENON10 [24] and CDMSII [25]: σ SI /lessorsimilar 4 × 10 -8 -2 × 10 -7 pb, for a DM mass of 100 GeV-1 TeV. Future experiments such as XENON1T [26] can reach the cross section predicted in our model.\nFIG. 3: The spin independent scattering cross section with a proton. All parameters are same as those used in the previous section. The upper and lower lines correspond to sin θ = 0 . 7 and 0 . 3, respectively.", + "page_start": 6, + "page_end": 7, + "source_file": "1002.2525.pdf" + }, + { + "text": "II. THE MINIMAL GAUGED U (1) B -L MODEL WITH Z 2 PARITY\nV (Φ , Ψ) = m 2 1 | Φ | 2 + m 2 2 | Ψ | 2 + λ 1 | Φ | 4 + λ 2 | Ψ | 4 + λ 3 | Φ | 2 | Ψ | 2 . (4)\n3\nThe Higgs fields φ and ψ are obtained by expanding Φ and Ψ as\nΦ =   0 1 √ 2 ( v + φ )   , (5)\nΨ = 1 √ 2 ( v ' + ψ ) , (6)\naround the true vacuum with the vacuum expectation values v and v ' . These are related with the mass eigenstates h and H through\n  h H   =   cos θ -sin θ sin θ cos θ     φ ψ   , (7)\nwith θ being the mixing angle. Their masses are given by\nM 2 h = 2 λ 1 v 2 cos 2 θ +2 λ 2 v ' 2 sin 2 θ -2 λ 3 vv ' sin θ cos θ, (8)\nM 2 H = 2 λ 1 v 2 sin 2 θ +2 λ 2 v ' 2 cos 2 θ +2 λ 3 vv ' sin θ cos θ. (9)\nThe mass of the new neutral gauge boson Z ' arises by the U (1) B -L gauge symmetry breaking,\nM 2 Z ' = 4 g 2 B -L v ' 2 . (10)\nAssociated with the U (1) B -L gauge symmetry breaking, the RH neutrinos N i acquire masses\nM N i = -λ R i v ' √ 2 . (11)\nFrom LEP experiment, the current lower bound on the Z ' boson mass has been found to be [10, 11]\nM Z ' g B -L = 2 v ' /greaterorsimilar 6 -7 TeV . (12)\nTwo Z 2 -even RH neutrinos N 1 and N 2 are responsible for light neutrino masses via the seesaw mechanism,\nm ν αβ = -∑ i =1 , 2 y αi y iβ v 2 2 M N i . (13)\nNote that the rank of this mass matrix is two, so that the lightest neutrino is massless.", + "page_start": 2, + "page_end": 3, + "source_file": "1002.2525.pdf" + }, + { + "text": "2. Annihilation into neutrinos\na. Annihilation into ν a , ν a (light active-like neutrinos)\n|M| 2 = 32 ∣ ∣ ∣ ∣ g 2 B -L q f q N s -M 2 Z ' + iM Z ' Γ Z ' ∣ ∣ ∣ ∣ 2 ( s -4 m 2 N ) ( 3 8 s -1 2 ( s 2 + m 2 ν a ) + 1 2 ( s 4 + m 2 ν a ) cos 2 θ ) . (B2)\n10\nb. Annihilation into ν s , ν s (heavy sterile-like neutrinos)\n|M| 2 = 32 ∣ ∣ ∣ ∣ g 2 B -L q f q N s -M 2 Z ' + iM Z ' Γ Z ' ∣ ∣ ∣ ∣ 2 ( s -4 m 2 N ) ( 3 8 s -1 2 ( s 2 + m 2 ν s ) + 1 2 ( s 4 + m 2 ν s ) cos 2 θ ) +4 λ 2 N λ 2 ν s ∣ ∣ ∣ ∣ ∂ Ψ ∂h i s -M 2 h + iM h Γ h ∂ Ψ ∂h + ∂ Ψ ∂H i s -M 2 H + iM H Γ H ∂ Ψ ∂H ∣ ∣ ∣ ∣ 2 ( s -4 m 2 N )( s -4 m 2 ν s ) . (B3)", + "page_start": 9, + "page_end": 10, + "source_file": "1002.2525.pdf" + }, + { + "text": "I. INTRODUCTION\nAlthough such a TeV scale model is interesting and appealing, one might think that the absence of dark matter (DM) candidate is a shortcoming of this model. A sterile RH neutrino with mass of the order of MeV is one possibility [9]. In this paper, we propose a very simple idea to introduce the DM candidate in the minimal gauged U (1) B -L model. We introduce the Z 2 parity into the model and impose one of three RH neutrinos to be odd, while the others even. In this way, the Z 2 -odd RH neutrino becomes stable and the DM candidate. Note that two RH neutrinos are enough to reconcile with the observed neutrino oscillation data, with a prediction of one massless light neutrino. Therefore, without introducing any additional new dynamical degrees of freedom, the DM particle arises in the minimal gauged U (1) B -L model.\nThe paper is organized as follows. In the next section, we briefly describe our model. In section III, we estimate the thermal relic density of the RH neutrino and identify the model\n2\nparameter to be consistent with the current observations. We also calculate the scattering cross section between the DM particle and nucleon and discuss the implication for the direct DM search experiments. We summarize our results in the section IV. Our notations and the formulas used in our analysis are listed in Appendix.", + "page_start": 1, + "page_end": 2, + "source_file": "1002.2525.pdf" + }, + { + "text": "II. THE MINIMAL GAUGED U (1) B -L MODEL WITH Z 2 PARITY\nThe model is based on the gauge group SU (3) C × SU (2) L × U (1) Y × U (1) B -L . Additional fields besides the standard model fields are a gauge field Z ' µ of the U (1) B -L , a SM singlet B -L Higgs boson Ψ with two U (1) B -L charge, and three RH neutrinos N i which are necessary for the gauge and gravitational anomaly cancellations. In describing the RH neutrinos, we use the four component representation of RH neutrino constructed from the Weyl spinor ν R i ,\nN i ≡   ν R i /epsilon1 ν ∗ R i   , (1)\nFor the two RH neutrinos, N 1 and N 2 , we assign Z 2 parity even, while odd for N 3 , so that the RH neutrino N 3 is stable and, hence, the DM candidate.\nDue to the additional gauge symmetry U (1) B -L , the covariant derivative for each fields is given by\nD µ = D ( SM ) µ -iq B -L g B -L Z ' µ , (2)\nwhere D ( SM ) µ is the covariant derivative in the SM, and q B -L is the charge of each fields under the U (1) B -L with its gauge coupling g B -L .\nYukawa interactions relevant for the neutrino masses are given by\nL int = 3 ∑ α =1 2 ∑ i =1 y αi ¯ L α ˜ Φ N i -1 2 3 ∑ i =1 λ R i ¯ N i Ψ P R N i +h . c ., (3)\nwhere ˜ Φ = -iτ 2 Φ ∗ for Φ being the SM Higgs doublet, and without loss of generality we have worked out in the basis where the second term in the right-hand-side is in flavor diagonal for RH neutrinos. Because of the Z 2 parity, the DM candidate N 3 has no Yukawa couplings with the left-handed lepton doublets.\nThe general Higgs potential for the SU (2) L doublet Φ and a singlet B -L Higgs Ψ is generally given by", + "page_start": 2, + "page_end": 2, + "source_file": "1002.2525.pdf" + }, + { + "text": "III. RIGHT-HANDED NEUTRINO DARK MATTER\nDue to the Z 2 parity, one of RH neutrino N 3 (we denote it as N hereafter) in our model can be the DM candidate. We first estimate its relic abundance and identify the model\n4\nparameters to be consistent with the current observations. Next we calculate the scattering cross section between the DM particle and a proton and discuss the implication for the direct DM search experiments.", + "page_start": 3, + "page_end": 4, + "source_file": "1002.2525.pdf" + }, + { + "text": "IV. SUMMARY\nWe have proposed a scenario of the RH neutrino dark matter in the context of the minimal gauged U (1) B -L model. We have introduced a discrete Z 2 parity in the model, so that one RH neutrino assigned as Z 2 -odd can be stable and, hence, the DM candidate, while the other two RH neutrinos account for neutrino masses and mixings through the seesaw mechanism. No additional degrees of freedom are necessary to be added. We have evaluated the relic density of the dark matter particle. The dominant annihilation modes are via the Higgs boson exchange processes in the s -channel and thus, our model can be called Higgs portal DM model. It has been found that the relic density consistent with the current observation\n8\ncan be achieved only when the annihilation processes are enhanced by Higgs resonances. Therefore, the mass of the RH neutrino DM should be around a half of Higgs boson masses. We have also calculated the elastic scattering cross section between the DM particle and a proton and found it within the reach of future experiments for the direct DM search.", + "page_start": 7, + "page_end": 8, + "source_file": "1002.2525.pdf" + }, + { + "text": "A. Thermal relic density\nThe DM RH neutrino interacts with the SM particles through couplings with B -L gauge and B -L Higgs bosons. Note that neutrino Dirac Yukawa interactions are absent because of the Z 2 parity. The most of annihilation of the RH neutrinos occurs via Z ' , H and h exchange processes in the s -channel. In practice, the dominant contributions come from the Higgs ( h and H ) exchange diagrams, because the Z ' exchange processes are suppressed by the inverse square of the B -L Higgs VEV v ' /greaterorsimilar 3 TeV. Thus, we obtain Higgs portal DM of RH neutrino effectively. The relevant annihilation modes are the annihilation into f ¯ f , W + W -, ZZ , and h ( H ) h ( H ). Since RH neutrino DM couples to only B -L Higgs Ψ while a SM particle does to SM Higgs Φ, the DM annihilation occurs only through the mixing between these two Higgs bosons. Although it is not so severe, the precision electroweak measurements [12] as well as the unitarity bound [13] give constraints on the mixing angle and mass spectrum of the Higgs bosons.\nThe thermal relic abundance of DM\nΩ N h 2 = 1 . 1 × 10 9 m N /T d √ g ∗ M P 〈 σv 〉 GeV -1 , (14)\nwith the Planck mass M P , the thermal averaged product of the annihilation cross section and the relative velocity 〈 σv 〉 , the total number of relativistic degrees of freedom in the thermal bath g ∗ , and the decoupling temperature T d , is evaluated by solving the Boltzmann equation for the number density of RH neutrino n N ;\ndn N dt +3 Hn N = -〈 σv 〉 ( n 2 N -n 2 EQ ) , (15)\nand the Friedmann equation\nH 2 ≡ ( ˙ a a ) 2 = 8 π 3 M 2 P ρ, (16)\nwith n EQ and a ( t ) being the equilibrium number density and the scale factor, under the radiation dominated Universe with the energy density ρ = ρ rad [14].\n5", + "page_start": 4, + "page_end": 4, + "source_file": "1002.2525.pdf" + }, + { + "text": "Acknowledgments\nThis work was supported in part by the NSF REU and DoD ASSURE programs under Grant no. 0754568 and by the Smithsonian Institution. Partial support was also provided by NASA contract NAS8-39073 and NASA grant NNX07AQ55G. We have made use of the SIMBAD database, operated at CDS, Strasbourg, France, and the NASA/IPAC Extragalactic Database (NED) which is operated by the JPL, Caltech, under contract with NASA.\n6\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5", + "page_start": 4, + "page_end": 5, + "source_file": "1001.0806.pdf" + } + ] + }, + { + "references": { + "source_file": "1002.2525.pdf", + "query": "What are the dominant contributions in thermal relic density ?", + "target_page": 5, + "target_passage": "In practice, the dominant contributions come from the Higgs (h and H) exchange diagrams.", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "A. Thermal relic density\nFig. 1 shows the relic density Ω N h 2 as a function of the DM mass m N for a set of parameters: ( v ' , M h , M H , M Z ' , sin θ ) = (4000 GeV , 120 GeV , 200 GeV , 1000 GeV , 0 . 7), for example. Willkinson Microwave Anisotropy Probe measured the value of DM abundance as Ω DM h 2 /similarequal 0 . 1 [15]. The figure shows that a desired DM relic abundance can be obtained for only near Higgs resonances, m N ≈ M h / 2 or M H / 2.\nFig. 2 shows the relic density Ω N h 2 as a function of the DM mass m N for a smaller Higgs mixing sin θ = 0 . 3 (others are the same as in Fig. 1). Compared with Fig. 1, for m N /lessorsimilar M W where the DM particles dominantly annihilate into f ¯ f , the relic density further increases because of the small mixing angle. When the DM is heavier, the annihilation mode into Higgs boson pairs is opened and the relic density slightly deceases, but the reduction is not enough to reach Ω N h 2 /similarequal 0 . 1.\nFIG. 1: The thermal relic density of RH neutrino DM as a function of its mass for a parameter set: ( v ' , M h , M H , M Z ' , sin θ ) = (3000 GeV , 120 GeV , 200 GeV , 1000 GeV , 0 . 7).\nOur model is quite analogous to the so-called gauge singlet scalar dark matter [16-18]. Some recent studies can be found in Refs. [19, 20]. In the gauge singlet scalar DM model, the thermal abundance is mainly controlled by the interactions between the SM Higgs boson and the DM particle. In our model, B -L Higgs VEV v ' can play the same role for m N < M W , namely a larger v ' corresponds to weaker coupling between DM and Higgs for a fixed DM mass. On the other hand, for m N > M W the difference appears. Even if the annihilation\n6\nFIG. 2: The same as Fig. 1 but for sin θ = 0 . 3.", + "page_start": 5, + "page_end": 6, + "source_file": "1002.2525.pdf" + }, + { + "text": "A. Thermal relic density\nmode into W -boson pair becomes kinematically available, it is not possible to obtain the desired DM abundance without the Higgs resonant annihilation because the bound on v ' given by Eq. (12) is stringent.", + "page_start": 6, + "page_end": 6, + "source_file": "1002.2525.pdf" + }, + { + "text": "A. Thermal relic density\nThe DM RH neutrino interacts with the SM particles through couplings with B -L gauge and B -L Higgs bosons. Note that neutrino Dirac Yukawa interactions are absent because of the Z 2 parity. The most of annihilation of the RH neutrinos occurs via Z ' , H and h exchange processes in the s -channel. In practice, the dominant contributions come from the Higgs ( h and H ) exchange diagrams, because the Z ' exchange processes are suppressed by the inverse square of the B -L Higgs VEV v ' /greaterorsimilar 3 TeV. Thus, we obtain Higgs portal DM of RH neutrino effectively. The relevant annihilation modes are the annihilation into f ¯ f , W + W -, ZZ , and h ( H ) h ( H ). Since RH neutrino DM couples to only B -L Higgs Ψ while a SM particle does to SM Higgs Φ, the DM annihilation occurs only through the mixing between these two Higgs bosons. Although it is not so severe, the precision electroweak measurements [12] as well as the unitarity bound [13] give constraints on the mixing angle and mass spectrum of the Higgs bosons.\nThe thermal relic abundance of DM\nΩ N h 2 = 1 . 1 × 10 9 m N /T d √ g ∗ M P 〈 σv 〉 GeV -1 , (14)\nwith the Planck mass M P , the thermal averaged product of the annihilation cross section and the relative velocity 〈 σv 〉 , the total number of relativistic degrees of freedom in the thermal bath g ∗ , and the decoupling temperature T d , is evaluated by solving the Boltzmann equation for the number density of RH neutrino n N ;\ndn N dt +3 Hn N = -〈 σv 〉 ( n 2 N -n 2 EQ ) , (15)\nand the Friedmann equation\nH 2 ≡ ( ˙ a a ) 2 = 8 π 3 M 2 P ρ, (16)\nwith n EQ and a ( t ) being the equilibrium number density and the scale factor, under the radiation dominated Universe with the energy density ρ = ρ rad [14].\n5", + "page_start": 4, + "page_end": 4, + "source_file": "1002.2525.pdf" + }, + { + "text": "Appendix C: Thermal averaged annihilation cross section\n[14] E. W. Kolb and M. S. Turner, The Early Universe , Addison-Wesley (1990).\n[15] D. N. Spergel et al. [WMAP Collaboration], Astrophys. J. Suppl. 170 , 377 (2007).\n[16] J. McDonald, Phys. Rev. D 50 , 3637 (1994).\n[17] C. P. Burgess, M. Pospelov and T. ter Veldhuis, Nucl. Phys. B 619 , 709 (2001).\n[18] H. Davoudiasl, R. Kitano, T. Li and H. Murayama, Phys. Lett. B 609 , 117 (2005).\n[19] T. Kikuchi and N. Okada, Phys. Lett. B 665 , 186 (2008).\n[20] C. E. Yaguna, JCAP 0903 , 003 (2009).\n[21] L. M. Krauss, S. Nasri and M. Trodden, Phys. Rev. D 67 , 085002 (2003).\n[22] E. A. Baltz and L. Bergstrom, Phys. Rev. D 67 , 043516 (2003).\n[23] K. Cheung and O. Seto, Phys. Rev. D 69 , 113009 (2004).\n[24] J. Angle et al. [XENON Collaboration], Phys. Rev. Lett. 100 021303 (2008).\n[25] Z. Ahmed et al. [The CDMS-II Collaboration], arXiv:0912.3592 [astro-ph.CO].\n[26] http://xenon.astro.columbia.edu/.\n13", + "page_start": 12, + "page_end": 12, + "source_file": "1002.2525.pdf" + }, + { + "text": "Acknowledgments\nThis work was supported in part by the NSF REU and DoD ASSURE programs under Grant no. 0754568 and by the Smithsonian Institution. Partial support was also provided by NASA contract NAS8-39073 and NASA grant NNX07AQ55G. We have made use of the SIMBAD database, operated at CDS, Strasbourg, France, and the NASA/IPAC Extragalactic Database (NED) which is operated by the JPL, Caltech, under contract with NASA.\n6\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5", + "page_start": 4, + "page_end": 5, + "source_file": "1001.0806.pdf" + }, + { + "text": "Appendix C: Thermal averaged annihilation cross section\nIn partial wave expansion, the thermal averaged cross section is given by\n〈 σv 〉 = 1 m 2 N [ w ( s ) -3 2 ( 2 w ( s ) -4 m 2 N dw ds ) T m N ]∣ s =4 m 2\n= 6 dw ds s =4 m 2 T m N ,\n∣ ∣ ∣ N (C1) ∣ ∣ ∣ ∣ N (C2)\n4 w ( s ) ≡ ∫ d LIPS ∑ |M| 2 = 1 8 π √ s -4 m 2 final s ∫ d cos θ 2 ∑ |M| 2 , (C3)\nwhere m final is the mass of final state particle.\n[1] T. Yanagida, in Proceedings of Workshop on the Unified Theory and the Baryon Number in the Universe , Tsukuba, Japan, edited by A. Sawada and A. Sugamoto (KEK, Tsukuba, 1979), p 95; M. Gell-Mann, P. Ramond, and R. Slansky, in Supergravity , Proceedings of Workshop,\n12\nStony Brook, New York, 1979, edited by P. Van Nieuwenhuizen and D. Z. Freedman (NorthHolland, Amsterdam, 1979), p 315; R. N. Mohapatra and G. Senjanovic, Phys. Rev. Lett. 44 , 912 (1980).", + "page_start": 11, + "page_end": 12, + "source_file": "1002.2525.pdf" + }, + { + "text": "Acknowledgments\nThis work is supported by the NASA Fermi Guest Investigator program. At LSU, additional support is provided by NASA/Louisiana Board of Regents Cooperative Agreement NNX07AT62A.\n(1998).\n[10] M. McConnell et al., Ap. J. 523 , 928 (2000).\n[11] J. C. Ling and W. A. Wheaton, Chinese J. Astron. Astrophys. Suppl. 5 , 80 (2005).\n[12] G. L. Case et al., Chinese J. Astron. Astrophys. Suppl. 5 , 341 (2005).\n[13] L. Bouchet et al., Ap. J. 693 , 1871 (2009).\n[14] M. C. Bell et al., Ap. J. 659 , 549 (2007).\n[15] G. L. Case et al. (2010), to be submitted.\n[16] C. Wilson-Hodge et al., Astron. Telegram 2280 (2009).", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0955.pdf" + }, + { + "text": "Appendix C: Thermal averaged annihilation cross section\n[2] R. N. Mohapatra and R. E. Marshak, Phys. Rev. Lett. 44 , 1316 (1980) [Erratum-ibid. 44 , 1643 (1980)]; R. E. Marshak and R. N. Mohapatra, Phys. Lett. B 91 , 222 (1980).\n[3] S. Khalil, J. Phys. G 35 , 055001 (2008).\n[4] S. Iso, N. Okada and Y. Orikasa, Phys. Lett. B 676 , 81 (2009); Phys. Rev. D 80 , 115007 (2009).\n[5] W. Emam and S. Khalil, Eur. Phys. J. C 522 , 625 (2007).\n[6] K. Huitu, S. Khalil, H. Okada and S. K. Rai, Phys. Rev. Lett. 101 , 181802 (2008).\n[7] L. Basso, A. Belyaev, S. Moretti and C. H. Shepherd-Themistocleous, Phys. Rev. D 80 , 055030 (2009).\n[8] P. F. Perez, T. Han and T. Li, Phys. Rev. D 80 , 073015 (2009).\n[9] S. Khalil and O. Seto, JCAP 0810 , 024 (2008).\n[10] M. S. Carena, A. Daleo, B. A. Dobrescu and T. M. P. Tait, Phys. Rev. D 70 , 093009 (2004).\n[11] G. Cacciapaglia, C. Csaki, G. Marandella and A. Strumia, Phys. Rev. D 74 , 033011 (2006).\n[12] S. Dawson and W. Yan, Phys. Rev. D 79 , 095002 (2009).\n[13] L. Basso, A. Belyaev, S. Moretti and G. M. Pruna, arXiv:1002.1939 [hep-ph].", + "page_start": 12, + "page_end": 12, + "source_file": "1002.2525.pdf" + }, + { + "text": "Acknowledgements\n11 G. Deutscher, A. F. Santander-Syro and N. Bontemps, Phys. Rev. B 72 , 092504 (2005).\n12 F. Carbone, A. B. Kuzmenko, H. J. A. Molegraaf, E. van Heumen, V. Lukovac, F. Marsiglio, D. van der Marel, K. Haule, G. Kotliar, H. Berger, S. Courjault, P. H. Kes and M. Li, Phys. Rev. B 74 , 064510 (2006).\n13 C. C. Homes, S. V. Dordevic, D. A. Bonn, R. Liang and W. N. Hardy, Phys. Rev. B 69 , 024514 (2004).\n14 J. Hwang et al , Phys. Rev. B 73 , 014508 (2006).\n15 E. van Heumen, R. Lortz, A. B. Kuzmenko, F. Carbone, D. van der Marel, X. Zhao, G. Yu, Y. Cho, N. Barisic, M. Greven, C. C. Homes and S. V. Dordevic, Phys. Rev. B 75 , 054522 (2007).\n16 M. Ortolani, P. Calvani and S. Lupi, Phys. Rev. Lett. 94 , 067002 (2005).\n17 A.F. Santander-Syro, R.P.S.M. Lobo, and N. Bontemps, Phys. Rev. B 70 , 134504(2004), A. F. Santander-Syro, R. P. S. M. Lobo, N. Bontemps, Z. Konstantinovic, Z. Z. Li and H. Raffy, Europhys. Lett. 62 , 568 (2003).\n18 P. F. Maldague, Phys. Rev. B 16 2437 (1977); E. H. Kim, Phys. Rev. B 58 2452 (1998).\n19 J. Hirsch, Physica C, 201 , 347 (1992) and Ref 4.", + "page_start": 14, + "page_end": 14, + "source_file": "1001.0764.pdf" + }, + { + "text": "References\n[25] W. Benbow 2009, arXiv:0908.1412\n[26] V.A. Acciari et al. 2009, ApJ , submitted\n[27] V.A. Acciari et al. 2009, ApJ , 695 , 1370\n[28] V.A. Acciari et al. 2009, ApJ , in press\n[29] J. Grube 2009, arXiv:0907.4862", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0770.pdf" + } + ] + }, + { + "references": { + "source_file": "1002.2525.pdf", + "query": "What happend to the annihilation and the relic density when the DM is heavier ?", + "target_page": 6, + "target_passage": "When the DM is heavier, the annihilation mode into Higgs boson pairs is opened and the relic density slightly deceases", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "A. Thermal relic density\nFig. 1 shows the relic density Ω N h 2 as a function of the DM mass m N for a set of parameters: ( v ' , M h , M H , M Z ' , sin θ ) = (4000 GeV , 120 GeV , 200 GeV , 1000 GeV , 0 . 7), for example. Willkinson Microwave Anisotropy Probe measured the value of DM abundance as Ω DM h 2 /similarequal 0 . 1 [15]. The figure shows that a desired DM relic abundance can be obtained for only near Higgs resonances, m N ≈ M h / 2 or M H / 2.\nFig. 2 shows the relic density Ω N h 2 as a function of the DM mass m N for a smaller Higgs mixing sin θ = 0 . 3 (others are the same as in Fig. 1). Compared with Fig. 1, for m N /lessorsimilar M W where the DM particles dominantly annihilate into f ¯ f , the relic density further increases because of the small mixing angle. When the DM is heavier, the annihilation mode into Higgs boson pairs is opened and the relic density slightly deceases, but the reduction is not enough to reach Ω N h 2 /similarequal 0 . 1.\nFIG. 1: The thermal relic density of RH neutrino DM as a function of its mass for a parameter set: ( v ' , M h , M H , M Z ' , sin θ ) = (3000 GeV , 120 GeV , 200 GeV , 1000 GeV , 0 . 7).\nOur model is quite analogous to the so-called gauge singlet scalar dark matter [16-18]. Some recent studies can be found in Refs. [19, 20]. In the gauge singlet scalar DM model, the thermal abundance is mainly controlled by the interactions between the SM Higgs boson and the DM particle. In our model, B -L Higgs VEV v ' can play the same role for m N < M W , namely a larger v ' corresponds to weaker coupling between DM and Higgs for a fixed DM mass. On the other hand, for m N > M W the difference appears. Even if the annihilation\n6\nFIG. 2: The same as Fig. 1 but for sin θ = 0 . 3.", + "page_start": 5, + "page_end": 6, + "source_file": "1002.2525.pdf" + }, + { + "text": "A. Thermal relic density\nmode into W -boson pair becomes kinematically available, it is not possible to obtain the desired DM abundance without the Higgs resonant annihilation because the bound on v ' given by Eq. (12) is stringent.", + "page_start": 6, + "page_end": 6, + "source_file": "1002.2525.pdf" + }, + { + "text": "A. Thermal relic density\nThe DM RH neutrino interacts with the SM particles through couplings with B -L gauge and B -L Higgs bosons. Note that neutrino Dirac Yukawa interactions are absent because of the Z 2 parity. The most of annihilation of the RH neutrinos occurs via Z ' , H and h exchange processes in the s -channel. In practice, the dominant contributions come from the Higgs ( h and H ) exchange diagrams, because the Z ' exchange processes are suppressed by the inverse square of the B -L Higgs VEV v ' /greaterorsimilar 3 TeV. Thus, we obtain Higgs portal DM of RH neutrino effectively. The relevant annihilation modes are the annihilation into f ¯ f , W + W -, ZZ , and h ( H ) h ( H ). Since RH neutrino DM couples to only B -L Higgs Ψ while a SM particle does to SM Higgs Φ, the DM annihilation occurs only through the mixing between these two Higgs bosons. Although it is not so severe, the precision electroweak measurements [12] as well as the unitarity bound [13] give constraints on the mixing angle and mass spectrum of the Higgs bosons.\nThe thermal relic abundance of DM\nΩ N h 2 = 1 . 1 × 10 9 m N /T d √ g ∗ M P 〈 σv 〉 GeV -1 , (14)\nwith the Planck mass M P , the thermal averaged product of the annihilation cross section and the relative velocity 〈 σv 〉 , the total number of relativistic degrees of freedom in the thermal bath g ∗ , and the decoupling temperature T d , is evaluated by solving the Boltzmann equation for the number density of RH neutrino n N ;\ndn N dt +3 Hn N = -〈 σv 〉 ( n 2 N -n 2 EQ ) , (15)\nand the Friedmann equation\nH 2 ≡ ( ˙ a a ) 2 = 8 π 3 M 2 P ρ, (16)\nwith n EQ and a ( t ) being the equilibrium number density and the scale factor, under the radiation dominated Universe with the energy density ρ = ρ rad [14].\n5", + "page_start": 4, + "page_end": 4, + "source_file": "1002.2525.pdf" + }, + { + "text": "B. Direct detection of dark matter\nOur RH neutrino DM can elastically scatter off with nucleon, unlike another RH neutrino DM model has been proposed by Krauss et. al. [21] and studied [22, 23]. The main process is Higgs exchange and the resultant cross section for a proton is given by\nσ ( p ) SI = 4 π ( m p m N m p + m N ) 2 f 2 p , (17)\nwith the hadronic matrix element\nf p m p = ∑ q = u,d,s f ( p ) Tq α q m q + 2 27 f ( p ) TG ∑ c,b,t α q m q , (18)\nand the effective vertex (see Appendix for notations)\nα q = -λ N y q ( ∂ Φ ∂h 1 M 2 h ∂ Ψ ∂h + ∂ Φ ∂H 1 M 2 H ∂ Ψ ∂H ) , (19)\nwhere m q is a mass of a quark with a Yukawa coupling y q , and f ( p ) Tq and f ( p ) TG are constants.\n7\nFrom Eq. (19), one can see that σ ( p ) SI ∝ (sin 2 θ/v ' ) 2 for a given DM mass m N . Fig. 3 shows the spin-independent cross section of RH neutrino with a proton. The resultant cross section is found to be far below the current limits reported by XENON10 [24] and CDMSII [25]: σ SI /lessorsimilar 4 × 10 -8 -2 × 10 -7 pb, for a DM mass of 100 GeV-1 TeV. Future experiments such as XENON1T [26] can reach the cross section predicted in our model.\nFIG. 3: The spin independent scattering cross section with a proton. All parameters are same as those used in the previous section. The upper and lower lines correspond to sin θ = 0 . 7 and 0 . 3, respectively.", + "page_start": 6, + "page_end": 7, + "source_file": "1002.2525.pdf" + }, + { + "text": "IV. SUMMARY\nWe have proposed a scenario of the RH neutrino dark matter in the context of the minimal gauged U (1) B -L model. We have introduced a discrete Z 2 parity in the model, so that one RH neutrino assigned as Z 2 -odd can be stable and, hence, the DM candidate, while the other two RH neutrinos account for neutrino masses and mixings through the seesaw mechanism. No additional degrees of freedom are necessary to be added. We have evaluated the relic density of the dark matter particle. The dominant annihilation modes are via the Higgs boson exchange processes in the s -channel and thus, our model can be called Higgs portal DM model. It has been found that the relic density consistent with the current observation\n8\ncan be achieved only when the annihilation processes are enhanced by Higgs resonances. Therefore, the mass of the RH neutrino DM should be around a half of Higgs boson masses. We have also calculated the elastic scattering cross section between the DM particle and a proton and found it within the reach of future experiments for the direct DM search.", + "page_start": 7, + "page_end": 8, + "source_file": "1002.2525.pdf" + }, + { + "text": "Appendix C: Thermal averaged annihilation cross section\nIn partial wave expansion, the thermal averaged cross section is given by\n〈 σv 〉 = 1 m 2 N [ w ( s ) -3 2 ( 2 w ( s ) -4 m 2 N dw ds ) T m N ]∣ s =4 m 2\n= 6 dw ds s =4 m 2 T m N ,\n∣ ∣ ∣ N (C1) ∣ ∣ ∣ �� N (C2)\n4 w ( s ) ≡ ∫ d LIPS ∑ |M| 2 = 1 8 π √ s -4 m 2 final s ∫ d cos θ 2 ∑ |M| 2 , (C3)\nwhere m final is the mass of final state particle.\n[1] T. Yanagida, in Proceedings of Workshop on the Unified Theory and the Baryon Number in the Universe , Tsukuba, Japan, edited by A. Sawada and A. Sugamoto (KEK, Tsukuba, 1979), p 95; M. Gell-Mann, P. Ramond, and R. Slansky, in Supergravity , Proceedings of Workshop,\n12\nStony Brook, New York, 1979, edited by P. Van Nieuwenhuizen and D. Z. Freedman (NorthHolland, Amsterdam, 1979), p 315; R. N. Mohapatra and G. Senjanovic, Phys. Rev. Lett. 44 , 912 (1980).", + "page_start": 11, + "page_end": 12, + "source_file": "1002.2525.pdf" + }, + { + "text": "Appendix C: Thermal averaged annihilation cross section\n[14] E. W. Kolb and M. S. Turner, The Early Universe , Addison-Wesley (1990).\n[15] D. N. Spergel et al. [WMAP Collaboration], Astrophys. J. Suppl. 170 , 377 (2007).\n[16] J. McDonald, Phys. Rev. D 50 , 3637 (1994).\n[17] C. P. Burgess, M. Pospelov and T. ter Veldhuis, Nucl. Phys. B 619 , 709 (2001).\n[18] H. Davoudiasl, R. Kitano, T. Li and H. Murayama, Phys. Lett. B 609 , 117 (2005).\n[19] T. Kikuchi and N. Okada, Phys. Lett. B 665 , 186 (2008).\n[20] C. E. Yaguna, JCAP 0903 , 003 (2009).\n[21] L. M. Krauss, S. Nasri and M. Trodden, Phys. Rev. D 67 , 085002 (2003).\n[22] E. A. Baltz and L. Bergstrom, Phys. Rev. D 67 , 043516 (2003).\n[23] K. Cheung and O. Seto, Phys. Rev. D 69 , 113009 (2004).\n[24] J. Angle et al. [XENON Collaboration], Phys. Rev. Lett. 100 021303 (2008).\n[25] Z. Ahmed et al. [The CDMS-II Collaboration], arXiv:0912.3592 [astro-ph.CO].\n[26] http://xenon.astro.columbia.edu/.\n13", + "page_start": 12, + "page_end": 12, + "source_file": "1002.2525.pdf" + }, + { + "text": "3. Annihilation into W + W -\n|M| 2 = 8 λ 2 N ( 1 2 g 2 v ) 2 ∣ ∣ ∣ ∣ ∂ Ψ ∂h 1 s -M 2 h + iM h Γ h ∂φ ∂h + ∂ Ψ ∂H 1 s -M 2 H + iM H Γ H ∂φ ∂H ∣ ∣ ∣ ∣ 2 ( s -4 m 2 N ) ( 1 + 1 2 M 4 W ( s 2 -M 2 W ) 2 ) . (B4)", + "page_start": 10, + "page_end": 10, + "source_file": "1002.2525.pdf" + }, + { + "text": "4. Annihilation into ZZ\n|M| 2 = 8 λ 2 N ( 1 4 ( g 2 + g ' 2 ) v ) 2 ∣ ∣ ∣ ∣ ∂ Ψ ∂h 1 s -M 2 h + iM h Γ h ∂φ ∂h + ∂ Ψ ∂H 1 s -M 2 H + iM H Γ H ∂φ ∂H ∣ ∣ ∣ ∣ 2 ( s -4 m 2 N ) ( 1 + 1 2 M 4 Z ( s 2 -M 2 Z ) 2 ) . (B5)", + "page_start": 10, + "page_end": 10, + "source_file": "1002.2525.pdf" + }, + { + "text": "1. Annihilation into charged fermions\n|M| 2 = 32 ∣ ∣ ∣ ∣ g 2 B -L q f q N s -M 2 Z ' + iM Z ' Γ Z ' ∣ ∣ ∣ ∣ 2 ( s -4 m 2 N ) ( 3 8 s -1 2 ( s 2 -m 2 f ) + 1 2 ( s 4 -m 2 f ) cos 2 θ ) +16 λ 2 N ∣ ∣ ∣ ∣ y f ( ∂ Φ ∂h i s -M 2 h + iM h Γ h ∂ Ψ ∂h + ∂ Φ ∂H i s -M 2 H + iM H Γ H ∂ Ψ ∂H )∣ ∣ ∣ ∣ 2 ( s -4 m 2 N ) ( s 4 -m 2 f ) . (B1)", + "page_start": 9, + "page_end": 9, + "source_file": "1002.2525.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv1.pdf", + "query": "What is the aim of LLM routers ?", + "target_page": 1, + "target_passage": "LLM routers aim to balance quality and cost of generation by classifying queries and routing them to a cheaper or more expensive LLM depending on their complexity. ", + "chunk_present": { + "presence": true, + "index": 6 + } + }, + "top_chunk": [ + { + "text": "2 LLMControl Planes and Routing\nThe LLM routers described thus far do not modify the queries or individual LLM responses. Other types of control planes do. Ensemble approaches such as mixture-of-expert (MoE) [29, 30, 52, 56] architectures select a subset of underlying models to apply to each token of a query and merge their responses. LLM synthesis [40] architectures operate similarly, but route the entire query to a subset of underlying LLMs and merge their responses. These approaches reduce inference costs by using fewer and/or less complex underlying models.\nApplications of LLM routers. A key use case for LLM routers is to help LLM-based application reduce cost. Several commercial routers, including Unify [12], Martian [5], NotDiamond [7], and others, offer this as a service. By replacing a few lines of code, the application can send user queries to a router service, rather than directly to some LLM provider. The service selects the optimal LLM and forwards the queries. Commercial router services claim that this results in significant cost savings: up to 98% in the case of Martian [5], and 10 × in the case of NotDiamond [7].", + "page_start": 2, + "page_end": 2, + "source_file": "arxiv1.pdf" + }, + { + "text": "10 Conclusion\nLLM routers balance quality and cost of LLM inference by routing different queries to different LLMs. They are an example of a broader, emerging class of systems we call 'LLM control planes' that aim to achieve various quality, efficiency, and cost objectives by orchestrating use of multiple LLMs to respond to a query.\n17\nWe introduced and defined a new safety property, LLM control plane integrity . Informally, this property holds if an adversarial user cannot influence routing decisions made by the control plane. To show that existing LLM routers do not satisfy this property, we designed, implemented, and evaluated a black-box optimization method for generating queryindependent 'confounder gadgets.' When added to any query, the confounder gadget confuses the router into routing the query to the adversary-chosen LLM.\nWe evaluated the efficacy of confounder gadgets on multiple open-source and commercial routers and demonstrated that they successfully reroute queries without a negative impact on the quality of responses. We also discussed defenses against these attacks and indicated directions for future research.", + "page_start": 16, + "page_end": 17, + "source_file": "arxiv1.pdf" + }, + { + "text": "6 Rerouting Open-Source Routers\nLLM pair 1, R MF = LLM pair 1. LLM pair 1, ˆ R SW R CLS = LLM pair 1. LLM pair 1, R LLM = LLM pair 1. LLM pair 1, R SW = LLM pair 1. LLM pair 1, ˆ R MF R CLS = LLM pair 1. LLM pair 1, R LLM = LLM pair 1. LLM pair 1, R SW = LLM pair 1. LLM pair 1, ˆ R CLS S FM = LLM pair 1. LLM pair 1, R LLM = LLM pair 1. LLM pair 1, R SW = LLM pair 1. LLM pair 1, ˆ R LLM R MF = LLM pair 1. LLM pair 1, R CLS = LLM pair 1. MT-Bench, R MF = - 0 . 1. MT-Bench, ˆ R SW R CLS = - 0 . 1. MT-Bench, R LLM = 0 . 0. MT-Bench, R SW = - 0 . 1. MT-Bench, ˆ R MF R CLS = - 0 . 1. MT-Bench, R LLM = 0 . 0. MT-Bench, R SW = - 0 . 1. MT-Bench, ˆ R CLS S FM = 0 . 0. MT-Bench, R LLM = 0 . 1. MT-Bench, R SW = - 0 . 2. MT-Bench, ˆ R LLM R MF = - 0 . 1. MT-Bench, R CLS = - 0 . 2. MMLU, R MF = - 0 . 1. MMLU, ˆ R SW R CLS = 0 . 3. MMLU, R LLM = - 0 . 2. MMLU, R SW = 4 . 8. MMLU, ˆ R MF R CLS = 1 . 0. MMLU, R LLM = 0 . 5. MMLU, R SW = 2 . 5. MMLU, ˆ R CLS S FM = - 1 . 3. MMLU, R LLM = - 0 . 8. MMLU, R SW = 2 . 6. MMLU, ˆ R LLM R MF = - 0 . 9. MMLU, R CLS = 0 . 3. GSM8K, R MF = 14 . 9.", + "page_start": 11, + "page_end": 11, + "source_file": "arxiv1.pdf" + }, + { + "text": "5 Open-Source Routers: Experimental Setup\nTo evaluate efficacy of confounder gadgets generated using the method from Section 4, we perform experiments with several LLM routers. This section explains our experimental setup for the open-source routers proposed in the research literature [47]; results of this evaluation appear in Section 6. In Section 7, we discuss experiments with proprietary, commercial routers. Figure 3 shows the summary of our experimental setup.\n6\nFigure 3: Summary of our setup for routers, underlying LLMs, and benchmark datasets used in the experiments.", + "page_start": 5, + "page_end": 6, + "source_file": "arxiv1.pdf" + }, + { + "text": "7 Rerouting Commercial Routers\nTable 10: Benchmark-specific average scores of responses to the original and confounded queries with GPT-4-1106preview as the strong model (LLM pair 4), in the white-box setting. Results demonstrate a higher increase in performance with respect to the LLM pair 1 setting, due to the larger performance gap between the models.", + "page_start": 13, + "page_end": 13, + "source_file": "arxiv1.pdf" + }, + { + "text": "5 Open-Source Routers: Experimental Setup\nFigure 3: Summary of our setup for routers, underlying LLMs, and benchmark datasets used in the experiments.\nSimilarity-weighted ranking Matrix factorization BERT classifier LLM scoring, = Similarity-weighted ranking Matrix factorization BERT classifier LLM scoring. Similarity-weighted ranking Matrix factorization BERT classifier LLM scoring, Notation R SW R = MF R CLS R LLM. LLMpair, = Strong ( M s ). LLMpair, Notation R SW R = Weak ( M w ). 1, = Llama-3.1-8B. 1, Notation R SW R = 4-bit Mixtral 8x7B. 2 3, = Llama-3.1-8B Llama-3.1-8B. 2 3, Notation R SW R = Mistral-7B-Instruct-v0.3 Llama-2-7B-chat-hf. 4, = GPT-4-1106-preview. 4, Notation R SW R = 4-bit Mixtral 8x7B. Benchmark Description MT-Bench [71] 160 open-ended questions 14,042 multi-choice questions, = Benchmark Description MT-Bench [71] 160 open-ended questions 14,042 multi-choice questions. Benchmark Description MT-Bench [71] 160 open-ended questions 14,042 multi-choice questions, Notation R SW R = Benchmark Description MT-Bench [71] 160 open-ended questions 14,042 multi-choice questions. MMLU[35], = MMLU[35]. MMLU[35], Notation R SW R = MMLU[35]. GSM8K [24] 1,319 grade-school math problems, = GSM8K [24] 1,319 grade-school math problems. GSM8K [24] 1,319 grade-school math problems, Notation R SW R = GSM8K [24] 1,319 grade-school math problems", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv1.pdf" + }, + { + "text": "ABSTRACT\nLLM routers aim to balance quality and cost of generation by classifying queries and routing them to a cheaper or more expensive LLM depending on their complexity. Routers represent one type of what we call LLM control planes: systems that orchestrate use of one or more LLMs. In this paper, we investigate routers' adversarial robustness.\nWe first define LLM control plane integrity, i.e., robustness of LLM orchestration to adversarial inputs, as a distinct problem in AI safety. Next, we demonstrate that an adversary can generate queryindependent token sequences we call 'confounder gadgets' that, when added to any query, cause LLM routers to send the query to a strong LLM.\nOur quantitative evaluation shows that this attack is successful both in white-box and black-box settings against a variety of open-source and commercial routers, and that confounding queries do not affect the quality of LLM responses. Finally, we demonstrate that gadgets can be effective while maintaining low perplexity, thus perplexity-based filtering is not an effective defense. We finish by investigating alternative defenses.", + "page_start": 0, + "page_end": 0, + "source_file": "arxiv1.pdf" + }, + { + "text": "3 LLMControl Plane Integrity\nIn the other direction, undermining LLM control plane integrity could be a stepping stone toward evasion attacks. For example, if R M ω is used to classify malicious content by combining LLMs each tuned to different types of harm categories, then modifying inputs to force inference flows away from appropriate models could aid evasion. We leave evaluation of how control-plane integrity attacks can enable evasion to future work.\nThreat models. Within the context of control plane integrity attacks against LLM routers, we identify several threat models that differ in terms of the adversary's goals and their knowledge about the target control plane R M ω .\nIn terms of goals, an adversary may seek to inflate the costs of a victim application that utilizes an LLM control plane. As a kind of denial-of-service attack, such cost inflation would penalize the application developer who expects routing to control costs. Another adversarial goal could be arbitrage : consider an application that charges X dollars per query, whereas directly using M s costs Y > X . The application's lower rate X makes economic sense assuming it uses a router to route the bulk of queries to a cheaper model M w . An input adaptation attack in this setting can gain (indirect) access to M s , obtaining an arbitrage advantage of Y -X per query. To be effective, this arbitrage adversary would want to ensure that adaptations do not lower response quality (i.e., it extracts all the value out of rerouting to M s ). As before, the victim in this case is the application that relies on routing to lower its costs (unsuccessfully, under this attack).\nWe now discuss adversarial capabilities. We assume that our victim application's prompt includes a substring that can be controlled by the adversary. This represents many real-world apps such as chatbots, coding assistants, writing assistants, and others, that insert user inputs into an LLM prompt. In crafting adversarial portions of prompts, an adversary may have various levels of knowledge about the victim application's router. We consider the following knowledge settings:", + "page_start": 3, + "page_end": 3, + "source_file": "arxiv1.pdf" + }, + { + "text": "5 Open-Source Routers: Experimental Setup\nBERT classifier: The third method involves fine-tuning a classifier, based on the BERT-base architecture [26], to predict which of the two models produces a better response for the given query or whether they do equally well (a tie). The routing decision is based on the probability of the weak model providing a better response versus the strong model or the tie. We denote this method as R CLS .\nLLM classifier: The last method is based on asking an LLM to provide a score in the range 1 -5 of how an AI expert would struggle to respond to a given query based on the query's complexity. For this, Ong et al. fine-tuned a Llama-3-8B model [4] using their reference set of queries and corresponding scores. We denote this method as R LLM .\nUnderlying LLMs. In [47], Ong et al. trained the routers with GPT-4-1106-preview [14] as the strong model and Mixtral 8x7B [39] as the weak model. They report successful generalization between the underlying LLMs, stating that their routers trained for a particular strong-weak LLM pair can be used with other strong-weak LLM pairs.\nTo allow our evaluation to scale, we use as the strong model M s the open-sourced Llama-3.1-8B [3] and as M w the 4-bit quantized version of Mixtral 8x7B (for efficiency reasons). This reduced the cost of our experiments by avoiding expensive GPT API calls and lowering the computational costs of Mixtral. Unless mentioned otherwise, all of our results\n7\nwill be evaluated with respect to this pair, which we refer to as LLM pair 1. We performed more limited experiments with the original strong, weak model pair (LLM pair 4) and had similar success in rerouting.", + "page_start": 6, + "page_end": 7, + "source_file": "arxiv1.pdf" + }, + { + "text": "1 Introduction\nRouting attacks can be deployed for various adversarial objectives, e.g., to ensure that the adversary always obtains the highest-quality answer regardless of the target applications's internal routing policies and cost constraints, or to maliciously inflate the target's LLM costs. As LLM control planes grow in importance and sophistication, we hope that this work will motivate further research on their adversarial robustness.", + "page_start": 1, + "page_end": 1, + "source_file": "arxiv1.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv1.pdf", + "query": "What is an LLM control plane ?", + "target_page": 3, + "target_passage": " An LLM control plane Rω is a potentially randomized algorithm.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "3 LLMControl Plane Integrity\nIn this section, we define LLM control plane integrity . Informally, it means that decisions made about underlying LLM queries made by the control plane algorithms cannot be subverted by adversarial queries. Looking ahead, we will focus on one class of control plane: predictive LLM routing as used to manage cost.\nFormalizing control planes. An LLM control plane R ω is a potentially randomized algorithm. It is parameterized by a string ω , called the parameters. It utilizes some number n of LLMs denoted by M . We will mostly focus on the case of n = 2 , and, for reasons that will be clear in a moment, use M s ('strong') and M w ('weak') to denote the two underlying LLMs. Then inference on an input x ∈ X for some set X of allowed queries is performed by computing a response via y ← $ R M ω ( x ) . Here we use ← $ to denote running R with fresh random coins; we use ← when R is deterministic. We focus on inference for a single query, but it is straightforward to extend our abstraction for control planes to include sessions: the controller would maintain state across invocations, potentially adapting its behavior as a function of a sequence of queries and responses.\nLLM control planes should, in general, be relatively computationally lightweight, at least compared to the underlying LLMs. This is particularly so in the cost-motivated usage of control planes, as a computationally or financially expensive control plane would eat into cost savings incurred by utilizing cheaper underlying LLMs for some queries. For example, predictive binary routers use relatively simple classifiers to determine which of M s or M w should be used to respond to a query.\nInference flow. Given a set of LLMs M , a control plane R ω , and an input x , an LLM inference flow is the sequence of LLM invocations M i j ( z j ) for 1 ≤ j ≤ m and i j ∈ { w , s } made when executing R M ω ( x ) . Here m is the total number of LLM invocations, and z 1 , . . . , z m are the queries made to the underlying LLMs. Should R be randomized, the sequence and its length are random variables. An inference flow can be written as a transcript", + "page_start": 2, + "page_end": 2, + "source_file": "arxiv1.pdf" + }, + { + "text": "3 LLMControl Plane Integrity\nIn the other direction, undermining LLM control plane integrity could be a stepping stone toward evasion attacks. For example, if R M ω is used to classify malicious content by combining LLMs each tuned to different types of harm categories, then modifying inputs to force inference flows away from appropriate models could aid evasion. We leave evaluation of how control-plane integrity attacks can enable evasion to future work.\nThreat models. Within the context of control plane integrity attacks against LLM routers, we identify several threat models that differ in terms of the adversary's goals and their knowledge about the target control plane R M ω .\nIn terms of goals, an adversary may seek to inflate the costs of a victim application that utilizes an LLM control plane. As a kind of denial-of-service attack, such cost inflation would penalize the application developer who expects routing to control costs. Another adversarial goal could be arbitrage : consider an application that charges X dollars per query, whereas directly using M s costs Y > X . The application's lower rate X makes economic sense assuming it uses a router to route the bulk of queries to a cheaper model M w . An input adaptation attack in this setting can gain (indirect) access to M s , obtaining an arbitrage advantage of Y -X per query. To be effective, this arbitrage adversary would want to ensure that adaptations do not lower response quality (i.e., it extracts all the value out of rerouting to M s ). As before, the victim in this case is the application that relies on routing to lower its costs (unsuccessfully, under this attack).\nWe now discuss adversarial capabilities. We assume that our victim application's prompt includes a substring that can be controlled by the adversary. This represents many real-world apps such as chatbots, coding assistants, writing assistants, and others, that insert user inputs into an LLM prompt. In crafting adversarial portions of prompts, an adversary may have various levels of knowledge about the victim application's router. We consider the following knowledge settings:", + "page_start": 3, + "page_end": 3, + "source_file": "arxiv1.pdf" + }, + { + "text": "10 Conclusion\nLLM routers balance quality and cost of LLM inference by routing different queries to different LLMs. They are an example of a broader, emerging class of systems we call 'LLM control planes' that aim to achieve various quality, efficiency, and cost objectives by orchestrating use of multiple LLMs to respond to a query.\n17\nWe introduced and defined a new safety property, LLM control plane integrity . Informally, this property holds if an adversarial user cannot influence routing decisions made by the control plane. To show that existing LLM routers do not satisfy this property, we designed, implemented, and evaluated a black-box optimization method for generating queryindependent 'confounder gadgets.' When added to any query, the confounder gadget confuses the router into routing the query to the adversary-chosen LLM.\nWe evaluated the efficacy of confounder gadgets on multiple open-source and commercial routers and demonstrated that they successfully reroute queries without a negative impact on the quality of responses. We also discussed defenses against these attacks and indicated directions for future research.", + "page_start": 16, + "page_end": 17, + "source_file": "arxiv1.pdf" + }, + { + "text": "3 LLMControl Plane Integrity\nIn an unconstrained LLM control plane integrity attack, the adversary A seeks to generate inputs ⃗x = ⃗x 1 , . . . , ⃗x q such that running R M ω ( ⃗x ) generates a transcript for which P (( x 1 , i 1 ) , . . . , ( x q , i q )) = 0 . This attack could be launched by an adversary who wants to maximize inference costs for a victim application using an LLM router.\nA harder setting requires input adaptation, where the adversary is given inputs x 1 , . . . , x q and it must find new inputs ˆ x 1 , . . . , ˆ x q for which the transcript resulting from P ((ˆ x 1 , i 1 ) , . . . , (ˆ x q , i q )) = 0 . There will be some competing constraint, such as that x j and ˆ x j are very similar for each j , or that the outputs y j ← $ R M ω ( x j ) and ˆ y j ← $ R M ω (ˆ x j ) are close. In the routing context, the adversary's goal is to increase the fraction of queries that get routed to the strong model, in order to improve the overall quality of responses, drive up the victim application's inference costs, or both.\n̸\nRelationship to evasion attacks. Evasion attacks [25, 43, 60] against an inference system (also called adversarial examples [32, 48, 49]) would, in our setting, seek to find a small modification ∆ to an input x such that R M ω ( x +∆) = R M ω ( x ) where addition is appropriately defined based on input type (e.g., slight changes to text).\nOur attack setting is not the same. The control plane integrity adversary seeks to maliciously control the inference flow , not necessarily the output of inference. In an unconstrained attack, the adversary does not care what outputs are generated. In the input adaptation attack, the adversary seeks to craft inputs that modify the inference flow yet do not change the responses of the strong underlying LLM to the extent possible. Looking ahead, we will use evasion techniques in our adaptation attacks against learned control plane routers, but, importantly, not the overall inference.", + "page_start": 3, + "page_end": 3, + "source_file": "arxiv1.pdf" + }, + { + "text": "2 LLMControl Planes and Routing\nThe LLM routers described thus far do not modify the queries or individual LLM responses. Other types of control planes do. Ensemble approaches such as mixture-of-expert (MoE) [29, 30, 52, 56] architectures select a subset of underlying models to apply to each token of a query and merge their responses. LLM synthesis [40] architectures operate similarly, but route the entire query to a subset of underlying LLMs and merge their responses. These approaches reduce inference costs by using fewer and/or less complex underlying models.\nApplications of LLM routers. A key use case for LLM routers is to help LLM-based application reduce cost. Several commercial routers, including Unify [12], Martian [5], NotDiamond [7], and others, offer this as a service. By replacing a few lines of code, the application can send user queries to a router service, rather than directly to some LLM provider. The service selects the optimal LLM and forwards the queries. Commercial router services claim that this results in significant cost savings: up to 98% in the case of Martian [5], and 10 × in the case of NotDiamond [7].", + "page_start": 2, + "page_end": 2, + "source_file": "arxiv1.pdf" + }, + { + "text": "3 LLMControl Plane Integrity\nT = ( i 1 , z 1 ) , ( i 2 , z 2 ) , . . . , ( i m , z m )\nof pairs of model indexes i j ∈ { w , s } and model inputs z j . Note that for simplicity we ignore the potential for parallelization, assuming execution proceeds serially. For binary routers, we have m = 1 and T ∈ { ( w , x ) , ( s , x ) } . We write submitting a sequence of inferences ⃗x = ⃗x 1 , . . . , ⃗x q to a control plane as\nR M ω ( ⃗x ) = ( R M ω ( ⃗x 1 ) , . . . , R M ω ( ⃗x q ))\nwhere note that each invocation could result in multiple underlying LLM invocations. In the binary router case, however, each invocation results in a single LLM invocation.\nAn inference flow policy dictates the control plane designer's intention regarding use of the underlying models. For example, an application may want to ensure that only a small fraction of queries go to the expensive model M s . We can define this as a predicate over a sequence of transcripts. In our binary router example, the policy can be more simply defined as a predicate P over (input, model) pairs ( ⃗x 1 , i 1 ) , . . . , ( ⃗x q , i q ) since this fully defines the sequence of transcripts. For example, a policy might specify that the strong model is used in at most an ϵ fraction of inferences:\nP (( ⃗x 1 , i 1 ) , . . . , ( ⃗x q , i q )) =   q ∑ j =1 I ( i j ) q ≤ ϵ  \n3\nwhere I ( i j ) = 1 if i j = s and I ( i j ) = 0 if i j = w . In other words, the predicate is that the fraction of queries routed to the strong model is bounded by ϵ .\nControl plane integrity. A control plane integrity adversary is a randomized algorithm A that seeks to maliciously guide inference flow.", + "page_start": 2, + "page_end": 3, + "source_file": "arxiv1.pdf" + }, + { + "text": "4 Confounding Control Planes with Gadgets\nWe now turn to our main contribution: a methodology for attacking LLM control plane integrity. The key insight is that an adversary can modify queries to mislead or 'confound' the routing logic into routing these queries to an LLM of the adversary's choosing. Furthermore, we will demonstrate that these attacks can be black-box and query-independent , i.e., a single modification works for all queries and does not require advance knowledge of the specific router being attacked.\n4\nFigure 2: Overview of our attack on LLM routing control plane integrity. The attack adds to each query a prefix (represented by the gear), called a 'confounder gadget,' that causes the router to send the query to the strong model.\nWe focus on the binary router setting in which the router applies a learned scoring function to input queries and routes any query whose score exceeds some threshold τ to the strong LLM M s . This setting has been the focus of several prior works [27, 41, 47] and is used in the control planes that are deployed in practice (see Section 7).\nMore formally, we consider a router R M ω for M = { M w , M s } , where ω consists of a scoring function S , scoring function's parameters θ , and a threshold τ ∈ R + . For notational brevity we just write R ω below, with M clear from context. Here S and θ define a scoring function S θ : X → R + . Since our focus is LLMs, we assume that queries X are strings of text tokens. The routing algorithm then works as follows:\nR ω ( x ) = { M w ( x ) if S θ ( x ) < τ M s ( x ) otherwise\nwhere ω = ( S, θ, τ ) . We will detail scoring functions in Section 5; prior work has suggested linear models, light-weight LLMs, and more. Note that, consistent with this application, scoring functions are computationally efficient and cheap (as compared to M s , M w ). Deployments calibrate τ to limit the fraction of queries routed to the strong model M s , giving rise to the type of control plane integrity policy discussed in Section 3.", + "page_start": 3, + "page_end": 4, + "source_file": "arxiv1.pdf" + }, + { + "text": "2 LLMControl Planes and Routing\nInference using large language models (LLMs) is traditionally monolithic: a single model is applied to an input or sequence of inputs. This methodology can be sub-optimal for various reasons. State-of-the-art models are often expensive, with API access to LLMs costing as much as several dollars for each query. Elsewhere, distinct LLMs may excel at different tasks, and selectively using them may improve overall quality on a diverse workload. Finally, combining multiple LLMs, even all trained for similar tasks, may become increasingly prevalent as performance improvements of individual LLMs plateaus [8-10].\nResearchers and practitioners are therefore now developing inference architectures that use multiple LLMs to answer queries. These LLMs are orchestrated by what we call an LLM control plane (borrowing the terminology from networking [13]). The control plane may route queries or parts of queries to different LLMs, derive new strings to query to underlying LLMs, combine answers from underlying LLMs, and more.\nLLM routers. A prominent example of this emerging class of LLM control planes are LLM routers [27, 41, 47, 53, 59]. LLM routers decide which of the two (or, sometimes, more) LLMs to use to answer a query. In prescriptive routing, the router applies some lightweight classifier to the input query that determines which underlying LLM to utilize for a response. The classifier is itself a learned function that scores the complexity of the query. Deployments can then configure a score threshold for when to route a query to the more expensive LLM. This threshold can be tuned using representative workloads to achieve a desired cost-performance trade-off. Figure 1 shows the basic workflow of binary LLM routers.\nNon-prescriptive routing [15, 20, 68] uses the responses from one or more underlying LLMs to determine which response to return to the user. For example, FrugalGPT [20] submits the query to a sequence of models (ordered by price) called a cascade, stopping when it obtains a response classified by the router as sufficient.\n2\nIn contrast to routers motivated by controlling costs, several LLM router designs focus solely on improving quality of responses [31, 45, 57, 58].", + "page_start": 1, + "page_end": 2, + "source_file": "arxiv1.pdf" + }, + { + "text": "1 Introduction\nOur contributions. First, we introduce LLM control plane integrity as a novel problem in AI safety. Recently proposed LLM control-plane algorithms are learned, calibrated classifiers (see Section 2). Their inputs are queries from potentially adversarial users. Robustness of control-plane algorithms to adversarial queries is a new problem, distinct from adversarial robustness of the underlying LLMs.\nFigure 1: LLM routers classify queries and route complex ones to an expensive/strong model, others to a cheaper/weak model. To control costs, LLM routers can be calibrated to maintain (for an expected workload) a specific ratio between queries sent to the strong and weak models.\nTo initiate the study of this problem, we show that existing LLM routing algorithms are not adversarially robust. We design, implement, and evaluate a method that generates query-independent adversarial token sequences we call 'confounder gadgets.' If a gadget is added to any query, this query is routed to the strong model with high probability. Next, we show that this attack is effective even in the transfer setting where the adversary does not have full knowledge of the target LLM router (it is black-box), but has access to another router (e.g., an internally trained surrogate). We also evaluate the integrity of commercial LLM routers, showing that they can be confounded as well.\nThird, we investigate defenses. Our basic method generates gadgets that have anomalously high perplexity. Confounded queries are thus easily distinguished from normal queries and can be filtered out by the routing system. Unfortunately, this defense can be evaded by an adversary who incorporates a low-perplexity objective into the gadget generation algorithm, producing gadgets that have low perplexity-and yet are effective at re-routing queries to the strong model. We also discuss higher-level defenses, such as identifying users whose queries are routed to the strong model with abnormal frequency.", + "page_start": 0, + "page_end": 1, + "source_file": "arxiv1.pdf" + }, + { + "text": "3 LLMControl Plane Integrity\n· White-box setting : The adversary knows the control plane algorithm and its parameters ω .\n· Black-box (transfer) setting : The adversary does not know the control plane algorithm R and ω for the target model, but knows instead another control plane algorithm R ' ω ' and its parameters. We refer to R ' ω ' as the surrogate . For example, this could arise if an adversary trains their own router using available data. In this setting our attacks are also zero-shot in that they do not require any interaction with the target control plane before the query that is being rerouted.", + "page_start": 3, + "page_end": 3, + "source_file": "arxiv1.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv1.pdf", + "query": "What is a confounder gadget ?", + "target_page": 5, + "target_passage": " Given a query xi, we prepend a confounder gadget ci, which is a short sequence of adversarially chosen tokens.", + "chunk_present": { + "presence": true, + "index": 4 + } + }, + "top_chunk": [ + { + "text": "A Gadget Examples\nBelow are a few examples of the optimized confounder gadgets c we got, for the different routing algorithms:\n· R SW :\nlegationbelongs967reglo'hui\n(DictionaryizedNameantal bidi.numberOf\ndemanding RESULTS! XVI-ioibili Written Hormchriftlatable\n• R MF :\n041 personne.nama tomeTN Exact relac¸˜ao tinha seis.Description\nNUMAGEMENTMedian157 mut-camerauacao nije Hir Ter\n• R CLS :\ncontiene DEM USERNAME fourteen chees781 consultants200 inici DOJ\n571:\nOrd:nth Norwegian Mercer docs Abr226 METADATA\n• R LLM :\ndated:frameifyumi345 Kurdasciiuzeiphertext\nMidnightexecution431!784 below1 unwrap : / n / n", + "page_start": 21, + "page_end": 21, + "source_file": "arxiv1.pdf" + }, + { + "text": "4 Confounding Control Planes with Gadgets\n(1) Select a target index j ∈ [1 , n ] uniformly.\n(2) Generate a set B of B + 1 candidates. First set ˜ c 0 = c ( t ) i , the current confounder. To generate B additional candidates, select replacement tokens from I uniformly, forming the set { t b ←I} B b =1 . Replace the j th token in the current confounder ˜ c 0 with t b :\n˜ c b = [ c ( t ) i, 1 , . . . , c ( t ) i,j -1 , t b , c ( t ) i,j +1 , . . . , c ( t ) i,n ] .\n5\nLet B = { ˜ c 0 , . . . , ˜ c B } .\n(3) Find the candidate that maximizes the score:\nc ( t +1) i ← arg max c ∈B S θ ( c ∥ x i ) . (1)\nThe final confounder c ( T ) i is used with query x i . We early abort if, after 25 iterations, there is no update to the confounder gadget. Technically, we could abort early if we find a confounder whose score exceeds τ . Running further can be useful when an adversary does not know τ .\nThe attack's runtime is dominated by T · B times the cost of executing S . In practice, S are designed to be fast (otherwise routers would significantly increase the latency of applications that use them). We report precise timings later; in summary, the attack is fast because we can set T to be relatively small and still find high-scoring confounders.\nDue to the randomness in index and token selection, the method converges to different, yet similarly effective, confounder gadgets on each run. Our evaluation will thus measure average performance over multiple gadgets.", + "page_start": 4, + "page_end": 5, + "source_file": "arxiv1.pdf" + }, + { + "text": "4 Confounding Control Planes with Gadgets\nQuery-independent confounders. One downside of the per-query approach is that the adversary must repeat, for each query, the search for a good confounder. In practice, the adversary might prefer a query-independent attack. Our confounder gadget approach extends to this setting readily: perform the search routine above for an empty query. In other words, just ignore x i in the query-dependent attack above, replacing S θ ( c ∥ x i ) in Eq. 1 with S θ ( c ) . This finds a single query-independent confounder c that can be prefixed to all queries, i.e., ˆ x i = c ∥ x i . We will show that this works surprisingly well.\nIt is tempting to assume the reason a query-independent confounder works well is that a good scoring function should be roughly monotonic in query extensions, i.e., one might expect that S θ ( c ∥ x ) ≥ S θ ( c ) for almost any suffix x . This intuition is not correct. In our experiments, we found that S θ ( c ∥ x ) < S θ ( c ) for many x and some of the routers discussed below. Nevertheless, by ensuring that S θ ( c ) is pretty high (set the number of iterations T higher) the resulting query-independent confounder works well. That is, we at least get that S θ ( c ∥ x ) > S θ ( x ) .\nThe black-box setting: confounders that transfer. Finally, the attacks so far are in the white-box setting, where the attacker can optimize directly against S θ . While in some cases routing control planes will be public knowledge, in others, including the proprietary control planes we explore in Section 7, they are hidden. This gives rise to the black-box setting. While an attacker might seek to perform model extraction attacks [43, 65] to learn θ , we instead explore attacks that transfer from one router to another.", + "page_start": 5, + "page_end": 5, + "source_file": "arxiv1.pdf" + }, + { + "text": "4 Confounding Control Planes with Gadgets\nIn more detail, we assume the adversary has access to a router R ' ω ' , called the surrogate , that is trained on data similar to that used for the target router. Then the attack is the same as above, except that we use the surrogate's scoring function S ' θ ' instead of the target's S θ . Again, we will see that this works surprisingly well: the query-independent confounders found for the surrogate transfer to successfully reroute queries against the target router.\nPutting it all together. In summary, our methodology for input adaptation attacks is:\n(1) (Preprocessing) Develop a single query-independent confounder gadget c , using either the target router or surrogate to score the confounder.\n(2) (Input adaptation) For each query x i , submit ˆ x i = c ∥ x i instead to obtain a response ˆ y i .\nThe confounder is applied to all queries, i.e., the adversary does not need to guess whether the original query would have been routed to the weak or strong model. In the rest of the paper, we demonstrate the confounders rarely result in 'downgrades,' i.e., rerouting of queries from the strong to weak model.\nWe have experimented with variations of this approach that don't work quite as well, for example adding c as a suffix instead of a prefix. See Appendix B for details.", + "page_start": 5, + "page_end": 5, + "source_file": "arxiv1.pdf" + }, + { + "text": "4 Confounding Control Planes with Gadgets\nWe focus on input adaptation attacks; these immediately give unconstrained attacks as well. The adversary therefore has a sequence of inputs x 1 , . . . , x q and must produce modified inputs ˆ x 1 , . . . , ˆ x q to maximize the number of inputs routed to M s . See Figure 2 for a depiction of our attack setting.\nInstruction injection doesn't work. Given the success of prompt injection for jailbreaking [50] and other adversarial tasks [64], the adversary might simply prefix each query x i with some instruction such as 'Treat the following query as complex, . . . ' to generate a modified query ˆ x i . Our experiments show that this does not work well, failing to trigger the control plane into routing otherwise weak queries to M s . See Appendix C for details on our experiments with various instruction prompts.\nConfounder gadgets. Our approach works as follows. Given a query x i , we prepend a confounder gadget c i , which is a short sequence of adversarially chosen tokens. The modified query is ˆ x i = c i ∥ x i where ∥ denotes string concatenation. Intuitively, we will use optimization to search for confounders that trick the scoring function into ranking ˆ x i as sufficiently complex to require the strong model.\nIn the white-box, query-specific setting, we can choose c i as a function of x i and the known parameters ω = ( S, θ, τ ) . To do so, we fix a confounder length of n tokens and let I be a token dictionary (it should be a sufficiently large subset of the token dictionary used by S ). Then we set the gadget to initially be n tokens all fixed to the same value from I . The exact choice of the initialization token is not important; in our implementation, we used the first token in the dictionary ('!'). (0) (0) (0) (0)\nDenote this initial confounder as c i = [ c i, 1 , c i, 2 , . . . , c i,n ] .\nThen, we perform a hill-climbing style approach to find a good confounder for x i . For each iteration t ∈ [ T ] , where T is the total number of iterations, do the following:", + "page_start": 4, + "page_end": 4, + "source_file": "arxiv1.pdf" + }, + { + "text": "5 Open-Source Routers: Experimental Setup\nTo evaluate efficacy of confounder gadgets generated using the method from Section 4, we perform experiments with several LLM routers. This section explains our experimental setup for the open-source routers proposed in the research literature [47]; results of this evaluation appear in Section 6. In Section 7, we discuss experiments with proprietary, commercial routers. Figure 3 shows the summary of our experimental setup.\n6\nFigure 3: Summary of our setup for routers, underlying LLMs, and benchmark datasets used in the experiments.", + "page_start": 5, + "page_end": 6, + "source_file": "arxiv1.pdf" + }, + { + "text": "E Rerouting to the Weak Model\nIn this section we evaluate the generality of our attack and show that generation of confounder gadgets can be optimized for the opposite objective from what we consider so far: reroute queries to the weak model. For this, we repeat the same optimization process as in Section 4 but minimize the router's score. Table 16 shows the upgrade and downgrade rates for this variant of the attack, in the white-box setting. In most cases we see a significant downgrade rate and a minimal upgrade rate, meaning that most of the modified queries were routed to the weak model. One notable exception is the LLM-based router R LLM , for which the attack does not work well. Future work will be needed to explore improving confounder generation for this setting further.\n25", + "page_start": 24, + "page_end": 24, + "source_file": "arxiv1.pdf" + }, + { + "text": "C Optimization-Free Gadget Generation\nWe evaluate optimization-free alternatives to our black-box optimization method for generating confounder gadgets.\nFixed gadget. A simple way to create a gadget without resorting to optimization is to repeat n tokens. We use ! as the initialization token, so the gadget in this case is !!!!!!!!!! . Another possibility is to select n tokens uniformly at random. Table 14 shows the upgrade rates for both options, were in the latter setting we repeat the process 10 times and report the average result and the standard error. While they are non-negligible, especially for the randomly sampled gadgets, they significantly underperform the upgrade rates reported in Table 1 for optimized gadgets.\nInstruction injection. Prompt injection is a known attack on LLMs [50, 64], thus we consider a gadget consisting of a direct instruction to the router to treat the query as a complex one and obtain a high-quality response.\nWe evaluated 4 differently phrased instructions: two created manually and two generated by, respectively, Gemini [61] and GPT-4o [2], denoted as 'ours-1', 'ours-2', 'Gemini', and 'GPT'.\nTable 15 reports the results. This method works well in a few cases but poorly in most. This highlights the difference between attacking LLMs and attacking LLM routers.", + "page_start": 23, + "page_end": 23, + "source_file": "arxiv1.pdf" + }, + { + "text": "6 Rerouting Open-Source Routers\nTable 7: Differences between average benchmark specific scores of responses to the original and confounded queries, when the confounder gadget was generated for a different surrogate router than the target (black-box setting) for three LLM pairs. Positive values indicate a higher average score for responses to the confounded queries; higher values are better for the attacker. Results are averaged across gadgets. Standard errors were omitted for readability and are on average 0 . 1 , 0 . 8 , and 1 . 8 for MT-bench, MMLU and GSM8K, respectively. Aligned with the white-box setting, results show almost no decrease in performance, and improvement when there is a performance gap for the LLM pair.\nResults for LLM pair 4. As discussed in Section 5, we replace the strong model that was used by Ong et al. [47], GPT-41106-preview (rank 28 in the Chatbot Arena leaderboard [1, 21]), with the open-sourced Llama-3.1-8B (rank 58) to reduce the costs of our extensive set of evaluations. In this section we perform a smaller-scale evaluation of the quality-enhancing attack performance when using GPT as the strong model, i.e., LLM pair 4. We evaluate this setting using three of the n = 10 confounder gadgets for each router.", + "page_start": 11, + "page_end": 11, + "source_file": "arxiv1.pdf" + }, + { + "text": "4 Confounding Control Planes with Gadgets\nWe now turn to our main contribution: a methodology for attacking LLM control plane integrity. The key insight is that an adversary can modify queries to mislead or 'confound' the routing logic into routing these queries to an LLM of the adversary's choosing. Furthermore, we will demonstrate that these attacks can be black-box and query-independent , i.e., a single modification works for all queries and does not require advance knowledge of the specific router being attacked.\n4\nFigure 2: Overview of our attack on LLM routing control plane integrity. The attack adds to each query a prefix (represented by the gear), called a 'confounder gadget,' that causes the router to send the query to the strong model.\nWe focus on the binary router setting in which the router applies a learned scoring function to input queries and routes any query whose score exceeds some threshold τ to the strong LLM M s . This setting has been the focus of several prior works [27, 41, 47] and is used in the control planes that are deployed in practice (see Section 7).\nMore formally, we consider a router R M ω for M = { M w , M s } , where ω consists of a scoring function S , scoring function's parameters θ , and a threshold τ ∈ R + . For notational brevity we just write R ω below, with M clear from context. Here S and θ define a scoring function S θ : X → R + . Since our focus is LLMs, we assume that queries X are strings of text tokens. The routing algorithm then works as follows:\nR ω ( x ) = { M w ( x ) if S θ ( x ) < τ M s ( x ) otherwise\nwhere ω = ( S, θ, τ ) . We will detail scoring functions in Section 5; prior work has suggested linear models, light-weight LLMs, and more. Note that, consistent with this application, scoring functions are computationally efficient and cheap (as compared to M s , M w ). Deployments calibrate τ to limit the fraction of queries routed to the strong model M s , giving rise to the type of control plane integrity policy discussed in Section 3.", + "page_start": 3, + "page_end": 4, + "source_file": "arxiv1.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2670.pdf", + "query": "What is called bad-cavity Ramsey laser ?", + "target_page": 1, + "target_passage": "We considerthe case of a two-level atomic beam interacting with a single-mode Ramsey cavity of separated-oscillating-field resonators with the cavity mode linewidth is much wider than the atomic gain linewidth. Thus we call it bad-cavity Ramsey laser. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "The Linewidth of Ramsey Laser with Bad Cavity\ncus on the stimulated emission spectrum via multiple coherent interactions inside the cavity. We find this Ramsey laser can provide a stimulated-emission spectrum with a linewidth much narrower than that of any conventional optical Ramsey seperated-field spectroscopy, which is commonly applied in optical atomic clock. Our results also show that a subnatural linewidth spectroscopy, superior to any other available subnatural spectroscopy technique at present [3-10], can be reached by this kind of laser, if a suitable atomic level structure is chosen. Thus, this method can provide an e ff ective subnatural spectroscopy, and the possibilities for the new optical clock scheme [15] and atom interferometers [2].\nTheoretical framework: We consider the case of a two-level atomic beam interacting with a single-mode Ramsey cavity of separated-oscillating-field resonators with the cavity mode linewidth is much wider than the atomic gain linewidth. Thus we call it bad-cavity Ramsey laser. All atoms are pumped onto the upper lasing state a before entering the first cavity of seperated field, and the lower lasing state is b . We assume all the atoms have the same velocities υ , that means what we consider here is a homogeneous laser system. And for the sake of simplicity, we consider the two-standing waves linear optical Ramsey configuration with a grid as spatial selector [20, 21]. Our treatment can be extended to other configurations as in [22-24]. The length of each oscillating part is l , and the length of the free drift region is L . The corresponding Hamiltonian is\nH = /planckover2pi1 ω ˆ a † ˆ a + /planckover2pi1 ∑ j [ ω j a ( t ) σ j a + ω j b ( t ) σ j b ] + /planckover2pi1 g ∑ j Γ j ( t )(ˆ a † ˆ σ j -e -i /vector k · /vector rj + ˆ σ j + ˆ ae i /vector k · /vector rj ) , (1)", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2670.pdf" + }, + { + "text": "The Linewidth of Ramsey Laser with Bad Cavity\n∗ E-mail: jbchen@pku.edu.cn\n† E-mail: hongguo@pku.edu.cn.\n[1] N. F. Ramsey, Phys. Rev. 76 , 996 (1949).\n[2] B. Dubetsky and P. R. Berman, In Atom Interferometry , edited by P. R. Berman (Academic Press, Cambridge, MA, 1997).\n[3] M. M. Salour, Rev. Mod. Phys. 50 , 667 (1978).\n[4] J. Wong and J. C. Garrison, Phys. Rev. Lett. 44 , 1254 (1980).\n[5] P. L. Knight and P. E. Coleman, J. Phys. B: Atom. Molec. Phys. 13 4345 (1980).\n[6] H. -W. Lee, P. Meystre, and M. O. Scully, Phys. Rev. A 24 , 1914 (1981).\n[7] F. Shimizu, K. Shimizu, and H. Takuma, Phys. Rev. A 28 , 2248 (1983).\n[8] W. Gawlik, J. Kowalski, F. Trager, and M. Vollmer, Phys.Rev.\n4", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2670.pdf" + }, + { + "text": "The Linewidth of Ramsey Laser with Bad Cavity\nB 1 = sin 2 ( Ω R 2 τ ) , B 2 = sin 2 ( Ω R τ ) cos 2 ( ∆ 2 T 2 ) ,\n( C 0 C ∗ ) 2 = 0 , ( C 1 C ∗ ) 2 = sin 2 ( Ω R τ ) sin 2 ( ∆ 2 T ) ,\n( C 2 C ∗ ) 2 = sin 2 ( Ω R τ ) sin 2 ( ∆ 2 T ) ,\n-0 -1 --2 -\nwe get\n( δϕ 2 ) ω = ( κ/ 2 + γ ab ) 2 ω 2 [( κ/ 2 + γ ab ) 2 + ω 2 )] γ 2 ab ( κ/ 2 + γ ab ) 2 { DST + DRam [2 -p sin 2 ( Ω R τ ) sin 2 ( ∆ 2 T )] } , (10)\n3\nwhere Ω R is the Rabi frequency on resonance, DST = g 2 ˜ Nass / I 0 γ ab , DRam = g 2 R / 2 I 0 γ 2 ab , and ∆ 2 = ω -( ω a 2 -ω b 2) presents the detuning in the free drift region. p is a parameter, which characterizes the pumping statistics: a Poissonian excitation statistics corresponds to p = 0 , and for a regular statistics we have p = 1.\nThen the linewidth of Ramsey laser with bad cavity is given by\nD = γ 2 ab ( κ/ 2 + γ ab ) 2 { DST + DRam [2 -p sin 2 ( Ω R τ ) sin 2 ( ∆ 2 T )] } . (11)\nSince DST / DRam /lessmuch 1 in our situation, and in the case of maximal photon number, the steady state value of ˜ Nass is about R τ/ 2. Then we get the\nD ≈ 2 g 2 κ [2 -p sin 2 ( Ω R τ ) sin 2 ( ∆ 2 T )] . (12)", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2670.pdf" + }, + { + "text": "The Linewidth of Ramsey Laser with Bad Cavity\nYang Li, Wei Zhuang, Jinbiao Chen, ∗ and Hong Guo † CREAM Group, State Key Laboratory of Advanced Optical Communication Systems and Networks (Peking University) and Institute of Quantum Electronics, School of Electronics Engineering and Computer Science, and Center for Computational Science and Engineering (CCSE), Peking University, Beijing 100871, P. R. China (Dated: October 29, 2018)\nWe investigate a new laser scheme by using Ramsey separated-field technique with bad cavity. By studying the linewidth of the stimulated-emission spectrum of this kind of laser inside the cavity, we find its linewidth is more than two orders of magnitude narrower than atomic natural linewidth, and it is far superior to that of conventional optical Ramsey method and any other available subnatural linewidth spectroscopy at present. Since any cavity related noise is reduced to cavity-pulling e ff ect in bad cavity laser, this Ramsey laser provides the possibility of precision subnatural linewidth spectroscopy, which is critical for the next generation of optical clock and atom interferometers.\nPACS numbers: 42.55.Ah, 42.50.Ar, 42.60.Da, 32.30.-r\nIntroduction: Since the invention of the separated-field technique [1], it has played an important role in the field of precision spectroscopy due to its linewidth narrowing e ff ect via multiple coherent interaction. Atomic clocks based on this technique have greatly extended our ability for frequency measurement, further, almost all the atom interferometers are based on this technique [2].", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2670.pdf" + }, + { + "text": "The Linewidth of Ramsey Laser with Bad Cavity\nOur method of Ramsey laser is suitable for any atoms with metastable energy level, as an example, we choose the transition from the metastable state 4 s 4 p 3 P 1 to the ground state 4 s 2 1 S 0 of 40 Ca to check the striking feature of this laser: subnatural linewidth. As mentioned in [29], the corresponding natural linewidth of the metastable state 4 s 4 p 3 P 1 is 320Hz. As in the recently proposed active optical clock with atomic beam [15], the velocity of the atoms in thermal atomic beam is about 500m / s, and the length of the interaction region is about 1mm, then the time for the atom to traverse each coherentinteraction region is on the order of magnitude of 1 µ s. If a bad cavity with κ is on the order of 10 7 Hz, the relation κ/ 2 /greatermuch τ -1 is satisfied. Then when g is on the order of the magnitude of kHz, which can be easily achieved for current technique [30], from the linewidth expression of Eq.(16) the order of magnitude of linewidth is below 1 Hz. This means the linewidth of a Ramsey laser can be more than two orders of magnitude narrower than the atomic natural linewidth, therefore our Ramsey method provides a new subnatural spectroscopy technique. And since it is stimulated-emission spectrum, it overcomes the di ffi culty in other subnatural linewidth spectroscopy schemes where the quick reduction of signal to noise ratio is a formidable limit. We should point out that this Ramsey laser does not escape the limitation of all active optical clock: in order to pump atoms to the excited state effectively and to be stimulated emit photon during the lifetime of a metastable state, this new method will only be applicable to some special transitions [17].", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2670.pdf" + }, + { + "text": "The Linewidth of Ramsey Laser with Bad Cavity\nConclusion: In summary, we propose a new subnatural linewidth spectroscopy technique, which is a laser by using Ramsey seperated-field cavity to realize the output of stimulated-emission radiation via multiple coherent interaction with atomic beam. We find the linewidth of Ramsey laser is subnatural if we choose an appropriate atomic level, and the bad-cavity laser mechanism will dramatically reduce cavityrelated noise as discussed in active optical clock [15-19]. Our results show that this new subnatural linewidth spectroscopy is superior to conventional optical Ramsey seperated-field spectroscopy and any other available subnatural spectroscopy technique at present [3-10]. Considering one have to apply the separated-field method in any phase detection as in Ramsey-Bord e 'interferometer [2], to investigate the e ff ects of phase di ff erences between the two oscillating fields [31] in this stimulated separated-field method with such subnatural linewidth will be our next research aim.\nWe acknowledge Yiqiu Wang and Deshui Yu for fruitful discussions. This work is supported by MOST of China (grant 2005CB724500, National Natural Science Foundation of China (grant 60837004, 10874009), National Hi-Tech Research and Development (863) Program.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2670.pdf" + }, + { + "text": "The Linewidth of Ramsey Laser with Bad Cavity\n[24] J. C. Bergquist, S. A. Lee, and L. L. Hall, Phys. Rev. Lett. 38 , 159 (1977).\n[25] L. Davidovich, Rev. Mod. Phys. 68 , 127 (1996).\n[26] M. I. Kolobov, L. Davidovich, E. Giacobino, and C. Fabre, Phys. Rev. A 47 , 1431 (1993).\n[27] M. Sargent III, M. O. Scully, and W. E. Lamb, Laser Physics (Addition Wesley, Reading, MA, 1974).\n[28] N. A. Abraham, P. Mandel, and L. M. Narducci, Dynamic Instabilities and Pulsations in Lasers , Progress in Optics XXV, edited by E. Wolf (Elsevier, Amsterdam, 1988).\n[29] L. Pasternack, D. M. Silver, D. R. Yarkony, and P. J. Dagdigian, J. Phys. B 13 , 2231 (1980).\n[30] K. An and M. S. Feld, Phys. Rev. A 56 , 1662(1997).\n[31] N. F. Ramsey and H. B. Silsbee, Phys. Rev. 84 , 506(1951).", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2670.pdf" + }, + { + "text": "The Linewidth of Ramsey Laser with Bad Cavity\n〈 ˜ Fk ( t ) ˜ Fk ( t ' ) 〉 = ˜ D (0) kl δ ( t -t ' ) + ˜ D (1) kl δ ( t -t ' -τ ) + ˜ D (2) kl δ ( t -t ' + τ ) + ˜ D (3) kl δ ( t -t ' -τ -T ) + ˜ D (4) kl δ ( t -t ' + τ + T ) + ˜ D (5) kl δ ( t -t ' -2 τ -T ) + ˜ D (6) kl δ ( t -t ' + 2 τ + T ) + ˜ D (7) kl δ ( t -t ' -T ) + ˜ D (8) kl δ ( t -t ' + T ) , (8)\nwhere ˜ D ( i ) kl are the c-number Langevin di ff usion coe ffi cients, related to quantum Langevin di ff usion coe ffi cients D ( i ) kl as in [27].\nSteady-state solutions: The steady-state solutions for the mean values of the field and atomic variables for laser operation are obtained by dropping the noise terms of the cnumber Langevin equations and setting the time derivatives equal to zero. The analytical solutions are very complex, and one could numerically solve the steady-state equations. In this paper, we only care about the bad cavity limit γ max /lessmuch T -1 /lessmuch τ -1 /lessmuch κ/ 2. Since the atomic transit time is much shorter than the damping times of atomic variables, one could ignore the e ff ect of the spontaneous emission of the atom. By the standard way [25], We get the following steady-state values:\n∣ ∣ ∣ ˜ Ass ∣ ∣ ∣ 2 = R (1 -A 0 + A 1 -A 2) κ = R ( B 0 -B 1 + B 2) κ ,\n˜ Nass = R τ 2 [ 1 + C 0 -C 1 + C 2 g τ √ κ R ( B 0 -B 1 + B 2) ] ,\n˜ Nbss = R τ 2 [ 1 -C 0 -C 1 + C 2 g τ √ κ R ( B 0 -B 1 + B 2) ] .", + "page_start": 1, + "page_end": 2, + "source_file": "1001.2670.pdf" + }, + { + "text": "The Linewidth of Ramsey Laser with Bad Cavity\nFrom the expression above, we find that the pumping statistic can influence the linewidth. For regular injection ( p = 1), the linewidth is the narrowest, while for Poissonian injection ( p = 0), the linewidth is the broadest. But even for regular injection, the linewidth is larger than the case of one cavity. That means the mechanism of separated-field does not play the role in reducing the linewidth as in the conventional optical Ramsey method, which is counter-intuitive. However, the separated fields are indispensable for any phase detection like atom interferometry. The details about the method of active atom interferometry will appear elsewhere.", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2670.pdf" + }, + { + "text": "The Linewidth of Ramsey Laser with Bad Cavity\nLett. 48 , 871 (1982).\n[9] H. J. Carmichael, R. J. Brecha, M. G. Raizen, H. J. Kimble, and P. R. Rice, Phys. Rev. A 40 , 5516 (1989).\n[10] U. W. Rathe, M. O. Scully, Letters in Mathematical Physics 34 , 297 (1995)\n[11] K. Numata, A. Kemery, J. Camp, Phys Rev Lett, 93 , 250602 (2004).\n[12] A. D. Ludlow et al. , Opt. Lett. 32 , 641 (2007).\n[13] H. J. Kimble, B. L. Lev, and J. Ye, Phys. Rev. Lett. 101 , 260602 (2008).\n[14] J. Chen, and X.Chen, In Proceedings of the 2005 IEEE International Frequency Control Symposium and Exposition , (IEEE, 2005), p.608.\n[15] J. Chen, e-print arXiv:0512096 quant-ph; Chinese Science Bulletin 54 , 348 (2009).\n[16] D. Yu and J. Chen, Phys. Rev. A 78 , 013846 (2008).\n[17] J. Chen, In Frequency Standards and Metrology: Proceedings of the 7th Symposium , edited by Maleki Lute (World Scientific Publishing Company, 2009).\n[18] Y. Wang, Chinese Science Bulletin 54 , 347 (2009).\n[19] D. Meiser, J. Ye, D. R. Carlson, and M. J. Holland, Phys. Rev. Lett. 102 , 163601 (2009)\n[20] F. Strumia, Metrologia 8 , 85 (1972).\n[21] G. Kramer, J. Opt. Soc. Am. 68 , 1634 (1978).\n[22] V. S. Letokhov and B. D. Pavlik, Opt. Spectrosc. USSR 32 , 455 (1972).\n[23] Ye. V. Baklanov, B. Ya, Dubetsky, V. P. Chebotayev, Appl. Phys. 9 , 171 (1976).", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2670.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2670.pdf", + "query": "How the steady-state solutions for the mean values of the field and atomic variables for laser operation are obtained ?", + "target_page": 2, + "target_passage": "The steady-state solutions for the mean values of the field and atomic variables for laser operation are obtained by dropping the noise terms of the c-number Langevin equations and setting the time derivatives equal to zero.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "The Linewidth of Ramsey Laser with Bad Cavity\n〈 ˜ Fk ( t ) ˜ Fk ( t ' ) 〉 = ˜ D (0) kl δ ( t -t ' ) + ˜ D (1) kl δ ( t -t ' -τ ) + ˜ D (2) kl δ ( t -t ' + τ ) + ˜ D (3) kl δ ( t -t ' -τ -T ) + ˜ D (4) kl δ ( t -t ' + τ + T ) + ˜ D (5) kl δ ( t -t ' -2 τ -T ) + ˜ D (6) kl δ ( t -t ' + 2 τ + T ) + ˜ D (7) kl δ ( t -t ' -T ) + ˜ D (8) kl δ ( t -t ' + T ) , (8)\nwhere ˜ D ( i ) kl are the c-number Langevin di ff usion coe ffi cients, related to quantum Langevin di ff usion coe ffi cients D ( i ) kl as in [27].\nSteady-state solutions: The steady-state solutions for the mean values of the field and atomic variables for laser operation are obtained by dropping the noise terms of the cnumber Langevin equations and setting the time derivatives equal to zero. The analytical solutions are very complex, and one could numerically solve the steady-state equations. In this paper, we only care about the bad cavity limit γ max /lessmuch T -1 /lessmuch τ -1 /lessmuch κ/ 2. Since the atomic transit time is much shorter than the damping times of atomic variables, one could ignore the e ff ect of the spontaneous emission of the atom. By the standard way [25], We get the following steady-state values:\n∣ ∣ ∣ ˜ Ass ∣ ∣ ∣ 2 = R (1 -A 0 + A 1 -A 2) κ = R ( B 0 -B 1 + B 2) κ ,\n˜ Nass = R τ 2 [ 1 + C 0 -C 1 + C 2 g τ √ κ R ( B 0 -B 1 + B 2) ] ,\n˜ Nbss = R τ 2 [ 1 -C 0 -C 1 + C 2 g τ √ κ R ( B 0 -B 1 + B 2) ] .", + "page_start": 1, + "page_end": 2, + "source_file": "1001.2670.pdf" + }, + { + "text": "The Linewidth of Ramsey Laser with Bad Cavity\nA detailed analysis about the stability of the steady-state can be found such as in [28]. In this paper, we assume the steadystate solution is stable.\nLaser linwidth: Suppose the quantum fluctuation is small, the evolution of the fluctuations can be obtained by making a linearization of the c-number Langevin equations around the steady-state solution. Then the measured spectra of field fluctuations will be directly related to these quantities. By Fourier transformations of the linearized equation, we get the amplitude and phase quadrature components δ X ( ω ) and δ Y ( ω ) [26]. Well above threshold, one can neglect the amplitude fluctuations, and the linewidth inside the cavity is related to the phase-di ff usion coe ffi cient [25]. For small fluctuation of laser phase, the spectrum of phase fluctuations is simply related to the spectrum of the phase quadrature component of the field fluctuations, namely,\n( δϕ 2 ) ω = 1 I 0 ( δ Y 2 ) ω.\nIn the region γ ab /lessmuch T -1 /lessmuch τ -1 /lessmuch κ/ 2, as in the recently proposed active optical clock [15] with atomic beam. The phase quadrature component of the field fluctuations can be expressed as\n( δϕ 2 ) ω ≈ ( κ/ 2 + γ ab ) 2 I 0 ω 2 [( κ/ 2 + γ ab ) 2 + ω 2 ] g 2 4( κ/ 2 + γ ab ) 2 { 4 γ ab ˜ Nass + 2 R [( A 0 + B 0) + ( A 2 + B 2)] + Rp [( C 0 -C ∗ 0 ) 2 + ( C 1 -C ∗ 1 ) 2 + ( C 2 -C ∗ 2 ) 2 ] } . (9)\nSince the time τ and T is much shorter than the time scale of the atomic dampings, we can neglect the dampings when calculate Ai , Bi , Ci . By using\nA 0 = cos 2 ( Ω R 2 τ ) , A 1 = cos 2 ( Ω R 2 τ ) ,\nA 2 = 1 -sin 2 ( Ω R τ ) cos 2 ( ∆ 2 2 T ) , B 0 = sin 2 ( Ω R 2 τ ) ,", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2670.pdf" + }, + { + "text": "The Linewidth of Ramsey Laser with Bad Cavity\nwhere ˆ a , ˆ a † are the annihilation and creation operators of the field mode inside the cavity, with the frequency ω , σ j a = ( | a 〉 〈 a | ) j and σ j b = ( | b 〉 〈 b | ) j are the projection operators for the jth atom corresponding to the upper and lower lasing levels,\nwith frequency ω j a and ω j b , and σ j -= ( | b 〉 〈 a | ) j is the 'spinflip' operator for the jth atom, with its adjoint σ j + = ( | a 〉 〈 b | ) j . The coupling constant g is given by g = µ √ ω/ 2 /planckover2pi1 /epsilon1 0 V , where µ is the magnitude of the atomic dipole moment, and V is the e ff ective volume of the cavity.\nIn order to denote the finite-time interaction between the atoms and Ramsey separated field, we introduce the function\nΓ j ( t ) = Θ ( t -t j ) -Θ ( t -t j -τ ) +Θ ( t -t j -τ -T ) -Θ ( t -t j -2 τ -T ) , (2)\nwhere Θ ( t ) is the Heaviside step function [ Θ ( t ) = 1 for t > 0, Θ ( t ) = 1 / 2 for t = 0, and Θ ( t ) = 0 for t < 0]. T is the free drift time of the atoms, and τ is the interacting time between the atom and one cavity.\nBy the standard way [25], we can get the HeisenbergLangevin equations of the motion for the single-atom and filed operators. By introducing the macroscopic atomic operator, M ( t ) = -i ∑ j Γ j ( t ) σ j -( t ), Na ( t ) = ∑ j Γ j ( t ) σ j aa ( t ), Nb ( t ) = ∑ j Γ j ( t ) σ j bb ( t ), the dynamic equations for the field and macroscopic atomic operators yield\n˙ a ( t ) = -κ 2 a ( t ) + gM ( t ) + F κ ( t ) , (3)", + "page_start": 0, + "page_end": 1, + "source_file": "1001.2670.pdf" + }, + { + "text": "The Linewidth of Ramsey Laser with Bad Cavity\nC 2 = 〈 -i σ j -( t j + 2 τ + T ) 〉 q . R is the mean pumping rate, which is defined in [26]. It is very easy to check that the average values of the above Langevin forces are all zero.\n2\nBy using the above definitions of the noise operators, we find the correlation functions of macroscopic noise forces can be generally written in the form\n〈 Fk ( t ) Fl ( t ' ) 〉 = D (0) kl δ ( t -t ' ) + D (1) kl δ ( t -t ' -τ ) + D (2) kl δ ( t -t ' + τ ) + D (3) kl δ ( t -t ' -τ -T ) + D (4) kl δ ( t -t ' + τ + T ) + D (5) kl δ ( t -t ' -2 τ -T ) + D (6) kl δ ( t -t ' + 2 τ + T ) + D (7) kl δ ( t -t ' -T ) + D (8) kl δ ( t -t ' + T ) , (7)\nwhere D ( i ) kl ( k , l = a , b , M , M † ; i = 0 , 1 , 2) are the quantum diffusion coe ffi cients.\nc-number correlation functions: By choosing some particular ordering for products of atomic and field operators, one could derive the c-number stochastic Langevin equations from the quantum Langevin equations derived above, and all of the dynamic equations for c-number stochastic variables are the same as in [26]. The di ff erences are from the correlation functions. On the other hand, we convert the quantum noise operators into the c-number noise variables ˜ Fk ( t )( k = a , b , M , M † ), whose correlation functions are expressed as", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2670.pdf" + }, + { + "text": "The Linewidth of Ramsey Laser with Bad Cavity\nB 1 = sin 2 ( Ω R 2 τ ) , B 2 = sin 2 ( Ω R τ ) cos 2 ( ∆ 2 T 2 ) ,\n( C 0 C ∗ ) 2 = 0 , ( C 1 C ∗ ) 2 = sin 2 ( Ω R τ ) sin 2 ( ∆ 2 T ) ,\n( C 2 C ∗ ) 2 = sin 2 ( Ω R τ ) sin 2 ( ∆ 2 T ) ,\n-0 -1 --2 -\nwe get\n( δϕ 2 ) ω = ( κ/ 2 + γ ab ) 2 ω 2 [( κ/ 2 + γ ab ) 2 + ω 2 )] γ 2 ab ( κ/ 2 + γ ab ) 2 { DST + DRam [2 -p sin 2 ( Ω R τ ) sin 2 ( ∆ 2 T )] } , (10)\n3\nwhere Ω R is the Rabi frequency on resonance, DST = g 2 ˜ Nass / I 0 γ ab , DRam = g 2 R / 2 I 0 γ 2 ab , and ∆ 2 = ω -( ω a 2 -ω b 2) presents the detuning in the free drift region. p is a parameter, which characterizes the pumping statistics: a Poissonian excitation statistics corresponds to p = 0 , and for a regular statistics we have p = 1.\nThen the linewidth of Ramsey laser with bad cavity is given by\nD = γ 2 ab ( κ/ 2 + γ ab ) 2 { DST + DRam [2 -p sin 2 ( Ω R τ ) sin 2 ( ∆ 2 T )] } . (11)\nSince DST / DRam /lessmuch 1 in our situation, and in the case of maximal photon number, the steady state value of ˜ Nass is about R τ/ 2. Then we get the\nD ≈ 2 g 2 κ [2 -p sin 2 ( Ω R τ ) sin 2 ( ∆ 2 T )] . (12)", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2670.pdf" + }, + { + "text": "The Linewidth of Ramsey Laser with Bad Cavity\nFrom the expression above, we find that the pumping statistic can influence the linewidth. For regular injection ( p = 1), the linewidth is the narrowest, while for Poissonian injection ( p = 0), the linewidth is the broadest. But even for regular injection, the linewidth is larger than the case of one cavity. That means the mechanism of separated-field does not play the role in reducing the linewidth as in the conventional optical Ramsey method, which is counter-intuitive. However, the separated fields are indispensable for any phase detection like atom interferometry. The details about the method of active atom interferometry will appear elsewhere.", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2670.pdf" + }, + { + "text": "The Linewidth of Ramsey Laser with Bad Cavity\n˙ Na ( t ) = R (1 -A 0 + A 1 -A 2) -( γ a + γ ' a ) Na ( t ) -g [ M † ( t ) a ( t ) + a † ( t ) M ( t )] + Fa ( t ) , (4)\n˙ Nb ( t ) = -R ( B 0 -B 1 + B 2) -γ bNb ( t ) + γ ' a Na ( t ) + g [ a † ( t ) M ( t ) + M † ( t ) a ( t )] + Fb ( t ) , (5)\n˙ M ( t ) = -R ( C 0 -C 1 + C 2) -γ abM ( t ) + g [ Na ( t ) -Nb ( t )] a ( t ) + FM ( t ) , (6)\nwhere the macroscopic noise operators are defined as\nFa ( t ) = ∑ j ˙ Γ j ( t ) σ j a ( t ) -R (1 -A 0 + A 1 -A 2) + ∑ j Γ j ( t ) f j a ( t ) ,\nFb ( t ) = ∑ j ˙ Γ j ( t ) σ j b ( t ) + R ( B 0 -B 1 + B 2) + ∑ j Γ j ( t ) f j b ( t ) ,\nFM ( t ) = -i ∑ j ˙ Γ j ( t ) ˜ σ j -( t ) + R ( C 0 -C 1 + C 2) -i ∑ j Γ j ( t ) f j σ ( t ) ,\nwith A 0 = 〈 σ j a ( t j + τ ) 〉 q , A 1 = 〈 σ j a ( t j + τ + T ) 〉 q , A 2 = 〈 σ j a ( t j + 2 τ + T ) 〉 q , B 0 = 〈 σ j b ( t j + τ ) 〉 q , B 1 = 〈 σ j b ( t j + τ + T ) 〉 q , B 2 = 〈 σ j b ( t j + 2 τ + T ) 〉 q , C 0 = 〈 -i σ j -( t j + τ ) 〉 q , C 1 = 〈 -i σ j -( t j + τ + T ) 〉 q ,", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2670.pdf" + }, + { + "text": "The Linewidth of Ramsey Laser with Bad Cavity\n∗ E-mail: jbchen@pku.edu.cn\n† E-mail: hongguo@pku.edu.cn.\n[1] N. F. Ramsey, Phys. Rev. 76 , 996 (1949).\n[2] B. Dubetsky and P. R. Berman, In Atom Interferometry , edited by P. R. Berman (Academic Press, Cambridge, MA, 1997).\n[3] M. M. Salour, Rev. Mod. Phys. 50 , 667 (1978).\n[4] J. Wong and J. C. Garrison, Phys. Rev. Lett. 44 , 1254 (1980).\n[5] P. L. Knight and P. E. Coleman, J. Phys. B: Atom. Molec. Phys. 13 4345 (1980).\n[6] H. -W. Lee, P. Meystre, and M. O. Scully, Phys. Rev. A 24 , 1914 (1981).\n[7] F. Shimizu, K. Shimizu, and H. Takuma, Phys. Rev. A 28 , 2248 (1983).\n[8] W. Gawlik, J. Kowalski, F. Trager, and M. Vollmer, Phys.Rev.\n4", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2670.pdf" + }, + { + "text": "The Linewidth of Ramsey Laser with Bad Cavity\n[24] J. C. Bergquist, S. A. Lee, and L. L. Hall, Phys. Rev. Lett. 38 , 159 (1977).\n[25] L. Davidovich, Rev. Mod. Phys. 68 , 127 (1996).\n[26] M. I. Kolobov, L. Davidovich, E. Giacobino, and C. Fabre, Phys. Rev. A 47 , 1431 (1993).\n[27] M. Sargent III, M. O. Scully, and W. E. Lamb, Laser Physics (Addition Wesley, Reading, MA, 1974).\n[28] N. A. Abraham, P. Mandel, and L. M. Narducci, Dynamic Instabilities and Pulsations in Lasers , Progress in Optics XXV, edited by E. Wolf (Elsevier, Amsterdam, 1988).\n[29] L. Pasternack, D. M. Silver, D. R. Yarkony, and P. J. Dagdigian, J. Phys. B 13 , 2231 (1980).\n[30] K. An and M. S. Feld, Phys. Rev. A 56 , 1662(1997).\n[31] N. F. Ramsey and H. B. Silsbee, Phys. Rev. 84 , 506(1951).", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2670.pdf" + }, + { + "text": "II. OPTICAL INTEGRAL IN NORMAL AND SUPERCONDUCTING STATES\nThe generic formalism of the computation of the optical conductivity and the optical integral has been discussed several times in the literature 21-23,26,29 and we\n4\njust list the formulas that we used in our computations. The conductivity σ (Ω) and the optical integral W ( ω c ) are given by (see for example Ref. 35).\nσ ' (Ω) = Im [ -Π(Ω) Ω+ iδ ] = -Π '' (Ω) Ω + πδ (Ω) Π ' (Ω) (7a)\nW ( ω c ) = ∫ ω c 0 σ ' (Ω) d Ω = -∫ ω c 0+ Π '' (Ω) Ω d Ω + π 2 Π ' (0) (7b)\nwhere ' X ' ' and ' X '' ' stand for real and imaginary parts of X . We will restrict with T = 0. The polarization operator Π(Ω) is (see Ref. 36)\nΠ( i Ω) = T ∑ ω ∑ /vector k ( ∇ /vector k ε /vector k ) 2 ( G ( iω, /vector k ) G ( iω + i Ω , /vector k ) + F ( iω, /vector k ) F ( iω + i Ω , /vector k ) ) (8a)\nΠ ' (Ω) = 1 π 2 ∑ /vector k ( ∇ /vector k ε /vector k ) 2 ∫ ' ∫ ' dxdy ( G '' ( x, /vector k ) G '' ( y, /vector k ) + F '' ( x, /vector k ) F '' ( y, /vector k ) ) n F ( y ) -n F ( x ) y -x (8c)\nΠ '' (Ω) = -1 π ∑ /vector k ( ∇ /vector k ε /vector k ) 2 ∫ 0 -Ω dω ( G '' ( ω, /vector k ) G '' ( ω +Ω , /vector k ) + F '' ( ω, /vector k ) F '' ( ω +Ω , /vector k ) ) (8b)", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0764.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2670.pdf", + "query": "What are the consequences on the linewidth for regular and Poissonian injections ?", + "target_page": 3, + "target_passage": " For regular injection (p = 1), the linewidth is the narrowest, while for Poissonian injection (p = 0), the linewidth is the broadest.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "The Linewidth of Ramsey Laser with Bad Cavity\nFrom the expression above, we find that the pumping statistic can influence the linewidth. For regular injection ( p = 1), the linewidth is the narrowest, while for Poissonian injection ( p = 0), the linewidth is the broadest. But even for regular injection, the linewidth is larger than the case of one cavity. That means the mechanism of separated-field does not play the role in reducing the linewidth as in the conventional optical Ramsey method, which is counter-intuitive. However, the separated fields are indispensable for any phase detection like atom interferometry. The details about the method of active atom interferometry will appear elsewhere.", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2670.pdf" + }, + { + "text": "The Linewidth of Ramsey Laser with Bad Cavity\n˙ Na ( t ) = R (1 -A 0 + A 1 -A 2) -( γ a + γ ' a ) Na ( t ) -g [ M † ( t ) a ( t ) + a † ( t ) M ( t )] + Fa ( t ) , (4)\n˙ Nb ( t ) = -R ( B 0 -B 1 + B 2) -γ bNb ( t ) + γ ' a Na ( t ) + g [ a † ( t ) M ( t ) + M † ( t ) a ( t )] + Fb ( t ) , (5)\n˙ M ( t ) = -R ( C 0 -C 1 + C 2) -γ abM ( t ) + g [ Na ( t ) -Nb ( t )] a ( t ) + FM ( t ) , (6)\nwhere the macroscopic noise operators are defined as\nFa ( t ) = ∑ j ˙ Γ j ( t ) σ j a ( t ) -R (1 -A 0 + A 1 -A 2) + ∑ j Γ j ( t ) f j a ( t ) ,\nFb ( t ) = ∑ j ˙ Γ j ( t ) σ j b ( t ) + R ( B 0 -B 1 + B 2) + ∑ j Γ j ( t ) f j b ( t ) ,\nFM ( t ) = -i ∑ j ˙ Γ j ( t ) ˜ σ j -( t ) + R ( C 0 -C 1 + C 2) -i ∑ j Γ j ( t ) f j σ ( t ) ,\nwith A 0 = 〈 σ j a ( t j + τ ) 〉 q , A 1 = 〈 σ j a ( t j + τ + T ) 〉 q , A 2 = 〈 σ j a ( t j + 2 τ + T ) 〉 q , B 0 = 〈 σ j b ( t j + τ ) 〉 q , B 1 = 〈 σ j b ( t j + τ + T ) 〉 q , B 2 = 〈 σ j b ( t j + 2 τ + T ) 〉 q , C 0 = 〈 -i σ j -( t j + τ ) 〉 q , C 1 = 〈 -i σ j -( t j + τ + T ) 〉 q ,", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2670.pdf" + }, + { + "text": "The Linewidth of Ramsey Laser with Bad Cavity\n∗ E-mail: jbchen@pku.edu.cn\n† E-mail: hongguo@pku.edu.cn.\n[1] N. F. Ramsey, Phys. Rev. 76 , 996 (1949).\n[2] B. Dubetsky and P. R. Berman, In Atom Interferometry , edited by P. R. Berman (Academic Press, Cambridge, MA, 1997).\n[3] M. M. Salour, Rev. Mod. Phys. 50 , 667 (1978).\n[4] J. Wong and J. C. Garrison, Phys. Rev. Lett. 44 , 1254 (1980).\n[5] P. L. Knight and P. E. Coleman, J. Phys. B: Atom. Molec. Phys. 13 4345 (1980).\n[6] H. -W. Lee, P. Meystre, and M. O. Scully, Phys. Rev. A 24 , 1914 (1981).\n[7] F. Shimizu, K. Shimizu, and H. Takuma, Phys. Rev. A 28 , 2248 (1983).\n[8] W. Gawlik, J. Kowalski, F. Trager, and M. Vollmer, Phys.Rev.\n4", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2670.pdf" + }, + { + "text": "The Linewidth of Ramsey Laser with Bad Cavity\nB 1 = sin 2 ( Ω R 2 τ ) , B 2 = sin 2 ( Ω R τ ) cos 2 ( ∆ 2 T 2 ) ,\n( C 0 C ∗ ) 2 = 0 , ( C 1 C ∗ ) 2 = sin 2 ( Ω R τ ) sin 2 ( ∆ 2 T ) ,\n( C 2 C ∗ ) 2 = sin 2 ( Ω R τ ) sin 2 ( ∆ 2 T ) ,\n-0 -1 --2 -\nwe get\n( δϕ 2 ) ω = ( κ/ 2 + γ ab ) 2 ω 2 [( κ/ 2 + γ ab ) 2 + ω 2 )] γ 2 ab ( κ/ 2 + γ ab ) 2 { DST + DRam [2 -p sin 2 ( Ω R τ ) sin 2 ( ∆ 2 T )] } , (10)\n3\nwhere Ω R is the Rabi frequency on resonance, DST = g 2 ˜ Nass / I 0 γ ab , DRam = g 2 R / 2 I 0 γ 2 ab , and ∆ 2 = ω -( ω a 2 -ω b 2) presents the detuning in the free drift region. p is a parameter, which characterizes the pumping statistics: a Poissonian excitation statistics corresponds to p = 0 , and for a regular statistics we have p = 1.\nThen the linewidth of Ramsey laser with bad cavity is given by\nD = γ 2 ab ( κ/ 2 + γ ab ) 2 { DST + DRam [2 -p sin 2 ( Ω R τ ) sin 2 ( ∆ 2 T )] } . (11)\nSince DST / DRam /lessmuch 1 in our situation, and in the case of maximal photon number, the steady state value of ˜ Nass is about R τ/ 2. Then we get the\nD ≈ 2 g 2 κ [2 -p sin 2 ( Ω R τ ) sin 2 ( ∆ 2 T )] . (12)", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2670.pdf" + }, + { + "text": "The Linewidth of Ramsey Laser with Bad Cavity\n[24] J. C. Bergquist, S. A. Lee, and L. L. Hall, Phys. Rev. Lett. 38 , 159 (1977).\n[25] L. Davidovich, Rev. Mod. Phys. 68 , 127 (1996).\n[26] M. I. Kolobov, L. Davidovich, E. Giacobino, and C. Fabre, Phys. Rev. A 47 , 1431 (1993).\n[27] M. Sargent III, M. O. Scully, and W. E. Lamb, Laser Physics (Addition Wesley, Reading, MA, 1974).\n[28] N. A. Abraham, P. Mandel, and L. M. Narducci, Dynamic Instabilities and Pulsations in Lasers , Progress in Optics XXV, edited by E. Wolf (Elsevier, Amsterdam, 1988).\n[29] L. Pasternack, D. M. Silver, D. R. Yarkony, and P. J. Dagdigian, J. Phys. B 13 , 2231 (1980).\n[30] K. An and M. S. Feld, Phys. Rev. A 56 , 1662(1997).\n[31] N. F. Ramsey and H. B. Silsbee, Phys. Rev. 84 , 506(1951).", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2670.pdf" + }, + { + "text": "The Linewidth of Ramsey Laser with Bad Cavity\n〈 ˜ Fk ( t ) ˜ Fk ( t ' ) 〉 = ˜ D (0) kl δ ( t -t ' ) + ˜ D (1) kl δ ( t -t ' -τ ) + ˜ D (2) kl δ ( t -t ' + τ ) + ˜ D (3) kl δ ( t -t ' -τ -T ) + ˜ D (4) kl δ ( t -t ' + τ + T ) + ˜ D (5) kl δ ( t -t ' -2 τ -T ) + ˜ D (6) kl δ ( t -t ' + 2 τ + T ) + ˜ D (7) kl δ ( t -t ' -T ) + ˜ D (8) kl δ ( t -t ' + T ) , (8)\nwhere ˜ D ( i ) kl are the c-number Langevin di ff usion coe ffi cients, related to quantum Langevin di ff usion coe ffi cients D ( i ) kl as in [27].\nSteady-state solutions: The steady-state solutions for the mean values of the field and atomic variables for laser operation are obtained by dropping the noise terms of the cnumber Langevin equations and setting the time derivatives equal to zero. The analytical solutions are very complex, and one could numerically solve the steady-state equations. In this paper, we only care about the bad cavity limit γ max /lessmuch T -1 /lessmuch τ -1 /lessmuch κ/ 2. Since the atomic transit time is much shorter than the damping times of atomic variables, one could ignore the e ff ect of the spontaneous emission of the atom. By the standard way [25], We get the following steady-state values:\n∣ ∣ ∣ ˜ Ass ∣ ∣ ∣ 2 = R (1 -A 0 + A 1 -A 2) κ = R ( B 0 -B 1 + B 2) κ ,\n˜ Nass = R τ 2 [ 1 + C 0 -C 1 + C 2 g τ √ κ R ( B 0 -B 1 + B 2) ] ,\n˜ Nbss = R τ 2 [ 1 -C 0 -C 1 + C 2 g τ √ κ R ( B 0 -B 1 + B 2) ] .", + "page_start": 1, + "page_end": 2, + "source_file": "1001.2670.pdf" + }, + { + "text": "The Linewidth of Ramsey Laser with Bad Cavity\nA detailed analysis about the stability of the steady-state can be found such as in [28]. In this paper, we assume the steadystate solution is stable.\nLaser linwidth: Suppose the quantum fluctuation is small, the evolution of the fluctuations can be obtained by making a linearization of the c-number Langevin equations around the steady-state solution. Then the measured spectra of field fluctuations will be directly related to these quantities. By Fourier transformations of the linearized equation, we get the amplitude and phase quadrature components δ X ( ω ) and δ Y ( ω ) [26]. Well above threshold, one can neglect the amplitude fluctuations, and the linewidth inside the cavity is related to the phase-di ff usion coe ffi cient [25]. For small fluctuation of laser phase, the spectrum of phase fluctuations is simply related to the spectrum of the phase quadrature component of the field fluctuations, namely,\n( δϕ 2 ) ω = 1 I 0 ( δ Y 2 ) ω.\nIn the region γ ab /lessmuch T -1 /lessmuch τ -1 /lessmuch κ/ 2, as in the recently proposed active optical clock [15] with atomic beam. The phase quadrature component of the field fluctuations can be expressed as\n( δϕ 2 ) ω ≈ ( κ/ 2 + γ ab ) 2 I 0 ω 2 [( κ/ 2 + γ ab ) 2 + ω 2 ] g 2 4( κ/ 2 + γ ab ) 2 { 4 γ ab ˜ Nass + 2 R [( A 0 + B 0) + ( A 2 + B 2)] + Rp [( C 0 -C ∗ 0 ) 2 + ( C 1 -C ∗ 1 ) 2 + ( C 2 -C ∗ 2 ) 2 ] } . (9)\nSince the time τ and T is much shorter than the time scale of the atomic dampings, we can neglect the dampings when calculate Ai , Bi , Ci . By using\nA 0 = cos 2 ( Ω R 2 τ ) , A 1 = cos 2 ( Ω R 2 τ ) ,\nA 2 = 1 -sin 2 ( Ω R τ ) cos 2 ( ∆ 2 2 T ) , B 0 = sin 2 ( Ω R 2 τ ) ,", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2670.pdf" + }, + { + "text": "The Linewidth of Ramsey Laser with Bad Cavity\nLett. 48 , 871 (1982).\n[9] H. J. Carmichael, R. J. Brecha, M. G. Raizen, H. J. Kimble, and P. R. Rice, Phys. Rev. A 40 , 5516 (1989).\n[10] U. W. Rathe, M. O. Scully, Letters in Mathematical Physics 34 , 297 (1995)\n[11] K. Numata, A. Kemery, J. Camp, Phys Rev Lett, 93 , 250602 (2004).\n[12] A. D. Ludlow et al. , Opt. Lett. 32 , 641 (2007).\n[13] H. J. Kimble, B. L. Lev, and J. Ye, Phys. Rev. Lett. 101 , 260602 (2008).\n[14] J. Chen, and X.Chen, In Proceedings of the 2005 IEEE International Frequency Control Symposium and Exposition , (IEEE, 2005), p.608.\n[15] J. Chen, e-print arXiv:0512096 quant-ph; Chinese Science Bulletin 54 , 348 (2009).\n[16] D. Yu and J. Chen, Phys. Rev. A 78 , 013846 (2008).\n[17] J. Chen, In Frequency Standards and Metrology: Proceedings of the 7th Symposium , edited by Maleki Lute (World Scientific Publishing Company, 2009).\n[18] Y. Wang, Chinese Science Bulletin 54 , 347 (2009).\n[19] D. Meiser, J. Ye, D. R. Carlson, and M. J. Holland, Phys. Rev. Lett. 102 , 163601 (2009)\n[20] F. Strumia, Metrologia 8 , 85 (1972).\n[21] G. Kramer, J. Opt. Soc. Am. 68 , 1634 (1978).\n[22] V. S. Letokhov and B. D. Pavlik, Opt. Spectrosc. USSR 32 , 455 (1972).\n[23] Ye. V. Baklanov, B. Ya, Dubetsky, V. P. Chebotayev, Appl. Phys. 9 , 171 (1976).", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2670.pdf" + }, + { + "text": "The Linewidth of Ramsey Laser with Bad Cavity\nC 2 = 〈 -i σ j -( t j + 2 τ + T ) 〉 q . R is the mean pumping rate, which is defined in [26]. It is very easy to check that the average values of the above Langevin forces are all zero.\n2\nBy using the above definitions of the noise operators, we find the correlation functions of macroscopic noise forces can be generally written in the form\n〈 Fk ( t ) Fl ( t ' ) 〉 = D (0) kl δ ( t -t ' ) + D (1) kl δ ( t -t ' -τ ) + D (2) kl δ ( t -t ' + τ ) + D (3) kl δ ( t -t ' -τ -T ) + D (4) kl δ ( t -t ' + τ + T ) + D (5) kl δ ( t -t ' -2 τ -T ) + D (6) kl δ ( t -t ' + 2 τ + T ) + D (7) kl δ ( t -t ' -T ) + D (8) kl δ ( t -t ' + T ) , (7)\nwhere D ( i ) kl ( k , l = a , b , M , M † ; i = 0 , 1 , 2) are the quantum diffusion coe ffi cients.\nc-number correlation functions: By choosing some particular ordering for products of atomic and field operators, one could derive the c-number stochastic Langevin equations from the quantum Langevin equations derived above, and all of the dynamic equations for c-number stochastic variables are the same as in [26]. The di ff erences are from the correlation functions. On the other hand, we convert the quantum noise operators into the c-number noise variables ˜ Fk ( t )( k = a , b , M , M † ), whose correlation functions are expressed as", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2670.pdf" + }, + { + "text": "C Pretraining details\nTable 9 Frozen Evaluation hyper-parameters.\n(0.75, 1.33) (0.75, 1.33) (0.75, 1.33) (0.75, 1.33) (0.75, 1.33), IN1K = . random_resize_aspect_ratio (0.75, 1.33) (0.75, 1.33) (0.75, 1.33) (0.75, 1.33) (0.75, 1.33), Place205 = . random_resize_aspect_ratio (0.75, 1.33) (0.75, 1.33) (0.75, 1.33) (0.75, 1.33) (0.75, 1.33), iNat21 = . auto_augment, K400 = false. auto_augment, SSv2 = false. auto_augment, IN1K = true. auto_augment, Place205 = true. auto_augment, iNat21 = true. optimization, K400 = . optimization, SSv2 = . optimization, IN1K = . optimization, Place205 = . optimization, iNat21 = . batch_size, K400 = 256. batch_size, SSv2 = 256. batch_size, IN1K = 1024. batch_size, Place205 = 1024. batch_size, iNat21 = 1024. epochs, K400 = 20. epochs, SSv2 = 20. epochs, IN1K = 20. epochs, Place205 = 20. epochs, iNat21 = 20. lr, K400 = 1e-3. lr, SSv2 = 1e-3. lr, IN1K = 1e-3. lr, Place205 = 1e-3. lr, iNat21 = 1e-3. final_lr, K400 = 0. final_lr, SSv2 = 0. final_lr, IN1K = 0. final_lr, Place205 = 0. final_lr, iNat21 = 0. weight_decay, K400 = 0.01. weight_decay, SSv2 = 0.01. weight_decay, IN1K =", + "page_start": 17, + "page_end": 17, + "source_file": "arxiv3.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2449.pdf", + "query": "Give me the advantages of Ferromagnetic semiconductors", + "target_page": 1, + "target_passage": "Ferromagnetic (FM) semiconductors offer the prospect of combining high-density storage and gate-controlled logic in a single material.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nFerromagnetic (FM) semiconductors offer the prospect of combining high-density storage and gate-controlled logic in a single material. The realization of spin-valve devices from FM semiconductors requires the controlled switching of magnetization in adjacent layers between antiferromagnetic (AFM) and FM configurations. This has motivated several theoretical investigations of interlayer coupling in all-semiconductor devices 1 , and AFM coupling has recently been demonstrated in (Ga,Mn)As multilayers separated by p -type non-magnetic spacers 2 . However, the Curie temperature T C of (Ga,Mn)As is currently limited to 185 K in single layers 3 , and is typically much lower for layers embedded within a heterostructure 2 , which is an obstacle to the practical implementation of semiconductor spintronics.\nThe development of FM metal/FM semiconductor heterostructures has the potential to bring together the benefits of metal and semiconductor based spintronics, offering access to new functionalities and physical phenomena. Recent studies of MnAs/(Ga,Mn)As and NiFe/(Ga,Mn)As bilayer films have shown FM interlayer coupling and independent magnetization behavior, respectively 4,5 . Of particular interest is the Fe/(Ga,Mn)As system, since the growth of epitaxial Fe/GaAs(001) films is well-established 6 . Remarkably, a recent x-ray magnetic circular dichroism (XMCD) study has shown that Fe may induce a proximity polarization in the near-surface region of (Ga,Mn)As, antiparallel to the Fe moment and persisting even above room temperature 7 . Devices incorporating Fe/(Ga,Mn)As therefore offer the prospect of obtaining non-volatile room temperature spin-polarization in a semiconductor.\nUntil now, no information has been revealed about the coupling of Fe to (Ga,Mn)As layers away from the nearsurface region. At the surface, the (Ga,Mn)As layer may be highly non-stoichiometric and Mn-rich, due to its nonequilibrium nature 8,9 . Previously, Fe/(Ga,Mn)As layers were produced by a process including exposure to air followed by sputtering and annealing prior to Fe deposition,", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2449.pdf" + }, + { + "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\n2 J.-H. Chung, S. J. Chung, S. Lee, B. J. Kirby, J. A. Borchers, Y. J. Cho, X. Liu, and J. K. Furdyna, Phys. Rev. Lett. 101 , 237202 (2008).\n3 M. Wang, R. P. Campion, A. W. Rushforth, K. W. Edmonds, C. T. Foxon, and R. P. Campion, Appl. Phys. Lett. 93 , 132103 (2008).\n4 M. Zhu, M. J. Wilson, B. L. Sheu, P. Mitra, P. Schiffer, and N. Samarth, Appl. Phys. Lett. 91 , 192503 (2007); M. Zhu, M. J. Wilson, P. Mitra, P. Schiffer, and N. Samarth, Phys. Rev. B 78 , 195307 (2008).\n5 S. Mark, C. Gould, K. Pappert, J. Wenisch, K. Brunner, G. Schmidt, and L. W. Molenkamp, Phys. Rev. Lett. 103 , 017204 (2009).\n6 G. Wastlbauer and J.A.C. Bland, Adv. Phys. 54 , 137 (2005).\n7 F. Maccherozzi, M. Sperl, G. Panaccione, J. Minar, S.\n3\nmonolayers, assuming a uniform distribution of Mn ions and magnetic moments throughout the (Ga,Mn)As film. This is around a factor of three thinner than in Ref. 7 , which could be due to the lower Mn concentration or the different preparation method of the present samples.", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2449.pdf" + }, + { + "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nIn summary, we have demonstrated antiferromagnetic coupling between Fe and (Ga,Mn)As layers in bilayer structures. A markedly different coupling is observed for the bulk of the (Ga,Mn)As layer and for Mn moments in the near-interface region. A thickness-dependent exchange bias field is observed to affect the whole of the bulk (Ga,Mn)As layer, which aligns antiparallel to the Fe layer at low fields, and switches to parallel when the external field is large enough to overcome the bias field and the magnetocrystalline anisotropy fields. In contrast, the interfacial Mn moments remain aligned antiparallel to the Fe layer even at 20 kOe, the largest field studied, and are polarized at temperatures well above the T C of the bulk (Ga,Mn)As layer. The latter observation confirms the recently reported result of Ref. 7, in which the Fe/(Ga,Mn)As bilayers were produced by a different method but showed qualitatively similar behavior of the interfacial moments. Our results shed new light on the magnetic coupling in Fe/(Ga,Mn)As hybrid layers which are of potential interest for room temperature spintronics, and also offer a means of controlling the spin orientation in a FM semiconductor.\nWe acknowledge support from EU grants SemiSpinNet-215368 and NAMASTE-214499, and STFC studentship grant CMPC07100. The Advanced Light Source is supported by the U.S. Department of Energy under Contract No. DE-AC02-05CH11231. We thank Leigh Shelford for help during the Diamond beamtime.", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2449.pdf" + }, + { + "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nmeasurements were performed on beamline I06 at the Diamond Light Source, and on beamline 4.0.2 at the Advanced Light Source. Total-electron yield (TEY) and fluorescence yield (FY) were monitored simultaneously using the sample drain current and the photocurrent of a diode mounted at 90 · to the incident beam, respectively.\nSQUID magnetometry measurements were first performed on control Fe/GaAs(001) and (Ga,Mn)As/GaAs(001) samples, grown under the same conditions as the bilayers, to determine the magnetic anisotropies of the individual layers and the Curie temperature of the (Ga,Mn)As layer. The Fe film has a uniaxial magnetic anisotropy with easy axis along the [110] orientation, similar to previous studies 6 . For the (Ga,Mn)As control sample, there is a competition between cubic and uniaxial magnetic anisotropies, with the former dominant at low temperatures and favoring easy axes along the in-plane 〈 100 〉 orientations, and the latter dominant close to T C ( ∼ 35 K) giving an easy axis along the [1 ¯ 10] orientation. Figure 1 shows [110] magnetization versus temperature curves and low temperature hysteresis loops for a bilayer film containing a 20 nm thick (Ga,Mn)As layer. The total remnant moment of the bilayer film decreases on cooling under zero magnetic field below the T C of the (Ga,Mn)As, indicating that this layer aligns antiparallel to the Fe magnetization at zero field. The hysteresis curve shows a two-step magnetization reversal, indicating different behavior of the Fe and (Ga,Mn)As layers, with the smaller loop attributed to the dilute moment (Ga,Mn)As film. The minor hysteresis loop shown in Fig. 1 clearly shows a shift from zero field by a bias field H E , indicating that the Fe layer induces an exchange bias in the magnetic semiconductor. The shape and size of the minor loop is in agreement with the hysteresis loop for the control (Ga,Mn)As sample, also shown in Fig. 1. This strongly indicates that the exchange bias affects the whole of the (Ga,Mn)As layer in the bilayer sample.", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2449.pdf" + }, + { + "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nFIG. 1. (color) Main figure: Major (red/black) and minor (green) hysteresis loops along the [110] axis at 5 K, for a Fe (2 nm)/(Ga,Mn)As (20 nm) film, and the hysteresis loop for a control (Ga,Mn)As (20 nm) film along the same axis (blue). Left inset: Magnetization versus temperature for the Fe/(Ga,Mn)As film at remanence (black) and under a 500 Oe applied field (red). Right inset: Exchange bias field versus thickness d of the (Ga,Mn)As film (points) and fit showing 1/ d dependence (dashed line).\n/s32\n4\nM. Sawicki, M. Polini, J. Sinova, A. H. MacDonald, R. P. Campion, L. X. Zhao, N. R. S. Farley, T. K. Johal, G. van der Laan, C. T. Foxon, and B. L. Gallagher, Phys. Rev. B 73 , 165205 (2006).\n16 K. W. Edmonds, A. A. Freeman, N. R. S. Farley, K. Y. Wang, R. P. Campion, B. L. Gallagher, C. T. Foxon, G. van der Laan, and E. Arenholz, J. Appl. Phys. 102 , 023902 (2007).\nFIG. 2. (color online) XMCD asymmetry versus applied field along the [110] axis at 2 K, for a Fe (2 nm)/(Ga,Mn)As (10 nm) film. (a) Fe L 3 , total electron yield; (b) Mn L 3 , total electron yield; (c) Mn L 3 , fluorescent yield. Black and red points are data for increasing and decreasing fields respectively; lines are to guide the eye.\n/s32\n/s32\n/s32\n5\n/s32", + "page_start": 3, + "page_end": 5, + "source_file": "1001.2449.pdf" + }, + { + "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nPolesya, H. Ebert, U. Wurstbauer, M. Hochstrasser, G. Rossi, G. Woltersdorf, W. Wegscheider, and C. H. Back, Phys. Rev. Lett. 101 , 267201 (2008).\n8 R. P. Campion, K. W. Edmonds, L. X. Zhao, K. Y. Wang, C. T. Foxon, B. L. Gallagher, and C. R. Staddon, J. Crystal Growth 247 , 42 (2003).\n9 F. Maccherozzi, G. Panaccione, G. Rossi, M. Hochstrasser, M. Sperl, M. Reinwald, G. Woltersdorf, W. Wegscheider, and C. H. Back, Phys. Rev. B 74 , 104421 (2006).\n10 Ch. Binek, S. Polisetty, X. He and A. Berger, Phys. Rev. Lett. 96 , 067201 (2006).\n11 C. Won, Y.Z. Wu, E. Arenholz, J. Choi, J. Wu, and Z. Q. Qiu, Phys. Rev. Lett. 99 , 077203 (2007).\n12 J. Nogues and I. K. Schuller, J. Magn. Magn. Mater. 192 , 203 (1999).\n13 K. F. Eid, M. B. Stone, K. C. Ku, O. Maksimov, P. Schiffer, N. Samarth, T. C. Shih and C. J. Palmstrom, Appl. Phys. Lett. 85 , 1556 (2004).\n14 B. T. Thole, P. Carra, F. Sette, and G. van der Laan, Phys. Rev. Lett. 68 , 1943 (1992); P. Carra, B. T. Thole, M. Altarelli, and X. Wang, Phys. Rev. Lett. 70 , 694 (1993).\n15 T. Jungwirth, J. Masek, K. Y. Wang, K. W. Edmonds,", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2449.pdf" + }, + { + "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nThe interfacial Mn moments are ascribed to the proximity polarization of the (Ga,Mn)As interface by the Fe layer, such as was shown previously by XMCD as well as ab initio theory 7 . Evidence for this can be observed from measurement of the Mn L 2 , 3 XMCD signal at temperatures above the (Ga,Mn)As T C . Similar to the previous study 7 , we observe a small but not negligible signal at room temperature (Fig. 3), with opposite sign to the Fe L 2 , 3 XMCD. Its spectral shape is characteristic of a localized electronic configuration close to d 5 , similar to bulk (Ga,Mn)As 7,9,15 but in contrast to Mn in more metallic environments such as Mn x Fe 1 -x 7 or MnAs 16 . A slight broadening is observed on the low energy side of the Mn L 3 peak, which may be due to the different screening induced by proximity to the Fe layer. Since the measured intensity is attenuated with distance z from the surface as I = I 0 exp( -z/λ TEY ), the thickness of the strongly coupled interface layer is estimated to be ∼ 0.7 nm or 2-3\n1 T. Jungwirth, W. A. Atkinson, B. H. Lee, and A. H. MacDonald, Phys. Rev. B 59 , 9818 (1999); P. Sankowski and P. Kacman, Phys. Rev. B 71 , 201303(R) (2005); A. D. Giddings, T. Jungwirth, and B. L. Gallagher, Phys. Rev. B 78 , 165312 (2008); K. Szalowski and T. Balcerzak, Phys. Rev. B 79 , 214430 (2009).", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2449.pdf" + }, + { + "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nSimilar behavior is observed for bilayer samples containing a 10 nm or 50 nm (Ga,Mn)As layer, with a bias field which is approximately inversely proportional to the thickness d of the ferromagnetic semiconductor layer (Fig. 1, inset). This 1/ d dependence of H E was found previously for MnAs/(Ga,Mn)As bilayers 4 , and is generally observed in exchanged-biased thin films 12 . From this dependence it is possible to describe the exchange bias in terms of an interface energy per unit area, ∆ E = M FS H E d = 0 . 003 erg/cm 2 . This value is rather small compared to typical exchange bias systems 12 , reflecting the low moment density M FS of the diluted FM semiconductor layer. However, the bias field for a given (Ga,Mn)As thickness is larger than is observed for MnO/(Ga,Mn)As structures 13 , while the reproducibility and flexibility of the present structures is much higher due to the single-crystalline ferromagnetic nature of the Fe layer.\nTo confirm the presence of AFM interlayer coupling, we performed XMCD measurements at the Mn and Fe\n2\nL 2 , 3 absorption edges in order to determine the magnetic response of the individual elements. In L 2 , 3 XMCD, electrons are excited from a 2 p core level to the unoccupied 3 d valence states of the element of interest by circularly polarized x-rays at the resonance energies of the transitions. The difference in absorption for opposite polarizations gives a direct and element-specific measurement of the projection of the 3 d magnetic moment along the xray polarization vector. The absorption cross-section is conventionally obtained by measuring the decay products - either fluorescent x-rays or electrons - of the photoexcited core hole. The type of decay product measured determines the probing depth of the technique. For Mn L 2 , 3 absorption, the probing depths for FY and TEY detection are λ FY ≈ 100 nm and λ TEY ≈ 3 nm. In the current experiment, the Mn XMCD measured using FY and TEY are thus sensitive to the bulk of the (Ga,Mn)As film and the near-interface layers, respectively.", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2449.pdf" + }, + { + "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nClear differences are observed between the Mn XMCD hysteresis loops obtained using TEY and FY detection modes. For FY the magnitude of the XMCD is similar (but of opposite sign) at remanence and at high magnetic fields, whereas for TEY at remanence it is approximately a factor of two larger than at 1000 Oe. The Mn L 2 , 3 XMCD spectra recorded at remanence and at 1000 Oe, shown in Fig. 3, confirm this result. At remanence the FY and TEY detected XMCD have similar magnitudes. However, under a large external field the XMCD is substantially smaller in TEY than in FY, confirming that the net magnetization of the Mn ions near the interface is significantly less than in the bulk of the (Ga,Mn)As film. This is the case even up to the highest field applied (20 kOe). By applying the XMCD sum rules 14 to the TEY data, and by comparing the spectra to previous measurements on well-characterized (Ga,Mn)As\nsamples 15 , the projected Mn 3 d magnetic moments are obtained as -1.4 µ B and +0.8 µ B per ion at remanence and 1000 Oe, respectively.\nThe difference between these values can be understood as being due to an interface layer which is strongly antiferromagnetically coupled to the Fe layer. At zero field, both the interfacial and bulk Mn are aligned antiparallel to the Fe layer. At high fields, the bulk of the (Ga,Mn)As layer away from the interface is re-oriented into the external field direction. However, the interfacial Mn remains antiparallel to the Fe layer and thus partially compensates the XMCD signal from the bulk of the (Ga,Mn)As. From the size of the remanent and 1000 Oe magnetic moments, it can be estimated that around 25-30% of the TEY XMCD signal can be ascribed to the interfacial Mn which is strongly coupled to the Fe moments.", + "page_start": 1, + "page_end": 2, + "source_file": "1001.2449.pdf" + }, + { + "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nFigure 2(a)-(c) shows the magnetic field dependence of XMCD asymmetry, defined as ( I l -I r ) / ( I l + I r ) where I l ( r ) is the absorption for left- (right-) circularly polarized x-rays. This is measured at the Fe and Mn L 3 absorption peaks for a Fe(2 nm)/(Ga,Mn)As(10 nm) sample at 2 K. The external field is applied along the photon incidence direction, which is at 70 · to the surface normal with an in-plane projection along the [110] axis. The XMCD data show that the Fe film displays a square hysteresis loop with a single magnetization switch, as expected for a monocrystalline Fe film with strong uniaxial magnetic anisotropy. The Mn XMCD shows a more complicated loop due to the effect of the interlayer coupling. The projected Mn moment aligns antiparallel to the Fe moment at remanence, and undergoes a magnetization reversal of opposite sign to the Fe. With further increase of the external magnetic field, the Mn moment gradually rotates away from antiparallel alignment with the Fe layer, and into the field direction. Qualitatively similar behavior is observed for the Fe(2 nm)/(Ga,Mn)As(20 nm) sample: the (Ga,Mn)As layer is aligned antiparallel to the Fe layer at zero field, although the bias field is lower by approximately a factor of two.", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2449.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2449.pdf", + "query": "I do not remember on wich samples SQUID magnetometry measurements were first performed", + "target_page": 2, + "target_passage": "SQUID magnetometry measurements were first performed on control Fe/GaAs(001) and (Ga,Mn)As/GaAs(001) samples", + "chunk_present": { + "presence": true, + "index": 4 + } + }, + "top_chunk": [ + { + "text": "Acknowledgements\n20 for a review see F. Marsiglio, J. Superconductivity and Novel Magnetism 22 , 269 (2009).\n21 F. Marsiglio, E. van Heumen, A. B. Kuzmenko, Phys. Rev. B 77 144510 (2008).\n22 M. R. Norman, A. V. Chubukov, E. van Heumen, A. B. Kuzmenko, and D. van der Marel, Phys. Rev. B 76 , 220509 (2007).\n23 J. E. Hirsch and F. Marsiglio, Physica C 331 , 150 (2000)\n15", + "page_start": 14, + "page_end": 14, + "source_file": "1001.0764.pdf" + }, + { + "text": "III. RESULTS\nWe now move to describe and discuss MC simulation data for thinner samples. A graphical synthesis of the results obtained for n = 8 in reported in Fig. 4a-d. The specific heat c v , shown in Figs. 4a, reveals very small finite-size effects, which, however, cannot be unambiguously detected for the largest lattice size ( L = 64), as they fall comfortably within the error range. Surprisingly, the specific heat maximum is located close to the bulk transition temperature as found for n = 16, and\nFIG. 5: Transition temperatures T N ( n ) and T C ( n ) vs. film thickness n .\nthe same is true for the crossing point of the Binder cumulant of the average magnetization M (not reported in figure), which is located at T C (8) = 133 . 3(3)K. These data give a first rough indication that also for n = 8 all the planes of the sample are still ordering almost at the same temperature; such property has been observed for all the investigated thicknesses n below 16, so that T C ( n ) results quite n -independent (see also Fig. 5) .\nAlthough the layer subtraction does not seem to modify T C ( n ), the onset of helical arrangement is observed to shift at lower temperatures as n decreases. The chirality κ defined in Eq. (4) is reported in Fig 4b for n = 8. As the temperature decreases, around T ∼ 80K we can identify a finite-size behaviour of κ which, at variance with the previous one, can be easily recognized as typical of an effective phase transition. Such conclusion is confirmed by the analysis of the chiral susceptibility χ κ (Fig. 4c), which for the largest L has a maximum at T = 85K. Assuming that the order parameter (4) is the relevant one to single out the onset of the fan arrangement, we can get a more accurate estimate of T N (8) by looking at the Binder cumulant u 4 ( κ ), reported in Fig. 4d. By making use of the MH technique, we locate the crossing point at T N (8) = 92(2) K. Finally, it is worthwhile to observe as the specific heat does not show any anomaly at T N (8), being the entropy substantially removed at T C (8).", + "page_start": 3, + "page_end": 4, + "source_file": "1001.0510.pdf" + }, + { + "text": "II. MODEL HAMILTONIAN AND MONTE CARLO OBSERVABLES\n-24.2 K, that we have employed in our simulations. The given values for the exchange constants are the same already used by Weschke et al. in Ref. 13 to interpret experimental data on Holmium films on the basis of a J 1 -J 2 model, after a proper scaling by the numbers of NN and NNN on neighboring layers of a BCT lattice.\nIn the following we will denote with n the film thickness, i.e. the number of spin layers along the z direction, and with L × L the number of spins in each layer (i.e., L is the lattice size along both the x and y directions). In our simulations thickness values from 1 to 24 were considered, while the range of lateral size L was from 8 to 64. Periodic boundary conditions were applied along x and y , while free boundaries were obviously taken along the film growth direction z .\nThermal equilibrium was attained by the usual Metropolis algorithm 19 , supplemented by the overrelaxed technique 20 in order to speed-up the sampling of the spin configuration space: a typical 'Monte Carlo step' was composed by four Metropolis and four-five over-relaxed moves per particle. Such judicious mix of moves is able both to get faster the thermal equilibrium and to minimize the correlation 'time' between successive samples, i.e. the undesired effects due to lack of in-\ndependence of different samples during the measurement stage. For each temperature we have usually performed three independent simulations, each one containing at least 2 × 10 5 measurements, taken after discarding up to 5 × 10 4 Monte Carlo steps in order to assure thermal equilibration.\nIn the proximity of the critical region the multiple histogram (MH) technique was also employed 21 , as it allows us to estimate the physical observables of interest over a whole temperature range in a substantially continuous way by interpolating results obtained from sets of simulations performed at some different temperatures.", + "page_start": 1, + "page_end": 2, + "source_file": "1001.0510.pdf" + }, + { + "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nClear differences are observed between the Mn XMCD hysteresis loops obtained using TEY and FY detection modes. For FY the magnitude of the XMCD is similar (but of opposite sign) at remanence and at high magnetic fields, whereas for TEY at remanence it is approximately a factor of two larger than at 1000 Oe. The Mn L 2 , 3 XMCD spectra recorded at remanence and at 1000 Oe, shown in Fig. 3, confirm this result. At remanence the FY and TEY detected XMCD have similar magnitudes. However, under a large external field the XMCD is substantially smaller in TEY than in FY, confirming that the net magnetization of the Mn ions near the interface is significantly less than in the bulk of the (Ga,Mn)As film. This is the case even up to the highest field applied (20 kOe). By applying the XMCD sum rules 14 to the TEY data, and by comparing the spectra to previous measurements on well-characterized (Ga,Mn)As\nsamples 15 , the projected Mn 3 d magnetic moments are obtained as -1.4 µ B and +0.8 µ B per ion at remanence and 1000 Oe, respectively.\nThe difference between these values can be understood as being due to an interface layer which is strongly antiferromagnetically coupled to the Fe layer. At zero field, both the interfacial and bulk Mn are aligned antiparallel to the Fe layer. At high fields, the bulk of the (Ga,Mn)As layer away from the interface is re-oriented into the external field direction. However, the interfacial Mn remains antiparallel to the Fe layer and thus partially compensates the XMCD signal from the bulk of the (Ga,Mn)As. From the size of the remanent and 1000 Oe magnetic moments, it can be estimated that around 25-30% of the TEY XMCD signal can be ascribed to the interfacial Mn which is strongly coupled to the Fe moments.", + "page_start": 1, + "page_end": 2, + "source_file": "1001.2449.pdf" + }, + { + "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nmeasurements were performed on beamline I06 at the Diamond Light Source, and on beamline 4.0.2 at the Advanced Light Source. Total-electron yield (TEY) and fluorescence yield (FY) were monitored simultaneously using the sample drain current and the photocurrent of a diode mounted at 90 · to the incident beam, respectively.\nSQUID magnetometry measurements were first performed on control Fe/GaAs(001) and (Ga,Mn)As/GaAs(001) samples, grown under the same conditions as the bilayers, to determine the magnetic anisotropies of the individual layers and the Curie temperature of the (Ga,Mn)As layer. The Fe film has a uniaxial magnetic anisotropy with easy axis along the [110] orientation, similar to previous studies 6 . For the (Ga,Mn)As control sample, there is a competition between cubic and uniaxial magnetic anisotropies, with the former dominant at low temperatures and favoring easy axes along the in-plane 〈 100 〉 orientations, and the latter dominant close to T C ( ∼ 35 K) giving an easy axis along the [1 ¯ 10] orientation. Figure 1 shows [110] magnetization versus temperature curves and low temperature hysteresis loops for a bilayer film containing a 20 nm thick (Ga,Mn)As layer. The total remnant moment of the bilayer film decreases on cooling under zero magnetic field below the T C of the (Ga,Mn)As, indicating that this layer aligns antiparallel to the Fe magnetization at zero field. The hysteresis curve shows a two-step magnetization reversal, indicating different behavior of the Fe and (Ga,Mn)As layers, with the smaller loop attributed to the dilute moment (Ga,Mn)As film. The minor hysteresis loop shown in Fig. 1 clearly shows a shift from zero field by a bias field H E , indicating that the Fe layer induces an exchange bias in the magnetic semiconductor. The shape and size of the minor loop is in agreement with the hysteresis loop for the control (Ga,Mn)As sample, also shown in Fig. 1. This strongly indicates that the exchange bias affects the whole of the (Ga,Mn)As layer in the bilayer sample.", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2449.pdf" + }, + { + "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\n2 J.-H. Chung, S. J. Chung, S. Lee, B. J. Kirby, J. A. Borchers, Y. J. Cho, X. Liu, and J. K. Furdyna, Phys. Rev. Lett. 101 , 237202 (2008).\n3 M. Wang, R. P. Campion, A. W. Rushforth, K. W. Edmonds, C. T. Foxon, and R. P. Campion, Appl. Phys. Lett. 93 , 132103 (2008).\n4 M. Zhu, M. J. Wilson, B. L. Sheu, P. Mitra, P. Schiffer, and N. Samarth, Appl. Phys. Lett. 91 , 192503 (2007); M. Zhu, M. J. Wilson, P. Mitra, P. Schiffer, and N. Samarth, Phys. Rev. B 78 , 195307 (2008).\n5 S. Mark, C. Gould, K. Pappert, J. Wenisch, K. Brunner, G. Schmidt, and L. W. Molenkamp, Phys. Rev. Lett. 103 , 017204 (2009).\n6 G. Wastlbauer and J.A.C. Bland, Adv. Phys. 54 , 137 (2005).\n7 F. Maccherozzi, M. Sperl, G. Panaccione, J. Minar, S.\n3\nmonolayers, assuming a uniform distribution of Mn ions and magnetic moments throughout the (Ga,Mn)As film. This is around a factor of three thinner than in Ref. 7 , which could be due to the lower Mn concentration or the different preparation method of the present samples.", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2449.pdf" + }, + { + "text": "III. RESULTS\nThe scenario just outlined for n = 8 results to be correct in the thickness range 6 ≤ n /lessorsimilar 15, where a clear separation between T N ( n ) and T C ( n ) can be easily figured out. In such temperature window, the strong surface effects produce a quasi -FM set-up of the magnetic film structure along the z -direction. While leaving to the next Section a more detailed discussion of this regime, we report in Fig. 5 a plot of T N ( n ) and T C ( n ) vs. n for all the simulated thicknesses. The separation between the two critical temperatures is maximum for n = 6, where T N (6) = 38(4), that is T N (6) ∼ 1 3 T C (6). For films with less than six layers no fan order is observed, i.e. for n = 5 and below the chirality does not display any typical feature of fan ordering at any temperature below T C ( n ). As a representative quantity we finally look at the rotation\n5\nFIG. 6: Rotation angle ∆ ϕ l between magnetic moments on NN layers ( l + 1 , l ) at some low temperatures, for thickness n = 5 and n = 6, and lateral dimension L = 64.\nangle of the magnetization between nearest planes:\n∆ ϕ l = ϕ l +1 -ϕ l = arccos [ M x l M x l +1 + M y l M y l +1 ] (10)\nwhere ( M x l , M y l ) is the magnetic vector profile for each plane l . ∆ ϕ l is displayed in Fig. 6a and Fig. 6b, for n = 6 and n = 5, respectively. In Fig. 6a, a quite clear fan stabilization is observed when the temperature decreases, while in Fig. 6b, i.e. for n = 5, ∆ ϕ l keeps an almost temperature independent very small value; what's more, ∆ ϕ l seems to loose any temperature dependence as T = 0 is approached. We attribute the absence of fan arrangement for n ≤ 5 as simply due to the lack of 'bulk planes' inside the film, so that we are left with only a 2d trend at T C ( n ), i.e. at the temperature where the order parameters defined in Eqs. (2) and (3) show a critical behaviour.", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0510.pdf" + }, + { + "text": "IV. DISCUSSION AND CONCLUSION\nFor this purpose, we look at the temperature dependence of the rotation angle of the magnetization between NN planes. In Fig. 7, ∆ ϕ l ( T ) for n = 8 and n = 16 (continuous and dashed lines, respectively), is plotted for the outermost planes, l = 1 . . . 4. For both thicknesses, a monotonic trend is observed for all l , but at variance with what happens for the highest thickness, for n = 8 we see, starting from a temperature T /lessorsimilar T N (8), an abrupt drop of ∆ ϕ 3 and ∆ ϕ 4 , which rapidly reach an almost constant value, only slightly larger than ∆ ϕ 1 . In the temperature range T N (8) /lessorsimilar T < T C (8) we thus substantially observe the same small magnetic phase shifts between all NN layers, testifying an energetically stable quasi -FM configuration giving no contribution to the helical order parameters. The latter point can be made clearer by looking at the the peak position Q z,max of the structure factor S (0 , 0 , q z ). In Fig. 8 the average of Q z,max vs T is reported, again for n = 8 and for different lateral dimensions L 26 . As expected from the previous argument, we see that Q z,max = 0 for T N (8) < T < T C (8), while it begins to shift to higher values as soon as the temperature decreases below T N (8), making apparent a progressive fan stabilization with Q z,max = 0 and reaching a value of about 21 · for T = 10K.\nIn a previous study, where the magnetic properties of Ho thin films were investigated by MC simulations of a Heisenberg model with easy-plane single-ion anisotropy and six out-of-plane coupling constants (as obtained by experimental neutron scattering measurements 16 ) on a HCPlattice 14,15 , it was found that for thicknesses comparable with the helical pitch the phase diagram landscape is quite different from what we find here. Indeed, for n = 9 -16, three different magnetic phases could be sin-\n6", + "page_start": 5, + "page_end": 5, + "source_file": "1001.0510.pdf" + }, + { + "text": "III. RESULTS\nThe results obtained by MC simulations of the model introduced in Sec. II will be presented starting from n = 16, i.e. the highest investigated film thickness which still displays a bulk-like behaviour. In Fig. 2 the specific heat for samples with n = 16 and lateral dimension L = 24 , 32 , 48 , 64 is shown. The location of the specific heat maximum shows a quite definite evolution toward the bulk transition temperature, T Ho N /similarequal 132K 10 (it is worthwhile to note that for this XY model the mean field theory predicts a critical temperature T Ho N,MF /similarequal 198K).\nThe intensity of the maximum of c v has been analyzed by the MH technique for the same lateral dimensions (see inset of Fig. 2): it clearly appears as it increases with L in a smooth way.\nThe Binder cumulant for the average order parameter defined in Eq. (3) was obtained close to the c v peak and is reported in Fig. 3a; its analysis leads to an estimate of the critical temperature of the sample (given by the location of the common crossing point of the different curves reported in the figure) of T C (16) = 133 . 2(5) This value can be considered in a rather good agreement with the experimental ordering temperature of Holmium T Ho N , the relative difference being about 1%. Even such a mismatch between T Ho N and T C (16) could be completely eliminated by slightly adjusting the in-plane coupling constant J 0 , but, as discussed in Sec. II, we shall preserve the value reported in Refs. 13, and 12 in order to allow for a correct comparison with the results reported in those papers.\nThe development of the helical arrangement of magnetization along the film growth direction was investigated by looking at the integral of the structure factor S ( /vector q ) along the z -direction, i.e. by taking /vector q = (0 , 0 , q z ), and making again use of the cumulant analysis in order to locate the helical transition temperature at T N (16) =\n4", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0510.pdf" + }, + { + "text": "Acknowledgments\nThis research is supported by grants from the US Department of Energy, the US National Science Foundation, and the Smithsonian Institution, by NSERC in Canada, by Science Foundation Ireland, and by STFC in the UK. We acknowledge the excellent work of the technical support staff at the FLWO and the collab-\neConf C091122\norating institutions in the construction and operation of the instrument.", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0770.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2449.pdf", + "query": "What are the differences observed between the Mn XMCD hysteresis loops obtained using TEY and FY detection modes ?", + "target_page": 2, + "target_passage": "For FY the magnitude of the XMCD is similar (but of opposite sign) at remanence and at high mag netic fields, whereas for TEY at remanence it is approx imately a factor of two larger than at 1000 Oe.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nClear differences are observed between the Mn XMCD hysteresis loops obtained using TEY and FY detection modes. For FY the magnitude of the XMCD is similar (but of opposite sign) at remanence and at high magnetic fields, whereas for TEY at remanence it is approximately a factor of two larger than at 1000 Oe. The Mn L 2 , 3 XMCD spectra recorded at remanence and at 1000 Oe, shown in Fig. 3, confirm this result. At remanence the FY and TEY detected XMCD have similar magnitudes. However, under a large external field the XMCD is substantially smaller in TEY than in FY, confirming that the net magnetization of the Mn ions near the interface is significantly less than in the bulk of the (Ga,Mn)As film. This is the case even up to the highest field applied (20 kOe). By applying the XMCD sum rules 14 to the TEY data, and by comparing the spectra to previous measurements on well-characterized (Ga,Mn)As\nsamples 15 , the projected Mn 3 d magnetic moments are obtained as -1.4 µ B and +0.8 µ B per ion at remanence and 1000 Oe, respectively.\nThe difference between these values can be understood as being due to an interface layer which is strongly antiferromagnetically coupled to the Fe layer. At zero field, both the interfacial and bulk Mn are aligned antiparallel to the Fe layer. At high fields, the bulk of the (Ga,Mn)As layer away from the interface is re-oriented into the external field direction. However, the interfacial Mn remains antiparallel to the Fe layer and thus partially compensates the XMCD signal from the bulk of the (Ga,Mn)As. From the size of the remanent and 1000 Oe magnetic moments, it can be estimated that around 25-30% of the TEY XMCD signal can be ascribed to the interfacial Mn which is strongly coupled to the Fe moments.", + "page_start": 1, + "page_end": 2, + "source_file": "1001.2449.pdf" + }, + { + "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nFigure 2(a)-(c) shows the magnetic field dependence of XMCD asymmetry, defined as ( I l -I r ) / ( I l + I r ) where I l ( r ) is the absorption for left- (right-) circularly polarized x-rays. This is measured at the Fe and Mn L 3 absorption peaks for a Fe(2 nm)/(Ga,Mn)As(10 nm) sample at 2 K. The external field is applied along the photon incidence direction, which is at 70 · to the surface normal with an in-plane projection along the [110] axis. The XMCD data show that the Fe film displays a square hysteresis loop with a single magnetization switch, as expected for a monocrystalline Fe film with strong uniaxial magnetic anisotropy. The Mn XMCD shows a more complicated loop due to the effect of the interlayer coupling. The projected Mn moment aligns antiparallel to the Fe moment at remanence, and undergoes a magnetization reversal of opposite sign to the Fe. With further increase of the external magnetic field, the Mn moment gradually rotates away from antiparallel alignment with the Fe layer, and into the field direction. Qualitatively similar behavior is observed for the Fe(2 nm)/(Ga,Mn)As(20 nm) sample: the (Ga,Mn)As layer is aligned antiparallel to the Fe layer at zero field, although the bias field is lower by approximately a factor of two.", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2449.pdf" + }, + { + "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nFIG. 1. (color) Main figure: Major (red/black) and minor (green) hysteresis loops along the [110] axis at 5 K, for a Fe (2 nm)/(Ga,Mn)As (20 nm) film, and the hysteresis loop for a control (Ga,Mn)As (20 nm) film along the same axis (blue). Left inset: Magnetization versus temperature for the Fe/(Ga,Mn)As film at remanence (black) and under a 500 Oe applied field (red). Right inset: Exchange bias field versus thickness d of the (Ga,Mn)As film (points) and fit showing 1/ d dependence (dashed line).\n/s32\n4\nM. Sawicki, M. Polini, J. Sinova, A. H. MacDonald, R. P. Campion, L. X. Zhao, N. R. S. Farley, T. K. Johal, G. van der Laan, C. T. Foxon, and B. L. Gallagher, Phys. Rev. B 73 , 165205 (2006).\n16 K. W. Edmonds, A. A. Freeman, N. R. S. Farley, K. Y. Wang, R. P. Campion, B. L. Gallagher, C. T. Foxon, G. van der Laan, and E. Arenholz, J. Appl. Phys. 102 , 023902 (2007).\nFIG. 2. (color online) XMCD asymmetry versus applied field along the [110] axis at 2 K, for a Fe (2 nm)/(Ga,Mn)As (10 nm) film. (a) Fe L 3 , total electron yield; (b) Mn L 3 , total electron yield; (c) Mn L 3 , fluorescent yield. Black and red points are data for increasing and decreasing fields respectively; lines are to guide the eye.\n/s32\n/s32\n/s32\n5\n/s32", + "page_start": 3, + "page_end": 5, + "source_file": "1001.2449.pdf" + }, + { + "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nmeasurements were performed on beamline I06 at the Diamond Light Source, and on beamline 4.0.2 at the Advanced Light Source. Total-electron yield (TEY) and fluorescence yield (FY) were monitored simultaneously using the sample drain current and the photocurrent of a diode mounted at 90 · to the incident beam, respectively.\nSQUID magnetometry measurements were first performed on control Fe/GaAs(001) and (Ga,Mn)As/GaAs(001) samples, grown under the same conditions as the bilayers, to determine the magnetic anisotropies of the individual layers and the Curie temperature of the (Ga,Mn)As layer. The Fe film has a uniaxial magnetic anisotropy with easy axis along the [110] orientation, similar to previous studies 6 . For the (Ga,Mn)As control sample, there is a competition between cubic and uniaxial magnetic anisotropies, with the former dominant at low temperatures and favoring easy axes along the in-plane 〈 100 〉 orientations, and the latter dominant close to T C ( ∼ 35 K) giving an easy axis along the [1 ¯ 10] orientation. Figure 1 shows [110] magnetization versus temperature curves and low temperature hysteresis loops for a bilayer film containing a 20 nm thick (Ga,Mn)As layer. The total remnant moment of the bilayer film decreases on cooling under zero magnetic field below the T C of the (Ga,Mn)As, indicating that this layer aligns antiparallel to the Fe magnetization at zero field. The hysteresis curve shows a two-step magnetization reversal, indicating different behavior of the Fe and (Ga,Mn)As layers, with the smaller loop attributed to the dilute moment (Ga,Mn)As film. The minor hysteresis loop shown in Fig. 1 clearly shows a shift from zero field by a bias field H E , indicating that the Fe layer induces an exchange bias in the magnetic semiconductor. The shape and size of the minor loop is in agreement with the hysteresis loop for the control (Ga,Mn)As sample, also shown in Fig. 1. This strongly indicates that the exchange bias affects the whole of the (Ga,Mn)As layer in the bilayer sample.", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2449.pdf" + }, + { + "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nFIG. 3. (color online) (a) Polarization-averaged Mn L 2 , 3 spectrum for a Fe/(Ga,Mn)As film; (b) XMCD spectra measured in remanence at 2 K; (c) XMCD spectra measured under a 1000 Oe applied field at 2 K; (d) XMCD spectrum measured under a 2000 Oe applied field at 300 K. XMCD spectra are obtained using TEY (thick red lines) and FY (thin blue lines) detection.\n/s32\n6", + "page_start": 5, + "page_end": 5, + "source_file": "1001.2449.pdf" + }, + { + "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nSimilar behavior is observed for bilayer samples containing a 10 nm or 50 nm (Ga,Mn)As layer, with a bias field which is approximately inversely proportional to the thickness d of the ferromagnetic semiconductor layer (Fig. 1, inset). This 1/ d dependence of H E was found previously for MnAs/(Ga,Mn)As bilayers 4 , and is generally observed in exchanged-biased thin films 12 . From this dependence it is possible to describe the exchange bias in terms of an interface energy per unit area, ∆ E = M FS H E d = 0 . 003 erg/cm 2 . This value is rather small compared to typical exchange bias systems 12 , reflecting the low moment density M FS of the diluted FM semiconductor layer. However, the bias field for a given (Ga,Mn)As thickness is larger than is observed for MnO/(Ga,Mn)As structures 13 , while the reproducibility and flexibility of the present structures is much higher due to the single-crystalline ferromagnetic nature of the Fe layer.\nTo confirm the presence of AFM interlayer coupling, we performed XMCD measurements at the Mn and Fe\n2\nL 2 , 3 absorption edges in order to determine the magnetic response of the individual elements. In L 2 , 3 XMCD, electrons are excited from a 2 p core level to the unoccupied 3 d valence states of the element of interest by circularly polarized x-rays at the resonance energies of the transitions. The difference in absorption for opposite polarizations gives a direct and element-specific measurement of the projection of the 3 d magnetic moment along the xray polarization vector. The absorption cross-section is conventionally obtained by measuring the decay products - either fluorescent x-rays or electrons - of the photoexcited core hole. The type of decay product measured determines the probing depth of the technique. For Mn L 2 , 3 absorption, the probing depths for FY and TEY detection are λ FY ≈ 100 nm and λ TEY ≈ 3 nm. In the current experiment, the Mn XMCD measured using FY and TEY are thus sensitive to the bulk of the (Ga,Mn)As film and the near-interface layers, respectively.", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2449.pdf" + }, + { + "text": "III. RESULTS\nWe now move to describe and discuss MC simulation data for thinner samples. A graphical synthesis of the results obtained for n = 8 in reported in Fig. 4a-d. The specific heat c v , shown in Figs. 4a, reveals very small finite-size effects, which, however, cannot be unambiguously detected for the largest lattice size ( L = 64), as they fall comfortably within the error range. Surprisingly, the specific heat maximum is located close to the bulk transition temperature as found for n = 16, and\nFIG. 5: Transition temperatures T N ( n ) and T C ( n ) vs. film thickness n .\nthe same is true for the crossing point of the Binder cumulant of the average magnetization M (not reported in figure), which is located at T C (8) = 133 . 3(3)K. These data give a first rough indication that also for n = 8 all the planes of the sample are still ordering almost at the same temperature; such property has been observed for all the investigated thicknesses n below 16, so that T C ( n ) results quite n -independent (see also Fig. 5) .\nAlthough the layer subtraction does not seem to modify T C ( n ), the onset of helical arrangement is observed to shift at lower temperatures as n decreases. The chirality κ defined in Eq. (4) is reported in Fig 4b for n = 8. As the temperature decreases, around T ∼ 80K we can identify a finite-size behaviour of κ which, at variance with the previous one, can be easily recognized as typical of an effective phase transition. Such conclusion is confirmed by the analysis of the chiral susceptibility χ κ (Fig. 4c), which for the largest L has a maximum at T = 85K. Assuming that the order parameter (4) is the relevant one to single out the onset of the fan arrangement, we can get a more accurate estimate of T N (8) by looking at the Binder cumulant u 4 ( κ ), reported in Fig. 4d. By making use of the MH technique, we locate the crossing point at T N (8) = 92(2) K. Finally, it is worthwhile to observe as the specific heat does not show any anomaly at T N (8), being the entropy substantially removed at T C (8).", + "page_start": 3, + "page_end": 4, + "source_file": "1001.0510.pdf" + }, + { + "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nwhich may further disrupt the interface order. The origin of the interface magnetism then had to be inferred by comparison to a series of reference samples 7 . Demonstration of coupling between the bulk of the layers, i.e. , an exchange bias effect, would provide direct evidence of the interface magnetic order. Moreover, such coupling would offer new means of manipulating the FM semiconductor spin state and utilizing the proximity polarization effect in a spintronic device.\nHere, we demonstrate an antiferromagnetic coupling and exchange bias in Fe/(Ga,Mn)As bilayer films, by combining element-specific XMCD measurements and bulk-sensitive superconducting quantum interference device (SQUID) magnetometry. As with previous studies of FM metal/FM semiconductor bilayers 4,5 (and in contrast to AFM coupled FM metal/FM metal exchange bias structures 10,11 ) the layers are in direct contact without a non-magnetic spacer in between. We distinguish interface and bulk (Ga,Mn)As layers that are respectively strongly and weakly antiferromagnetically coupled to the Fe overlayer. In agreement with Ref. 7 , the interface layer remains polarized at room temperature.\nThe Fe and (Ga,Mn)As layers of the present study were both grown by molecular beam epitaxy in the same ultra-high vacuum system, in order to ensure a clean interface between them. The (Ga,Mn)As layer of thickness 10 to 50 nm was deposited on a GaAs(001) substrate at a temperature of 260 · C, using previously established methods 3,8 . A low Mn concentration of x ≈ 0 . 03 was chosen in order to avoid the formation of compensating Mn interstitials. The substrate temperature was then reduced to ∼ 0 · C, before depositing a 2 nm Fe layer, plus a 2 nm Al capping layer. In-situ reflection high energy electron diffraction and ex-situ x-ray reflectivity and diffraction measurements confirmed that the layers are single-crystalline with sub-nm interface roughness. SQUID magnetometry measurements were performed using a Quantum Design Magnetic Property Measurement System. Mn and Fe L 2 , 3 x-ray absorption and XMCD", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2449.pdf" + }, + { + "text": "III. RESULTS\nThe results obtained by MC simulations of the model introduced in Sec. II will be presented starting from n = 16, i.e. the highest investigated film thickness which still displays a bulk-like behaviour. In Fig. 2 the specific heat for samples with n = 16 and lateral dimension L = 24 , 32 , 48 , 64 is shown. The location of the specific heat maximum shows a quite definite evolution toward the bulk transition temperature, T Ho N /similarequal 132K 10 (it is worthwhile to note that for this XY model the mean field theory predicts a critical temperature T Ho N,MF /similarequal 198K).\nThe intensity of the maximum of c v has been analyzed by the MH technique for the same lateral dimensions (see inset of Fig. 2): it clearly appears as it increases with L in a smooth way.\nThe Binder cumulant for the average order parameter defined in Eq. (3) was obtained close to the c v peak and is reported in Fig. 3a; its analysis leads to an estimate of the critical temperature of the sample (given by the location of the common crossing point of the different curves reported in the figure) of T C (16) = 133 . 2(5) This value can be considered in a rather good agreement with the experimental ordering temperature of Holmium T Ho N , the relative difference being about 1%. Even such a mismatch between T Ho N and T C (16) could be completely eliminated by slightly adjusting the in-plane coupling constant J 0 , but, as discussed in Sec. II, we shall preserve the value reported in Refs. 13, and 12 in order to allow for a correct comparison with the results reported in those papers.\nThe development of the helical arrangement of magnetization along the film growth direction was investigated by looking at the integral of the structure factor S ( /vector q ) along the z -direction, i.e. by taking /vector q = (0 , 0 , q z ), and making again use of the cumulant analysis in order to locate the helical transition temperature at T N (16) =\n4", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0510.pdf" + }, + { + "text": "Exchange bias of a ferromagnetic semiconductor by a ferromagnetic metal\nPolesya, H. Ebert, U. Wurstbauer, M. Hochstrasser, G. Rossi, G. Woltersdorf, W. Wegscheider, and C. H. Back, Phys. Rev. Lett. 101 , 267201 (2008).\n8 R. P. Campion, K. W. Edmonds, L. X. Zhao, K. Y. Wang, C. T. Foxon, B. L. Gallagher, and C. R. Staddon, J. Crystal Growth 247 , 42 (2003).\n9 F. Maccherozzi, G. Panaccione, G. Rossi, M. Hochstrasser, M. Sperl, M. Reinwald, G. Woltersdorf, W. Wegscheider, and C. H. Back, Phys. Rev. B 74 , 104421 (2006).\n10 Ch. Binek, S. Polisetty, X. He and A. Berger, Phys. Rev. Lett. 96 , 067201 (2006).\n11 C. Won, Y.Z. Wu, E. Arenholz, J. Choi, J. Wu, and Z. Q. Qiu, Phys. Rev. Lett. 99 , 077203 (2007).\n12 J. Nogues and I. K. Schuller, J. Magn. Magn. Mater. 192 , 203 (1999).\n13 K. F. Eid, M. B. Stone, K. C. Ku, O. Maksimov, P. Schiffer, N. Samarth, T. C. Shih and C. J. Palmstrom, Appl. Phys. Lett. 85 , 1556 (2004).\n14 B. T. Thole, P. Carra, F. Sette, and G. van der Laan, Phys. Rev. Lett. 68 , 1943 (1992); P. Carra, B. T. Thole, M. Altarelli, and X. Wang, Phys. Rev. Lett. 70 , 694 (1993).\n15 T. Jungwirth, J. Masek, K. Y. Wang, K. W. Edmonds,", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2449.pdf" + } + ] + }, + { + "references": { + "source_file": "ASX_KCN_2013.pdf", + "query": "What is Kingsgate ?", + "target_page": 2, + "target_passage": "Kingsgate is a highly successful gold mining, development and exploration company with two operating gold mines and two advanced development projects.", + "chunk_present": { + "presence": true, + "index": 4 + } + }, + "top_chunk": [ + { + "text": "Operations Report\nwww.kingsgate.com.au\nu", + "page_start": 13, + "page_end": 13, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Corporate Information\nKingsgate Consolidated Limited ABN 42 000 837 472", + "page_start": 117, + "page_end": 117, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Stock Exchange Listing\nKingsgate Consolidated Limited is a Company limited by shares, listed on the Australian Stock Exchange under the code KCN. The Company's shares also trade in the United States of America over-the-counter (OTC) as an American Depository Receipt (ADR) under the code OTC: KSKGY.", + "page_start": 117, + "page_end": 117, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Principal activities\nThe principal activities of Kingsgate Consolidated Limited are mining and mineral exploration in Australia, South East Asia and South America.", + "page_start": 43, + "page_end": 43, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "2013 Annual Report\ncontinued\nu\nTHAI LA ND\nwww.kingsgate.com.au\nKingsgate is a highly successful gold mining, development and exploration company with two operating gold mines and two advanced development projects. Shareholders can look forward to the benefits of this strong operating and development platform, where Kingsgate aims to build value though operating, earnings and dividend growth for the benefit of all stakeholders.\nAUST RA LI\nA\n1\nContents", + "page_start": 0, + "page_end": 2, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Responsibilities:\nMember of the Audit Committee, Remuneration Committee and Nomination Committee.\nwww.kingsgate.com.au", + "page_start": 49, + "page_end": 49, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "General Manager - Human Resources\nBrett Dunstone joined Kingsgate in December 2012 and has over 25 years experience in senior human resource management roles across a diverse industry portfolio. Brett was formerly head of Human Resources for Crown Casino, Melbourne, the Myer group, key Village Roadshow entities and head of Employee Relations for the Coles Myer group. Brett has experience in supporting both large and emerging resource company development projects locally and overseas (BHP Billiton, Woodside, Equinox Minerals and Chalice Gold).", + "page_start": 41, + "page_end": 41, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Senior Management\nKingsgate's executives have a comprehensive range of skills and experience including mine development and operations, exploration, finance and administration. They are supported by highly qualified specialists, whose backgrounds cover the full scope of mining resources activities.\nSenior members of Kingsgate's management team are:", + "page_start": 40, + "page_end": 40, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Controlling entity\nThe ultimate parent entity of the Group is Kingsgate Consolidated Limited.", + "page_start": 96, + "page_end": 96, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Operational performance\nKingsgate is a gold mining, development and exploration company based in Sydney, Australia. Kingsgate owns and operates two gold mines, the world class Chatree Mine in Thailand and the underground Challenger Mine in South Australia. In addition, the Company has two advanced development projects, the Nueva Esperanza Silver / Gold Project, in the highly prospective Maricunga Gold / Silver Belt in Chile, and the Bowdens Silver Project in New South Wales, Australia. From this operating and development platform, Kingsgate aims to build value for all shareholders.\nGroup gold production was 199,897 ounces, a decrease of 4% on the previous corresponding year. The contribution from Chatree was 133,681 ounces with 66,216 ounces from Challenger.\nDividends paid to members during the financial year were as follows:\nFinal dividend declared for the year ended 30 June 2012 of 10 cents per fully paid share paid on 1 October 2012, 2013 $'000 = 15,148. Final dividend declared for the year ended 30 June 2012 of 10 cents per fully paid share paid on 1 October 2012, 2012 $'000 = 6,829. Interim dividend declared for the year ended 30 June 2013 of 5 cents per fully paid share paid on 12 April 2013, 2013 $'000 = 7,591. Interim dividend declared for the year ended 30 June 2013 of 5 cents per fully paid share paid on 12 April 2013, 2012 $'000 = 15,196. Total dividends, 2013 $'000 = 22,739. Total dividends, 2012 $'000 = 22,025\nwww.kingsgate.com.au\nChatree gold production was 10% higher than the previous corresponding period as a result of an increase in throughput from the expanded Chatree process plant and access to higher grade oxide ore from Q Prospect.\nChallenger gold production was 24% lower than the previous corresponding year given additional dilution and depletion at Challenger Deeps and a shortfall in planned development. This resulted in lower ore tonnes from the mine that was supplemented by low grade stockpiled ore. Following the fall in the gold price a strategic review of Challenger was implemented that has resulted in a new mine plan to focus primarily on the higher grade Challenger West orebody. The new mine plan will be implemented during the first three months of the 2014 financial year.", + "page_start": 43, + "page_end": 43, + "source_file": "ASX_KCN_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "ASX_KCN_2013.pdf", + "query": "What does demonstatre the feasibility study on the Nueva Esperanza Project ?", + "target_page": 6, + "target_passage": "The study demonstrated that open pit mining at two million tonnes per year and processing by milling and agitation leaching in cyanide was technically feasible, although high capital and power costs negatively impacted project economic returns. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Nueva Esperanza\nThe Nueva Esperanza Project was advanced during the year with the completion of a draft feasibility study. This study included a decision to mine the Arqueros and Teterita portions of Nueva Esperanza. The study demonstrated that open pit mining at two million tonnes per year and processing by milling and agitation leaching in cyanide was technically feasible, although high capital and power costs negatively impacted project economic returns.\nAs a consequence, feasibility work has transitioned to assess a lower capital cost and lower power requirement options, namely the potential for heap leach processing. Metallurgical testwork recently completed demonstrated that processing of mineralisation from all three deposits by heap leaching has the potential to be technically and economically feasible and as a consequence may become the preferred alternative for development.\nEnvironmental approval for the original Arqueros Project was granted in July 2013.", + "page_start": 5, + "page_end": 5, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Nueva Esperanza Silver / Gold Project\nThe Nueva Esperanza Silver / Gold Project advanced during the year with an initial scoping study for a decision to mine the Arqueros and Teterita portions of Nueva Esperanza completed in late 2012. The study demonstrated that open pit mining at two million tonnes per year and processing by milling and agitation leaching in cyanide was technically feasible although high capital and power costs negatively impacted project economic returns.\nAs a consequence, feasibility work has transitioned to assess a lower capital cost and lower power requirement option, namely the potential for heap leach processing. Recently completed metallurgical testwork demonstrated that processing of mineralisation from all three deposits by heap leaching has the potential to be technically and economically feasible and, as a consequence, may become the preferred alternative for development.\nEnvironmental approval for the original Arqueros Project was granted in July 2013.", + "page_start": 44, + "page_end": 44, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Summary\nThe Nueva Esperanza Project is 100% owned by Kingsgate since February 2012. Nueva Esperanza is located in the Maricunga Gold Belt near Copiapó, a regional mining centre in Northern Chile. The silver-rich mineralisation is hosted by the Esperanza high-sulphidation epithermal alteration system associated with the Cerros Bravos volcanic complex.\nThe project consists of three well-defined mineralised deposits and a number of undeveloped exploration targets. The main deposits are Arqueros, Chimberos and Teterita. Arqueros was previously mined on a limited scale by underground methods and Chimberos was exploited as an open pit mine, delivering about 40 million ounces of silver in 1998/99. All three deposits currently have a combined Mineral Resources of about 93 million ounces of silver equivalent or 1.6 million ounces of gold equivalent (EQ60) 1 .\nA feasibility study for a decision to mine the Arqueros portion of Nueva Esperanza was completed in late 2012, demonstrating that open pit mining at two million tonnes per year and processing by milling and agitation leaching in cyanide was technically feasible. Work remained to integrate the Teterita and Chimberos deposits into the project, as well as to test lower cost options for processing. Continued metallurgical testwork has shown that mineralisation from all three deposits by heap leaching is technically and economically feasible and the preferred alternative for development.\nEnvironmental approvals to commence construction and mining at Nueva Esperanza were granted in July 2013 for the original Arqueros project. Work is underway to modify and update the environmental assessment to incorporate the heap leach process.\n1 Equivalence is based on gold/silver price ratio of 60. Gold equivalence = gold content plus (silver content divided by 60), whereas Silver equivalent silver content plus (gold content multiplied by 60).", + "page_start": 29, + "page_end": 29, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Feasibility Study\nA Definitive Feasibility Study commenced on the project at the end of May 2011 with the focus on Arqueros, and open pit mining of that deposit with processing by traditional mill and agiitation leaching in cyanide. Subsequent acquisition of the Teterita and Chimberos deposits resulted in an expansion of the feasibility study to incorporate their resources.\nIn late 2012, a decision was taken to examine lower cost options for processing using heap leaching. With major engineering already done, technical studies focussed on metallurgical testwork and heap leach design. It has been established that the mineralisation from the three deposits can be processed by HPGR (High Pressure Grinding Rolls) crushing and heap leaching with silver and gold recoveries of the order of 70% to 75% for silver and 65% to 70% for gold. The project development plan is now focussed on a 3 million tonne per annum heap leach operation with an initial mine life of over 6 years. Annualised production levels (post rampup) are estimated at 6.0-8.0 million ounces of silver and 18,000-22,000 ounces of gold, at an indicative start-up capital cost between US$130-150 million (inclusive of 25% contingency).\nThese project parameters are based on preliminary results only and are insufficient to provide assurance as to the economic development of the project at this stage and these parameters may also change following completion of the Definitive Feasibility Study.\nWith the technical and economical feasibility of heap leaching being established, the project will now move into the final feasibility and design stage with results expected to be available during the March quarter 2014.\nThe environmental permitting process for the original Arqueros project has been completed, with approval to commence construction and mining granted by the Chilean authorities. A modification of the environmental assessment is being prepared to have the approvals modified for heap leaching and on-site power generation.\nExtensive community consultation has been undertaken with positive outcomes, and relationships with indigenous rural and urban communities remain a priority.\nPr ojects Report\n30\nExploration Report", + "page_start": 30, + "page_end": 31, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Resource\nKingsgate has updated the project resource base to incorporate the recent drilling on the Chimberos project and using the current gold/ silver ratio of 60 (previously 45) for its gold equivalent (AuEq60) and silver equivalent (AgEq60) calculations.The combined Measured, Indicated and Inferred mineral resource for the Nueva Esperanza Project is based on resource block modelling of Arqueros, Chimberos and Teterita, and has been estimated at a cut-off grade of 0.5 grams per tonne (g/t), gold equivalent (AuEq60) to be 28.9 million tonnes at 0.27 g/t gold and 84 g/t silver.\nThis represents about 250,000 ounces of gold and 78.5 million ounces of silver.\nThe Measured, Indicated and Inferred resource may be expressed in gold or silver equivalent ounces as:\n〉 Gold equivalent ounces (AuEQ60): 1.6 million ounces at 1.7 g/t gold equivalent; and\n〉 Silver equivalent ounces (AgEQ60): 93.5 million ounces at 100 g/t silver equivalent.\n29\nProjects Report", + "page_start": 30, + "page_end": 30, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Competent Persons Statement\nThe information in this report that relates to Nueva Esperanza Mineral Resource estimation is based on and fairly represents work completed by Jonathon Abbott, Ron James and Maria Muñoz. These people qualify as Competent Persons as defined in the 'Australasian Code for Reporting of Exploration Results and Mineral Resources'(the JORC Code, 2012 edition) and possess relevant experience in relation to the mineralisation being reported herein as 'Exploration Results, Mineral Resources and Ore Reserves'. Mr Abbott, Mr James and Ms Muñoz consent to the inclusion in the report of the matters based on their information in the form and context in which it appears.\nOre Reserves and Mineral Resources\n34\nCorporate Governance Statement", + "page_start": 34, + "page_end": 35, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Nueva Esperanza and Bowdens Mineral Resources\nNueva Esperanza, Category = Measured. Nueva Esperanza, Tonnes (Million) = 1.5. Nueva Esperanza, Grade.Gold (g/t) = 0.01. Nueva Esperanza, Grade.Silver (g/t) = 101. Nueva Esperanza, Grade.Lead (%) = -. Nueva Esperanza, Grade.Zinc (%) = -. Nueva Esperanza, Grade.Au Equiv (g/t) = 1.69. Nueva Esperanza, Grade.Ag Equiv (g/t) = 102. Nueva Esperanza, Contained Metal.Gold (M oz) = 0.00. Nueva Esperanza, Contained Metal.Silver (M oz) = 4.9. Nueva Esperanza, Contained Metal.Au Equiv (M oz) = 0.08. Nueva Esperanza, Contained Metal.Ag Equiv (M oz) = 4.9. , Category = Indicated. , Tonnes (Million) = 21.3. , Grade.Gold (g/t) = 0.28. , Grade.Silver (g/t) = 88. , Grade.Lead (%) = -. , Grade.Zinc (%) = -. , Grade.Au Equiv (g/t) = 1.75. , Grade.Ag Equiv (g/t) = 105. , Contained Metal.Gold (M oz) = 0.19. , Contained Metal.Silver (M oz) = 60.3. , Contained Metal.Au Equiv (M oz) = 1.20. , Contained Metal.Ag Equiv (M oz) = 71.8. , Category = Inferred. , Tonnes (Million) = 6.1. , Grade.Gold (g/t) = 0.3. , Grade.Silver (g/t) = 68. , Grade.Lead (%) = -. , Grade.Zinc (%) = -. , Grade.Au Equiv (g/t) = 1.43. , Grade.Ag Equiv (g/t) = 86. , Contained Metal.Gold (M oz) = 0.06. , Contained Metal.Silver (M oz) = 13.3. , Contained Metal.Au Equiv", + "page_start": 33, + "page_end": 33, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Chairman's Review\nChallenger gold production of 66,216 ounces was 24 percent lower than last year due to additional dilution and depletion at Challenger Deeps and a shortfall in planned development. Following the fall in the gold price, a strategic review of Challenger was implemented that has resulted in a new mine plan to focus primarily on the higher grade Challenger West orebody. The new mine plan will be implemented during the first three months of the 2014 financial year.\nThe development projects continued to advance during the year. At Nueva Esperanza, the feasibility work shifted to focus on identifying the lowest cost and lowest power consumption development alternatives. This included reviewing a heap leach process option with on-site power generation. Further work is expected to be completed in the current financial year. At Bowdens, the feasibility work has confirmed the optimum process route. Completion of the technical feasibility study including mine planning, infrastructure and metallurgy, and lodging of the Environmental Impact Statement ('EIS') are scheduled for 2014.\nThe Board of Kingsgate is determined to reestablish the path to building shareholder wealth via profits and dividends despite a difficult external environment. Shareholders can look forward to a steady performance from Chatree and a turn-around at Challenger coupled with the completion of feasibility studies at the two major development projects over the coming year.\nI would also like to thank our Chief Executive Officer and Managing Director, Gavin Thomas, Kingsgate management and all of the Kingsgate, Akara and Challenger personnel and the project teams for their part in delivering the operational performance during what was a difficult year for your Company.", + "page_start": 3, + "page_end": 3, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Feasibility Study\nDuring 2013, the process design and engineering work for the Definitive Feasibility Study (DFS) progressed to a point where the draft study was close to completion as at 30 June 2013. The study encompassed detailed process design based on using the most recent metallurgical test results, capital and operating cost estimates, project water and power supply, infrastructure requirements and mine optimisation.\nA specialist water supply and engineering firm was engaged to determine the project options for supply, ground and surface water management. Separate specialist consulting firms were engaged to prepare the design and costing of the tailings storage facility and power supply for the Bowdens project.\nA geo-technical drilling program was largely completed and the results utilised in determining preliminary mine design and costing for an open pit mine for Bowdens including pit wall angles for the mine optimisation.\nA geo-metallurgical test program was completed using core samples prepared from the major lithology types at the Bowdens silver project. The geo-metallurgical programme was successful in providing important information related to the physical characteristics and flotation recovery of mineralisation from the dominant\n27\nProjects Report\nlithology types. This included providing confirmation of milling circuit parameters and overall improved metallurgical recovery.\nTesting of the long term geochemical stability of the ore and waste for potentially acid forming properties is ongoing, with initial weathering columns nearing completion. The geochemical characterisation results will form an important input to the Environmental Impact Statement (EIS).", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Prepayments\nNon-current prepayments include prepaid royalties in respect of the Nueva Esperanza Silver / Gold Project in Chile and electricity and fuel supplies for Chatree Mine in Thailand.", + "page_start": 86, + "page_end": 86, + "source_file": "ASX_KCN_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "ASX_KCN_2013.pdf", + "query": "What is the Kingsgate net cash outflows from finiancing activities in 2013 ?", + "target_page": 11, + "target_passage": " Net cash outflows from financing activities was $1.7 million", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Cash flow\nOperating cash inflow was $85,020,000. Net investing cash outflow was $142,425,000. Net cash outflows from financing activities was $1,691,000, including a drawdown (net of transaction costs) of $36,700,000 of the multicurrency and syndicated loan facilities following a loan restructure by Kingsgate's Thai subsidiary Akara Resources Public Company Limited ('Akara'), net repayment (net of transaction costs) of $20,000,000 of the corporate loan facility, and $19,409,000 dividends paid during the year.", + "page_start": 46, + "page_end": 46, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Summary\nKingsgate has recorded the following financial performance for the year to 30 June 2013:\n〉 Revenue of $329.3 million.\n〉 EBITDA (before significant items) of $115.8 million.\n〉 Profit before tax and significant items of $17.2 million.\n〉 Loss after tax and significant items of $323.7 million. This includes a net tax benefit of $20.6 million, relating to the Challenger Gold Operations ('Challenger') impairment.\n〉 Non-cash asset impairments and other significant items of $356.8 million pre-tax, with $311.9 million principally relating to Challenger ($291.3 million post-tax).\n〉 No final dividend has been declared. An interim dividend of 5 cents per share was declared for the half year to 31 December 2012.\nwww.kingsgate.com.au", + "page_start": 9, + "page_end": 9, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "32. Parent entity financial information\nAs at, and throughout, the financial year ending 30 June 2013 the parent entity of the Group was Kingsgate.\nResults of parent entity, 2013 $'000 = . Results of parent entity, 2012 $'000 = . (Loss) / profit for the year, 2013 $'000 = (385,898). (Loss) / profit for the year, 2012 $'000 = 7,791. Other comprehensive (loss), 2013 $'000 = (91). Other comprehensive (loss), 2012 $'000 = (509). Total comprehensive (loss) / profit, 2013 $'000 = (385,989). Total comprehensive (loss) / profit, 2012 $'000 = 7, 2 8 2. Financial position of parent entity at year end, 2013 $'000 = . Financial position of parent entity at year end, 2012 $'000 = . Current assets, 2013 $'000 = 237,483. Current assets, 2012 $'000 = 211,404. Total assets, 2013 $'000 = 292,370. Total assets, 2012 $'000 = 668,437. Current liabilities, 2013 $'000 = 132,736. Current liabilities, 2012 $'000 = 32,140. Total liabilities, 2013 $'000 = 133,743. Total liabilities, 2012 $'000 = 103,243. Total equity of the parent entity comprising of:, 2013 $'000 = . Total equity of the parent entity comprising of:, 2012 $'000 = . Issued capital, 2013 $'000 = 605,504. Issued capital, 2012 $'000 = 599,618. Reserve, 2013 $'000 = 8,336. Reserve, 2012 $'000 = 10,409. Accumulated losses, 2013 $'000 = (455,213). Accumulated losses, 2012 $'000 = (44,833). Total financial equity, 2013 $'000 = 158,627. Total financial equity, 2012 $'000 = 565,194\ncontinued\nu\nNotes t o the Financial Statements", + "page_start": 110, + "page_end": 110, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Notes to the Financial Statements\nfor the year ended 30 June 2013\nThe Financial Report of Kingsgate Consolidated Limited (Kingsgate or the 'Company') for the year ended 30 June 2013 was authorised for issue in accordance with a resolution of Directors on 23 September 2013.\nKingsgate is a Company limited by shares incorporated in Australia whose shares are publicly traded on the Australian Securities Exchange using the ASX code KCN. The consolidated financial statements of the Company as at and for the year ended 30 June 2013 comprise the Company and its subsidiaries (together referred to as the 'Group' and individually as 'Group entities'). A description of the nature of the Group's operations and its principal activities is included in the Directors' Report.", + "page_start": 69, + "page_end": 69, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Corporate loan facility\nKingsgate has a three year secured loan facility with Investec which was amended during the year. The amended facility has a limit of $40 million (30 June 2012: $50 million), of which $20 million has been drawn down as at 30 June 2013 (30 June 2012: $40 million).", + "page_start": 11, + "page_end": 11, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Statement of Cash Flows\nfor the year ended 30 June 2013\nCash flows from operating activities, Note = . Cash flows from operating activities, 2013 $'000 = . Cash flows from operating activities, 2012 $'000 = . Receipts from customers (net of goods and services tax), Note = . Receipts from customers (net of goods and services tax), 2013 $'000 = 332,624. Receipts from customers (net of goods and services tax), 2012 $'000 = 361,754. Payments to suppliers and employees (net of goods and services tax), Note = . Payments to suppliers and employees (net of goods and services tax), 2013 $'000 = (224,500). Payments to suppliers and employees (net of goods and services tax), 2012 $'000 = (182,759). Interest received, Note = . Interest received, 2013 $'000 = 2,587. Interest received, 2012 $'000 = 1,394. Finance costs paid, Note = . Finance costs paid, 2013 $'000 = (10,120). Finance costs paid, 2012 $'000 = (8,431). Income tax paid, Note = . Income tax paid, 2013 $'000 = (15,571). Income tax paid, 2012 $'000 = ( 6,711). Net cash inflow from operating activities, Note = 25. Net cash inflow from operating activities, 2013 $'000 = 85,020. Net cash inflow from operating activities, 2012 $'000 = 165,247. Cash flows from investing activities, Note = . Cash flows from investing activities, 2013 $'000 = . Cash flows from investing activities, 2012 $'000 = . Payments for property, plant and equipment, Note = . Payments for property, plant and equipment, 2013 $'000 = ( 7, 0 3 5 ). Payments for property, plant and equipment, 2012 $'000 = (92,343). Payments for exploration, evaluation and development, Note = . Payments for exploration, evaluation and development, 2013 $'000 = (122,722). Payments for exploration, evaluation and development, 2012 $'000 = (75,054). Payments for acquisition of Bowdens Silver Project, Note = . Payments for acquisition of Bowdens Silver Project, 2013 $'000 = -. Payments for acquisition of Bowdens Silver Project, 2012", + "page_start": 68, + "page_end": 68, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Financials\nKingsgate made an after tax loss of $323.7 million for the full year to 30 June 2013 compared to an after tax profit of $75.0 million for the previous corresponding year. The result for the year reflected an impairment of $311.9 million pre-tax ($291.3 million post-tax) against the Challenger Mine and associated assets and an impairment of $20.4 million against greenfield exploration projects in Australia and Thailand.\nTotal sales revenue, 2013 $000 = 329,282. Total sales revenue, 2012 $000 = 357,372. EBITDA before significant items, 2013 $000 = 115,845. EBITDA before significant items, 2012 $000 = 168,583. (Loss) / profit before tax, 2013 $000 = ( 339,615). (Loss) / profit before tax, 2012 $000 = 91,277. Income tax benefit / (expense), 2013 $000 = 15,889. Income tax benefit / (expense), 2012 $000 = (16,271). (Loss) / profit after income after tax, 2013 $000 = (323,726). (Loss) / profit after income after tax, 2012 $000 = 75,006. Dividend declared (¢/share), 2013 $000 = 5. Dividend declared (¢/share), 2012 $000 = 20\nwww.kingsgate.com.au", + "page_start": 5, + "page_end": 5, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Operations Report\nwww.kingsgate.com.au\nu", + "page_start": 13, + "page_end": 13, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "(c) Liquidity risk\nThe contractual cash flows presented above in respect of 30 June 2013 and the increase in the one year or less time category of $46,132,000 when compared to 30 June 2012 mainly relates to classification of the corporate loan facility of $20,000,000 and the convertible loan facility of $35,000,000 as current liability at 30 June 2013. These facilities were mainly included in the one to two years and two to five years' time category at 30 June 2012. As indicated in Note 16, these facilities have been classified as current liabilities at 30 June 2013 on the basis that at balance sheet date it was the Group's intention to restructure and amalgamate these facilities in the next financial year.\nSubsequent to the end of the financial year, the Group has received from its lenders a credit approved term sheet (subject to formal documentation) for the restructure of the corporate loan and convertible loan facilities. Following completion of the restructure the total amount outstanding will be reduced to $40,000,000. This loan will be provided through a single senior corporate facility which will consist of two tranches:\n〉 Tranche one will be a $25,000,000 Akara Pre IPO Bond with a maturity date of 31 July 2015. The current intention is for this tranche to be repaid as part of the Akara IPO although at Kingsgate's election repayment can be made by either cash or in Kingsgate's shares.\n〉 Tranche two is an amortising facility with $5,000,000 to be repaid during the 2014 financial year and the balance of $10,000,000 repaid during the 2015 financial year.", + "page_start": 104, + "page_end": 104, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Statement of Changes in Equity\ncontrolling interests $'000 = -. Movement in share-based payment reserve, Total equity $'000 = (1,638). Total transactions with owners, Note = . Total transactions with owners, Contributed equity $'000 = 5,886. Total transactions with owners, Reserves $'000 = (1,638). Total transactions with owners, Retained profits $'000 = (22,739). Total transactions with owners, Total $'000 = (18,491). Total transactions with owners, Non- controlling interests $'000 = -. Total transactions with owners, Total equity $'000 = (18,491). Balance at 30 June 2013, Note = . Balance at 30 June 2013, Contributed equity $'000 = 605,504. Balance at 30 June 2013, Reserves $'000 = 18,319. Balance at 30 June 2013, Retained profits $'000 = (149,863). Balance at 30 June 2013, Total $'000 = 473,960. Balance at 30 June 2013, Non- controlling interests $'000 = -. Balance at 30 June 2013, Total equity $'000 = 473,960\nThe above Statement of Changes in Equity should be read in conjunction with the accompanying notes.\nwww.kingsgate.com.au www.kingsgate.com.au", + "page_start": 67, + "page_end": 67, + "source_file": "ASX_KCN_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "uksi_20210538_en.pdf", + "query": "To which countries extend the marriage regulations ?", + "target_page": 1, + "target_passage": "These Regulations extend to England and Wales. ", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "MARRIAGE, ENGLAND AND WALES\nThe Marriage (Keeping of Records in Churches and Chapels) Regulations 2021\nMade\n-\n-\n-\n-\n29th April 2021\nComing into force - -\n4th May 2021\nThe Registrar General makes these Regulations with the approval of the Secretary of State in exercise of the powers conferred by section 74(1)(c)(v), (1A)(a) and (3) of the Marriage Act 1949( a ).", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "Citation, commencement, extent and interpretation\n1. -(1) These Regulations may be cited as the Marriage (Keeping of Records in Churches and Chapels) Regulations 2021.\n(2) These Regulations come into force on 4th May 2021.\n(3) These Regulations extend to England and Wales.\n(4) In these Regulations, 'chapel' does not include a chapel to which Part 5 of the Marriage Act 1949 (marriages in naval, military and air force chapels) applies( b ).", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "EXPLANATORY NOTE\n(This note is not part of the Regulations)\nThese Regulations provide for records of marriages to be kept in churches and chapels of the Church of England and the Church in Wales, other than chapels to which Part 5 of the Marriage Act 1949 applies (naval, military and air force chapels).\nRegulation 2 requires parochial church councils to provide books known as 'registers of marriage services' to churches and chapels in their parish in which banns of matrimony may be published, for the purposes of keeping the records required by regulation 3. Regulation 2 also imposes requirements relating to the durability and pre-printed content of these registers, and provides that they belong to the parochial church council.\nRegulation 3 requires specified information to be recorded in a register of marriage services when a marriage has been solemnized on or after 4th May 2021 according to the rites of the Church of England or Church in Wales in a church or chapel in which banns of matrimony may be published. The record must be made and signed by the member of the clergy by whom the marriage was solemnized.\nRegulation 4 imposes requirements relating to the keeping of registers of marriage services provided under regulation 2.\nA full impact assessment has not been produced for this instrument because no, or no significant, impact on the private, public or voluntary sector is foreseen.\n' Crown copyright 2021\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, Controller of Her Majesty's Stationery Office and Queen's Printer of Acts of Parliament.\n3\n£4.90\nhttp://www.legislation.gov.uk/id/uksi/2021/538", + "page_start": 2, + "page_end": 3, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "Duty of parochial church councils to provide registers of marriage services\n2. -(1) The parochial church council of a parish must provide books for the purpose of making records under regulation 3 to each church and chapel of the Church of England( c ) in that parish in which banns of matrimony may be published.\n(2) Books provided under paragraph (1) are to be known as 'registers of marriage services'.\n(3) A register of marriage services provided under paragraph (1) must meet the requirements of paragraphs (4) and (5).\n(4) The register must be made of durable material.\n(5) For the purposes of enabling a record to be made in the register under regulation 3 in respect of a marriage, the register must be printed in such a way that it-\n( a ) 1949 c. 76 (12 & 13 Geo 6). Section 74 was amended by Schedule 2 to the Registration Service Act 1953 (c. 37) and by paragraph 5(1)(d) of Schedule 2 to the Transfer of Functions (Registration) Order 2008 (S.I. 2008/678) and subsequently renumbered as section 74(1) by article 12 of the Registration of Marriages etc. (Electronic Communications and Electronic Storage) Order 2009 (S.I. 2009/2821). Section 74(1) was amended by paragraph 19 of Schedule 15 to the Immigration Act 2016 (c. 19) and paragraph 43 of Schedule 1 to the Registration of Marriages Regulations 2021 (S.I. 2021/411), which also inserted subsection (1A).\n( b ) See section 68(2) of the Marriage Act 1949. The certification function of the Admiralty under that section was transferred to the Secretary of State by the Defence (Transfer of Functions) Act 1964 (c. 15).\n( c ) Section 78(2) of the Marriage Act 1949 provides for references to the Church of England to be construed as including references to the Church in Wales.\n(a) indicates the descriptions of information required by each of sub-paragraphs (a) to (h) of regulation 3(2) in relation to the marriage, and\n(b) provides corresponding spaces for recording information required by each of those subparagraphs in relation to the marriage.\n(6) A register of marriage services provided under paragraph (1) by a parochial church council belongs to that parochial church council.", + "page_start": 0, + "page_end": 1, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "5.3 Workforce structure\nUnambiguously, the data show that all eastern and southern European countries are senders (exception Malta). The central European countries Germany, France, Belgium and Austria and the two Nordic countries Sweden and Finland are the receivers. Some smaller countries like Denmark, Ireland and Luxembourg are exceptions, and the Netherlands has an equal amount of sent and received posted workers.", + "page_start": 113, + "page_end": 113, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "Requirements about the keeping of registers of marriage services\n4. -(1) The rector, vicar or curate in charge of a church or chapel to which a register of marriage services has been provided under regulation 2(1) must-\n(a) ensure that the register is kept in that church or chapel, and\n(b) do everything that is reasonably practicable to ensure that the register is protected against theft, loss or damage.\n(2) Where there is no rector, vicar or curate in charge of a church or chapel to which a register of marriage services has been provided under regulation 2(1), the obligations under paragraph (1) in respect of that register fall on the churchwardens of the parish in which the church or chapel is situated.\nGiven under my hand on 29th April 2021\nAbi Tierney Registrar General\n2\nI approve\n29th April 2021\nKevin Foster Parliamentary Under Secretary of State Home Office", + "page_start": 1, + "page_end": 2, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "Annex 1: Non -Annex I (NAI) Parties\n2, Afghanistan = Albania. 2, AFG = ALB. 3, Afghanistan = Algeria. 3, AFG = DZA. 4, Afghanistan = Andorra. 4, AFG = AND. 5, Afghanistan = Angola. 5, AFG = AGO. 6, Afghanistan = Antigua and Barbuda. 6, AFG = ATG. 7, Afghanistan = Argentina. 7, AFG = ARG. 8, Afghanistan = Armenia. 8, AFG = ARM. 9, Afghanistan = Azerbaijan. 9, AFG = AZE. 10, Afghanistan = Bahamas. 10, AFG = BHS. 11, Afghanistan = Bahrain. 11, AFG = BHR. 12, Afghanistan = Bangladesh. 12, AFG = BGD. 13, Afghanistan = Barbados. 13, AFG = BRB. 14, Afghanistan = Belize. 14, AFG = BLZ. 15, Afghanistan = Benin. 15, AFG = BEN. 16, Afghanistan = Bhutan. 16, AFG = BTN. 17, Afghanistan = Bolivia. 17, AFG = BOL. 18, Afghanistan = Bosnia and Herzegovina. 18, AFG = BIH. 19, Afghanistan = Botswana. 19, AFG = BWA. 20, Afghanistan = Brazil. 20, AFG = BRA. 21, Afghanistan = Brunei Darussalam. 21, AFG = BRN. 22, Afghanistan = Burkina Faso. 22, AFG = BFA. 23, Afghanistan = Burundi. 23, AFG = BDI. 24, Afghanistan = Cambodia. 24, AFG = KHM. 25, Afghanistan = Cameroon. 25, AFG = CMR. 26, Afghanistan = Cape Verde. 26, AFG = CPV. 27, Afghanistan = Central African Republic. 27, AFG = CAF. 28, Afghanistan = Chad. 28, AFG = TCD. 29, Afghanistan = Chile. 29, AFG = CHL. 30, Afghanistan = China. 30, AFG = CHN. 31, Afghanistan = Colombia. 31, AFG = COL. 32, Afghanistan = Comoros. 32, AFG = COM. 33, Afghanistan = Congo. 33, AFG = COG. 34, Afghanistan = Cook Islands. 34, AFG = COK. 35, Afghanistan = Costa Rica. 35, AFG = CRI. 36, Afghanistan = Cote d'Ivoire. 36,", + "page_start": 44, + "page_end": 44, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "I.12. Applicable law and settlement of disputes\nI.12.1 The FWC is governed by Union law, complemented, where necessary, by the law of Finland.\nI.12.2 The courts of Finland have exclusive jurisdiction over any dispute regarding the interpretation, application or validity of the FWC.", + "page_start": 10, + "page_end": 10, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "Requirements relating to tests\n(6) Regulation 6 does not apply to a person ('P') where P is-\n(a) a person described in paragraph 1(1)(a) to (h) or (k) of Schedule 4 or a member of the family forming part of the household of such a person;\n(b) a person described in paragraph 1(1)(i) or (j) (representatives of foreign countries or territories or British Overseas Territories) of Schedule 4 where the conditions in paragraph (7) of this regulation are met;\n(c) a member of the family forming part of the household of a person to whom paragraph (b) applies, where-\n(i) the conditions in paragraph (7) are met in relation to the person to whom paragraph (b) applies,\n(ii) the Foreign, Commonwealth and Development Office has been notified of P's arrival, and\n(iii) the Foreign, Commonwealth and Development Office has confirmed that P is not required to comply with regulation 6;\n(d) a person described in paragraph 1(2) (G7 attendees etc) of Schedule 4;\n(e) a person described in paragraph 16(1)(a) or (b) (persons certified as returning from essential state business etc.) of Schedule 4 where the relevant Department has certified that P meets this description and is not required to comply with regulation 6;\n(f) a person described in paragraph 17 (essential or emergency work outside the United Kingdom) of Schedule 4 where the relevant Department has certified that P is not required to comply with regulation 6.\n(7) The conditions specified in this paragraph are that, prior to P's departure to the United Kingdom-\n(a) the relevant head of the mission, consular post, or office representing a foreign territory in the United Kingdom, or a Governor of a British overseas territory (as the case may be), or a person acting on their authority, confirms in writing to the Foreign, Commonwealth and Development Office that P is required to undertake work in the United Kingdom which is essential to the foreign country represented by the mission or consular post, the foreign territory represented by the office or the British overseas territory; and\n(b) the Foreign, Commonwealth and Development Office has then confirmed in writing to the person giving the confirmation referred to in paragraph (a) that-\n(i) it has received that confirmation, and", + "page_start": 8, + "page_end": 8, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "Duty to record information about marriages solemnized according to the rites of the Church of England or Church in Wales\n3. -(1) Paragraphs (2), (3) and (4) apply where a marriage has been solemnized according to the rites of the Church of England in a church or chapel in which banns of matrimony may be published.\n(2) As soon as practicable after the marriage has been solemnized, the clergyman by whom the marriage was solemnized must make a record of the following information in relation to that marriage in a register of marriage services provided to the church or chapel under regulation 2(1)-\n(a) the date and place of the marriage;\n(b) the name and surname of each party;\n(c) the date of birth of each party;\n(d) the occupation (if any) of each party;\n(e) the address of each party at the time of the marriage;\n(f) the names and surnames of each party's parents, so far as those names and surnames are known to the clergyman who solemnized the marriage;\n(g) the name and surname of each of the witnesses in whose presence the marriage was solemnized;\n(h) the name and surname of the clergyman by whom the marriage was solemnized.\n(3) The clergyman must record the information required by paragraph (2) in English, and may also record information required by that paragraph in Welsh where the church or chapel is situated in Wales.\n(4) After making a record under paragraph (2) the clergyman must sign it.\n(5) This regulation does not apply in relation to a marriage solemnized before 4th May 2021.", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20210538_en.pdf" + } + ] + }, + { + "references": { + "source_file": "uksi_20210538_en.pdf", + "query": "What the parochial church council must provide to make marriage records ?", + "target_page": 1, + "target_passage": " The parochial church council of a parish must provide books for the purpose of making records under regulation 3 to each church and chapel of the Church of England(c) in that parish in which banns of matrimony may be published.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Duty of parochial church councils to provide registers of marriage services\n2. -(1) The parochial church council of a parish must provide books for the purpose of making records under regulation 3 to each church and chapel of the Church of England( c ) in that parish in which banns of matrimony may be published.\n(2) Books provided under paragraph (1) are to be known as 'registers of marriage services'.\n(3) A register of marriage services provided under paragraph (1) must meet the requirements of paragraphs (4) and (5).\n(4) The register must be made of durable material.\n(5) For the purposes of enabling a record to be made in the register under regulation 3 in respect of a marriage, the register must be printed in such a way that it-\n( a ) 1949 c. 76 (12 & 13 Geo 6). Section 74 was amended by Schedule 2 to the Registration Service Act 1953 (c. 37) and by paragraph 5(1)(d) of Schedule 2 to the Transfer of Functions (Registration) Order 2008 (S.I. 2008/678) and subsequently renumbered as section 74(1) by article 12 of the Registration of Marriages etc. (Electronic Communications and Electronic Storage) Order 2009 (S.I. 2009/2821). Section 74(1) was amended by paragraph 19 of Schedule 15 to the Immigration Act 2016 (c. 19) and paragraph 43 of Schedule 1 to the Registration of Marriages Regulations 2021 (S.I. 2021/411), which also inserted subsection (1A).\n( b ) See section 68(2) of the Marriage Act 1949. The certification function of the Admiralty under that section was transferred to the Secretary of State by the Defence (Transfer of Functions) Act 1964 (c. 15).\n( c ) Section 78(2) of the Marriage Act 1949 provides for references to the Church of England to be construed as including references to the Church in Wales.\n(a) indicates the descriptions of information required by each of sub-paragraphs (a) to (h) of regulation 3(2) in relation to the marriage, and\n(b) provides corresponding spaces for recording information required by each of those subparagraphs in relation to the marriage.\n(6) A register of marriage services provided under paragraph (1) by a parochial church council belongs to that parochial church council.", + "page_start": 0, + "page_end": 1, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "EXPLANATORY NOTE\n(This note is not part of the Regulations)\nThese Regulations provide for records of marriages to be kept in churches and chapels of the Church of England and the Church in Wales, other than chapels to which Part 5 of the Marriage Act 1949 applies (naval, military and air force chapels).\nRegulation 2 requires parochial church councils to provide books known as 'registers of marriage services' to churches and chapels in their parish in which banns of matrimony may be published, for the purposes of keeping the records required by regulation 3. Regulation 2 also imposes requirements relating to the durability and pre-printed content of these registers, and provides that they belong to the parochial church council.\nRegulation 3 requires specified information to be recorded in a register of marriage services when a marriage has been solemnized on or after 4th May 2021 according to the rites of the Church of England or Church in Wales in a church or chapel in which banns of matrimony may be published. The record must be made and signed by the member of the clergy by whom the marriage was solemnized.\nRegulation 4 imposes requirements relating to the keeping of registers of marriage services provided under regulation 2.\nA full impact assessment has not been produced for this instrument because no, or no significant, impact on the private, public or voluntary sector is foreseen.\n' Crown copyright 2021\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, Controller of Her Majesty's Stationery Office and Queen's Printer of Acts of Parliament.\n3\n£4.90\nhttp://www.legislation.gov.uk/id/uksi/2021/538", + "page_start": 2, + "page_end": 3, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "Duty to record information about marriages solemnized according to the rites of the Church of England or Church in Wales\n3. -(1) Paragraphs (2), (3) and (4) apply where a marriage has been solemnized according to the rites of the Church of England in a church or chapel in which banns of matrimony may be published.\n(2) As soon as practicable after the marriage has been solemnized, the clergyman by whom the marriage was solemnized must make a record of the following information in relation to that marriage in a register of marriage services provided to the church or chapel under regulation 2(1)-\n(a) the date and place of the marriage;\n(b) the name and surname of each party;\n(c) the date of birth of each party;\n(d) the occupation (if any) of each party;\n(e) the address of each party at the time of the marriage;\n(f) the names and surnames of each party's parents, so far as those names and surnames are known to the clergyman who solemnized the marriage;\n(g) the name and surname of each of the witnesses in whose presence the marriage was solemnized;\n(h) the name and surname of the clergyman by whom the marriage was solemnized.\n(3) The clergyman must record the information required by paragraph (2) in English, and may also record information required by that paragraph in Welsh where the church or chapel is situated in Wales.\n(4) After making a record under paragraph (2) the clergyman must sign it.\n(5) This regulation does not apply in relation to a marriage solemnized before 4th May 2021.", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "MARRIAGE, ENGLAND AND WALES\nThe Marriage (Keeping of Records in Churches and Chapels) Regulations 2021\nMade\n-\n-\n-\n-\n29th April 2021\nComing into force - -\n4th May 2021\nThe Registrar General makes these Regulations with the approval of the Secretary of State in exercise of the powers conferred by section 74(1)(c)(v), (1A)(a) and (3) of the Marriage Act 1949( a ).", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "Requirements about the keeping of registers of marriage services\n4. -(1) The rector, vicar or curate in charge of a church or chapel to which a register of marriage services has been provided under regulation 2(1) must-\n(a) ensure that the register is kept in that church or chapel, and\n(b) do everything that is reasonably practicable to ensure that the register is protected against theft, loss or damage.\n(2) Where there is no rector, vicar or curate in charge of a church or chapel to which a register of marriage services has been provided under regulation 2(1), the obligations under paragraph (1) in respect of that register fall on the churchwardens of the parish in which the church or chapel is situated.\nGiven under my hand on 29th April 2021\nAbi Tierney Registrar General\n2\nI approve\n29th April 2021\nKevin Foster Parliamentary Under Secretary of State Home Office", + "page_start": 1, + "page_end": 2, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "Citation, commencement, extent and interpretation\n1. -(1) These Regulations may be cited as the Marriage (Keeping of Records in Churches and Chapels) Regulations 2021.\n(2) These Regulations come into force on 4th May 2021.\n(3) These Regulations extend to England and Wales.\n(4) In these Regulations, 'chapel' does not include a chapel to which Part 5 of the Marriage Act 1949 (marriages in naval, military and air force chapels) applies( b ).", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "66. A ppointm ent of S ecretary to Independent Electoral C om m ission\n(1) There shall be a S ecretary to the Independent E lectoral C om m ission referred to in section 65A (in this section referred to as \"the S ecretary\").\n(2) The S ecretary shall be appointed by the P resident.\n(3) The functions of the S ecretary shall, subject to the directions and supervision of the Independent E lectoral C om m ission, be to exercise general supervision over the registration of voters for elections of-\n( a ) the E lected M em bers of the N ational A ssem bly; and\n( b ) the m em bers of any local authority, and over the conduct of such elections.\n(4) A person shall not be qualified to be appointed as S ecretary to the Independent E lectoral C om m ission if-\n( a ) he or she is not a citizen of B otsw ana;\n( b ) he or she has been declared insolvent or adjudged or otherw ise declared bankrupt under any law in force in any part of the C om m onw ealth and has not been discharged, or has m ade a com position w ith his or her creditors and has not paid his or her debts in full; or\n( c ) he or she has been convicted of any offence involving dishonesty in any country.\n(5) A person shall not enter upon the duties of the office of S ecretary until he or she has taken and subscribed to the oath of allegiance and such oath for the due execution of his or her office as m ay be prescribed by an A ct of P arliam ent.\nC opyright G overnm ent of B otsw ana", + "page_start": 30, + "page_end": 30, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "95. Jurisdiction and com position\n(1) There shall be for B otsw ana a H igh C ourt w hich shall have unlim ited original jurisdiction to hear and determ ine any civil or crim inal proceedings under any law and such other jurisdiction and pow ers as m ay be conferred on it by this C onstitution or any other law .\n(2) The judges of the H igh C ourt shall be the C hief Justice and such num ber of\nC opyright G overnm ent of B otsw ana\nother judges of the C ourt as m ay be prescribed by P arliam ent:\nProvided that the office of a judge of the H igh C ourt shall not be abolished w hile there is a substantive holder thereof.\n(3) The H igh C ourt shall be a superior court of record and, save as otherw ise provided by P arliam ent, shall have all the pow ers of such a court.\n(4) The H igh C ourt shall sit in such places as the C hief Justice m ay appoint.\n(5) The H igh C ourt shall have jurisdiction to supervise any civil or crim inal proceedings before any subordinate court or any court m artial and m ay m ake such orders, issue such w rits and give such directions as it m ay consider appropriate for the purpose of ensuring that justice is duly adm inistered by any such court.\n(6) The C hief Justice m ay m ake rules w ith respect to the practice and procedure of the H igh C ourt in relation to the jurisdiction and pow ers conferred on it by subsection (5) of this section.\n(7) The C hief Justice m ay appoint a R ules of C ourt A dvisory C om m ittee to assist him or her in review ing and overhauling the rules m ade under subsection (6) and to advise on proposals to update and am end such rules.", + "page_start": 39, + "page_end": 40, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "1. (1) In this S chedule-\n( b ) in the case of a by-election, as soon as practicable after a vacancy has occurred am ong the S pecially E lected M em bers.\n(2) A m eeting of the E lected M em bers of the N ational A ssem bly that is held for the purpose of a general election shall be sum m oned by the S peaker.\n(3) N o other business than the holding of a general election m ay be transacted at any m eeting of the E lected M em bers of the N ational A ssem bly sum m oned under subparagraph (2) of this paragraph and such a m eeting shall not be regarded as a m eeting of the A ssem bly for the purposes of any other provision of this C onstitution.\n6. W hen the votes have been cast, w hether at a general election or at a by-election, a list shall be prepared show ing the persons for w hom votes have been cast in order according to the num ber of votes received by each of them , the person or persons w ho received the highest num ber of votes being placed first and those w ho received any low er num ber of votes being placed in descending order.\n7. In the case of a general election, and subject to the provisions of paragraph 9 of this S chedule, those persons shall be deem ed to have been elected as S pecially E lected M em bers w ho stand in the first and each succeeding place on the list until the num ber of persons to be elected as Specially E lected M em bers has been com pleted.\n8. In the case of a by-election, and subject to the provisions of paragraph 10 of this S chedule, the person w ho stands in the first place on the list shall be deem ed to have been elected.", + "page_start": 56, + "page_end": 56, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "108. P ow er to specify qualifications for certain offices\nSubject to the provisions of this C onstitution and of any A ct of P arliam ent, pow er to specify the qualifications and disqualifications for holding such public offices as he or she m ay constitute shall vest in the P resident.", + "page_start": 45, + "page_end": 45, + "source_file": "Botswana-constitution.pdf" + } + ] + }, + { + "references": { + "source_file": "legal4_opengouvernementlicense.pdf", + "query": "What is the prison population grew in average by year between 1993 and 2008 ?", + "target_page": 8, + "target_passage": "The prison population grew rapidly between 1993 to 2008, at an average of 4% a year.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "2. Recent trends in the population\nThe 'Story of the Prison Population 1993 to 2012' is an in-depth look at what happened to the prison population between 1993 and 2012 and the major factors contributing to the changes. 4\nThe prison population grew rapidly between 1993 to 2008, at an average of 4% a year. This rapid rise was driven by:\n increased numbers of people sentenced to immediate custody from 1993 to 2002;\n increases in the average custodial sentence length and increased use of indeterminate sentences; and\n an increase in numbers recalled to prison following breaches of the conditions of licence and these offenders spending longer in prison once recalled.\nThe rise in the prison population slowed considerably from the summer of 2008, in part due to the introduction of the Criminal Justice and Immigration Act (CJIA) 2008 5 which changed sentencing and offender management in ways which helped to reduce growth in the prison population.\nThis flatter trend continued until the public disorder seen in UK cities from 6 to 9 August 2011 which had an immediate but temporary impact on the prison population.\nDuring 2012 and into 2013, the prison population began to fall due to a falling remand population and a continued decline in the number of under 18s in custody. The falling remand population during 2012 reflected falling volumes going through the courts plus the introduction, in December 2012, of measures restricting the use of remand for all offenders who would be unlikely to receive a custodial sentence. 6\nFrom the end of August 2013 to the end of October 2013, the remand\npopulation rose sharply, driving an overall increase in the prison population. This was being driven by an increase in demand in the Crown Courts, especially among more serious tri-able either way cases. The total population has continued to rise since the beginning of 2014 and reached 85,925 7 on the\n4 Story of the Prison Population: www.gov.uk/government/publications/story-of-the-prisonpopulation-1993-2012\n5 services.parliament.uk/bills/2007-08/criminaljusticeandimmigration.html\n6 http://services.parliament.uk/bills/2010-11/legalaidsentencingandpunishmentofoffenders.html 7 www.gov.uk/government/statistics/prison-population-figures-2014\n6\nPrison Population Projections 2014 - 2020\n21 November 2014. The latest projections assume demand in the courts remains at this higher level.\nTable 1 summarises these changes.", + "page_start": 7, + "page_end": 8, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "2. Recent trends in the population\nTable 1: Population in custody changes from 2006 to 2014\nJune 2006 to June 2007, Offender Management Statistics.Start of Year = 77,982. June 2006 to June 2007, Offender Management Statistics.End of Year = 79,734. June 2006 to June 2007, Year on year %.difference = 2.2%. June 2007 to June 2008, Offender Management Statistics.Start of Year = 79,734. June 2007 to June 2008, Offender Management Statistics.End of Year = 83,194. June 2007 to June 2008, Year on year %.difference = 4.3%. June 2008 to June 2009, Offender Management Statistics.Start of Year = 83,194. June 2008 to June 2009, Offender Management Statistics.End of Year = 83,454. June 2008 to June 2009, Year on year %.difference = 0.3%. June 2009 to June 2010, Offender Management Statistics.Start of Year = 83,454. June 2009 to June 2010, Offender Management Statistics.End of Year = 85,002. June 2009 to June 2010, Year on year %.difference = 1.9%. June 2010 to June 2011, Offender Management Statistics.Start of Year = 85,002. June 2010 to June 2011, Offender Management Statistics.End of Year = 85,374. June 2010 to June 2011, Year on year %.difference = 0.4%. June 2011 to June 2012, Offender Management Statistics.Start of Year = 85,374. June 2011 to June 2012, Offender Management Statistics.End of Year = 86,048. June 2011 to June 2012, Year on year %.difference = 0.8%. June 2012 to June 2013, Offender Management Statistics.Start of Year = 86,048. June 2012 to June 2013, Offender Management Statistics.End of Year = 83,842. June 2012 to June 2013, Year on year %.difference = -2.6%. June 2013 to June 2014, Offender Management Statistics.Start of Year = 83,842. June 2013 to June 2014, Offender Management Statistics.End of Year = 85,509. June 2013 to June 2014, Year on year %.difference = 2.0%", + "page_start": 8, + "page_end": 8, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "4. Results\nThe Central Scenario estimates that the prison population will rise to 87,700 by the end of June 2015 and to 90,200 by the end of June 2020.\nChart 2 presents Prison population projections from November 2014 to December 2020.\nChart 2: Projected monthly prison population (all scenarios)\nIllustrative Scenario 1 estimates that the prison population will rise to 87,100 by the end of June 2015 and then fall to 81,400 by the end of June 2020.\nIllustrative Scenario 2 estimates that the prison population will rise to 88,900 by the end of June 2015 and to 98,900 by the end of June 2020.\nThe projected trends reflect the cumulative impacts of the various sentencing, legislative and procedural assumptions that are used to generate the projections. The seasonal pattern reflects the dip in the prison population which is always seen around the Christmas period.\nIn the Central Scenario, the prison population is expected to rise to 90,200 by June 2020. The projected population increase is largely due to the recent trends in case mix where we have seen more serious cases come before the courts. This results in offenders receiving longer custodial sentence lengths, which in turn places an upward pressure on the prison population. The growth in this scenario is largely driven by the rise in the determinate population which is projected to grow to 60,200 by June 2020. This is partially due to the\n11\nPrison Population Projections 2014 - 2020\nintroduction of the Extended Determinate Sentence (EDS) as part of the Legal Aid, Sentencing and Punishment of Offenders 8 (LASPO) Act which commenced in December 2012. Some of the growth in the determinate population has been offset by a decline in the indeterminate population following the removal of the Imprisonment for Public Protection (IPP) sentence in the LASPO act.\nAppendix A contains tables for annual projected end of June populations, average financial year populations and total monthly populations for each scenario along with detailed breakdown of the projections for our subpopulations.\n8 services.parliament.uk/bills/2010-11/legalaidsentencingandpunishmentofoffenders.html\n12\nPrison Population Projections 2014 - 2020", + "page_start": 12, + "page_end": 14, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "Appendix A: Additional tables 9\nPrison Population Projections 2014 - 2020", + "page_start": 22, + "page_end": 22, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "2. Recent trends in the population\nFurther statistics and commentary on the changes seen in prison population over the last year, is presented in the Offender Management Statistics Quarterly publication. This is available online on GOV.UK at: www.gov.uk/government/collections/offender-management-statistics-quarterly\n7\nPrison Population Projections 2014 - 2020", + "page_start": 8, + "page_end": 9, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "Appendix A: Additional tables 9\nTable A13: Projected 15-17 years old prison population (end of June figures) 11", + "page_start": 20, + "page_end": 20, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "Key points\nThis bulletin presents projections of the prison population in England and Wales from November 2014 to December 2020. The prison population projections are based on assumptions about future custodial convictions and incorporate the anticipated impacts of agreed policy and procedural initiatives.\nThe 'Central Scenario' estimates that the prison population will increase from the current position 85,925 1 to 87,700 by June 2015. By the end of June 2020 the prison population is projected to be 90,200. This Central Scenario is our best estimate based on the available information. The projected prison population under our Central Scenario is shown in Chart 1.\nThe prison population projections are produced using a model of flows of offenders into and out of prison which counts the resulting prison population each month.\nChart 1: Projected prison population (Central Scenario)\nThe Central Scenario has been modelled assuming custodial convictions are broadly in line with recent trends and average length of sentence to be flat based on recent trends.\nThe projections do not attempt to estimate the impact of any future Government policy that is yet to achieve Royal Assent, and therefore become less certain over time.\n1 As at 21 November 2014: www.gov.uk/government/statistics/prison-population-figures-2014\n2\nPrison Population Projections 2014 - 2020\nThe assumptions used are based on consultation with policy and operational experts at the Ministry of Justice and the National Offender Management Service. They also take into account observed data trends:\n These projections represent a change from last year where the 2013 Scenario 2 (central) saw the population gradually falling over the six year lifetime of the projection. The Central Scenario in the projections this year shows the population rising over the next six years. This change arises from the fact that the latest projections capture a recent upward trend in prosecutions of more serious offences.\n Despite the fact that overall crime is falling there has been an increase in recorded crime for certain offence types:\no Prosecutions for sexual offences are the highest in the decade and increased by 19% in the 12 months ending June 2014, in line with a 21% increase in recorded crime. Offenders sentenced for sexual offences had an Average Custodial Sentence Length (ASCL) of 59.7 months, a rise of 2.4 months, compared with year ending June 2013.\no Violence against the person proceedings for indictable offences have increased by 7% in the 12 months ending June 2014. This is in line with an 11% increase in recorded crime.", + "page_start": 3, + "page_end": 4, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "3a) Producing prison population projections\nPrison population projections are produced using the Prison Population StockFlow Model. The principal sub-populations in prison - determinate sentence, life sentence, imprisonment for public protection (IPP) and remand - are modelled using stock-flow structures based on the generic structure shown in Figure B2. The stock-flow structures model the flow of offenders into and out of prison and count the resulting prison population at the end of each month.\nFigure B2: Generic stock-flow structure in the Prison Population Stock-Flow Model\nFor the determinate population, the monthly inflows to prison are based on the custodial convictions projections described above. These custodial convictions include offenders that may already be serving a sentence for a previous crime or those who would serve their whole custodial sentence on remand, meaning that they would not be a new reception to prison. To convert from custodial convictions to prison receptions we apply a conversion ratio derived from the historical proportions of custodial convictions to prison receptions for each sub-population averaged over the last twelve months of historical data (April 2013 to March 2014 inclusive).\nMonthly outflows for the determinate population are based on observed custodial sentence lengths and the observed percentage of sentence length served taken from October 2013 to April 2014. Each projected offender that enters the model is given a custodial sentence length that is randomly selected from the relevant distribution. These distributions are populated with custodial sentence lengths from actual offender receptions who share the same characteristics of offence, gender and age group in the observed time period. The percent of custodial sentence length served is derived in the same manner, except that the observed distribution is made up of discharged offenders further disaggregated by custodial sentence length band.\nFor offenders who receive the new EDS sentence an adjustment is made to the percent of custodial length served to reflect that these offenders will spend a greater proportion of their sentence in custody than standard determinate sentenced offenders discharged to date.\nProjected prison receptions are sub-divided by age category (Juvenile, Young Adult, Adult) with the exact age of the offender attributed in the same manner as the custodial sentence lengths. This allows the model to explicitly age the offenders whilst in prison (e.g. move from Juvenile to Young Adult categories).\n25\nPrison Population Projections 2014 - 2020\nThe approach for the other sub-populations is similar and has not been substantially revised since the 2013 publication. The methodology applied to each is briefly outlined below.", + "page_start": 26, + "page_end": 27, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "5. Previous Projections\nAt the end of September 2014 the published prison population was within 1.8 % of the 2013 Scenario 2 (central) projection, and within 3.4 % of the 2013 Scenario 1 projection and 0.2 % of the 2013 Scenario 3 projection. This does not indicate which scenario the actual prison population will track going forward.\nDifferences between the 2013 projections and the actual population could be explained by changes, different to those projected, in overall demand, offence mix, age and gender of defendants, court routes, custody rates or sentence lengths.\nChart 3 plots the 2014 Central Scenario projection against the three 2013 prison population projections. The 2014-2020 Central Scenario projection is above all three scenarios from last year. The higher level of the new projections can be attributed to a more serious case mix coming into the courts with a resulting increase in average custodial sentence lengths. The projection for June 2019 in the Central Scenario this year is 10.2 % above the equivalent scenario (Scenario 2) last year.\nChart 3: Comparing 2013 and 2014 projections (November 2014 - December 2020)\n13\nPrison Population Projections 2014 - 2020", + "page_start": 14, + "page_end": 15, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "Appendix A: Additional tables 9\nAnnual tables of overall projected prison population\nTable A1: Projected prison population (end of June figures)\nTable A2: Average projected prison population (financial year figures)", + "page_start": 16, + "page_end": 16, + "source_file": "legal4_opengouvernementlicense.pdf" + } + ] + }, + { + "references": { + "source_file": "legal4_opengouvernementlicense.pdf", + "query": "Do you know the prison population estimation for the and of June 2020 ?", + "target_page": 13, + "target_passage": "The Central Scenario estimates that the prison population will rise to 87,700 by the end of June 2015 and to 90,200 by the end of June 2020. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "4. Results\nThe Central Scenario estimates that the prison population will rise to 87,700 by the end of June 2015 and to 90,200 by the end of June 2020.\nChart 2 presents Prison population projections from November 2014 to December 2020.\nChart 2: Projected monthly prison population (all scenarios)\nIllustrative Scenario 1 estimates that the prison population will rise to 87,100 by the end of June 2015 and then fall to 81,400 by the end of June 2020.\nIllustrative Scenario 2 estimates that the prison population will rise to 88,900 by the end of June 2015 and to 98,900 by the end of June 2020.\nThe projected trends reflect the cumulative impacts of the various sentencing, legislative and procedural assumptions that are used to generate the projections. The seasonal pattern reflects the dip in the prison population which is always seen around the Christmas period.\nIn the Central Scenario, the prison population is expected to rise to 90,200 by June 2020. The projected population increase is largely due to the recent trends in case mix where we have seen more serious cases come before the courts. This results in offenders receiving longer custodial sentence lengths, which in turn places an upward pressure on the prison population. The growth in this scenario is largely driven by the rise in the determinate population which is projected to grow to 60,200 by June 2020. This is partially due to the\n11\nPrison Population Projections 2014 - 2020\nintroduction of the Extended Determinate Sentence (EDS) as part of the Legal Aid, Sentencing and Punishment of Offenders 8 (LASPO) Act which commenced in December 2012. Some of the growth in the determinate population has been offset by a decline in the indeterminate population following the removal of the Imprisonment for Public Protection (IPP) sentence in the LASPO act.\nAppendix A contains tables for annual projected end of June populations, average financial year populations and total monthly populations for each scenario along with detailed breakdown of the projections for our subpopulations.\n8 services.parliament.uk/bills/2010-11/legalaidsentencingandpunishmentofoffenders.html\n12\nPrison Population Projections 2014 - 2020", + "page_start": 12, + "page_end": 14, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "Prison Population Projections 2014 - 2020 England and Wales\nMinistry of Justice Statistics Bulletin\nPublished 27th November 2014\nPrison Population Projections 2014 - 2020", + "page_start": 0, + "page_end": 2, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "Appendix A: Additional tables 9\nPrison Population Projections 2014 - 2020", + "page_start": 22, + "page_end": 22, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "Key points\nThis bulletin presents projections of the prison population in England and Wales from November 2014 to December 2020. The prison population projections are based on assumptions about future custodial convictions and incorporate the anticipated impacts of agreed policy and procedural initiatives.\nThe 'Central Scenario' estimates that the prison population will increase from the current position 85,925 1 to 87,700 by June 2015. By the end of June 2020 the prison population is projected to be 90,200. This Central Scenario is our best estimate based on the available information. The projected prison population under our Central Scenario is shown in Chart 1.\nThe prison population projections are produced using a model of flows of offenders into and out of prison which counts the resulting prison population each month.\nChart 1: Projected prison population (Central Scenario)\nThe Central Scenario has been modelled assuming custodial convictions are broadly in line with recent trends and average length of sentence to be flat based on recent trends.\nThe projections do not attempt to estimate the impact of any future Government policy that is yet to achieve Royal Assent, and therefore become less certain over time.\n1 As at 21 November 2014: www.gov.uk/government/statistics/prison-population-figures-2014\n2\nPrison Population Projections 2014 - 2020\nThe assumptions used are based on consultation with policy and operational experts at the Ministry of Justice and the National Offender Management Service. They also take into account observed data trends:\n These projections represent a change from last year where the 2013 Scenario 2 (central) saw the population gradually falling over the six year lifetime of the projection. The Central Scenario in the projections this year shows the population rising over the next six years. This change arises from the fact that the latest projections capture a recent upward trend in prosecutions of more serious offences.\n Despite the fact that overall crime is falling there has been an increase in recorded crime for certain offence types:\no Prosecutions for sexual offences are the highest in the decade and increased by 19% in the 12 months ending June 2014, in line with a 21% increase in recorded crime. Offenders sentenced for sexual offences had an Average Custodial Sentence Length (ASCL) of 59.7 months, a rise of 2.4 months, compared with year ending June 2013.\no Violence against the person proceedings for indictable offences have increased by 7% in the 12 months ending June 2014. This is in line with an 11% increase in recorded crime.", + "page_start": 3, + "page_end": 4, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "Appendix A: Additional tables 9\nTable A10: Projected male 21 years and over prison population (end of June figures)\nJun-15, Males 21 years and over.Total Population.Scenario 1 = 76,500. Jun-15, Males 21 years and over.Total Population.Central = 77,100. Jun-15, Males 21 years and over.Total Population.Scenario 2 = 78,700. Jun-15, Males 21 years and over.Determinates.Scenario 1 = 47,400. Jun-15, Males 21 years and over.Determinates.Central = 48,200. Jun-15, Males 21 years and over.Determinates.Scenario 2 = 49,800. Jun-16, Males 21 years and over.Total Population.Scenario 1 = 75,800. Jun-16, Males 21 years and over.Total Population.Central = 78,300. Jun-16, Males 21 years and over.Total Population.Scenario 2 = 82,000. Jun-16, Males 21 years and over.Determinates.Scenario 1 = 46,800. Jun-16, Males 21 years and over.Determinates.Central = 49,500. Jun-16, Males 21 years and over.Determinates.Scenario 2 = 53,300. Jun-17, Males 21 years and over.Total Population.Scenario 1 = 74,400. Jun-17, Males 21 years and over.Total Population.Central = 78,500. Jun-17, Males 21 years and over.Total Population.Scenario 2 = 83,700. Jun-17, Males 21 years and over.Determinates.Scenario 1 = 45,900. Jun-17, Males 21 years and over.Determinates.Central = 50,400. Jun-17, Males 21 years and over.Determinates.Scenario 2 = 55,700. Jun-18, Males 21 years and over.Total Population.Scenario 1 = 73,200. Jun-18, Males 21 years and over.Total Population.Central = 78,900. Jun-18, Males 21 years and over.Total Population.Scenario 2 = 85,800. Jun-18, Males 21 years and over.Determinates.Scenario 1 = 45,200. Jun-18, Males 21 years and over.Determinates.Central = 51,300. Jun-18, Males 21 years and over.Determinates.Scenario 2 = 58,200. Jun-19,", + "page_start": 19, + "page_end": 19, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "Appendix A: Additional tables 9\nTable A6: Projected remand prison population (end of June figures)", + "page_start": 17, + "page_end": 17, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "Appendix A: Additional tables 9\nTable A7: Projected recall prison population (end of June figures)", + "page_start": 17, + "page_end": 17, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "Appendix A: Additional tables 9\nTable A4: Projected determinate sentence prison population (end of June figures)\nTable A5: Projected indeterminate sentence prison population (end of June figures)\nJun-15, Sentencing Scenarios.Scenario 1 = 54,600. Jun-15, Sentencing Scenarios.Central = 55,500. Jun-15, Sentencing Scenarios.Scenario 2 = 56,600. Jun-16, Sentencing Scenarios.Scenario 1 = 54,400. Jun-16, Sentencing Scenarios.Central = 57,000. Jun-16, Sentencing Scenarios.Scenario 2 = 60,000. Jun-17, Sentencing Scenarios.Scenario 1 = 53,500. Jun-17, Sentencing Scenarios.Central = 57,900. Jun-17, Sentencing Scenarios.Scenario 2 = 62,300. Jun-18, Sentencing Scenarios.Scenario 1 = 52,600. Jun-18, Sentencing Scenarios.Central = 58,800. Jun-18, Sentencing Scenarios.Scenario 2 = 64,900. Jun-19, Sentencing Scenarios.Scenario 1 = 51,800. Jun-19, Sentencing Scenarios.Central = 59,600. Jun-19, Sentencing Scenarios.Scenario 2 = 67,200. Jun-20, Sentencing Scenarios.Scenario 1 = 51,000. Jun-20, Sentencing Scenarios.Central = 60,200. Jun-20, Sentencing Scenarios.Scenario 2 = 68,900", + "page_start": 17, + "page_end": 17, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "Appendix A: Additional tables 9\nTable A10: Projected male 21 years and over prison population (end of June figures)\nMales 21 years and over.Total Population.Scenario 1 = 72,200. Jun-19, Males 21 years and over.Total Population.Central = 79,300. Jun-19, Males 21 years and over.Total Population.Scenario 2 = 87,500. Jun-19, Males 21 years and over.Determinates.Scenario 1 = 44,600. Jun-19, Males 21 years and over.Determinates.Central = 52,000. Jun-19, Males 21 years and over.Determinates.Scenario 2 = 60,300. Jun-20, Males 21 years and over.Total Population.Scenario 1 = 71,100. Jun-20, Males 21 years and over.Total Population.Central = 79,400. Jun-20, Males 21 years and over.Total Population.Scenario 2 = 88,700. Jun-20, Males 21 years and over.Determinates.Scenario 1 = 44,000. Jun-20, Males 21 years and over.Determinates.Central = 52,600. Jun-20, Males 21 years and over.Determinates.Scenario 2 = 62,000", + "page_start": 19, + "page_end": 19, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "5. Previous Projections\nAt the end of September 2014 the published prison population was within 1.8 % of the 2013 Scenario 2 (central) projection, and within 3.4 % of the 2013 Scenario 1 projection and 0.2 % of the 2013 Scenario 3 projection. This does not indicate which scenario the actual prison population will track going forward.\nDifferences between the 2013 projections and the actual population could be explained by changes, different to those projected, in overall demand, offence mix, age and gender of defendants, court routes, custody rates or sentence lengths.\nChart 3 plots the 2014 Central Scenario projection against the three 2013 prison population projections. The 2014-2020 Central Scenario projection is above all three scenarios from last year. The higher level of the new projections can be attributed to a more serious case mix coming into the courts with a resulting increase in average custodial sentence lengths. The projection for June 2019 in the Central Scenario this year is 10.2 % above the equivalent scenario (Scenario 2) last year.\nChart 3: Comparing 2013 and 2014 projections (November 2014 - December 2020)\n13\nPrison Population Projections 2014 - 2020", + "page_start": 14, + "page_end": 15, + "source_file": "legal4_opengouvernementlicense.pdf" + } + ] + }, + { + "references": { + "source_file": "legal4_opengouvernementlicense.pdf", + "query": "What is the phone number of the Ministry of Justice press office ?", + "target_page": 30, + "target_passage": "Press enquiries should be directed to the Ministry of Justice press office, telephone: 020 3334 3536 ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Contact Points for further information\nCurrent and previous editions of this publication are available for download from www.justice.gov.uk/publications/statistics-and-data/index.htm\nPress enquiries should be directed to the Ministry of Justice press office, telephone: 020 3334 3536\nOther enquiries about these statistics should be directed to:\nJustice Statistics Analytical Services Ministry of Justice 7th Floor 102 Petty France London SW1H 9AJ\nGeneral enquiries about the statistical work of the Ministry of Justice can be emailed to: statistics.enquiries@justice.gsi.gov.uk\nGeneral information about the official statistics system of the UK is available from www.statistics.gov.uk\n28\nPrison Population Projections 2014 - 2020\nAlternative format versions of this report are available on request from the Ministry of Justice at statistics.enquiries@justice.gsi.gov.uk\n© Crown copyright Produced by the Ministry of Justice\n29", + "page_start": 29, + "page_end": 30, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "R o m a n i a\n9 Alexandru Ioan Cuza Blvd. Sector 1, Bucharest, Romania Tel: 401-310-3363 Fax: 401-310-3383", + "page_start": 46, + "page_end": 46, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "H u n g a r y\nHorvát u. 14-24. 1027 Budapest, Hungary Tel: 36-1-224-1000\nFax: 36-1-224-1013", + "page_start": 46, + "page_end": 46, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "Thailand Exploration Office\nIssara Mining Limited\n156/9-10 Moo 11, Tambol Dong Khui Amphur Chon Daen Phetchabun 67190\nThailand\nTel:\n+66 56 649 253\nFax:\n+66 56 649 082", + "page_start": 117, + "page_end": 117, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Bangkok Office\nAkara Resources Public Company Limited\n19th Floor, Sathorn Thani Building 2 No. 92/54-55 North Sathorn Road Kwaeng Silom, Khet Bangrak Bangkok 10500 Thailand\nTel:\n+66 2 233 9469\nFax:\n+66 2 236 5512", + "page_start": 117, + "page_end": 117, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "C r o a t i a\nZelinska 3/5 10000 Zagreb, Croatia Tel: 385-1-63-26-777\nFax: 385-1-63-26-778", + "page_start": 46, + "page_end": 46, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "G e r m a n y\nCharlottenstrasse 18 10117 Berlin, Germany Tel: 49-30-2039-6800 Fax: 49-30-2039-6855", + "page_start": 46, + "page_end": 46, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "a 5000 a 5001\n, San tos H am Str ustr ustr tos H ouse eet\nouse eet ali ali\ne\nd\nA\non\neleph\nT\nOFFICES Brisbane\nes:\negister enquiri\ne r\nShar\n.com\ntos\negister@san\nr\n.\ne\nshar\n, Suite 500\nue\nven\nd A\non\nchm\n10111 Ri\nA Corp.\nS\ntos U\nSan\nLevel 14, San\nd Str\nwar\n60 Ed\nA\nS\nas 77042 U\nx\ne\nouston, T\nH\nes:\nInvestor enquiri\ne 1-713 986 1700\non\neleph\nT\nd 4000\nslan\nQueen\n,\ne\nBrisban\n.com\ntos\ns@san\non\nelati\n.r\ninvestor\nFacsimile 1-713 986 4200\ne 07 3228 6666\non\neleph\nT\nFacsimile 07 3228 6920\nerth\nP\nREGISTERED AND HEAD OFFICE\nace\nerr\nes T\ng\n221 St Geor\neet\nam Str\ng Willi\n91 Kin\narta\nacific Pty Ltd in Jak\nFacsimile 08 8218 5950\nCTS\nA\nes:\nt enquiri\nen\nEmploym\n.com\ntos\nt@san\nen\necruitm\nr\nWEBSITE\n.com\ntos\n.san\nwww", + "page_start": 95, + "page_end": 95, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "P o l a n d\nul. Emilii Plater 28 00-688 Wa r s a w, Poland Tel: 48-22-690-5100\nFax: 48-22-690-5101", + "page_start": 46, + "page_end": 46, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "P apua Ne Barr acu Level 8, P Cnr Champi an d M usgr P ort M T eleph on Repr A s ia P TEGY\ne\ntr\nest Cen\nLevel 28, Forr\nouse\ntos H\n, San\nd Floor\noun\nGr\na 6000\nali\nustr\nestern A\nrth, W\ne\nP\na 5000\nali\nustr\n, South A\ne\nd\nelai\nd\nA\neet\nave Str\ne 08 9460 8900\non\neleph\nT\nx 2455\nGPO Bo\nFacsimile 08 9460 8971\na 5001\nali\nustr\n, South A\ne\nd\nelai\nd\nA\ne 675 321 2633\nFacsimile 675 321 2847\noject Office\nMelbourne Pr\ne 08 8218 5111\non\neleph\nT\nFacsimile 08 8218 5274\nSHARE REGISTER Gr oun d Floor 91 Kin g Willi A d elai d e , South A GPO Bo x 2455 elai d , South A e 08 8218 5111\nower\nce T\nLevel 9, Ratu Plaza Offi\nav 9\nan K\ndirm\nal Su\nr\nd\nn\ne\nalan J\nJ\na\nesi\nn\no\nd\narta 10270 In\nk\na\nJ\nS GN\nx 6621, JK\nPO Bo\na\nesi\nn\no\nd\narta 12060 In\nk\na\nJ\na 5600\nali\nustr\ne 62-21 270 0410\non\neleph\nT\nFacsimile 62-21 720 4503\nUSEFUL E-MAIL CONT\nAmerica\nLevel 7, 34 Queen Str eet M elbourn e , Vi ctori a 3000 T eleph on e: 03 8614 8500 Facsimile: 03 8614 8511 P ort Bon ython PO Bo x 344 Wh yalla, South A T eleph on e 08 8640 3100 Facsimile 08 8640 3200 United States o f", + "page_start": 95, + "page_end": 95, + "source_file": "ASX_STO_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf", + "query": "What is SOLR ?", + "target_page": 4, + "target_passage": "Search engine used for portal content search and dataset search ", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "1.3 Terminology\nTable 1-2: Abbreviations and Acronyms\nSPARQL, Description = Query language for linked data (RDF). SSL, Description = Secure Socket Layer. URL, Description = Uniform Resource Locator. XML, Description = Extensible Markup Language", + "page_start": 4, + "page_end": 4, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "9.2 SPARQL Queries\nSPARQL is a powerful language, and one could write a whole book about it. In fact, there are books written about it. The best one I have seen is the O'Reilly book Learning SPARQL by Bob DuCharme. This is an excellent book that not only goes into SPARQL but into topics such as RDF/RDFS and how triples are used to represent all information in OWL. I will only touch on those issues here, there is much more to say about them and DuCharme's book is a great place to learn more. If some of the following is a bit hard to understand don't be discouraged. This is just an attempt to give a very high level introduction to something that requires significant study to really understand.\nEssentially SPARQL is to the Semantic Web and Knowledge Graphs as SQL is to relational databases. Just as SQL can do more than just query, it can also assert new information into a database, so SPARQL can as well. The current SPARQL plugins for Protégé are somewhat limited and don't support the statements such as INSERT for entering new data so we will just cover the basics of using SPARQL as a query language but keep in mind there is a lot more to it than what we briefly cover here.", + "page_start": 67, + "page_end": 67, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "Portal Version 4.3 -User Manual\n................................................................................................................... 54. 3.7.1, 1 = SPARQL Search .............................................................................................................. 54. 3.7.2, 1 = SPARQL Assistant ........................................................................................................... 55. 3.7.3, 1 = SPARQL Saving/Modifying a Query ............................................................................... 56. 3.7.4, 1 = SPARQL Queries", + "page_start": 2, + "page_end": 2, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "3.1.2 HAL (Clustering)\nHyper Articles en Ligne (HAL) is a French open archive of scholarly documents from all academic fields. Scrapping this resource, we fetched 85,000 publications in French 5 . We extracted IDs, titles and the author's choice among domain labels. The last 2 are provided by authors when submitting their papers to HAL. Since domain annotations are provided, the dataset can be used for many tasks, such as topic modeling or text classification. To ensure the dataset quality is suitable for a benchmark, further data cleaning has been performed:\n· Duplicates are eliminated, retaining unique publications for each field.\n· Irrelevant titles (due to API indexing mistakes) or titles in languages other than French have been manually removed.\n3 https://www.syntec.fr/convention-collective/\n4 https://huggingface.co/datasets/lyon-nlp/ mteb-fr-retrieval-syntec-s2p\n5 https://huggingface.co/datasets/lyon-nlp/ clustering-hal-s2s\nTable 1: New datasets details with the number of samples, the creation process, the annotation process and the quality checks. All datasets are test splits.", + "page_start": 1, + "page_end": 2, + "source_file": "arxiv4.pdf" + }, + { + "text": "Document indexing\nDocument indexing is used for reports that contain logical items, such as customer name or number. Each of the items in a report can be individually indexed on values, such as account number, customer name, and balance. Content Manager OnDemand supports up to 128 index values per item. With document indexing, the user is not necessarily required to know about reports or report cycles to retrieve a document from Content Manager OnDemand.", + "page_start": 33, + "page_end": 33, + "source_file": "sg246915.pdf" + }, + { + "text": "Application group\nAn application group contains the storage management attributes of and index fields for the data that you load into Content Manager OnDemand. When you load a report into Content Manager OnDemand, you must identify the application group where Content Manager OnDemand loads the index data and stores the documents.\nAn application group is a collection of one or more Content Manager OnDemand applications with common indexing and storage management attributes. You typically group several related reports in an application group so that users can access the information that is contained in the reports with a single query. All of the applications in the application group must be indexed on one or more common fields, for example, customer name, account number, or date.", + "page_start": 31, + "page_end": 31, + "source_file": "sg246915.pdf" + }, + { + "text": "9.21 Some SPARQL Pizza Queries\nTo start with go to the SPARQL Query tab. If it isn't already there you can as always add it using Window>Tabs>SPARQL Query. This tab consists of two views, the top which holds the query and the bottom which holds the results. There should be some text already there. It may look confusing, but we'll explain it. Just to start with hit the Execute button at the bottom of the tab. You should see a bunch of classes and class expressions returned.\n67\nTo understand what is going on you first need to understand that each SPARQL query consists of two parts. The first part at the beginning consists of several namespace prefixes. These statements consist of the prefix used for a particular namespace as well as the IRI associated with this namespace. Recall that these concepts were described in chapter 7. You may be wondering where all these prefixes came from since you didn't add them to your ontology. The answer is that every OWL ontology comes with a set of namespaces and prefixes that are required to define the ontology.\nAlso, to understand SPARQL you need to 'peak under the hood' of OWL. So far, we have been discussing concepts in purely logical and set theoretic terms, i.e., at the semantic level. However, like any language or database there is a lower level that describes how the concepts are mapped to actual data. In a relational database the fundamental construct to represent data is a table. In OWL the fundamental construct is a triple. OWL is actually built on top of RDFS which is a language built on top of RDF. RDF (Resource Description Framework) is a language to describe graphs (in the mathematical sense of the term). I.e., to describe nodes and links.\nThe foundation for RDF graphs are triples consisting of a subject, predicate, and object. This results in what is called an undirected or network graph because objects can be subjects and vice versa. Whenever you define a property in OWL you are defining a predicate. An individual can be a subject or an object (or both). E.g., in our ontology Customer1 purchasedPizza AmericanaHotPizza1 . In this example Customer1 is the subject, purchasedPizza is the predicate and AmericanaHotPizza1 is the object.", + "page_start": 67, + "page_end": 68, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "Extent\nAn extent is a fixed-size unit of data that is used to manage the mapping of data between MDisks and volumes. The size of the extent can range 16 MB - 8 GB.", + "page_start": 797, + "page_end": 797, + "source_file": "sg247938.pdf" + }, + { + "text": "Portal Version 4.3 -User Manual\n.......................................................................... 48. 3.6, 1 = Metadata Quality Assurance (MQA) ..................................................................................... 50. 3.6.1, 1 = The Global Dashboard View .......................................................................................... 50. 3.6.2, 1 = The Catalogue details view ............................................................................................ 51. 3.7, 1 = SPARQL Manager", + "page_start": 2, + "page_end": 2, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "3.7.2 SPARQL Assistant\nThe SPARQL assistant extends the functionality of the simple SPARQL search described in the previous section. More complex queries for datasets could be built by clicking several options in the GUI.", + "page_start": 54, + "page_end": 54, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + } + ] + }, + { + "references": { + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf", + "query": "What is the function of the Graphical Data Visualisation Tool module ?", + "target_page": 6, + "target_passage": "How to visualize graphical data from a dataset resource ", + "chunk_present": { + "presence": true, + "index": 6 + } + }, + "top_chunk": [ + { + "text": "3.4 Graphical Data Visualisation Tool\nThis section describes the features of the graphical visualisation tool for numeric data. The features are currently available for XLS (Excel) and CSV files, except for the selection of the sheet name which is applicable only for Excel files.\nMost GUI elements from th e 'Graph' tab (records selection, search box, filters and fields buttons) are al so available on the 'Grid' tab and work in the same way.", + "page_start": 42, + "page_end": 42, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "3.4.1 How to visualize graphical data from a dataset resource\nAs a result of a dataset search, the system displays on th e 'Dataset' tab all distributions (resource/data files) that are part of the selected dataset. Each XLS or CSV distribution of the dataset can be further explored by clicking on ' Open Visualization ' under the ' Options ' button -if available.\nEuropean Data Portal Version 4.3 -User Manual\nPage 43 of 57\nAfter clicking on the ' Open Visualization ' button, the user should execute the following steps:", + "page_start": 42, + "page_end": 43, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "Portal Version 4.3 -User Manual\nTable of Contents\nHow to visualize graphical data from a dataset resource ............................................. 43, 1 = 3.4.1 How to visualize graphical data from a dataset resource ............................................. 43. 3.4.1 How to visualize graphical data from a dataset resource ............................................. 43, 2 = ", + "page_start": 1, + "page_end": 1, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "3.3 Visualization of Geo-Spatial Data (map.apps)\nThe visualization of geo-spatial data within the European Data Portal provides previewing functionality for spatial open data. The aim is to allow the user to assess if a dataset meets specific requirements in terms of spatial and thematic coverage. The functionality that is provided in the header (links to disclaimers and language switching) is consistent in the entire portal.", + "page_start": 37, + "page_end": 37, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "Portal Version 4.3 -User Manual\nDataset Resource Page with Link to Geo-Spatial Visualisation. ........................................... 38. Figure 4, 1 = - Selection of layers................................................................................................................. 39. Figure 5, 1 = - Feature Info tool. .................................................................................................................. 40. Figure 6, 1 = - Legend tool. .......................................................................................................................... 40. Figure 7 -", + "page_start": 2, + "page_end": 2, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "3.3.1 How to visualize geo-spatial data from a dataset resource\nAccessing the geo-spatial visualization is achieved via the Data Platform interface. A user searches for specific data, enters the dataset view of reasonable results and displays the available distributions (see Section 3.2.5). If a dataset distribution is supported by the geo-spatial visualization, a globe button is displayed (see Figure 3). This is the entry point into the map viewer application. Supported formats are OGC Web Map Service (WMS) and GeoJSON. If the user visits the geo-spatial visualization for the first time, an interactive user tutorial is provided to guide the use through specific functions of the user interface, similar to this written user manual.\nFigure 3 -Dataset Resource Page with Link to Geo-Spatial Visualisation.\nEuropean Data Portal Version 4.3 -User Manual\nPage 38 of 57\nOnce within the map viewer application, the user can decide which layers to be displayed. Most Web Map Service (WMS) instances provide more than one layer. The geo-spatial visualization provides a dialog for choosing the desired layers for display (see Figure 4).\nFigure 4 -Selection of layers.\nIn order to examine the resource in more detail, the user can click on a geographic feature while the 'Feature Info' tool is enabled (see Figure 5). This function is only enabled if the service supports this kind of detailed query.\nEuropean Data Portal Version 4.3 -User Manual\nPage 39 of 57\nFigure 5 -Feature Info tool.\nThe different disp layed layers can be examined using the 'Legend' tool. If the external service provides legend graphics, the user can interpret the given symbology and temporarily disable the display of layers (see Figure 6).\nFigure 6 -Legend tool.\nEuropean Data Portal Version 4.3 -User Manual\nPage 40 of 57\nThe two buttons on the bottom right of the map viewer (see Figure 7) can be used to display an informational disclaimer and to start the user interface tutorial.\nFigure 7 -Disclaimer and tutorial buttons.\nIn some cases the user might experience the display of an error message. The geo-spatial visualization tries to support all flavors of external services but cannot guarantee to work with broken services. In these situations an error message dialog is presented and the user can decide if a support ticket shall be opened (see Figure 8).\nEuropean Data Portal Version 4.3 -User Manual", + "page_start": 37, + "page_end": 40, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "The table 1-3 below lists the described functions by module.\n1, Module Name = Portal HomePage. 1, Function = (how to access Resources on Open Data: eLearning modules, Training Companion, Reports about Open Data) - How to vi ew / search for 'Latest News' - How to view / search for 'Open Data Events' - How to subscribe to the EDP Newsletter - How to view 'Tweets' on the EDP - How to switch to another User Language. 2, Module Name = Datasets (Data Platform). 2, Function = - How to search for Datasets by Keyword Entering the Datasets-View. , Module Name = . , Function = How to filter datasets by using 'Faceted Search'. , Module Name = . , Function = How to store personal queries. , Module Name = . , Function = How to download dataset distributions. , Module Name = . , Function = How to view licensing information How to switch to another user language. , Module Name = . , Function = How to browse by data catalogues. 3, Module Name = Visualization of Geo-Spatial Data (map.apps). 3, Function = How to visualize geo-spatial data from a dataset resource. 4, Module Name = Graphical Data Visualisation Tool. 4, Function = How to visualize graphical data from a dataset resource. 5, Module Name = Help Desk. 5, Function = How to contact The Portal's Help Desk. 6, Module Name = Metadata Quality Assurance (MQA). 6, Function = Monitoring tool for the metadata quality: - The Global Dashboard View - The Catalogue details view. 7, Module Name = SPARQL Manager. 7, Function = How to run SPARQL Queries using: - SPARQL Search\nEuropean Data Portal Version 4.3 -User Manual\nPage 6 of 57\nTable 1-3: Main functions of the Portal Version 3.0", + "page_start": 5, + "page_end": 6, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "3.3.1 How to visualize geo-spatial data from a dataset resource\nPage 41 of 57\nFigure 8 -Error message dialog.\nEuropean Data Portal Version 4.3 -User Manual\nPage 42 of 57", + "page_start": 40, + "page_end": 41, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "The table 1-3 below lists the described functions by module.\nEuropean Data Portal Version 4.3 -User Manual\nPage 7 of 57", + "page_start": 6, + "page_end": 6, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "Portal Version 4.3 -User Manual\nTable of Contents\n...................................................................... 36. 3.2.7, 2 = . 3.2.8, 1 = How to browse by data catalogues ............................................................................... 37. 3.2.8, 2 = . 3.3, 1 = Visualization of Geo-Spatial Data (map.apps) ....................................................................... 38. 3.3, 2 = . 3.3.1, 1 = How to visualize geo-spatial data from a dataset resource .......................................... 38. 3.3.1, 2 = . 3.4, 1 = Graphical Data Visualisation Tool .......................................................................................... 43. 3.4, 2 = . 3.4.1", + "page_start": 1, + "page_end": 1, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + } + ] + }, + { + "references": { + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf", + "query": "How to view “Tweets” on the EDP ?", + "target_page": 20, + "target_passage": "The Home Page displays the latest tweets on the European Data Portal in the “Tweets” panel on the right hand side. ‐ ‐ Click on any of the tweets to display the complete tweet on twitter. Scroll vertically to see previous tweets. ", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "3.1.5 How to view 'Tweets' on the EDP\nThe Home Page displays the latest tweets on the European Data Portal in the 'Tweets' pa nel on the right hand side.\n-Click on any of the tweets to display the complete tweet on twitter.\n-Scroll vertically to see previous tweets.\nEuropean Data Portal Version 4.3 -User Manual\nPage 20 of 57", + "page_start": 19, + "page_end": 19, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "Portal Version 4.3 -User Manual\nTable of Contents\n'Latest News' ....................................................................... 17. 3.1.2, 2 = . 3.1.3, 1 = How to view / search for 'Open Data Events' .............................................................. 18. 3.1.3, 2 = . 3.1.4, 1 = How to subscribe to the EDP Newsletter ...................................................................... 19. 3.1.4, 2 = . 3.1.5, 1 = How t o view 'Tweets'", + "page_start": 1, + "page_end": 1, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "3.2. Data\nTo collect these tweets, we used a Python-based crawler to send requests to the Twitter server to select hashtags, language, start date, and end date as inputs. Once the first request was completed, the server responded with a file in json format and the first 20 qualified tweets in a time-descending order. By parsing the json file, we obtained a string for the crawler to build the next request and obtain the next 20 tweets. Thus, a loop was written to keep the crawler sending requests and the crawler was automatically terminated when all the qualified tweets publicly available were collected. Our crawler respected Twitter's robot.txt and we did not collect, analyze or display any user information in our study. To collect these tweets, we used a Python-based crawler to send requests to the Twitter server to select hashtags, language, start date, and end date as inputs. Once the first request was completed, the server responded with a file in json format and the first 20 qualified tweets in a time-descending order. By parsing the json file, we obtained a string for the crawler to build the next request and obtain the next 20 tweets. Thus, a loop was written to keep the crawler sending requests and the crawler was automatically terminated when all the qualified tweets publicly available were collected. Our crawler respected Twitter's robot.txt and we did not collect, analyze or display any user information in our study.\nFigure 1. The number of tweets containing #climatechange or #globalwarming, and their ratio from 2009 to 2018 ( a ). The number of hashtags contained in the 'climate change' or 'global warming' datasets, and their ratio from 2009 to 2018 ( b ). Figure 1. The number of tweets containing #climatechange or #globalwarming, and their ratio from 2009 to 2018 ( a ). The number of hashtags contained in the 'climate change' or 'global warming' datasets, and their ratio from 2009 to 2018 ( b ).\nInt. J. Environ. Res. Public Health 2020 , 17 , 1062\n6 of 22", + "page_start": 4, + "page_end": 5, + "source_file": "pubmed10.pdf" + }, + { + "text": "3. Methods 3.1. Data Source\nAs Twitter has been recognized as a popular discussion forum [75] and a social activity\nplatform [76] for climate issues, we followed the literature [5,8,18] and used tweets to investigate", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed10.pdf" + }, + { + "text": "3.1.7 How to search for EDP Site Content\nIn order to search within the Portal's site content (i.e. editorial content, articles, events, reports etc.), enter any keyword in the 'Search site content' text box and click on the button .\nThe site will display all matching content found (here for keywo rd ' Brussels '):", + "page_start": 21, + "page_end": 21, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "References\n66. Conover, M.D.; Ratkiewicz, J.; Francisco, M.; Gonçalves, B.; Menczer, F.; Flammini, A. Political polarization on twitter. In Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, Barcelona, Spain, 17-21 July 2011.\n67. Kitzie, V.; Ghosh, D. # Criming and# Alive: Network and content analysis of two sides of a story on twitter. In Proceedings of the 78th ASIS&T Annual Meeting: Information Science with Impact: Research in and for the Community, St. Louis, MO, USA, 6-10 October; 2015; p. 41.\n68. Burgess, J.; Galloway, A.; Sauter, T. Hashtag as hybrid forum: The case of# agchatoz. In Hashtag Publics. The Power and Politics of Discursive Networks ; Peter Lang: New York, NY, USA, 2015; pp. 61-76.\n69. Rushko GLYPH<11> , D. 17. Permanent revolution: Occupying democracy. In The Playful Citizen ; Amsterdam University Press: Amsterdam, The Netherlands, 2013; p. 335.\n70. Grundberg, M.D.; Lindgren, S. Translocal frame extensions in a networked protest: Situating the# IdleNoMore hashtag. IC Rev. Cient í fica De Inf. Y Comun. 2015 , 11 , 49-57.\n71. Bruns, A.; Burgess, J.E. # ausvotes: How Twitter covered the 2010 Australian federal election. Commun. Politics Cult. 2011 , 44 , 37-56.\n72. Pearce, W.; Holmberg, K.; Hellsten, I.; Nerlich, B. Climate change on Twitter: Topics, communities and conversations about the 2013 IPCC Working Group 1 report. PLoS ONE 2014 , 9 , e94785. [CrossRef]\n73. Zhao, W.X.; Jiang, J.; Weng, J.; He, J.; Lim, E.P.; Yan, H.; Li, X. Comparing twitter and traditional media using topic models. In Proceedings of the European Conference on Information Retrieval, Dublin, Ireland, 18-21 April 2011; pp. 338-349.", + "page_start": 19, + "page_end": 19, + "source_file": "pubmed10.pdf" + }, + { + "text": "References\n74. Doctor, V. Hashtag History: When and What Started It? Available online: https: // www.hashtags.org / featured / hashtag-history-when-and-what-started-it / (accessed on 16 January 2020).\n75. Newman, T.P. Tracking the release of IPCC AR5 on Twitter: Users, comments, and sources following the release of the Working Group I Summary for Policymakers. Public Underst. Sci. 2017 , 26 , 815-825. [CrossRef]\n76. Segerberg, A.; Bennett, W.L. Social media and the organization of collective action: Using Twitter to explore the ecologies of two climate change protests. Commun. Rev. 2011 , 14 , 197-215. [CrossRef]\n77. Statista. Number of Monthly Active Twitter Users Worldwide from 1st Quarter 2010 to 1st Quarter 2019 (in Millions). 2019. Available online: https: // www.statista.com / statistics / 282087 / number-of-monthly-activetwitter-users / (accessed on 10 October 2019).\n78. Liu, Y.; Kliman-Silver, C.; Mislove, A. The tweets they are a-changin': Evolution of Twitter users and behavior. In Proceedings of the Eighth International AAAI Conference on Weblogs and Social Media, Ann Arbor, MI, USA, 1-4 June 2014.\nInt. J. Environ. Res. Public Health 2020 , 17 , 1062\n21 of 22", + "page_start": 19, + "page_end": 20, + "source_file": "pubmed10.pdf" + }, + { + "text": "3.2. Data\nAll the hashtags in the tweets were automatically extracted with the Regular Expression Library in Python. Hashtags were transformed to lowercase letters, and clear synonyms were stemmed (e.g., #trump, #DonaldTrump, #donaldtrump). As all the tweets in the 'climate change' dataset contained the #climatechange hashtag and all the tweets in the 'global warming' dataset contained the #globalwarming hashtag, we did not document these two hashtags when processing data. The number of hashtags contained in the two discourses in each year is displayed in Figure 1b. Hashtags whose frequency was lower than ten times are excluded in the network analysis. As hashtags are intended to be a topic anchor [52], extremely low frequency means that the hashtag is not recognized socially, and excluding them helps researchers focus on meaningful rather than occasional associations.", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed10.pdf" + }, + { + "text": "3.1.2 How to view / search for 'Latest News'\nThe Home Page displays the latest 4 news items in the 'Latest News' panel on the left hand side.\n-Click on any of the 4 news items to display the complete news article (here: item#1).\n-Or click on 'More news' in order to fin d previously published news articles in the news archive.\nEuropean Data Portal Version 4.3 -User Manual\nPage 17 of 57", + "page_start": 16, + "page_end": 16, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "References\n58. Yang, L.; Sun, T.; Zhang, M.; Mei, Q. We know what@ you# tag: Does the dual role a GLYPH<11> ect hashtag adoption? In Proceedings of the 21st international conference on World Wide Web, Lyon, France, 16-20 April 2012; pp. 261-270.\n59. Weller, K.; Dröge, E.; Puschmann, C. Citation Analysis in Twitter: Approaches for Defining and Measuring Information Flows within Tweets during Scientific Conferences. In Proceedings of the Making Sense of Microposts 2011, Heraklion, Greece, 30 May 2011; pp. 1-12.\n60. Meraz, S. Hashtag wars and networked framing: The private / public networked protest repertoires of occupy on twitter. In Between the Public and Private in Mobile Communication ; Routledge: Abingdon, UK, 2017; pp. 303-323.\n61. Meraz, S.; Papacharissi, Z. Networked gatekeeping and networked framing on# Egypt. Int. J. Press. 2013 , 18 , 138-166.\n62. Papacharissi, Z.; de Fatima Oliveira, M. A GLYPH<11> ective news and networked publics: The rhythms of news storytelling on# Egypt. J. Commun. 2012 , 62 , 266-282.\n63. Wang, X.; Wei, F.; Liu, X.; Zhou, M.; Zhang, M. Topic sentiment analysis in twitter: A graph-based hashtag sentiment classification approach. In Proceedings of the 20th ACM International Conference on Information and Knowledge Management, Scotland, UK, 24-28 October 2011; pp. 1031-1040.\n64. Laniado, D.; Mika, P. Making sense of twitter. In Proceedings of the International Semantic Web Conference 2010, Shanghai, China, 7-11 November 2010; pp. 470-485.\n65. Gonz á lez-Ib á nez, R.; Muresan, S.; Wacholder, N. Identifying sarcasm in Twitter: A closer look. In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies: Short Papers-Volume 2, Portland, OR, USA, 19-24 June 2011; pp. 581-586.", + "page_start": 19, + "page_end": 19, + "source_file": "pubmed10.pdf" + } + ] + }, + { + "references": { + "source_file": "welcome_to_word_template.pdf", + "query": "Where can we open a document saved on OneDrive ?", + "target_page": 2, + "target_passage": "When you save this document in OneDrive, you’ll be able to open it anywhere: on your computer, tablet, or phone. Your changes will be saved automatically.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Save this for later, access it anywhere\nWhen you save this document in OneDrive, you'll be able to open it anywhere: on your computer, tablet, or phone. Your changes will be saved automatically.\nTry it: Select File > Save As , and then select OneDrive and give this document a name.\nIf you sign in to Office 365 on another device, this document will be in your list of recent files. You can pick up where you left off… even if you left the document open on the computer you're using now.", + "page_start": 1, + "page_end": 1, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "Access files anywhere\nNeed to work on the go and across different devices? Click File > Account to sign in with your Microsoft account and access your recently used files anywhere, on any device, through seamless integration between Office, OneDrive, OneDrive for Business, and SharePoint.", + "page_start": 1, + "page_end": 1, + "source_file": "Word QS.pdf" + }, + { + "text": "Share and collaborate\nWith this document saved in OneDrive, you can share it with others. They don't even need Word to open it.\nTry it: Select Share , and send a link to this document. (keyboard shortcut - Alt+F+Z or Alt+Z+S)\nYou can send the link by typing someone's email address or by copying the link and pasting it into a message or chat. If you want them to read the document but not edit it, set their permission to view-only.\nIf they don't have Word, the document will open in their web browser, in Word Online.", + "page_start": 2, + "page_end": 2, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "Find recent files\nWhether you only work with files stored on your PC's local hard drive or you store files in multiple shared locations, selecting File > Open takes you to your recently used documents and any files that you may have pinned to your list.", + "page_start": 1, + "page_end": 1, + "source_file": "Word QS.pdf" + }, + { + "text": "To enter text : To save a new document :\n1. Click the cell pointer on the desired cell and 1. Click on the File Tab and select Save As\ntype the required information 2. Press , an arrow key or to 2. Locate the storage folder in the Navigation pane\nconfirm the data entry and to move the cell 3. Type a File name and click on [Save]\npointer to another cell\nITTraining@sgul.ac.uk\nPage 3\nSt. George's Information Services", + "page_start": 6, + "page_end": 6, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "View who else is typing\nCo-authoring Word documents that are shared on OneDrive or on a SharePoint site happens in real-time, which means you can easily view where other authors are making changes in the same document that you're currently working in.", + "page_start": 2, + "page_end": 2, + "source_file": "Word QS.pdf" + }, + { + "text": "Word\nWord PDF Accessibility", + "page_start": 0, + "page_end": 0, + "source_file": "office-pdf.pdf" + }, + { + "text": "Share your work with others\nTo invite others to view or edit your documents, select the Share button in the top right corner of the app window. Then, you can choose to share a link to your document or send invitations directly to specific people. If someone doesn't have Word, they can use the free Word for the Web app to edit and comment.", + "page_start": 3, + "page_end": 3, + "source_file": "Word QS.pdf" + }, + { + "text": "Handy to Know… Handy to Know…\n You can also print a document directly, without opening the Print dialog box. Click the arrow on the Quick Access toolbar,  If you save your workbook using the close command, the workbook will be closed without the prompting message above.\nClick Quick Print. This will send one copy of the document directly to the printer.  Excel allows you to have a number of workbooks open at the same time. When you close a workbook when others are still open one of the others will then appear.\n\nMicrosoft Excel", + "page_start": 42, + "page_end": 42, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Action: Properties\nSelect Properties to view more information about the drive, as shown in Figure 6-33.\nFigure 6-33 Drive properties\nYou can find a short description of each drive property by hovering on it and clicking [?] . You can also display drive slot details by changing to the Drive Slot tab.\nTo get all available information about the particular drive, use the CLI command lsdrive with drive ID as the parameter. To get slot information, see the lsenclosureslot command.", + "page_start": 235, + "page_end": 235, + "source_file": "sg247938.pdf" + } + ] + }, + { + "references": { + "source_file": "welcome_to_word_template.pdf", + "query": "What is the bold keyboard shortcut on word ?", + "target_page": 4, + "target_passage": "Bold (keyboard shortcut: Ctrl+B)", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Make your meaning more visual by formatting text\nTo format text, select it, and then select a button in the Font or Paragraph area on the Home tab.\nTry it: Select text in the lines below and choose formatting options so that the text is an example of the formatting it's describing:\nPro tip: If you selected whole words for this exercise, did you notice that Word popped up a little toolbar, with the font formatting options?\nBetween that and keyboard shortcuts like Ctrl+B and Ctrl+I, you save time by not having to go up to the Home tab all the time.", + "page_start": 3, + "page_end": 3, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "Try it: Get help:\n1. Go to Tell me what you want to do at the top of the window.\n2. Type what you want to do.\nFor example, type:\n Add watermark to quickly get to the watermark command.\n Help to go to Word help.\n Training to see the list of Word training courses.\n What's new for a list of the most recent updates to Word", + "page_start": 7, + "page_end": 7, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "Try it: Apply the Heading 1 style:\n1. Put your cursor somewhere in the heading above ('Make magic: use Heading styles') don't select anything.\n2. On the Home tab, find Styles , and select Heading 1 (keyboard shortcut Ctrl+Alt+1).\nTa-da! Now it looks like a heading, and acts like one too.", + "page_start": 4, + "page_end": 4, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "Word\nWord PDF Accessibility", + "page_start": 0, + "page_end": 0, + "source_file": "office-pdf.pdf" + }, + { + "text": "Handy to Know…\n You can jump directly to a font. For example, if you want to preview Garamond , click on the name of the font in the Font command and press . Excel will jump to the fonts that start with G and Live Preview will display the text temporarily. Keep typing the name until you reach the required font.\n\nMicrosoft Excel", + "page_start": 21, + "page_end": 21, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Tasks:\nBefore starting this exercise you MUST have completed all of the topics in the chapter Font Formatting…\n Open the workbook called PE_Font Formatting.xlsx (it can be found in the same folder as the student files)\n Format the heading in cell A1 as Cambria , 36 pt , bold , Orange Accent 2\n Format the other headings as bold, italic or underline as shown on the following page\n Use Orange, Accent 2, Lighter 80% to fill the area behind the headings as shown on the following page\n Add the superscript 1 in cell H3 and in cell B27 with the following comment\n1 Fee may be reduced as the result of Government Assistance\nYour completed worksheet should appear as shown on the following page...\n\nUse the Save As command to save the workbook as PE_Font Formatting (Completed).xlsx\nITTraining@sgul.ac.uk\nPage 23\nSt. George's Information Services\nMicrosoft Excel\nMicrosoft Excel", + "page_start": 26, + "page_end": 27, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "SELECTING ROWS\nIf you want to make changes to an entire row , such as bolding all of the headings in a row or changing the font of all the cell entries, you must first select the row. This is done by clicking on the\nrow header to the left of the row. Remember that any changes you make will apply to every cell in the row all the way across to column XFD, so be careful!", + "page_start": 17, + "page_end": 17, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "To apply font formatting :\n1. Select the text\n2. Click on the drop arrow\nfor Font\n3. Point to a font to preview it\n4. Click on the font to apply it\nITTraining@sgul.ac.uk\nPage 18\nSt. George's Information Services", + "page_start": 21, + "page_end": 21, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Get help with Word\nThe Tell me search box takes you straight to commands and Help in Word.", + "page_start": 7, + "page_end": 7, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "Quick Start Guide\nNew to Word? Use this guide to learn the basics.", + "page_start": 0, + "page_end": 0, + "source_file": "Word QS.pdf" + } + ] + }, + { + "references": { + "source_file": "welcome_to_word_template.pdf", + "query": "What is the advise to make the style sets and themes work well ? ", + "target_page": 6, + "target_passage": "They work best when your document is formatted with styles", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Give your doc an instant makeover\nStyle sets and themes let you completely change the look of your document in an instant. They work best when your document is formatted with styles (so it's good that we fixed that Heading style, above).\nTry it: Explore style sets and themes:\n1. On the Design tab, select Themes , and choose a theme from the drop-down. Notice that the gallery of style sets updates to reflect the theme you picked.\n2. Select any theme you like from the drop-down and click to apply.", + "page_start": 5, + "page_end": 5, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "Let us know what you think\nPlease give us feedback on this template, so we can provide content that's truly useful and helpful. Thanks!", + "page_start": 7, + "page_end": 7, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "3.0 Menu style\nThere are a variety of menu styles for users to choose.", + "page_start": 4, + "page_end": 4, + "source_file": "6126797.pdf" + }, + { + "text": "CHANGING THE CHART STYLE\nThe style of a chart refers to its colour scheme and overall appearance and can impact the clarity of the content of the chart. Choosing a predefined chart style can save valuable time", + "page_start": 54, + "page_end": 54, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Format with styles\nStyles lets you create, apply, and review the formatting styles in your current document. To open it, select the Home tab, and then select the small arrow in the lower right corner of the Styles gallery.", + "page_start": 2, + "page_end": 2, + "source_file": "Word QS.pdf" + }, + { + "text": "Try it: Apply the Heading 1 style:\n1. Put your cursor somewhere in the heading above ('Make magic: use Heading styles') don't select anything.\n2. On the Home tab, find Styles , and select Heading 1 (keyboard shortcut Ctrl+Alt+1).\nTa-da! Now it looks like a heading, and acts like one too.", + "page_start": 4, + "page_end": 4, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "Make magic: use Heading styles\nThe heading for this part ('Make magic: use Heading styles') looks the same as the other headings in this document, but it's not as useful. It's formatted with font settings (font, size, and color), while the other headings are formatted with a Heading style (Heading 1, to be exact).\nSee the little triangle when you mouse over those other headings?\nYou can collapse and expand everything under a heading, like an outline. But this one's not working. Let's fix it.", + "page_start": 4, + "page_end": 4, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "Exercise 2: Set the Preferences for New Entities and Rendering\n_____________________________________________________________________________________\n1. Go to File>Preferences in Protégé. This will bring up a new window with lots and lots of different tabs. Click on the New entities tab. This will bring up a tab that looks similar to figure 4.1. The top part of that tab is a box labeled Entity IRI. It should be set with the parameters as shown in figure 4.1. I.e., Starts with Active ontology IRI. Followed by #. Ends with User supplied name. If the last parameter is set to Auto-generated name change it to User supplied name. That is the parameter most likely to be different but also check the other two as well.\n2. Now select the Renderer tab. It should look like figure 4.2. Most importantly, check that Entity rendering is set to Render by entity IRI short name (ID) rather than Render by annotation property. Don't worry if this doesn't completely make sense at this point. The issues here are a bit complex and subtle so we defer them until after you have an understanding of the basic concepts of what an OWL ontology is. We will have a discussion of these details below in chapter 7. For now you just need to make sure that the preferences are set appropriately to work with the rest of the tutorial.\n____________________________________________________________________________________\nFigure 4.1: The New entities tab\n11\nFigure 4.2 Renderer tab\nFigure 4.3: The Active Ontology Tab with a New Comment\n12", + "page_start": 11, + "page_end": 12, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "To change the chart style :\n1. Ensure the chart or chart sheet is selected\n2. Click on the Chart Styles tool to the right of the chart\n3. Click on the desired style\nITTraining@sgul.ac.uk\nPage 51\nSt. George's Information Services\nMicrosoft Excel\nand effort. Excel also makes it easy to change chart styles if you decide the style you have chosen is not appropriate.", + "page_start": 54, + "page_end": 54, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Shaping a World-Leading Brand\nNissan. While we consider this data, it is not directly integrated into our designs. If you simply react to opinion surveys, you try to please everybody, and that results in boring cars. We try to tune into the inner voice of the customer, looking into their life and values to discover what they really want. When you're sitting in Japan, for example, it's difficult to know the values of customers elsewhere in the world. Our global design centers bring us closer to that customer. Mr. Ghosn is the chairman of the design decision committee, which includes all the related executives, and they are a source of insight as well.\nThe Alliance with Renault has been useful in our work. We study each other, benchmark performance, and share best practices. While it is impossible to effectively benchmark against your competitors, the Alliance transparency policy allows us to identify a particular process and examine everything, and Renault can do the same. This leads to new ideas. It's stimulating working with them, but of course neither company wants to turn out the same cars. It's healthy to maintain these differences and our identities. That is what makes the relationship an alliance.\nI think we did a very good job during the Nissan Revival Plan (NRP) and NISSAN 180. One of our greatest\nZAROOT concept car\nAZEAL concept car\nsuccesses is that top management made significant investments in design immediately after implementing the NRP. If they hadn't, there would not have been any new products during NISSAN 180. Although the NRP focused on cost containment, management recognized that design was essential in building the cars that people long to own.\nThat investment continues today. We will soon open the Imagination Factory design center in Japan. We have also expanded the Farmingham center, renovated the San Diego studio, and built the new Nissan Design Europe in London. Nissan has world-leading design facilities and a highly talented and motivated staff. We have no trouble recruiting top designers.", + "page_start": 40, + "page_end": 40, + "source_file": "OTC_NSANY_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0770.pdf", + "query": "Where are the peaks of the VHE blazars ?", + "target_page": 1, + "target_passage": " VHE blazars have double-humped spectral energy distributions (SEDs), with one peak at UV/X-ray energies and another at GeV/TeV energies.", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "6. Blazars Upper Limits\nMore than 50 VHE blazar candidates were observed by VERITAS between September 2007 and June 2009. The total exposure on the 49 non-detected candidates is ∼ 305 h live time (average of 6.2 h per candidate). Approximately 55% of the total exposure is split amongst the 27 observed HBL. The remainder is divided amongst the 8 IBL (26%), 5 LBL (6%), and 9 FSRQ (13%). There are no clear indications of significant VHE γ -ray emission from any of these 49 blazars [25]. However, the observed significance distribution is clearly skewed towards positive values (see Figure 1). A stacking analysis performed on the entire data sample shows an overall excess of 430 γ -rays, corresponding to a statistical significance of 4.8 σ , observed from the directions of the candidate blazars. The IBL and HBL targets make up 96% of the observed excess. Observations of these objects also comprise ∼ 80% of the total exposure. An identical stacked analysis of all the extragalactic non-blazar targets observed, but not clearly detected ( > 5 σ ), by VERITAS does not show a significant excess ( ∼ 120 h exposure). The stacked excess persists using alternate methods for estimating the background at each blazar location, and with different event selection criteria (e.g. soft cuts optimized for sources with Γ VHE > 4). The distribution of VHE flux upper limits is shown in Figure 1. These 49 VHE flux upper limits are generally the most-constraining ever reported for these objects.", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0770.pdf" + }, + { + "text": "7. Multi-wavelength Studies of VHE Blazars\nDuring the first three seasons of VERITAS observations, pre-planned extensive MWL campaigns were organized for three blazars 1ES 2344+514 (2007-08), 1ES 1218+304 (2008-09) and 1ES 0229+200 (200910 - ongoing). In addition, numerous ToO MWLobservation campaigns were performed. These include campaigns for every blazar/AGN discovered by VERITAS, and all include Swift (XRT and UVOT) data. All MWL campaigns on the VHE blazars discovered\n4\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\nFigure 1: (Left) The preliminary significance measured from each of the 49 non-detected candidates using standard analysis cuts. The curve shows a Gaussian distribution, with mean zero and standard deviation one, normalized to the number of blazars. A similar result is obtained using analysis cuts optimized for soft-spectrum sources. (Right) The distribution of flux upper limits for the non-detected blazars in percentage of Crab Nebula flux above the observation threshold. The time-weighted average limit is less than ∼ 2% Crab flux.\nσ\nsince the launch of Fermi include LAT detections. In addition, several MWL campaigns on the well-studied VHE blazars Mkn 421 and Mkn 501 (please see the contributions of D. Gall and A. Konopelko in these proceedings) were also performed. Highlights of these campaigns include:", + "page_start": 2, + "page_end": 3, + "source_file": "1001.0770.pdf" + }, + { + "text": "1. Introduction\nActive galactic nuclei are the most numerous class of identified VHE γ -ray sources. These objects emit non-thermal radiation across ∼ 20 orders of magnitude in energy and rank among the most powerful particle accelerators in the universe. A small fraction of AGN possess strong collimated outflows (jets) powered by accretion onto a supermassive black hole (SMBH). VHE γ -ray emission can be generated in these jets, likely in a compact region very near the SMBH event horizon. Blazars, a class of AGN with jets pointed along the line-of-sight to the observer, are of particular interest in the VHE regime. Approximately 30 blazars, primarily high-frequency-peaked BL Lacs (HBL), are identified as sources of VHE γ -rays, and some are spectacularly variable on time scales comparable to the light crossing time of their SMBH ( ∼ 2 min; [1]). VHE blazar studies probe the environment very near the central SMBH and address a wide range of physical phenomena, including the accretion and jet-formation processes. These studies also have cosmological implications, as VHE blazar data can be used to strongly constrain primordial radiation fields (see the extragalactic background light (EBL) constraints from, e.g., [2, 3]).\nVHE blazars have double-humped spectral energy distributions (SEDs), with one peak at UV/X-ray energies and another at GeV/TeV energies. The origin of the lower-energy peak is commonly explained as synchrotron emission from the relativistic electrons in the blazar jets. The origin of the higher-energy peak is controversial, but is widely believed to be the result of inverse-Compton scattering of seed photons off the same relativistic electrons. The origin of the seed photons in these leptonic scenarios could be the synchrotron photons themselves, or photons from an external source. Hadronic scenarios are also plausible explanations for the VHE emission, but generally are not favored.\nContemporaneous multi-wavelength (MWL) obser-\neConf C091122", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0770.pdf" + }, + { + "text": "1. Introduction\nvations of VHE blazars, can measure both SED peaks and are crucial for extracting information from the observations of VHE blazars. They are used to constrain the size, magnetic field and Doppler factor of the emission region, as well as to determine the origin (leptonic or hadronic) of the VHE γ -rays. In leptonic scenarios, such MWL observations are used to measure the spectrum of high-energy electrons producing the emission, as well as to elucidate the nature of the seed photons. Additionally, an accurate measure of the cosmological EBL density requires accurate modeling of the blazar's intrinsic VHE emission that can only be performed with contemporaneous MWL observations.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0770.pdf" + }, + { + "text": "5.2. Discoveries Motivated by Fermi-LAT\nThe successful VHE discovery observations by VERITAS of three blazars was motivated primarily by results from the first year of LAT data taking. In particular, the VHE detections of PKS 1424+240 [21] and 1ES0502+675 [22] were the result of VERITAS observations triggered by the inclusion of these objects in the Fermi-LAT Bright AGN List [13]. The former is only the third IBL known to emit VHE gammarays, and the latter is the most distant BL Lac object\n2 RBS0413 was observed further by VERITAS in Fall 2009.\neConf C091122\n( z = 0 . 341) detected in the VHE band. In addition, VERJ0521+211, likely associated with the radio-loud AGN RGBJ0521.8+2112, was detected by VERTAS in ∼ 4 h of observations in October 2009 [23]. These observations were motivated by its identification as a > 30 GeV γ -ray source in the public Fermi-LAT data. Its VHE flux is 5% of the Crab Nebula flux, placing it among the brightest VHE blazars detected in recent years. VERITAS later observed even brighter VHE flaring from VERJ0521+211 in November 2009 [24], leading to deeper VHE observations.", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0770.pdf" + }, + { + "text": "4. Blazar Discovery Program\nThe blazars observed in the discovery program are largely high-frequency-peaked BL Lac objects. However, the program also includes IBLs (intermediatepeaked) and LBLs (low-peaked), as well as flat spectrum radio quasars (FSRQs), in an attempt to increase the types of blazars known to emit VHE γ -rays. The observed targets are drawn from a target list containing objects visible to the telescopes at reasonable zenith angles ( -8 · < δ < 72 · ), without a previously published VHE limit below 1.5% Crab, and with a measured redshift z < 0 . 3. To further the study of the\neConf C091122\nEBL a few objects having a large ( z > 0 . 3) are also included in the target list. The target list includes:\n· All nearby ( z < 0 . 3) HBL and IBL recommended as potential VHE emitters in [5, 6, 7].\n· The X-ray brightest HBL ( z < 0 . 3) in the recent Sedentary [8] and ROXA [9] surveys.\n· Four distant ( z > 0 . 3) BL Lac objects recommended by [5, 10].\n· Several FSRQ recommended as potential VHE emitters in [6, 11].\n· All nearby ( z < 0 . 3) blazars detected by EGRET [12].\n· All nearby ( z < 0 . 3) blazars contained in the Fermi-LAT Bright AGN Sample [13].\n· All sources ( | b | > 10 · ) detected by Fermi-LAT where extrapolations of their MeV-GeV γ -ray spectrum (including EBL absorption; assuming z = 0.3 if the redshift is unknown) indicates a possible VERITAS detection in less than 20 h. This criteria is the focus of the 2009-10 VERITAS blazar discovery program.", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0770.pdf" + }, + { + "text": "VERITAS Observations of Blazars\nW. Benbow for the VERITAS Collaboration\nHarvard-Smithsonian Center for Astrophysics, F.L. Whipple Observatory, PO Box 6369, Amado, AZ 85645, USA\nThe VERITAS array of four 12-m diameter imaging atmospheric-Cherenkov telescopes in southern Arizona is used to study very high energy (VHE; E > 100 GeV) γ -ray emission from astrophysical objects. VERITAS is currently the most sensitive VHE γ -ray observatory in the world and one of the VERITAS collaboration's Key Science Projects (KSP) is the study of blazars. These active galactic nuclei (AGN) are the most numerous class of identified VHE sources, with ∼ 30 known to emit VHE photons. More than 70 AGN, almost all of which are blazars, have been observed with the VERITAS array since 2007, in most cases with the deepest-ever VHE exposure. These observations have resulted in the detection of VHE γ -rays from 16 AGN (15 blazars), including 8 for the first time at these energies. The VERITAS blazar KSP is summarized in this proceeding and selected results are presented.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0770.pdf" + }, + { + "text": "5. VERITAS AGN Detections\nVERITAS has detected VHE γ -ray emission from 16 AGN (15 blazars), including 8 VHE discoveries. These AGN are shown in Table I, and each has been detected by the Large Area Telescope (LAT) instrument aboard the Fermi Gamma-ray Space Telescope. Every blazar discovered by VERITAS was the subject of ToO MWL observations to enable modeling of its simultaneously-measured SED. The known VHE blazars detected by VERITAS were similarly the targets of MWL observations.", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0770.pdf" + }, + { + "text": "8. Conclusions\nThe first two years of the VERITAS blazar KSP were highly successful. Highlights include the detection of more than a 16 VHE blazars with the observations almost always having contemporaneous MWL data. Among these detections are 8 VHE blazar discoveries, including the first three IBLs known to emit VHE γ -rays. All but a handful of the blazars on the initial VERITAS discovery target list were observed, and the flux limits generated for those not VHE detected are generally the most-constraining ever. The excess seen in the stacked blazar analysis suggests that the initial direction of the VERITAS discovery program was well justified, and that follow-up observations of many of these initial targets will result in VHE discoveries. In addition, the Fermi-LAT is identifying many new compelling targets for the VERITAS blazar discovery program. These new candidates have already resulted in 3 VHE blazar discoveries. The future of the VERITAS blazar discovery program is clearly very bright.\nThe MWL aspect of the VERITAS blazar KSP has also been highly successful. Every VERITAS observation of a known, or newly discovered, VHE blazar has been accompanied by contemporaneous MWL observations. These data have resulted in the identifica-\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\n5\ntion of correlated VHE and X-ray flux variability, as well as correlated spectral hardening in both the VHE and X-ray bands. The VHE MWL observations were performed in both 'quiescent' and flaring states for some of the observed blazars. For the observed HBL objects, the SEDs can be well described by a simple SSC model in both high and low states. However, an additional external Compton component is necessary to adequately fit the SEDs of the IBL objects.", + "page_start": 3, + "page_end": 4, + "source_file": "1001.0770.pdf" + }, + { + "text": "5.1. Recent VERITAS Blazar Discoveries\n( ∼ 5.5 σ ; 3% Crab flux above 300 GeV; Γ VHE ∼ 2 . 7) during VERITAS observations from December 2008 to March 2009. The initial announcement of the VHE discovery [19] led to its discovery above 1 GeV in the Fermi-LAT data using a special analysis. RBS 0413, a relatively distant HBL (z=0.19), was observed for 16 h good-quality live time in 2008-09 2 . These data resulted in the discovery of VHE gamma-rays ( > 270 γ , ∼ 6 σ ) at a flux ( > 200 GeV) of ∼ 2% of the Crab Nebula flux. The discovery [20] was announced simultaneously with the LAT MeV-GeV detection. The VHE and other MWL observations, including Fermi-LAT data, for each of these three sources will be the subject of a joint publication involving both the VERITAS and LAT collaborations.", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0770.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0770.pdf", + "query": "What are the blazars observed in the discovery program ?", + "target_page": 2, + "target_passage": "The blazars observed in the discovery program are largely high-frequency-peaked BL Lac objects. How ever, the program also includes IBLs (intermediate peaked) and LBLs (low-peaked), as well as flat spec trum radio quasars (FSRQs), in an attempt to in crease the types of blazars known to emit VHE γ-rays.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "4. Blazar Discovery Program\nThe blazars observed in the discovery program are largely high-frequency-peaked BL Lac objects. However, the program also includes IBLs (intermediatepeaked) and LBLs (low-peaked), as well as flat spectrum radio quasars (FSRQs), in an attempt to increase the types of blazars known to emit VHE γ -rays. The observed targets are drawn from a target list containing objects visible to the telescopes at reasonable zenith angles ( -8 · < δ < 72 · ), without a previously published VHE limit below 1.5% Crab, and with a measured redshift z < 0 . 3. To further the study of the\neConf C091122\nEBL a few objects having a large ( z > 0 . 3) are also included in the target list. The target list includes:\n· All nearby ( z < 0 . 3) HBL and IBL recommended as potential VHE emitters in [5, 6, 7].\n· The X-ray brightest HBL ( z < 0 . 3) in the recent Sedentary [8] and ROXA [9] surveys.\n· Four distant ( z > 0 . 3) BL Lac objects recommended by [5, 10].\n· Several FSRQ recommended as potential VHE emitters in [6, 11].\n· All nearby ( z < 0 . 3) blazars detected by EGRET [12].\n· All nearby ( z < 0 . 3) blazars contained in the Fermi-LAT Bright AGN Sample [13].\n· All sources ( | b | > 10 · ) detected by Fermi-LAT where extrapolations of their MeV-GeV γ -ray spectrum (including EBL absorption; assuming z = 0.3 if the redshift is unknown) indicates a possible VERITAS detection in less than 20 h. This criteria is the focus of the 2009-10 VERITAS blazar discovery program.", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0770.pdf" + }, + { + "text": "7. Multi-wavelength Studies of VHE Blazars\nDuring the first three seasons of VERITAS observations, pre-planned extensive MWL campaigns were organized for three blazars 1ES 2344+514 (2007-08), 1ES 1218+304 (2008-09) and 1ES 0229+200 (200910 - ongoing). In addition, numerous ToO MWLobservation campaigns were performed. These include campaigns for every blazar/AGN discovered by VERITAS, and all include Swift (XRT and UVOT) data. All MWL campaigns on the VHE blazars discovered\n4\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\nFigure 1: (Left) The preliminary significance measured from each of the 49 non-detected candidates using standard analysis cuts. The curve shows a Gaussian distribution, with mean zero and standard deviation one, normalized to the number of blazars. A similar result is obtained using analysis cuts optimized for soft-spectrum sources. (Right) The distribution of flux upper limits for the non-detected blazars in percentage of Crab Nebula flux above the observation threshold. The time-weighted average limit is less than ∼ 2% Crab flux.\nσ\nsince the launch of Fermi include LAT detections. In addition, several MWL campaigns on the well-studied VHE blazars Mkn 421 and Mkn 501 (please see the contributions of D. Gall and A. Konopelko in these proceedings) were also performed. Highlights of these campaigns include:", + "page_start": 2, + "page_end": 3, + "source_file": "1001.0770.pdf" + }, + { + "text": "8. Conclusions\nThe first two years of the VERITAS blazar KSP were highly successful. Highlights include the detection of more than a 16 VHE blazars with the observations almost always having contemporaneous MWL data. Among these detections are 8 VHE blazar discoveries, including the first three IBLs known to emit VHE γ -rays. All but a handful of the blazars on the initial VERITAS discovery target list were observed, and the flux limits generated for those not VHE detected are generally the most-constraining ever. The excess seen in the stacked blazar analysis suggests that the initial direction of the VERITAS discovery program was well justified, and that follow-up observations of many of these initial targets will result in VHE discoveries. In addition, the Fermi-LAT is identifying many new compelling targets for the VERITAS blazar discovery program. These new candidates have already resulted in 3 VHE blazar discoveries. The future of the VERITAS blazar discovery program is clearly very bright.\nThe MWL aspect of the VERITAS blazar KSP has also been highly successful. Every VERITAS observation of a known, or newly discovered, VHE blazar has been accompanied by contemporaneous MWL observations. These data have resulted in the identifica-\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\n5\ntion of correlated VHE and X-ray flux variability, as well as correlated spectral hardening in both the VHE and X-ray bands. The VHE MWL observations were performed in both 'quiescent' and flaring states for some of the observed blazars. For the observed HBL objects, the SEDs can be well described by a simple SSC model in both high and low states. However, an additional external Compton component is necessary to adequately fit the SEDs of the IBL objects.", + "page_start": 3, + "page_end": 4, + "source_file": "1001.0770.pdf" + }, + { + "text": "5. VERITAS AGN Detections\nVERITAS has detected VHE γ -ray emission from 16 AGN (15 blazars), including 8 VHE discoveries. These AGN are shown in Table I, and each has been detected by the Large Area Telescope (LAT) instrument aboard the Fermi Gamma-ray Space Telescope. Every blazar discovered by VERITAS was the subject of ToO MWL observations to enable modeling of its simultaneously-measured SED. The known VHE blazars detected by VERITAS were similarly the targets of MWL observations.", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0770.pdf" + }, + { + "text": "5.1. Recent VERITAS Blazar Discoveries\nPrior to the launch of Fermi VERITAS had discovered VHE emission from 2 blazars. These included the first VHE-detected IBL, W Comae [14, 15], and the HBL 1ES0806+524 [16]. VERITAS has discovered 6 VHE blazars since the launch of Fermi. Three of these were initially observed by VERITAS prior to the release of Fermi-LAT results, due to the X-ray brightness of the synchrotron peaks of their SEDs.\nVHEemission from 3C66A was discovered by VERITAS in September 2008 [17] during a flaring episode that was also observed by the Fermi-LAT [18]. The observed flux above 200 GeV was 6% of the Crab Nebula flux and the measured VHE spectrum was very soft (Γ VHE ∼ 4 . 1). RGBJ0710+591 was detected\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\n3\nTable I VERITAS AGN Detections. The only non-blazar object is the radio galaxy M 87. The blazars discovered at VHE by VERITAS are marked with a dagger.", + "page_start": 1, + "page_end": 2, + "source_file": "1001.0770.pdf" + }, + { + "text": "3. VERITAS Blazar KSP\nVERITAS observes for ∼ 750 h and ∼ 250 h each year during periods of astronomical darkness and partial moonlight, respectively. The moonlight observations are almost exclusively used for a blazar discovery program, and a large fraction of the dark time is used for the blazar KSP, which consists of:\n· A VHE blazar discovery program ( ∼ 200 h / yr): Each year ∼ 10 targets are selected to receive ∼ 10 h of observations each during astronomical darkness. These data are supplemented by discovery observations during periods of partial moonlight.\n· A target-of-opportunity (ToO) observation program ( ∼ 50 h / yr): VERITAS blazar observations can be triggered by either a VERITAS blazar discovery, a VHE flaring alert ( > 2 Crab) from the blazar monitoring program of the Whipple 10-m telescope or from another VHE instrument, or a lower-energy flaring alert (optical, X-ray or Fermi-LAT). Should the guaranteed allocation be exhausted, further time can be requested from a pool of director's discretionary time.\n· Multi-wavelength (MWL) studies of VHE blazars ( ∼ 50 h / yr + ToO): Each year one blazar receives a deep exposure in a pre-planned campaign of extensive, simultaneous MWL (Xray, optical, radio) measurements. ToO observation proposals for MWL measurements are also submitted to lower-energy observatories (e.g. Swift) and are triggered by a VERITAS discovery or flaring alert.\n· Distant VHE blazar studies to constrain the extragalactic background light (EBL): Here distant targets are given a higher priority in the blazar discovery program, as well as for the MWL observations of known VHE blazars, particularly those with hard VHE spectra.", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0770.pdf" + }, + { + "text": "8. Conclusions\nThe Fermi-LAT is already having a significant impact on the blazar KSP. In future seasons, the VERITAS blazar discovery program will focus its discovery program on hard-spectrum blazars detected by Fermi-LAT, and will likely have a greater focus on high-risk/high-reward objects at larger redshifts (0 . 3 < z < 0 . 7). In addition, the number of VHE blazars studied in pre-planned MWL campaigns will increase as data from the Fermi-LAT will be publicly available. In particular, the extensive pre-planned MWL campaigns will focus on objects that are noteworthy for the impact their data may have on understanding the EBL. The simultaneous observations of blazars by VERITAS and Fermi-LAT will completely resolve the higher-energy SED peak, often for the first time, enabling unprecedented constraints on the underlying blazar phenomena to be derived.", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0770.pdf" + }, + { + "text": "2. SMA BLAZARS\nForty-four of the objects in our total blazar sample were detected by Fermi and can be found in the catalog of LAT Bright AGN Sources (LBAS) from Abdo et al. [7]. J0050-094 has no redshift in either the LBAS catalog or CGRaBS and is not included in our study. Of the 43 remaining sources, 14 are BL Lac objects and 29 are FSRQs, with 0 . 03 ≤ z ≤ 2 . 19.\nWe examined submillimeter light curves for all of the SMA blazars, with observations beginning in approximately 2003 (see Figure 1). Typically, the 1mm band is much more well-sampled in comparison to the 850m band, but visual inspection reveals that the regularity and quality of observations vary greatly from source to source. Many of the objects exhibit nonperiodic variability, either in the form of persistent, low-amplitude fluctuations or higher amplitude flaring behavior.", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0806.pdf" + }, + { + "text": "5.1. Recent VERITAS Blazar Discoveries\nTable I VERITAS AGN Detections. The only non-blazar object is the radio galaxy M 87. The blazars discovered at VHE by VERITAS are marked with a dagger.\nM87, = FR I. M87, Class Redshift = 0.004. Mkn421, = HBL. Mkn421, Class Redshift = 0.030. Mkn501, = HBL. Mkn501, Class Redshift = 0.034. 1ES2344+514, = HBL. 1ES2344+514, Class Redshift = 0.044. 1ES1959+650, = HBL. 1ES1959+650, Class Redshift = 0.047. WComae †, = IBL. WComae †, Class Redshift = 0.102. RGBJ0710+591 †, = HBL. RGBJ0710+591 †, Class Redshift = 0.125. H1426+428, = HBL. H1426+428, Class Redshift = 0.129. 1ES0806+524 †, = HBL. 1ES0806+524 †, Class Redshift = 0.138. 1ES0229+200, = HBL. 1ES0229+200, Class Redshift = 0.139. 1ES1218+304, = HBL. 1ES1218+304, Class Redshift = 0.182. RBS0413 †, = HBL. RBS0413 †, Class Redshift = 0.190. 1ES0502+675 †, = HBL. 1ES0502+675 †, Class Redshift = 0.341. 3C66A †, = IBL. 3C66A †, Class Redshift = 0.444?. PKS1424+240 †, = IBL. PKS1424+240 †, Class Redshift = ?. VERJ0521+211 †, = ?. VERJ0521+211 †, Class Redshift = ?", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0770.pdf" + }, + { + "text": "1. INTRODUCTION\nThe timescales on which high-amplitude flaring events occur in blazars indicate that much of the energy is being produced deep within the jet on small, sub-parsec scales [1, 2]. Understanding if/how emission differs between blazar subclasses (i.e., BL Lacs objects and flat-spectrum radio quasars (FSRQs)) may offer important insight into the similarity between blazars and, furthermore, can provide constraints on the formation and acceleration of the jets themselves.\nFor the synchrotron component of blazar spectra, the low-frequency spectral break due to synchrotron self-absorption moves to higher frequencies as one measures closer to the base of the jet [2]. This often places the peak of the spectrum in the millimeter and submillimeter bands, where the emission is optically-thin and originates on parsec and sub-parsec scales [3], allowing direct observation of the most compact regions near the central engine. The high energy γ -ray emission originates as a Compton process, typically a combination of synchrotron-self-Compton (SSC) and external-radiation-Compton (ERC). Depending on the source properties, the synchrotron photons or external photons are upscattered by the same population of electrons that emit the millimeter and submillimeter spectra. Therefore the submillimeter and γ -ray emission are closely linked and give the full information about the source emission.\nA systematic study of the submillimeter properties of the entire sample of Fermi blazars has yet to be conducted and is one of the primary goals of our work. We present here preliminary analysis of the submillimeter properties of Fermi blazars detected by the Submil-\neConf C091122\nlimeter Array 1 ( SMA ) at 1mm and 850 µ m, including an investigation of variable behavior and the determination of submillimeter energy spectral indices. In addition, we consider the connection to the observed γ -ray indices and luminosities.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0806.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0770.pdf", + "query": "How many VHE blazar candidates were observed by VERITAS between September 2007 andJune 2009 ?", + "target_page": 3, + "target_passage": "More than 50 VHE blazar candidates were observed by VERITAS betweenSeptember 2007 andJune 2009.", + "chunk_present": { + "presence": true, + "index": 6 + } + }, + "top_chunk": [ + { + "text": "7. Multi-wavelength Studies of VHE Blazars\nDuring the first three seasons of VERITAS observations, pre-planned extensive MWL campaigns were organized for three blazars 1ES 2344+514 (2007-08), 1ES 1218+304 (2008-09) and 1ES 0229+200 (200910 - ongoing). In addition, numerous ToO MWLobservation campaigns were performed. These include campaigns for every blazar/AGN discovered by VERITAS, and all include Swift (XRT and UVOT) data. All MWL campaigns on the VHE blazars discovered\n4\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\nFigure 1: (Left) The preliminary significance measured from each of the 49 non-detected candidates using standard analysis cuts. The curve shows a Gaussian distribution, with mean zero and standard deviation one, normalized to the number of blazars. A similar result is obtained using analysis cuts optimized for soft-spectrum sources. (Right) The distribution of flux upper limits for the non-detected blazars in percentage of Crab Nebula flux above the observation threshold. The time-weighted average limit is less than ∼ 2% Crab flux.\nσ\nsince the launch of Fermi include LAT detections. In addition, several MWL campaigns on the well-studied VHE blazars Mkn 421 and Mkn 501 (please see the contributions of D. Gall and A. Konopelko in these proceedings) were also performed. Highlights of these campaigns include:", + "page_start": 2, + "page_end": 3, + "source_file": "1001.0770.pdf" + }, + { + "text": "5.1. Recent VERITAS Blazar Discoveries\nPrior to the launch of Fermi VERITAS had discovered VHE emission from 2 blazars. These included the first VHE-detected IBL, W Comae [14, 15], and the HBL 1ES0806+524 [16]. VERITAS has discovered 6 VHE blazars since the launch of Fermi. Three of these were initially observed by VERITAS prior to the release of Fermi-LAT results, due to the X-ray brightness of the synchrotron peaks of their SEDs.\nVHEemission from 3C66A was discovered by VERITAS in September 2008 [17] during a flaring episode that was also observed by the Fermi-LAT [18]. The observed flux above 200 GeV was 6% of the Crab Nebula flux and the measured VHE spectrum was very soft (Γ VHE ∼ 4 . 1). RGBJ0710+591 was detected\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\n3\nTable I VERITAS AGN Detections. The only non-blazar object is the radio galaxy M 87. The blazars discovered at VHE by VERITAS are marked with a dagger.", + "page_start": 1, + "page_end": 2, + "source_file": "1001.0770.pdf" + }, + { + "text": "5.1. Recent VERITAS Blazar Discoveries\n( ∼ 5.5 σ ; 3% Crab flux above 300 GeV; Γ VHE ∼ 2 . 7) during VERITAS observations from December 2008 to March 2009. The initial announcement of the VHE discovery [19] led to its discovery above 1 GeV in the Fermi-LAT data using a special analysis. RBS 0413, a relatively distant HBL (z=0.19), was observed for 16 h good-quality live time in 2008-09 2 . These data resulted in the discovery of VHE gamma-rays ( > 270 γ , ∼ 6 σ ) at a flux ( > 200 GeV) of ∼ 2% of the Crab Nebula flux. The discovery [20] was announced simultaneously with the LAT MeV-GeV detection. The VHE and other MWL observations, including Fermi-LAT data, for each of these three sources will be the subject of a joint publication involving both the VERITAS and LAT collaborations.", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0770.pdf" + }, + { + "text": "5. VERITAS AGN Detections\nVERITAS has detected VHE γ -ray emission from 16 AGN (15 blazars), including 8 VHE discoveries. These AGN are shown in Table I, and each has been detected by the Large Area Telescope (LAT) instrument aboard the Fermi Gamma-ray Space Telescope. Every blazar discovered by VERITAS was the subject of ToO MWL observations to enable modeling of its simultaneously-measured SED. The known VHE blazars detected by VERITAS were similarly the targets of MWL observations.", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0770.pdf" + }, + { + "text": "8. Conclusions\nThe first two years of the VERITAS blazar KSP were highly successful. Highlights include the detection of more than a 16 VHE blazars with the observations almost always having contemporaneous MWL data. Among these detections are 8 VHE blazar discoveries, including the first three IBLs known to emit VHE γ -rays. All but a handful of the blazars on the initial VERITAS discovery target list were observed, and the flux limits generated for those not VHE detected are generally the most-constraining ever. The excess seen in the stacked blazar analysis suggests that the initial direction of the VERITAS discovery program was well justified, and that follow-up observations of many of these initial targets will result in VHE discoveries. In addition, the Fermi-LAT is identifying many new compelling targets for the VERITAS blazar discovery program. These new candidates have already resulted in 3 VHE blazar discoveries. The future of the VERITAS blazar discovery program is clearly very bright.\nThe MWL aspect of the VERITAS blazar KSP has also been highly successful. Every VERITAS observation of a known, or newly discovered, VHE blazar has been accompanied by contemporaneous MWL observations. These data have resulted in the identifica-\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\n5\ntion of correlated VHE and X-ray flux variability, as well as correlated spectral hardening in both the VHE and X-ray bands. The VHE MWL observations were performed in both 'quiescent' and flaring states for some of the observed blazars. For the observed HBL objects, the SEDs can be well described by a simple SSC model in both high and low states. However, an additional external Compton component is necessary to adequately fit the SEDs of the IBL objects.", + "page_start": 3, + "page_end": 4, + "source_file": "1001.0770.pdf" + }, + { + "text": "VERITAS Observations of Blazars\nW. Benbow for the VERITAS Collaboration\nHarvard-Smithsonian Center for Astrophysics, F.L. Whipple Observatory, PO Box 6369, Amado, AZ 85645, USA\nThe VERITAS array of four 12-m diameter imaging atmospheric-Cherenkov telescopes in southern Arizona is used to study very high energy (VHE; E > 100 GeV) γ -ray emission from astrophysical objects. VERITAS is currently the most sensitive VHE γ -ray observatory in the world and one of the VERITAS collaboration's Key Science Projects (KSP) is the study of blazars. These active galactic nuclei (AGN) are the most numerous class of identified VHE sources, with ∼ 30 known to emit VHE photons. More than 70 AGN, almost all of which are blazars, have been observed with the VERITAS array since 2007, in most cases with the deepest-ever VHE exposure. These observations have resulted in the detection of VHE γ -rays from 16 AGN (15 blazars), including 8 for the first time at these energies. The VERITAS blazar KSP is summarized in this proceeding and selected results are presented.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0770.pdf" + }, + { + "text": "6. Blazars Upper Limits\nMore than 50 VHE blazar candidates were observed by VERITAS between September 2007 and June 2009. The total exposure on the 49 non-detected candidates is ∼ 305 h live time (average of 6.2 h per candidate). Approximately 55% of the total exposure is split amongst the 27 observed HBL. The remainder is divided amongst the 8 IBL (26%), 5 LBL (6%), and 9 FSRQ (13%). There are no clear indications of significant VHE γ -ray emission from any of these 49 blazars [25]. However, the observed significance distribution is clearly skewed towards positive values (see Figure 1). A stacking analysis performed on the entire data sample shows an overall excess of 430 γ -rays, corresponding to a statistical significance of 4.8 σ , observed from the directions of the candidate blazars. The IBL and HBL targets make up 96% of the observed excess. Observations of these objects also comprise ∼ 80% of the total exposure. An identical stacked analysis of all the extragalactic non-blazar targets observed, but not clearly detected ( > 5 σ ), by VERITAS does not show a significant excess ( ∼ 120 h exposure). The stacked excess persists using alternate methods for estimating the background at each blazar location, and with different event selection criteria (e.g. soft cuts optimized for sources with Γ VHE > 4). The distribution of VHE flux upper limits is shown in Figure 1. These 49 VHE flux upper limits are generally the most-constraining ever reported for these objects.", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0770.pdf" + }, + { + "text": "5.2. Discoveries Motivated by Fermi-LAT\nThe successful VHE discovery observations by VERITAS of three blazars was motivated primarily by results from the first year of LAT data taking. In particular, the VHE detections of PKS 1424+240 [21] and 1ES0502+675 [22] were the result of VERITAS observations triggered by the inclusion of these objects in the Fermi-LAT Bright AGN List [13]. The former is only the third IBL known to emit VHE gammarays, and the latter is the most distant BL Lac object\n2 RBS0413 was observed further by VERITAS in Fall 2009.\neConf C091122\n( z = 0 . 341) detected in the VHE band. In addition, VERJ0521+211, likely associated with the radio-loud AGN RGBJ0521.8+2112, was detected by VERTAS in ∼ 4 h of observations in October 2009 [23]. These observations were motivated by its identification as a > 30 GeV γ -ray source in the public Fermi-LAT data. Its VHE flux is 5% of the Crab Nebula flux, placing it among the brightest VHE blazars detected in recent years. VERITAS later observed even brighter VHE flaring from VERJ0521+211 in November 2009 [24], leading to deeper VHE observations.", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0770.pdf" + }, + { + "text": "5.1. Recent VERITAS Blazar Discoveries\nTable I VERITAS AGN Detections. The only non-blazar object is the radio galaxy M 87. The blazars discovered at VHE by VERITAS are marked with a dagger.\nM87, = FR I. M87, Class Redshift = 0.004. Mkn421, = HBL. Mkn421, Class Redshift = 0.030. Mkn501, = HBL. Mkn501, Class Redshift = 0.034. 1ES2344+514, = HBL. 1ES2344+514, Class Redshift = 0.044. 1ES1959+650, = HBL. 1ES1959+650, Class Redshift = 0.047. WComae †, = IBL. WComae †, Class Redshift = 0.102. RGBJ0710+591 †, = HBL. RGBJ0710+591 †, Class Redshift = 0.125. H1426+428, = HBL. H1426+428, Class Redshift = 0.129. 1ES0806+524 †, = HBL. 1ES0806+524 †, Class Redshift = 0.138. 1ES0229+200, = HBL. 1ES0229+200, Class Redshift = 0.139. 1ES1218+304, = HBL. 1ES1218+304, Class Redshift = 0.182. RBS0413 †, = HBL. RBS0413 †, Class Redshift = 0.190. 1ES0502+675 †, = HBL. 1ES0502+675 †, Class Redshift = 0.341. 3C66A †, = IBL. 3C66A †, Class Redshift = 0.444?. PKS1424+240 †, = IBL. PKS1424+240 †, Class Redshift = ?. VERJ0521+211 †, = ?. VERJ0521+211 †, Class Redshift = ?", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0770.pdf" + }, + { + "text": "7. Multi-wavelength Studies of VHE Blazars\n· 1ES 2344+514: A major (50% Crab) VHE flare, along with correlations of the VHE and X-ray flux were observed from this HBL. The VHE and X-ray spectra harden during bright states, and a synchrotron self-Compton (SSC) model can explain the observed SED in both the high and low states [26].\n· 1ES 1218+304: This HBL flared during VERITAS MWL observations. Its unusually hard VHE spectrum strongly constrains the EBL. The observed flaring rules out kpc-scale jet emission as the explanation of the spectral hardness and places the EBL constraints on more solidfooting [27, 28].\n· 1ES 0806+524: The observed SED of this new VHE HBL can be explained by an SSC model [16].\n· W Comae: This IBL, the first discovered at VHE, flared twice in 2008 [14, 15]. Modeling of the SED is improved by including an externalCompton (EC) component in an SSC interpretation.\n· 3C 66A: This IBL flared at VHE and MeV-GeV energies in 2008[17, 18]. Similar to W Comae and PKS 1424+240, modeling of observed SED suggests a strong EC component in addition to an SSC component.\n· Mkn 421: This HBL exhibited major flaring behavior for several months in 2008. Correlations of the VHE and X-ray flux were observed, along with spectral hardening with increased flux in both bands [29].\neConf C091122\n· RGBJ0710+591: Modeling the SED of this HBL with an SSC model yields a good fit to the data. The inclusion of an external Compton component does not improve the fit.\n· PKS1424+240: The broadband SED of this IBL (at unknown redshift) is well described by an SSC model favoring a redshift of less than 0.1 [21]. Using the photon index measured with Fermi-LAT in combination with recent EBL absorption models, the VERITAS data indicate that the redshift of PKS 1424+240 is less than 0.66.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0770.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed7_cc4.pdf", + "query": "For which language have been introduced the ActiveInference.jl library ?", + "target_page": 1, + "target_passage": " We introduce a new software package for the Julia programming language, the library ActiveInference.jl.", + "chunk_present": { + "presence": true, + "index": 3 + } + }, + "top_chunk": [ + { + "text": "3. Using ActiveInference.jl\nIn this section, we provide an overview of the various functions a user will need to operate ActiveInference . This includes functionalities for creating POMDP agents, for simulating behaviour and for fitting the models to data. In the next section, we demonstrate how to use the package on a concrete worked example. ActiveInference is under continual development, and the newest version of the package, including documentation for how to use it, can be found at github.com/ilabcode/ActiveInference.jl.", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "3.1. Creating and Using a POMDP\nThe general structure of ActiveInference.jl is heavily inspired by pymdp [23], a Python library for implementing simulations of AIF in discrete state spaces. Those already acquainted with pymdp should find the syntax here familiar. ActiveInference can be installed as normal from the official Julia General Registry using the Julia's native package manager Pkg:\nIt can then be loaded into the current project environment:\n☎\n✆\n☎\nCentral to the package is the AIF object. This is a structure containing all the components of the generative model, as well as the dynamic belief states and the various settings needed to perform AIF, and is used in conjunction with most of the high-level functions of the package. An AIF object can be created with the init_aif function, which takes as arguments the components of the generative model and a dictionary of various settings and parameters:\n✆\n✞ using Pkg Pkg.add(ActiveInference) ✝\n✞ using ActiveInference ✝\nEntropy 2025 , 27 , 62\n12 of 33\n✞ # Create AIF object aif = init_aif( A::Vector{Array{T, N}}, # A-matrices B::Vector{Array{T, N}}; # B-matrices C::Vector{Array{Real}}, # C-matrices (optional) D::Vector{Vector{Real}}, # D-matrices (optional) E::Vector{T}, # E-vector (optional) pA::Union{Vector{Array{T, N}}, Nothing}, # Dirichlet priors for A-matrices (optional) pB::Union{Vector{Array{T, N}}, Nothing}, # Dirichlet priors for B-matrices (optional) pD::Union{Vector{Array{Real}}, Nothing}, # Dirichlet priors for D-vectors (optional) parameters::Dict{String, Real}, # Dictionary containing other parameters (optional) settings::Dict{String, Any} # Dictionary containing settings (optional) ) ✝", + "page_start": 10, + "page_end": 11, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "4. Usage Example\nIn this section, we demonstrate a full usage example of how to create an AIF agent, simulate behaviour in a classic T-maze environment and fit the AIF agent to a simulated example dataset. We provide the necessary code to run this simulation. All code required to reproduce the example simulation can be found in an open source OSF repository osf.io/j3k5q/. This example was performed with the current version of ActiveInference.jl (0.1.1); the newest version can be found at github.com/ilabcode/ActiveInference.jl.", + "page_start": 16, + "page_end": 16, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "Introducing ActiveInference.jl : A Julia Library for Simulation and Parameter Estimation with Active Inference Models\nSamuel William Nehrer 1,† , Jonathan Ehrenreich Laursen 1,† , Conor Heins 2,3, * , Karl Friston 3,4 ,\nChristoph Mathys 5 and Peter Thestrup Waade 5\n1 School of Culture and Communication, Aarhus University, 8000 Aarhus, Denmark; 202204724@post.au.dk (S.W.N.); 202204836@post.au.dk (J.E.L.)\n2 Department of Collective Behaviour, Max Planck Institute of Animal Behavior, D-78457 Konstanz, Germany\n3 VERSES Research Lab., Los Angeles, CA 90016, USA; k.friston@ucl.ac.uk\n4 Queen Square Institute of Neurology, University College London, London WC1N 3BG, UK\n5 Interacting Minds Centre, Aarhus University, 8000 Aarhus, Denmark; chmathys@cas.au.dk (C.M.); ptw@cas.au.dk (P.T.W.)\n* Correspondence: cheins@ab.mpg.de\n† These authors contributed equally to this work.\nAbstract: We introduce a new software package for the Julia programming language, the library ActiveInference.jl . To make active inference agents with Partially Observable Markov Decision Process (POMDP) generative models available to the growing research community using Julia, we re-implemented the pymdp library for Python. ActiveInference.jl is compatible with cutting-edge Julia libraries designed for cognitive and behavioural modelling, as it is used in computational psychiatry, cognitive science and neuroscience. This means that POMDP active inference models can now be easily fit to empirically observed behaviour using sampling, as well as variational methods. In this article, we show how ActiveInference.jl makes building POMDP active inference models straightforward, and how it enables researchers to use them for simulation, as well as fitting them to data or performing a model comparison.\nKeywords: active inference; free energy principle; predictive processing; Markov decision process; cognitive modelling; Julia\nPACS: 87.15.Aa\nMSC: 91-08\nJEL Classification: C63", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "1. Introduction\nJulia uses its 'just-in-time' (JIT) compilations via the LLVM framework to approach the speed of languages like C without relying on external compilers [36]. Julia is also natively auto-differentiable, which means it can solve what is called the two-language problem (i.e., that high-level languages often have to rely on lower-level languages, either for performance or for auto-differentiability; this is the case with standard tools for cognitive modelling, where languages like R [37] must rely on external languages like STAN [38] for Bayesian model fitting). This means that ActiveInference , in conjunction with Turing [39], Julia's powerful library for Bayesian model fitting, and its newly developed extension for behavioural modelling, ActionModels , makes it possible to use cutting-edge Markov Chain Monte Carlo [40] methods, as well as variational methods [35], for Bayesian model fitting with AIF. Crucially, this allows researchers to not only simulate AIF in a fast programming language, but to also fit them to empirical behaviour, as is performed in cognitive modelling and computational psychiatry. Importantly, this also places AIF models in an ecosystem of other models for computational psychiatry so that it can easily be compared with models, like Hierarchical Gaussian Filters [41], and reinforcement learning models, like the classic Rescorla-Wagner model [42]. As part of making ActiveInference.jl available to the scientific community, and to the larger software ecosystem within computational psychiatry, it is implemented as part of the Translational Algorithms for Psychiatry-Advancing Science (TAPAS) ecosystem [43].\nIn the next section, we provide a conceptual and formal introduction to AIF, particularly in the context of using POMDP generative models. In Section 3, we demonstrate how to use the package in practice, both for simulation and parameter estimation. In Section 4, we give a fully worked example of how ActiveInference can be used with a concrete simulated dataset. Finally, we discuss potential applications and future directions for developing the package.\nEntropy 2025 , 27 , 62", + "page_start": 2, + "page_end": 3, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "3.3. Model Fitting with ActionModels\nparameter recovery and predictive checks. In this section, we outline how to use ActiveInference for simulation and model fitting in conjunction with ActionModels . In the following section, we show how to achieve this on a concrete worked example.", + "page_start": 16, + "page_end": 16, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "3.2. Simulation with ActionModels\nActionModels is a library for implementing, simulating and fitting various behavioural models to data. Here, we show how to use it in conjunction with ActiveInference to make the simulation of AIF models easy and in a fully generalised framework that is compatible with other types of cognitive and behavioural models as well. ActiveInference provides a full \"action model\"-a full model of the action-generating process in an agentfor using AIF called action_pomdp! . In this case, all this information is contained in the AIF object. action_pomdp! then takes the AIF object and a single-time-step observation as arguments, and then runs state inference, parameter learning and policy inference, and returns probability distributions over the possible actions of the agent.\nThis can conveniently be used in conjunction with an ActionModels agent , a more abstract structure that is used for running behavioural models in general, and which is used when fitting models to data. We therefore begin with initialising an agent that contains the AIF object:\n✆\n☎\n���\n☎\n✆\nThe agent object can be used with a set of standard functions. single_input! provides the agent with an observation, updates it is beliefs and returns a sampled action; for nonaction-dependent observations, give_inputs! provides a series of observations across time steps and returns actions for each. These can be easily used in an agent-based simulation to have AIF agents evolve and act over time.\n✞ observation = [1] # observation with one modality # Run the action model for a single observation action_distributions = action_pomdp!(aif::AIF, observation) ✝\n✞ # Initialize ActionModels Agent with active inference agent as a substruct. agent = init_agent( action_model = action_pomdp!, # The active inference action model substruct = aif, # The AIF object ) ✝\nEntropy 2025 , 27 , 62\n15 of 33\n✞ # Give single observation to the agent observation = [1] action = single_in put! (agent, observation) # Give multiple observations to the agent and simulate actions observations = [1, 2, 1, 2, 3] actions = give_inputs!(agent, observations) ✝", + "page_start": 13, + "page_end": 14, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "9.2.6 Advanced implementation: Custom Java interface\nChapter 10.\n10", + "page_start": 242, + "page_end": 242, + "source_file": "sg246915.pdf" + }, + { + "text": "5. Discussion\n✞ using ParetoSmooth: psis_loo # Calculate the PSIS LOO PSIS_loo = psis_loo(model,results.chains) ✝\n✆\n☎\n✆\nWe introduce ActiveInference.jl , a novel Julia software package for creating and using POMDP-based AIF models for simulation and fitting to empirical data, demonstrating its ease of use on a small parameter study with simulated agents. ActiveInference.jl makes AIF modelling available in a fast language, equipped with an interface and situated in an ecosystem oriented specifically towards cognitive and behavioural modelling.\nImportantly, the ability to fit models to empirical data with sampling-based methods provides value to researchers within cognitive modelling and computational psychiatry: it allows for comparing estimated parameter values between population groups or investigat-\nEntropy 2025 , 27 , 62\n29 of 33\ning the temporal dynamics of belief changes in experimental participants. Dynamic belief trajectories can then be related to other (for example, physiological) measures, as is usual in model-based neuroscience [65]. This method can also, in principle, be used for fitting models to other types of experimentally observable systems, like animals, organoids [66], and simulated or emergent systems [67]. The package can also be used for agent-based modelling in general, for repeating earlier analyses with sampling based model-fitting and for comparing POMDP-based AIF models directly to other types of models.", + "page_start": 27, + "page_end": 28, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "1. Introduction\nWe introduce a novel software library for Julia, ActiveInference , which lets users produce the simulated behaviour of agents and their internal belief states with active inference (AIF) models, as well as fit such models to empirically observed behaviour. AIF [1-3] is a generally applicable formal framework for understanding and simulating intelligent behaviour that is based in neurobiology and first principles from statistical physics [4-8]. AIF treats action and perception as unified under a joint imperative: to minimise the variational free energy ( VFE ), which quantifies how well the agent's internal generative model explains incoming sensory observations. It is an upper bound on the the surprise from sensory observations, making AIF formally related to prediction error\nAcademic Editor: Astero Provata\nReceived: 25 October 2024 Revised: 2 January 2025 Accepted: 7 January 2025\nPublished: 12 January 2025\nCitation: Nehrer, S.W.; Ehrenreich Laursen, J.; Heins, C.; Friston, K.; Mathys, C.; Thestrup Waade, P. Introducing ActiveInference.jl : A Julia Library for Simulation and Parameter Estimation with Active Inference Models. Entropy 2025 , 27 , 62. https://doi.org/10.3390/e27010062\nCopyright: ©2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/ licenses/by/4.0/).\nEntropy 2025 , 27 , 62\nhttps://doi.org/10.3390/e27010062\nEntropy 2025 , 27 , 62\n2 of 33", + "page_start": 0, + "page_end": 1, + "source_file": "pubmed7_cc4.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed7_cc4.pdf", + "query": "To which system does the AIF apply ?", + "target_page": 2, + "target_passage": "AIF was argued to be applicable to any self organising system that actively maintains a stable boundary that defines its integrity [10], a broad category that includes cells and plants [11], as well as humans [2] and even collectives [12].", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Ten Year Summary\n(A$'000), 2009.AIFRS = . Current assets - cash, 2013.AIFRS = 32,987. Current assets - cash, 2012.AIFRS = 90,623. Current assets - cash, 2011.AIFRS = 35,864. Current assets - cash, 2010.AIFRS = 49,098. Current assets - cash, 2009.AIFRS = 29,680. Current assets - other, 2013.AIFRS = 109,575. Current assets - other, 2012.AIFRS = 103,433. Current assets - other, 2011.AIFRS = 70,280. Current assets - other, 2010.AIFRS = 54,203. Current assets - other, 2009.AIFRS = 27,848. Non-current assets, 2013.AIFRS = 6 2 7, 4 2 6. Non-current assets, 2012.AIFRS = 854,403. Non-current assets, 2011.AIFRS = 688,919. Non-current assets, 2010.AIFRS = 265,774. Non-current assets, 2009.AIFRS = 217,4 4 5. Total assets, 2013.AIFRS = 769,988. Total assets, 2012.AIFRS = 1,048,459. Total assets, 2011.AIFRS = 795,063. Total assets, 2010.AIFRS = 369,075. Total assets, 2009.AIFRS = 274,973. Total borrowings, 2013.AIFRS = 199,758. Total borrowings, 2012.AIFRS = 157,544. Total borrowings, 2011.AIFRS = 99,896. Total borrowings, 2010.AIFRS = 11,064. Total borrowings, 2009.AIFRS = 2,144. Other liabilities, 2013.AIFRS = 96,270. Other liabilities, 2012.AIFRS = 115,102. Other liabilities, 2011.AIFRS = 88,243. Other liabilities, 2010.AIFRS = 41,968. Other liabilities, 2009.AIFRS = 27,789. Total liabilities, 2013.AIFRS = 296,028. Total liabilities, 2012.AIFRS = 272,646. Total", + "page_start": 7, + "page_end": 7, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "35. Australian Equivalents to International Financial Reporting Standards (continued)\nevaluation expenditure, 1 = unless they lead to a successful discovery of economic value.. Exploration and evaluation expenditure, 1 = Pending the completion of a comprehensive project on accounting for extractive industries, AASB 6 'Expenditure for and Evaluation of Mineral Resources' was issued in December 2004 to facilitate the introduction of A-IFRS in respect of the treatment of exploration and evaluation expenditure. This standard is the Australian equivalent to IFRS 6 issued by the IASB in December 2004, and will require exploration and evaluation expenditure incurred in each area of interest to either be expensed as incurred or to be partially or fully capitalised and recognised as an. Exploration and evaluation expenditure, 1 = (a) the rights to tenure of the area of interest are current; and. Exploration and evaluation expenditure, 1 = and exploitation of the area of interest, or alternatively, by its sale; or (ii) exploration and evaluation activities in the area of interest have not at the reporting date reached a stage. Exploration and evaluation expenditure, 1 = which permits a reasonable assessment of the existence or otherwise of economically recoverable reserves, and active and significant operations in, or in relation to, the area of interest are continuing. The IASB decided that the effective date of IFRS 6 to be 1 January 2006 to allow affected companies more time to. Impairment, 1 = Testing of non-current assets for impairment will be undertaken on the smallest grouping of assets generating cash flows, called cash generating units. Where there is an indication that a cash generating unit is impaired, the impairment is to be measured by reference to either the cash generating unit's discounted future net cash flows, or its estimated fair value less costs to sell. Upon initial application of this standard, such testing is likely to result in write-downs of some non-current assets including exploration, evaluation and development expenditure to their recoverable amount. Any initial impairment write-down may reverse in subsequent periods if there were a change in the estimates used to determine the initial write-down. The impacts of this new requirement will, in part, depend\nThe AASB and IASB have significant ongoing projects including a comprehensive 'Extractive Industries' project that could affect the differences between current Australian GAAP and A-IFRS as described above and could further impact the Santos Group's financial reports in future years. The future impacts of any new or amended A-IFRS will depend on the particular circumstances in those years.\nAnnual Report 2004\n87\n88", + "page_start": 88, + "page_end": 89, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "35. Australian Equivalents to International Financial Reporting Standards (continued)\nDeferred tax assets and liabilities, 1 = Deferred tax assets and liabilities will generally be based on the differences between the accounting and tax basis of assets and liabilities under the 'balance sheet' approach which will result in the recognition of additional deferred tax assets and liabilities.. Defined benefit superannuation surplus and deficits, 1 = Defined benefit superannuation plan surpluses and deficits will be recognised in the statement of financial position and the changes in these values each period will be recognised either directly in the statement of financial performance, progressively using a 'corridor' approach or directly in retained earnings. The effective date of this standard is 1 January 2006, however the Company is allowed to adopt earlier at 1 January 2005.. Restoration liabilities, 1 = Restoration liabilities will be discounted to present value and capitalised as a component part of capitalised exploration and development expenditure and property, plant and equipment. The capitalised cost is to be amortised over the life of the assets and the provision is accreted periodically to the profit and loss as the discounting of the liability unwinds.. Functional currency, 1 = The majority of the controlled entities within the Santos Group that have petroleum operations in foreign jurisdictions will have the US dollar as their functional currency. The first time application of A-IFRS will result in the net assets of those foreign controlled entities to be translated from their US dollar functional currency to Australian dollars using the spot rate at 1 January 2004. The differences arising from the initial application of this accounting standard will be reflected in the foreign currency translation reserve at 1 January 2004.. Equity-based payments, 1 = Under A-IFRS the cost of employee remuneration provided in the form of equity-based remuneration (including shares and options) will be measured based on the fair value of those instruments and amortised to the profit and loss over the vesting period.. Exploration and evaluation expenditure, 1 = There is no International Financial Reporting Standard ('IFRS') which comprehensively deals with the accounting and reporting issues specific to the extractive industries. In the absence of such an industry-based IFRS, companies operating in the extractive industries will be required to determine their own accounting policy for accounting for exploration and evaluation expenditure which is compatible with the IFRS conceptual accounting framework definition of assets and expenses. Generally this will require exploration and evaluation expenditures to be expensed. Exploration and", + "page_start": 88, + "page_end": 88, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "35. Australian Equivalents to International Financial Reporting Standards\nFollowing the implementation by the Australian Accounting Standards Board ('AASB') of the Financial Reporting Council's policy of adopting the accounting standards issued by the International Accounting Standards Board ('IASB'), the Santos Group must comply with the Australian equivalents to International Financial Reporting Standards ('A-IFRS') from 1 January 2005. Accordingly, the Santos Group will prepare a financial report under A-IFRS for the first time for the half-year ending 30 June 2005. The prior period comparatives in that report will be based on an opening A-IFRS statement of financial position dated 1 January 2004 except for the A-IFRS pertaining to financial instruments described below.\nA project team has been in place throughout the year and is well advanced to achieve the transition from Australian GAAP to A-IFRS. At 31 December 2004, the following activities are underway and are expected to be completed by 30 June 2005:\n· complete assessment of accounting standard AASB 6 'Exploration for and Evaluation of Mineral Resources' which was issued by the AASB in December 2004 as an A-IFRS with an effective date of 1 January 2005;\n· implement changes to information systems and business processes;\n· conduct training programs;\n· engage KPMG to audit the Santos Group's A-IFRS compliant accounting policies and submit revised accounting policies to the Board for approval; and\n· restate the 2004 half-year and full year operating results and financial position from Australian GAAP to A-IFRS for comparative purposes.\nUnder current Australian GAAP the financial report is generally prepared on the basis of historical cost while under the IASB conceptual framework there is an emphasis on recording assets and liabilities at their fair values. Accordingly, this will increase the volatility in reported results in future years. The transition to A-IFRS will lead to the derecognition of some assets and the recognition of additional assets and liabilities. Additionally, the transition will lead to increased disclosures in the notes to the financial statements.\nThe transition to A-IFRS at 1 January 2005 is not expected to change the Santos Group's underlying business operations nor have any impact on either the quantity or the value of its oil and gas reserves, its future cash flows, or its current borrowing facilities. Also, the ability of the Santos Group to raise additional finance for normal business expansion or to pay dividends consistent with past practice is not expected to be impacted.", + "page_start": 87, + "page_end": 87, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "Ten Year Summary\n32,522. BALANCE SHEET\n(A$'000), 2013.AIFRS = . BALANCE SHEET (A$'000), 2012.AIFRS = . BALANCE SHEET (A$'000), 2011.AIFRS = . BALANCE SHEET (A$'000), 2010.AIFRS = . BALANCE SHEET", + "page_start": 7, + "page_end": 7, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Discontinued operations\nIn November 2004, the Emerging Issues Task Force ('EITF') of the FASB reached a consensus on Issue No. 03-13, 'Applying the Conditions in Paragraph 42 of FASB Statement No. 144, Accounting for the Impairment or Disposal of Long-Lived Assets , in Determining Whether to Report Discontinued Operations,' ('EITF 03-13'). EITF 03-13 requires us to analyze whether the cash flows of a disposed component have been eliminated from our ongoing operations and whether we retain a continuing involvement in the operations of the disposed component. If significant migration of customers occurs to our other operations, we would be precluded from classifying a sold or disposed operation as a 'discontinued' operation. EITF 03-13 is effective for components disposed of or classified as held for sale in periods beginning after\nDecember 15, 2004, with optional application to components disposed of or classified as held for sale within that fiscal year. We did not apply EITF 03-13 to our sale of MGM Grand Australia, but if we had applied EITF 03-13 we still would have classified MGM Grand Australia as a discontinued operations.", + "page_start": 45, + "page_end": 45, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "35. Australian Equivalents to International Financial Reporting Standards\nThe differences between current Australian GAAP and A-IFRS which are more likely to have a significant effect on the Santos Group's financial performance and financial position are summarised below:", + "page_start": 87, + "page_end": 87, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "(ix) Income taxes\nThe Group is subject to income taxes in Australia and jurisdictions where it has foreign operations. Significant judgement is required in determining the worldwide provision for income taxes. There are certain transactions and calculations undertaken during the ordinary course of business for which the ultimate tax determination is uncertain. The Group estimates its tax liabilities based on the Group understanding of the tax law. Where the final tax outcome of these matters is different from the amounts that were initially recorded, such differences will impact the current and deferred income tax assets and liabilities in the period in which such determination is made.", + "page_start": 77, + "page_end": 77, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "SUBSEQUENT EVENT\nOn August 1, 2012, the Company acquired SKF's companyowned distribution businesses in Australia and New Zealand for cash consideration. These businesses will expand Applied's global capabilities and are part of the Service Center Based Distribution segment. The Company funded the acquisition from its available cash and existing revolving credit facilities. Results of operations acquired will be included in the Company's results of operations from the date of closing.", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "Ten Year Summary\n607. Ore mined ('000 tonnes), 2011.AIFRS = 232. Ore mined ('000 tonnes), 2010.AIFRS = . Ore mined ('000 tonnes), 2009.AIFRS = . Ore treated ('000 tonnes), 2013.AIFRS = 557. Ore treated ('000 tonnes), 2012.AIFRS = 645. Ore treated ('000 tonnes), 2011.AIFRS = 289. Ore treated ('000 tonnes), 2010.AIFRS = . Ore treated ('000 tonnes), 2009.AIFRS = . Head grade - Gold grams / tonne, 2013.AIFRS = 3.9. Head grade - Gold grams / tonne, 2012.AIFRS = 4.6. Head grade - Gold grams / tonne, 2011.AIFRS = 4.3. Head grade - Gold grams / tonne, 2010.AIFRS = . Head grade - Gold grams / tonne, 2009.AIFRS = . Gold recovery (%), 2013.AIFRS = 94.5%. Gold recovery (%), 2012.AIFRS = 92.4%. Gold recovery (%), 2011.AIFRS = 92.2%. Gold recovery (%), 2010.AIFRS = . Gold recovery (%), 2009.AIFRS = . Gold poured (ounces), 2013.AIFRS = 66,216. Gold poured (ounces), 2012.AIFRS = 87,388. Gold poured (ounces), 2011.AIFRS = 36,886. Gold poured (ounces), 2010.AIFRS = . Gold poured (ounces), 2009.AIFRS = . Silver poured (ounces), 2013.AIFRS = 3,466. Silver poured (ounces), 2012.AIFRS = 4,971. Silver poured (ounces), 2011.AIFRS = 2,581. Silver poured (ounces), 2010.AIFRS = . Silver poured (ounces), 2009.AIFRS = . PROFIT & LOSS", + "page_start": 7, + "page_end": 7, + "source_file": "ASX_KCN_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed7_cc4.pdf", + "query": "What is the definition of POMDP ?", + "target_page": 4, + "target_passage": " The Partially Observable Markov Decision Process is a type of flexible generative model that is widely used in the AIF literature. In discrete time and usually a discrete state space, this model type is parametrised to fit a given task by a set matrices containing probability distributions.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "2.1. POMDPs in Active Inference\nIn AIF, the POMDP is one of the most common families of generative models used to make inferences about the environment. It is a Markovian discrete state-space model, where employing it means representing the environment and observations as inhabiting one among a set of possible (possibly multidimensional) states, and that the changes in these states can only depend on the system's previous state and the agent's actions. Environmental states are not directly observable, so they have to be inferred based on incoming sensory observations. In AIF for POMDPs and other generative models in general, both perception and action are cast as Bayesian inferences (see Sections 2.2 and 2.3), as well as the learning of parameters of the generative model (see Section 2.4). Crucially, an agent's generative model does not a priori have to be isomorphic to the true environment (i.e., the data-generating process), although this will generally lead to a successful inference, and that the generative model will therefore often come to resemble the environment through learning.\nAdiscrete state-space POMDP in AIF is conventionally defined by five main sets of parameters: A , B , C , D and E [1,33], see Figure 1. Together, these parametrise the agent's prior beliefs about the prior probability of different states in the environment, how states of the environment change and how they generate observations. Typically, they will be vectors, matrices or tensors; however, henceforth we denote them by their corresponding letter in bold. These make up the components needed for the agent to perform AIF.", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "3.1. Creating and Using a POMDP\n✞ parameters = Dict( \"alpha\" => 16.0, # Action precision alpha \"gamma\" => 16.0, # Policy precision gamma \"lr_pA\" => 1.0, # Learning rate of A \"fr_pA\" => 1.0, # Forgetting rate of A \"lr_pB\" => 1.0, # Learning rate of B \"fr_pB\" => 1.0, # Forgetting rate of B \"lr_pD\" => 1.0, # Learning rate of D \"fr_pD\" => 1.0 # Forgetting rate of D ) settings = Dict( # Length of policies to consider \"policy_len\" => 1, # Whether to use state information gain for action selection \"use_states_info_gain\" => true, # Whether to use parameter information gain for action selection \"use_param_info_gain\" => false, # Whether to use pragmatic gain for action selection \"use_utility\" => true, ) ✝\n✞ observation = [1] # Define an observation for each observation modality qs = infer_states!(aif, observation) # Produce a posterior belief about states ✝\n☎\n✆\n☎\nFinally, we define the hyper-parameters and other settings in two dictionaries. Here, we display the most common parameters and settings, and set them to their default values, which are used if they are not set by the user:\nWe can now input the above arguments into init_aif and create an AIF object. This allows us to present it with observations and let it choose actions. The following displays a few functions in the order they are usually used, first inferring environmental states, then updating matrices and then selecting a new action. First, we make inferences about the environment with infer_states! , which returns the updated posterior belief q ( s ) about environmental states given an observation. The observation is presented as a vector with an entry for each observation modality:\nWe can now also update the Dirichlet beliefs about the various parameters with the update_parameters! function. A is updated based on the last observation and the posterior belief about the state that generated it. B is updated based on the posteriors about the previous state transition given the previous action. D is updated based on the posterior over states at the first time step.", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "2.1. POMDPs in Active Inference\nAs noted, here we focus specifically on the POMDP-based generative models often used in the AIF literature. However, the basic steps when performing AIF-perception, action and learning-remain the same across generative models. In the remainder of this section, we describe each of these three steps in turn.\nEntropy 2025 , 27 , 62\n7 of 33\nFigure 1. Depiction of a POMDP generative model. This encodes the agent's expectations about how the state s of the environment changes over time t , and how it generates observation o at each time step. A , also called the observation model, describes how environmental states give rise to observations. B , also called the transition model, describes how environmental states change over time, depending on action u (called policy π when structured into sequences). C is the preference prior, which encodes the agent's preferences for observations. This shapes the expected free energy G associated with each policy, which is used for policy selection. D encodes the agent's prior belief over environmental states before making any observations, and E is the prior over policies that determines the agent's preferences for policies in the absence of other motivation.", + "page_start": 5, + "page_end": 6, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "3.1. Creating and Using a POMDP\nThe A object generated here is a one-dimensional vector containing a uniform 5 × 6 matrix (six states and five observations). The B object is a one-dimensional vector containing a uniform 6 × 6 × 2 array (six states and two actions). The C , D and E objects are onedimensional vectors, each containing uniform vectors with their corresponding sizes. We can now modify these to supply the agent with more informative priors over observations, initial states and policies. Here, we performed this using the onehot function:\n✆\nWe now create the Dirichlet priors for A , B and D . When we use parameter learning, these are used to define A , B and D defined above, and are updated at every time step. One way to construct Dirichlet priors is to simply multiply the matrices below with a scaling factor; a higher scaling leads to more precise priors that require stronger evidence to update. Here, we use a scaling parameter of 2. In the current version, parameter learning is only implemented for the A , B and D :\nEntropy 2025 , 27 , 62\n✞ scaling_parameter = 2.0 pA = deepcopy(A) * scaling_parameter # Create pA as a scaled copy of A pB = deepcopy(B) * scaling_parameter # Create pB as a scaled copy of B pD = deepcopy(D) * scaling_parameter # Create pD as a scaled copy of D ✝", + "page_start": 11, + "page_end": 12, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "2.1. POMDPs in Active Inference\nA , also called the observation model , represents the state-to-observation likelihood model. This describes how observations depend on or are generated by states of the environment. It is structured as a matrix with a column for each possible environmental state s , and a row for each possible observation o . Each column is then a categorical probability distribution over the observations that will occur given the environmental state (meaning that each column must contain non-negative values that sum to 1). If the observations are multidimensional (i.e., multiple observations are made at each time point), there is a matrix for each observation modality. If two or more states determine the observation, the likelihood model then becomes a tensor. If A is imprecise (i.e., the probabilities are highly entropic and evenly distributed), observations are taken to carry less information about the environment, in many cases leading to more uncertain inferences, and vice versa.\nB , also called the transition model , describes the state-to-state transition probabilities of environmental states s . B encodes the agent's assumptions about how the environment changes over time, depending on its actions. It has a column and a row for each environmental state s , where each column is a categorical probability distribution over the states the environment will take on the next time step, given the state it is currently in. If the environment is modelled as multidimensional, there will be a matrix for each environmental state factor. Additionally, there is a separate matrix for each possible action (making each factor in B a tensor). This means that for every factor in the model, there may be one or more actions that pick out the appropriate slice of the tensor. Action therefore allows the agent to predict that the environment (and the corresponding observations) will change differently depending on the actions that it chooses. If B is imprecise (i.e., highly entropic),\nEntropy 2025 , 27 , 62\n6 of 33\nit means that the transitions of the environment are expected to be uncertain (and therefore, often transition to new states). In this sense, volatile and unstable environments will lead to less certain predictions about the future.", + "page_start": 4, + "page_end": 5, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "5. Discussion\nAlibrary of pre-made canonical POMDP models could be created so that users can easily implement them directly. Alternatives to the fixed-point iteration method for updating posteriors over environmental states could be included, like the marginal message passing algorithm. There are various ways in which the package can be made more computationally efficient, and it could be compared with other software implementations. There are plenty of utility and plotting functions that could be added to the package to make it easier to use and to facilitate integration with the model-fitting packages it relies on; for example, to allow for combining the models with linear regressions to compare parameters values of different populations in a single model. More complex types of POMDP models can also be added, like hierarchical and temporally deep POMDPs. Model structure learning could be considered, where different model structures are compared and chosen between by evaluating their free energies. Sophisticated inference, where predictions are also made about changes in one's own beliefs-depending on expected action-dependent observations in the future-could also be implemented [58]. Finally, the package could be extended to other types of generative models than POMDPs, including other universal models, like generalised filtering [17] and Hierarchical Gaussian Filter models [41], as well as custom\nEntropy 2025 , 27 , 62\n30 of 33\ngenerative models, or even (deep learning-based) amortised inference models. These various extensions could provide valuable tools for using AIF models in both theoretical and applied research.\nAuthor Contributions: Conceptualisation, S.W.N., J.E.L. and P.T.W.; methodology, S.W.N., J.E.L. and P.T.W.; software, S.W.N., J.E.L. and P.T.W.; formal analysis, S.W.N. and J.E.L.; writing-original draft preparation, S.W.N. and J.E.L.; writing-review and editing, C.H., K.F., C.M. and P.T.W.; visualisation, S.W.N. and J.E.L.; supervision, C.M. and P.T.W.; project administration, P.T.W. All authors read and agreed to the published version of this manuscript.", + "page_start": 28, + "page_end": 29, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "2.1. POMDPs in Active Inference\nC , also called the preference prior , is a prior preference over possible observations. It encodes the types of observations that an agent a priori expects to encounter; since minimising expected free energy through AIF entails taking actions that make the predicted observations come about, C also encodes the agent's preferences. It is a single categorical probability distribution over possible observations; if the observations are multidimensional, there is a separate preference prior for each observation modality. If C is imprecise (i.e., highly entropic), its preferences are weak and it will prioritise collecting information over realising its preferences; if it has low entropy, the agent will have stronger preferences and instead prioritise preferred outcomes or goals.\nD , also called the state prior , is the agent's prior belief about the states of the environment. It specifies the agent's belief about the environmental state before receiving any observations. There is a separate state prior over environmental states for each factor. With a more precise A , the influence of the D quickly diminishes since the likelihood overwhelms the prior in the Bayesian inference.\nE , also called the habit prior , is the prior over policies or paths. In the AIF vernacular, policies are allowable sequences of actions, with some specified policy length or temporal depth. E encodes the agent's preferences for choosing certain policies in the absence of plans based upon expected free energy , sometimes called the agent's 'habits'. It is a single probability distribution over each possible policy.\nIn addition to the five matrices, there are several hyper-parameters that are not part of the generative model, but are part of the inference algorithm. Here, we include two of the most common: the γ and α (inverse) temperature parameters. γ , the precision over policies, is the inverse temperature of a softmax transformation of expected free energies over policies, which is covered later in this section. After policies have been selected for a given time step, they are marginalised to calculate the probabilities of taking each possible action in the next time step. α , the action precision, is the inverse temperature of a softmax transformation on these final action probabilities, with higher values resulting in more stochastic action selection.", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "3.1. Creating and Using a POMDP\n✞ # Information about number of states , observations , actions and policy length states = [6] # Six states , single factor observations = [5] # Five observations , single modality controls = [2] # Two actions , single factor policy_length = 1 # Length of policies # Generate uniform templates for matrices and vectors of the generative model A, B, C, D, E = create_matrix_templates(states, observations, controls, policy_length) ✝\n✞ # We make C take the following form: [0, 0, 0, 0, 1] C[1] = onehot(5,5) # Initialize the single element of the C object with a one-hot vector # D will be: [1, 0, 0, 0, 0, 0] D[1] = onehot(1,6) # Initialize the single element of the D object with a one-hot vector # To make the agent prefer policy 2 E = onehot(2,2) # Initialize as a one-hot encoded vector: [0,1] ✝\n☎\n✆\n☎\nA and B are the only mandatory arguments to the init_aif function-the other arguments are keyword arguments that default to uniform priors. A , B , C , D and E and their corresponding Dirichlet priors, in the cases of A , B and D , should be formatted as standard array objects. All but E can have multiple modalities/factors (see Section 4), so they should be formatted as vectors of arrays with one array per modality/factor. These arrays can be hand-specified by the user, or be generated with some of the helper functions supplied by ActiveInference . Here, we create an AIF agent equipped with a generative model with six environmental states, five possible observations and two possible actions. Here, we use helper functions to create matrices and vectors with the correct dimensions; in Section 4, we create them manually. First, we define the number of states, observations, controls and the length of policies:\n✆\n☎", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "4.3. Fitting the Model to the Data\nHere, we demonstrated model fitting by fitting the POMDP model to the synthetic behaviour that it generated; this is called a parameter recovery study since we can then compare the estimated parameters to the generative values used for creating the simulated data [62,63]. Here, we used the simulation method shown in the previous section to produce a synthetic dataset with known parameter values for each agent (in practice, these are often participants in an experiment), here with a focus on estimating the α parameter. We then used MCMC methods to estimate the parameters for each agent and compared the estimated values with the correct values. Here, we simulated two groups of five synthetic subjects agents with different α values (the parameters for the first group were sampled from a Gaussian distribution with mean = 8 and SD = 2, and the second group with with mean = 24 and SD = 2). Each agent interacted with the T-maze environment for 300 time steps. We produced the following data frame, containing the data of each of the agents: their observations, actions and an identifier, a format suitable for cognitive and behavioural modelling.", + "page_start": 24, + "page_end": 24, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "2. Active Inference with POMDPs\nIn this section, we briefly describe the core concepts of AIF and POMDPs. This should familiarise the reader with the vernacular used in the later sections regarding the functionalities of the package. While various extensions, such as structure learning, which enables an agent to learn the structure or shape of its environment through model comparison [44-47], or hierarchical and temporally deep POMDPs [48,49], are relevant for future work, describing these in detail is beyond the scope of this foundational paper.\nAt the core of AIF lies the minimisation of a variational free energy upper bound on surprise for perception, as well as action. This is motivated by the free energy principle [4-8], which states that self-organising systems can be described as minimising the variational free energy of their sensory states. The minimisation of free energy generally takes two\n4 of 33\nEntropy 2025 , 27 , 62\n5 of 33\nquantities as its target: the variational free energy ( VFE ) in the case of perception and the expected free energy ( EFE ) in the case of action. The VFE is the free energy associated with a given sensory observation and is resolved perceptually by updating beliefs about the environment. The EFE is the free energy that is expected in the future, contingent on a given policy or course of action. Choosing action policies associated with a low EFE lead to reducing uncertainty about the environment, as well as making preferred observations more likely.", + "page_start": 3, + "page_end": 4, + "source_file": "pubmed7_cc4.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed6_cc4.pdf", + "query": "What is dyspnea ?", + "target_page": 2, + "target_passage": "Dyspnea refers to a subjective sensation of breathing discomfort.", + "chunk_present": { + "presence": true, + "index": 7 + } + }, + "top_chunk": [ + { + "text": "Discussion\nDyspnea is a complex, subjective symptom that is modi /uniFB01 ed by nonrespiratory factors including psychosocial, social, and environmental in /uniFB02 uences. 5 Interindividual variability in the perception of dyspnea, in /uniFB02 uenced by these nonrespiratory factors, may play an important role. A study conducted by Ziegler et al 24 assessed the perception of dyspnea in 42 healthy individuals using a standardized inspiratory resistive loading stimulus. The study used the modi /uniFB01 ed Borg scale to measure dyspnea perception levels. Among the participants subjected to the same inspiratory resistive load, 31%, 45%, and 24% of participants classi /uniFB01 ed their level of dyspnea as low, intermediate, and high, respectively. The study revealed that differences between individuals contribute considerable variability to the perception of dyspnea, even among healthy participants.\nThe affective dimension of dyspnea can be captured using additional questionnaires (eg, Multidimensional Dyspnea Pro /uniFB01 le, Dyspnea-12). Studies have explored the use of the Multidimensional Dyspnea Pro /uniFB01 le in\nTABLE 7 ] Unadjusted and Adjusted Dyspnea Associations With Quality of Life (SF-36)", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Recruitment of Undiagnosed Cases and Healthy\nDyspnea is a prevalent symptom with consequences that extend beyond its physiologic implications. A study in European patients with COPD explored the burden of dyspnea and identi /uniFB01 ed potential correlates. The study revealed that higher dyspnea impact correlated with lower health-related quality of life, increased work impairment, and a higher frequency of emergency department visits. 7\nThe three objectives of our study were as follows: (1) to evaluate the impact of dyspnea in adults from the general population who had no prior diagnosis of respiratory disease but who reported having signi /uniFB01 cant respiratory symptoms in the past 6 months; (2) to identify associated risk factors for dyspnea and estimate their in /uniFB02 uence on the symptom; and (3) to explore the relationship between dyspnea and health care utilization, quality of life, and work productivity in adults with undiagnosed respiratory symptoms.\nthe study was obtained from the research ethics boards of the 17 participating study sites across Canada. Informed, written consent was provided by all study participants.\nBoth landlines and cellphones within a 90-minute radius of any of the 17 study sites were dialed randomly. A\n(P. H.), Dalhousie University, Halifax, NS; the Department of Medicine (I. M. and M. B.), University of Alberta, Edmonton, AB; the Department of Medicine (M. D. L.), Queen ' s University, Kingston; the Department of Medicine (C. J. L.), University of Western Ontario, London, ON; the Department of Medicine (T. A.), Memorial University, St. John ' s, NF; the Department of Medicine (N. E.), McGill University, Montreal, QC; the Department of Medicine (M. A.), University of Manitoba, Winnipeg, MN, Canada.\nDrs Bierbrier and Gerstein contributed equally to this manuscript.\nPart of this work has been presented at the American Thoracic Society Conference, May 17-22, 2024, San Diego, CA.", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Discussion\nTABLE 8 ] Unadjusted and Adjusted Dyspnea Associations With Health Care Use\nwere you hospitalized for any breathing problems or respiratory illness?, Adjusted.P Value = .005", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Dyspnea Impact and Health Care Use, Quality of Life, and Work Productivity\nThe impact of dyspnea and its associations with health care use, quality of life, and work productivity were examined. Health care utilization was assessed through selfreported data. Quality of life was assessed using the 36Item Short Form Health Survey questionnaire, where higher scores indicate better health status. Work productivity was assessed using the Work Productivity and Activity Impairment questionnaire, where higher scores", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Impact of Dyspnea on Adults With Respiratory Symptoms Without a De /uniFB01 ned Diagnosis\nJared Bierbrier, BSc; Emily Gerstein; George A. Whitmore, PhD; Katherine L. Vandemheen, MScN; Celine Bergeron, MD; Louis-Philippe Boulet, MD; Andreanne Cote, MD; Stephen K. Field, MD; Erika Penz, MD; R. Andrew McIvor, MD; Catherine Lemière, MD; Samir Gupta, MD; Paul Hernandez, MD; Irvin Mayers, MD; Mohit Bhutani, MD; M. Diane Lougheed, MD; Christopher J. Licskai, MD; Tanweer Azher, MD; Nicole Ezer, MD; Martha Ainslie, MD; Gonzalo G. Alvarez, MD; Sunita Mulpuru, MD; and Shawn D. Aaron, MD\nBACKGROUND: We investigated dyspnea; its associated risk factors; and its impact on health care utilization, quality of life, and work productivity in adults with undiagnosed respiratory symptoms.\nRESEARCH QUESTION: What is the impact of dyspnea in adults with undiagnosed respiratory symptoms?\nSTUDY DESIGN AND METHODS: This population-based study included 2,857 adults who were experiencing respiratory symptoms. These individuals had not been previously diagnosed with any lung conditions and were recruited from 17 Canadian centers using random digit dialing. Each participant underwent spirometry testing both before and after using a bronchodilator to determine if they met the diagnostic criteria for COPD, asthma, or preserved ratio impaired spirometry (PRISm), or if their spirometry results were normal. An agematched control group (n ¼ 231) was similarly recruited using random digit dialing. A dyspnea impact assessment score from 0 to 100 was produced using questions from the COPD Assessment Test and St. George ' s Respiratory questionnaire.", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "References\n24. Ziegler B, Fernandes AK, Sanches PR, Konzen GL, Dalcin Pde T. Variability of dyspnea perception in healthy subjects\n[", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Acknowledgments\nIn conclusion, our study measured dyspnea impact in individuals with no preexisting diagnosis of lung disease who reported respiratory symptoms as part of a purposeful case /uniFB01 nding strategy. Individuals with PRISm exhibited the greatest impact of dyspnea, even higher than those newly diagnosed with asthma or COPD. After adjusting for patient factors, comorbidities, pulmonary diseases, and severity of lung physiologic impairment, most of the variability in dyspnea remained unexplained. We also showed that dyspnea was associated with increased health care utilization, impaired quality of life, and work productivity.", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Take-home Points\nStudy Question: How profoundly are adults with undiagnosed respiratory symptoms affected by dyspnea?\nResults: In community-based adults with undiagnosed respiratory symptoms, those identi /uniFB01 ed with preserved ratio impaired spirometry experienced the greatest impact of dyspnea, followed by those with undiagnosed asthma or COPD. Greater dyspnea impact was associated with increased health care utilization, lower quality of life, and reduced work productivity.\nInterpretation: Dyspnea imposes burdens on the health care system and is associated with impaired quality of life and work productivity.\nDyspnea refers to a subjective sensation of breathing discomfort. 1 In a study involving a community-based population aged > 70 years, the prevalence of dyspnea was found to be 32%. 2 Dyspnea can lead to limitations in daily activities, reduced exercise tolerance, and heightened mortality risks. 3\nDyspnea not only affects individuals with diagnosed respiratory conditions but also poses a signi /uniFB01 cant burden on those with undiagnosed conditions. In a systematic review by Müller et al, 4 the combined", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "References\n1. Parshall MB, Schwarthzstein RM, Adams L, et al. An Of /uniFB01 cial American Thoracic Society Statement: update on the mechanisms, assessment, and management of dyspnea. Am J Respir Crit Care Med . 2012;185:435-452.\n2. Ho SF, O ' Mahony MS, Steward JA, et al. Dyspnoea and quality of life in older people at home. Age Ageing . 2001;30: 155-159.\n3. Laviolette L, Laveneziana P. Dyspnoea: a multidimensional and multidisciplinary approach. Eur Respir J . 2014;43: 1750-1762.\n4. Müller A, Mraz T, Wouters EFM, et al. Prevalence of dyspnea in general adult populations: a systematic review and meta-analysis. Respir Med . 2023;218: 107379.\n5. Nishino T. Dyspnoea: underlying mechanisms and treatment. Br J Anaesth . 2011;106:463-474.\n6. NederJ,BertonD,MüllerP,etal. Ventilatory inef /uniFB01 ciency and exertional dyspnea in early chronic obstructive pulmonary disease. Ann Am Thorac Soc . 2017;14(suppl_1): S22-S29.\n7. Gruenberger JB, Vietri J, Keininger DL, Mahler DA. Greater dyspnea is associated with lower health- related quality of life among European patients with COPD. Int J Chron Obstruct Pulmon Dis . 2017;12: 937-944.\n8. Preteroti M, Whitmore GA, Vandemheen KL, et al. Population-based case/uniFB01 nding to identify subjects with undiagnosed asthma or COPD. Eur Respir J . 2020;55:2000024.", + "page_start": 11, + "page_end": 12, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Discussion\nOur study explored dyspnea in community-based adults with undiagnosed respiratory symptoms identi /uniFB01 ed via case /uniFB01 nding. Surprisingly, we found that the dyspnea experienced by those with PRISm had a greater impact on their activities and health status than those with newly diagnosed COPD or asthma.\nThe prevalence of individuals who were obese and morbidly obese in the PRISm group partially explains the between-group difference in dyspnea. The excess dyspnea seen in the PRISm group when compared with the normal spirometry group is partly explained by patient-speci /uniFB01 c risk factors, including BMI, which shrink the mean dyspnea differential between the groups from 11.2 to 5.5 points (Tables 3-6). The remaining 5.5point difference indicates that PRISm patients have excess dyspnea relative to symptomatic individuals with normal spirometry for additional reasons other than obesity.\n[\n166#6 CHEST DECEMBER 2024\n]\nTABLE 6 ] Dyspnea Regressed on Lung Function Variables Representing Severity of Impairment", + "page_start": 8, + "page_end": 9, + "source_file": "pubmed6_cc4.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed6_cc4.pdf", + "query": "What are the criterion to be control patient in the dyspnea study ?", + "target_page": 3, + "target_passage": "Control patients reported no respiratory symptoms in the preceding 6 months and obtained a score of 0 on the ASQ.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Discussion\nTABLE 6 ] Dyspnea Regressed on Lung Function Variables Representing Severity of Impairment\nControl, Reversibility of FEV1, % = /C0 0.163 ( P ¼ .47). Control, Post-BD FEV1/FVC Ratio = /C0 0.274 (P [ .05). Control, Post-BD FEV1 % predicted = /C0 0.090 ( P ¼ .17). Control, Overall P Value = .096. Normal spirometry, Reversibility of FEV1, % = 0.186 ( P ¼ .16). Normal spirometry, Post-BD FEV1/FVC Ratio = 0.240 (P [ .005). Normal spirometry, Post-BD FEV1 % predicted = /C0 0.131 (P < .001). Normal spirometry, Overall P Value = < .001. Asthma, Reversibility of FEV1, % = 0.545 (P [ .01). Asthma, Post-BD FEV1/FVC Ratio = 0.107 ( P ¼ .58). Asthma, Post-BD FEV1 % predicted = /C0 0.158 ( P ¼ .08). Asthma, Overall P Value = .009. COPD, Reversibility of FEV1, % = 0.392 (P [ .002). COPD, Post-BD FEV1/FVC Ratio = /C0 0.307 (P [ .05). COPD, Post-BD FEV1 % predicted = /C0 0.075 ( P ¼ .37). COPD, Overall P Value = < .001. PRISm, Reversibility of FEV1, % = /C0 0.290 ( P ¼ .39). PRISm, Post-BD FEV1/FVC Ratio = 0.854 (P [ .002). PRISm, Post-BD FEV1 % predicted = /C0 0.650 (P [ .004). PRISm, Overall P Value = < .001", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Statistical Analysis\nBox plots were used to compare distribution patterns of dyspnea impact assessments among the disease groups. Pairwise comparison tests were conducted to evaluate mean dyspnea differences between groups. Multiple linear regression analysis was used to measure contributions to variability of dyspnea by selected patient-speci /uniFB01 c risk factors, spirometry disease classi /uniFB01 cation, and key lung function measures. The selected sets of risk factors were evaluated using successive regression analyses. Analysis of variance sums of squares from the successive regression analyses provided the cumulative percentage contributions to variability of dyspnea. Simple, multiple, and logistic regression analyses were used to study associations between dyspnea and health care utilization, quality of life, and work productivity outcomes. All statistical analyses were done using STATA 16 statistical software (StataCorp).\nparticipants (24%) did not meet the threshold of $ 6 points on the ASQ or $ 20 points on the COPDDiagnostic Questionnaire and were thus excluded, leaving 4,272 individuals deemed eligible for spirometry.\nFigure 1 -Study /uniFB02 ow diagram demonstrating the case /uniFB01 nding and control group recruitment and allocation. ASQ ¼ Asthma Screening Questionnaire; COPD-DQ ¼ COPD Diagnostic Questionnaire; CF ¼ cystic /uniFB01 brosis; MI ¼ myocardial infarction; PRISM ¼ preserved ratio impaired spirometry.\nchestjournal.org\n1299\nTABLE 1 ] Descriptive Characteristics and Demographics of the Study Group", + "page_start": 3, + "page_end": 4, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "TABLE 2 ] (Continued)\nTABLE 3 ] Intergroup Comparisons of Dyspnea Impact\nControl, Mean Dyspnea Score (95% CI) = 13.8 (11.8-15.7). Control, Mean Difference (95% CI) = /C0 38.0 ( /C0 41.1 to /C0 34.9). Control, P Value = < .001. Normal spirometry, Mean Dyspnea Score (95% CI) = 51.8 (50.7-52.8). Normal spirometry, Mean Difference (95% CI) = . Normal spirometry, P Value = . Control, Mean Dyspnea Score (95% CI) = 13.8 (11.8-15.7). Control, Mean Difference (95% CI) = /C0 43.7 ( /C0 47.6 to /C0 39.8). Control, P Value = < .001. COPD, Mean Dyspnea Score (95% CI) = 57.5 (55.1-59.9). COPD, Mean Difference (95% CI) = . COPD, P Value = . Control, Mean Dyspnea Score (95% CI) = 13.8 (11.8-15.7). Control, Mean Difference (95% CI) = /C0 42.8 ( /C0 46.9 to /C0 38.7). Control, P Value = < .001. Asthma, Mean Dyspnea Score (95% CI) = 56.6 (53.9-59.3). Asthma, Mean Difference (95% CI) = . Asthma, P Value = . Control, Mean Dyspnea Score (95% CI) = 13.8 (11.8-15.7). Control, Mean Difference (95% CI) = /C0 49.2 ( /C0 53.7 to /C0 44.6). Control, P Value = < .001. PRISm, Mean Dyspnea Score (95% CI) = 63.0 (59.5-66.4). PRISm, Mean Difference (95% CI) = . PRISm, P Value = . Normal spirometry, Mean Dyspnea Score (95% CI) = 51.8 (50.7-52.8). Normal", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Discussion\nData are presented as OR (95% CI) with P values. Adjusted values are adjusted for age, sex, and BMI.\noutpatients with cardiorespiratory disease 25 and the Dyspnea-12 in patients with asthma 26 and found that the affective aspect of dyspnea can signi /uniFB01 cantly in /uniFB02 uence the impact of dyspnea on health status, irrespective of the intensity of breathlessness.\nIn those with PRISm, there was a strong, positive association between higher values for the FEV1/FVC ratio and dyspnea. For the PRISm group, a higher FEV1/FVC ratio may re /uniFB02 ect diminished lung compliance due to interstitial lung disease and/or respiratory system restriction due to obesity, which could contribute to worse dyspnea. Conversely, the association of dyspnea with the FEV1/FVC ratio was in the opposite direction for those with asthma or COPD, and a lower FEV1/FVC ratio correlated with worse dyspnea, as expected.\nOur study complements the literature by focusing on adults with undiagnosed respiratory symptoms who were randomly selected and recruited through active case /uniFB01 nding in the community. This increases the generalizability of our results to a broader population. Our dyspnea questions were derived from widely used\nand validated respiratory health questionnaires, and our dyspnea assessment measure is a weighted average of responses to these validated questions. Consequently, the measure has an immediate interpretation in terms of the lived day-to-day experience of individuals.", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "TABLE 2 ] (Continued)\nTABLE 4 ] Sequential Regression Analyses of Risk Factors Contributing to Variability in Dyspnea: Dyspnea Regressed on Patient-Speci /uniFB01 c Risk Factors (20.6% of Variability Explained)\nAge, Regression Coef /uniFB01 cient = /C0 0.0909. Age, P Value = .005. Female, Regression Coef /uniFB01 cient = 8.217. Female, P Value = < .001. BMI, Regression Coef /uniFB01 cient = 0.899. BMI, P Value = < .001. Household income < CAD $30,000, Regression Coef /uniFB01 cient = 1.420. Household income < CAD $30,000, P Value = .40. Household income $ CAD $30,000, Regression Coef /uniFB01 cient = /C0 2.149. Household income $ CAD $30,000, P Value = .07. Smoking history, pack-y, Regression Coef /uniFB01 cient = 0.144. Smoking history, pack-y, P Value = < .001. Smoking exposure, Regression Coef /uniFB01 cient = 5.123. Smoking exposure, P Value = < .001. Occupational exposure, Regression Coef /uniFB01 cient = 0.00975. Occupational exposure, P Value = < .001. Congestive heart failure, Regression Coef /uniFB01 cient = 10.119. Congestive heart failure, P Value = .004. Coronary artery disease, Regression Coef /uniFB01 cient = 4.813. Coronary artery disease, P Value = .001. Depression/anxiety, Regression Coef /uniFB01 cient = 6.892. Depression/anxiety, P Value = < .001. Diabetes mellitus, Regression Coef /uniFB01 cient = 1.627. Diabetes mellitus, P Value = .22. Hypertension, Regression Coef /uniFB01 cient = 3.433. Hypertension, P Value = < .001. Anemia, Regression Coef /uniFB01 cient = 1.738. Anemia, P Value = .15. Cancer, Regression Coef /uniFB01 cient =", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "TABLE 2 ] (Continued)\nTable 4 presents the association of dyspnea with patient-speci /uniFB01 c risk factors. Dyspnea impact increased with younger age, being female, higher BMI, higher smoking and smoke exposure history, and total work\n= carrying things up stairs, light. it dif /uniFB01 cult to do things such, 3 = dancing, bowling,. it dif /uniFB01 cult to do things such, 4 = to do things such. it dif /uniFB01 cult to do things such, 5 = the garden or shoveling. it dif /uniFB01 cult to do things such, 6 = 5 km/h, playing tennis. it dif /uniFB01 cult to do things such, 7 = . it dif /uniFB01 cult to do things such, 8 = do. it dif /uniFB01 cult to do things such, 9 = . CAT and SGRQ, 1 = . CAT and SGRQ, 2 = . CAT and SGRQ, 3 = as weeding,. CAT and SGRQ, 4 = /uniFB01. CAT and SGRQ, 5 = cult. CAT and SGRQ, 6 = digging. CAT and SGRQ, 7 = walking at. CAT and SGRQ, 8 = makes it dif /uniFB01 cult to. CAT and SGRQ, 9 = running,. From 0.132) My, 1 = . From 0.132) My, 2 = . From 0.132) My, 3 = . From 0.132) My, 4 = . From 0.132) My, 5 = it dif. From 0.132) My, 6 = . From 0.132) My, 7 = jogging, or. From 0.132) My, 8 = breathing. From 0.132) My, 9 = . makes, 1 = (weight ¼ breathing. makes, 2 = climbing. makes, 3 = /uniFB01. makes, 4 = %. makes, 5 = makes. makes, 6 = loads,. makes, 7 = . makes, 8 = . makes, 9 = work,. , 1 = . , 2 = up hills,. , 3 = such. , 4 = . , 5 = . , 6 = heavy. , 7 = %. , 8 = . , 9 = .", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "TABLE 2 ] (Continued)\nTABLE 5 ] Dyspnea Regressed on Spirometry Disease Group\nControl, Regression Coef /uniFB01 cient = /C0 31.2. Control, P Value = < .001. Normal spirometry a, Regression Coef /uniFB01 cient = NA. Normal spirometry a, P Value = NA. Asthma, Regression Coef /uniFB01 cient = 4.6. Asthma, P Value = .001. COPD, Regression Coef /uniFB01 cient = 3.8. COPD, P Value = .003. PRISm, Regression Coef /uniFB01 cient = 5.5. PRISm, P Value = .001. Constant, Regression Coef /uniFB01 cient = 51.9. Constant, P Value = NA", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "TABLE 2 ] (Continued)\nTable 4 presents the association of dyspnea with patient-speci /uniFB01 c risk factors. Dyspnea impact increased with younger age, being female, higher BMI, higher smoking and smoke exposure history, and total work\n¼ ¼ 6 9 7 4, 1 = . ¼ ¼ 6 9 7 4, 2 = . ¼ ¼ 6 9 7 4, 3 = . ¼ ¼ 6 9 7 4, 4 = 78 81. ¼ ¼ 6 9 7 4, 5 = 78 81. ¼ ¼ 6 9 7 4, 6 = 78 81. ¼ ¼ 6 9 7 4, 7 = 85 88. ¼ ¼ 6 9 7 4, 8 = 85 88. ¼ ¼ 6 9 7 4, 9 = 85 88. Asthma Group ¼ 265) 5 9, 1 = . Asthma Group ¼ 265) 5 9, 2 = . Asthma Group ¼ 265) 5 9, 3 = . Asthma Group ¼ 265) 5 9, 4 = 71. Asthma Group ¼ 265) 5 9, 5 = 71. Asthma Group ¼ 265) 5 9, 6 = 71. Asthma Group ¼ 265) 5 9, 7 = 79. Asthma Group ¼ 265) 5 9, 8 = 79. Asthma Group ¼ 265) 5 9, 9 = 79. ¼ 5 4, 1 = . ¼ 5 4, 2 = . ¼ 5 4, 3 = . ¼ 5 4, 4 = 65. ¼ 5 4, 5 = 65. ¼ 5 4, 6 = 65. ¼ 5 4, 7 = 74. ¼ 5 4, 8 = 74. ¼ 5 4, 9 = 74. Control Group (n ¼ 231), 1 = as or 8. Control Group (n ¼ 231), 2 = as or 8. Control Group (n ¼ 231), 3 = as or 8. Control Group (n ¼ 231), 4 = as or 13. Control Group (n ¼ 231), 5 = as or 13. Control Group (n ¼ 231), 6 = as or 13. Control Group (n ¼ 231), 7 = things such as very cycling, swimming fast, 17. Control Group (n ¼ 231), 8 = things such as very cycling, swimming fast, 17. Control Group (n ¼ 231), 9 = things such as very cycling, swimming fast, 17. it dif /uniFB01 cult to do things such, 1 = . it dif /uniFB01 cult to do things such, 2", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "TABLE 2 ] (Continued)\nTABLE 4 ] Sequential Regression Analyses of Risk Factors Contributing to Variability in Dyspnea: Dyspnea Regressed on Patient-Speci /uniFB01 c Risk Factors (20.6% of Variability Explained)\n0.952. Cancer, P Value = .49. GERD, Regression Coef /uniFB01 cient = 4.663. GERD, P Value = < .001. Liver disease, Regression Coef /uniFB01 cient = 1.081. Liver disease, P Value = .61. Renal disease, Regression Coef /uniFB01 cient = 2.073. Renal disease, P Value = .32. Stroke, Regression Coef /uniFB01 cient = 8.463. Stroke, P Value = < .001", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "TABLE 2 ] (Continued)\nData are presented as mean (SD) for Q1, Q2, and Q3 (total), and Q3 to Q15 were presented to participants as yes or no questions, where percentages of parti cipants who answered yes are shown. Question weights (principal component analysis scoring coef /uniFB01 cients) used for calculating the dyspnea assessment are shown below individual questions. CAT ¼ COPD Assessment Test; PRISm ¼ preserved ratio impaired spirometry; Q ¼ question; SGRQ ¼ St. George ' s Respiratory Questionnaire.\n1302\nOriginal Research\nHowever, 1,415 either did not attend or were unable to complete adequate spirometry. Ultimately, 2,857 (67%) of those eligible underwent both pre- and post-BD spirometry.\nOf these 2,857 participants, 2,090 (73.2%) had normal spirometry, 265 (9.3%) had undiagnosed asthma, 330 (11.5%) had undiagnosed COPD, and 172 (6.0%) had PRISm based on post-BD spirometry. Of the 595 individuals with spirometric evidence of asthma or COPD, 253 were independently assessed by a pulmonologist. In 245 of these 253 cases (97%), the independent physician diagnosis agreed with the study diagnosis of asthma or COPD.\nIndividuals in the COPD group were generally older andmorelikelytobemalecomparedwithallother study groups (Table 1). All groups, including healthy control participants, had mean BMIs in the overweight orobeseranges.ThePRISmgroupwasheaviestwithan average BMI of 34.7, and 22% of PRISm patients met BMI criteria for morbid obesity. Compared with all other groups, those with COPD were the most likely to have active or previous tobacco use, with the highest average total pack-years of 32.7. The control group had the lowest number of people with active or previous tobacco use.\nTable 2 shows mean responses to the 15 dyspnea questions for each disease classi /uniFB01 cation and presents question weights (PCA scoring coef /uniFB01 cients) used for calculating the dyspnea impact assessment.", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed6_cc4.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_RSG_2004.pdf", + "query": "What is the revenue of Republic Services in 2002 ?", + "target_page": 2, + "target_passage": " $ 2,365.1", + "chunk_present": { + "presence": true, + "index": 9 + } + }, + "top_chunk": [ + { + "text": "Years Ended December 31, 2004, 2003 and 2002\nRevenue. Revenue was $2,708.1 million, $2,517.8 million and $2,365.1 million for the years ended December 31, 2004, 2003 and 2002, respectively. Revenue increased by $190.3 million, or 7.6%, from 2003 to\n34\n2004. Revenue increased by $152.7 million, or 6.5%, from 2002 to 2003. The following table reÖects the components of our revenue growth for the years ended December 31, 2004, 2003 and 2002:", + "page_start": 41, + "page_end": 42, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "annual report 2002", + "page_start": 0, + "page_end": 0, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "2002 compared to 2001\nTotal revenue was $93.0 million in 2002, an increase of $24.3 million or 35.3%. Total revenues included $57.9 million of wireless revenues, an increase of $21.7 million or 60.2%; wireline revenues of $28.7 million, an increase of $1.3 million or 4.6%; and other revenues of $6.4 million, an increase of $1.2 million or 24.5%.\nWithin wireless revenues, the PCS operation contributed $55.5 million, an increase of $21.4 million, or 63.0%. PCS service revenues were $37.4 million, an increase of $18.3 million or 95.7%. The increase in the subscriber base, which totaled 67,842 at December 31, 2002, was an increase of 20,524 or 43% from the prior year end.\nPCS travel revenue, which is compensation between Sprint and its PCS Affiliates for use of the other party's network, was $16.5 million, an increase of $2.9 million or 21.3%. Travel revenue is impacted by the geographic size of the Company's network service area, the overall number of Sprint wireless customers, and the travel exchange rate. The rate received on travel was $0.10 per minute in 2002. The rates in 2001 were $0.20 per minute from January 1, 2001 through April 30, 2001; $0.15 per minute from May 1, 2001 through September 30, 2001; and $0.12 per minute from October 1, 2001 through December 31, 2001.\nPCS equipment sales were $1.6 million, an increase of $0.3 million or 19.6%. The equipment sales are net of $0.3 million of rebates and discounts given at the time of sale, which became more pronounced during the year to meet industry competition for subscriber additions and subscriber retention.\nIn accordance with Sprint's requirements, the Company launched third generation (3G 1X) service in August 2002. The impact of 3G 1X-network enhancements on revenues was not significant in 2002.", + "page_start": 50, + "page_end": 50, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "REPORT OF INDEPENDENT REGISTERED PUBLIC ACCOUNTING FIRM ON THE FINANCIAL STATEMENTS\nThe Board of Directors and Stockholders of Republic Services, Inc.:\nWe have audited the accompanying consolidated balance sheets of Republic Services, Inc. and subsidiaries as of December 31, 2004 and 2003, and the related consolidated statements of income, stockholders' equity, and cash Öows for the three years in the period ended December 31, 2004. Our audits also included the Ñnancial statement schedule listed in the Index at Item 15(a). These Ñnancial statements and schedule are the responsibility of the Company's management. Our responsibility is to express an opinion on these Ñnancial statements and schedule based on our audits.\nWe conducted our audits in accordance with the standards of the Public Company Accounting Oversight Board (United States). Those standards require that we plan and perform the audit to obtain reasonable assurance about whether the Ñnancial statements are free of material misstatement. An audit includes examining, on a test basis, evidence supporting the amounts and disclosures in the Ñnancial statements. An audit also includes assessing the accounting principles used and signiÑcant estimates made by management, as well as evaluating the overall Ñnancial statement presentation. We believe that our audits provide a reasonable basis for our opinion.\nIn our opinion, the Ñnancial statements referred to above present fairly, in all material respects, the consolidated Ñnancial position of Republic Services, Inc. and subsidiaries at December 31, 2004 and 2003, and the consolidated results of their operations and their cash Öows for each of the three years in the period ended December 31, 2004 in conformity with U.S. generally accepted accounting principles. Also, in our opinion, the related Ñnancial statement schedule, when considered in relation to the basic Ñnancial statements taken as a whole, presents fairly in all material respects the information set forth therein.\nAs discussed in Note 1 to the Ñnancial statements, in 2003 Republic Services, Inc. changed its method of accounting for Ñnal capping, closure and post-closure costs relating to its landÑlls and for methane gas collection systems.", + "page_start": 58, + "page_end": 58, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "Independent Certified\nRepublic Services, Inc. 110 SE 6th Street, Suite 2800 Fort Lauderdale, Florida 33301 Phone: (954) 769-2400 www.republicservices.com\nInvestor Relations Republic Services, Inc. 110 SE 6th Street, Suite 2800 Fort Lauderdale,Florida 33301 Phone: (954) 769-3616\nINCOME BEFORE CUMULATIVE EFFECT OF CHANGES IN ACCOUNTING PRINCIPLES In Millions of Dollars\nDILUTED EARNINGS PER SHARE BEFORE CUMULATIVE EFFECT OF CHANGES IN ACCOUNTING PRINCIPLES In Dollars", + "page_start": 1, + "page_end": 1, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "Letter to Shareholders\nDear Fellow Shareholders:\nI am pleased to report that 2004 was a very good year for Republic Services, Inc. Our team met and exceeded the important financial and management goals we told you about here a year ago, and we plan to work just as hard and accomplish just as much in the coming year.\nRepublic is strengthening its competitive position among the leading waste services providers every day. As always, we are doing so by offering our customers cost-effective and safe waste collection, reliable recycling, and environmentally protective disposal options.\nI am proud of our team and what they accomplished. The results tell you just how well they did.\nRevenue in 2004 grew 7.6 percent to $2.7 billion, a record. The increases came largely from new municipal contracts and improved pricing. At the same time, we benefited from our presence in highgrowth markets, especially those in the rapidly expanding Sunbelt states.\nWe met last year's guidance. Net income per diluted share rose 15 percent to $1.53. Our revenue enhancement and cost reduction efforts produced results. We generated a record level of free cash flow - $388 million to be exact. Republic continues to generate strong and predictable levels of cash flow. As in the past year, we will concentrate on free cash flow and use it for acquisitions, reinvestment, repurchases of our stock and regular quarterly cash dividends.\nAs I thought about these achievements, I realized they result from the environment that we work to create for both our customers and our people. We care about our customers and the communities we serve. About our people. About the environment. And, of course, we care about you -- our shareholders. Every year we adopt a theme that captures our Company and our values. Our theme for 2005 is 'Republic Services…A Company that cares'.\nOur 13,400 dedicated people worked hard last year to create real value. We improved the way we deliver our services, increasing our efficiency in routing our collection trucks. We improved the way we construct disposal cells at numerous landfills, lowering costs. We worked with our vendors to control prices. And, we communicated to our customers the value of the services we offer. This year will be no different. We will continue to concentrate on these fundamentals.", + "page_start": 2, + "page_end": 2, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "NOTES TO CONSOLIDATED FINANCIAL STATEMENTS\nRevenue of the Company by revenue source for the years ended December 31, 2004, 2003 and 2002 is as follows:", + "page_start": 89, + "page_end": 89, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "2003 compared to 2002\nTotal revenue was $105.9 million in 2003, an increase of $12.9 million or 13.9%. Total revenues included $70.0 million of wireless revenues, an increase of $12.0 million or 20.7%; wireline revenues of $29.0 million, an increase of $0.3 million or 0.9%; and other revenues of $7.0 million, an increase of $0.6 million or 9.7%.\nWithin wireless revenues, the PCS operation contributed $69.8 million, an increase of $11.6 million, or 20.8%. PCS service revenues were $44.4 million, an increase of $10.9 million or 32.4%. Service revenue growth was driven by the increase in subscribers, totaling 85,139 at December 31, 2003, an increase of 17,297 or 25.5%, compared to 67,842 subscribers at year-end 2002. The company had churn of 2.1% in 2003 compared to 2.8% in 2002. The decline in the churn rate is the result of tightening the credit screening for new subscribers as well as continued efforts to improve the after sales support. Competition in the wireless industry continues to have a significant impact on the results of the Company's PCS operation.\nPCS travel revenue, including reseller revenue, which is compensation between Sprint and its PCS Affiliates for use of the other party's network, was $16.8 million, an increase of $0.3 million or 1.8%. Travel revenue is impacted by the geographic size of the Company's network service area, the overall number of Sprint wireless customers, their travel patterns and the travel exchange rate. The rate received on travel was $0.058 per minute in 2003, compared to $0.10 per minute in 2002. As a part of the amended management agreement signed on January 30, 2004, Sprint and the Company agreed to maintain the travel rate at $0.058 per minute through December 31, 2006.\n45\n■\n2003 ANNUAL REPORT", + "page_start": 46, + "page_end": 46, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "2002 compared to 2001\nTower leases added $2.1 million to wireless revenues, an increase of $0.4 million or 24.5%. The increase was the result of other wireless carriers executing additional leases to use space on the Company's portfolio of towers. Of the 82 towers and poles owned by the Company as of December 31, 2002, 46 have tower space leased to other carriers.\nWireless revenues from the Company's paging operation were $0.3 million, a decrease of $0.1 million as the local customer base increasingly chose alternative digital wireless services. Paging service subscribers declined by 7.8% in 2002 from 3,190 subscribers to 2,940 subscribers.\nWithin wireline revenues, the Telephone operation contributed $22.5 million, an increase of $0.9 million, or 4.0%. Telephone access revenues were $10.9 million, an increase of $1.4 million or 14.8%. The growth in access revenues was driven by a 38.4% increase in access minutes of use on the Company's network and an increased percentage of minutes in the intrastate jurisdiction, where rates are higher than the interstate jurisdiction. On January 1, 2002 the Federal subscriber line charge (SLC) for residential customers increased from $3.50 to $5.00 per month. The SLC\n49\n■\n2003 ANNUAL REPORT", + "page_start": 50, + "page_end": 50, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "Financial Highlights\nRevenue, 2004 = $ 2,708.1. Revenue, 2003 = $ 2,517.8. Revenue, 2002 = $ 2,365.1. Revenue, 2001 = $ 2,257.5. Revenue, 2000 = $ 2,103.3. Operating income, 2004 = 452.3. Operating income, 2003 = 412.7. Operating income, 2002 = 459.5. Operating income, 2001 = 283.5. Operating income, 2000 = 434.0. Depreciation, amortization, depletion and accretion, 2004 = 273.1. Depreciation, amortization, depletion and accretion, 2003 = 251.8. Depreciation, amortization, depletion and accretion, 2002 = 199.6. Depreciation, amortization, depletion and accretion, 2001 = 215.4. Depreciation, amortization, depletion and accretion, 2000 = 197.4. Income before cumulative effect of changes in accounting principles, 2004 = 237.9. Income before cumulative effect of changes in accounting principles, 2003 = 215.4. Income before cumulative effect of changes in accounting principles, 2002 = 239.6. Income before cumulative effect of changes in accounting principles, 2001 = 125.5. Income before cumulative effect of changes in accounting principles, 2000 = 221.0. Diluted earnings per share before cumulative effect of changes in accounting principles, 2004 = 1.53. Diluted earnings per share before cumulative effect of changes in accounting principles, 2003 = 1.33. Diluted earnings per share before cumulative effect of changes in accounting principles, 2002 = 1.44. Diluted earnings per share before cumulative effect of changes in accounting principles, 2001 = 0.73. Diluted earnings per share before cumulative effect of changes in accounting principles, 2000 = 1.26. Cash flow provided by operating activities, 2004 = 666.3. Cash flow provided by operating activities, 2003 = 600.5. Cash flow provided by operating activities, 2002 = 569.7. Cash flow provided by operating activities, 2001 = 459.2. Cash flow provided by operating activities, 2000 = 461.8. Free cash flow*, 2004 = 388.2. Free cash flow*, 2003 = 336.4. Free cash flow*, 2002 = 325.7. Free cash flow*, 2001 = 218.6. Free", + "page_start": 1, + "page_end": 1, + "source_file": "NYSE_RSG_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_RSG_2004.pdf", + "query": "Who is the Vice Chairmain of the Board of Republic Services ?", + "target_page": 5, + "target_passage": " Harris W. Hudson1 Vice Chairman of the Board", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "REPUBLIC SERVICES, INC.\nBy: /s/\nJAMES E. O'CONNOR\nJames E. O'Connor Chairman of the Board and Chief Executive OÇcer (principal executive oÇcer)", + "page_start": 100, + "page_end": 100, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "Notice of Annual Meeting\nThe Annual Meeting of Stockholders of Republic Services, Inc. will be held at 10:30 a.m., May 12, 2005, at 110 SE 6th Street, 7th Floor Atrium, Fort Lauderdale, Florida 33301\nIn Billions of Dollars", + "page_start": 1, + "page_end": 1, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "REPORT OF INDEPENDENT REGISTERED PUBLIC ACCOUNTING FIRM ON INTERNAL CONTROL OVER FINANCIAL REPORTING\nThe Board of Directors and Stockholders of Republic Services, Inc.:\nWe have audited management's assessment, included in the accompanying Report of Management on Republic Services, Inc.'s Internal Control Over Financial Reporting, that Republic Services, Inc. and subsidiaries maintained eÅective internal control over Ñnancial reporting as of December 31, 2004, based on criteria established in Internal Control Ì Integrated Framework issued by the Committee of Sponsoring Organizations of the Treadway Commission (the COSO criteria). Republic Services, Inc.'s management is responsible for maintaining eÅective internal control over Ñnancial reporting and for its assessment of the eÅectiveness of internal control over Ñnancial reporting. Our responsibility is to express an opinion on management's assessment and an opinion on the eÅectiveness of the company's internal control over Ñnancial reporting based on our audit.\nWe conducted our audit in accordance with the standards of the Public Company Accounting Oversight Board (United States). Those standards require that we plan and perform the audit to obtain reasonable assurance about whether eÅective internal control over Ñnancial reporting was maintained in all material respects. Our audit included obtaining an understanding of internal control over Ñnancial reporting, evaluating management's assessment, testing and evaluating the design and operating eÅectiveness of internal control, and performing such other procedures as we considered necessary in the circumstances. We believe that our audits provide a reasonable basis for our opinion.\nA company's internal control over Ñnancial reporting is a process designed to provide reasonable assurance regarding the reliability of Ñnancial reporting and the preparation of Ñnancial statements for external purposes in accordance with generally accepted accounting principles. A company's internal control over Ñnancial reporting includes those policies and procedures that (1) pertain to the maintenance of records that, in reasonable detail, accurately and fairly reÖect the transactions and dispositions of the assets of the company; (2) provide reasonable assurance that transactions are recorded as necessary to permit preparation of Ñnancial statements in accordance with generally accepted accounting principles, and that receipts and expenditures of the company are being made only in accordance with authorizations of management and directors of the company; and (3) provide reasonable assurance regarding prevention or timely detection of unauthorized acquisition, use, or disposition of the company's assets that could have a material eÅect on the Ñnancial statements.", + "page_start": 59, + "page_end": 59, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "REPORT OF INDEPENDENT REGISTERED PUBLIC ACCOUNTING FIRM ON THE FINANCIAL STATEMENTS\nWe also have audited, in accordance with the standards of the Public Company Accounting Oversight Board (United States), the eÅectiveness of Republic Services, Inc.'s internal control over Ñnancial reporting as of December 31, 2004, based on criteria established in Internal Control Ì Integrated Framework issued by the Committee of Sponsoring Organizations of the Treadway Commission and our report dated February 24, 2005, expressed an unqualiÑed opinion thereon.\n/s/ ERNST & YOUNG LLP CertiÑed Public Accountants\nFort Lauderdale, Florida February 24, 2005\n51", + "page_start": 58, + "page_end": 58, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "REPORT OF INDEPENDENT REGISTERED PUBLIC ACCOUNTING FIRM ON THE FINANCIAL STATEMENTS\nThe Board of Directors and Stockholders of Republic Services, Inc.:\nWe have audited the accompanying consolidated balance sheets of Republic Services, Inc. and subsidiaries as of December 31, 2004 and 2003, and the related consolidated statements of income, stockholders' equity, and cash Öows for the three years in the period ended December 31, 2004. Our audits also included the Ñnancial statement schedule listed in the Index at Item 15(a). These Ñnancial statements and schedule are the responsibility of the Company's management. Our responsibility is to express an opinion on these Ñnancial statements and schedule based on our audits.\nWe conducted our audits in accordance with the standards of the Public Company Accounting Oversight Board (United States). Those standards require that we plan and perform the audit to obtain reasonable assurance about whether the Ñnancial statements are free of material misstatement. An audit includes examining, on a test basis, evidence supporting the amounts and disclosures in the Ñnancial statements. An audit also includes assessing the accounting principles used and signiÑcant estimates made by management, as well as evaluating the overall Ñnancial statement presentation. We believe that our audits provide a reasonable basis for our opinion.\nIn our opinion, the Ñnancial statements referred to above present fairly, in all material respects, the consolidated Ñnancial position of Republic Services, Inc. and subsidiaries at December 31, 2004 and 2003, and the consolidated results of their operations and their cash Öows for each of the three years in the period ended December 31, 2004 in conformity with U.S. generally accepted accounting principles. Also, in our opinion, the related Ñnancial statement schedule, when considered in relation to the basic Ñnancial statements taken as a whole, presents fairly in all material respects the information set forth therein.\nAs discussed in Note 1 to the Ñnancial statements, in 2003 Republic Services, Inc. changed its method of accounting for Ñnal capping, closure and post-closure costs relating to its landÑlls and for methane gas collection systems.", + "page_start": 58, + "page_end": 58, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "Independent Certified\nRepublic Services, Inc. 110 SE 6th Street, Suite 2800 Fort Lauderdale, Florida 33301 Phone: (954) 769-2400 www.republicservices.com\nInvestor Relations Republic Services, Inc. 110 SE 6th Street, Suite 2800 Fort Lauderdale,Florida 33301 Phone: (954) 769-3616\nINCOME BEFORE CUMULATIVE EFFECT OF CHANGES IN ACCOUNTING PRINCIPLES In Millions of Dollars\nDILUTED EARNINGS PER SHARE BEFORE CUMULATIVE EFFECT OF CHANGES IN ACCOUNTING PRINCIPLES In Dollars", + "page_start": 1, + "page_end": 1, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "REPUBLIC SERVICES, INC.\n(Exact name of Registrant as SpeciÑed in its Charter)\nDelaware\n65-0716904\n(State of Incorporation)\n(I.R.S. Employer IdentiÑcation No.)\nRepublic Services, Inc. 110 S.E. 6th Street, 28th Floor Fort Lauderdale, Florida\n33301\n(Zip Code)\n(Address of Principal Executive OÇces)\nRegistrant's telephone number, including area code: (954) 769-2400\nSecurities registered pursuant to Section 12(b) of the Act:\nTitle of Each Class\nName of Each Exchange on which Registered\nCommon Stock, par value $.01 per share\nThe New York Stock Exchange\nSecurities registered pursuant to Section 12(g) of the Act: None\nIndicate by check mark whether the registrant: (1) has Ñled all reports required to be Ñled by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding 12 months (or for such shorter period that the registrant was required to Ñle such reports), and (2) has been subject to such Ñling requirements for the past 90 days. Yes ≤ No n\nIndicate by check mark if disclosure of delinquent Ñlers pursuant to Item 405 of Regulation S-K is not contained herein, and will not be contained, to the best of registrant's knowledge, in deÑnitive proxy or information statements incorporated by reference in Part III of this Form 10-K or any amendment to this Form 10-K. ≤\nIndicate by check mark whether the registrant is an accelerated Ñler (as deÑned in Rule 12b-2 of the Act). Yes ≤ No n\nAs of June 30, 2004, the aggregate market value of the shares of the Common Stock held by non- aÇliates of the registrant was approximately $4,395,636,476.\nAs of February 18, 2005, the registrant had outstanding 149,670,988 shares of Common Stock.\nDOCUMENTS INCORPORATED BY REFERENCE\nPart III Portions of the Registrant's Proxy Statement relative to the 2005 Annual Meeting of Stockholders.", + "page_start": 6, + "page_end": 6, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "CERTIFICATION PURSUANT TO 18 U.S.C. SECTION 1350, AS ADOPTED PURSUANT TO SECTION 906 OF THE SARBANES-OXLEY ACT OF 2002\nIn connection with the Annual Report on Form 10-K of Republic Services, Inc. (the \"\"Company'') for the period ended December 31, 2004 as Ñled with the Securities and Exchange Commission on the date hereof (the \"\"Report''), I, Tod C. Holmes, Chief Financial OÇcer of the Company, hereby certify, pursuant to 18 U.S.C. Section 1350, as adopted pursuant to Section 906 of the Sarbanes-Oxley Act of 2002, that to the best of my knowledge:\n(1) The Report fully complies with the requirements of Section 13(a) or 15(d) of the Securities Exchange Act of 1934, as amended; and\n(2) The information contained in the Report fairly presents, in all material respects, the Ñnancial condition and results of operations of the Company.\nFebruary 25, 2005\n/s/ TOD C. HOLMES\nTod C. Holmes\nSenior Vice President and Chief Financial OÇcer", + "page_start": 105, + "page_end": 105, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "Ann M. de Raismes\nSenior Vice President,\nHuman Resources", + "page_start": 36, + "page_end": 36, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "Corporate Headquarters\n110 SE 6th Street, 28th Floor, Fort Lauderdale, Florida 33301 Phone: (954) 769-2400 · Fax: (954) 769-2664 · www.republicservices.com\n©2005, RITM, LLC\nRepublic Services and Republic Services, Inc. names and logos are service marks of RITM, LLC", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_RSG_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "ASX_STO_2004.pdf", + "query": "How mush did the Moomba incident cost to Santos in 2004 ?", + "target_page": 12, + "target_passage": " the Moomba incident resulted in $17 million of one-off costs in 2004.", + "chunk_present": { + "presence": true, + "index": 3 + } + }, + "top_chunk": [ + { + "text": "PRODUCTION HAMPERED BY MOOMBA INCIDENT\n2004 production was lower due to the Moomba incident, which reduced production by 4.6 million\nboe. Field decline reduced production by a further 5.0 million boe.\nOffsetting these factors, Santos' growth projects are starting to come on line and have begun to reverse the decline experienced over the past three years. Two projects were commissioned in 2004: the Bayu-Undan liquids project and the Minerva gas project. In addition, acquisitions contributed 0.8 million boe to production.\nFor 2005, production is expected to improve by around 15%, or 4% excluding the impact of the Moomba incident. Santos now expects production to be around 54 million boe in 2005. This increase is largely driven by the commissioning of Mutineer-Exeter in March 2005 and the John Brookes gas field in the middle of the year.", + "page_start": 11, + "page_end": 11, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "CASH FLOW LOWER\nWhile Santos had a strong profit year, this is not fully reflected in cash flows.\nThere were large movements in trade debtors between years, reflecting the timing of liftings and the payments for them.\nIn addition, Santos has not yet been paid for the insurance claim relating to the Moomba incident. A total of $117 million was recognised in sundry income, which represents an estimate of the amount receivable from insurers for lost revenue, additional costs and replacement plant and equipment. At year end the money was still owed and so is not shown as part of operating cash flow. The final quantification of the claim with insurers is progressing.", + "page_start": 12, + "page_end": 12, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "2004 WAS A YEAR OF GOOD OPERATING RESULTS\nOverall the increase in 2004 profit of 16% reflected a year of sound operating performance. Sales revenue was a record $1,501 million, up 2.5% on 2003, reflecting higher prices across most products and was achieved despite lower production as a result of the Moomba incident and declining output from late life fields.\nSantos benefited from higher world oil prices and realised US$51.83 per boe in 2004, an increase of 19% over 2003. The benefit of higher world oil prices substantially offset the impact of lower production volumes.\nSantos was also able to negotiate higher domestic gas prices (up 4% on average) and deliver new revenue streams from project start-ups and acquisitions during the year.", + "page_start": 11, + "page_end": 11, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "PRODUCTION AND SALES REVENUE\nto effectively control its costs in the face of significant external pressures in the form of rising services and materials prices.\nExamining production costs in detail reveals:\n· the start-up of Bayu-Undan and acquisitions added $16 million to Santos' cost base\n· changes in our accounting added a further $16 million to Santos' production costs\n· higher insurance premiums ($8 million) and one-off stock write-offs ($5 million) were offset by $17 million in cost savings largely as a result of Santos' continuous improvement initiatives\n· the Moomba incident resulted in $17 million of one-off costs in 2004.\nPiecing this together, the key themes in our financial performance were:\n· cost savings in established production areas more than offset increases in the price of services and materials\n· Santos' cost base rose as production from new developments and acquisitions were added to the Company's expanding portfolio of producing assets.", + "page_start": 11, + "page_end": 11, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "2004 PRODUCTION IMPACTED BY MOOMBA INCIDENT\nSantos' total production in 2004 fell from 54.2 million boe in 2003 to 47.1 million boe, primarily due to the effects of the 1 January incident at Moomba that resulted in a reduction of 4.6 million boe, together with declining performance from the East Spar and Stag fields in the Carnarvon Basin, offshore Western Australia.\nSales gas and ethane production fell 14% during the year from 222.8 PJ to 190.5 PJ. Production declined in the Cooper Basin and gas production from the onshore Otway Basin ceased with the divestment of these interests. However, gas production was steady or increased in four of five other areas of operation. This illustrates the success of Santos' continued efforts to diversify its base business and to optimise existing production.\nLower Cooper Basin gas production was partly offset by higher gas production from eastern Queensland through appraisal and development success at Churchie, new interests in Indonesia at Kakap and Brantas\nAnnual Report 2004\nand increased interests at Patricia-Baleen. Amadeus Basin gas production remained flat as declining production was countered by successful development drilling during the second half of 2004 at Palm Valley and Mereenie.\nCrude oil production was 13% lower at 9.5 million barrels, down from 10.9 million barrels in the previous year as production declined at Stag, Legendre and Jabiru-Challis. Successful infill drilling at Legendre and Stag helped turn around declines for these fields during the second half of 2004. The program to improve production at Stag will continue into 2005 as simulation studies suggest further drilling and increased water injection could improve future production.\nCooper Basin oil production declined just 4% during 2004 due to successful delineation, development and production optimisation at several fields, particularly Merrimelia, Derrilyn and Mulberry. Amadeus Basin oil production declines were made less severe through successful drilling at Mereenie.\nCondensate production increased by 20% from 3.1 million barrels to 3.7 million barrels as BayuUndan liquids production commenced with better than expected performance during 2004, offsetting the lower condensate production from the Cooper Basin due to the Moomba incident and decline at East Spar as the field approached the end of its production life.\nCondensate production from the United States was also improved by almost 0.1 million barrels as successful development and", + "page_start": 13, + "page_end": 13, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "PRODUCTION COSTS UNDER CONTROL\nProduction costs in 2004 were $309 million, up $45 million or 17% on 2003. Analysis shows that Santos was able to continue", + "page_start": 11, + "page_end": 11, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "NOTES TO THE FINANCIAL STATEMENTS\n(4.5). (Profit)/loss on disposal of controlled entities, Santos Ltd.2004 $million = -. (Profit)/loss on disposal of controlled entities, Santos Ltd.2003 $million = 1.0. (b)Individually significant expenses/(gains) included in profit from, Consolidated.2004 $million = . (b)Individually significant expenses/(gains) included in profit from, Consolidated.2003 $million = . (b)Individually significant expenses/(gains) included in profit from, Santos Ltd.2004 $million = . (b)Individually significant expenses/(gains) included in profit from, Santos Ltd.2003 $million = . ordinary activities before income tax, Consolidated.2004 $million = . ordinary activities before income tax, Consolidated.2003 $million = . ordinary activities before income tax, Santos Ltd.2004 $million = . ordinary activities before income tax, Santos Ltd.2003 $million = . Insurance recovery, Consolidated.2004 $million = (116.6). Insurance recovery, Consolidated.2003 $million = -. Insurance recovery, Santos Ltd.2004 $million = (73.8). Insurance recovery, Santos Ltd.2003 $million = -. Costs associated with Moomba liquids recovery plant fire included in cost of sales, Consolidated.2004 $million = 17.5. Costs associated with Moomba liquids recovery plant fire included in cost of sales, Consolidated.2003 $million = -. Costs associated with Moomba liquids recovery plant fire included in cost of sales, Santos Ltd.2004 $million = 11.9. Costs associated with Moomba liquids recovery plant fire included in cost of sales, Santos Ltd.2003 $million = -. Profit on sale of oil and gas assets, Consolidated.2004 $million = (43.9). Profit on sale of oil and gas assets, Consolidated.2003 $million = -. Profit on sale of oil and gas assets, Santos Ltd.2004 $million = (298.4). Profit on sale of oil and gas assets, Santos Ltd.2003 $million = -. Write-down of exploration and development expenditure, Consolidated.2004 $million = 22.1. Write-down of exploration and development expenditure, Consolidated.2003 $million = 59.7. Write-down of exploration and development expenditure, Santos Ltd.2004 $million = 4.6. Write-down of exploration and development expenditure, Santos Ltd.2003 $million = 6.1. Organisation restructure costs included in", + "page_start": 58, + "page_end": 58, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "A STRONG FINANCIAL PERFORMANCE\nIt was pleasing that Santos was able to conclude 2004 on a higher note than it started.\nWe achieved record annual revenue thanks to higher oil and gas prices combined with the return of full production at Moomba to produce a 21.5% jump in second half sales: the best result for any six-month period in Santos' history.\nThe average realised price for crude oil was up nearly 19% to A$51.83 per barrel.\nThese results have left Santos well positioned to continue its strong investment program which saw capital expenditure peak at $930 million in 2004.\nIn 2005 we expect to invest around $850 million of new capital in projects and our strategy is to plan for firm developments based on affordability at relatively low oil prices. If higher prices continue and some projects mature quickly and can be given the green light, our overall capital expenditure may be higher.\nProduction is expected to rise in 2005 when, as usual, our financial performance will be subject to oil prices, exchange rates and interest rates. These factors have a significant effect on our bottom line. A US$1 per barrel change in the oil price equates to a A$16 million change in net profit after tax in 2005.\nA one US cent movement in the Australia-US dollar exchange rate would produce a change in profit after tax of A$8 million, and a 1% change in interest rates equates to a change in net profit after tax of A$9 million.\n2004 has also been an important period for shareholders, with a significant improvement in the Santos share price combined with an increase in the dividend.", + "page_start": 6, + "page_end": 6, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "(c) Medium-term notes\nThe Santos Group has a A$500.0 million (2003: A$500.0 million) Australian medium-term note program. At 31 December 2004, A$20.0 million (2003: A$20.0 million) of medium-term notes have been issued at fixed rate and swapped into floating rates of interest of 6.25% (2003: 6.20%), maturing in 2008.", + "page_start": 62, + "page_end": 62, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "10 YEAR SUMMARY 1995-2004\nto the shareholders of Santos Ltd, 2004 = 379.9. Financial position ($million), 1995 = . Financial position ($million), 1996 = . Financial position ($million), 1997 = . Financial position ($million), 1998 = . Financial position ($million), 1999 = . Financial position ($million), 2000 = . Financial position ($million), 2001 = . Financial position ($million), 2002 = . Financial position ($million), 2003 = . Financial position ($million), 2004 = . Total assets, 1995 = 2,915.5. Total assets, 1996 = 3,443.4. Total assets, 1997 = 4,036.2. Total assets, 1998 = 4,236.1. Total assets, 1999 = 4,338.7. Total assets, 2000 = 4,659.8. Total assets, 2001 = 5,048.7. Total assets, 2002 = 5,320.8. Total assets, 2003 = 5,218.3. Total assets, 2004 = 5,956.0. Net debt, 1995 = 642.0. Net debt, 1996 = 938.6. Net debt, 1997 = 1,114.2. Net debt, 1998 = 1,280.0. Net debt, 1999 = 1,301.1. Net debt, 2000 = 866.6. Net debt, 2001 = 1,060.8. Net debt, 2002 = 1,162.9. Net debt, 2003 = 897.6. Net debt, 2004 = 1,131.4. Total equity, 1995 = 1,519.3. Total equity, 1996 = 1,586.3. Total equity, 1997 = 1,919.0. Total equity, 1998 = 1,939.2. Total equity, 1999 = 2,056.7. Total equity, 2000 = 2,310.9. Total equity, 2001 = 2,726.6. Total equity, 2002 = 2,863.9. Total equity, 2003 = 3,087.9. Total equity, 2004 = 3,498.3. Reserves and production (mmboe), 1995 = . Reserves and production (mmboe), 1996 = . Reserves and production (mmboe), 1997 = . Reserves and production (mmboe), 1998 = . Reserves and", + "page_start": 45, + "page_end": 45, + "source_file": "ASX_STO_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "ASX_STO_2004.pdf", + "query": "What is the main focus of the Santos 2005 program ?", + "target_page": 19, + "target_passage": " Oil is the main focus of the 2005 program", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "HIGH IMPACT DRILLING IN 2005\nThe 2005 exploration program has the highest resource potential of any program undertaken at Santos.\nSantos is planning a large, high impact drilling campaign that is already well underway.\nSantos plans to drill 25 wells and will invest $150 million testing prospects within its expanding domestic and international exploration portfolio - up 19% from the $126 million spent on exploration in 2004.\nOil is the main focus of the 2005 program with most activity in the Kutei and East Java Basins offshore Indonesia, the Gulf of\nSuez in Egypt, the Bonaparte Basin in the Timor Sea and the Carnarvon Basin offshore Western Australia.\nThe 2005 program reflects the increasing materiality of Santos' exploration portfolio and continues the emphasis on more globally-focused exploration as an important part of the Company's growth strategy.\nSantos has already had drilling success early in 2005 with the Hiu Aman 1 well - the first to be drilled by Santos in the Donggala PSC. Hiu Aman 1 has indicated the presence of a prolific hydrocarbon system in this area. The discovery should add other lower risk prospects to Santos'", + "page_start": 18, + "page_end": 18, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "BRUCE WOOD\nVice President Strategic Projects\nAnnual Report 2004\nSantos' Strategic Projects team focuses on assets that have proven difficult to commercialise or that need to be considered in a regional context rather than on an individual basis.\nThe other key activity for this team has been to lead Santos' continuous improvement focus.", + "page_start": 23, + "page_end": 23, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "DELIVERING ON THE STRATEGY\nin each of the four previous years. On a grossed up basis, this represents a yield of over 5%.\nIn response to increasing interest and enquiry from shareholders, the Dividend Reinvestment Plan has been reintroduced and applied to the final dividend paid during March 2005.\nSantos continued its proactive approach to capital management with the redemption and buyback of the outstanding Preference Shares and the issue of FUELS (Franked Unsecured Equity Listed Securities). This initiative was driven by the alignment of Australian accounting standards with international requirements, and closed oversubscribed, raising $600 million in new equity.\nThe total shareholder return for the year, including share price appreciation and dividends paid, was 28% - an excellent result.\nIn addition to our focus on shareholder value, Santos takes its corporate social responsibilities seriously and is committed to sustainability as a core value in all operations. The Company's first Sustainability Review was released during the year.\nSantos continues to be recognised for the high quality of its corporate governance, receiving a measure of five out of five for corporate governance for the third successive year in an independent report prepared by leading accounting and management firm, Horwath, and the University of Newcastle.\nThe safety of our employees and contractors is the highest priority for the Board and I'm pleased that Santos has delivered another\nyear of safety improvement with an 11% reduction in the 2004 total recordable case frequency rate.\nMr Frank Conroy retired from the Board of Directors during December 2004. A member of the Board for five years, Mr Conroy brought extensive business and corporate experience to the Board and I thank him for his outstanding contribution.\nIn February 2005 we appointed two new Board members, Mr Kenneth Dean from Shell, and Mr Christopher Recny from the international management consultancy firm, L.E.K. These individuals further strengthen the composition of the Board, bringing strong international oil and gas expertise and outstanding management experience.\nFinally, I'd like to acknowledge the extraordinary effort made by everyone at Santos to keep the Company moving forward during this challenging year.\nI am confident that the significant achievements made during 2004 provide Santos with a solid platform from which to achieve future growth with increased value for our shareholders.\nStephen Gerlach\nChairman\n21 March 2005", + "page_start": 3, + "page_end": 3, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "RECORD EXPLORATION EFFORT AHEAD\nExploration is a great way to increase shareholder value so I am pleased to be able to report that in 2004, Santos drilled 16 wildcat wells resulting in seven hydrocarbon discoveries.\nGrowing our oil and gas reserves for future production is the goal of our exploration efforts. On a rolling three-year average we have replaced the hydrocarbons that Santos has produced at a rate of 130% of Proven (1P) reserves, at an average replacement cost of around US$7 per boe.\nSantos has an exciting exploration program for 2005: one that I believe holds the highest resource potential of any program in the Company's 50-year history.\nWe expect to participate in drilling a record 157 wells during 2005, of which 25 are exploration wildcat wells. Consistent with the growing internationalisation of Santos, this includes eight wells in Indonesia and six wells in the Gulf of Suez, Egypt. This program offers an attractive combination of risk and reward and is a new focus to our overseas exploration effort.\nIn the US, two exploration wells are planned, one onshore, and one offshore in the shallow waters of the Gulf of Mexico.\nIn Australia, our increasing focus on the potential of offshore areas will see Santos drill three wells off Western Australia in 2005, one off southern Australia and two wells off northern Australia. We will also drill two wells onshore in Queensland and one onshore in Victoria.\nThe discovery of oil and gas at Hiu Aman in the Kutei Basin, offshore East Kalimantan, has provided a strong start to our 2005 exploration program and we look forward with anticipation to further work on that significant find. Santos has a 50% interest in the discovery. We believe this region of Indonesia is very promising and Santos expects to drill four wells in the Kutei Basin in 2005.", + "page_start": 6, + "page_end": 6, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "POSITIONING THE WORKFORCE FOR THE FUTURE\nSantos commenced a major company-wide transformational change program in late 2003. The program was designed to significantly improve Santos' performance in four areas: key business processes, financial performance, organisation structure and company culture.\nReorganising and simplifying the Company's structure was one of the major outcomes and in May 2004 Santos began operating under a new functionally-based organisation structure.\nThe new structure is designed to support the explorationfocused growth strategy. It mirrors the 'conveyor belt' lifecycle of an exploration and production company where exploration success leads to commercialisation and development activity and finally revenue-generating production.\nIt also follows the principle that the majority of employees should\nSantos is investing in the future of Australia's petroleum industry through the funding of the Australian School of Petroleum at the University of Adelaide.\nbe working in business operations with a lean and efficient corporate and services group.\nWith the exception of a small number of project teams, all non-award based positions in the Company were declared vacant and a selection process commenced around a set of criteria designed to ensure that people with the right skills and the ability to successfully grow Santos were appointed. As is often the case with transformational change initiatives, not everyone was re-appointed and, as a result, the workforce was reduced by 9%.", + "page_start": 27, + "page_end": 28, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "ADDING MATERIAL PROSPECTS\nSantos is now in a position that exploration success in 2004 and good acreage management has created future options that will ultimately translate into greater value for the business in 2005 and beyond.\nThis has been achieved by focusing on 'basin excellence'. This means becoming a technical leader in basins, within our focus areas, entering early where possible to keep entry costs down, balancing the commercial and the technical risks and selecting the right co-venturers.", + "page_start": 17, + "page_end": 17, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "HARNESSING VALUE FROM OPERATIONS\nThe Santos base business comprises production from assets in all of the Company's existing producing fields.\nSantos is countering decline from mature fields with strategies such as optimisation and trialling new technologies to maximise output, while running an exploration program which aims to add new projects and production.\nAt all times, ensuring the safety of all operations and minimising any environmental impacts remains paramount.", + "page_start": 13, + "page_end": 13, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "PAPUA NEW GUINEA GAS\nSantos is in active discussions with the PNG Gas Project participants to potentially re-enter the PNG Gas Project. Santos has a significant interest in a large part of the liquids-rich Hides gas field which is integral to the development of the Project.\n2004 CONTINGENT RESOURCES (TOTAL 1,443 mmboe)\nNorthern Australia 709 mmboe\nWestern Australia\n71 mmboe\nCentral Australia 240 mmboe\nSouthern Australia 32 mmboe\nPapua New Guinea 391 mmboe", + "page_start": 23, + "page_end": 23, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "DELIVERING THE VISION\nSo, 50 years on, would the late John Bonython be pleased at the Company that Santos has become - one of Australia's leading energy suppliers that is an offshore production operator, building new businesses in places like Indonesia, the US and Egypt, while retaining firm roots in Adelaide? I suspect he would.\nIt is our job to continue to deliver on our strategy and, in doing so, keep delivering on the foresight of Santos' founders.\nOf course, this has to be achieved safely and with a view to the long term. In this regard, our people continue to deliver: safety performance improved again in 2004 and the publication of our first Sustainability Review demonstrates that we have adopted sustainability as a core value.\nI am proud of their commitment to Santos' success and I thank them for their efforts and achievements during a year of considerable challenges and change.\nJohn C Ellice-Flint\nManaging Director\n21 March 2005\n8", + "page_start": 8, + "page_end": 9, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "OFFSHORE 1P AND 2P RESERVES\nThe shift in Santos' focus since 2001 is evidenced by the reduction in onshore reserves and the corresponding increase in offshore reserves over time, as shown in the charts below. This trend can be expected to continue as the central Australian fields mature and new projects move through the development conveyor.", + "page_start": 25, + "page_end": 25, + "source_file": "ASX_STO_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed5.pdf", + "query": "What is the primary aim of the OSPRO cohort study ?", + "target_page": 2, + "target_passage": " The primary aim of the OSPRO cohort study was to de velop and validate review of systems (i.e. evidence of sys temic involvement) and yellow flag (i.e. pain-related psychological distress) screening tools for use in out patient orthopedic physical therapy settings", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "Dataset and patient population\nThis study used data from the Orthopedic Physical Therapy -Investigative Network ' s (OPT-IN) Optimal Screening for Prediction of Referral and Outcome (OSPRO) validation cohort study, a longitudinal prospective study of individuals with knee, shoulder, back or neck pain seeking Physical Therapy in the US. A convenience sample was recruited from December 2014 and December 2015 by participating OPT-IN clinics. The OPT-IN clinics that participated in data collection represented multiple geographic regions in the US including the Mideast, Southeast, Great Lakes, Rocky Mountain States and Far West, with an attempt to balance recruitment between urban and rural settings over the entire OPT-IN network. Physical therapists practicing in these clinics identified eligible participants at initial evaluation and directed them to a secure study website for the informed consent process and baseline self-report assessment. Eligibility criteria have been thoroughly reported elsewhere [19] and were intentionally broad to develop a cohort that was generalizable to those seeking physical therapy for common musculoskeletal conditions in the US. Participants completed follow-up self-reported assessments on the study website at 4 weeks, 6 months and 12 months. Participants were notified of a pending assessment by an email that directed them back to the study website to complete their follow-up assessment. For additional details of the dataset and cohort, readers are directed to the published cohort profile [19].", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed5.pdf" + }, + { + "text": "Dataset and patient population\nThe primary aim of the OSPRO cohort study was to develop and validate review of systems (i.e. evidence of systemic involvement) and yellow flag (i.e. pain-related psychological distress) screening tools for use in outpatient orthopedic physical therapy settings. These screening tools, once validated and refined for clinical decision making, may improve the value of care delivery by accurately identifying individuals who 1) are appropriate for referral to other providers for management of non-musculoskeletal symptoms, and/or 2) would benefit from enhanced, psychologically-informed physical therapy. Early identification of individuals most appropriate for these modified pathways of care has the potential to reduce wasteful downstream health care utilization, limit the risk of unwarranted and costly care escalation, and improve clinical outcomes. Results of the primary analyses examining the predictive ability of the OSPRO tools for pain, disability, health status, and comorbidity outcomes have been previously published [20]. Pre-planned secondary analyses included prediction of persistent pain state [21] and this current analysis predicting future healthcare utilization. All subjects consented to participation in the study and ethics approval was granted by the University of Florida Institutional Review Board.\nLentz et al. BMC Health Services Research (2018) 18:648\nPage 3 of 14", + "page_start": 1, + "page_end": 2, + "source_file": "pubmed5.pdf" + }, + { + "text": "Individual predictors of healthcare utilization\nTable 3 Baseline OSPRO questionnaire scores for the full cohort and for those with complete and incomplete follow-up\nOSPRO-ROS 10-item, Label = Mean ± SD. OSPRO-ROS 10-item, Full Cohort at baseline ( n =440) = 2.68 ± 2.38. OSPRO-ROS 10-item, Completed follow-up ( n =246) = 2.52 ± 2.24. OSPRO-ROS 10-item, Did not complete follow-up ( n = 194) = 2.89 ± 2.55. OSPRO-ROS 10-item, p -value a = 0.11. , Label = Median (min, max). , Full Cohort at baseline ( n =440) = 2 (0 - 10). , Completed follow-up ( n =246) = 2 (0 - 10). , Did not complete follow-up ( n = 194) = 2.5 (0 - 10). , p -value a = . OSPRO-ROS + 13 items, Label = Mean ± SD. OSPRO-ROS + 13 items, Full Cohort at baseline ( n =440) = 1.25 ± 1.80. OSPRO-ROS + 13 items, Completed follow-up ( n =246) = 1.14 ± 1.52. OSPRO-ROS + 13 items, Did not complete follow-up ( n = 194) = 1.38 ± 2.09. OSPRO-ROS + 13 items, p -value a = 0.17. , Label = Median (min, max). , Full Cohort at baseline ( n =440) = 1 (0 - 12). , Completed follow-up ( n =246) = 1 (0 - 7). , Did not complete follow-up ( n = 194) = 1 (0 - 12). , p -value a = . OSPRO-YF 10-item, Label = Mean ± SD. OSPRO-YF 10-item, Full Cohort at baseline ( n =440) = 17.43 ± 6.69. OSPRO-YF 10-item, Completed follow-up ( n =246) = 16.87 ± 6.46. OSPRO-YF 10-item, Did not complete follow-up ( n = 194) = 18.15 ± 6.91.", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed5.pdf" + }, + { + "text": "Abbreviations\nCCI: Charlson comorbidity index; OSPRO: Optimal Screening for Prediction of Referral and Outcome; OSPRO-ROS: Review of systems screening tool from OSPRO cohort study; OSPRO-YF: Pain-related psychological distress screening tool from OSPRO cohort study", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed5.pdf" + }, + { + "text": "Individual predictors of healthcare utilization\nTable 3 Baseline OSPRO questionnaire scores for the full cohort and for those with complete and incomplete follow-up\nOSPRO-YF 10-item, p -value a = 0.04. , Label = Median (min, max). , Full Cohort at baseline ( n =440) = 17 (4 - 47). , Completed follow-up ( n =246) = 16 (4 - 40). , Did not complete follow-up ( n = 194) = 17 (4 - 47). , p -value a = . OSPRO-YF + 7 items, Label = Mean ± SD. OSPRO-YF + 7 items, Full Cohort at baseline ( n =440) = 14.92 ± 5.51. OSPRO-YF + 7 items, Completed follow-up ( n =246) = 14.41 ± 4.93. OSPRO-YF + 7 items, Did not complete follow-up ( n = 194) = 15.57 ± 6.12. OSPRO-YF + 7 items, p -value a = 0.03. , Label = Median (min, max). , Full Cohort at baseline ( n =440) = 15 (3 - 34). , Completed follow-up ( n =246) = 14 (3 - 28). , Did not complete follow-up ( n = 194) = 16 (3 - 34). , p -value a = ", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed5.pdf" + }, + { + "text": "Discussion\nIn future studies, we will embed the OSPRO tools into electronic medical record (EMR) databases to refine and test outcomes prediction models at the health care systems level. Importantly, we will collect clinical encounter data through the EMR and combine it with administrative or billing data to confirm the results of this study with more objective measures of health care use. These studies will also allow us to provide better guidance on how to use the OSPRO tools to identify serious psychiatric involvement or systemic sources of pain that require medical referral. Finally, we will explore alternative scoring strategies for the tools, such as weighted scoring for the OSPRO-ROS and use of predicted full-length psychological questionnaire scores for the OSPRO-YF. Healthcare providers could then use the collective information from these studies to build learning health systems that facilitate effective, real-time clinical decision-making support to improve value of care for patients with musculoskeletal pain.", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed5.pdf" + }, + { + "text": "Statistical analysis\nAll data analyses were preformed using SPSS Version 22.0 (IBM Corp., Armonk, NY). We developed models to separately predict over the course of the entire follow-up period: 1) the dichotomous outcome of no healthcare utilization versus any healthcare utilization and 2) the utilization of specific services. We decided to develop separate models since each outcome predicted by these models might have unique future policy implications. For instance, those who utilize no additional services might represent a ' low risk ' group for which physical therapy alone might be particularly appropriate. Predicting use of specific services would inform policy where reduction of specific services is a high priority, such as utilization of opioids or unnecessary use of emergency room services.\nAll prediction models used the following hierarchical design, which is similar to prior analyses in this cohort [20, 21]:\nBlock 1: age, sex, race, anatomical region of pain, insurance, chronicity of pain, surgery for current condition (yes/no), Charlson comorbidity index, baseline disability, baseline pain intensity.\nLentz et al. BMC Health Services Research (2018) 18:648\nPage 5 of 14\nBlock 2: 10-item OSPRO-YF and 10-item OSPRO-ROS at baseline.\nBlock 3: Remaining items from the OSPRO-YF (+ 7 items) and OSPRO-ROS (+ 13 items). These were included to determine whether full-length versions of the tools provided better prediction over shortened versions.\nBlock 4: Baseline-to-4 week change in pain intensity, region-specific disability, and OSPRO-YF scores. Early changes in these variables may be associated with improved prediction of outcomes over baseline variables alone [38]. This approach modeled change in these variables as a measure of treatment response and allowed us to assess the relative value of treatment monitoring for the prediction of healthcare utilization outcomes.", + "page_start": 3, + "page_end": 4, + "source_file": "pubmed5.pdf" + }, + { + "text": "Modelling methodology\nThis brief section outlines the modelling process behind the conclusion in section one, which states that we might expect somewhere between 2,400 and 7,000 individuals from the original cohort of users in 2004 to be captured within the 2013 figure of new DIP arrestees (who test positive for opiates-only or who are positive-for-both).\nWe begin by putting in a plausible range of crime-involved OCUs through the period. This combines the total OCU estimates published by Hay et al ., (ranging from around 320,000 OCUs down to around 295,000 in recent years) with available estimates of the percentage who are likely to be committing acquisitive crime. The latter was found to be almost exactly 50% in the NTORS study (Gossop et al ., 2003). As such, a range of between 170,000 and 100,000 crimeinvolved OCUs is likely to include all plausible values (see first row of table below).\nWe then calculate the rate at which that population is likely to be arrested and test positive by using the number of individuals testing positive from 2008 (25,433), when DIP was fully up and running. This gives the second row of the table. Combining the values in the first two rows and applying the probability formula given in the main body of the text gives the third row: the probability of first positive DIP test in 2013. Note that this assumes all these individuals continue to offend through the period, which may not be the case, hence final results are probably an upper bound. The final row simply multiples the figure in the first row by the figure in the third to give our estimate of the original cohort who might appear in the 2013 DIP figures as new.\nNew opiate and crack-cocaine users: characteristics and trends\n42", + "page_start": 41, + "page_end": 41, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "OSPRO Yellow Flag tool (OSPRO-YF)\nThe OSPRO-YF is a yellow flag assessment tool that includes items from pain vulnerability domains (negative affect and fear-avoidance) and pain resilience domains (positive affect and self-efficacy) to aid with identification of pain-related psychological distress in outpatient orthopedic physical therapy settings [37]. The OSPRO-YF has good concurrent validity with pain intensity and region-specific disability [37] and is capable of predicting pain intensity, disability, quality of life and persistent pain 12 months following physical therapy in patients with musculoskeletal pain [20, 21]. The full-length OSPRO-YF has 17-items, however a shortened 10-item version is also available with an acceptable trade-off in accuracy. Like the OSPRO-ROS, the OSPRO-YF is designed for implementation into electronic medical record (EMR) systems to quickly and accurately identify risk for a variety of clinical outcomes [19]. For statistical analyses, a summary score was derived for each version by adding the item responses after reverse-scoring items 2, 13, 14, 15 and 17 so that higher scores indicate higher pain-related psychological distress. The summary score was then included in each model as a continuous independent variable.", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed5.pdf" + }, + { + "text": "7.4.4 On the way to better evidence - major data, research gaps and open questions\n· The quality of statistics and surveys fades the more irregular are the working conditions being studied. Which research methods are adequate for a clearer and more reliable evidence base on these working conditions? It might require research methods different from those used today, for example, more investigative case studies; it might also be helpful to evaluate the existing national working conditions surveys or statistics under this aspect.\n· Fading employer-employee relations. There are special research efforts necessary to study the application of OSH regulations of work with weak or no employer-employee relations, for example, for the self-employed and new forms of employment.\n· Surveys usually suffer a participation bias, for example, for the migrant workforce. The low participation rate of migrants can contribute to a particular underestimation regarding their often unfavourable working conditions.\n· Workers in manual occupations report better health than administrative workers but less expectations to do the job until being 60 years old . What are the reasons behind this? Is it the healthy worker effect, strong occupation-related differences regarding the perception of health and the expression of health problems? 502,503\n· High work intensity is a major cause for low wellbeing and high psychosocial risks. Survey data suggest that work intensification stopped after 2005 . What might be the reasons? Are the current indicators not specific enough to measure developments of work intensity? Has since then the major burden of intensification been put on other types of workers, for example, subcontracted or self-employed, temporary and seasonal workers, or on workers in the global supply chain?\n· How much evidence is there that dangerous work has been increasingly contracted out to small and medium-size enterprises and the self-employed ? Are there sufficiently detailed data on whether a larger share of service and client-related work at atypical times or work requiring long working hours has been taken over by self-employed or subcontractors?\n· The influence of enterprise size is often difficult to explain. In several aspects, the SMEs perform better, and in other important aspects worse. What might be the reason for this?\n· How is it possible to overcome the 'prevention gap' that in general exists between mobile and stationary workplaces? Can the solutions be technical or must there be organisational and legal measures, for example, a limitation of the prolonged use of ergonomically inadequate equipment like mobile phones?", + "page_start": 139, + "page_end": 139, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed5.pdf", + "query": "What is the range of the pain rating scale ?", + "target_page": 3, + "target_passage": "Pain intensity was assessed by the numerical pain rating scale (NPRS) ranging from “0” (no pain) to “10” (worst pain imaginable)", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Pain intensity\nPain intensity was assessed by the numerical pain rating scale (NPRS) ranging from ' 0 ' (no pain) to ' 10 ' (worst\npain imaginable) [24 -26]. Participants rated their current pain intensity, as well as their best (lowest) and worst (highest) pain intensity over the past 24 h. Current, best and worst pain ratings were averaged for purposes of analysis.", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed5.pdf" + }, + { + "text": "Pain-related clinical variables\nPain status was determined using established definitions that account for the duration of pain and activity limitations [22, 23] using the following two questions: 1) ' How long have you been experiencing your current painful symptoms? ' and 2) ' Have you experienced ANY pain and activity limitations every day for the past 3 months? ' Responses to question 1 of ' greater than 90 days ' or responses to question 2 of ' Yes ' were used to classify patients as having persistent pain at initial evaluation.", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed5.pdf" + }, + { + "text": "References\n21. Beneciuk JM, Lentz TA, He Y, Wu SS, George SZ. Prediction of persistent musculoskeletal pain at 12 months: a secondary analysis of the Optimal Screening for Prediction of Referral and Outcome (OSPRO) validation cohort study. Phys Ther. 2018;98:290 -301.\n22. Freburger JK, Holmes GM, Agans RP, Jackman AM, Darter JD, Wallace AS, et al. The rising prevalence of chronic low back pain. Arch Intern Med. 2009; 169:251 -8.\n23. Carey TS, Freburger JK, Holmes GM, Jackman A, Knauer S, Wallace A, et al. Race, care seeking, and utilization for chronic back and neck pain: population perspectives. J Pain Off J Am Pain Soc. 2010;11:343 -50.\n24. Jensen MP, Turner JA, Romano JM, Fisher LD. Comparative reliability and validity of chronic pain intensity measures. Pain. 1999;83:157 -62.\n25. Bolton JE. Accuracy of recall of usual pain intensity in back pain patients. Pain. 1999;83:533 -9.\n26. Childs JD, Piva SR, Fritz JM. Responsiveness of the numeric pain rating scale in patients with low back pain. Spine. 2005;30:1331 -4.\n27. Vernon H. The neck disability index: state-of-the-art, 1991-2008. J Manip Physiol Ther. 2008;31:491 -502.\n28. Vernon H, Mior S. The neck disability index: a study of reliability and validity. J Manip Physiol Ther. 1991;14:409 -15.\n29. Hudson-Cook N, Tomes-Nicholson K, Breen A. A revised Oswestry disability questionnaire. In: Roland M, Jenner J, editors. Back pain: new approaches to rehabilitation and education. New York: Manchester University Press; 1989. p. 187 -204.\n30. Fritz JM, Irrgang JJ. A comparison of a modified Oswestry low back pain disability questionnaire and the Quebec back pain disability scale. Phys Ther. 2001;81:776 -88.", + "page_start": 13, + "page_end": 13, + "source_file": "pubmed5.pdf" + }, + { + "text": "Full multivariate model performance\nTable 2 Baseline health-related information for the full cohort, and for those with complete and incomplete follow-up\n(79.9%). , p -value = . Work-related injury (32 missing), Label = Yes. Work-related injury (32 missing), Full cohort at baseline ( n =440) = 63 (14.3%). Work-related injury (32 missing), Completed follow-up ( n =246) = 30 (12.2%). Work-related injury (32 missing), Did not complete follow-up ( n =194) = 33 (17.0%). Work-related injury (32 missing), p -value = 0.36. , Label = No. , Full cohort at baseline ( n =440) = 345 (78.4%). , Completed follow-up ( n =246) = 198 (80.5%). , Did not complete follow-up ( n =194) = 147 (75.8%). , p -value = . Chronicity, Label = Acute. Chronicity, Full cohort at baseline ( n =440) = 101 (23.0%). Chronicity, Completed follow-up ( n =246) = 65 (26.4%). Chronicity, Did not complete follow-up ( n =194) = 36 (18.6%). Chronicity, p -value = 0.05. , Label = Chronic. , Full cohort at baseline ( n =440) = 324 (73.6%). , Completed follow-up ( n =246) = 173 (70.3%). , Did not complete follow-up ( n =194) = 151 (77.8%). , p -value = . Pain Intensity, Label = Mean ± SD. Pain Intensity, Full cohort at baseline ( n =440) = 4.22 ± 1.98. Pain Intensity, Completed follow-up ( n =246) = 3.94 ± 1.72. Pain Intensity, Did not complete follow-up ( n =194) = 4.58 ± 2.21. Pain Intensity, p -value = 0.01. , Label = Median (min, max). , Full cohort at baseline ( n =440) = 4 (0 - 9.67). , Completed follow-up ( n =246) = 4", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed5.pdf" + }, + { + "text": "References\n1. Von Korff M, Scher AI, Helmick C, Carter-Pokras O, Dodick DW, Goulet J, et al. United states national pain strategy for population research: concepts, definitions, and pilot data. J Pain Off J Am Pain Soc. 2016;17:1068 -80.\n2. Clarke JL, Skoufalos A, Scranton R. The American opioid epidemic: population health implications and potential solutions. Report from the national stakeholder panel. Popul Health Manag. 2016;19 Suppl 1:S1 -10.\n3. Dowell D, Haegerich TM, Chou R. CDC guideline for prescribing opioids for chronic pain--United States, 2016. JAMA. 2016;315:1624 -45.\n4. Boyles R, Toy P, Mellon J, Hayes M, Hammer B. Effectiveness of manual physical therapy in the treatment of cervical radiculopathy: a systematic review. J Man Manip Ther. 2011;19:135 -42.\n5. Bürge E, Monnin D, Berchtold A, Allet L. Cost-effectiveness of physical therapy only and of usual care for various health conditions: systematic review. Phys Ther. 2016;96:774 -86.\n6. Deyle GD, Allison SC, Matekel RL, Ryder MG, Stang JM, Gohdes DD, et al. Physical therapy treatment effectiveness for osteoarthritis of the knee: a randomized comparison of supervised clinical exercise and manual therapy procedures versus a home exercise program. Phys Ther. 2005;85:1301 -17.\n7. Deyle GD, Henderson NE, Matekel RL, Ryder MG, Garber MB, Allison SC. Effectiveness of manual physical therapy and exercise in osteoarthritis of the knee. A randomized, controlled trial. Ann Intern Med. 2000;132:173 -81.\n8. Freburger JK, Carey TS, Holmes GM. Effectiveness of physical therapy for the management of chronic spine disorders: a propensity score approach. Phys Ther. 2006;86:381 -94.", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed5.pdf" + }, + { + "text": "Healthcare utilization predictors\nWe collected potential predictors by self-reported questionnaires at initial evaluation using an online study website. Participants were directed back to the study website 4 weeks following initial evaluation to again complete questions on pain intensity, disability, and pain-related psychological distress. Change in pain intensity, disability, and pain-related psychological distress from baseline to 4 weeks were modeled as treatment response variables and included as potential predictors.", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed5.pdf" + }, + { + "text": "References\n16. Langley P, Müller-Schwefe G, Nicolaou A, Liedgens H, Pergolizzi J, Varrassi G. The societal impact of pain in the European Union: health-related quality of life and healthcare resource utilization. J Med Econ. 2010;13:571 -81.\n17. Pérez C, Navarro A, Saldaña MT, Wilson K, Rejas J. Modeling the predictive value of pain intensity on costs and resources utilization in patients with peripheral neuropathic pain. Clin J Pain. 2015;31:273 -9.\n18. Hill JC, Fritz JM. Psychosocial influences on low back pain, disability, and response to treatment. Phys Ther. 2011;91:712 -21.\n19. George SZ, Beneciuk JM, Lentz TA, Wu SS. The Optimal Screening for Prediction of Referral and Outcome (OSPRO) in patients with musculoskeletal pain conditions: a longitudinal validation cohort from the USA. BMJ Open. 2017;7:e015188.\n20. George SZ, Beneciuk JM, Lentz TA, Wu SS, Dai Y, Bialosky JE, Zeppieri G Jr. Optimal Screening for Prediction of Referral and Outcome (OSPRO) for Musculoskeletal Pain Conditions: Results From the Validation Cohort. J Orthop Sports Phys Ther. 2018;48(6):460 -75.\nLentz et al. BMC Health Services Research (2018) 18:648\nPage 14 of 14", + "page_start": 12, + "page_end": 13, + "source_file": "pubmed5.pdf" + }, + { + "text": "Abstract\nBackground: In the United States, value-based purchasing has created the need for healthcare systems to prospectively identify patients at risk for high healthcare utilization beyond a physical therapy episode for musculoskeletal pain. The purpose of this study was to determine predictors of pain-related healthcare utilization subsequent to an index episode of physical therapy for musculoskeletal pain.\nMethods: This study assessed data from the Optimal Screening for Prediction of Referral and Outcome (OSPRO) longitudinal cohort study that recruited individuals with a primary complaint of neck, low back, knee or shoulder pain in physical therapy ( n = 440). Demographics, health-related information, review of systems, comorbidity and pain-related psychological distress measures were collected at baseline evaluation. Baseline to 4-week changes in pain intensity, disability, and pain-related psychological distress were measured as treatment response variables. At 6-months and 1-year after baseline evaluation, individuals reported use of opioids, injection, surgery, diagnostic tests or imaging, and emergency room visits for their pain condition over the follow-up period. Separate prediction models were developed for any subsequent care and service-specific utilization.\nResults: Subsequent pain-related healthcare utilization was reported by 43% ( n = 106) of the study sample that completed the 12-month follow-up ( n = 246). Baseline disability and 4-week change in pain intensity were important global predictors of subsequent healthcare utilization. Age, insurance status, comorbidity burden, baseline pain, and 4-week changes in pain intensity, disability and pain-related psychological distress predicted specific service utilization.\nConclusion: In those completing follow up measures, risk of additional pain-related healthcare utilization after physical therapy was best predicted by baseline characteristics and 4-week treatment response variables for pain intensity, disability and pain-related psychological distress. These findings suggest treatment monitoring of specific response variables could enhance identification of those at risk for future healthcare utilization in addition to baseline assessment. Further study is required to determine how specific characteristics of the clinical encounter influence future utilization.\nKeywords: Screening, Psychological distress, Multimorbidity, Value, Treatment monitoring", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed5.pdf" + }, + { + "text": "Emergency room\nModels for emergency room use had the highest pseudo-R 2 values of any individual service (0.48 -0.50), but also had the largest number of predictors (8 -9). Agreement between complete case and weighted models was moderate. The models converged on the following predictors: age (OR = 0.91 -0.94, p < 0.05), insurance (OR = 8.99 -13.15, p <0.05), baseline disability (OR = 3.33 -4.88, p < 0.001), and change in pain (OR = 1.59 -1.77, p < 0.05). Higher utilization was associated with younger age, other insurance (e.g., self-pay,\nWorker ' s Compensation, or other commercial insurance) compared to private insurance, higher baseline disability and worsening of pain. In the weighted analysis, subjects with knee pain were less likely to utilize the emergency room than those with low back pain. However, this relationship was not significant ( p = .06) in the complete case analysis. Of the significant predictors in both models, insurance status was the strongest individual predictor of subsequent emergency room use.", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed5.pdf" + }, + { + "text": "Discussion\nThis study identified novel predictors for pain-related utilization outcomes following an episode of physical therapy for a primary complaint of musculoskeletal pain. The most robust finding from these analyses was that baseline disability and change in pain intensity over the first 4 weeks following physical therapy evaluation were consistent predictors of subsequent pain-related healthcare utilization in those participants that completed all follow up. Aside from these robust predictors, other individual predictors of utilization were highly outcome-specific. High model specificity for utilization outcomes observed in this study is consistent with a recent systematic review that found similar levels of model specificity for more traditional outcomes like pain intensity, disability and work absenteeism [14]. Across models, health-related variables were generally stronger predictors than sociodemographic factors, which is also supported by prior research [15, 16]. Additionally, there were cases when prediction models were improved for specific services (e.g. surgery, use of opioids) when considering change in pain, disability or pain-related psychological distress. A notable finding is that the OSPRO-YF had the greatest utility when used to measure change in pain-related psychological distress. Current risk prediction paradigms in musculoskeletal pain consider only baseline pain-related psychological distress. However, these results underscore the importance of\nLentz et al. BMC Health Services Research (2018) 18:648\nPage 11 of 14\nroutine pain-related psychological distress monitoring throughout the early phases of rehabilitation especially if the goal is to identify risk for subsequent pain-related healthcare utilization. The implications of these collective findings are that treatment pathways may provide greater value by 1) addressing modifiable health-related variables like pain, disability and pain-related psychological distress, 2) routine monitoring of these health-related variables and 3) offering treatment alternatives that safely escalate care if needed while minimizing risk of harm and unhelpful utilization.", + "page_start": 9, + "page_end": 10, + "source_file": "pubmed5.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed5.pdf", + "query": "What are the health consequences of musculoskeletal pain ?", + "target_page": 1, + "target_passage": "Musculoskeletal pain is a prevalent and costly health condition with far-reaching public health consequences including chronic pain, disability and opioid-related ad diction [1].", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Background\nMusculoskeletal pain is a prevalent and costly health condition with far-reaching public health consequences including chronic pain, disability and opioid-related addiction [1]. Clinical practice guidelines now recommend non-pharmacological treatment as frontline management for musculoskeletal pain, which will lead\n* Correspondence: trevor.lentz@duke.edu\n1\nDuke Clinical Research Institute, Duke University, 2400 Pratt Street, Durham,\nNC 27705, USA\nFull list of author information is available at the end of the article\n© The Author(s). 2018 Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated.\nto increased utilization of services such as physical therapy [1 -3]. Physical therapy is effective for improving disability and reducing costs associated with many musculoskeletal pain conditions [4 -9]. However, pain-related healthcare utilization beyond the physical therapy episode (e.g. subsequent use of surgery, injection, opioids, etc.) may indicate suboptimal treatment response, the presence of more complex needs, or unwarranted escalation of care. Downstream healthcare utilization is not often considered as an outcome of care or indication of treatment effectiveness for musculoskeletal pain. But the importance of\nLentz et al. BMC Health Services Research (2018) 18:648\nPage 2 of 14", + "page_start": 0, + "page_end": 1, + "source_file": "pubmed5.pdf" + }, + { + "text": "Background\nThis study was undertaken in a nationwide, US cohort of patients receiving outpatient physical therapy for a primary complaint of knee, shoulder, back or neck pain. The primary aim of the analysis was to predict incidence of additional pain-related healthcare utilization in the year following the episode of physical therapy for musculoskeletal pain. We considered factors not commonly assessed in outcomes prediction for musculoskeletal pain, like insurance, comorbidities, and treatment response, as well as those more often associated with pain-related outcomes (e.g. psychological distress). This project will lead to the development of potentially novel outcome prediction models for this population in a common, non-pharmacological US healthcare setting. The results of this study will be particularly important in value-based payment settings where enhanced clinical decision-making drives treatment effectiveness and system efficiency.", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed5.pdf" + }, + { + "text": "Prediction of healthcare utilization following an episode of physical therapy for musculoskeletal pain\nTrevor A. Lentz 1* , Jason M. Beneciuk 2,3 and Steven Z. George 4", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed5.pdf" + }, + { + "text": "References\n16. Langley P, Müller-Schwefe G, Nicolaou A, Liedgens H, Pergolizzi J, Varrassi G. The societal impact of pain in the European Union: health-related quality of life and healthcare resource utilization. J Med Econ. 2010;13:571 -81.\n17. Pérez C, Navarro A, Saldaña MT, Wilson K, Rejas J. Modeling the predictive value of pain intensity on costs and resources utilization in patients with peripheral neuropathic pain. Clin J Pain. 2015;31:273 -9.\n18. Hill JC, Fritz JM. Psychosocial influences on low back pain, disability, and response to treatment. Phys Ther. 2011;91:712 -21.\n19. George SZ, Beneciuk JM, Lentz TA, Wu SS. The Optimal Screening for Prediction of Referral and Outcome (OSPRO) in patients with musculoskeletal pain conditions: a longitudinal validation cohort from the USA. BMJ Open. 2017;7:e015188.\n20. George SZ, Beneciuk JM, Lentz TA, Wu SS, Dai Y, Bialosky JE, Zeppieri G Jr. Optimal Screening for Prediction of Referral and Outcome (OSPRO) for Musculoskeletal Pain Conditions: Results From the Validation Cohort. J Orthop Sports Phys Ther. 2018;48(6):460 -75.\nLentz et al. BMC Health Services Research (2018) 18:648\nPage 14 of 14", + "page_start": 12, + "page_end": 13, + "source_file": "pubmed5.pdf" + }, + { + "text": "4.2 Trends in health outcomes\nSome professions and regular work tasks had and have very specific risks, for example, hearing disability through high noise levels, or musculoskeletal diseases caused by permanent repetition of a certain movement or posture, or specific cancers after exposure to carcinogenic chemical substances, infections in healthcare or work in laboratories, or allergies to natural substances in agriculture. Some examples are:", + "page_start": 73, + "page_end": 73, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "3.2 Physical health risks at work\nRisks at work that can result in physical harm can be divided into safety and health risks .\nThe main result of insufficient safety is a work accident. A work accident has as immediate consequences either a personal injury, a disease, or death of one or more workers. Eurostat distinguishes between non-fatal and fatal work accidents, and for the majority of sectors it provides also the duration of the absence due to the accident - an indicator for the severity of the injury. Non-fatal accidents at work can cause medium- or long-term health consequences, and in the worst case a permanent disability.\nILO Definition of accident: 'An occupational accident is an unexpected and unplanned occurrence, including acts of violence, arising out of or in connection with work, which results in one or more workers incurring a personal injury, disease or death.' 51\nPhysical health risks can be caused by a variety of circumstances and exposures or by inadequate ergonomics . Natural circumstances at work can pose such health risks, that is, temperature, storms and floods, unsafe terrain, biological agents and so on; or the risks are due to manmade circumstances, that is, work in buildings, on roofs and towers, on traffic routes, under artificial ventilation. Exposure is a general term to describe the interaction between environment / emissions / contaminants and the human organism. In a workplace context, 'exposure' mainly covers emissions from machinery or from tools and materials, for example, noise, vibration, dust, electromagnetic fields and chemical substances.\nRisks from inadequate ergonomics harm in particular the musculoskeletal system. Ergonomic risks of manual work are typically caused by repetitive hand and arm movements, tiring positions, for example, permanent kneeling or overhead work, lifting and moving of heavy loads, or of patients and so on. A certain ergonomic risk is physical inactivity , in practice sitting most of the working time. Not only administrative tasks but also many occupations in service or industry require permanent sitting, for example, drivers, cashiers, part assembly operators and so on (often called 'sedentary occupations').", + "page_start": 37, + "page_end": 37, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "4.2.3 Examples of specific prevalence estimates\nThe term 'Musculoskeletal diseases' covers the most common group of diseases (ICD 11-15 'Diseases of the musculoskeletal system or connected tissue'). 235 These diseases have the highest prevalence, approximately 60% of the EU working population report one or several MSDs. 236 MSDs that are caused or made worse by work can be defined as work-related MSDs. 237 Work-related MSDs arise from regular exposure to a certain posture or workload. It is a problem that affects all forms of working environments, from physically arduous work to low-intensity static work. 238\nMoreover, the prevalence of MSDs is not decreasing , as could be expected due to the sectoral shifts of workforce from industry and agriculture to services. The authors of the EU-OSHA study 'Work-related musculoskeletal disorders: why are they still so prevalent?' consider several reasons for this: the ergonomic burden shifted to other tasks, for example, handling of patients instead of handling of heavy loads, more inactivity with other musculoskeletal consequences, more time pressure, an ageing workforce, and inadequate work organisation and contractual arrangements. 239\nThe tremendous shift of workforce to administrative and often digitalised work contributes to an increase of the number of workers suffering from the consequences of physical inactivity due to permanent sedentary work , mostly with digital equipment. The figure below shows the spread of these diseases in different occupations. 240\nEuropean Agency for Safety and Health at Work - EU-OSHA\n87\nOccupational safety and health in Europe - state and trends 2023\nFigure 27: Prevalence of musculoskeletal diseases - EWCS 2015\nAbsence from work due to MSDs accounts for a high proportion of working days lost in EU Member States. In 2015, more than half (53%) of workers with MSDs (including those with other health problems) reported being absent from work during the past year, which is considerably higher than the proportion of workers without health problems (32%). Workers with MSDs are not only more likely to be absent from work, but (given absence) on average are also absent for a longer period. For example, 26% of workers with chronic MSDs and other health problems report being absent for more than eight days during the past year, which is considerably higher than the 7% for workers with no health problems. 241", + "page_start": 86, + "page_end": 87, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "Discussion\nThis study identified novel predictors for pain-related utilization outcomes following an episode of physical therapy for a primary complaint of musculoskeletal pain. The most robust finding from these analyses was that baseline disability and change in pain intensity over the first 4 weeks following physical therapy evaluation were consistent predictors of subsequent pain-related healthcare utilization in those participants that completed all follow up. Aside from these robust predictors, other individual predictors of utilization were highly outcome-specific. High model specificity for utilization outcomes observed in this study is consistent with a recent systematic review that found similar levels of model specificity for more traditional outcomes like pain intensity, disability and work absenteeism [14]. Across models, health-related variables were generally stronger predictors than sociodemographic factors, which is also supported by prior research [15, 16]. Additionally, there were cases when prediction models were improved for specific services (e.g. surgery, use of opioids) when considering change in pain, disability or pain-related psychological distress. A notable finding is that the OSPRO-YF had the greatest utility when used to measure change in pain-related psychological distress. Current risk prediction paradigms in musculoskeletal pain consider only baseline pain-related psychological distress. However, these results underscore the importance of\nLentz et al. BMC Health Services Research (2018) 18:648\nPage 11 of 14\nroutine pain-related psychological distress monitoring throughout the early phases of rehabilitation especially if the goal is to identify risk for subsequent pain-related healthcare utilization. The implications of these collective findings are that treatment pathways may provide greater value by 1) addressing modifiable health-related variables like pain, disability and pain-related psychological distress, 2) routine monitoring of these health-related variables and 3) offering treatment alternatives that safely escalate care if needed while minimizing risk of harm and unhelpful utilization.", + "page_start": 9, + "page_end": 10, + "source_file": "pubmed5.pdf" + }, + { + "text": "Discussion\nThe primary strength of the study is longitudinal follow-up at multiple time points following an episode of physical therapy for a variety of musculoskeletal pain conditions. Anatomical location of pain was not a significant predictor of healthcare use in all but one model, suggesting results are widely applicable across a spectrum of musculoskeletal pain conditions. Another strength of this cohort study is the assessment of various healthcare utilization outcomes of interest for establishing health policy. When considered alongside more traditional pain- or disability-related outcomes prediction models, these findings will improve the ability of healthcare systems and providers to make decisions in value-based purchasing environments. The consideration of multiple screening tools (i.e. yellow flags and review of systems) and treatment monitoring variables is also a strength of this study as screening and systematic treatment monitoring are not routine in clinical practice. A final strength is inclusion of multiple sociodemographic, health-related and psychosocial factors as potential predictors. Healthcare outcomes and utilization exhibit emergent properties that require the consideration of multiple, competing factors to fully explain [50].\nLentz et al. BMC Health Services Research (2018) 18:648\nPage 12 of 14\nHowever, explained variance estimates in our models ranged from 34 to 61%, suggesting further research is necessary to identify additional factors contributing to healthcare utilization following physical therapy.\nThe primary limitation of the study is the high number of subjects lost to follow-up. We attempted to account for the bias introduced by loss to follow-up in our models with IPAW, which is a robust strategy for conducting analyses with missing data [41, 51]. We observed good concordance between results of complete case and weighted analyses, giving us confidence in our findings. However, important differences in age, race, education, symptom onset, baseline pain intensity, and baseline pain-related psychological distress were noted between those who did and did not complete follow-up. These differences suggest that the group lost to follow-up may represent a unique population to whom these results may not apply. Different factors may predict utilization outcomes for this unique population. As a result, readers should exercise caution when extending these findings to individuals and populations that substantially differ from the analytic sample in this study. Specifically, these predictive models may need to be adjusted for younger individuals of non-white race, with lower education levels, sudden onset of symptoms, and those with higher pain intensity and pain-associated distress.", + "page_start": 10, + "page_end": 11, + "source_file": "pubmed5.pdf" + }, + { + "text": "Discussion\nOpioids and diagnostic tests and imaging were the two most common subsequent healthcare services utilized following physical therapy. Of the individuals that completed follow up and had any subsequent healthcare utilization, approximately 42% reported opioid use and 70% reported use of diagnostic tests and imaging. An important health-related predictor of these services was level of comorbidity burden. For those with high comorbidity burden and inadequate treatment response to physical therapy, use of additional diagnostic tests and imaging or low-dose opioids may be appropriate in some cases. But given the growing public health concern over opioid use and the desire to avoid unnecessary treatment driven by imaging, our results suggest the importance of considering disease burden when developing treatment pathways and healthcare policy to mitigate risk for avoidable use of these services. Interestingly, neither versions of the OSPRO-ROS predicted utilization outcomes even though it has been linked to mental health, comorbidity, and persistent pain state in other analyses [20, 21]. Systemic symptom burden is a measure of patient complexity that is related to but distinct from comorbidity burden [36, 47]. In these analyses, the chronic condition measure (i.e. the CCI) was a better predictor of utilization than symptom burden (i.e. OSPRO-ROS). The reasons for this finding are unclear but may be related to providers and patients being more likely to pursue follow-up medical care for musculoskeletal pain when known co-existing conditions are present as opposed to reporting of symptoms alone. The distinction between symptom and disease burden in defining musculoskeletal patient complexity, and its influence on clinical decision-making and outcomes, should be the subject of future research particularly related to aging populations [48].\nUtilization outcomes benchmarks have not been established to determine how the percentage of subsequent healthcare use in this study compares to outcomes using other health services. Prior studies suggest physical therapy is associated with reduced incidence of additional healthcare use compared to not using physical therapy in patients with acute low back pain [10, 49]. Some", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed5.pdf" + } + ] + }, + { + "references": { + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf", + "query": "What is Creative Commons ?", + "target_page": 2, + "target_passage": "Creative Commons (CC) is the global nonprofit organization behind the CC Licenses and public domain tools, which power open sharing on popular platforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "About Us\nCreative Commons (CC) is the global nonprofit organization behind the CC Licenses and public domain tools, which power open sharing on popular platforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. Since 2002, the CC Licenses have served as an alternative to traditional copyright, providing a simple, standardized, and legal way for individuals and institutions to freely share images, music, research, educational resources, and cultural artifacts.", + "page_start": 1, + "page_end": 1, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "What Is Creative Commons?\nCreative Commons is a global nonprofit organization dedicated to supporting an open and accessible Internet that is enriched with free knowledge and creative resources for people around the world to use, share, and cultivate.\nOur easy-to-use licenses provide a simple, standardized way to give the public permission to share and use your creative work - on conditions of your choice. CC licenses let you change your copyright terms from the default of 'all rights reserved' to 'some rights reserved.'\nMillions of people use CC licenses on some of the world's most popular platforms for user-generated content. When you use a CC license to share your photos, videos, or blog, your creation joins a globally accessible pool of resources that includes the work of artists, educators, scientists, and governments.\nCreative Commons has waived all copyright and related or neighboring rights to this guide using the CC0 Public Domain Dedication.\nPublic domain works are valuable because anyone can freely build upon, enhance, and reuse them for any purposes without restriction under copyright or database law.\nThat's why it's important for creators to have a clear and legally robust way to place their works in the public domain as completely as possible, and it's also important for publishers and archives to have a standardized way to identify works that are already in the public domain.\nCreative Commons supports two distinct public domain tools, the CC0 Public Domain Dedication and the Public Domain Mark . Creative Commons copyright licenses help authors manage their copyright on terms they choose. Conversely, CC0 enables authors and copyright owners who want to dedicate their works to the worldwide public domain to do so, and PDM facilitates the labeling and discovery of works that are already free of known copyright restrictions.", + "page_start": 0, + "page_end": 0, + "source_file": "Publicdomain.pdf" + }, + { + "text": "Creative Commons makes sharing easy", + "page_start": 0, + "page_end": 0, + "source_file": "Publicdomain.pdf" + }, + { + "text": "THREE-LAYER DESIGN\nCreative Commons (CC) license has three layers:\n\"Legal Code\" (base layer): contains terms and conditions to be used by lawyers and legally applicable in court.\n\"Human Readable\" (commons deeds): contain the summary of the legal code and key terms.\n\"Machine Readable\": contains HTML or codes for machines to recognize a work is available under a Creative Commons license.", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "A Note from Leadership\nCC staff photos are licensed under CC BY 4.0.\n2023 was a busy year at Creative Commons. Our Open Culture program and Open Climate Campaign entered their third and second years, respectively. We hosted our first in-person CC Global Summit since 2019 in Mexico City. We held critical consultations and open panels on AI, copyright, and the CC Licenses, cultural heritage, education, and science; and we launched our Open Infrastructure Circle in an effort to ensure the CC Licenses are funded well into the future.\nWe also marked transitions in leadership. At the end of December, Catherine Stihler concluded her time as Chief Executive Officer (CEO) at Creative Commons, and I transitioned in as Interim. In March 2024, I was appointed CC's permanent CEO. I look forward to working closely with our Board of Directors, staff, and larger community on the critical work that awaits us in 2024 .", + "page_start": 2, + "page_end": 2, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "NOW, SHARE YOUR WORK!\nhttps://creativecommons.org/choose/\nTexts are adapted from CC Certification for Educators. CC BY license.\nBY, SA, NC, ND icons, CC BY, CC BY-SA, CC BY-NC, CC BY-NC-SA, CC BY-ND, and CC BY-NC-ND buttons are trademark of Creative Commons, and subject to their policies. 3-layer design of CC license image is taken from CC Certification for Educators. CC BY license. Line, icons, and gradients are from Canva, and subject to their policies.\nBY\nSA\nND\nNC", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "Creative Commons\nPO Box 1866 Mountain View CA 94042 USA +1 415 429 6753 info@creativecommons.org", + "page_start": 11, + "page_end": 11, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "SIX LICENSES\nCC BY (\"Attribution\") allows people to use the work for any purpose (even commercially and even in modified form) as long as they give attribution to the creator.\nCC BY-SA (\"Attribution-ShareAlike\") allows people to use the work for any purpose (even commercially and even in modified form), as long as they give attribution to the creator and make any adaptations they share with others available under the same or a compatible license.\nCC BY-NC (\"Attribution-NonCommercial\") allows people to use the work for noncommercial purposes only, and only as long as they give attribution to the creator.\nCC BY-NC-SA (\"Attribution-NonCommercial-ShareAlike\") allows people to use the work for noncommercial purposes only, and only as long as they give attribution to the creator and make any adaptations they share with others available under the same or a compatible license.\nCC BY-ND (\"Attribution-NoDerivative\") allows people to use the unadapted work for any purpose (even commercially), as long as they give attribution to the creator.\nCC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the unadapted work for noncommercial purposes only, and only as long as they give attribution to the licensor.", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "Permissively licensed works\nThere are books that have been permissively licensed in an easily identifiable way, such as works placed under Creative Commons (CC) licenses. Such works explicitly allow particular uses of works subject to various responsibilities (e.g., requiring attribution by the user in their follow-on use).\nWhile such works could be candidates for inclusion in a books data commons, their inclusion depends on whether the license's terms can be complied with in the context of AI training. For instance, in the context of CC licensed works, there are requirements for proper attribution across all licenses (the CC tools Public Domain Dedication (CC0) and Public Domain Mark (PDM) are not licenses and do not require attribution). 18", + "page_start": 9, + "page_end": 9, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "FOUR ELEMENTS\nBY (\"Attribution\"): users must credit the author of the work they are using.\nSA (\"ShareAlike\"): adaptations based on this work must be licensed under the same license.\nNC (\"NonCommercial\"): the work is only available to be used for noncommercial purposes.\nND (\"NoDerivative\"): reusers making cannot share adaptations of the work.", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + } + ] + }, + { + "references": { + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf", + "query": "When was the first CC licence created?", + "target_page": 4, + "target_passage": "The first CC License was created in 2002.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Anna Tumadóttir, CEO\nThe first CC License was created in 2002. Today, we boast six CC Licenses and two public domain tools, setting a global standard for sharing.", + "page_start": 3, + "page_end": 3, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "We've estimated that over 2.5 billion pieces of content were CC Licensed by the end of 2023.\n\"The great growling engine of change - technology. Alvin Toffler\" by katerha is licensed under CC BY 2.0.\nOur legal and technology staff continued to make key infrastructure updates and manage daily maintenance to ensure these Licenses work for everyone.", + "page_start": 3, + "page_end": 3, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "Training in how to use CC Licenses is key to their adoption.\nWe offer a ten-week CC Certificate program that is now tailored not only to the education and library sectors, but also galleries, archives, libraries, and museums and available in 10 languages .\nAs of 2023, we've certified:\n1,705 Graduates\n65 Countries", + "page_start": 4, + "page_end": 4, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "About Us\nCreative Commons (CC) is the global nonprofit organization behind the CC Licenses and public domain tools, which power open sharing on popular platforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. Since 2002, the CC Licenses have served as an alternative to traditional copyright, providing a simple, standardized, and legal way for individuals and institutions to freely share images, music, research, educational resources, and cultural artifacts.", + "page_start": 1, + "page_end": 1, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "12 CC Legal Open Office Hours\nhosted by our legal team, providing a personalized opportunity for the CC community to ask questions about CC Licenses, open access, and sharing.\nOver 300 attendees from 45 countries joined us this past October in Mexico City for the first in-person CC Global Summit since 2019. The theme was AI & the Commons with over 60 sessions and 180 speakers. Learn more here.\nThank you to our sponsors: John D. and Catherine T. MacArthur Foundation, Microsoft Corporation, Filecoin Foundation for the Decentralized Web, Akin, Anthropic, Mozilla Foundation, The Michelson 20MM Foundation, MHz Curationist, Frontiers Media, Arnold & Porter, and Crowell & Moring.\nC C p h o t o s a r e l i c e n s e d u n d e r C C B Y 4 . 0 .", + "page_start": 4, + "page_end": 5, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "THREE-LAYER DESIGN\nCreative Commons (CC) license has three layers:\n\"Legal Code\" (base layer): contains terms and conditions to be used by lawyers and legally applicable in court.\n\"Human Readable\" (commons deeds): contain the summary of the legal code and key terms.\n\"Machine Readable\": contains HTML or codes for machines to recognize a work is available under a Creative Commons license.", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "A Note from Leadership\nCC staff photos are licensed under CC BY 4.0.\n2023 was a busy year at Creative Commons. Our Open Culture program and Open Climate Campaign entered their third and second years, respectively. We hosted our first in-person CC Global Summit since 2019 in Mexico City. We held critical consultations and open panels on AI, copyright, and the CC Licenses, cultural heritage, education, and science; and we launched our Open Infrastructure Circle in an effort to ensure the CC Licenses are funded well into the future.\nWe also marked transitions in leadership. At the end of December, Catherine Stihler concluded her time as Chief Executive Officer (CEO) at Creative Commons, and I transitioned in as Interim. In March 2024, I was appointed CC's permanent CEO. I look forward to working closely with our Board of Directors, staff, and larger community on the critical work that awaits us in 2024 .", + "page_start": 2, + "page_end": 2, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "REMIND THAT…\nCC license only applicable to the work that is within the scope of copyright law. CC license can be used when …\nyou want to give others permissions to freely copy and redistribute your work, and\nyou want to give others permission to freely transform, alter, or otherwise create derivative works based on your work.", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "Licence Renewals\nThe CRTC considers group-based (conventional and discretionary specialty) licence renewal applications for major media companies. The Rogers group includes the City and OMNI conventional television stations and specialty channels G4 Canada, Outdoor Life Network, The Biography Channel (Canada) and FX (Canada).\nIn July 2011, the CRTC renewed the group's licence for three years, expiring on August 31, 2014. The terms of the renewal recognize the group's differences from the three other large English-language Canadian broadcast groups (Bell Media, Corus Entertainment and Shaw Media).", + "page_start": 73, + "page_end": 73, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Open Education\nWe delivered workshops and presentations on CC Licenses and Open Educational Resources at over 16 conferences and events. The CC Open Education Platform also funded six global projects, including work to advance the UNESCO Recommendation on OER.\n\"Follow the Color Brick Road\" by Bert Kaufmann is licensed under CC BY-SA 2.0.", + "page_start": 6, + "page_end": 6, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + } + ] + }, + { + "references": { + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf", + "query": "To what subjects Creative Commons expand its work in 2023 ?", + "target_page": 8, + "target_passage": "We expanded our work in biodiversity, climate, and life sciences focused on ensuring that science research and data are open", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Open Culture\n2023 was quite a year for the CC Open Culture Program, thanks to generous funding from Arcadia . We grew our Open Culture team from one to two and a half staff, rolling out new initiatives like TAROC (Towards a Recommendation on Open Culture) and Open Culture Live: A Webinar Series . We invite you to read ' What did Creative Commons do for Open Culture in 2023? ' to learn more.", + "page_start": 6, + "page_end": 6, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "A Note from Leadership\nCC staff photos are licensed under CC BY 4.0.\n2023 was a busy year at Creative Commons. Our Open Culture program and Open Climate Campaign entered their third and second years, respectively. We hosted our first in-person CC Global Summit since 2019 in Mexico City. We held critical consultations and open panels on AI, copyright, and the CC Licenses, cultural heritage, education, and science; and we launched our Open Infrastructure Circle in an effort to ensure the CC Licenses are funded well into the future.\nWe also marked transitions in leadership. At the end of December, Catherine Stihler concluded her time as Chief Executive Officer (CEO) at Creative Commons, and I transitioned in as Interim. In March 2024, I was appointed CC's permanent CEO. I look forward to working closely with our Board of Directors, staff, and larger community on the critical work that awaits us in 2024 .", + "page_start": 2, + "page_end": 2, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "About Us\nCreative Commons (CC) is the global nonprofit organization behind the CC Licenses and public domain tools, which power open sharing on popular platforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. Since 2002, the CC Licenses have served as an alternative to traditional copyright, providing a simple, standardized, and legal way for individuals and institutions to freely share images, music, research, educational resources, and cultural artifacts.", + "page_start": 1, + "page_end": 1, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "Creative Commons makes sharing easy", + "page_start": 0, + "page_end": 0, + "source_file": "Publicdomain.pdf" + }, + { + "text": "Support for Creators in the Time of Artificial Intelligence\nIn 2023, we convened hundreds via roundtables, community conferences (e.g. MozFest , Wikimania ), and public events (e.g. symposium on Generative AI & Creativity )to debate copyright law, the ethics of open sharing, and other relevant areas that touch AI.\nAt our CC Global Summit, participants drafted community-driven principles on AI that are a valuable input and will help inform the organization's thinking as we determine CC's exact role in the AI space.\n'The Pillars of Creation' by James Webb Space Telescope is licensed under CC BY 2.0.\n\"bird flock in vedanthangal\" by VinothChandar is licensed under CC BY 2.0.", + "page_start": 8, + "page_end": 9, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "What Is Creative Commons?\nCreative Commons is a global nonprofit organization dedicated to supporting an open and accessible Internet that is enriched with free knowledge and creative resources for people around the world to use, share, and cultivate.\nOur easy-to-use licenses provide a simple, standardized way to give the public permission to share and use your creative work - on conditions of your choice. CC licenses let you change your copyright terms from the default of 'all rights reserved' to 'some rights reserved.'\nMillions of people use CC licenses on some of the world's most popular platforms for user-generated content. When you use a CC license to share your photos, videos, or blog, your creation joins a globally accessible pool of resources that includes the work of artists, educators, scientists, and governments.\nCreative Commons has waived all copyright and related or neighboring rights to this guide using the CC0 Public Domain Dedication.\nPublic domain works are valuable because anyone can freely build upon, enhance, and reuse them for any purposes without restriction under copyright or database law.\nThat's why it's important for creators to have a clear and legally robust way to place their works in the public domain as completely as possible, and it's also important for publishers and archives to have a standardized way to identify works that are already in the public domain.\nCreative Commons supports two distinct public domain tools, the CC0 Public Domain Dedication and the Public Domain Mark . Creative Commons copyright licenses help authors manage their copyright on terms they choose. Conversely, CC0 enables authors and copyright owners who want to dedicate their works to the worldwide public domain to do so, and PDM facilitates the labeling and discovery of works that are already free of known copyright restrictions.", + "page_start": 0, + "page_end": 0, + "source_file": "Publicdomain.pdf" + }, + { + "text": "We've estimated that over 2.5 billion pieces of content were CC Licensed by the end of 2023.\n\"The great growling engine of change - technology. Alvin Toffler\" by katerha is licensed under CC BY 2.0.\nOur legal and technology staff continued to make key infrastructure updates and manage daily maintenance to ensure these Licenses work for everyone.", + "page_start": 3, + "page_end": 3, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "Reliance on Copyright Limitations and Exceptions\nSee Articles 3 and 4 of the EU's Directive on Copyright and Related Rights in the Digital Single Market 20 - https://eur-lex.europa.eu/eli/dir/2019/790/oj.\nJapan clarified its laws in 2018 to make clear that this type of use is permitted - see discussion in 21 Testimony of Matthew Sag, July 2023, https://www.judiciary.senate.gov/imo/media/doc/ 2023-07-12_pm_-_testimony_-_sag.pdf, see also Fiil-Flynn, S. et al. (2022) Legal reform to enhance global text and Data Mining Research , Science . Available at: https://www.science.org/doi/10.1126/ science.add6124 (Accessed: 28 Sept. 2023).\nSee supra note 22 . See also Jonathan Band, Copyright Implications of the Relationship between 22 Generative Artificial Intelligence and Text and Data Mining | Infojustice . infojustice.org/archives/45509. In addition, for an in-depth look at the cross-border legal challenges involved see: Wrapping up Our NEHFunded Project to Help Text and Data Mining Researchers Navigate Cross-Border Legal and Ethical Issues . 2 Oct. 2023, buildinglltdm.org/2023/10/02/wrapping-up-our-neh-funded-project-to-help-text-anddata-mining-researchers-navigate-cross-border-legal-and-ethical-issues/. Accessed 20 Mar. 2024.\nTowards a Books Data Commons for AI Training\n10\nIt is also important to note two other issues that can affect the application of limitations and exceptions, in particular, their application to e-books.", + "page_start": 10, + "page_end": 11, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "WIKIMEDIA FOUNDATION, INC.\nConsolidated Statements of Activities\nYears ended June 30, 2024 and 2023", + "page_start": 5, + "page_end": 5, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "Open Climate Data Project\nIn 2023, with support from the Patrick J. McGovern Foundation , we launched a new project to help open up access to large climate datasets. We successfully conducted a landscape analysis of 30 major global sources of climate data and published our ' Recommendations for Better Sharing of Climate Data .'", + "page_start": 7, + "page_end": 7, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + } + ] + }, + { + "references": { + "source_file": "TSX_KMP_2013.pdf", + "query": "From which country does Killam Properties Inc originate ?", + "target_page": 3, + "target_passage": "Killam Properties Inc. is a growth oriented Canadian real estate company.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "about Killam properties inc.\nKillam Properties Inc. is a growth oriented Canadian real estate company. We own, manage and develop multi-family residential properties in Atlantic Canada and Ontario. Since our /first acquisition in 2002, our real estate portfolio has grown to $1.5 billion and includes 12,647 apartment units and 5,164 manufactured home community (MHC) sites. We are committed to growing Killam's earnings by maximizing the returns from our existing portfolio and expanding through acquisitions and development.", + "page_start": 2, + "page_end": 2, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "1. Corporate Information\nKillam Properties Inc ('Killam' or the 'Company') is a real estate company specializing in the acquisition, management and development of multi-residential apartment buildings and manufactured home communities in Canada. Killam is incorporated under the Canada Business Corporations Act. Killam's common shares are publicly traded and listed on the Toronto Stock Exchange under the symbol 'KMP'. The consolidated financial statements comprise the financial statements of Killam and its subsidiaries as at December 31, 2013 . the company's head office operations are located at 3700 Kempt Road, Halifax, Nova Scotia, B3K 4X8 and the Company's registered office is located at 2571 Windsor Street, Halifax, Nova Scotia, B3K 5C4.\nThe consolidated financial statements of the Company for the year ended December 31, 2013, were authorized for issue in accordance with a resolution of the Board of Directors on Tuesday, February 18, 2014.", + "page_start": 69, + "page_end": 69, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "Business Overview\nKillam Properties Inc., based in Halifax, Nova Scotia, is one of Canada's largest residential landlords, owning, operating, managing and developing multi-family residential and Manufactured Home Community ('MHC') properties. Killam's 164 apartment properties are located in Atlantic Canada's six largest urban centres and in Ontario. The Company's 35 MHCs are located in Ontario and Atlantic Canada. The value of Killam's real estate assets at December 31, 2013, was $1.5 billion. Killam is focused on growing its portfolio, maximizing the value of its properties and increasing FFo per share.\nKillam was founded in 2000, based on the recognition of an opportunity to create value through the consolidation of apartments in Atlantic Canada and MHCs across Canada. Killam's first apartment was purchased in 2002 and its first MHC was purchased in 2003. From 2002 to 2009, Killam's apartment portfolio grew through the acquisition of properties in Atlantic Canada's six largest cities, namely Halifax, Moncton, Saint John, Fredericton, St. John's and Charlottetown. Killam is now Atlantic Canada's largest residential landlord, with a 14.2% market share of the multi-family rental units in these core markets. Killam entered the Ontario apartment market in 2010, and today owns twelve properties in the province, including assets in Toronto, Ottawa, London and Cambridge. Killam plans to expand its presence in Ontario with additional acquisitions and developments. The apartment business is Killam's largest business segment, accounting for 86% of the Company's NOI from property operations and equity income in 2013. At December 31, 2013, Killam's apartment portfolio consisted of 12,647 units.\nKillam complements its acquisition program with the construction of apartment buildings. During 2013, Killam completed the development of four projects totalling 282 units and commenced two additional projects in the second half of the year. Management does not expect developments to exceed 5% of the total asset base in any given year.", + "page_start": 22, + "page_end": 22, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "Growth through Acquisitions\nKillam is expanding its portfolio by acquiring newer, centrally located buildings and is focused on Ontario. During 2013 Killam completed $121.1 million in acquisitions, including properties in Toronto, Ottawa, Moncton and Prince Edward Island.", + "page_start": 28, + "page_end": 28, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "Expanding Ownership in Ontario\nKillam's apartment portfolio includes 1,359 apartment units in Ontario, up from 225 units three years ago, and includes properties in Ottawa, Toronto, London and Cambridge. In addition to apartments, 42% of Killam's MHC sites are located in Ontario. Killam is focused on increasing its geographic diversification by acquiring more properties in Ontario.", + "page_start": 32, + "page_end": 32, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "a Diversi/fied portfolio\nKillam has a diverse portfolio of both apartments and manufactured home communities. The apartment portfolio represents 86% of Killam's earnings and includes a variety of property types, such as high-rises, mid-rises and walk-ups, in nine urban centres across /five provinces. With a wide selection of properties and price points in each city, Killam caters to a broad tenant base. Killam's 35 manufactured home communities represent 14% of earnings and are located primarily in Nova Scotia and Ontario. The manufactured home communities complement the apartment business, providing stable and predictable cash /flows.", + "page_start": 12, + "page_end": 12, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "Business Overview\nIn addition, the Company owns MHCs, also known as land-lease communities or trailer parks. Killam owns the land and infrastructure supporting each community and leases the lots to tenants, who own their own homes and pay Killam a monthly site rent. Killam owns 35 communities which accounted for 14% of Killam's NOI in 2013. During the year Killam sold ten MHC properties located in New Brunswick, allowing the Company to crystallize the value of the properties at attractive cap-rates and use the funds to continue to grow the apartment portfolio.", + "page_start": 22, + "page_end": 22, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "Acquisition Activity With a Focus in Ontario and Two New Developments Underway\nThe Company expects to purchase a minimum of $75 million in assets in 2014. The concentration of acquisition activity is expected to take place in Ontario, in-line with the Company's long-term strategic goal of increasing NOI generated from outside of Atlantic Canada to 50%. Killam also has two new development projects underway, including a two building 101-unit complex located in St. John's, expected to be completed in Q3 2014, and one located in Cambridge, with the first phase of 122 units expected to be completed in the first half of 2015.", + "page_start": 27, + "page_end": 27, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "Growth through Development\nKillam enhances its portfolio growth opportunities by developing properties. Killam started apartment developments in 2010 and has completed five properties to-date, including four in 2013. Building new properties directly allows Killam to control the quality and features of the buildings, maximizes the use of excess land and eliminates the seller's profit, generating higher returns than through acquisitions. Management expects to limit development projects to approximately 5% of the balance sheet on an annual basis.", + "page_start": 28, + "page_end": 28, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "Continued Geographic Expansion in Ontario\nKillam acquired two buildings in Ontario during 2013 including a 102-unit building located in Ottawa for $10.4 million as well as a newly constructed, 8-storey, mixed-use complex containing 21,242 square feet of street level retail (TD Bank, Shoppers Drug Mart and Tim Hortons) and 179 apartment units in downtown Toronto for $40.0 million. With the completion of these two acquisitions, Killam's future NOI generated from its Ontario properties is expected to increase to 15.0% from 7.5%.", + "page_start": 25, + "page_end": 25, + "source_file": "TSX_KMP_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "TSX_KMP_2013.pdf", + "query": "How Killam Properties Inc does increase its geographic diversification ? ", + "target_page": 5, + "target_passage": "We are increasing our geographic diversification by expanding our apartment ownership outside Atlantic Canada. ", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Geographic Diversi/fication is a Priority\nGeographic diversi/fication is a priority for Killam. Our asset base in Atlantic Canada is the foundation of the Company; however, with Atlantic Canada representing only 5% of the Canadian rental market, our growth opportunities increase signi/ficantly by expanding our target markets outside of this region. With its strong operating platform, Killam can support a larger and more geographically diverse portfolio. We are actively growing a portfolio of apartments in Ontario in three target markets: Ottawa, the Greater Toronto Area, and Southwestern Ontario. An increased investment outside Atlantic Canada will increase not only Killam's growth potential, it will also expand the Company's diversi/fication and exposure to higher growth markets.\nAcquisitions in Ontario represented 45% of acquisitions in 2013. In addition to 1,359 apartment units in the province, we also have 2,144 manufactured home community sites, representing 29% of the MHC NOI last year. Based on our current portfolio, 15% of Killam's 2014 NOI will be generated in Ontario, compared to our longer-term goal of generating 50% of NOI outside Atlantic Canada. We expect to reach this goal by focusing acquisition activity in Ontario, with the majority of future investment anticipated in the province over the next few years. We will look for additional development opportunities in Ontario and we are exploring opportunities in Western Canada, attracted by the strong population growth trends in Alberta's urban markets.\nI would like to thank all Killam employees for their contributions and commitment over the last year and our board of directors for their governance. Also, I would like to thank you, our shareholders, for your continued investment in Killam. I invite you to attend the Company's annual meeting on May 7, 2014 at 2:00 pm Atlantic Time at the Halifax Marriott Harbourfront Hotel, either in person or via webcast.\nYours truly,\nPhilip Fraser\nKillam ProPerties inc | 2013 11\nportfolio Facts 12,647 Apartment Units\n164 Apartment Properties\n35 Manufactured Home Communities\n35 % Value of Apartment Portfolio Built Since 2000\n$ 915 Average Apartment Rent\n$ 222 Average MHC Rent", + "page_start": 10, + "page_end": 11, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "increasing Geographic Diversi/fication\nWith a home base in Halifax, Killam's roots are in atlantic canada and the company has successfully grown by consolidating the residential real estate market in the region's urban centres. in order to meet its long-term growth targets and increase its investment in canada's most dynamic real estate markets, Killam has been actively expanding its apartment portfolio in ontario and is exploring investment opportunities in Western canada. since 2010, Killam has expanded its apartment target markets to include speci/fic cities in ontario, and has invested approximately $200 million in real estate assets in the province. approximately 15% of Killam's 2014 net operating income is expected to be earned in ontario. the company has set a long-term target to earn 50% of its net operating income outside atlantic canada.\n1033 Queen street West, toronto, ontario", + "page_start": 16, + "page_end": 16, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "Geographic Diversification\nGeographic diversification in the apartment segment is a priority for Killam. With a 14.2% market share in its core markets in Atlantic Canada, Killam is the region's largest residential landlord. The maximum market share Management foresees Killam reaching in Atlantic Canada is between 15%-18%. With Atlantic Canada representing only 4.9% of the Canadian rental market, Killam's growth opportunities increase significantly when considering assets outside Atlantic Canada.\nWith its strong operating platform, Killam can support a larger and more geographically diverse portfolio. The Company is actively building a portfolio in targeted Ontario markets, including Ottawa, the Greater Toronto Area, and Southwestern Ontario. An increased investment in Ontario, and potentially Western Canada, will increase the Company's diversification and exposure in high growth centres in Canada. Based on the Company's portfolio at year-end, 15% of Killam's 2014 NOI will be generated in Ontario. Management has set a long-term target of growing the amount of NOI generated outside of Atlantic Canada to 50%.\nIn 2013, Killam sold a portfolio of ten MHCs in New Brunswick that allowed Killam to crystallize the increased value of this portfolio at attractive cap-rates. This creates moderate short-term dilution but it provides the Company with funds to continue its geographic diversification by accretively growing its apartment portfolio in Ontario.\nKillam ProPerties inc | 2013 29", + "page_start": 28, + "page_end": 28, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "about Killam properties inc.\nKillam Properties Inc. is a growth oriented Canadian real estate company. We own, manage and develop multi-family residential properties in Atlantic Canada and Ontario. Since our /first acquisition in 2002, our real estate portfolio has grown to $1.5 billion and includes 12,647 apartment units and 5,164 manufactured home community (MHC) sites. We are committed to growing Killam's earnings by maximizing the returns from our existing portfolio and expanding through acquisitions and development.", + "page_start": 2, + "page_end": 2, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "Growth through Development\nKillam enhances its portfolio growth opportunities by developing properties. Killam started apartment developments in 2010 and has completed five properties to-date, including four in 2013. Building new properties directly allows Killam to control the quality and features of the buildings, maximizes the use of excess land and eliminates the seller's profit, generating higher returns than through acquisitions. Management expects to limit development projects to approximately 5% of the balance sheet on an annual basis.", + "page_start": 28, + "page_end": 28, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "Management's Discussion and Analysis\nDollar amounts are in thousands of Canadian dollars (except as noted)\nGeographic Diversification, 1 = . 2013 target, 1 = 2013 acquisition program to include investments in Ontario.. 2013 Performance, 1 = During 2013 Killam acquired Kristin Way, a 102-unit building located in Ottawa, and 1033 Queen Street West in Toronto. These acquisitions increased Killam's total unit count in Ontario to 1,359 units, representing 11% of the total apartment portfolio. Killam has continued to expand its operating platform in Ontario by adding property managers, dedicated leasing representatives and administrative staff to manage the growing portfolio.. Growth in Same Store Net Operating Income, 1 = . 2013 target, 1 = Same Store NOI growth of 0% to 1% (adjusted from 2% to 4% following Q2 2013).. 2013 Performance, 1 = consolidated same store noi decreased by 0.4% for the year ended December 31, 2013. this decrease was driven by an increase in natural gas prices in Atlantic Canada during the peak heating season in the first quarter as well as another spike in pricing in new Brunswick in December 2013. this resulted in a 14.6% increase in utility and fuel expenses compared to 2012 within the apartment portfolio. An increase in net property revenues, as well the management of other property operating expenses at levels consistent with 2012, helped to offset the impact of higher utility costs.. 2014 Targets, 1 = . Consolidation of Multi-family Residential Real Estate Market and Increase Investment New Properties Complete a minimum of $75 million in acquisitions and continue to develop two current projects on schedule and within 5% of budget., 1 = Consolidation of Multi-family Residential Real Estate Market and Increase Investment New Properties Complete a minimum of $75 million in acquisitions and continue to develop two current projects on schedule and within 5% of budget.. Geographic Diversification, 1 = Killam's 2014 acquisition program is to include over 50% of acquisitions outside of Atlantic Canada, with a focus on Ontario.. Growth in Same Store Net Operating Income, 1 = same store noi growth of 0% to 2%.\nKillam ProPerties inc | 2013 27\nDollar amounts are in thousands of Canadian dollars (except as noted)", + "page_start": 26, + "page_end": 27, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "Growth through Acquisitions\nKillam is expanding its portfolio by acquiring newer, centrally located buildings and is focused on Ontario. During 2013 Killam completed $121.1 million in acquisitions, including properties in Toronto, Ottawa, Moncton and Prince Edward Island.", + "page_start": 28, + "page_end": 28, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "Investing in newer properties\nWe are expanding our portfolio with a focus on acquiring newer properties and through development. We believe that newer buildings often generate higher total returns due to limited deferred maintenance requirements, lower operating costs and a preference for renters to live in newer buildings. With 35% of Killam's apartment portfolio constructed since the year 2000, Killam has one of the newest multi-family real estate portfolios in Canada.", + "page_start": 4, + "page_end": 4, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "opportunities for Growth\nKillam's growth opportunities include increasing earnings of its existing portfolio and expanding the portfolio through acquisitions and development. acquisitions have been an important part of Killam's growth, having completed over $1.1 billion in acquisitions since the /first property was acquired in 2002. Killam began development as a complement to its acquisition program in 2010, and to-date has invested approximately $90 million in new developments. 2013 was Killam's largest year for growth since 2005, adding $191 million of properties to the portfolio, including $121 million in acquisitions and $70 million in new developments. looking ahead to 2014, Killam has targeted a minimum of $75 million in acquisitions, and the development of two new apartment buildings totaling approximately $46 million.\n2013 acquisition & Development Facts\n$ 121 M\nAcquisitions Completed\n5.8 %\nAverage Acquisition Capitalization Rate\nApartment Units\n743 Acquired\n282\nNew Apartment Units Added from Completed Developments\n$ 7 M Land for Future\nInvested in Developments\nGeographic expansion Facts\n1,359 Apartment Units in Ontario\n42 % MHC Sites in Ontario\n20 %\nReal Estate Assets Located in Ontario\n50 % Target NOI to be Generated Outside Atlantic Canada\nCore Markets in Ontario include Ottawa, Toronto & Southwestern Ontario", + "page_start": 13, + "page_end": 15, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "Complementing Acquisitions with Developments\nDevelopment is an important component of Killam's future growth. We are gaining expertise as developers, resulting in both increased e/fficiencies and returns. We completed four new developments in 2013, representing an investment of $70 million. Two of the buildings leased-up within three months, and two are expected to be substantially leased by the middle of 2014. The slower than expected lease-up at S2 in Halifax is attributable to a higher than normal amount of new units coming to market in recent years, leading to increased competition at the high-end of the market. At The Plaza in\nFredericton, a soft home sales market is leading to longer than expected lease-up. We will realize the full /financial bene/fit from these buildings once they are fully occupied.\nWe currently have two new developments underway. Chelsea Place, a 101-unit, 2-building complex located in St. John's, is expected to be completed in the third quarter of 2014. Saginaw Gardens, a 122-unit building in Cambridge, on land acquired in January 2013, was started in December 2013 and will be completed in 2015. The total investment in the two developments is approximately $46 million, representing 3% of our balance sheet. We expect to limit our", + "page_start": 9, + "page_end": 9, + "source_file": "TSX_KMP_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "TSX_KMP_2013.pdf", + "query": "What is the Killam Properties Inc 2013 performance about the Geographic Diversification objective ?", + "target_page": 8, + "target_passage": "Target achieved. Killam acquired $55 million in Ontario real estate in 2013, representing 45% of its acquisition program in the year. Assets acquired included a 102-unit property in Ottawa, a newly built, 179-unit, mixed-used property in downtown Toronto and a 5.2 acre parcel of land for development in Cambridge, Ontario. ", + "chunk_present": { + "presence": true, + "index": 3 + } + }, + "top_chunk": [ + { + "text": "Performance Compared to 2013 Key Objectives\n2013 target, Consolidation of Multi-family Residential Real Estate Market = Complete approximately $75-$125 million in acquisitions.. 2013 Performance, Consolidation of Multi-family Residential Real Estate Market = Killam completed $121.1 million in acquisitions in 2013 which includes $112.8 million in apartment acquisitions, $1.4 million for 65 MHC sites and $6.9 million in vacant land for future developments.. Increase Investment in New Properties, Consolidation of Multi-family Residential Real Estate Market = Increase Investment in New Properties. 2013 target, Consolidation of Multi-family Residential Real Estate Market = Focus on newer properties as part of the acquisition program in 2013. Complete and lease-up Killam's four developments, and commence two new development projects.. 2013 Performance, Consolidation of Multi-family Residential Real Estate Market = During 2013 Killam acquired 552 units which were constructed after 2001, representing 74% of the total units added to the portfolio during the year. The acquisitions included three buildings constructed in 2013, an 83-unit luxury building in Halifax, a 48-unit building in Moncton, and a 179-unit building on Queen Street West in toronto.. , Consolidation of Multi-family Residential Real Estate Market = The Company also completed the construction of four development projects totaling 282 units during the first half of the year. These buildings were all ready for occupancy by the beginning of May 2013 with lease-up periods varying by project. Bennett House and Brighton House were fully leased within three months of opening while the S2 and The Plaza are currently 62% and 61% leased. Both properties are expected to be substantially leased by mid-2014.. , Consolidation of Multi-family Residential Real Estate Market = Killam commenced two new development projects during the year. Development started on a 101-unit project in St. John's in Q3-2013 and a 122-unit project in Cambridge broke ground in December 2013. Please refer to the Investment Properties Under Construction section of the MD&A on page 49 for further details on these projects.\n26\nKillam ProPerties inc | 2013", + "page_start": 25, + "page_end": 25, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "Management's Discussion and Analysis\nDollar amounts are in thousands of Canadian dollars (except as noted)\nGeographic Diversification, 1 = . 2013 target, 1 = 2013 acquisition program to include investments in Ontario.. 2013 Performance, 1 = During 2013 Killam acquired Kristin Way, a 102-unit building located in Ottawa, and 1033 Queen Street West in Toronto. These acquisitions increased Killam's total unit count in Ontario to 1,359 units, representing 11% of the total apartment portfolio. Killam has continued to expand its operating platform in Ontario by adding property managers, dedicated leasing representatives and administrative staff to manage the growing portfolio.. Growth in Same Store Net Operating Income, 1 = . 2013 target, 1 = Same Store NOI growth of 0% to 1% (adjusted from 2% to 4% following Q2 2013).. 2013 Performance, 1 = consolidated same store noi decreased by 0.4% for the year ended December 31, 2013. this decrease was driven by an increase in natural gas prices in Atlantic Canada during the peak heating season in the first quarter as well as another spike in pricing in new Brunswick in December 2013. this resulted in a 14.6% increase in utility and fuel expenses compared to 2012 within the apartment portfolio. An increase in net property revenues, as well the management of other property operating expenses at levels consistent with 2012, helped to offset the impact of higher utility costs.. 2014 Targets, 1 = . Consolidation of Multi-family Residential Real Estate Market and Increase Investment New Properties Complete a minimum of $75 million in acquisitions and continue to develop two current projects on schedule and within 5% of budget., 1 = Consolidation of Multi-family Residential Real Estate Market and Increase Investment New Properties Complete a minimum of $75 million in acquisitions and continue to develop two current projects on schedule and within 5% of budget.. Geographic Diversification, 1 = Killam's 2014 acquisition program is to include over 50% of acquisitions outside of Atlantic Canada, with a focus on Ontario.. Growth in Same Store Net Operating Income, 1 = same store noi growth of 0% to 2%.\nKillam ProPerties inc | 2013 27\nDollar amounts are in thousands of Canadian dollars (except as noted)", + "page_start": 26, + "page_end": 27, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "Geographic Diversi/fication is a Priority\nGeographic diversi/fication is a priority for Killam. Our asset base in Atlantic Canada is the foundation of the Company; however, with Atlantic Canada representing only 5% of the Canadian rental market, our growth opportunities increase signi/ficantly by expanding our target markets outside of this region. With its strong operating platform, Killam can support a larger and more geographically diverse portfolio. We are actively growing a portfolio of apartments in Ontario in three target markets: Ottawa, the Greater Toronto Area, and Southwestern Ontario. An increased investment outside Atlantic Canada will increase not only Killam's growth potential, it will also expand the Company's diversi/fication and exposure to higher growth markets.\nAcquisitions in Ontario represented 45% of acquisitions in 2013. In addition to 1,359 apartment units in the province, we also have 2,144 manufactured home community sites, representing 29% of the MHC NOI last year. Based on our current portfolio, 15% of Killam's 2014 NOI will be generated in Ontario, compared to our longer-term goal of generating 50% of NOI outside Atlantic Canada. We expect to reach this goal by focusing acquisition activity in Ontario, with the majority of future investment anticipated in the province over the next few years. We will look for additional development opportunities in Ontario and we are exploring opportunities in Western Canada, attracted by the strong population growth trends in Alberta's urban markets.\nI would like to thank all Killam employees for their contributions and commitment over the last year and our board of directors for their governance. Also, I would like to thank you, our shareholders, for your continued investment in Killam. I invite you to attend the Company's annual meeting on May 7, 2014 at 2:00 pm Atlantic Time at the Halifax Marriott Harbourfront Hotel, either in person or via webcast.\nYours truly,\nPhilip Fraser\nKillam ProPerties inc | 2013 11\nportfolio Facts 12,647 Apartment Units\n164 Apartment Properties\n35 Manufactured Home Communities\n35 % Value of Apartment Portfolio Built Since 2000\n$ 915 Average Apartment Rent\n$ 222 Average MHC Rent", + "page_start": 10, + "page_end": 11, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "2013 performance summary\nConsolidation of the Multi-family Residential Real Estate Market, 2013 Target = To complete $75 million to $125 million in acquisitions.. Consolidation of the Multi-family Residential Real Estate Market, 2013 Performance = Target achieved. $121 million in acquisitions completed in 2013, including $113 million in apartment acquisitions, $7 million for three parcels of land for future development and $1 million for an MHC acquisition.. Increase Investment in New Properties, 2013 Target = Acquire new properties as part of the acquisition program in 2013.. Increase Investment in New Properties, 2013 Performance = Target achieved. During 2013, 74% of the total units added to the portfolio were constructed after 2001. These acquisitions included three buildings constructed in 2013, a 179-unit building on Queen Street West in Toronto, an 83-unit luxury building in Halifax, and a 48-unit building in Moncton.. , 2013 Target = Complete and lease- up Killam's four developments and commence two new development projects.. , 2013 Performance = Target partially achieved. The Company completed the construction of four development projects totaling 282 units during the /first half of 2013. Two of the properties, Bennett House and Brighton House, were fully leased within three months of opening, while S2 and The Plaza are expected to be substantially leased by the middle of 2014. Killam began two new developments during the second half of the year, a 101-unit building in St. John's, Newfoundland, and a 122-unit building in Cambridge, Ontario.. Geographic Diversi/fication, 2013 Target = 2013 acquisition program to include investments in Ontario.. Geographic Diversi/fication, 2013 Performance = Target achieved. Killam acquired $55 million in Ontario real estate in 2013, representing 45% of its acquisition program in the year. Assets acquired included a 102-unit property in Ottawa, a newly built, 179-unit, mixed-used property in downtown Toronto and a 5.2 acre parcel of land for development in Cambridge, Ontario.. Growth in Same Store Net Operating Income (NOI), 2013 Target = Same store NOI growth of 2% to 4% in 2013.. Growth in Same Store Net Operating Income (NOI), 2013 Performance = Target not achieved. Despite generating 1.8% growth in same store revenue, high natural gas prices in Atlantic Canada caused total same store utility and fuel expenses to increase 13.8% during the year, which resulted in a decrease in", + "page_start": 7, + "page_end": 7, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "Geographic Diversification\nGeographic diversification in the apartment segment is a priority for Killam. With a 14.2% market share in its core markets in Atlantic Canada, Killam is the region's largest residential landlord. The maximum market share Management foresees Killam reaching in Atlantic Canada is between 15%-18%. With Atlantic Canada representing only 4.9% of the Canadian rental market, Killam's growth opportunities increase significantly when considering assets outside Atlantic Canada.\nWith its strong operating platform, Killam can support a larger and more geographically diverse portfolio. The Company is actively building a portfolio in targeted Ontario markets, including Ottawa, the Greater Toronto Area, and Southwestern Ontario. An increased investment in Ontario, and potentially Western Canada, will increase the Company's diversification and exposure in high growth centres in Canada. Based on the Company's portfolio at year-end, 15% of Killam's 2014 NOI will be generated in Ontario. Management has set a long-term target of growing the amount of NOI generated outside of Atlantic Canada to 50%.\nIn 2013, Killam sold a portfolio of ten MHCs in New Brunswick that allowed Killam to crystallize the increased value of this portfolio at attractive cap-rates. This creates moderate short-term dilution but it provides the Company with funds to continue its geographic diversification by accretively growing its apartment portfolio in Ontario.\nKillam ProPerties inc | 2013 29", + "page_start": 28, + "page_end": 28, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "A Look Back at 2013\nI would summarize 2013 as a mixed year for Killam. We were successful in achieving many of the objectives and targets we had set for ourselves, as summarized in the adjacent chart, but faced challenges that impacted our /financial performance. We added $191 million in new assets to our portfolio through acquisitions and the completion of four new developments. We also enhanced our leasing and marketing programs, which allowed us to realize gains in occupancy in the second half of the year and improve our position for 2014. We further bene/fited from both interest and administrative cost savings in the year. These improvements were mitigated somewhat by large increases in natural gas costs in Atlantic Canada and a more competitive rental market in the Maritimes, which resulted in increased year-over-year vacancy. The challenges we faced in 2013 resulted in funds from operations (FFO) per share of $0.72, the same as Killam's 2012 FFO per share.", + "page_start": 8, + "page_end": 8, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "Acquisitions and Developments Drive Revenue Growth of 5.6%\nKillam completed $114.2 million in property acquisitions throughout 2013 and also completed $69.6 million of development projects in the first half of 2013, adding 1,025 apartment units and 65 MHC sites to the portfolio. $84.8 million of acquisitions completed throughout 2012 also contributed to revenue growth in 2013. This growth was partially offset by the disposition of ten MHC properties located in New Brunswick for proceeds of $69.0 million during the fourth quarter of 2013 and the disposition of twelve MHCs during 2012 for $72.9 million. The development projects completed in 2013 located in Halifax and Fredericton are expected to be substantially leased by mid-2014 and will generate additional revenue growth for the company in 2014.", + "page_start": 24, + "page_end": 24, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "about Killam properties inc.\nKillam Properties Inc. is a growth oriented Canadian real estate company. We own, manage and develop multi-family residential properties in Atlantic Canada and Ontario. Since our /first acquisition in 2002, our real estate portfolio has grown to $1.5 billion and includes 12,647 apartment units and 5,164 manufactured home community (MHC) sites. We are committed to growing Killam's earnings by maximizing the returns from our existing portfolio and expanding through acquisitions and development.", + "page_start": 2, + "page_end": 2, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "Complementing Acquisitions with Developments\nDevelopment is an important component of Killam's future growth. We are gaining expertise as developers, resulting in both increased e/fficiencies and returns. We completed four new developments in 2013, representing an investment of $70 million. Two of the buildings leased-up within three months, and two are expected to be substantially leased by the middle of 2014. The slower than expected lease-up at S2 in Halifax is attributable to a higher than normal amount of new units coming to market in recent years, leading to increased competition at the high-end of the market. At The Plaza in\nFredericton, a soft home sales market is leading to longer than expected lease-up. We will realize the full /financial bene/fit from these buildings once they are fully occupied.\nWe currently have two new developments underway. Chelsea Place, a 101-unit, 2-building complex located in St. John's, is expected to be completed in the third quarter of 2014. Saginaw Gardens, a 122-unit building in Cambridge, on land acquired in January 2013, was started in December 2013 and will be completed in 2015. The total investment in the two developments is approximately $46 million, representing 3% of our balance sheet. We expect to limit our", + "page_start": 9, + "page_end": 9, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "Consolidated Results\nchange = (2.2)%. Operating margin, Non Same Store.2013 = 60.8%. Operating margin, Non Same Store.2012 = 63.5%. Operating margin, Non Same Store.% change = (4.3)%\nTotal property revenue for the year ended December 31, 2013, excluding the properties held through the Company's joint ventures, was $141.1 million, a 5.6% increase in revenue over the same periods in 2012. The growth was generated through revenue from acquisitions, developments and increased rental rates, partially offset by increased vacancy.\nKillam's total property operating expenses increased 9.2% for 2013 compared to 2012, decreasing the operating margins by 140 bps during the year. The overall decrease in the operating margin can be attributed to higher utility costs and new acquisitions and developments in the lease-up phase that were not yet stabilized during 2013. As well, 2013 had a higher percentage of apartment units versus MHC sites than 2012, which operate with a slightly lower margin.\nSame store property NOI reflects the 172 stabilized properties that Killam has owned for equivalent periods in 2013 and 2012. The same store analysis includes 15,848 units and sites, or 89% of Killam's portfolio. Home sales are excluded from the analysis. Same store properties realized net revenue growth of 1.8% in 2013. This growth was offset by a 5.0% increase in same store expenses. The main driver of the increased property expenses was higher utility costs, generating a decrease in NOI of 40 bps compared to 2012. These variances are discussed in more detail in the Apartment and MHC results sections of the MD&A.\nNon same store property NOI consists of properties acquired in both 2012 and 2013, MHC properties sold in Q2 2012 and Q4 2013, completed development projects, other non-stabilized properties and adjustments to normalize for non-operational revenue or expense items. Details of properties acquired in 2013 are found on page 48.", + "page_start": 34, + "page_end": 34, + "source_file": "TSX_KMP_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv2_taclccby4_license.pdf", + "query": "What is the conventional workflow for BERT ?", + "target_page": 1, + "target_passage": "The conventional workflow for BERT consists of two stages: pre-training and fine-tuning. ", + "chunk_present": { + "presence": true, + "index": 4 + } + }, + "top_chunk": [ + { + "text": "Anna Rumshisky\nDept. of Computer Science University of Massachusetts Lowell\narum@cs.uml.edu\nimprove BERT's architecture, pre-training and finetuning. We conclude by discussing the issue of overparameterization, the approaches to compressing BERT, and the nascent area of pruning as a model analysis technique.", + "page_start": 0, + "page_end": 0, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "Abstract\nTransformer-based models have pushed state of the art in many areas of NLP, but our understanding of what is behind their success is still limited. This paper is the first survey of over 150 studies of the popular BERT model. We review the current state of knowledge about how BERT works, what kind of information it learns and how it is represented, common modifications to its training objectives and architecture, the overparameterization issue and approaches to compression. We then outline directions for future research.", + "page_start": 0, + "page_end": 0, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "ABSTRACT\nThe past 3 years of work in NLP have been characterized by the development and deployment of ever larger language models, especially for English. BERT, its variants, GPT-2/3, and others, most recently Switch-C, have pushed the boundaries of the possible both through architectural innovations and through sheer size. Using these pretrained models and the methodology of fine-tuning them for specific tasks, researchers have extended the state of the art on a wide array of tasks as measured by leaderboards on specific benchmarks for English. In this paper, we take a step back and ask: How big is too big? What are the possible risks associated with this technology and what paths are available for mitigating those risks? We provide recommendations including weighing the environmental and financial costs first, investing resources into curating and carefully documenting datasets rather than ingesting everything on the web, carrying out pre-development exercises evaluating how the planned approach fits into research and development goals and supports stakeholder values, and encouraging research directions beyond ever larger language models.", + "page_start": 0, + "page_end": 0, + "source_file": "arxiv5_ccby4license.pdf" + }, + { + "text": "1 Introduction\nSince their introduction in 2017, Transformers (Vaswani et al., 2017) have taken NLP by storm, offering enhanced parallelization and better modeling of long-range dependencies. The best known Transformer-based model is BERT (Devlin et al., 2019); it obtained state-of-the-art results in numerous benchmarks and is still a must-have baseline.\nWhile it is clear that BERT works remarkably well, it is less clear why , which limits further hypothesis-driven improvement of the architecture. Unlike CNNs, the Transformers have little cognitive motivation, and the size of these models limits our ability to experiment with pre-training and perform ablation studies. This explains a large number of studies over the past year that attempted to understand the reasons behind BERT's performance.\nIn this paper, we provide an overview of what has been learned to date, highlighting the questions which are still unresolved. We first consider the linguistic aspects of it, i.e., the current evidence regarding the types of linguistic and world knowledge learned by BERT, as well as where and how this knowledge may be stored in the model. We then turn to the technical aspects of the model and provide an overview of the current proposals to", + "page_start": 0, + "page_end": 0, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "2 Overview of BERT architecture\nFundamentally, BERT is a stack of Transformer encoder layers (Vaswani et al., 2017) which consist of multiple self-attention \"heads\". For every input token in a sequence, each head computes key, value and query vectors, used to create a weighted representation. The outputs of all heads in the same layer are combined and run through a fully-connected layer. Each layer is wrapped with a skip connection and followed by layer normalization.\nThe conventional workflow for BERT consists of two stages: pre-training and fine-tuning. Pretraining uses two self-supervised tasks: masked language modeling (MLM, prediction of randomly masked input tokens) and next sentence prediction (NSP, predicting if two input sentences are adjacent to each other). In fine-tuning for downstream applications, one or more fully-connected layers are typically added on top of the final encoder layer.\nThe input representations are computed as follows: each word in the input is first tokenized into wordpieces (Wu et al., 2016), and then three embedding layers (token, position, and segment) are combined to obtain a fixed-length vector. Special token [CLS] is used for classification predictions, and [SEP] separates input segments.\nGoogle 1 and HuggingFace (Wolf et al., 2020) provide many variants of BERT, including the original \"base\" and \"large\" versions. They vary in the number of heads, layers, and hidden state size.\n1 https://github.com/\ngoogle-research/bert", + "page_start": 0, + "page_end": 0, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "References\nYang You, Jing Li, Sashank Reddi, Jonathan Hseu, Sanjiv Kumar, Srinadh Bhojanapalli, Xiaodan Song, James Demmel, and Cho-Jui Hsieh. 2019. Large Batch Optimization for Deep Learning: Training BERT in 76 Minutes. arXiv preprint arXiv:1904.00962 , 1(5).\nAli Hadi Zadeh and Andreas Moshovos. 2020. GOBO: Quantizing Attention-Based NLP Models for Low Latency and Energy Efficient Inference. arXiv:2005.03842 [cs, stat] .\nOfir Zafrir, Guy Boudoukh, Peter Izsak, and Moshe Wasserblat. 2019. Q8BERT: Quantized 8bit BERT. arXiv preprint arXiv:1910.06188 .\nRowan Zellers, Ari Holtzman, Yonatan Bisk, Ali Farhadi, and Yejin Choi. 2019. HellaSwag: Can a Machine Really Finish Your Sentence? In Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics , pages 4791-4800.\nZhengyan Zhang, Xu Han, Zhiyuan Liu, Xin Jiang, Maosong Sun, and Qun Liu. 2019. ERNIE: Enhanced Language Representation with Informative Entities. In Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics , pages 1441-1451, Florence, Italy. Association for Computational Linguistics.\nZhuosheng Zhang, Yuwei Wu, Hai Zhao, Zuchao Li, Shuailiang Zhang, Xi Zhou, and Xiang Zhou. 2020. Semantics-aware BERT for Language Understanding. In AAAI 2020 .\nSanqiang Zhao, Raghav Gupta, Yang Song, and Denny Zhou. 2019. Extreme Language Model Compression with Optimal Subwords and Shared Projections. arXiv preprint arXiv:1909.11687 .\nYiyun Zhao and Steven Bethard. 2020. How does BERT's attention change when you fine-tune? An analysis methodology and a case study in negation scope. In Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics , pages 4729-4747, Online. Association for Computational Linguistics.", + "page_start": 22, + "page_end": 22, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "6.2 Compression techniques\nGiven the above evidence of overparameterization, it does not come as a surprise that BERT can be efficiently compressed with minimal accuracy loss , which would be highly desirable for real-world applications. Such efforts to date are summarized in Table 1. The main approaches are knowledge distillation, quantization, and pruning.\nThe studies in the knowledge distillation framework (Hinton et al., 2014) use a smaller student-network trained to mimic the behavior of a larger teacher-network. For BERT, this has been achieved through experiments with loss functions (Sanh et al., 2019b; Jiao et al., 2019), mimicking the activation patterns of individual portions of the teacher network (Sun et al., 2019a), and knowledge transfer at the pre-training (Turc et al., 2019; Jiao et al., 2019; Sun et al., 2020) or fine-tuning stage (Jiao et al., 2019). McCarley et al. (2020) suggest that distillation has so far worked better for GLUE than for reading comprehension, and report good results for QA from a combination of structured pruning and task-specific distillation.\nQuantization decreases BERT's memory footprint through lowering the precision of its weights (Shen et al., 2019; Zafrir et al., 2019). Note that\nTable 1: Comparison of BERT compression studies. Compression, performance retention, inference time speedup figures are given with respect to BERTbase, unless indicated otherwise. Performance retention is measured as a ratio of average scores achieved by a given model and by BERTbase. The subscript in the model description reflects the number of layers used. ∗ Smaller vocabulary used. † The dimensionality of the hidden layers is reduced. ‖ Convolutional layers used. ‡ Compared to BERTlarge. ∗∗ Compared to mBERT. § As reported in (Jiao et al., 2019). ¶ In comparison to the dev set.", + "page_start": 9, + "page_end": 10, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "5.3 Pre-training BERT\nThe original BERT is a bidirectional Transformer pre-trained on two tasks: next sentence prediction (NSP) and masked language model (MLM) (section 2). Multiple studies have come up with alternative training objectives to improve on BERT, which could be categorized as follows:\n· How to mask. Raffel et al. (2019) systematically experiment with corruption rate and corrupted span length. Liu et al. (2019b) propose diverse masks for training examples within an epoch, while Baevski et al. (2019) mask every token in a sequence instead of a random selection. Clinchant et al. (2019) replace the MASK token with [UNK] token, to help the model learn a representation for unknowns that could be useful for translation. Song et al. (2020) maximize the amount of information available to the model by conditioning on both masked and unmasked tokens, and letting the model see how many tokens are missing.\n· What to mask. Masks can be applied to full words instead of word-pieces (Devlin et al., 2019; Cui et al., 2019). Similarly, we can mask spans rather than single tokens (Joshi et al., 2020), predicting how many are missing (Lewis et al., 2019). Masking phrases and named entities (Sun et al., 2019b) improves representation of structured knowledge.\n· Where to mask. Lample and Conneau (2019) use arbitrary text streams instead of sentence pairs and subsample frequent outputs similar to Mikolov et al. (2013). Bao et al. (2020) combine the standard autoencoding MLM with partially autoregressive LM objective using special pseudo mask tokens.\n· Alternatives to masking. Raffel et al. (2019) experiment with replacing and dropping spans, Lewis et al. (2019) explore deletion, infilling, sentence permutation and document rotation, and Sun et al. (2019c) predict whether a token is capitalized and whether it occurs in other segments of the same document. Yang et al. (2019) train on different permutations of word order in the input sequence, maximizing the probability of the original word order (cf. the n-gram word order reconstruction task (Wang et al., 2019a)). Clark et al. (2020) detect tokens that were replaced by a generator network rather than masked.", + "page_start": 7, + "page_end": 7, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "8 Conclusion\nIn a little over a year, BERT has become a ubiquitous baseline in NLP experiments and inspired numerous studies analyzing the model and proposing various improvements. The stream of papers seems to be accelerating rather than slowing down, and we hope that this survey helps the community to focus on the biggest unresolved questions.", + "page_start": 11, + "page_end": 11, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "5.4 Fine-tuning BERT\n5 Kondratyuk and Straka (2019) suggest that fine-tuning on Universal Dependencies does result in syntactically meaningful attention patterns, but there was no quantitative evaluation.\nbe successfully approximated with adapter modules. They achieve competitive performance on 26 classification tasks at a fraction of the computational cost. Adapters in BERT were also used for multi-task learning (Stickland and Murray, 2019) and cross-lingual transfer (Artetxe et al., 2019). An alternative to fine-tuning is extracting features from frozen representations, but fine-tuning works better for BERT (Peters et al., 2019b).\nA big methodological challenge in the current NLP is that the reported performance improvements of new models may well be within variation induced by environment factors (Crane, 2018). BERT is not an exception. Dodge et al. (2020) report significant variation for BERT fine-tuned on GLUE tasks due to both weight initialization and training data order. They also propose early stopping on the less-promising seeds.\nAlthough we hope that the above observations may be useful for the practitioners, this section does not exhaust the current research on fine-tuning and its alternatives. For example, we do not cover such topics as Siamese architectures, policy gradient training, automated curriculum learning, and others.", + "page_start": 8, + "page_end": 9, + "source_file": "arxiv2_taclccby4_license.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv2_taclccby4_license.pdf", + "query": "Is syntaxis encoded with Bert model ?", + "target_page": 2, + "target_passage": " As far as how syntaxis represented, it seems that syntactic structure is not directly encoded in self-attention weights.", + "chunk_present": { + "presence": true, + "index": 3 + } + }, + "top_chunk": [ + { + "text": "3.1 Syntactic knowledge\nHowever, syntactic information can be recovered from BERT token representations . Hewitt and Manning (2019) were able to learn transformation matrices that successfully recovered syntactic dependencies in PennTreebank data from BERT's token embeddings (see also Manning et al., 2020). Jawahar et al. (2019) experimented with transformations of the [CLS] token using Tensor Product Decomposition Networks (McCoy et al., 2019a), concluding that dependency trees are the best match among 5 decomposition schemes (although the reported MSE differences are very small). Miaschi and Dell'Orletta (2020) performs a range of syntactic probing experiments with concatenated token representations as input. to a heatmap of an impact matrix. Setup. We extract impact matrices by feeding BERT with 1,000 sentences from the English Parallel Universal Dependencies (PUD) treebank of the CoNLL 2017 Shared Task (Zeman et al., 2017). We follow the setup and pre-processing steps employed in pre-training BERT. An example impact map is shown in Figure 1. Dependency. We notice that the impact map contains many stripes , which are short series of vertical/horizontal cells, typically located along the diagonal. Take the word ' different ' as an example (which is illustrated by the second-to-last column in the impact matrix). We observe a clear vertical stripe above the main diagonal. The interpretation is that this particular occurrence of the word ' different ' strongly affects the occurrences\nfollow\nsocia\nFigure\nConstitue\nstituency tre\nby Stanford\nthis sentence\nthat are adja\nhowever, we\ntions\n' than '\nIf a model is\nexpect '\nmedi\npacts on the\nversa. Howe\n(darker color\nthan that bet\nfurther suppo\nperiments in\nOther Str\nimpact map,\nfour contigu\n(e.g., a noun\nobserve that t\nstrong inter-c\ning that gro\nverb phrase.\nmay capture\nIn the follo\nuate these ob\n4\nSyntact\nWe start wit\nprobe and co\n4.1\nDepen\nWith the goa\nrelations are\nswer the foll\nform linguist\npervised dep\ntent?\nWe begin\nmasking tech\nfor each sent\ngorithms to i\ncompare it ag\nrelations are captured in BERT, we set out to an-", + "page_start": 1, + "page_end": 1, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "Anna Rumshisky\nDept. of Computer Science University of Massachusetts Lowell\narum@cs.uml.edu\nimprove BERT's architecture, pre-training and finetuning. We conclude by discussing the issue of overparameterization, the approaches to compressing BERT, and the nascent area of pruning as a model analysis technique.", + "page_start": 0, + "page_end": 0, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "3.1 Syntactic knowledge\nLin et al. (2019) showed that BERT representations are hierarchical rather than linear , i.e. there is something akin to syntactic tree structure in addition to the word order information. Tenney et al. (2019b) and Liu et al. (2019a) also showed that BERT embeddings encode information about parts of speech, syntactic chunks and roles . Enough syntactic information seems to be captured in the token embeddings themselves to recover syntactic trees (Vilares et al., 2020; Kim et al., 2020; Rosa and Mareˇcek, 2019), although probing classifiers could not recover the labels of distant parent nodes in the syntactic tree (Liu et al., 2019a). Warstadt and Bowman (2020) report evidence of hierarchical structure in three out of four probing tasks. [C L S ] F o r th o se w h o fo llo w so ci a l m e d ia tr a n si tio n s o n C a p ito l H ill , th is w ill be a lit tle d iff e re n t . [CLS] For those who follow social media transitions on Capitol Hill , this will be a little different . 1 2 3 4 5 Figure 1: Heatmap of the impact matrix for the sentence 'For those who follow social media transitions on Capitol Hill, this will be a little different.'", + "page_start": 1, + "page_end": 1, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "3.1 Syntactic knowledge\nAs far as how syntax is represented, it seems that syntactic structure is not directly encoded in self-attention weights . Htut et al. (2019) were unable to extract full parse trees from BERT heads even with the gold annotations for the root. Jawahar et al. (2019) include a brief illustration of a dependency tree extracted directly from self-attention weights, but provide no quantitative evaluation. 3 Visualization with Impact Maps Before we discuss specific syntactic phenomena, let us first analyze some example impact matrices derived from sample sentences. We visualize an impact matrix of a sentence by displaying a heatmap. We use the term 'impact map' to refer\nvertical stripe above the main diagonal. The interpretation is that this particular occurrence of the word ' different ' strongly affects the occurrences of those words before it. These strong influences are shown by the darker-colored pixels seen in the second last column of the impact map. This observation agrees with the ground-truth dependency tree, which selects ' different ' as the head of all remaining words in the phrase ' this will be a little different .' We also observe similar patterns on ' transitions ' and ' Hill '. Such correlations lead us verb phrase. This observation suggest that BERT may capture the compositionality of the language. In the following sections we quantitatively evaluate these observations. 4 Syntactic Probe We start with two syntactic probes - dependency probe and constituency probe. 4.1 Dependency Probe With the goal of exploring the extent dependency The above claims of syntactic knowledge are belied by the evidence that BERT does not \"understand\" negation and is insensitive to malformed input . In particular, its predictions were not altered 2 even with shuffled word order, truncated sentences, removed subjects and objects (Ettinger, 2019). This could mean that either BERT's syntactic knowledge is incomplete, or it does not need to rely on it for solving its tasks . The latter seems more likely, since Glavaš and Vuli'c (2020)\nto explore the idea of extracting dependency trees", + "page_start": 1, + "page_end": 1, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "D.2 Evaluation results per task\nTable 12: Performance of each model for Bitext Mining, Semantic Textual Similarity (STS) and Summarization.\n, STS22 STS = 0.79. , SICKFr = 0.70. , SummEv alFr Summarization = 0.29. bert-base-multilingual-cased, Flor es_fr -en = 0.97. bert-base-multilingual-cased, Flor es_en-fr BitextMining = 0.98. bert-base-multilingual-cased, DiaBla_fr -en = 0.30. bert-base-multilingual-cased, STSBenchmarkMultilingual = 0.52. bert-base-multilingual-cased, STS22 STS = 0.39. bert-base-multilingual-cased, SICKFr = 0.59. bert-base-multilingual-cased, SummEv alFr Summarization = 0.29. bert-base-multilingual-uncased, Flor es_fr -en = 0.95. bert-base-multilingual-uncased, Flor es_en-fr BitextMining = 0.98. bert-base-multilingual-uncased, DiaBla_fr -en = 0.36. bert-base-multilingual-uncased, STSBenchmarkMultilingual = 0.55. bert-base-multilingual-uncased, STS22 STS = 0.56. bert-base-multilingual-uncased, SICKFr = 0.58. bert-base-multilingual-uncased, SummEv alFr Summarization = 0.31. camembert-base, Flor es_fr -en = 0.26. camembert-base, Flor es_en-fr BitextMining = 0.25. camembert-base, DiaBla_fr -en = 0.04. camembert-base, STSBenchmarkMultilingual = 0.55. camembert-base, STS22 STS = 0.61. camembert-base, SICKFr = 0.54. camembert-base, SummEv alFr Summarization = 0.30. sentence-camembert-base, Flor es_fr -en", + "page_start": 23, + "page_end": 23, + "source_file": "arxiv4.pdf" + }, + { + "text": "Abstract\nTransformer-based models have pushed state of the art in many areas of NLP, but our understanding of what is behind their success is still limited. This paper is the first survey of over 150 studies of the popular BERT model. We review the current state of knowledge about how BERT works, what kind of information it learns and how it is represented, common modifications to its training objectives and architecture, the overparameterization issue and approaches to compression. We then outline directions for future research.", + "page_start": 0, + "page_end": 0, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "following:\nLastly, we emphasize that closed-source models perform well on this benchmark ( text-embeddings , mistral-embed and voyage ), but we lack information about their characteristics. As more opensource well-performing models get added in the future, we could expect this correlation to decrease. Note that the correlation between sequence length and performance could be dragged by closedsource models that have generally larger sequence lengths.\nQ3: Do monolingual models have multilingual capabilities?\nModel perfromance vs language\nFigure 2: Model performance depending on the language of the data they have been trained on.\nWe also studied the capabilities of models on the French language when the language of the training data varies. It is surprising to note the absence of a clear correlation between the language the model is trained on and its performance on French, as shown by the large standard deviation in Figure 2. Furthermore, monolingual models trained exclusively on English such as voyage-code-2 show very good results on French datasets compared to models trained exclusively on French such as flaubert derivatives and distilbert-base-fr-cased (see Table D.1).\nThis is explained by the fact that a large part of the selected French models generate embeddings using a pooling strategy. Only a few are sentence transformer models, for which the pooled representation is part of the model and trained with it, leading to higher-quality embeddings. This is endorsed by the excellent results of sentence-camembert-large , a sentence transformer model trained on French corpus and confirms the recent findings in terms of model architecture (Gao et al., 2021).\nFinally, it should be noted that a significant portion of the French data used to train the selected French models actually comes from English datasets that have been machine translated (May, 2021). Despite the tremendous progress of machine translation, it is well known that the generated data may be unrepresentative of the language used by native speakers and cause a reduced final performance (Barbosa et al., 2021).\n7", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv4.pdf" + }, + { + "text": "3.1 Syntactic knowledge\n4168 from the matrices (see Section 4.1). swer the following question: Can BERT outperform linguistically uninformed baselines in unsupervised dependency parsing? If so, to what extent? 2 See also the recent findings on adversarial triggers, which get the model to produce a certain output even though they are not well-formed from the point of view of a human reader (Wallace et al., 2019a).\nWe begin by using the token-level perturbed\nmasking technique to extract an impact matrix\nfor each sentence. We then utilize graph-based al-\ngorithms to induce a dependency tree from\nF\n, and\ncompare it against ground-truth whose annotations\nF\nNote that all these approaches look for the evidence of gold-standard linguistic structures, and add some amount of extra knowledge to the probe. Most recently, Wu et al. (2020) proposed a of those words before it. These strong influences are shown by the darker-colored pixels seen in the second last column of the impact map. This observation agrees with the ground-truth dependency tree, which selects ' different ' as the head of all\nremaining words in the phrase '\nthis will be a lit-\ntle different\n.' We also observe similar patterns on\n'\ntransitions\n' and '\nHill\n'. Such correlations lead us\nto explore the idea of extracting dependency trees\nfrom the matrices (see Section 4.1).\n0\n2\np\ne\nS\n4\n]\nL\nC\n.\ns\nc\n[\n2\nv\n6\n6\n0\n1\n0\n.\n9\n0\n9\n1\n:\nv\ni\nX\nr\na\nRecent progress in pretraining language mod-\nels on large textual corpora led to a surge\nof improvements for downstream NLP tasks.\nWhilst learning linguistic knowledge, these\nreport that an intermediate fine-tuning step with supervised parsing does not make much difference for downstream task performance. models may also be storing relational knowledge present in the training data, and may be able to answer queries structured as 'fillin-the-blank' cloze statements. Language\nmodels have many advantages over structured", + "page_start": 1, + "page_end": 2, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "4.1 BERT embeddings\nSince BERT embeddings are contextualized, an interesting question is to what extent they capture phenomena like polysemy and homonymy. There is indeed evidence that BERT's contextualized embeddings form distinct clusters corresponding to word senses (Wiedemann et al., 2019; Schmidt and Hofmann, 2020), making BERT successful at word sense disambiguation task. However, Mickus et al. (2019) note that the representations of the same word depend on the position of the sentence in which it occurs , likely due to the NSP objective. This is not desirable from the linguistic point of view, and could be a promising\n3 Voita et al. (2019a) look at the evolution of token embeddings, showing that in the earlier Transformer layers, MLM forces the acquisition of contextual information at the expense of the token identity, which gets recreated in later layers.\navenue for future work.\nThe above discussion concerns token embeddings, but BERT is typically used as a sentence or text encoder. The standard way to generate sentence or text representations for classification is to use the [CLS] token, but alternatives are also being discussed, including concatenation of token representations (Tanaka et al., 2020), normalized mean (Tanaka et al., 2020), and layer activations (Ma et al., 2019). See Toshniwal et al. (2020) for a systematic comparison of several methods across tasks and sentence encoders.", + "page_start": 3, + "page_end": 4, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "D.2 Evaluation results per task\nTable 10: Performance of each model for Classification and Pair Classification.\nMassi v eIntent.Classification = 0.38. bert-base-multilingual-uncased, MasakhaNEWS.Classification = 0.76. bert-base-multilingual-uncased, MT OPIntent.Classification = 0.39. bert-base-multilingual-uncased, MT OPDomain.Classification = 0.64. bert-base-multilingual-uncased, AmazonRe views.PairClassification = 0.29. bert-base-multilingual-uncased, P awsX.PairClassification = 0.53. bert-base-multilingual-uncased, Opuspar cusPC.PairClassification = 0.87. camembert-base, Massi v eScenario.Classification = 0.39. camembert-base, Massi v eIntent.Classification = 0.31. camembert-base, MasakhaNEWS.Classification = 0.66. camembert-base, MT OPIntent.Classification = 0.29. camembert-base, MT OPDomain.Classification = 0.58. camembert-base, AmazonRe views.PairClassification = 0.30. camembert-base, P awsX.PairClassification = 0.52. camembert-base, Opuspar cusPC.PairClassification = 0.83. sentence-camembert-base, Massi v eScenario.Classification = 0.61. sentence-camembert-base, Massi v eIntent.Classification = 0.52. sentence-camembert-base, MasakhaNEWS.Classification = 0.70. sentence-camembert-base, MT OPIntent.Classification = 0.43. sentence-camembert-base, MT OPDomain.Classification = 0.77. sentence-camembert-base, AmazonRe views.PairClassification = 0.36. sentence-camembert-base, P awsX.PairClassification = 0.57. sentence-camembert-base, Opuspar cusPC.PairClassification = 0.92. sentence-camembert-large, Massi v eScenario.Classification = 0.69. sentence-camembert-large, Massi v", + "page_start": 21, + "page_end": 21, + "source_file": "arxiv4.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv2_taclccby4_license.pdf", + "query": "Is BERT good with numbers representations ?", + "target_page": 3, + "target_passage": " BERTstruggles with representations of numbers. ", + "chunk_present": { + "presence": true, + "index": 6 + } + }, + "top_chunk": [ + { + "text": "Abstract\nTransformer-based models have pushed state of the art in many areas of NLP, but our understanding of what is behind their success is still limited. This paper is the first survey of over 150 studies of the popular BERT model. We review the current state of knowledge about how BERT works, what kind of information it learns and how it is represented, common modifications to its training objectives and architecture, the overparameterization issue and approaches to compression. We then outline directions for future research.", + "page_start": 0, + "page_end": 0, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "Anna Rumshisky\nDept. of Computer Science University of Massachusetts Lowell\narum@cs.uml.edu\nimprove BERT's architecture, pre-training and finetuning. We conclude by discussing the issue of overparameterization, the approaches to compressing BERT, and the nascent area of pruning as a model analysis technique.", + "page_start": 0, + "page_end": 0, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "References\nEric Wallace, Yizhong Wang, Sujian Li, Sameer Singh, and Matt Gardner. 2019b. Do NLP Models Know Numbers? Probing Numeracy in Embeddings. arXiv preprint arXiv:1909.07940 .\nAlex Wang, Amapreet Singh, Julian Michael, Felix Hill, Omer Levy, and Samuel R. Bowman. 2018. GLUE: A Multi-Task Benchmark and Analysis Platform for Natural Language Understanding. In Proceedings of the 2018 EMNLP Workshop BlackboxNLP: Analyzing and Interpreting Neural Networks for NLP , pages 353-355, Brussels, Belgium. Association for Computational Linguistics.\nRuize Wang, Duyu Tang, Nan Duan, Zhongyu Wei, Xuanjing Huang, Jianshu ji, Guihong Cao, Daxin Jiang, and Ming Zhou. 2020a. K-Adapter: Infusing Knowledge into Pre-Trained Models with Adapters. arXiv:2002.01808 [cs] .\nWei Wang, Bin Bi, Ming Yan, Chen Wu, Zuyi Bao, Liwei Peng, and Luo Si. 2019a. StructBERT: Incorporating Language Structures into\nPre-Training for Deep Language Understanding. arXiv:1908.04577 [cs] .\nWenhui Wang, Furu Wei, Li Dong, Hangbo Bao, Nan Yang, and Ming Zhou. 2020b. MiniLM: Deep Self-Attention Distillation for Task-Agnostic Compression of Pre-Trained Transformers. arXiv preprint arXiv:2002.10957 .\nXiaozhi Wang, Tianyu Gao, Zhaocheng Zhu, Zhiyuan Liu, Juanzi Li, and Jian Tang. 2020c. KEPLER: A Unified Model for Knowledge Embedding and Pre-trained Language Representation. arXiv:1911.06136 [cs] .\nYile Wang, Leyang Cui, and Yue Zhang. 2020d. How Can BERT Help Lexical Semantics Tasks? arXiv:1911.02929 [cs] .\nZihan Wang, Stephen Mayhew, Dan Roth, et al. 2019b. Cross-Lingual Ability of Multilingual BERT: An Empirical Study. arXiv preprint arXiv:1912.07840 .", + "page_start": 20, + "page_end": 21, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "References\nXiaofei Ma, Zhiguo Wang, Patrick Ng, Ramesh Nallapati, and Bing Xiang. 2019. Universal Text Representation from BERT: An Empirical Study. arXiv:1910.07973 [cs] .\nChristopher D. Manning, Kevin Clark, John Hewitt, Urvashi Khandelwal, and Omer Levy. 2020. Emergent linguistic structure in artificial neural networks trained by self-supervision. Proceedings of the National Academy of Sciences , page 201907367.\nChandler May, Alex Wang, Shikha Bordia, Samuel R. Bowman, and Rachel Rudinger. 2019. On Measuring Social Biases in Sentence Encoders. In Proceedings of the 2019 Confer-\nence of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long and Short Papers) , pages 622-628, Minneapolis, Minnesota. Association for Computational Linguistics.\nJ. S. McCarley, Rishav Chakravarti, and Avirup Sil. 2020. Structured Pruning of a BERT-based Question Answering Model. arXiv:1910.06360 [cs] .\nR. Thomas McCoy, Tal Linzen, Ewan Dunbar, and Paul Smolensky. 2019a. RNNs implicitly implement tensor-product representations. In International Conference on Learning Representations .\nTom McCoy, Ellie Pavlick, and Tal Linzen. 2019b. Right for the Wrong Reasons: Diagnosing Syntactic Heuristics in Natural Language Inference. In Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics , pages 3428-3448, Florence, Italy. Association for Computational Linguistics.\nAlessio Miaschi and Felice Dell'Orletta. 2020. Contextual and Non-Contextual Word Embeddings: An in-depth Linguistic Investigation. In Proceedings of the 5th Workshop on Representation Learning for NLP , pages 110-119.\nPaul Michel, Omer Levy, and Graham Neubig. 2019. Are Sixteen Heads Really Better than One? Advances in Neural Information Processing Systems 32 (NIPS 2019) .\nTimothee Mickus, Denis Paperno, Mathieu Constant, and Kees van Deemeter. 2019. What do you mean, BERT? assessing BERT as a distributional semantics model. arXiv preprint arXiv:1911.05758 .", + "page_start": 16, + "page_end": 17, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "1 Introduction\nSince their introduction in 2017, Transformers (Vaswani et al., 2017) have taken NLP by storm, offering enhanced parallelization and better modeling of long-range dependencies. The best known Transformer-based model is BERT (Devlin et al., 2019); it obtained state-of-the-art results in numerous benchmarks and is still a must-have baseline.\nWhile it is clear that BERT works remarkably well, it is less clear why , which limits further hypothesis-driven improvement of the architecture. Unlike CNNs, the Transformers have little cognitive motivation, and the size of these models limits our ability to experiment with pre-training and perform ablation studies. This explains a large number of studies over the past year that attempted to understand the reasons behind BERT's performance.\nIn this paper, we provide an overview of what has been learned to date, highlighting the questions which are still unresolved. We first consider the linguistic aspects of it, i.e., the current evidence regarding the types of linguistic and world knowledge learned by BERT, as well as where and how this knowledge may be stored in the model. We then turn to the technical aspects of the model and provide an overview of the current proposals to", + "page_start": 0, + "page_end": 0, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "D.2 Evaluation results per task\nTable 13: Performance of each model for Clustering.\n0.24. bert-base-multilingual-cased, MLSUMS2S = 0.32. bert-base-multilingual-cased, MLSUMP2P Clustering = 0.41. bert-base-multilingual-cased, HALS2S = 0.25. bert-base-multilingual-cased, AlloPr ofS2S = 0.43. bert-base-multilingual-cased, AlloPr ofP2P = 0.51. bert-base-multilingual-uncased, MasakhaNEWSS2S = 0.42. bert-base-multilingual-uncased, MasakhaNEWSP2P = 0.50. bert-base-multilingual-uncased, MLSUMS2S = 0.31. bert-base-multilingual-uncased, MLSUMP2P Clustering = 0.43. bert-base-multilingual-uncased, HALS2S = 0.26. bert-base-multilingual-uncased, AlloPr ofS2S = 0.35. bert-base-multilingual-uncased, AlloPr ofP2P = 0.61. camembert-base camembert-large, MasakhaNEWSS2S = 0.27. camembert-base camembert-large, MasakhaNEWSP2P = 0.44. camembert-base camembert-large, MLSUMS2S = 0.27. camembert-base camembert-large, MLSUMP2P Clustering = 0.41. camembert-base camembert-large, HALS2S = 0.16. camembert-base camembert-large, AlloPr ofS2S = 0.29. camembert-base camembert-large, AlloPr ofP2P = 0.54. , MasakhaNEWSS2S = 0.33. , MasakhaNEWSP2P = 0.42. , MLSUMS2S = 0.35. , MLSUMP2P Clustering = 0.44. , HALS2S = 0.03. , AlloPr ofS2S = 0.34. ,", + "page_start": 24, + "page_end": 24, + "source_file": "arxiv4.pdf" + }, + { + "text": "3.2 Semantic knowledge knowledge bases: they require no schema en-\nTo date, more studies have been devoted to BERT's knowledge of syntactic rather than semantic phenomena. However, we do have evidence from an MLMprobing study that BERT has some knowledge of semantic roles (Ettinger, 2019). BERT even displays some preference for the incorrect fillers for semantic roles that are semantically related to the correct ones, as opposed to those that are unrelated (e.g. \"to tip a chef\" is better than \"to tip a robin\", but worse than \"to tip a waiter\"). gineering, allow practitioners to query about an open class of relations, are easy to extend to more data, and require no human supervision to train. We present an in-depth analysis of the relational knowledge already present (without fine-tuning) in a wide range of state-of-theart pretrained language models. We find that (i) without fine-tuning, BERT contains relational knowledge competitive with traditional NLP methods that have some access to oracle knowledge, (ii) BERT also does remarkably well on open-domain question answer-\nBERTstruggles with representations of numbers. Addition and number decoding tasks showed that BERT does not form good representations for floating point numbers and fails to generalize away from the training data (Wallace et al., 2019b). A part of the problem is BERT's wordpiece tokenization, since numbers of similar values can be divided up into substantially different word chunks. call factual knowledge without any fine-tuning demonstrates their potential as unsupervised open-domain QA systems. The code to reproduce our analysis is available at https: //github.com/facebookresearch/LAMA . 1 Introduction Recently, pretrained high-capacity language models such as ELMo (Peters et al., 2018a) and BERT\nTenney et al. (2019b) showed that BERT encodes information about entity types, relations, semantic roles, and proto-roles , since this information can be detected with probing classifiers. ing against a supervised baseline, and (iii) certain types of factual knowledge are learned much more readily than others by standard language model pretraining approaches. The surprisingly strong ability of these models to re-", + "page_start": 2, + "page_end": 2, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "2 BACKGROUND\nA number of these models also have multilingual variants such as mBERT [39] and mT5 [148] or are trained with some amount of multilingual data such as GPT-3 where 7% of the training data was not in English [25]. The performance of these multilingual models across languages is an active area of research. Wu and Drezde [144] found that while mBERT does not perform equally well across all 104 languages in its training data, it performed better at NER, POS tagging, and dependency parsing than monolingual models trained with comparable amounts of data for four low-resource languages. Conversely, [95] surveyed monolingual BERT models developed with more specific architecture considerations or additional monolingual data and found that they generally outperform\n1 https://www.microsoft.com/en-us/research/blog/turing-nlg-a-17-billion-parameterlanguage-model-by-microsoft/\n611\nStochastic Parrots\nFAccT '21, March 3-10, 2021, Virtual Event, Canada\nmBERT across 29 tasks. Either way, these models do not address the inclusion problems raised by [65], who note that over 90% of the world's languages used by more than a billion people currently have little to no support in terms of language technology.\nAlongside work investigating what information the models retain from the data, we see a trend in reducing the size of these models using various techniques such as knowledge distillation [26, 58], quantization [118, 153], factorized embedding parameterization and cross-layer parameter sharing [70], and progressive module replacing [146]. Rogers et al. [110] provide a comprehensive comparison of models derived from BERT using these techniques, such as DistilBERT [113] and ALBERT [70]. While these models maintain and sometimes exceed the performance of the original BERT model, despite their much smaller size, they ultimately still rely on large quantities of data and significant processing and storage capabilities to both hold and reduce the model.", + "page_start": 1, + "page_end": 2, + "source_file": "arxiv5_ccby4license.pdf" + }, + { + "text": "D.2 Evaluation results per task\nTable 10: Performance of each model for Classification and Pair Classification.\nMassi v eIntent.Classification = 0.38. bert-base-multilingual-uncased, MasakhaNEWS.Classification = 0.76. bert-base-multilingual-uncased, MT OPIntent.Classification = 0.39. bert-base-multilingual-uncased, MT OPDomain.Classification = 0.64. bert-base-multilingual-uncased, AmazonRe views.PairClassification = 0.29. bert-base-multilingual-uncased, P awsX.PairClassification = 0.53. bert-base-multilingual-uncased, Opuspar cusPC.PairClassification = 0.87. camembert-base, Massi v eScenario.Classification = 0.39. camembert-base, Massi v eIntent.Classification = 0.31. camembert-base, MasakhaNEWS.Classification = 0.66. camembert-base, MT OPIntent.Classification = 0.29. camembert-base, MT OPDomain.Classification = 0.58. camembert-base, AmazonRe views.PairClassification = 0.30. camembert-base, P awsX.PairClassification = 0.52. camembert-base, Opuspar cusPC.PairClassification = 0.83. sentence-camembert-base, Massi v eScenario.Classification = 0.61. sentence-camembert-base, Massi v eIntent.Classification = 0.52. sentence-camembert-base, MasakhaNEWS.Classification = 0.70. sentence-camembert-base, MT OPIntent.Classification = 0.43. sentence-camembert-base, MT OPDomain.Classification = 0.77. sentence-camembert-base, AmazonRe views.PairClassification = 0.36. sentence-camembert-base, P awsX.PairClassification = 0.57. sentence-camembert-base, Opuspar cusPC.PairClassification = 0.92. sentence-camembert-large, Massi v eScenario.Classification = 0.69. sentence-camembert-large, Massi v", + "page_start": 21, + "page_end": 21, + "source_file": "arxiv4.pdf" + }, + { + "text": "4.3 BERT layers\ndiffer in the contextualizer architecture used. We evaluate how well CWR features perform the pretraining task-bidirectional language modeling. Specifically, we take the pretrained representations for each layer and relearn the language model softmax classifiers used to predict the next and previous token. The ELMo models are trained on the Billion Word Benchmark, so we retrain the softmax classifier on similar data to mitigate any possible effects from domain shift. We split the held-out portion of the Billion Word Benchmark into train (80%, 6.2M tokens) and evaluation (20%, 1.6M tokens) sets and use this data to retrain and evaluate the softmax classifiers. We expect that biLM perplexity will be lower when training the softmax classifiers on representations from layers that capture more information about There is a wide consensus in studies with different tasks, datasets and methodologies that syntactic information is most prominent in the middle layers of BERT. 4 Hewitt and Manning (2019) had the most success reconstructing syntactic tree depth from the middle BERT layers (6-9 for base-BERT, 14-19 for BERT-large). Goldberg (2019) reports the best subject-verb agreement around layers 89, and the performance on syntactic probing tasks used by Jawahar et al. (2019) also seems to peak around the middle of the model. The prominence of syntactic information in the middle BERT layers is related to Liu et al. (2019a)'s observation that the middle layers of Transformers are best-performing overall and the most transferable across tasks (see Figure 4).\nThe final layers of BERT are the most taskspecific . In pre-training, this means specificity to the MLM task, which explains why the middle\n4 These BERT results are also compatible with findings by Vig and Belinkov (2019), who report the highest attention to tokens in dependency relations in the middle layers of GPT-2.\n(d) OpenAI transformer\nduring pretrai\ning performan\ntations that ar\ning are also th\nperformance (\nalizer layers t\nand task-speci\nThese resul\nlayerwise beh\nmoving up th\nspecific repre\nhold for trans\ndifferences be\nan active area\net al., 2018),\nthese observati\nThese obse\nfreezing meth\nwhere the mod\n(starting from\ntuning process", + "page_start": 5, + "page_end": 5, + "source_file": "arxiv2_taclccby4_license.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_FFIN_2002.pdf", + "query": "How many affiliate banks has First Financial Bankshares ?", + "target_page": 4, + "target_passage": "The corporation has 10 affiliate banks, which provide services from 28 full-service locations in the Central, West and High Plains regions of Texas. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "2002 ANNUAL REPORT\n2 Corporate Profile\n3 Financial Highlights\n4 Letter to Shareholders\n6 Shareholder Values\n12 Selected Financial Data\n13 Trust Services\n14 Subsidiary Bank Reports Financial Summaries Senior Officers and Directors Market Share\n25 Form 10-K\nInside Back Cover Corporate Information\nAt First Financial Bankshares, we are not a complicated company. Our value is easy to calculate because our numbers are easy to follow. The same holds true for our values. We believe in doing business the right way - from our boardrooms to our mailrooms. Maybe it's our West Texas roots, but we still appreciate the days when a handshake was binding. The relationships we have developed with our customers bear this out. More and more, in communities across Texas, we're the banks people turn to for financial services. The result has been strong, consistent, above-sector performance for our shareholders. How do values drive value? Let us explain.\n2\nFirst Financial Bankshares, Inc. is a financial holding company\nheadquartered in Abilene, Texas, with consolidated assets of $2.0 billion as of December 31, 2002. The corporation has 10 affiliate banks, which provide services from 28 full-service locations in the Central, West and High Plains regions of Texas. The common stock of First Financial Bankshares, Inc. is held by more than 3,500 shareholders and is listed on The NASDAQ Stock Market ¤ under the symbol FFIN.\n'Our 10 affiliate banks provide services from 28 full-service locations in the Central, West and High Plains regions of Texas.'", + "page_start": 1, + "page_end": 3, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "First Financial Bankshares, Inc.\nWe provide management and technical resources and policy direction to our subsidiary banks, which enables them to improve or expand their banking services while continuing their local activity and identity. Each of our subsidiary banks operates under the day-to-day management of its own board of directors and officers, with substantial authority in making decisions concerning their own investments, loan policies, interest rates, and service charges. We provide resources and policy direction in, among other things, the following areas:\n· asset and liability management;\n· accounting, budgeting, planning and insurance;\n· capitalization; and\n· regulatory compliance.\nIn particular, we assist our subsidiary banks with, among other things, decisions concerning major capital expenditures, employee fringe benefits, including pension plans and group insurance, dividend policies, and appointment of officers and directors and their compensation. We also perform, through corporate staff groups or by outsourcing to third parties, internal audits and loan reviews of our subsidiary banks. Through First National Bank of Abilene, we provide advice and specialized services for our banks related to lending, investing, purchasing, advertising, public relations, and computer services.\nWhile we have no specific acquisition agreements in place or commitments to expand our branch network, we periodically evaluate various potential financial institution acquisition opportunities and also periodically evaluate potential locations for new branch offices. We anticipate that funding for any acquisitions or expansions would be provided from our existing cash balances, available dividends from subsidiary banks, utilization of available lines of credit and future debt or equity offerings.", + "page_start": 29, + "page_end": 29, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "General\nFirst Financial Bankshares, Inc., a Texas corporation, is a financial holding company registered under the Bank Holding Company Act of 1956, or BHCA. As such, we are supervised by the Board of Governors of the Federal Reserve System, or Federal Reserve Board, as well as several other state and federal regulators. We were formed as a bank holding company in 1956 under the original name F & M Operating Company, but our banking operations date back to 1890, when Farmers and Merchants National Bank opened for business in Abilene, Texas. By virtue of a series of reorganizations, mergers, and acquisitions since 1956, we now own, through our wholly-owned Delaware subsidiary, First Financial Bankshares of Delaware, Inc., ten banks organized and located in Texas. These ten banks are:\n· First National Bank of Abilene, Abilene, Texas;\n· First National Bank, Sweetwater, Texas;\n· Hereford State Bank, Hereford, Texas;\n1\n· Eastland National Bank, Eastland, Texas;\n· Stephenville Bank and Trust Co., Stephenville, Texas;\n· First Financial Bank, National Association, Cleburne, Texas;\n· San Angelo National Bank, San Angelo, Texas;\n· First Financial Bank, National Association, Southlake, Texas; and\n· Weatherford National Bank, Weatherford, Texas;\n· City National Bank, Mineral Wells, Texas.\nAs described in more detail below, we elected to be treated as a financial holding company in September 2001.\nOur service centers are located primarily in North Central and West Texas. Considering the branches and locations of all our subsidiary banks, as of December 31, 2002, we had 28 financial centers across Texas, with seven locations in Abilene, two locations in Cleburne, two locations in Stephenville, two locations in San Angelo, three locations in Weatherford, and one location each in Mineral Wells, Hereford, Sweetwater, Eastland, Southlake, Aledo, Alvarado, Burleson, Keller, Trophy Club, Roby, and Trent.\nInformation on our revenues, profits and losses and total assets appears in the discussion of our Results of Operations contained in Item 7 hereof.", + "page_start": 28, + "page_end": 29, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\n2002 = (9,667,069). Net (decrease) increase in interest-bearing deposits, 2001 2001 = 41,583,909. Net (decrease) increase in interest-bearing deposits, 2000 = (593,942). Net increase (decrease) in securities sold under agreements to repurchase, 2002 2002 = 6,861,927. Net increase (decrease) in securities sold under agreements to repurchase, 2001 2001 = (6,317,292). Net increase (decrease) in securities sold under agreements to repurchase, 2000 = 16,526,625. Common stock transactions:, 2002 2002 = . Common stock transactions:, 2001 2001 = . Common stock transactions:, 2000 = . Acquisition of treasury stock, 2002 2002 = -. Acquisition of treasury stock, 2001 2001 = (315,050). Acquisition of treasury stock, 2000 = (3,925,069). Proceeds of stock issuances, 2002 2002 = 573,116. Proceeds of stock issuances, 2001 2001 = 356,670. Proceeds of stock issuances, 2000 = 161,919. Dividends paid, 2002 2002 = (16,052,983). Dividends paid, 2001 2001 = (13,921,211). Dividends paid, 2000 = (12,543,863). Net cash provided by (used in) financing activities, 2002 2002 = 17,781,678. Net cash provided by (used in) financing activities, 2001 2001 = 62,566,993. Net cash provided by (used in) financing activities, 2000 = (4,611,134). NET (DECREASE) INCREASE IN CASH AND CASH EQUIVALENTS, 2002 2002 = (6,688,569). NET (DECREASE) INCREASE IN CASH AND CASH EQUIVALENTS, 2001 2001 = 22,594,502. NET (DECREASE) INCREASE IN CASH AND CASH EQUIVALENTS, 2000 = (25,439,346). CASH AND CASH EQUIVALENTS, beginning of year, 2002 2002 = 185,125,214 162,530,712. CASH AND CASH EQUIVALENTS, beginning of year, 2001 2001 = . CASH AND CASH EQUIVALENTS, beginning of year, 2000 = 187,970,058. CASH AND CASH EQUIVALENTS, end of year, 2002", + "page_start": 71, + "page_end": 71, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "Nature of Operations\nFirst Financial Bankshares, Inc. (a Texas corporation) ('Bankshares') is a financial holding company which owns (through its wholly-owned Delaware subsidiary) all of the capital stock of ten banks located in Texas as of December 31, 2002. Those subsidiary banks are First National Bank of Abilene; Hereford State Bank; First National Bank, Sweetwater; Eastland National Bank; First Financial Bank, National Association, Cleburne; Stephenville Bank & Trust Co.; San Angelo National Bank; Weatherford National Bank; First Financial Bank, National Association, Southlake and City National Bank, Mineral Wells. Each subsidiary bank's primary source of revenue is providing loans and banking services to consumers and commercial customers in the market area in which the subsidiary is located.\nA summary of significant accounting policies of Bankshares and subsidiaries (collectively, the 'Company') applied in the preparation of the accompanying consolidated financial statements follows. The accounting principles followed by the Company and the methods of applying them are in conformity with both accounting principles generally accepted in the United States of America and prevailing practices of the banking industry.", + "page_start": 72, + "page_end": 72, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\nYear ended December 31, 2002, Beginning Balance = $44,426,313. Year ended December 31, 2002, Additional Loans = $27,349,995. Year ended December 31, 2002, Payments = $44,235,855. Year ended December 31, 2002, Ending Balance = $27,540,453. Year ended December 31, 2001, Beginning Balance = $35,575,573. Year ended December 31, 2001, Additional Loans = $51,556,164. Year ended December 31, 2001, Payments = $42,970,581. Year ended December 31, 2001, Ending Balance = $44,161,156\nIn the opinion of management, those loans are on substantially the same terms, including interest rates and collateral requirements, as those prevailing at the time for comparable transactions with unaffiliated persons.\nF-16\nNotes to Consolidated Financial Statements\nDecember 31, 2002, 2001 and 2000", + "page_start": 79, + "page_end": 80, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\n2002 = 2,695,533. Increase (decrease) in other liabilities, 2001 2001 = (1,778,326). Increase (decrease) in other liabilities, 2000 = 1,026,945. Total adjustments, 2002 2002 = 10,153,396. Total adjustments, 2001 2001 = 10,850,289. Total adjustments, 2000 = 6,873,667. Net cash provided by operating activities, 2002 2002 = 44,105,946. Net cash provided by operating activities, 2001 2001 = 40,204,794. Net cash provided by operating activities, 2000 = 35,189,714. CASH FLOWS FROM INVESTING ACTIVITIES:, 2002 2002 = . CASH FLOWS FROM INVESTING ACTIVITIES:, 2001 2001 = . CASH FLOWS FROM INVESTING ACTIVITIES:, 2000 = . Net increase in interest-bearing deposits in banks, 2002 2002 = (950,140). Net increase in interest-bearing deposits in banks, 2001 2001 = (1,269,947). Net increase in interest-bearing deposits in banks, 2000 = (100,258). Payment for stock of City Bancshares, Inc., net of cash acquired, 2002 2002 = -. Payment for stock of City Bancshares, Inc., net of cash acquired, 2001 2001 = (6,848,231). Payment for stock of City Bancshares, Inc., net of cash acquired, 2000 = -. Activity in available-for-sale securities:, 2002 2002 = . Activity in available-for-sale securities:, 2001 2001 = . Activity in available-for-sale securities:, 2000 = . Sales, 2002 2002 = 30,077,478. Sales, 2001 2001 = 57,925,815. Sales, 2000 = 530,097. Maturities, 2002 2002 = 814,880,024. Maturities, 2001 2001 = 660,484,725. Maturities, 2000 = 21,660,247. Purchases, 2002 2002 = (972,026,050). Purchases, 2001 2001 = (854,748,980). Purchases, 2000 = (41,804,532). Activity in held-to-maturity securities:, 2002", + "page_start": 71, + "page_end": 71, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\n389,406,666. INTEREST-BEARING DEPOSITS, 2002 = 1,286,088,863. INTEREST-BEARING DEPOSITS, 2001 = 1,295,755,932. Total deposits, 2002 = 1,711,562,216. Total deposits, 2001 = 1,685,162,598. DIVIDENDS PAYABLE, 2002 = 4,327,374. DIVIDENDS PAYABLE, 2001 = 3,699,976. SECURITIES SOLD UNDER AGREEMENTS TO REPURCHASE, 2002 = 26,708,994. SECURITIES SOLD UNDER AGREEMENTS TO REPURCHASE, 2001 = 19,847,067. OTHER LIABILITIES, 2002 = 11,816,707. OTHER LIABILITIES, 2001 = 7,330,476. Total liabilities, 2002 = 1,754,415,291. Total liabilities, 2001 = 1,716,040,117. COMMITMENTS AND CONTINGENCIES, 2002 = . COMMITMENTS AND CONTINGENCIES, 2001 = . SHAREHOLDERS' EQUITY:, 2002 = . SHAREHOLDERS' EQUITY:, 2001 = . Common stock, $10 par value; authorized 20,000,000 shares;\n12,364,201 and 12,333,252 issued and outstanding at, 2002 = . Common stock, $10 par value; authorized 20,000,000 shares; 12,364,201 and 12,333,252 issued and outstanding at, 2001 = . December 31, 2002 and 2001, respectively, 2002 = 123,642,010. December 31, 2002 and 2001, respectively, 2001 = 123,332,520. Capital surplus, 2002 = 58,087,687. Capital surplus, 2001 = 57,824,061. Retained earnings, 2002 = 45,647,522. Retained earnings, 2001 = 28,375,353. Accumulated other comprehensive earnings, 2002 = 11,390,426. Accumulated other comprehensive earnings, 2001 = 4,122,079. Total shareholders' equity, 2002 = 238,767,645. Total shareholders' equity, 2001 = 213,654,013\nThe accompanying notes are an integral part of these consolidated financial statements.\nF-4\nConsolidated Statements of Earnings\nDecember 31, 2002, 2001 and 2000", + "page_start": 67, + "page_end": 68, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\nNet interest income after provision for loan losses, 2000 = 66,723,803. NONINTEREST INCOME:, 2002 = . NONINTEREST INCOME:, 2001 = . NONINTEREST INCOME:, 2000 = . Trust department income, 2002 = 5,835,909. Trust department income, 2001 = 5,890,600. Trust department income, 2000 = 5,494,246. Service fees on deposit accounts, 2002 = 15,435,137. Service fees on deposit accounts, 2001 = 14,743,217. Service fees on deposit accounts, 2000 = 14,073,514. ATM fees, 2002 = 2,370,313. ATM fees, 2001 = 1,941,508. ATM fees, 2000 = 1,554,437. Real estate mortgage fees, 2002 = 1,858,378. Real estate mortgage fees, 2001 = 1,609,518. Real estate mortgage fees, 2000 = 1,021,590. Net gain on securities transactions, 2002 = 16,373. Net gain on securities transactions, 2001 = 67,789. Net gain on securities transactions, 2000 = 530,097. Other, 2002 = 4,036,366. Other, 2001 = 3,325,858. Other, 2000 = 3,273,445. Total noninterest income, 2002 = 29,552,476. Total noninterest income, 2001 = 27,578,490. Total noninterest income, 2000 = 25,947,329. NONINTEREST EXPENSE:, 2002 = . NONINTEREST EXPENSE:, 2001 = . NONINTEREST EXPENSE:, 2000 = . Salaries and employee benefits, 2002 = 31,992,733. Salaries and employee benefits, 2001 = 28,685,294. Salaries and employee benefits, 2000 = 27,077,436. Net occupancy expense, 2002 = 3,908,856. Net occupancy expense, 2001 = 3,995,597. Net occupancy expense, 2000 = 3,563,289. Equipment expense, 2002 = 4,800,768. Equipment expense, 2001 = 4,457,909. Equipment expense, 2000 = 4,180,782. Printing, stationary and", + "page_start": 68, + "page_end": 68, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "REPORT OF INDEPENDENT AUDITORS\nTo the Board of Directors and Shareholders of\nFirst Financial Bankshares, Inc.\nWe have audited the accompanying consolidated balance sheet of First Financial Bankshares, Inc. (a Texas corporation) and subsidiaries as of December 31, 2002, and the related consolidated statements of earnings, comprehensive earnings, shareholders' equity, and cash flows for the year then ended. These financial statements are the responsibility of the Company's management. Our responsibility is to express an opinion on these financial statements based on our audit. The consolidated financial statements of First Financial Bankshares, Inc. and subsidiaries as of December 31, 2001 and for each of the two years then ended, were audited by other auditors who have ceased operations and whose report dated January 11, 2002, expressed an unqualified opinion on those statements.\nWe conducted our audit in accordance with auditing standards generally accepted in the United States. Those standards require that we plan and perform the audit to obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit includes examining, on a test basis, evidence supporting the amounts and disclosures in the financial statements. An audit also includes assessing the accounting principles used and significant estimates made by management, as well as evaluating the overall financial statement presentation. We believe that our audit provides a reasonable basis for our opinion.\nIn our opinion, the financial statements referred to above present fairly, in all material respects, the financial position of First Financial Bankshares, Inc. and subsidiaries at December 31, 2002, and the consolidated results of their operations and their cash flows for the year then ended in conformity with accounting principles generally accepted in the United States.", + "page_start": 64, + "page_end": 64, + "source_file": "NASDAQ_FFIN_2002.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_FFIN_2002.pdf", + "query": "What was the net income of First Financial Bankshares in 1995 ?", + "target_page": 14, + "target_passage": " 16,355", + "chunk_present": { + "presence": true, + "index": 5 + } + }, + "top_chunk": [ + { + "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\nNet interest income after provision for loan losses, 2000 = 66,723,803. NONINTEREST INCOME:, 2002 = . NONINTEREST INCOME:, 2001 = . NONINTEREST INCOME:, 2000 = . Trust department income, 2002 = 5,835,909. Trust department income, 2001 = 5,890,600. Trust department income, 2000 = 5,494,246. Service fees on deposit accounts, 2002 = 15,435,137. Service fees on deposit accounts, 2001 = 14,743,217. Service fees on deposit accounts, 2000 = 14,073,514. ATM fees, 2002 = 2,370,313. ATM fees, 2001 = 1,941,508. ATM fees, 2000 = 1,554,437. Real estate mortgage fees, 2002 = 1,858,378. Real estate mortgage fees, 2001 = 1,609,518. Real estate mortgage fees, 2000 = 1,021,590. Net gain on securities transactions, 2002 = 16,373. Net gain on securities transactions, 2001 = 67,789. Net gain on securities transactions, 2000 = 530,097. Other, 2002 = 4,036,366. Other, 2001 = 3,325,858. Other, 2000 = 3,273,445. Total noninterest income, 2002 = 29,552,476. Total noninterest income, 2001 = 27,578,490. Total noninterest income, 2000 = 25,947,329. NONINTEREST EXPENSE:, 2002 = . NONINTEREST EXPENSE:, 2001 = . NONINTEREST EXPENSE:, 2000 = . Salaries and employee benefits, 2002 = 31,992,733. Salaries and employee benefits, 2001 = 28,685,294. Salaries and employee benefits, 2000 = 27,077,436. Net occupancy expense, 2002 = 3,908,856. Net occupancy expense, 2001 = 3,995,597. Net occupancy expense, 2000 = 3,563,289. Equipment expense, 2002 = 4,800,768. Equipment expense, 2001 = 4,457,909. Equipment expense, 2000 = 4,180,782. Printing, stationary and", + "page_start": 68, + "page_end": 68, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\nINTEREST INCOME:, 2002 = . INTEREST INCOME:, 2001 = . INTEREST INCOME:, 2000 = . Interest and fees on loans, 2002 = $ 64,609,189. Interest and fees on loans, 2001 = $", + "page_start": 68, + "page_end": 68, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\nConsolidated Statements of Cash Flows\nDecember 31, 2002, 2001 and 2000\nCASH FLOWS FROM OPERATING ACTIVITIES:, 2002 2002 = . CASH FLOWS FROM OPERATING ACTIVITIES:, 2001 2001 = . CASH FLOWS FROM OPERATING ACTIVITIES:, 2000 = . Net earnings, 2002 2002 = $ 33,952,550. Net earnings, 2001 2001 = $ 29,354,505. Net earnings, 2000 = $ 28,316,047. Adjustments to reconcile net earnings to net cash, 2002 2002 = . Adjustments to reconcile net earnings to net cash, 2001 2001 = . Adjustments to reconcile net earnings to net cash, 2000 = . Depreciation and amortization, 2002 2002 = 4,125,655. Depreciation and amortization, 2001 2001 = 5,679,082. Depreciation and amortization, 2000 = 5,502,224. Provision for loan losses, 2002 2002 = 2,369,634. Provision for loan losses, 2001 2001 = 1,964,050. Provision for loan losses, 2000 = 2,397,750. Premium amortization, net of discount accretion, 2002 2002 = 2,077,358. Premium amortization, net of discount accretion, 2001 2001 = 1,662,108. Premium amortization, net of discount accretion, 2000 = 1,359,124. Loss (gain) on sale of assets, 2002 2002 = 42,890. Loss (gain) on sale of assets, 2001 2001 = (52,815). Loss (gain) on sale of assets, 2000 = (540,304). Deferred federal income tax expense (benefit), 2002 2002 = 350,415. Deferred federal income tax expense (benefit), 2001 2001 = (188,982). Deferred federal income tax expense (benefit), 2000 = (304,240). (Increase) decrease in other assets, 2002 2002 = (1,508,089). (Increase) decrease in other assets, 2001 2001 = 3,565,172. (Increase) decrease in other assets, 2000 = (2,567,832). Increase (decrease) in other liabilities, 2002", + "page_start": 71, + "page_end": 71, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "Selected Financial Data\n[3], 1997 = 5.58. Net income [3] [4], 2001 = 2.10. Net income [3] [4], 2000 = 4.34. Net income [3] [4], 1999 = 3.79. Net income [3] [4], 1998 = 4.30. Net income [3] [4], 1997 = 5.58. Dividends declared per common share, 2001 = 1.01. Dividends declared per common share, 2000 = 0.97. Dividends declared per common share, 1999 = 0.92. Dividends declared per common share, 1998 = 0.85. Dividends declared per common share, 1997 = 0.80. Operating Data, 2001 = . Operating Data, 2000 = . Operating Data, 1999 = . Operating Data, 1998 = . Operating Data, 1997 = . Life Operations, 2001 = . Life Operations, 2000 = . Life Operations, 1999 = . Life Operations, 1998 = . Life Operations, 1997 = . Fee income, 2001 = $ 2,633. Fee income, 2000 = $ 2,484. Fee income, 1999 = $ 2,105. Fee income, 1998 = $ 2,100. Fee income, 1997 = $ 1,532. Earned premiums, 2001 = 2,142. Earned premiums, 2000 = 1,886. Earned premiums, 1999 = 1,764. Earned premiums, 1998 = 1,607. Earned premiums, 1997 = 1,505. Assets under management [5], 2001 = 168,421. Assets under management [5], 2000 = 155,053. Assets under management [5], 1999 = 145,407. Assets under management [5], 1998 = 124,528. Assets under management [5], 1997 = 101,952. Mutual fund assets [6], 2001 = 16,809. Mutual fund assets [6], 2000 = 11,432. Mutual fund assets [6], 1999 = 6,374. Mutual fund assets [6], 1998 = 2,506. Mutual fund assets", + "page_start": 32, + "page_end": 32, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "REPORT OF INDEPENDENT AUDITORS\nAs discussed above, the financial statements of First Financial Bankshares, Inc. as of December 31, 2001 and the two years then ended were audited by other auditors who have ceased operations. As described in Note 1, these financial statements have been revised to include the transitional disclosures required by Statement of Financial Accounting Standards No. 142, Goodwill and Other Intangible Assets , which was adopted by the Company as of January 1, 2002. Our audit procedures with respect to the disclosures in Note 1 with respect to 2001 and 2000 included (a) agreeing the previously reported net income to the previously issued financial statements and the adjustments to reported net income representing amortization expense including related tax effects recognized in those periods related to goodwill to the Company's underlying records obtained from management, and (b) testing the mathematical accuracy of the reconciliation of adjusted net income to reported net income, and the related earnings per share amounts. In our opinion, the disclosures for 2001 and 2000 are appropriate. However, we were not engaged to audit, review, or apply any procedures to the 2001 and 2000 financial statements of the Company other than with respect to such disclosures and, accordingly, we do not express an opinion or any other form of assurance on the 2001 and 2000 financial statements taken as a whole.\nErnst & Young LLP\nDallas, Texas January 14, 2003\nF-1", + "page_start": 64, + "page_end": 64, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "IN THOUSANDS EXCEPT PER SHARE DATA\n= 23,254. 1998, Basic Earnings per Share (2) = 1.87. 1998, Cash Dividends per Share (2) = 0.80. 1998, Stock Dividends and Splits = 10% dividend. 1998, Year-End Book Value per Share (2) = 13.62. 1998, Year-End Market Value per Share (2) = 28.00. 1997, Total Assets (1) = 1,573,509. 1997, Shareholders' Equity (1) = 148,226. 1997, Net Income (1) = 20,063. 1997, Basic Earnings per Share (2) = 1.70. 1997, Cash Dividends per Share (2) = 0.70. 1997, Stock Dividends and Splits = 5/4 split. 1997, Year-End Book Value per Share (2) = 12.46. 1997, Year-End Market Value per Share (2) = 31.18. 1996, Total Assets (1) = 1,262,041. 1996, Shareholders' Equity (1) = 131,161. 1996, Net Income (1) = 18,122. 1996, Basic Earnings per Share (2) = 1.58. 1996, Cash Dividends per Share (2) = 0.63. 1996, Stock Dividends and Splits = 5/4 split. 1996, Year-End Book Value per Share (2) = 11.36. 1996, Year-End Market Value per Share (2) = 23.27. 1995, Total Assets (1) = 1,062,325. 1995, Shareholders' Equity (1) = 114,917. 1995, Net Income (1) = 16,355. 1995, Basic Earnings per Share (2) = 1.52. 1995, Cash Dividends per Share (2) = 0.56. 1995, Stock Dividends and Splits = -. 1995, Year-End Book Value per Share (2) = 10.66. 1995, Year-End Market Value per Share (2) = 15.59. 1994, Total Assets (1) = 1,001,906. 1994, Shareholders' Equity (1) = 103,908. 1994, Net Income (1) = 13,112. 1994, Basic Earnings per Share (2) = 1.22. 1994, Cash Dividends per Share (2) = 0.51. 1994, Stock Dividends and Splits", + "page_start": 13, + "page_end": 13, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\n2002 = (9,667,069). Net (decrease) increase in interest-bearing deposits, 2001 2001 = 41,583,909. Net (decrease) increase in interest-bearing deposits, 2000 = (593,942). Net increase (decrease) in securities sold under agreements to repurchase, 2002 2002 = 6,861,927. Net increase (decrease) in securities sold under agreements to repurchase, 2001 2001 = (6,317,292). Net increase (decrease) in securities sold under agreements to repurchase, 2000 = 16,526,625. Common stock transactions:, 2002 2002 = . Common stock transactions:, 2001 2001 = . Common stock transactions:, 2000 = . Acquisition of treasury stock, 2002 2002 = -. Acquisition of treasury stock, 2001 2001 = (315,050). Acquisition of treasury stock, 2000 = (3,925,069). Proceeds of stock issuances, 2002 2002 = 573,116. Proceeds of stock issuances, 2001 2001 = 356,670. Proceeds of stock issuances, 2000 = 161,919. Dividends paid, 2002 2002 = (16,052,983). Dividends paid, 2001 2001 = (13,921,211). Dividends paid, 2000 = (12,543,863). Net cash provided by (used in) financing activities, 2002 2002 = 17,781,678. Net cash provided by (used in) financing activities, 2001 2001 = 62,566,993. Net cash provided by (used in) financing activities, 2000 = (4,611,134). NET (DECREASE) INCREASE IN CASH AND CASH EQUIVALENTS, 2002 2002 = (6,688,569). NET (DECREASE) INCREASE IN CASH AND CASH EQUIVALENTS, 2001 2001 = 22,594,502. NET (DECREASE) INCREASE IN CASH AND CASH EQUIVALENTS, 2000 = (25,439,346). CASH AND CASH EQUIVALENTS, beginning of year, 2002 2002 = 185,125,214 162,530,712. CASH AND CASH EQUIVALENTS, beginning of year, 2001 2001 = . CASH AND CASH EQUIVALENTS, beginning of year, 2000 = 187,970,058. CASH AND CASH EQUIVALENTS, end of year, 2002", + "page_start": 71, + "page_end": 71, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\n2002 = 2,695,533. Increase (decrease) in other liabilities, 2001 2001 = (1,778,326). Increase (decrease) in other liabilities, 2000 = 1,026,945. Total adjustments, 2002 2002 = 10,153,396. Total adjustments, 2001 2001 = 10,850,289. Total adjustments, 2000 = 6,873,667. Net cash provided by operating activities, 2002 2002 = 44,105,946. Net cash provided by operating activities, 2001 2001 = 40,204,794. Net cash provided by operating activities, 2000 = 35,189,714. CASH FLOWS FROM INVESTING ACTIVITIES:, 2002 2002 = . CASH FLOWS FROM INVESTING ACTIVITIES:, 2001 2001 = . CASH FLOWS FROM INVESTING ACTIVITIES:, 2000 = . Net increase in interest-bearing deposits in banks, 2002 2002 = (950,140). Net increase in interest-bearing deposits in banks, 2001 2001 = (1,269,947). Net increase in interest-bearing deposits in banks, 2000 = (100,258). Payment for stock of City Bancshares, Inc., net of cash acquired, 2002 2002 = -. Payment for stock of City Bancshares, Inc., net of cash acquired, 2001 2001 = (6,848,231). Payment for stock of City Bancshares, Inc., net of cash acquired, 2000 = -. Activity in available-for-sale securities:, 2002 2002 = . Activity in available-for-sale securities:, 2001 2001 = . Activity in available-for-sale securities:, 2000 = . Sales, 2002 2002 = 30,077,478. Sales, 2001 2001 = 57,925,815. Sales, 2000 = 530,097. Maturities, 2002 2002 = 814,880,024. Maturities, 2001 2001 = 660,484,725. Maturities, 2000 = 21,660,247. Purchases, 2002 2002 = (972,026,050). Purchases, 2001 2001 = (854,748,980). Purchases, 2000 = (41,804,532). Activity in held-to-maturity securities:, 2002", + "page_start": 71, + "page_end": 71, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\n74,881,682. Interest and fees on loans, 2000 = $ 75,474,661. Interest on investment securities:, 2002 = . Interest on investment securities:, 2001 = . Interest on investment securities:, 2000 = . Taxable, 2002 = 32,263,763. Taxable, 2001 = 32,169,874. Taxable, 2000 = 33,556,796. Exempt from federal income tax, 2002 = 7,042,102. Exempt from federal income tax, 2001 = 6,279,973. Exempt from federal income tax, 2000 = 5,770,861. Interest on federal funds sold and interest-bearing, 2002 = . Interest on federal funds sold and interest-bearing, 2001 = . Interest on federal funds sold and interest-bearing, 2000 = . deposits in banks, 2002 = 946,861. deposits in banks, 2001 = 3,211,316. deposits in banks, 2000 = 3,148,277. Total interest income, 2002 = 104,861,915. Total interest income, 2001 = 116,472,845. Total interest income, 2000 = 117,950,595. INTEREST EXPENSE:, 2002 = . INTEREST EXPENSE:, 2001 = . INTEREST EXPENSE:, 2000 = . Interest on deposits, 2002 = 24,087,911. Interest on deposits, 2001 = 43,970,532. Interest on deposits, 2000 = 47,737,862. Other, 2002 = 291,793. Other, 2001 = 863,480. Other, 2000 = 1,091,180. Total interest expense, 2002 = 24,379,704. Total interest expense, 2001 = 44,834,012. Total interest expense, 2000 = 48,829,042. Net interest income, 2002 = 80,482,211. Net interest income, 2001 = 71,638,833. Net interest income, 2000 = 69,121,553. PROVISION FOR LOAN LOSSES, 2002 = 2,369,634. PROVISION FOR LOAN LOSSES, 2001 = 1,964,050. PROVISION FOR LOAN LOSSES, 2000 = 2,397,750. Net interest income after provision for loan losses, 2002 = 78,112,577. Net interest income after provision for loan losses, 2001 = 69,674,783.", + "page_start": 68, + "page_end": 68, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "General\nFirst Financial Bankshares, Inc., a Texas corporation, is a financial holding company registered under the Bank Holding Company Act of 1956, or BHCA. As such, we are supervised by the Board of Governors of the Federal Reserve System, or Federal Reserve Board, as well as several other state and federal regulators. We were formed as a bank holding company in 1956 under the original name F & M Operating Company, but our banking operations date back to 1890, when Farmers and Merchants National Bank opened for business in Abilene, Texas. By virtue of a series of reorganizations, mergers, and acquisitions since 1956, we now own, through our wholly-owned Delaware subsidiary, First Financial Bankshares of Delaware, Inc., ten banks organized and located in Texas. These ten banks are:\n· First National Bank of Abilene, Abilene, Texas;\n· First National Bank, Sweetwater, Texas;\n· Hereford State Bank, Hereford, Texas;\n1\n· Eastland National Bank, Eastland, Texas;\n· Stephenville Bank and Trust Co., Stephenville, Texas;\n· First Financial Bank, National Association, Cleburne, Texas;\n· San Angelo National Bank, San Angelo, Texas;\n· First Financial Bank, National Association, Southlake, Texas; and\n· Weatherford National Bank, Weatherford, Texas;\n· City National Bank, Mineral Wells, Texas.\nAs described in more detail below, we elected to be treated as a financial holding company in September 2001.\nOur service centers are located primarily in North Central and West Texas. Considering the branches and locations of all our subsidiary banks, as of December 31, 2002, we had 28 financial centers across Texas, with seven locations in Abilene, two locations in Cleburne, two locations in Stephenville, two locations in San Angelo, three locations in Weatherford, and one location each in Mineral Wells, Hereford, Sweetwater, Eastland, Southlake, Aledo, Alvarado, Burleson, Keller, Trophy Club, Roby, and Trent.\nInformation on our revenues, profits and losses and total assets appears in the discussion of our Results of Operations contained in Item 7 hereof.", + "page_start": 28, + "page_end": 29, + "source_file": "NASDAQ_FFIN_2002.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_FFIN_2002.pdf", + "query": "What is the address of the San Angelo National Bank main office ?", + "target_page": 21, + "target_passage": "Main Office 301 W. Beauregard San Angelo, Texas 76903 Chartered 1997 ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Main Office\n301 W. Beauregard San Angelo, Texas 76903 Chartered 1997", + "page_start": 20, + "page_end": 20, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "Branch\n3471 Knickerbocker San Angelo, Texas 76904", + "page_start": 20, + "page_end": 20, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\nRatio = ≥ $ 40,191,000. First National Bank of Abilene, To Be Well Capitalized Under Prompt Corrective Action Provisions:. = ≥ 10%. San Angelo National Bank, Amount = $ 16,039,000. San Angelo National Bank, Ratio = 12%. San Angelo National Bank, For Capital Adequacy Purposes:.Amount = ≥ $ 10,816,000. San Angelo National Bank, For Capital Adequacy Purposes:.Ratio = ≥ 8%. San Angelo National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:.Amount Ratio = ≥ $ 13,520,000. San Angelo National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:. = ≥ 10%. Weatherford National Bank, Amount = $ 19,758,000. Weatherford National Bank, Ratio = 18%. Weatherford National Bank, For Capital Adequacy Purposes:.Amount = ≥ $ 8,802,000. Weatherford National Bank, For Capital Adequacy Purposes:.Ratio = ≥ 8%. Weatherford National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:.Amount Ratio = ≥ $ 11,002,000. Weatherford National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:. = ≥ 10%. Tier I Capital (to Risk-Weighted Assets):, Amount = . Tier I Capital (to Risk-Weighted Assets):, Ratio = . Tier I Capital (to Risk-Weighted Assets):, For Capital Adequacy Purposes:.Amount = . Tier I Capital (to Risk-Weighted Assets):, For Capital Adequacy Purposes:.Ratio = . Tier I Capital (to Risk-Weighted Assets):, To Be Well Capitalized Under Prompt Corrective Action Provisions:.Amount Ratio = . Tier I Capital (to Risk-Weighted Assets):, To Be Well Capitalized Under Prompt Corrective Action Provisions:. = . Consolidated, Amount = $202,507,000. Consolidated, Ratio = 18%. Consolidated, For Capital Adequacy Purposes:.Amount = ≥ $ 43,790,000. Consolidated, For Capital Adequacy Purposes:.Ratio = ≥ 4%. Consolidated, To Be Well Capitalized Under Prompt Corrective Action Provisions:.Amount", + "page_start": 87, + "page_end": 87, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "ITEM 2. PROPERTIES\nOur principal office is located in the First National Bank Building at 400 Pine Street in downtown Abilene, Texas. We lease two spaces in a building owned by First National Bank of Abilene. The lease for approximately 2,300 square feet of space expires December 31, 2004. The lease for approximately 1,100 square feet of space expires May 31, 2006. Our subsidiary banks collectively own 22 banking facilities, some of which are detached drive-ins, and they also lease six banking facilities. Our management considers all of our existing locations to be well-suited for conducting the business of banking. We believe that our existing facilities are adequate to meet our requirements and our subsidiary banks' requirements for the foreseeable future.", + "page_start": 38, + "page_end": 38, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "Main Office\n3205 E. Highway 114 Southlake, Texas 76092 Chartered 1985", + "page_start": 21, + "page_end": 21, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "Main Office\n403 N. Main Cleburne, Texas 76033 Chartered 1927", + "page_start": 16, + "page_end": 16, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\nRatio = $ 32,880,000. First National Bank of Abilene, To Be Well Capitalized Under Prompt Corrective Action Provisions:.Amount Ratio = ≥ 5%. First National Bank of Abilene, To Be Well Capitalized Under Prompt Corrective Action Provisions:. = . San Angelo National Bank, Amount = $ 26,672,000. San Angelo National Bank, Ratio = 9%. San Angelo National Bank, For Capital Adequacy Purposes:.Amount = ≥ $ 8,800,000. San Angelo National Bank, For Capital Adequacy Purposes:.Ratio = ≥ 3%. San Angelo National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:. = ≥. San Angelo National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:.Amount Ratio = $ 14,667,000. San Angelo National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:.Amount Ratio = ≥ 5%. San Angelo National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:. = . Weatherford National Bank, Amount = $ 18,019,000. Weatherford National Bank, Ratio = 9%. Weatherford National Bank, For Capital Adequacy Purposes:.Amount = ≥ $ 5,788,000. Weatherford National Bank, For Capital Adequacy Purposes:.Ratio = ≥ 3%. Weatherford National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:. = ≥. Weatherford National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:.Amount Ratio = $ 9,647,000. Weatherford National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:.Amount Ratio = ≥ 5%. Weatherford National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:. = ", + "page_start": 88, + "page_end": 88, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "TRUST ASSETS in millions\nDavid Byrd San Angelo National Bank\n13\n14", + "page_start": 14, + "page_end": 15, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "Services Offered by Our Subsidiary Banks\nEach of our subsidiary banks is a separate legal entity that operates under the day-to-day management of its own board of directors and officers. Each of our subsidiary banks provides general commercial banking services, which include accepting and holding checking, savings and time deposits, making loans, automated teller machines, drivein and night deposit services, safe deposit facilities, transmitting funds, and performing other customary commercial banking services. Certain of our subsidiary banks also administer pension plans, profit sharing plans and other employee benefit plans. First National Bank of Abilene, First National Bank, Sweetwater, Stephenville Bank and Trust Co. and San Angelo National Bank have active trust departments. The trust departments offer a complete\n2\nrange of services to individuals, associations, and corporations. These services include administering estates, testamentary trusts, various types of living trusts, and agency accounts. In addition, First National Bank of Abilene, First Financial Bank, Cleburne, San Angelo National Bank and First Financial Bank, National Association, Southlake, Texas provide securities brokerage services through arrangements with various third parties.\nWe have filed an application with the office of the Comptroller of the Currency to form a limited purpose national bank under which we will consolidate the management of our current trust departments. The new entity will operate as a subsidiary of our subsidiary holding company, First Financial Bankshares of Delaware, Inc. We believe that with this structure we can more effectively manage our current trust operations and provide trust services to customers of our banks that do not currently have trust departments. We anticipate that the new trust company will begin operations in the latter part of 2003.", + "page_start": 29, + "page_end": 30, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES\nRatio = N/A. Consolidated, To Be Well Capitalized Under Prompt Corrective Action Provisions:. = . First National Bank of Abilene, Amount = $ 65,676,000. First National Bank of Abilene, Ratio = 17%. First National Bank of Abilene, For Capital Adequacy Purposes:.Amount = ≥ $ 31,594,000. First National Bank of Abilene, For Capital Adequacy Purposes:.Ratio = ≥ 8%. First National Bank of Abilene, To Be Well Capitalized Under Prompt Corrective Action Provisions:. = ≥ $ 39,492,000. First National Bank of Abilene, To Be Well Capitalized Under Prompt Corrective Action Provisions:.Amount Ratio = . First National Bank of Abilene, To Be Well Capitalized Under Prompt Corrective Action Provisions:.Amount Ratio = ≥ 10%. First National Bank of Abilene, To Be Well Capitalized Under Prompt Corrective Action Provisions:. = . San Angelo National Bank, Amount = $ 27,945,000. San Angelo National Bank, Ratio = 20%. San Angelo National Bank, For Capital Adequacy Purposes:.Amount = ≥ $ 10,925,000. San Angelo National Bank, For Capital Adequacy Purposes:.Ratio = ≥ 8%. San Angelo National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:. = ≥. San Angelo National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:.Amount Ratio = $ 13,656,000. San Angelo National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:.Amount Ratio = ≥ 10%. San Angelo National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:. = . Weatherford National Bank, Amount = $ 18,931,000. Weatherford National Bank, Ratio = 18%. Weatherford National Bank, For Capital Adequacy Purposes:.Amount = ≥ $ 8,624,000. Weatherford National Bank, For Capital Adequacy Purposes:.Ratio = ≥ 8%. Weatherford National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:. = ≥. Weatherford National Bank, To Be Well Capitalized Under Prompt Corrective Action Provisions:.Amount", + "page_start": 88, + "page_end": 88, + "source_file": "NASDAQ_FFIN_2002.pdf" + } + ] + }, + { + "references": { + "source_file": "news3.pdf", + "query": "What kind of scholarship programs are available to start a financial career?", + "target_page": 1, + "target_passage": "Some are offered directly through colleges and universities that have financial planning degree and certificate programs. Others are available through nonprofits and organizations like the CFP Board Center for Financial Planning", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "3 Great Resources to Kick-Start Your Financial Planning Career\n11/23/2022\n(NewsUSA) - Finding a rewarding career that offers growth potential, work-life balance and the satisfaction of helping others is a key priority for many job seekers. With those goals in mind, a career in financial planning should be a top contender, whether you are just starting out or looking to make a career change. But once you have decided that financial planning is the field for you, how do you get started? Here are three resources that can help you launch a successful financial planning career.\n1. Guide to Careers in Financial Planning. Based on interviews with leading financial services firms, this guide introduces you to the wide range of career opportunities in the financial planning profession. It identifies typical entry points and career tracks, explores the types of companies that hire financial planners and provides information on how to find financial planning career opportunities. It also includes resources such as a list of recommended questions to ask in a job interview.\n2. Scholarship Programs. Dozens of scholarship programs are available to support you on your professional journey. Some are offered directly through colleges and universities that have financial planning degree and certificate programs. Others are available through nonprofits and organizations like the CFP Board Center for Financial Planning, which administers 16 scholarship programs that help pay for the education and exam requirements to become a CERTIFIED FINANCIAL PLANNERTM professional. Financial services firms may offer scholarships or tuition reimbursements to employees to cover the costs of obtaining professional designations and credentials such as CFP® certification -- some of which may be required to advance within the company.\n3. Career Fairs. In-person and virtual career fairs provide valuable opportunities to connect with prospective employers. CFP Board's spring and fall career fairs are some of the most popular hiring events in the profession, with dozens of firms participating in these online exhibitions. Job seekers can visit employers' virtual exhibit booths and view open jobs and internships, apply for open positions and interact with employers through one-on-one video meetings and messaging. You can also visit the CFP Board Career Center to browse current job and internship opportunities in financial planning, as well as a collection of articles providing career guidance.\nOther top resources include career offices at your college or university, financial services companies' career websites and professional organizations that may have a local chapter near you.", + "page_start": 0, + "page_end": 0, + "source_file": "news3.pdf" + }, + { + "text": "Log in\n\nHome / Money / 3 Great Resources to Kick-Start Your Financial Planning Career\nMONEY", + "page_start": 0, + "page_end": 0, + "source_file": "news3.pdf" + }, + { + "text": "3 Great Resources to Kick-Start Your Financial Planning Career\nMaking the most of these resources will not only help you find a financial planning job, but also support your growth and development as a future financial planning professional. To learn more about CFP® certification, visit the CFP Board website.\nArticle Link\nhttps://about.newsusa.com/3-great-resources-to-kick-start-your-financial-planni…\nRELATED ARTICLES\nJun 26, 2023\nFlexibility is Key to a Thriving Retirement\nDec 07, 2022\nPlanning for Winter Expenses Pays Off\nFASHION\nBUSINESS\nINFOGRAPHIC\nENVIRONMENT\nHEALTH\nMONEY\nFOOD\nTRAVEL\nBRIDAL\nRECREATION\nTECHNOLOGY\nHOME\nEDUCATION\nARTS & ENTERTAINMENT\nAUTO\nCHILDREN\nFITNESS\nHOLIDAY\nINSURANCE\nLAWN & GARDEN\nLISTICLE\nNUTRITION\nPARENTING", + "page_start": 0, + "page_end": 1, + "source_file": "news3.pdf" + }, + { + "text": "Scholarships at major universities\nSumitomo Mitsui Banking Corporation (China) Limited Sumitomo Mitsui Banking Corporation (China) Limited established a scholarship program for students of Zhejiang established a scholarship program for students of Zhejiang\nUniversity, Shanghai Inter University, Shanghai International Studies University, national Studies University, Sun Yat-sen University, Sun Yat-sen University, and other universities. and other universities.\nScholarship students at Sun Yat-sen University", + "page_start": 14, + "page_end": 14, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "Financial education through teaching of investment skills\nSMBC Friend Securities runs an online SMBC Friend Securities runs an online education program, 'You education program, 'You · You Toshi' You Toshi' (Self-composed Investment), for (Self-composed Investment), for inexperiinexperienced investors. enced investors.\nThe service is free and includes a training The service is free and includes a training program that can be used as a tool for program that can be used as a tool for lifelong study of investment skills. lifelong study of investment skills.\nSumitomo Mitsui Financial Group CSR Report\nSpecific Examples of CSR Activities", + "page_start": 8, + "page_end": 9, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "iv) Available-for-sale financial assets\nAvailable-for-sale financial assets are non-derivative financial assets that are either designated as such or that are not classified in any of the other categories. They comprise investments in the equity of other entities where there is neither a fixed maturity nor fixed determinable payments.", + "page_start": 65, + "page_end": 65, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "FINANCIAL STRENGTH\n$\nmillion", + "page_start": 4, + "page_end": 4, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "CATEGORIES\nHow Financial Planners Can Feb 23, 2023\nAdvance Equality\nOct 31, 2022\n4 Tax-Smart Strategies for Your Charitable Giving\nJan 12, 2023\nSpending and Saving Strategies for 2023\nOct 27, 2022\nHow to Find a Financial Planner\nPETS\nSEASONAL\nSENIORS\nSPANISH\nTIPS AND HOW TO\nENTERTAINMENT\nCAREER\nCOMMUNITY\nFAMILY\nTIPS\nINTERNET\nHUMAN_INTEREST\nBEAUTY\nARTS\nREALESTATE\nSAFETY\nMEDICINE\nBOOK_REVIEW\nRECIPE\nAFRICAN_AMERICANS\nHOW_TO\nBYLINED_COLUMN\nCHARITY\nSPORTS\nHOME_IMPROVEMENT\nTECH\nWELLNESS\nARTS AND ENTERTAINMENT\nFOOD & DRINK\nREAL_ESTATE\nVETERANS\nOUTDOORS\nREAL ESTATE\nHUMAN INTEREST\nMONEY & FINANCE\nFASHION & BEAUTY\nMONEY AND FINANCE\nBOOKS & ENTERTAINMENT\nBOOKS\nARTS & ENTERTAINMENT\n01, 1 = School Choice Combines Nature And Nuture for Success. 02, 1 = Think Outside the (Gift) Box, Contribute to a 529 Plan. 03, 1 = Black Friday Bonanza-Don't Miss These Hot Gifts. 04, 1 = Self-Publishing Helps Parents Share New Books with Kids. 05, 1 = Five Tips to Safely Manage Medications. 06, 1 = Self-care on Your Schedule with Mental Wellness App", + "page_start": 1, + "page_end": 3, + "source_file": "news3.pdf" + }, + { + "text": "Financial Information\n- 54 -", + "page_start": 55, + "page_end": 55, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "(9) Liquidity and Availability of Financial Assets\nThe Foundation's financial assets available for general expenditure within one year of the balance sheet date, June 30, 2024 and 2023, are as follows:\nCash and cash equivalents, 2024 = $ 82,845,159. Cash and cash equivalents, 2023 = 75,808,401. Current contributions receivable, 2024 = 856,657. Current contributions receivable, 2023 = -. Short-term investments, 2024 = 116,074,763. Short-term investments, 2023 = 132,216,667. Total financial assets, 2024 = 199,776,579. Total financial assets, 2023 = 208,025,068. Less:, 2024 = . Less:, 2023 = . Restricted by donors for programs, 2024 = 5,696,323. Restricted by donors for programs, 2023 = 5,882,673. Donations payable to Wikimedia Endowment, 2024 = 525,607. Donations payable to Wikimedia Endowment, 2023 = 5,274,448. Financial assets available to meet cash needs for general expenditures within one year, 2024 = $ 193,554,649. Financial assets available to meet cash needs for general expenditures within one year, 2023 = 196,867,947\nThe Foundation's liquidity management includes a policy of structuring its financial assets to be available to meet its general expenditures, liabilities, grant-making, and other obligations as they come due. Cash and cash equivalents as reported on the consolidated balance sheet at June 30, 2024 and 2023, are the primary liquid resources used by the Foundation to meet these obligations. Financial assets invested in the short-term and long-term investments can be liquidated at any time as needed.", + "page_start": 18, + "page_end": 18, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + } + ] + }, + { + "references": { + "source_file": "news3.pdf", + "query": "what are career fairs for?", + "target_page": 1, + "target_passage": " In-person and virtual career fairs provide valuable opportunities to connect with prospective employers.", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "For example:\n'I would like to apply for the position of Graphic Designer, as advertised in the Career Times on 1 March 2015.'\nIf possible, mention a mutual contact or acquaintance.\n'Samantha Stevens mentioned that you are looking for an experienced Graphic Designer with a keen interest in the fashion industry.'", + "page_start": 46, + "page_end": 46, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "3 Great Resources to Kick-Start Your Financial Planning Career\n11/23/2022\n(NewsUSA) - Finding a rewarding career that offers growth potential, work-life balance and the satisfaction of helping others is a key priority for many job seekers. With those goals in mind, a career in financial planning should be a top contender, whether you are just starting out or looking to make a career change. But once you have decided that financial planning is the field for you, how do you get started? Here are three resources that can help you launch a successful financial planning career.\n1. Guide to Careers in Financial Planning. Based on interviews with leading financial services firms, this guide introduces you to the wide range of career opportunities in the financial planning profession. It identifies typical entry points and career tracks, explores the types of companies that hire financial planners and provides information on how to find financial planning career opportunities. It also includes resources such as a list of recommended questions to ask in a job interview.\n2. Scholarship Programs. Dozens of scholarship programs are available to support you on your professional journey. Some are offered directly through colleges and universities that have financial planning degree and certificate programs. Others are available through nonprofits and organizations like the CFP Board Center for Financial Planning, which administers 16 scholarship programs that help pay for the education and exam requirements to become a CERTIFIED FINANCIAL PLANNERTM professional. Financial services firms may offer scholarships or tuition reimbursements to employees to cover the costs of obtaining professional designations and credentials such as CFP® certification -- some of which may be required to advance within the company.\n3. Career Fairs. In-person and virtual career fairs provide valuable opportunities to connect with prospective employers. CFP Board's spring and fall career fairs are some of the most popular hiring events in the profession, with dozens of firms participating in these online exhibitions. Job seekers can visit employers' virtual exhibit booths and view open jobs and internships, apply for open positions and interact with employers through one-on-one video meetings and messaging. You can also visit the CFP Board Career Center to browse current job and internship opportunities in financial planning, as well as a collection of articles providing career guidance.\nOther top resources include career offices at your college or university, financial services companies' career websites and professional organizations that may have a local chapter near you.", + "page_start": 0, + "page_end": 0, + "source_file": "news3.pdf" + }, + { + "text": "Organizational S tructure and Talent\nThe industry is competitive in attracting and retaining a skilled workforce. Losing certain employees or changes in morale due to a restructuring or other event could affect our revenue and profitability in certain circumstances.", + "page_start": 80, + "page_end": 80, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "In a career context, good language skills can also:\n· Affect your credibility. Poor grammar indicates to a prospective employer that you are sloppy, while flawless grammar indicates that you pay attention to detail.\n· Improve your relationships with your co- workers. If you are able to express yourself clearly, you can eliminate the confusion and misunderstanding that often leads to conflict.\n· Increase your chances of being promoted.\n· Help you to create a good impression.\n· Improve your ability to persuade others (which is a valuable skill in the working world).\nBasic English Language Skills", + "page_start": 4, + "page_end": 5, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "The eco japan cup: 'A Contest for Unearthing and Growing Seeds of New Businesses'\nThe Eco-Products exhibition, held each The Eco-Products exhibition, held each December, is one of Japan December, is one of Japan's largest envis largest environmental exhibitions. Under it, SMFG held ronmental exhibitions. Under it, SMFG held the SMFG Environmental Business Forum, the SMFG Environmental Business Forum, a unique event to which the whole SMFG a unique event to which the whole SMFG Group contributed. Group contributed.\nThe SMFG Environmental Business Forum The SMFG Environmental Business Forum enables encounters and information enables encounters and information exchange in the field of environmental exchange in the field of environmental business. SMFG and its Group companies business. SMFG and its Group companies provide various platforms, including business provide various platforms, including business matching events, stands and catalogue matching events, stands and catalogue exhibitions, and lectures and seminars, exhibitions, and lectures and seminars, with the aim of giving new business with the aim of giving new business opportunities to companies and other opportunities to companies and other organizations that are considering entering organizations that are considering entering the environmental business, expanding the environmental business, expanding their marketing channels within it, or just their marketing channels within it, or just gathering information. gathering information.\nEnvironmental business matching\nSMBC jointly organizes the 'eco japan cup,' an SMBC jointly organizes the 'eco japan cup,' an environmental business contest, together with environmental business contest, together with the Ministry of the Environment, the Ministry the Ministry of the Environment, the Ministry of Internal Affairs and of Internal Affairs and Communi Communications, cations, the Ministry of Land, Infrastructure,h e Ministr y of L and, Infrastructure, Tr ans Transport and Tourism, Development Bank of port and Tourism, Development Bank of Japan Inc. and Environmental Business Japan Inc. and Environmental Business Women. The competition has four major Women. The competition has four major categories - business, culture, lifestyle, and categories - business, culture, lifestyle, and policy-making. policy-making.", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "An offer to help with the transition.\nOnly include this if you are sincere, and don't make any promises that you won't be able to keep. You could, for example, assure your employer that you will finish your current projects or hand them over to a colleague. You could also offer to train the person who will be replacing you.", + "page_start": 49, + "page_end": 49, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "Example:\n'I have been offered an opportunity to work as an IT Manager abroad, and I have decided to accept the offer.'\n'I would like to thank you for the wonderful opportunities you have given me, both to develop my skills, and to work with such knowledgeable and inspiring people.'", + "page_start": 49, + "page_end": 49, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "Social Contribution Activities\nSMFG as a corporate citizen: Working to create a prosperous society for all", + "page_start": 13, + "page_end": 13, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "Career development handbook for young mothers\nSMBC has compiled a career development handbook covering maternity leave for all women employees wishing to strike a better balance between work and family life. It provides pathways for mothers pursuing careers, citing answers by women who have been through this experience to questions such as 'What do I need to do to return to work?' and 'How do I go about arranging nursery school?' It also includes preparatory exercises for expectant mothers and support lectures on child-raising leave after they return to the workplace.\n21\nCSR REPORT 2011\nCSR REPORT 2011\n22\nSumitomo Mitsui Financial Group CSR Report", + "page_start": 10, + "page_end": 11, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "Visibility with Cloud Event Management\nYou can visualize and manage multiple clusters when you install Event Management. By using Event Management, you can consolidate information from your monitoring systems and address problems. Events indicate that something occurred on an application, service, or another monitored object.\nAll events that are related to a single application or particular cluster are correlated with an incident. Event Management can receive events from various monitoring sources (on-premises or in the cloud). Event Management is installed along with IBM Cloud App Management.", + "page_start": 65, + "page_end": 66, + "source_file": "sg248459.pdf" + } + ] + }, + { + "references": { + "source_file": "news3.pdf", + "query": "What are the priorities for job seekers ?", + "target_page": 1, + "target_passage": " Finding a rewarding career that offers growth potential, work-life balance and the satisfaction of helping others is a key priority for many job seekers.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Second Paragraph\nMention your qualifications, skills and experience, and relate them to the needs of the company. Give relevant examples of how you have used your skills in the past to perform similar tasks and responsibilities to those set out in the job description.", + "page_start": 46, + "page_end": 46, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "For example:\n'I would like to apply for the position of Graphic Designer, as advertised in the Career Times on 1 March 2015.'\nIf possible, mention a mutual contact or acquaintance.\n'Samantha Stevens mentioned that you are looking for an experienced Graphic Designer with a keen interest in the fashion industry.'", + "page_start": 46, + "page_end": 46, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "Fourth paragraph\nMention any documents or attachments that you have included with your cover letter, and state your availability for an interview.", + "page_start": 46, + "page_end": 46, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "An offer to help with the transition.\nOnly include this if you are sincere, and don't make any promises that you won't be able to keep. You could, for example, assure your employer that you will finish your current projects or hand them over to a colleague. You could also offer to train the person who will be replacing you.", + "page_start": 49, + "page_end": 49, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "Third Paragraph\nExplain why you want to work for this organisation in particular. Where relevant, explain any gaps in your CV. If you don't have the required academic qualifications, for example, you can explain how your practical work experience makes up for it.", + "page_start": 46, + "page_end": 46, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "First Paragraph\nIntroduce yourself, and explain why you are writing the letter. If you are responding to a job advertisement, state which advertisement you are responding to, and indicate where you found it.", + "page_start": 46, + "page_end": 46, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "Training\n· Draft employment contracts\n· Ensure safekeeping of employment contracts\nDeveloped for Oxbridge Academy\n· Establish staff training needs\n· Establish skills gaps\n· Take responsibility for succession planning\nBasic English Language Skills", + "page_start": 29, + "page_end": 30, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "Your reason for leaving.\nYou don't need to elaborate on this if you don't want to. Remember to keep it positive, and not to make any rude, offensive or insulting remarks about the organisation or your co- workers, no matter how tempting it might be.\nBasic English Language Skills", + "page_start": 48, + "page_end": 49, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "Occupation\nRefers to your current job (if you are employed). If you are unemployed, you can simply write 'unemployed' or 'not applicable'.", + "page_start": 22, + "page_end": 22, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "2.4 Nomination Committee\nThe role, responsibilities and membership requirements of the Nomination Committee are documented in the Board Guidelines and in a separate Charter, approved by the Board.\nUnder the Board Guidelines, it is the responsibility of the Nomination Committee to devise the criteria for, and review membership of, and nominations to, the Board. The primary criteria adopted in selection of suitable Board candidates is their capacity to contribute to the ongoing development of the Company having regard to the location and nature of the Company's significant business interests and to the candidates' age and experience by reference to the attributes of existing Board members.\nWhen a Board vacancy exists or where it is considered that the Board would benefit from the services of a new Director with particular skills, the Nomination Committee has responsibility for proposing candidates for consideration by the Board and, where appropriate, engages the services of external consultants.\nPrior to appointment, each Director is provided with a letter of appointment which encloses a copy of the Company's Constitution and of the relevant policies. Additionally, the expectations of the Board in\nrespect to a proposed appointee to the Board and the workings of the Board and its Committees are conveyed in interviews with the Chairman and induction procedures include access to appropriate executives in relation to details of the business of the Company.\nThe Chairman of the Board is the Chairman of the Nomination Committee. The current members of the Nomination Committee, all of whom are independent non-executive Directors, are Mr S Gerlach (Chairman), Mr P C Barnett and Mr G W McGregor.", + "page_start": 31, + "page_end": 32, + "source_file": "ASX_STO_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf", + "query": "What does ShareAlike mean in terms of licencing ?", + "target_page": 1, + "target_passage": "adaptations based on this work must be licensed under the same license.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "FOUR ELEMENTS\nBY (\"Attribution\"): users must credit the author of the work they are using.\nSA (\"ShareAlike\"): adaptations based on this work must be licensed under the same license.\nNC (\"NonCommercial\"): the work is only available to be used for noncommercial purposes.\nND (\"NoDerivative\"): reusers making cannot share adaptations of the work.", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "SIX LICENSES\nCC BY (\"Attribution\") allows people to use the work for any purpose (even commercially and even in modified form) as long as they give attribution to the creator.\nCC BY-SA (\"Attribution-ShareAlike\") allows people to use the work for any purpose (even commercially and even in modified form), as long as they give attribution to the creator and make any adaptations they share with others available under the same or a compatible license.\nCC BY-NC (\"Attribution-NonCommercial\") allows people to use the work for noncommercial purposes only, and only as long as they give attribution to the creator.\nCC BY-NC-SA (\"Attribution-NonCommercial-ShareAlike\") allows people to use the work for noncommercial purposes only, and only as long as they give attribution to the creator and make any adaptations they share with others available under the same or a compatible license.\nCC BY-ND (\"Attribution-NoDerivative\") allows people to use the unadapted work for any purpose (even commercially), as long as they give attribution to the creator.\nCC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the unadapted work for noncommercial purposes only, and only as long as they give attribution to the licensor.", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "1.1 Licensing\nThis document is freely available under the Creative Commons Attribution-ShareAlike 4.0 International Public License. I typically distribute it as a PDF but if you want to make your own version send me an email and I will send you the Word version. For details on licensing see:\nhttps://creativecommons.org/licenses/by-sa/4.0/legalcode", + "page_start": 4, + "page_end": 4, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "Share Rights Held by Key Management Personnel\nnumber = -. Performance, Share Rights.Forfeited % = -. Performance, Share Rights.Financial year that rights may vest = 2015\nDirect or s' Report\ncontinued\nu\nDirectors' Report", + "page_start": 60, + "page_end": 61, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Capacity licensing\nCapacity licensing is a licensing model that licenses features with a price-per-terabyte model. Licensed features are FlashCopy, Metro Mirror, Global Mirror, and virtualization. See also 'FlashCopy' on page 776, 'Metro Mirror' on page 780, and 'Virtualization' on page 787.", + "page_start": 793, + "page_end": 793, + "source_file": "sg247938.pdf" + }, + { + "text": "Understanding\nbefore licensing your work", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "(m) Revenue recognition\nE u ronet recognizes revenue at the point at which the service is perf o rmed. Revenues from software licensing agreement contracts are recognized on a percentage of completion basis whereby a pro-rata portion of revenue and related costs are recognized as the work p ro g resses. Revenues from software licensing agreement contracts re p resenting newly released products deemed to have a higher than n o rmal risk of failure during installation are recognized on a completed contract basis whereby revenues and related costs are deferre d until the contract is complete.", + "page_start": 32, + "page_end": 32, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "THREE-LAYER DESIGN\nCreative Commons (CC) license has three layers:\n\"Legal Code\" (base layer): contains terms and conditions to be used by lawyers and legally applicable in court.\n\"Human Readable\" (commons deeds): contain the summary of the legal code and key terms.\n\"Machine Readable\": contains HTML or codes for machines to recognize a work is available under a Creative Commons license.", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "About Us\nCreative Commons (CC) is the global nonprofit organization behind the CC Licenses and public domain tools, which power open sharing on popular platforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. Since 2002, the CC Licenses have served as an alternative to traditional copyright, providing a simple, standardized, and legal way for individuals and institutions to freely share images, music, research, educational resources, and cultural artifacts.", + "page_start": 1, + "page_end": 1, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "What Is Creative Commons?\nCreative Commons is a global nonprofit organization dedicated to supporting an open and accessible Internet that is enriched with free knowledge and creative resources for people around the world to use, share, and cultivate.\nOur easy-to-use licenses provide a simple, standardized way to give the public permission to share and use your creative work - on conditions of your choice. CC licenses let you change your copyright terms from the default of 'all rights reserved' to 'some rights reserved.'\nMillions of people use CC licenses on some of the world's most popular platforms for user-generated content. When you use a CC license to share your photos, videos, or blog, your creation joins a globally accessible pool of resources that includes the work of artists, educators, scientists, and governments.\nCreative Commons has waived all copyright and related or neighboring rights to this guide using the CC0 Public Domain Dedication.\nPublic domain works are valuable because anyone can freely build upon, enhance, and reuse them for any purposes without restriction under copyright or database law.\nThat's why it's important for creators to have a clear and legally robust way to place their works in the public domain as completely as possible, and it's also important for publishers and archives to have a standardized way to identify works that are already in the public domain.\nCreative Commons supports two distinct public domain tools, the CC0 Public Domain Dedication and the Public Domain Mark . Creative Commons copyright licenses help authors manage their copyright on terms they choose. Conversely, CC0 enables authors and copyright owners who want to dedicate their works to the worldwide public domain to do so, and PDM facilitates the labeling and discovery of works that are already free of known copyright restrictions.", + "page_start": 0, + "page_end": 0, + "source_file": "Publicdomain.pdf" + } + ] + }, + { + "references": { + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf", + "query": "What is the most restricive Creative Common licence ?", + "target_page": 1, + "target_passage": "CC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the unadapted work for noncommercial purposes only, and only as long as they give attribution to the licensor.", + "chunk_present": { + "presence": true, + "index": 7 + } + }, + "top_chunk": [ + { + "text": "About Us\nCreative Commons (CC) is the global nonprofit organization behind the CC Licenses and public domain tools, which power open sharing on popular platforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. Since 2002, the CC Licenses have served as an alternative to traditional copyright, providing a simple, standardized, and legal way for individuals and institutions to freely share images, music, research, educational resources, and cultural artifacts.", + "page_start": 1, + "page_end": 1, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "NOW, SHARE YOUR WORK!\nhttps://creativecommons.org/choose/\nTexts are adapted from CC Certification for Educators. CC BY license.\nBY, SA, NC, ND icons, CC BY, CC BY-SA, CC BY-NC, CC BY-NC-SA, CC BY-ND, and CC BY-NC-ND buttons are trademark of Creative Commons, and subject to their policies. 3-layer design of CC license image is taken from CC Certification for Educators. CC BY license. Line, icons, and gradients are from Canva, and subject to their policies.\nBY\nSA\nND\nNC", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "THREE-LAYER DESIGN\nCreative Commons (CC) license has three layers:\n\"Legal Code\" (base layer): contains terms and conditions to be used by lawyers and legally applicable in court.\n\"Human Readable\" (commons deeds): contain the summary of the legal code and key terms.\n\"Machine Readable\": contains HTML or codes for machines to recognize a work is available under a Creative Commons license.", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "FOUR ELEMENTS\nBY (\"Attribution\"): users must credit the author of the work they are using.\nSA (\"ShareAlike\"): adaptations based on this work must be licensed under the same license.\nNC (\"NonCommercial\"): the work is only available to be used for noncommercial purposes.\nND (\"NoDerivative\"): reusers making cannot share adaptations of the work.", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "Creative Commons makes sharing easy", + "page_start": 0, + "page_end": 0, + "source_file": "Publicdomain.pdf" + }, + { + "text": "What Is Creative Commons?\nCreative Commons is a global nonprofit organization dedicated to supporting an open and accessible Internet that is enriched with free knowledge and creative resources for people around the world to use, share, and cultivate.\nOur easy-to-use licenses provide a simple, standardized way to give the public permission to share and use your creative work - on conditions of your choice. CC licenses let you change your copyright terms from the default of 'all rights reserved' to 'some rights reserved.'\nMillions of people use CC licenses on some of the world's most popular platforms for user-generated content. When you use a CC license to share your photos, videos, or blog, your creation joins a globally accessible pool of resources that includes the work of artists, educators, scientists, and governments.\nCreative Commons has waived all copyright and related or neighboring rights to this guide using the CC0 Public Domain Dedication.\nPublic domain works are valuable because anyone can freely build upon, enhance, and reuse them for any purposes without restriction under copyright or database law.\nThat's why it's important for creators to have a clear and legally robust way to place their works in the public domain as completely as possible, and it's also important for publishers and archives to have a standardized way to identify works that are already in the public domain.\nCreative Commons supports two distinct public domain tools, the CC0 Public Domain Dedication and the Public Domain Mark . Creative Commons copyright licenses help authors manage their copyright on terms they choose. Conversely, CC0 enables authors and copyright owners who want to dedicate their works to the worldwide public domain to do so, and PDM facilitates the labeling and discovery of works that are already free of known copyright restrictions.", + "page_start": 0, + "page_end": 0, + "source_file": "Publicdomain.pdf" + }, + { + "text": "Permissively licensed works\nthepublicindex.org/docs/amended_settlement/Supplemental_memorandum_oflaw.pdf.\nIn the EU, the 2019 Copyright Directive introduced specific provisions on the \"use of out-of-commerce 17 works and other subject matter by cultural heritage institutions\" (Articles 8-11 CDSMD). These provisions allow cultural heritage institutions to \"make available, for non-commercial purposes, out-ofcommerce works or other subject matter permanently in their collections\". The limitation to noncommercial purposes means that works made available under these provisions would be of limited use in building a books data commons.\nFor one assessment of the difficulties of complying with the CC licenses in this context, to the extent 18 they are applicable, see Lee, K., A. Feder Cooper, & Grimmelmann, J. (2023). Talkin' 'Bout AI Generation: Copyright and the Generative AI Supply Chain. Forthcoming, Journal of the Copyright Society 2024. https://doi.org/10.2139/ssrn.4523551.\nTowards a Books Data Commons for AI Training\n9", + "page_start": 9, + "page_end": 9, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "SIX LICENSES\nCC BY (\"Attribution\") allows people to use the work for any purpose (even commercially and even in modified form) as long as they give attribution to the creator.\nCC BY-SA (\"Attribution-ShareAlike\") allows people to use the work for any purpose (even commercially and even in modified form), as long as they give attribution to the creator and make any adaptations they share with others available under the same or a compatible license.\nCC BY-NC (\"Attribution-NonCommercial\") allows people to use the work for noncommercial purposes only, and only as long as they give attribution to the creator.\nCC BY-NC-SA (\"Attribution-NonCommercial-ShareAlike\") allows people to use the work for noncommercial purposes only, and only as long as they give attribution to the creator and make any adaptations they share with others available under the same or a compatible license.\nCC BY-ND (\"Attribution-NoDerivative\") allows people to use the unadapted work for any purpose (even commercially), as long as they give attribution to the creator.\nCC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the unadapted work for noncommercial purposes only, and only as long as they give attribution to the licensor.", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "Anna Tumadóttir, CEO\nThe first CC License was created in 2002. Today, we boast six CC Licenses and two public domain tools, setting a global standard for sharing.", + "page_start": 3, + "page_end": 3, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "1.1 Licensing\nThis document is freely available under the Creative Commons Attribution-ShareAlike 4.0 International Public License. I typically distribute it as a PDF but if you want to make your own version send me an email and I will send you the Word version. For details on licensing see:\nhttps://creativecommons.org/licenses/by-sa/4.0/legalcode", + "page_start": 4, + "page_end": 4, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + } + ] + }, + { + "references": { + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf", + "query": "In which case CC licence can't be used ?", + "target_page": 1, + "target_passage": "fair use, fair dealing, or some other limitation and exception to copyright applies the the work.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "CC LICENSE CAN'T BE USED FOR …\nfair use, fair dealing, or some other limitation and exception to copyright applies the the work.", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "REMIND THAT…\nCC license only applicable to the work that is within the scope of copyright law. CC license can be used when …\nyou want to give others permissions to freely copy and redistribute your work, and\nyou want to give others permission to freely transform, alter, or otherwise create derivative works based on your work.", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "THREE-LAYER DESIGN\nCreative Commons (CC) license has three layers:\n\"Legal Code\" (base layer): contains terms and conditions to be used by lawyers and legally applicable in court.\n\"Human Readable\" (commons deeds): contain the summary of the legal code and key terms.\n\"Machine Readable\": contains HTML or codes for machines to recognize a work is available under a Creative Commons license.", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "SIX LICENSES\nCC BY (\"Attribution\") allows people to use the work for any purpose (even commercially and even in modified form) as long as they give attribution to the creator.\nCC BY-SA (\"Attribution-ShareAlike\") allows people to use the work for any purpose (even commercially and even in modified form), as long as they give attribution to the creator and make any adaptations they share with others available under the same or a compatible license.\nCC BY-NC (\"Attribution-NonCommercial\") allows people to use the work for noncommercial purposes only, and only as long as they give attribution to the creator.\nCC BY-NC-SA (\"Attribution-NonCommercial-ShareAlike\") allows people to use the work for noncommercial purposes only, and only as long as they give attribution to the creator and make any adaptations they share with others available under the same or a compatible license.\nCC BY-ND (\"Attribution-NoDerivative\") allows people to use the unadapted work for any purpose (even commercially), as long as they give attribution to the creator.\nCC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the unadapted work for noncommercial purposes only, and only as long as they give attribution to the licensor.", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "What is the di/fference between CC0 and the Public Domain Mark?\nCC0 ('CC Zero') is intended for use only by authors or holders of copyright and related rights (including database rights), in connection with works that are still subject to those rights in one or more countries.\nWhen CC0 is applied to a work, copyright and related rights are relinquished worldwide, making the work free from those restrictions to the greatest extent possible.\nThe Public Domain Mark (PDM) is used to label works that are already free of known copyright restrictions. Unlike CC0, PDM doesn't change the copyright status of a work.\nPDM can be used by anyone, and is intended for use with works that are already free of known copyright restrictions throughout the world.", + "page_start": 0, + "page_end": 0, + "source_file": "Publicdomain.pdf" + }, + { + "text": "Permissively licensed works\nthepublicindex.org/docs/amended_settlement/Supplemental_memorandum_oflaw.pdf.\nIn the EU, the 2019 Copyright Directive introduced specific provisions on the \"use of out-of-commerce 17 works and other subject matter by cultural heritage institutions\" (Articles 8-11 CDSMD). These provisions allow cultural heritage institutions to \"make available, for non-commercial purposes, out-ofcommerce works or other subject matter permanently in their collections\". The limitation to noncommercial purposes means that works made available under these provisions would be of limited use in building a books data commons.\nFor one assessment of the difficulties of complying with the CC licenses in this context, to the extent 18 they are applicable, see Lee, K., A. Feder Cooper, & Grimmelmann, J. (2023). Talkin' 'Bout AI Generation: Copyright and the Generative AI Supply Chain. Forthcoming, Journal of the Copyright Society 2024. https://doi.org/10.2139/ssrn.4523551.\nTowards a Books Data Commons for AI Training\n9", + "page_start": 9, + "page_end": 9, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "ALSO FOR …\nthe work that is already in the Public Domain.\nFor those who want to waive their rights from copyright protection, use CC0 (\"CC Zero\").", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "The CC0 Public Domain Dedication\nUse this universal tool if you are a holder of copyright or database rights, and wish to waive all your rights to the work worldwide.\nBy using CC0, you waive all copyright and related rights together with all associated claims and causes of action with respect to this work to the extent possible under the law.\nApplying CC0 to your work is easy. Simply visit the CC0 chooser (http://creativecommons.org/choose/zero) which will lead you through the process. When completed, you will be provided with HTML code that you can copy and paste into your website.\nYou let others copy, modify, distribute, and perform the work, even for commercial purposes, all without asking permission.\nWorks marked with the Public Domain Mark have been identified as being free of known restrictions under copyright law, including all related and neighboring rights. Anyone can copy, modify, distribute, and perform such works, even for commercial purposes, all without asking permission.\nApplying the PDM to a work is easy. Simply visit the PDM chooser (http://creativecommons.org/choose/mark) which will lead you through the proces. When completed, you will be provided with the HTML code that you can copy and paste into your website.\nCreative Commons does not recommend this tool for works that are restricted by copyright laws in one or more jurisdictions. Consult with your legal advisor if you are unsure whether you should use the PDM for a certain work.", + "page_start": 0, + "page_end": 0, + "source_file": "Publicdomain.pdf" + }, + { + "text": "What Is Creative Commons?\nCreative Commons is a global nonprofit organization dedicated to supporting an open and accessible Internet that is enriched with free knowledge and creative resources for people around the world to use, share, and cultivate.\nOur easy-to-use licenses provide a simple, standardized way to give the public permission to share and use your creative work - on conditions of your choice. CC licenses let you change your copyright terms from the default of 'all rights reserved' to 'some rights reserved.'\nMillions of people use CC licenses on some of the world's most popular platforms for user-generated content. When you use a CC license to share your photos, videos, or blog, your creation joins a globally accessible pool of resources that includes the work of artists, educators, scientists, and governments.\nCreative Commons has waived all copyright and related or neighboring rights to this guide using the CC0 Public Domain Dedication.\nPublic domain works are valuable because anyone can freely build upon, enhance, and reuse them for any purposes without restriction under copyright or database law.\nThat's why it's important for creators to have a clear and legally robust way to place their works in the public domain as completely as possible, and it's also important for publishers and archives to have a standardized way to identify works that are already in the public domain.\nCreative Commons supports two distinct public domain tools, the CC0 Public Domain Dedication and the Public Domain Mark . Creative Commons copyright licenses help authors manage their copyright on terms they choose. Conversely, CC0 enables authors and copyright owners who want to dedicate their works to the worldwide public domain to do so, and PDM facilitates the labeling and discovery of works that are already free of known copyright restrictions.", + "page_start": 0, + "page_end": 0, + "source_file": "Publicdomain.pdf" + }, + { + "text": "Training in how to use CC Licenses is key to their adoption.\nWe offer a ten-week CC Certificate program that is now tailored not only to the education and library sectors, but also galleries, archives, libraries, and museums and available in 10 languages .\nAs of 2023, we've certified:\n1,705 Graduates\n65 Countries", + "page_start": 4, + "page_end": 4, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_RSG_2004.pdf", + "query": "In how many regions the Republic Services operations are organized ?", + "target_page": 9, + "target_passage": "As of December 31, 2004, our operations were organized into five regions whose boundaries may change from time to time: Eastern, Central, Southern, Southwestern and Western.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Notice of Annual Meeting\nThe Annual Meeting of Stockholders of Republic Services, Inc. will be held at 10:30 a.m., May 12, 2005, at 110 SE 6th Street, 7th Floor Atrium, Fort Lauderdale, Florida 33301\nIn Billions of Dollars", + "page_start": 1, + "page_end": 1, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "Corporate Headquarters\n110 SE 6th Street, 28th Floor, Fort Lauderdale, Florida 33301 Phone: (954) 769-2400 · Fax: (954) 769-2664 · www.republicservices.com\n©2005, RITM, LLC\nRepublic Services and Republic Services, Inc. names and logos are service marks of RITM, LLC", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "AWS cloud infrastructure\nAWS provides services across the globe. You only need to understand how regions, availability zones, and data centers are related so that you can select a region. You will see the region code in URLs and Amazon Resource Names (ARNs), unique identifiers for AWS resources.", + "page_start": 16, + "page_end": 16, + "source_file": "serverless-core.pdf" + }, + { + "text": "Independent Certified\nRepublic Services, Inc. 110 SE 6th Street, Suite 2800 Fort Lauderdale, Florida 33301 Phone: (954) 769-2400 www.republicservices.com\nInvestor Relations Republic Services, Inc. 110 SE 6th Street, Suite 2800 Fort Lauderdale,Florida 33301 Phone: (954) 769-3616\nINCOME BEFORE CUMULATIVE EFFECT OF CHANGES IN ACCOUNTING PRINCIPLES In Millions of Dollars\nDILUTED EARNINGS PER SHARE BEFORE CUMULATIVE EFFECT OF CHANGES IN ACCOUNTING PRINCIPLES In Dollars", + "page_start": 1, + "page_end": 1, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "Regions\nEvery solution you build that runs in the AWS cloud will be deployed to at least one region.\n· Region - a physical location around the world where we cluster data centers\n· Availability Zone or \"AZ\" - one or more discrete data centers with redundant power, networking, and connectivity within a Region\n· Data center - a physical location that contains servers, data storage drives, and network equipment\nAWS cloud infrastructure\n13\nServerless\nDeveloper Guide\nAmazon has many regions all across the globe. Inside each region, there are one or more Availability Zones located tens of miles apart. The distance is near enough for low latency the gap between requesting and receiving a response, and far enough to reduce the chance that multiple zones are affected if a disaster happens.\nEach region is identified by a code, such as \"us-west-1\", \"us-east-1\" or \"eu-west-2\". Within each region, the multiple isolated locations known as Availability Zones or AZs are identified with the region code followed by a letter identifier. For example, us-east-1a . AWS handles deploying to multiple availability zones within a region for resilience.", + "page_start": 16, + "page_end": 17, + "source_file": "serverless-core.pdf" + }, + { + "text": "REPORT OF INDEPENDENT REGISTERED PUBLIC ACCOUNTING FIRM ON THE FINANCIAL STATEMENTS\nWe also have audited, in accordance with the standards of the Public Company Accounting Oversight Board (United States), the eÅectiveness of Republic Services, Inc.'s internal control over Ñnancial reporting as of December 31, 2004, based on criteria established in Internal Control Ì Integrated Framework issued by the Committee of Sponsoring Organizations of the Treadway Commission and our report dated February 24, 2005, expressed an unqualiÑed opinion thereon.\n/s/ ERNST & YOUNG LLP CertiÑed Public Accountants\nFort Lauderdale, Florida February 24, 2005\n51", + "page_start": 58, + "page_end": 58, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "REPORT OF INDEPENDENT REGISTERED PUBLIC ACCOUNTING FIRM ON THE FINANCIAL STATEMENTS\nThe Board of Directors and Stockholders of Republic Services, Inc.:\nWe have audited the accompanying consolidated balance sheets of Republic Services, Inc. and subsidiaries as of December 31, 2004 and 2003, and the related consolidated statements of income, stockholders' equity, and cash Öows for the three years in the period ended December 31, 2004. Our audits also included the Ñnancial statement schedule listed in the Index at Item 15(a). These Ñnancial statements and schedule are the responsibility of the Company's management. Our responsibility is to express an opinion on these Ñnancial statements and schedule based on our audits.\nWe conducted our audits in accordance with the standards of the Public Company Accounting Oversight Board (United States). Those standards require that we plan and perform the audit to obtain reasonable assurance about whether the Ñnancial statements are free of material misstatement. An audit includes examining, on a test basis, evidence supporting the amounts and disclosures in the Ñnancial statements. An audit also includes assessing the accounting principles used and signiÑcant estimates made by management, as well as evaluating the overall Ñnancial statement presentation. We believe that our audits provide a reasonable basis for our opinion.\nIn our opinion, the Ñnancial statements referred to above present fairly, in all material respects, the consolidated Ñnancial position of Republic Services, Inc. and subsidiaries at December 31, 2004 and 2003, and the consolidated results of their operations and their cash Öows for each of the three years in the period ended December 31, 2004 in conformity with U.S. generally accepted accounting principles. Also, in our opinion, the related Ñnancial statement schedule, when considered in relation to the basic Ñnancial statements taken as a whole, presents fairly in all material respects the information set forth therein.\nAs discussed in Note 1 to the Ñnancial statements, in 2003 Republic Services, Inc. changed its method of accounting for Ñnal capping, closure and post-closure costs relating to its landÑlls and for methane gas collection systems.", + "page_start": 58, + "page_end": 58, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "REPORT OF INDEPENDENT REGISTERED PUBLIC ACCOUNTING FIRM ON INTERNAL CONTROL OVER FINANCIAL REPORTING\nThe Board of Directors and Stockholders of Republic Services, Inc.:\nWe have audited management's assessment, included in the accompanying Report of Management on Republic Services, Inc.'s Internal Control Over Financial Reporting, that Republic Services, Inc. and subsidiaries maintained eÅective internal control over Ñnancial reporting as of December 31, 2004, based on criteria established in Internal Control Ì Integrated Framework issued by the Committee of Sponsoring Organizations of the Treadway Commission (the COSO criteria). Republic Services, Inc.'s management is responsible for maintaining eÅective internal control over Ñnancial reporting and for its assessment of the eÅectiveness of internal control over Ñnancial reporting. Our responsibility is to express an opinion on management's assessment and an opinion on the eÅectiveness of the company's internal control over Ñnancial reporting based on our audit.\nWe conducted our audit in accordance with the standards of the Public Company Accounting Oversight Board (United States). Those standards require that we plan and perform the audit to obtain reasonable assurance about whether eÅective internal control over Ñnancial reporting was maintained in all material respects. Our audit included obtaining an understanding of internal control over Ñnancial reporting, evaluating management's assessment, testing and evaluating the design and operating eÅectiveness of internal control, and performing such other procedures as we considered necessary in the circumstances. We believe that our audits provide a reasonable basis for our opinion.\nA company's internal control over Ñnancial reporting is a process designed to provide reasonable assurance regarding the reliability of Ñnancial reporting and the preparation of Ñnancial statements for external purposes in accordance with generally accepted accounting principles. A company's internal control over Ñnancial reporting includes those policies and procedures that (1) pertain to the maintenance of records that, in reasonable detail, accurately and fairly reÖect the transactions and dispositions of the assets of the company; (2) provide reasonable assurance that transactions are recorded as necessary to permit preparation of Ñnancial statements in accordance with generally accepted accounting principles, and that receipts and expenditures of the company are being made only in accordance with authorizations of management and directors of the company; and (3) provide reasonable assurance regarding prevention or timely detection of unauthorized acquisition, use, or disposition of the company's assets that could have a material eÅect on the Ñnancial statements.", + "page_start": 59, + "page_end": 59, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "10. SEGMENT INFORMATION\nEastern Region ÏÏÏÏÏÏÏÏÏ $, Gross Revenue = 648.6. Eastern Region ÏÏÏÏÏÏÏÏÏ $, Intercompany Revenue(b) = $(103.2). Eastern Region ÏÏÏÏÏÏÏÏÏ $, Net Revenue = $ 545.4. Eastern Region ÏÏÏÏÏÏÏÏÏ $, Depreciation, Amortization, Depletion and Accretion(c) = $ 43.8. Eastern Region ÏÏÏÏÏÏÏÏÏ $, Operating Income = $ 80.0. Eastern Region ÏÏÏÏÏÏÏÏÏ $, Capital Expenditures(d) = $ 51.4. Eastern Region ÏÏÏÏÏÏÏÏÏ $, Total Assets = $ 878.5. Central Region ÏÏÏÏÏÏÏÏÏ, Gross Revenue = 700.9. Central Region ÏÏÏÏÏÏÏÏÏ, Intercompany Revenue(b) = (156.6). Central Region ÏÏÏÏÏÏÏÏÏ, Net Revenue = 544.3. Central Region ÏÏÏÏÏÏÏÏÏ, Depreciation, Amortization, Depletion and Accretion(c) = 79.4. Central Region ÏÏÏÏÏÏÏÏÏ, Operating Income = 100.9. Central Region ÏÏÏÏÏÏÏÏÏ, Capital Expenditures(d) = 84.9. Central Region ÏÏÏÏÏÏÏÏÏ, Total Assets = 1,083.6. Southern RegionÏÏÏÏÏÏÏÏ, Gross Revenue = 751.9. Southern RegionÏÏÏÏÏÏÏÏ, Intercompany Revenue(b) = (79.6). Southern RegionÏÏÏÏÏÏÏÏ, Net Revenue = 672.3. Southern RegionÏÏÏÏÏÏÏÏ, Depreciation, Amortization, Depletion and Accretion(c) = 66.7. Southern RegionÏÏÏÏÏÏÏÏ, Operating Income = 110.8. Southern RegionÏÏÏÏÏÏÏÏ, Capital Expenditures(d) = 71.4. Southern RegionÏÏÏÏÏÏÏÏ, Total Assets = 879.3. Southwestern Region ÏÏÏÏ, Gross Revenue = 342.1. Southwestern Region ÏÏÏÏ, Intercompany Revenue(b) = (33.0). Southwestern Region ÏÏÏÏ, Net Revenue = 309.1. Southwestern Region ÏÏÏÏ, Depreciation, Amortization, Depletion and Accretion(c) = 30.6. Southwestern Region ÏÏÏÏ, Operating Income = 41.2. Southwestern Region ÏÏÏÏ, Capital Expenditures(d) = 24.7. Southwestern Region ÏÏÏÏ, Total Assets = 405.3. Western Region ÏÏÏÏÏÏÏÏ, Gross Revenue = 788.4. Western Region", + "page_start": 87, + "page_end": 87, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "Operating Strategy\n, Decentralized Management Structure. We maintain a relatively small corporate headquarters staÅ, relying on a decentralized management structure to minimize administrative overhead costs and to manage our day-to-day operations more eÇciently. Our local management has extensive industry experience in growing, operating and managing solid waste companies and has substantial experience in their local geographic markets. In early 2001, we added a sales, maintenance and operations manager to each of our regional management teams, which previously consisted of a regional vice president and a regional controller. We believe that strengthening our regional management teams allows us to more eÅectively and eÇciently drive our company's initiatives and helps ensure consistency throughout our organization. Our regional management teams and our area presidents have extensive authority, responsibility and autonomy for operations within their respective geographic markets. Compensation for regional and area management teams is primarily based on the improvement in operating income produced and the free cash Öow and return on invested capital generated in each manager's geographic area of responsibility. In addition, through long-term incentive programs, including stock options, we believe we have one of the lowest turnover levels in the industry for our local management teams. As a result of retaining experienced managers with extensive knowledge of and involvement in their local communities, we are proactive in anticipating our customers' needs and adjusting to changes in our markets. We also seek to implement the best practices of our various regions and areas throughout our operations to improve operating margins.", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_RSG_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_MGM_2004.pdf", + "query": "What was one of the seminal moment of 2004 for MGM MIRAGE ?", + "target_page": 12, + "target_passage": "The announcement of the merger between MGM MIRAGE and Mandalay Resort Group was one of the seminal moments of 2004", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "MGM MIRAGE 2004 ANNUAL REPORT", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "DEFINING MOMENTS OF MGM MIRAGE\n96 19\nTHE NEW YORK-NEW YORK SKYLINE BECOMES\nA TOWERING PRESENCE IN THE PORTFOLIO. We acquired Primadonna Resorts to gain full ownership of the spectacular New York-New York as well as three hotel-casinos on the Nevada state line and two championship golf courses.\nIT ALL BEGINS WITH MGM GRAND. MGM Grand, the largest hotel-casino in the world, opened to great fanfare. 'The City of Entertainment' redefined the urban resort and provided the foundation for our company's momentous growth.\nBELLAGIO ADDS A JEWEL TO THE FAMILY CROWN. The Mirage Resorts merger provided outstanding resorts, people and land, and has propelled our earnings and provided an unparalleled platform for future growth.", + "page_start": 3, + "page_end": 4, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "TO OUR SHAREHOLDERS\nBELLAGIO underwent a significant expansion during 2004 resulting in the opening of the Spa Tower and several important new amenities at this AAA Five Diamond property. Bellagio remains Las Vegas' first and only hotel-casino to receive this prestigious recognition. These new additions add dimension and depth to the world-famous experience awaiting guests at Bellagio.\nMGM GRAND LAS VEGAS completed a transformation, begun in 2003, of its food and beverage and entertainment offerings. MGM Grand is one of the must-see attractions of Las Vegas, with Cirque du Soleil's newest production, KA ' TM , and several of the Strip's finest restaurants and hottest nightspots. 18 .0 %\nTI 's transformation was no less extensive, as the property's management team conceived and implemented a program to enliven the property with new restaurants and nightlife.\nTHE MIRAGE was the site of a revolution in Las Vegas' history as the venerable buffet was given new life as a top dining establishment, Cravings. Others may follow this lead, but The Mirage was the first property to breathe new life into what remained of the last bastion of 'old' Las Vegas.", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "2004 Revenue Mix\nCasino\nRooms\nFood & Beverage\nEntertainment, Retail,\n& Other\nSKYLOFTS MGM Grand A private sanctuary of sleek, elegant two-story accommodations, offering discerning guests the quintessential loft environment - harmonizing design, décor, ambiance and unparalleled vistas.\nBELLAGIO SPA Unique design elements, combined with an international array of innovative treatments and specially trained therapists, provide the ultimate indulgent experience.\nTEATRO MGM Grand A new genre of Las Vegas nightlife where European club influences permeate. DJs spin jazz/ house throughout the evening, giving way to an energetic after-hours vibe with live catwalk entertainment.\nKÀ The most spectacular production ever, by a troupe renowned for its pageantry. Cirque du Soleil's KÀ debuted at a new theatre at MGM Grand in the fourth quarter of 2004.\nWhat exactly is a defining moment? Try a multi-billion dollar project centered in the heart of Las Vegas.\nwide array of community needs. From homeless shelters to after-school programs, MGM MIRAGE employees have generously donated more than $8 million since 2001.\nYour company also sets aside a portion of its profits each year to be given to important programs intended to build stronger communities. Since 2001, your company has given more than $18 million to support such programs.", + "page_start": 7, + "page_end": 8, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "ACHIEVING MOMENTOUS RESULTS\nJAMES J. MURREN President, CFO & Treasurer\nGAMAL AZIZ President, MGM Grand\nGLENN BONNER Senior VP & CIO, MGM MIRAGE Information Systems\nGEORGE R. BOYER III President, MGM Grand Detroit\nJOSEPH BRUNINI President, MGM Grand Resorts National Marketing\nJEFF DAHL President, Beau Rivage\no some, momentum is intangible - a product of fortune, a power that cannot be harnessed, and typically a short-lived sensation. Others wonder how they lost their momentum. At MGM MIRAGE, we are constantly thinking of better ways to maximize it. We believe momentum is a product of effort and excellence, a force which can be observed and measured, and something that can be a lasting and defining quality of a great company. Our 2004 results are a clear reminder of the power of moving forward. Our financial policies have long been designed to create and maintain momentum. By investing in our best assets and thinking of new ways to add value to our shareholders, we are able to redefine our Company's place in history every year - and 2004 was a defining time even by our exacting standards. T\nSo how did we get here? Last year, we discussed the importance of focus, and the laser-like precision with which we operated our resorts in 2004 affirms the power of our single-minded dedication to excellence. The hard work of our 40,000 employees resulted in a record year in almost every regard. Net revenues increased 10% over 2003 to a record $4.2 billion, with 12% REVPAR growth at our Las Vegas resorts; property-level EBITDA was an all-time record, nearly $1.5 billion, and 23% higher than the prior year. We exceeded the expectations of every market observer, and significantly beat our forecasts. And 2004 will not be a zenith year for your company - rather, we expect to continue our excellent operating performance, re-invest the resulting cash flow to stimulate future growth and move forward to new defining moments.\nHow do we re-define a company that is already at the top of its industry? First, we continue to execute on our vision for our existing resorts - to continually evolve and increase the 'Wow!' factor for our guests. This strategy requires investment, and we will ensure that our resorts are not only world-class, but best-in-class. Examples include the beautiful Spa Tower at Bellagio and KÀ , the latest spectacular creation in collaboration with Cirque du Soleil.", + "page_start": 23, + "page_end": 23, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "Defining Momentum for Our Industry\nThe gaming industry in America is maturing, and international expansion, while exciting in select markets, remains challenging. As a result, your company has pursued a growth strategy that calls for maximizing the assets we currently own and seeking prudent development opportunities and strategic acquisitions.\nUpon completion of our merger with Mandalay, MGM MIRAGE will be the world's leading gaming and leisure company. The combination will result in a wellcapitalized company uniquely situated to invest in its current portfolio in addition to creating new projects in the United States and around the world.\nWe believe this is an outstanding transaction for the shareholders of both companies. With this acquisition, we will own, operate and have investments\nin 28 properties throughout Nevada, Mississippi, Illinois, Michigan, and New Jersey.\nThe combined company will have an asset portfolio which includes some of the most widely recognized brand names in the world. These properties cater to a broad customer base, ranging from value-oriented to the ultrahigh end. Each resort provides a unique customer experience through its specific personality and combination of amenities.\nFIX BELLAGIO Classic American fare using the freshest fish, meat, and poultry cooked to order on a wood-burning grill. Costa Rican Padouk wood inspires a warm environment in a unique, vibrant design.\nWe also will have at Mandalay Bay the fifth largest convention center in the United States, providing the company with a great resource to further develop the business travel and convention market.\nBut the bricks and mortar tell only part of the story of this transaction. At the heart of Mandalay is its people. Mandalay employees at all levels are energetic and talented and will be a tremendous asset to us. Together, we will become a family in excess of 70,000 people committed to delivering the best possible experiences for our guests. The transaction also will create unparalleled opportunities for our entire family of employees.\nIn short, this groundbreaking transaction creates unstoppable momentum for all stakeholders in the MGM MIRAGE family.", + "page_start": 6, + "page_end": 6, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "NOTE 1 - ORGANIZATION\nMGM MIRAGE (the 'Company'), formerly MGM Grand, Inc., is a Delaware corporation, incorporated on January 29, 1986. As of December 31, 2004 approximately 58% of the outstanding shares of the Company's common stock were owned by Tracinda Corporation, a Nevada corporation wholly owned by Kirk Kerkorian. MGM MIRAGE acts largely as a holding company and, through wholly-owned subsidiaries, owns and/or operates casino resorts.\nThe Company owns and operates the following casino resorts on the Las Vegas Strip in Las Vegas, Nevada: Bellagio, MGM Grand Las Vegas, The Mirage, Treasure Island ('TI'), New York-New York and the Boardwalk Hotel and Casino. The Company owns a 50% interest in the joint venture that owns and operates the Monte Carlo Resort & Casino, also located on the Las Vegas Strip.\nThe Company owns three resorts in Primm, Nevada at the California/Nevada state line - Whiskey Pete's, Buffalo Bill's and the Primm Valley Resort - as well as two championship golf courses located near the resorts. The Company also owns Shadow Creek, an exclusive world-class golf course located approximately ten miles north of its Las Vegas Strip resorts.\nThe Company, through its wholly owned subsidiary, MGM Grand Detroit, Inc., and its local partners formed MGM Grand Detroit, LLC, to develop a hotel, casino and entertainment complex in Detroit, Michigan. MGM Grand Detroit, LLC operates a casino in an interim facility in downtown Detroit. See Note 10 for discussion of the revised development agreement with the City of Detroit and plans for a permanent casino resort.\nThe Company owns and operates Beau Rivage, a beachfront resort located in Biloxi, Mississippi. The Company also owns a 50% interest in a limited liability company that owns Borgata, a casino resort at Renaissance Pointe, located in the Marina area\nof Atlantic City, New Jersey. Boyd Gaming Corporation owns the other 50% of Borgata and also operates the resort. Borgata opened in July 2003. The Company owns approximately 95 developable acres adjacent to Borgata, a portion of which consists of common roads, landscaping and master plan improvements which the Company designed and developed as required under the agreement with Boyd.", + "page_start": 55, + "page_end": 55, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "ACHIEVING MOMENTOUS RESULTS\nRecently, we opened the SKYLOFTS, a new level of luxury for guests atop MGM Grand Las Vegas.\nWe'll follow the success of these new resort features with a category-defining new nightclub at The Mirage, two fabulous restaurants by Joël Robuchon at MGM Grand Las Vegas and gaming upgrades company-wide. Second, we are doubling down on Las Vegas by merging with Mandalay, a company we have long admired. The Mandalay merger represents a tremendous opportunity to build on the momentum established by Mike Ensign and his team. And third, we are dreaming of a not-so-distant future, when\nAL FACCINTO President, MGM MIRAGE International Marketing\nALAN FELDMAN Senior VP Public Affairs, MGM MIRAGE\nBRUCE GEBHARDT Senior VP, MGM MIRAGE Global Security\nWILLIAM J. HORNBUCKLE President & COO, MGM MIRAGE Europe\nPHYLLIS JAMES Senior VP & Senior Counsel, MGM MIRAGE\nProject CityCenter will literally redefine the Las Vegas Strip and change the face of Las Vegas forever.", + "page_start": 24, + "page_end": 24, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "Defining Momentum for Las Vegas\nOur merger agreement with Mandalay Resort Group and our plans to develop Project CityCenter on the Las Vegas Strip are among the most significant announcements in Las Vegas history. As this fabled city begins its second hundred years, MGM MIRAGE is positioned like no other company to take advantage of unsurpassed growth opportunities in the most dynamic gaming and entertainment market in the world.\nProject CityCenter will uniquely re-position Las Vegas like no other project before it. Far more than simply another casino-hotel, Project CityCenter encompasses a\nBELLAGIO SPA TOWER The quintessential luxury hotel is now even more opulent. This expansion includes 928 rooms and suites, 80,000 square feet of convention space, retail outlets, and restaurants.\nmyriad of elements that will propel Las Vegas into a new generation of urban sophistication.\nWhile additional details of this extraordinary development will come in the months ahead, I am pleased to tell you that we have secured the services of the internationally acclaimed architect Cesar Pelli to design our anchor resort at the heart of Project CityCenter.\nCesar Pelli & Associates has worked with corporate, government and private clients to design major public spaces, museums, airports, research centers, performing arts centers, academic buildings, hotels, office and residential towers and mixed-use projects.\nThe work of Cesar Pelli is not constrained by a personal style or a signature that would limit his architecture; instead, it celebrates the unique characteristics of each project. Using this approach, he has designed several exceptional buildings in the United States and abroad.\nWe are very excited about our partnership with Mr. Pelli and his colleagues and believe they will deliver for MGM MIRAGE and the residents of Southern Nevada a building of iconic stature around the world.\nSHIBUYA MGM GRAND Designed by superstar team Yabu Pushelberg, Shibuya features stellar sushi and the widest sake selection this side of the Pacific, all served in a sleek, airy ambiance.\nCRAVINGS THE MIRAGE The zenith of all-you-can-eat. Designed by Adam Tihany, Cravings boasts 11 cooking stations, a street of unique restaurants, and an array of temptations in what's unquestionably the ultimate buffet dining experience.\nJ. TERRENCE LANNI Chairman & Chief Executive Officer", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "To the Board of Directors and Stockholders of MGM MIRAGE\nIn our opinion, such consolidated financial statements present fairly, in all material respects, the financial position of the Company as of December 31, 2004 and 2003, and the results of its operations and its cash flows for each of the three years in the period ended December 31, 2004, in conformity with accounting principles generally accepted in the United States of America.\nWe have also audited, in accordance with the standards of the Public Company Accounting Oversight Board (United States), the effectiveness of the Company's internal control over financial reporting as of December 31, 2004, based on the criteria established in Internal Control-Integrated Framework issued by the Committee of Sponsoring Organizations of the Treadway Commission and our report dated March 10, 2005 expressed an unqualified opinion on management's assessment of the effectiveness of the Company's internal control over financial reporting and an unqualified opinion on the effectiveness of the Company's internal control over financial reporting.\nLas Vegas, Nevada March 10, 2005\n41\n42", + "page_start": 50, + "page_end": 51, + "source_file": "NYSE_MGM_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_MGM_2004.pdf", + "query": " What are the most significant piece of undeveloped land remaining on the Las Vegas Strip ?", + "target_page": 21, + "target_passage": "W RESIDENTIAL In lofts, brown stones and high-rise buildings, residential options abound to populate the new city and ener gize the surrounding areas. e have been working for some time on con ceiving the best use of the 66 acres between Monte Carlo and Bellagio, the most significant piece of undeveloped land remaining on the Las Vegas Strip.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "SETTING THE FUTURE IN MOTION\nRESIDENTIAL In lofts, brownstones and high-rise buildings, residential options abound to populate the new city and energize the surrounding areas.\nENTERTAINMENT From street performers to Broadway shows, our entertainment will evoke the best of New York or London.\ne have been working for some time on conceiving the best use of the 66 acres between Monte Carlo and Bellagio, the most significant piece of undeveloped land remaining on the Las Vegas Strip. We certainly could have come up with a spectacular casino-hotel. But, the truth is, Las Vegas is ready for so much more. W\nAs the city eclipses two million residents on its way to passing three million by the end of the decade, and with land prices on the Strip soaring, it has become clear that there is a much better and higher use for this location. As Las Vegas marks its Centennial, Project CityCenter stands as a defining moment for development in this fabled city.\nProject CityCenter represents a new era of the urban complex, one that encompasses tourism, entertainment, gaming, retail and residential elements. Only MGM MIRAGE has the momentum - financially, intellectually and professionally - to effectively develop such a project.\nThe signature building within Project CityCenter is the 4,000-room hotel-casino. The internationally acclaimed architect Cesar Pelli has been commissioned to design this iconic structure. Pelli's initial concept drawing defines a new generation of urban landscape for the Las Vegas Strip, one which includes gaming at its economic center but not as an emotional centerpiece.\nProject CityCenter will provide the momentum for the next era of amazing growth for your company and Las Vegas.\nTHE SITE Located in the heart of the Las Vegas Strip, Project CityCenter will dwarf every development that preceded it. Its 66 acres will include a 4,000-room hotel-casino and three boutique hotels.", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "Future Developments\nProject CityCenter. In November 2004, we announced a plan to develop a multibillion dollar urban metropolis, initially called Project CityCenter, on 66 acres of land on the Las Vegas Strip, between Bellagio and Monte Carlo. We anticipate that the first phase of Project CityCenter will include a 4,000-room casino resort, three 400-room boutique hotels, approximately 550,000 square feet of retail shops, dining and entertainment venues, and 1,650 units of luxury condominium, hotel/condominium and private residence clubs.\nWe expect that the complete design work for Project CityCenter will take 18 months and that the first phase will open in 2009. The design, budget and schedule of Project CityCenter are still preliminary however, and the ultimate timing, cost and scope of Project CityCenter are subject to risks attendant to large-scale projects.\nAtlantic City, New Jersey. We own approximately 130 acres on Renaissance Pointe in Atlantic City, New Jersey. In addition, Borgata occupies 29 acres at Renaissance Pointe, including 27 acres it owns and two acres we lease to Borgata. Of the remaining land, approximately 95 acres are suitable for development, and a portion of these acres consists of common roads, landscaping and master plan improvements which we designed and developed as required by our agreement with Boyd.\nBorgata is currently expanding its gaming and non-gaming amenities, adding 36 casino table games and 600 slot machines, along with additional restaurant, entertainment and other amenities. This project is expected to be completed in 2006. Additionally, Borgata has plans to add another hotel tower featuring 800 guest rooms, suites and resort condominiums, along with a new spa, parking garage and meeting rooms. This project is expected to be completed in 2007. Neither project is expected to require contributions from us, as existing operating cash flow and Borgata's recently renegotiated bank credit facility is anticipated to provide for the cost of the expansions.\nIn October 2002, we announced the suspension of our development activities on our wholly-owned project on the Renaissance Pointe land in Atlantic City. We must apply for and receive numerous governmental permits and satisfy other conditions before construction of a new resort on the Renaissance Pointe site could begin. No assurance can be given that we will develop a casino resort in New Jersey, or its ultimate schedule, size, configuration or cost if we do develop a casino resort.", + "page_start": 38, + "page_end": 38, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "BORGATA CHANGES THE FACE OF ATLANTIC CITY.\nBorgata is launched in Atlantic City with our joint-venture partner Boyd Gaming. Borgata has been a tremendous success, raising the bar for casino entertainment in that market.\n20\n03\nMANDALAY RESORT GROUP AND MGM MIRAGE ANNOUNCE MERGER. Mandalay Resort Group will add iconic resorts and great people to our family. We will own 832 acres in the heart of Las Vegas, the fastest growing city in the United States.\n09 20\n02", + "page_start": 4, + "page_end": 5, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "Defining Momentum for Las Vegas\nOur merger agreement with Mandalay Resort Group and our plans to develop Project CityCenter on the Las Vegas Strip are among the most significant announcements in Las Vegas history. As this fabled city begins its second hundred years, MGM MIRAGE is positioned like no other company to take advantage of unsurpassed growth opportunities in the most dynamic gaming and entertainment market in the world.\nProject CityCenter will uniquely re-position Las Vegas like no other project before it. Far more than simply another casino-hotel, Project CityCenter encompasses a\nBELLAGIO SPA TOWER The quintessential luxury hotel is now even more opulent. This expansion includes 928 rooms and suites, 80,000 square feet of convention space, retail outlets, and restaurants.\nmyriad of elements that will propel Las Vegas into a new generation of urban sophistication.\nWhile additional details of this extraordinary development will come in the months ahead, I am pleased to tell you that we have secured the services of the internationally acclaimed architect Cesar Pelli to design our anchor resort at the heart of Project CityCenter.\nCesar Pelli & Associates has worked with corporate, government and private clients to design major public spaces, museums, airports, research centers, performing arts centers, academic buildings, hotels, office and residential towers and mixed-use projects.\nThe work of Cesar Pelli is not constrained by a personal style or a signature that would limit his architecture; instead, it celebrates the unique characteristics of each project. Using this approach, he has designed several exceptional buildings in the United States and abroad.\nWe are very excited about our partnership with Mr. Pelli and his colleagues and believe they will deliver for MGM MIRAGE and the residents of Southern Nevada a building of iconic stature around the world.\nSHIBUYA MGM GRAND Designed by superstar team Yabu Pushelberg, Shibuya features stellar sushi and the widest sake selection this side of the Pacific, all served in a sleek, airy ambiance.\nCRAVINGS THE MIRAGE The zenith of all-you-can-eat. Designed by Adam Tihany, Cravings boasts 11 cooking stations, a street of unique restaurants, and an array of temptations in what's unquestionably the ultimate buffet dining experience.\nJ. TERRENCE LANNI Chairman & Chief Executive Officer", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "SOON, A SPECTACULAR NEW CITY WILL RISE.\nProject CityCenter - an ambitious multi-dimensional urban plan - will contribute to the remarkable transformation of Las Vegas as an emerging city of global significance.\n20\n00\n04 20", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "The Next Moment - A City is Born\nWhat makes a great city? Las Vegas has long been recognized as the leisure capital of the world. The resorts in our valley have been the innovative leaders in the hospitality industry and have driven the tremendous growth in visitor volume, high occupancy rates and surging food, beverage, entertainment and gaming volumes. But there is another Las Vegas - a community of two million residents on its way to three million by the end of the decade. Las Vegas is leading the U.S. migration to the Southwest. Our newcomers are attracted by the lifestyle, weather, cost of living and economic opportunity. Many have come from cities in the East, West and Midwest and take elements of established communities for granted, such as medical, educational and cultural excellence and diversity.\nThe people of Las Vegas today have great aspirations and\nexpect and demand more of our community. We are a city without a proper city, and that is about to change. Ambitious plans are underway to revitalize Downtown Las Vegas, centered around a beautiful performing arts center and an academic medical center; UNLV is in the midst of a major capital campaign to enhance the Midtown section of Las Vegas; and your company has embarked on the most comprehensive project to date - Project CityCenter, at the heart of the Las Vegas Strip.\nThe Las Vegas Strip has no sense of city now - but we believe it can. The future of Las Vegas is centered around our great resorts and our future development. There are many reasons we believe Project CityCenter is the right project for our Las Vegas Strip development. We believe there is a social imperative that Las Vegas mature as a city, not just a conglomeration of suburbs. A city deserves a center - a center for living, working and playing. We want to be an integral part in defining the Las Vegas of the future.\nAnd there is a business motivation. Companies in the gaming industry have historically not been valued on par with other hospitality companies and mixed-use real estate companies. We plan to break out of the gaming mold, and define a company based on extensive holdings in multiple businesses. Project CityCenter will include major residential, retail and entertainment components. We will partner with boutique\nSCOTT SIBELLA President, TI\nhotel, retail and residential companies, companies previously serving only major urban hubs. And CityCenter will ensure the greatest possible return on our investment on this Las Vegas Strip land.", + "page_start": 25, + "page_end": 26, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "TO OUR SHAREHOLDERS\nBELLAGIO underwent a significant expansion during 2004 resulting in the opening of the Spa Tower and several important new amenities at this AAA Five Diamond property. Bellagio remains Las Vegas' first and only hotel-casino to receive this prestigious recognition. These new additions add dimension and depth to the world-famous experience awaiting guests at Bellagio.\nMGM GRAND LAS VEGAS completed a transformation, begun in 2003, of its food and beverage and entertainment offerings. MGM Grand is one of the must-see attractions of Las Vegas, with Cirque du Soleil's newest production, KA ' TM , and several of the Strip's finest restaurants and hottest nightspots. 18 .0 %\nTI 's transformation was no less extensive, as the property's management team conceived and implemented a program to enliven the property with new restaurants and nightlife.\nTHE MIRAGE was the site of a revolution in Las Vegas' history as the venerable buffet was given new life as a top dining establishment, Cravings. Others may follow this lead, but The Mirage was the first property to breathe new life into what remained of the last bastion of 'old' Las Vegas.", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "RESULTS OF OPERATIONS\nAt December 31, 2004, our operations consisted of 11 wholly-owned casino resorts and 50% investments in two other casino resorts, including:\nLas Vegas, Nevada:\nOther:\nBellagio, MGM Grand Las Vegas, The Mirage, TI, New YorkNew York, Boardwalk, and Monte Carlo (50% owned).\nThe Primm Valley Resorts (Buffalo Bill's, Primm Valley Resort and Whiskey Pete's) in Primm, Nevada; Beau Rivage in Biloxi, Mississippi; MGM Grand Detroit; Borgata (50% owned) in Atlantic City, New Jersey.\nWe operate in one segment, the operation of casino resorts, which includes offering gaming, hotel, dining, entertainment, retail and other resort amenities. Slightly over half of our net revenues are derived from gaming activities, a lower percentage than many of our competitors, as our operating philosophy is to provide a complete resort experience for our guests, including non-gaming amenities which command premium prices based on their quality.\nWe generate a majority of our net revenues and operating income from our Las Vegas Strip resorts. In 2004, over 75% of our net revenues and operating income was generated by wholly-owned Las Vegas Strip resorts. We believe that we own the premier casino resorts on the Las Vegas Strip, and a main focus of our strategy is to continually reinvest in these resorts to maintain that competitive advantage. Our concentration on the Las Vegas Strip exposes us to certain risks outside of our control, such as competition from other Las Vegas Strip resorts as well as new or expanded resorts in Las Vegas, including Wynn Las Vegas expected to open in 2005, and the impact from potential expansion of gaming in California. This concentration also exposes us to risks related to tourism and the general economy, including national and global economic conditions and terrorist attacks or other global events.", + "page_start": 29, + "page_end": 29, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "DEFINING MOMENTS OF MGM MIRAGE\n96 19\nTHE NEW YORK-NEW YORK SKYLINE BECOMES\nA TOWERING PRESENCE IN THE PORTFOLIO. We acquired Primadonna Resorts to gain full ownership of the spectacular New York-New York as well as three hotel-casinos on the Nevada state line and two championship golf courses.\nIT ALL BEGINS WITH MGM GRAND. MGM Grand, the largest hotel-casino in the world, opened to great fanfare. 'The City of Entertainment' redefined the urban resort and provided the foundation for our company's momentous growth.\nBELLAGIO ADDS A JEWEL TO THE FAMILY CROWN. The Mirage Resorts merger provided outstanding resorts, people and land, and has propelled our earnings and provided an unparalleled platform for future growth.", + "page_start": 3, + "page_end": 4, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "Future Developments\nDetroit, Michigan. MGM Grand Detroit, LLC, in which we hold a controlling interest, has operated an interim casino facility in Detroit, Michigan since July 1999. In August 2002, the Detroit City Council approved revised development agreements with us and two other developers. The revised development agreement released us and the City from certain of the obligations under the original agreement and significantly changed other provisions of the original agreement. We are currently in the process of obtaining land and developing plans for the permanent facility. The design, budget and schedule of the permanent facility are not finalized, and the ultimate timing, cost and scope of the facility are subject to risks attendant to large-scale projects.\nThe ability to construct the permanent casino facility is currently subject to resolution of the Lac Vieux litigation. The 6th Circuit Court of Appeals has issued an injunction prohibiting the City and the developers from commencing construction pending further action of the 6th Circuit Court. Therefore, we do not know when we will be able to commence construction of, or complete, the permanent facility.\n29\n30", + "page_start": 38, + "page_end": 39, + "source_file": "NYSE_MGM_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_MGM_2004.pdf", + "query": "Which events negatively impacted leisure travel and MCM Mirage high-end gaming business in late 2002 and early 2003 ?", + "target_page": 32, + "target_passage": "The war with Iraq and the outbreak of SARS in Asia, both of which negatively impacted leisure travel and our high-end gaming business in late 2002 and early 2003", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "(In thousands)\nTable games revenues increased as a result of the improvements in the U.S. economy and the general economy worldwide, as well as increased attendance at targeted marketing events, including the New Years period. Total table games volume for the year was up 9%, with particular strength in baccarat volume, up 18%. These are the most significant increases in table games volumes since 2000. Table games revenues decreased in 2003, as a slightly lower hold percentage and the impact of the Iraq war and SARS outbreak in early 2003 were not fully offset by strong volume levels over the latter half of 2003. Table games win percentages were within our normal range for all periods presented.\n. . . . . . . . . . . . . . . ., 2002 = 1,064,491. Other . . . . . . . . . . . . . . . ., 2004 = 62,033. Other . . . . . . . . . . . . . . . ., % Change = 10%. Other . . . . . . . . . . . . . . . ., 2003 = 56,389. Other . . . . . . . . . . . . . . . ., % Change = 3%. Other . . . . . . . . . . . . . . . ., 2002 = 54,513. Casino revenues, net . ., 2004 = 2,223,965. Casino revenues, net . ., % Change = 9%. Casino revenues, net . ., 2003 = 2,037,514. Casino revenues, net . ., % Change = 1%. Casino revenues, net . ., 2002 = 2,012,840. Non-casino revenue:, 2004 = . Non-casino revenue:, % Change = . Non-casino revenue:, 2003 = . Non-casino revenue:, % Change = . Non-casino revenue:, 2002 = . Rooms . . . . . . . . . . . . . ., 2004 = 911,259. Rooms . . . . . . . . . . . . . ., % Change = 9%. Rooms . . . . . . . . . . . . . ., 2003 = 833,272. Rooms . . . . . . . . . . . . . ., % Change = 5%. Rooms", + "page_start": 32, + "page_end": 32, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "MGM MIRAGE 2004 ANNUAL REPORT", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "(In thousands)\nTable games revenues increased as a result of the improvements in the U.S. economy and the general economy worldwide, as well as increased attendance at targeted marketing events, including the New Years period. Total table games volume for the year was up 9%, with particular strength in baccarat volume, up 18%. These are the most significant increases in table games volumes since 2000. Table games revenues decreased in 2003, as a slightly lower hold percentage and the impact of the Iraq war and SARS outbreak in early 2003 were not fully offset by strong volume levels over the latter half of 2003. Table games win percentages were within our normal range for all periods presented.\n. . . . . . . . . ., 2002 = 637,625. Non-casino revenues . . . ., 2004 = 2,448,523. Non-casino revenues . . . ., % Change = 9%. Non-casino revenues . . . ., 2003 = 2,238,252. Non-casino revenues . . . ., % Change = 5%. Non-casino revenues . . . ., 2002 = 2,140,639. , 2004 = 4,672,488. , % Change = 9%. , 2003 = 4,275,766. , % Change = 3%. , 2002 = 4,153,479. Less: Promotional allowances ., 2004 = (434,384). Less: Promotional allowances ., % Change = 5%. Less: Promotional allowances ., 2003 = (413,023). Less: Promotional allowances ., % Change = 4%. Less: Promotional allowances ., 2002 = (396,551). , 2004 = $ 4,238,104. , % Change = 10%. , 2003 = $ 3,862,743. , % Change = 3%. , 2002 = $ 3,756,928", + "page_start": 32, + "page_end": 32, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "(In thousands)\nTable games revenues increased as a result of the improvements in the U.S. economy and the general economy worldwide, as well as increased attendance at targeted marketing events, including the New Years period. Total table games volume for the year was up 9%, with particular strength in baccarat volume, up 18%. These are the most significant increases in table games volumes since 2000. Table games revenues decreased in 2003, as a slightly lower hold percentage and the impact of the Iraq war and SARS outbreak in early 2003 were not fully offset by strong volume levels over the latter half of 2003. Table games win percentages were within our normal range for all periods presented.\nCasino revenues, net:, 2004 = . Casino revenues, net:, % Change = . Casino revenues, net:, 2003 = . Casino revenues, net:, % Change = . Casino revenues, net:, 2002 = . Table games . . . . . . . . . ., 2004 = $ 943,343. Table games . . . . . . . . . ., % Change = 9%. Table games . . . . . . . . . ., 2003 = $ 866,096. Table games . . . . . . . . . ., % Change = (3%). Table games . . . . . . . . . ., 2002 = $ 893,836. Slots . . . . . . . . . . . . . . . ., 2004 = 1,218,589. Slots . . . . . . . . . . . . . . . ., % Change = 9%. Slots . . . . . . . . . . . . . . . ., 2003 = 1,115,029. Slots . . . . . . . . . . . . . . . ., % Change = 5%. Slots", + "page_start": 32, + "page_end": 32, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "(In thousands)\nAs a result of the above trends, our net revenues increased 10% in 2004, while increasing only 3% in 2003. Net revenues at MGM Grand Las Vegas increased 14% in 2004, due to the addition of several new restaurants, bars and other amenities, and in spite of fewer rooms in service due to room remodel activity. Net revenues at New York-New York increased 26% as the resort continues to benefit from Zumanity and Nine Fine Irishmen, both of which opened in summer 2003. Net revenues at The Mirage decreased 2% as the resort was without the Siegfried & Roy show and the buffet was closed for a portion of the year while Cravings was constructed.\nOur operating income in 2004 increased 36%, due primarily to the strong revenue trends and a full year of Borgata's results. The increase in income from unconsolidated affiliates is responsible for approximately one-third of the increase in operating income, while improvements at our operating resorts, particularly Bellagio, MGM Grand Las Vegas and New York-New York, make up the rest of the increase. Operating income at MGM Grand Detroit was essentially flat year-overyear, despite an increase in the gaming tax rate from 18% to 24% effective September 2004. Several other factors largely offset: Higher corporate expense due to increased development costs; lower bad debt expense due to improved collections; lower preopening expenses due to Borgata preopening expenses in 2003; and higher property transactions, net due to a $37 million gain on sale of land in 2003.\nIn 2003, our operating income decreased by 6%. While revenues grew especially in the second half of 2003, expense growth, particularly in payroll, outpaced revenues.\nTable games revenues increased as a result of the improvements in the U.S. economy and the general economy worldwide, as well as increased attendance at targeted marketing events, including the New Years period. Total table games volume for the year was up 9%, with particular strength in baccarat volume, up 18%. These are the most significant increases in table games volumes since 2000. Table games revenues decreased in 2003, as a slightly lower hold percentage and the impact of the Iraq war and SARS outbreak in early 2003 were not fully offset by strong volume levels over the latter half of 2003. Table games win percentages were within our normal range for all periods presented.", + "page_start": 32, + "page_end": 32, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "NOTE 1 - ORGANIZATION\nUntil July 2004, the Company owned and operated MGM Grand Australia and until January 2004, the Company owned and operated the Golden Nugget Las Vegas in downtown Las Vegas and the Golden Nugget Laughlin in Laughlin, Nevada (the 'Golden Nugget Subsidiaries'). Until June 2003, the Company operated PLAYMGMMIRAGE.com, the Company's online gaming website based in the Isle of Man. See Note 3 for further information regarding these discontinued operations. In the second quarter of 2002, the Company received proceeds of $11 million upon termination of management agreements covering four casinos in the Republic of South Africa. Prior to the termination, the Company managed three permanent casinos and one interim casino and received management fees from its partner, Tsogo Sun Gaming & Entertainment. The termination fee was recorded as part of other revenues in the accompanying consolidated statements of income.\nThe Company is actively seeking future development opportunities in the United Kingdom. In May 2003, the Company acquired a 25% interest in Metro Casinos Limited, a United Kingdom gaming company which operates a casino in Bristol. See Note 10 for discussion of other potential developments in the United Kingdom.\nIn June 2004, the Company entered into a joint venture agreement to develop, build and operate a hotel-casino resort in Macau S.A.R. The agreement is subject to, among other things, the approval of the government of Macau S.A.R., and other regulatory approvals, as well as the entry into a subconcession agreement with the holder of one of the existing concessions.", + "page_start": 55, + "page_end": 55, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "Management's Discussion and Analysis of Financial Condition and Results of Operations\nSlot revenues increased substantially in both 2003 and 2004. Improvements were the result of strong customer visitation, enhanced marketing programs, the impact of our Players Club rewards program, and the implementation of cashless gaming technology in 2003. Slot win percentages were consistent among all three periods.\nNon-casino revenue increased in 2004 primarily due to the enhanced amenities at our resorts. In addition, we were able to increase the pricing for our rooms and other non-gaming amenities. Our hotel results began to improve notably in the latter half of 2003, particularly at our Las Vegas Strip resorts. For the year ended December 31, 2004 REVPAR at our Las Vegas Strip resorts was $141 compared to $126 in 2003, an increase of 12%. Company-wide REVPAR was $121, an increase of 10% over 2003. This increase was largely rate driven, as occupancy increased from 91% to 92% and ADR increased from $121 to $132. In 2003, company-wide REVPAR increased 6% from $104 to $110, with most of the gains coming in the second half of the year.", + "page_start": 33, + "page_end": 33, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "Management's Discussion and Analysis of Financial Condition and Results of Operations\nInvestments in unconsolidated affiliates in 2004 primarily consist of contributions to The Residences at MGM Grand. In 2003 and 2002, such investments were primarily our required investments in Borgata. In 2002, we also contributed $44 million to Monte Carlo in connection with Monte Carlo's retirement of the final $87 million of its outstanding debt.", + "page_start": 37, + "page_end": 37, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "RESULTS OF OPERATIONS\nAt December 31, 2004, our operations consisted of 11 wholly-owned casino resorts and 50% investments in two other casino resorts, including:\nLas Vegas, Nevada:\nOther:\nBellagio, MGM Grand Las Vegas, The Mirage, TI, New YorkNew York, Boardwalk, and Monte Carlo (50% owned).\nThe Primm Valley Resorts (Buffalo Bill's, Primm Valley Resort and Whiskey Pete's) in Primm, Nevada; Beau Rivage in Biloxi, Mississippi; MGM Grand Detroit; Borgata (50% owned) in Atlantic City, New Jersey.\nWe operate in one segment, the operation of casino resorts, which includes offering gaming, hotel, dining, entertainment, retail and other resort amenities. Slightly over half of our net revenues are derived from gaming activities, a lower percentage than many of our competitors, as our operating philosophy is to provide a complete resort experience for our guests, including non-gaming amenities which command premium prices based on their quality.\nWe generate a majority of our net revenues and operating income from our Las Vegas Strip resorts. In 2004, over 75% of our net revenues and operating income was generated by wholly-owned Las Vegas Strip resorts. We believe that we own the premier casino resorts on the Las Vegas Strip, and a main focus of our strategy is to continually reinvest in these resorts to maintain that competitive advantage. Our concentration on the Las Vegas Strip exposes us to certain risks outside of our control, such as competition from other Las Vegas Strip resorts as well as new or expanded resorts in Las Vegas, including Wynn Las Vegas expected to open in 2005, and the impact from potential expansion of gaming in California. This concentration also exposes us to risks related to tourism and the general economy, including national and global economic conditions and terrorist attacks or other global events.", + "page_start": 29, + "page_end": 29, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "(In thousands)\nTable games revenues increased as a result of the improvements in the U.S. economy and the general economy worldwide, as well as increased attendance at targeted marketing events, including the New Years period. Total table games volume for the year was up 9%, with particular strength in baccarat volume, up 18%. These are the most significant increases in table games volumes since 2000. Table games revenues decreased in 2003, as a slightly lower hold percentage and the impact of the Iraq war and SARS outbreak in early 2003 were not fully offset by strong volume levels over the latter half of 2003. Table games win percentages were within our normal range for all periods presented.\n. . . . . . . . . . . . . ., 2002 = 796,861. Food and beverage . . . . ., 2004 = 841,147. Food and beverage . . . . ., % Change = 11%. Food and beverage . . . . ., 2003 = 757,278. Food and beverage . . . . ., % Change = 7%. Food and beverage . . . . ., 2002 = 706,153. Entertainment, retail and other . . . . . . . . . ., 2004 = 696,117. Entertainment, retail and other . . . . . . . . . ., % Change = 7%. Entertainment, retail and other . . . . . . . . . ., 2003 = 647,702. Entertainment, retail and other . . . . . . . . . ., % Change = 2%. Entertainment, retail and other", + "page_start": 32, + "page_end": 32, + "source_file": "NYSE_MGM_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "00-80T-80.pdf", + "query": "What possess all naval aviators ?", + "target_page": 5, + "target_passage": "All Naval Aviators possess a natural interest in the basic aerodynamic factors which affect the performance of all aircraft. ", + "chunk_present": { + "presence": true, + "index": 4 + } + }, + "top_chunk": [ + { + "text": "APPLICATION OF AERODYNAMICS TO SPECIFBC PROW OF FLYING\nWhile the previous chapters have presented the detailed parts of the general field of aerodynamics, there remain various problems of flying which require the application of principles from many parts of aerodynamics. The application of aerodynamics to these various problems of flying will assist the Naval Aviator in understanding these problems and developing good flying techniques.\n349", + "page_start": 366, + "page_end": 366, + "source_file": "00-80T-80.pdf" + }, + { + "text": "Chapter 1 BASIC AERODYNAMKS\nIn order to understand the characteristics of his aircraft and develop precision flying techniques, the Naval Aviator must be familiar with the fundamentals of aerodynamics. There are certain physical laws which describe the behavior of airflow and define the various aerodynamic forces and moments acting on a surface. These principles of aerodynamics provide the foundations for good, precise flying techniques.", + "page_start": 18, + "page_end": 18, + "source_file": "00-80T-80.pdf" + }, + { + "text": "AERODYNAMICS FOR NAVAL AVIATORS\nBY\nH. H. HURT, JR. UNIVERSITY OF SOUTHERN CALIFORNIA\nDISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DESTRUCTION NOTICE - For unclassified, limited documents, destroy by any method that will prevent disclosure of contents or reconstruction of the document.\nPUBLISHED BY DIRECTION OF COMMANDER, NAVAL AIR SYSTEMS COMMAND\nglyphglyphglyphglyph/3glyphglyphglyphglyphglyphglyphglyph\nREVISED JANUARY 1965\nA\nReproduction for non-military use of the information or illustrations contained in this publication is not permitted without specific approval of the issuing service (NA VAIR or USAF). The policy for use of Classified Publications is established for the Air Force in AFR 205-1 and for the Navy in Navy Regulations, Article 1509 ·\n...-------------LIST OF CHANGED PAGES ISSUED\nINSEIf LATEST C_ PAGES. DESTROY SUPERSEDED PAGES.\nNOTE: The portion of the tut .ff'ecr:ecl by the current change ia indicated by • vertical line in the OUter margins of the page.\n• The aateritlt indicate. pagel dwtged, added or deleted by the turrent change,\nADDITIONAL COPIES OF THIS PUBLICATION MAY BE OBTAINED AS FOLLOWS,", + "page_start": 0, + "page_end": 1, + "source_file": "00-80T-80.pdf" + }, + { + "text": "AERODYNAMICS FOR NAVAL AVIATORS\nUSAF AC'flVITlES-In accordance with Technical Order No. 00-5-1. NA VY ACTIVmE~UJe DO FORM U'\" and fllbmit in accordance with the inKruC:JiODi contained in NAVSUP PUB› LICATION -4'7-Military Standard Requilitioning and Issue Procedures. Fot information on othtl' available maurW Ind details of distribution refer to NAVSUP PUBLICATION 2002 SECTION VIII, PART c .. d NAVAIR OO·IOOA. '\nNAVAIR", + "page_start": 1, + "page_end": 1, + "source_file": "00-80T-80.pdf" + }, + { + "text": "PREFACE\nThe purpose of this textbook is to present the elements of applied aerodynamics and aeronautical engineering which relate directly to the problems of flying operations. All Naval Aviators possess a natural interest in the basic aerodynamic factors which affect the performance of all aircraft. Due .to the increasing complexity of modern aircraft, this natural interest must be applied to develop a sound understanding of basic engineering principles and an appreciation of some of the more advanced problems of aerodynamics and engineering. The safety and effectiveness of flying operations will depend greatly on the understanding and appreciation of how and why an airplane flies. The principles of aerodynamics will provide the foundations for developing exacting and precise flying techniques and operational procedures.\nThe content of this textbook has been arranged to provide as complete as possible a reference for all phases of flying in Naval Aviation. Hence, the text material is applicable to the problems of flight training, transition training, and general flying operations. The manner of presentation throughout the text has been designed to provide the elements of both theory and application and will allow either directed or unassisted study. As a result, the text material'will be applicable to supplement formal class Iectures and briefings and provide reading material as a background for training and flying operations.\nMuch of the specialized mathematical detail of aerodynamics has been omitted wherever it was considered unnecessary in the field of flying operations. Also, many of the basic assumptions and limitations of certain parts of aerodynamic theory have been omitted for the sake of simplicity and clarity of presentation. In order to contend with these specific shortcomings, the Naval Aviator should rely on the assistance of certain specially qualified individuals within Naval Aviation. For example, graduate aeronautical engineers, graduates of the Test Pilot Training School at the Naval Air Test Center, graduates of the Naval Aviation Safety Officers Course, and technical representatives of the manufacturers are qualified to assist in interpreting and applying the more difficult parts of aerodynamics and aeronautical engineering. To be sure, the specialized qualifications of these individuals should be utilized wherever possible.\niii", + "page_start": 4, + "page_end": 4, + "source_file": "00-80T-80.pdf" + }, + { + "text": "NAVWEPS 00-801-80 PREFACE\nThe majority of aircraft accidents are due to some type of error of the pilot. This fact has been true in the past and, unfortunately, most probably will be true in the future. Each Naval Aviator should strive to arm himself with knowledge, training, and exacting, professional attitudes and techniques. The fundamentals of aerodynamics as presented in this text will provide the knowledge and background for safe and effective flying operations. The flight handbooks for the aircraft will provide the particular techniques, procedures, and operating data which are necessary for each aircraft. Diligent study and continuous training are necessary to develop the professional skills and techniques for successful flying operations.\nThe author takes this opportunity to express appreciation to those who have assisted in the preparation of the manuscript. In particular, thanks are due to Mr. J. E. Fairchild for his assistance with the portions dealing with helicopter aerodynamics and roll coupling phenomena. Also, thanks are due to Mr. J. F. Detwiler and Mr. E. Dimitruk for their review of the text material.\nHUGH HARRISON HURT, Jr.\nAugust 1959 University of Southern California Los Angelesj Cnlif.\niv\nNAVWEPS OO-801-8O TABLE OF CONTENTS\nTABLE OF CONTENTS", + "page_start": 5, + "page_end": 6, + "source_file": "00-80T-80.pdf" + }, + { + "text": "NAVWEPS 00-801-80 HIGH SPEED AERODYNAMICS\nChapter 3 HIGH SPEED AERODYNAMICS\nDevelopments in aircraft and powerplants have produced high performance airplanes with capabilities for very high speed flight. The study of aerodynamics at these very high flight speeds has many significant differences from the study of classical low speed aerodynamics. Therefore, it is quite necessary that the Naval Aviator be familiar with the nature of high speed airflow and the characteristics of high performance airplane configurations.", + "page_start": 218, + "page_end": 218, + "source_file": "00-80T-80.pdf" + }, + { + "text": "NAVWEPS 00-801-80 PREFACE\n......................................................., 238 = 259. Control force stability. ............................................., 238 = 264. Maneuveringstability ..............................................., 238 = 268. Tailoring control forces. ..........................................., 238 = 270. , 238 = 275. LONGITUDINAL CONTROL. .................................... .................................., 238 = 275. Maneuvering control requirement. Takeoff control requirement. ....................................... Landing control requirement., 238 = 275. ......................................., 238 = 277. LONGITUDINAL DYNAMIC STABILITY. ....................., 238 = 279. Phugoid ........................................................... Short period", + "page_start": 13, + "page_end": 13, + "source_file": "00-80T-80.pdf" + }, + { + "text": "NAVWEPS OO-EOT-80 INDEX\nproprllcrs\nlmd\ncharactcrlstics. ........... : ..............., 1 = 14s. efficiency .................................., 1 = 145. opcrarmg limitations. ............ : ........., 1 = 148. propulsion, 1 = . etlicicncy .................................., 1 = 106. principles. ............. : _ ................., 1 = 104. ram tempcraturc rise. ........................., 1 = 242. range performance. $ ...................., 1 = 158. off-optimum conditions. ...................., 1 = 172. propeller airplanes. ........................., 1 = 160. turbojet airplanes ..........................., 1 = 164. rate of climb. ................................, 1 = 154. reciprocating engines, 1 = . operating characteristics ....................., 1 = 13s. operating limitations. ......................., 1 = 144. refusal speed, .......", + "page_start": 433, + "page_end": 433, + "source_file": "00-80T-80.pdf" + }, + { + "text": "NAVWEPS OO-BOT-80 BASIC AE,RODYNAMlCS\nThe airplane drag curve is a major factor in many items of airplane performance. Range, endurance, climb, maneuver, landing, takeoff, etc., performance are based on some relationship involving the airplane drag curve.\n95\nNAVWEPS 00-8OT-80 AIRPLANE PERFORMANCE\nThe performance of an aircraft is. the most important feature which defines its suitability for specific missions. The principal items of airplane performance deserve detailed consideration in order to better understand and appreciate the capabilities of each airplane. Knowledge of the various items of airplane performance will provide the Naval Aviator with a more complete appreciation of the\noperating limitations and insight to obtain the design performance of his aircraft. The performance section of the flight handbook provides the specific information regarding the capabilities and limitations of each airplane. Every Naval Aviator must rely upon these handbook data as the guide to safe and effecrive operation of his aircraft.", + "page_start": 111, + "page_end": 112, + "source_file": "00-80T-80.pdf" + } + ] + }, + { + "references": { + "source_file": "00-80T-80.pdf", + "query": "What is the static pressure of the aire at standard sea level ?", + "target_page": 20, + "target_passage": "At standard sea level conditions the static pressure of the air is 2,116 psf (or 14.7 psi, 29.92 in. Hg, etc.) ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "NAVWEe3 OO-BOT-80 BASIC AERODYNAMICS\npercent water vapor, argon, carbon dioxide, etc. For the majority of all aerodynamic considerations air is considered as a uniform mixture of these gases. The usual quantities used to define the properties of an air mass are as follows:\nSTATIC PRESSURE. The absolute static pressure of the air is a property of primary importance. The static pressure of the air at any altitude results from the mass of air supported above that level. At standard sea level conditions the static pressure of the air is 2,116 psf (or 14.7 psi, 29.92 in. Hg, etc.) and at 40,000 feet altitude this static pressure decreases to approximately 19 percent of the sea level value. The shorthand notation for the ambient static pressure is 'p' and the standard sea level static pressure is given the subscript 'a' for zero altitude, pa. A more usual reference in aerodynamics and performance is the proportion of the ambient sta~tic pressure and the standard sea level static pressure. This static pressure ratio is assigned the shorthand notation of 8 (delta).\nAltitude pressure ratio\nAmbient static pressure =Standard sea level static pressure 6 = PIP0\nMany items of gas turbine engine performance are directly related to some parameter involving the altitude pressure ratio.\nTEMPERATURE. The absolute temperacure of the air is another important property. The ordinary temperature measurement by the Centigrade scale has a/datum at the freezing point of water but absolute zero temperature is obtained at a temperature of -273' Centigrade. Thus, the standard sea level tcmperature of 15' C. is an absolute temperature of 288'. This scale of absolute temperature using the Centigrade increments is the Kelvin scale, e.g., o K. The shorthand notation for the ambient air temperature is 'T' and the standard sea level air temperature of 288' K. is signified by Ta. The more usual reference is,\n2\nthe proportion of the ambient air temperature and the standard sea level air temperature. This temperature ratio is assigned the shorthand notation of 0 (theta).\nTemperature ratio", + "page_start": 19, + "page_end": 19, + "source_file": "00-80T-80.pdf" + }, + { + "text": "Ambient air temperature\nThe kinematic viscosity of air at standard sea level conditions is 0.0001576 square feet per second. At an altitude of 40,000 feet the kinematic viscosity is increased to 0.0005059 square foot per second.\nIn order to provide a common denominator for comparison of various aircraft, a standard atmosphere has been adopted. The standard atmosphere actually represents the mean or average properties of the atmosphere. Figure 1.1 illustrates the variation of the most important properties of the air throughout the standard atmosphere. Notice that the lapse rate is constant in the troposphere and the stratosphere begins with the isothermal region.\nSince all aircraft performance is compared and,evaluated in the environment of the standard atmosphere, all of the aircraft instrumentation is calibrated for the standard atmosphere.\n4\nThus, certain corrections must apply to the instrumentation as well as the aircraft performance if the operating conditions do not fit the standard atmosphere. In order to properly account for the nonstandard atmosphere certain terms must be defined. Pressure .&itudc is the altitude in the standard atmosphere corresponditrg to a particular pressure. The aircraft altimeter is essentially a sensitive barometer calibrated to indicate altitude in the staotlard atmosphere. If the altimeter is set for 29.92 in. Hg the altitude indicated is the pressure altitude-the altitude in the standard atmosphere corresponding to the sensed pressure. Of course, this indicated pressure altitude may not be the actual height above sea level due to variations in remperature, lapse rate; atniospheric pressure, and possible errors in the sensed pressure.\nThe more appropriate term for correlating aerodynamic performance in the nonstandard atmosphere is density &it&-the altitude in the standard atmosphere corresponding to a particular value of air density. The computation of density altitude must certainly involve consideration of pressure (pressure altitude) and temperature. Figure 1.6 illustrates the manner in which pressure altitude and temperature combine to produce a certain density altitude. This chart is quite standard in use and is usually included in the performance section of the flight handbook. Many subject areas of aerodynamics and aircraft performance will emphasize density altitude and temperature as the most important factors requiring consideration.", + "page_start": 21, + "page_end": 21, + "source_file": "00-80T-80.pdf" + }, + { + "text": "Ambient air temperature\n=Standard sea level air temperature @=TITtl ,+273 288\nMany items of compressibility effects and jet engine performance involve consideration of the temperature ratio.\nDENSITY. The density of the air is a property of greatest importance in the study of aerodynamics. The density of air is simply the mass of air per~cubic foot of volume and is a direct measure of the quantity of matter in each cubic foot of air. Air at standard sea lcvcl conditions weighs 0.0765 pounds per cubic foot and has a density of 0.002378 slugs per cubic foot. At an altitude of 40,000 feet the air density is approximately 25 percent of the sea level value.\nThe shorthand notation used for air density is p (rho) and the standard sea level air density is then pO. In many parts of aerodynamics it is very convenient to consider the proportion of the ambient air density and standard sea level air density. This density ratio is assigned the shorthand notation of c (sigma).\ndensity ratio= ambient air density standard sea level air density a = PIP0\nA general gas law defines the relationship of pressure temperature, and density when there is no change of state or heat transfer. Simply stated this would be 'density varies directly with pressure, inversely with temperature.' Using the properties previously defined,\ndensity ratio= Pressure rat'o. temperature rat10\nPlAVWEPS 00-8OT-80 BASIC AERODYNAMICS\nThis relationship has great application in aerodynamics and is quite fundamental and necessary in certain parts of airplane performance.\nVISCOSITY. The viscosity of the air is important in scale and friction effects. The coefficient of absolute viscosity is the proportion between the shearing stress and velocity gradient for a fluid flow. The viscosity of gases is unusual in that the viscosity is generally a function of temperature alone and an increase in temperature increases the viscosity. The coefficient of absolute viscosity is assigned the shorthand notation I, (mu). Since many parts of aerodynamics involve consideration of viscosity and density, a more usual form of viscosity measure is the proportion of the coefficient of absolute viscosity and density. This combination is termed the 'kinematic viscosity' and is noted by Y (nu).\nkinematic viscosity\ncoefficient of absolute viscosity\ncc density\nv=PlP", + "page_start": 19, + "page_end": 21, + "source_file": "00-80T-80.pdf" + }, + { + "text": "PITOT WITH SEPARATE STATIC SOURCE\nPRESSURE INDICATED BY GAUGE IS DIFFERENCE BETWEEN TOTAL AND STATIC PRESSURE, H-p= q\nFigure. 1.5. Airspeed Measurement\ninstrument and errors due to position or location of the installation. The instrument error must be small by design of the equipment and is usually negligible in equjpment which is properly maintained and cared for. The position error of the installation must be small in the range of airspeeds involving critical performance conditions. Position errors are most usually confine,d to the static source in that the actual static pressure sensed at the static port may be different from the free airstream static pressure. When the .,aircraft is operated through a large range' of angles of attack, the static pressure distribution varies 'quite greatly and it becomes quite difficult to'minimize the static source error. In most instances a compensating group of static sources may be combined to reduce the position error. In order to appreciate the magnitude of this problem, at flight speed near 100 knots a\n0.05 psi position error is an airspeed error of 10 knots. A typical variation of airspeed system position error is illustrated in figure 1.6.\n(3) The equivalent airspeed (PAS) is the result of correcting the (CAS) for compressibility effects. At high flight speeds the stagnation pressure recovered in the pitot tube is not representative of the airstream dynamic pressure due to a magnification by compressibility. Compressibility of the airflow produces a stagnation pressure in the pitot which is greater than if the flow were incompressible. As a result, the airspeed indication is given an erroneous magnihcation. The standard airspeed indicator is calibrated to read correct when at standard sea level conditions and thus has a compressibility correction appropriate for these conditions. However, when the aircraft is operating above standard sea level altitude,\nRevised January 1965\n11\nNAVWEPS 00-801-80 BASIC AERODYNAMICS", + "page_start": 28, + "page_end": 29, + "source_file": "00-80T-80.pdf" + }, + { + "text": "ICAO STANDARD ATMOSPHERE\n*GEOPOTENTIAL OF THE TROPOPAUSE\nFigure 1.7. Standard Altitude Table", + "page_start": 22, + "page_end": 22, + "source_file": "00-80T-80.pdf" + }, + { + "text": "NAVWEPS 00401-80 BASIC AERODYNAMICS\nThis equation is the Bernoulli equation for 'incompressible flow. It is important to appreciate that the term >$pV2 has the units of pressure, psf. This term is one of the most important in all aerodynamics and appears so frequently t&it is given the name 'dynamic pressure' and the shorthand notation '4'.\nq= dynamic pressure, psf = jgpv2\nWith this definition it could be said that the sum of static and dynamic pressure in the flow tube remains constant.\nFigure 1.3 illustrates the variation of static, dynamic, and total pressure of air flowing through a closed tube. Note that the total pressure is con,stant throughout the length and any change in dynamic pressure produces the same magnitude change in static pressure.\nThe dynamic pressure of a free airstream is the one 'common denominator of all aerodynamic forces and moments. Dynamic pressure represents the kinetic energy of the free airstream and is a factor relating the capability for producing changes in static pressure on a surface. As defined, the dynamic, pressure varies directly as the density and the square of the velocity. Typical values of dynamic pressure, 4, are shown in table l-1 for various true airspeeds in the standard atmosphere. Notice that the dynamic pressure at some fixed velocity varies directly with the density ratio at any altitude. Also, appreciate the fact that at an altitude of 40,oM) feet (where the density ratio, b, is 0.2462) it is necessary to have a true air velocity twice that at sea level in order to product the same dynamic pressure.\n9\nNAVWEPS 00-801-80 BASIC AERODYNAMICS\nTABLE l-l. Effect of Speed and Altitvde on Dwzmnic Prerrure", + "page_start": 26, + "page_end": 26, + "source_file": "00-80T-80.pdf" + }, + { + "text": "DENSITY ALTITUDE CHART +g&\nFigure 1.6. Airspeed Corrections (sheet 2 of 2)\nNAVWEPS 00-SOT-80 BASIC AERODYNAMICS\nthe inherent compensation is inadequate and additional correction must be applied. The subtractive corrections that must be applied to CA$ depend on pressure altitude and CAS and are shown on figure 1.6 for the subsonic flight range. The equivalent airspeed (EAS) is the flight speed in the standard sea level air mass which would produce the same free stream dynamic pressure as the actual flight condition.\n(4) The true airspeed (TAS) results when the &4X is corrected for density altitude. Since the airspeed indicator is calibrated for the dynamic pressures corresponding to airspeeds at standard sea level conditions, variations in air density must be accounted for. To relate EAS and TAX requires consideration that the EAS coupled with stand.ard sea level density produces the same dynamic pressure as the TAX Soupled with the ^^_._^ 1 .:.. 2---:... ,.f *L., bl:A.* rnrJ;r;m.. dCLUd, 'all UcIIJIcy 'I L11L ''6°C C'IIUACI'L'. From this reasoning, it can be shown that:\n(TAS)2p=(EAS)2 po d -or, TAS=EAS 62 P TAS= EAS 2\n4\nwhere TAX= true airspeed EAS=equivalent airspeed p=actual air density PO= standard sea level air density n=altitude density ratio, p/pa\nThe result shows that the TAX is a function of EAS and density altitude. Figure 1.6 shows a chart of density altitude as a function of pressure altitude and temperature. Each particular density altitude fixes the proportion between TAX and EAS. The use of a navigation computer requires setting appropriate values of pressure altitude and temperature on the scales which then fixes rhe proportion between the scales of TAS and EAS (or TAS and CAS when compressibiliry corrections are applicable).\nRevlted Jmuoy 1965\n14\nThus, the airspeed indicator system measures dynamic pressure and will relate true flight velocity when instrument, position, compressibility, and density corrections are applied. These corrections are quite necessary for accurate determination of true airspeed and accurate navigation.", + "page_start": 30, + "page_end": 31, + "source_file": "00-80T-80.pdf" + }, + { + "text": "DENSITY ALTITUDE CHART +g&\nBernoulli's principle and the concepts of static, dynamic, and total pressure are the basis of aerodynamic fundamentals. The pressure distribution caused by the variation of local stack and dynamic pressures on a surface is the source of the major aerodynamic forces and moment.", + "page_start": 31, + "page_end": 31, + "source_file": "00-80T-80.pdf" + }, + { + "text": "NAVWEPS 00401-80 BASIC AERODYNAMICS\nAIRSPEED MEASUREMENT. If a symmetrically shaped object were placed in a moving airstream, the flow pattern typical of figure 1.4 would result. The airstream at the very nose of the object would stagnate and the relative flow velocity at this point would be zero. The airflow ahead of the object possesses some certain dynamic pressure and ambient static pressure. At the very nose of the object the local velocity will drop to zero and the airstream dynamic pressure will be converted into an increase in static pressure at the stagnation point. In other words, there will exist a static pressure at the stagnation point which is equal to the airstream total pressure-ambient static pressure plus dynamic pressure.\nAround the surface of the object the airflow will divide and the local velocity will increase from zero at the stagnation point to some maximum on the sides of the object. If friction and viscosity effects are neglected, the\nNAVWEPS OO-EOT-80 BASIC AERODYNAMICS\nAIRSTREAM AHEAD HAS AMBIENT STATIC PRESSURE AND DYNAMIC PRESSURE\nSTAGNATION PRESSURE IS AIRSTREAM TOTAL PRESSURE P+q\nFtgure 1.4. Flow Pattern on a Symmetrical Object\nsurface anflow continues to the aft stagnation point where the local velocity is again zero. The important point of this example of aerodynamic flow is existence of the stagnation point. The change in airflow static pressure which takes place at the stagnation point IS equal to the free stream dynamic pressure, q.\nThe measurement of free stream dynamic pressure is fundamental to the indication of airspeed. In fact, airspeed indicators are simply pressure gauges which measure dynamic pressure related to various airspeeds. Typical airspeed measuring systems are illustrated in figure 1.5. The pitot head has no internal flow velocity and the pressure in the pitot tube is equal to the total pressure of the airstream. The purpose of the static-ports is to sense the true static pressure of the free airstream. The total pressure and static pressure lines are attached to a differential pressure gauge and the net pressure indicated is the dynamic\npressure, q. The pressure gauge is then calibrated to indicate flight speed in the standard sea level air mass. For example, a dynamic pressure of 305 psf would be realized at a sea level flight ,speed of 300 knots.", + "page_start": 26, + "page_end": 27, + "source_file": "00-80T-80.pdf" + }, + { + "text": "NAVWEPS OO-ROT-80 AIRPLANE PERFORMANCE\nThe effect of pressure altitude and ambient temperature is to define density altitude and its effect on landing performance. An increase in density altitude will increase the landing velocity but will not alter the net retarding force. If a given weight and configuration of airplane is taken to altitude above standard sea level, the airplane will still require the same 4 to provide lift equal to weight at the landing C,. Thus, the airplane at altitude will land at the same equivalent airspeed (EAS) as at sea level but, because of the reduced density, the true airspeed (TM) will be greater. The relationship between true airspeed and equivalent airspeed is as follows:", + "page_start": 216, + "page_end": 216, + "source_file": "00-80T-80.pdf" + } + ] + }, + { + "references": { + "source_file": "00-80T-80.pdf", + "query": "What is the phenomenon associated with the production of lift by an airfoil ?", + "target_page": 34, + "target_passage": "An important phenomenon associated with the production of lift by an airfoil is the “circulation” parted to the airstream. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "NAVWEPS OO-BOT-80 BASIC AERODYNAMICS\nGENERATION OF LIFT. An important phenomenon associated with the production of lift by an airfoil is the 'circulation' imparted to the airstream. The best practical illustration of this phenomenon is shown in figure 1.8 by the streamlines and pressure distributions existing on cylinders in an airstream. The cylinder without circulation has a symmetrical streamline pattern and a pressure distribution which creates n-0 n_et lift. If the cylinder is given a clockwise rotation and induces a rotational or circulatory flow, a distinct change takes place in the streamline pattern and p'ess.~re &str~''u~~oii, The vriocitirs due to the vortex of circulatory flow cause increased 104 velocity on the upper surface of the cylinder and decreased local velocity on the lower surface of the cylinder. Also, the circulatory flow produces an upwash immediately ahead and downwash immediately behind the cylinder and both fore and aft stagnation points are lowered.\nThe effect of the addition of circulatory flow is appreciated by the change in the pressure distribution on the cylinder. The increased local velocity on the upper surface causes an increase in upper surface suction while the decreased local velocity on the lower surface causes a decrease in lower surface suction. As a result, the cylinder with circulation will produce a net lift. This mechanically induced circulation-called Magnus effect-illustrates the relationship between circulation and lift and is important to golfers, baseball and tennis players as well as pilots and aerodynamicists. The curvature of the flight path of a golf ball or baseball rcluites an unbalance df force which is created by rotation of the ball. The pitcher that can accurately control a .powerful\n16\nCYLINDER\nWITHOUT\nCIRCULATION", + "page_start": 33, + "page_end": 34, + "source_file": "00-80T-80.pdf" + }, + { + "text": "NAVWEPS 00-801-80 BASIC AERODYNAMICS\nrotation will be quite a 'curve ball artist' the golfer that cannot control the lateral motion of the club face striking the golf ball will impart an uncontrollable spin and have trouble with a 'hook' or 'slice.'\nWhile a rotating cylinder can produce a net lift from the circulatory flow, the method is relatively inefficient and only serves to point out the relationship between lift and circula-, tion. An airfoil is capable of producing lift with relatively high efficiency and the process is illustrated in figure 1.8. If a symmetrical airfoil is placed at zero angle of attack to the airstream, the streamline pattern and pressure distribution give evidence of zero lift. HOWever, if the airfoil is given a positive angle of attack, changes occur in the streamline pattern and pressure distribution similar to changes caused by the addition of circulation to the cylinder. The positive angle of attack causes increased velocity on the upper surface with an increase in upper surface suction while the decreased velocity on the lower surface causes a decrease in lower surface suction. Also, upwash is generated ahead of the airfoil, the forward stagnation point moves under the leading edge, and a downwash is evident aft of the airfoil. The pressure distribution 0' the airfoil now provides a net force perpendicular to the airstream-lift.\nThe generation of lift by an airfoil is dependent upon the airfoil being able to create circulation in the airstream and develop the lifting, pressure distribution on the surface. In all cases, the generated lift will be the net force caused by the distribution of pressure over the upper and lower surfaces of the airfoil. At low angles of attack, suction pressures usually will exist on both upper and lower surfaces. but the upper surface suction must be greater for positive lift. At high angles of attack near that for maximum lift, a positive pressure will exist on the lower surface but this will account for approximately one-third the net lift.", + "page_start": 37, + "page_end": 37, + "source_file": "00-80T-80.pdf" + }, + { + "text": "NAVWEPS 00-8OT-80 BASIC AERODYNAMICS\nvortex filaments which consist of the tip or trailing vortices coupled with the bound or line vortex. The tip vortices are coupled with the bound vortex when circulation is induced with lift. The effect of this vortex system is to create certain vertical velocity components in the vicinity of the wing. The illustration of these vertical velocities shows that ahead of the wing the bound vortex induces an upwash. Behind the wing, the coupled action of the bound vortex and the tip vortices induces a downwash. With the action of tip and bound vortices coupled, a final vertical velocity (220) is imparted to the airstream by the wing producing lift. This result is an inevitable consequence of a finite wing producing lift. The wing Producing lift applies the equal and opposite force to the airstream and deflects it downward. One of the important factors in this system is that a downward velocity is created at the aerodynamic center (w) which is one half the final downward velocity imparted to the airstream (2~).\nThe effect of the vertical velocities in the vicinity of the wing is best appreciated when they are added vectorially to the airstream velocity. The remote free stream well ahead of the wing is unaffected and its direction is opposite the flight path of the airplane. 'Aft of the wing, the vertical velocity (2~) adds to the airstream velocity to produce the downwash angle e (epsilon). At the aerodynamic center of the wing, the vertical,velocity (w) adds to the airstream velocity to produce a downward deflection of the airstream one-half that of the downwash angle. In other words, the wing producing lift by the deflection of an airstream incurs a downward slant co the wind in the immediate vicinity of the wing. Hence, the JeCtionJ of the wing operate in an average relative wind which is inclined downward one-half the final dowraw& angle. This is one important feature which distinguishes the aerodynamic properties of a wing from the aerodynamic properties of an airfoil section.\nThe induced velocities existing at the aerodynamic center of a finite wing create an aver-\n66", + "page_start": 83, + "page_end": 83, + "source_file": "00-80T-80.pdf" + }, + { + "text": "NAVWEPS 00-8OT-80 HIGH SPEED AERODYNAMICS\nFORCE DIVERGENCE. The airflow separation induced by shock wave formation can create significant variations in the aerodynamic force coefficients. When the free stream speed is greater than critical Mach number some typical effects on an airfoil section are as follows :\n(1) An increase in the section drag coefficient for a given section lift coe5cient.\n(2) A decrease in section lift coefficient for a given section angle of attack.\n(3) A change in section pitching moment coe5cient.\nA reference point is usually taken by a plot of drag coe5cient versus Mach number for a constant lift coefficient. Such a graph is shown in figure 3.10. The Mach number which produces a sharp change in the drag coe5cient is termed the 'force divergence' Mach number and, for most airfoils, usually exceeds the critical Mach number at least 5 to 10 percent. This condition is also referred to as the 'drag divergence' or 'drag rise.'\nPHENOMENA OF TRANSONIC FLIGHT. Associated with the 'drag rise' are buffet, trim and stability changes, and a decrease in control surface effectiveness. Conventional aileron, rudder, and elevator surfaces sub jetted to this high frequency buffet may 'buzz,' and changes in hinge moments may produce undesirable control forces. Of course, if the buffet is quite severe and prolonged, structural damage may occur if this operation is in violation of operating limitations. When airflow separation occurs on the wing due to\n219", + "page_start": 235, + "page_end": 236, + "source_file": "00-80T-80.pdf" + }, + { + "text": "DEVELOPMENT OF AERODYNAMIC PITCHING MOMENTS\nThe distribution of pressure over a surface is the ,source of the aerodynamic moments as well as the aerodynamic forces. A typical example of this fact is the pressure distribution acting on the cambered airfoil of figure 1.21. The upper surface has pressures distributed which produce the upper surface lift; the lower surface has pressures distributed which produce the lower surface lift. Of course, the\n47", + "page_start": 64, + "page_end": 64, + "source_file": "00-80T-80.pdf" + }, + { + "text": "NAVWEPS 00-801-80 PREFACE\nInterpretation of the lift equation.. . . . . . . . ., 1 = 23. Lift cocfficicnt versus angle of attack Stall speed and angle of attack Angle of attack versus velocity Primary control of airspeed . . _ . . . _ . ., 1 = 27. mrfou un cnacactectsucs. . . Section angle of attack and lift coefficient Ty ical section chvactctistics E&t of thickness and cambet Drag characteristics, . . . . . . . :., 1 = 29. Drag cocficicnt versus angle of attack Lift-drag ratio Power-off glide pctformancc Airfoil drag chanwteristics.. ) . . . Section drag cocfficicnt Ty ical section characteristics E 2 ect of thickness and cunbcr Low drag sections, 1 = 33. FLIGHT AT HIGH LIFT CONDITIONS. . . . . . . . StaII speeds. . . . . . . . . .,. . . . . . . Maximum lift cc&cicnt Stall angle of attack * . ., 1 = 35. ..,e ~lrecrorwergnt.................................................... Effect of maneuvering flight,. . Load factor ~ets~s bank angle Stall spad versus load factor Effect of high lift devices., ., 1 = 3.5 ::. Effect on stall speed, 1 = . , 1 = 37. Stall angle of attack and stall recovery. . . . . . HIGH LIFT DEVICES. Types of high lift devices., ., 1 = 39. Plain flap, 1 = . , 1 = 39. S lit flap, 1 = . S otted flap P Fowler flap, 1 = 41. Pressure distribution. .~. : . ! . : Center of pressure and aerodynamic center. Pitching moment coefficient. . , Effect of camber Effect of flaps, 1 = 49. Operation of high lift devices. Flap retraction and extension Chan Effect o f es in lift, drag, and trim power DEVELOPMENT OF AERODYNAMIC PITCHING MOMENTS Relationship between center of pressure, aerodynamic centet, and moment coefficient Application to longitudinal stability. ., 1 = 43", + "page_start": 7, + "page_end": 7, + "source_file": "00-80T-80.pdf" + }, + { + "text": "NAVWEPS 00-801~0 BASIC AERODYNAMICS\nnet lift produced by the airfoil is difference between the lifts on the upper and lower surfaces. The point along the chord where the distributed lift is effectively concentrated is termed the 'center of pressure, c.p.' The center of pressure is essentially the 'center of gravity' of the distributed lift pressure and the location of the c.p. is a function of camber and section lift coe&cient\nAnother aerodynamic reference point is the 'aerodynamic center, d.e.' The aerodynamic center is defmed as the point along the chord where all changes in lift effectively take place. To visualize the existence of such a point, notice the change in pressure distribution with angle of attack for the symmetrical airfoil of figure 1.21. When at zero lift, the upper and lower surface lifts are equal and located at the same point. With an increase in angle of attack, the upper surface lift increases while the lower surface lift decreases. The change ,of lift has taken place with no change in the center of pressure-a characteristic of symmetrical airfoils.\nNext, consider the cambered airfoil of figure 1.21 at zero lift. To produce zero lift, the upper and lower surface lifts must be equal. One difference noted from the symmetrical airfoil is that the upper and lower surface lifts are not opposite one another. While no net lift exists on the airfoil, the couple produced by the upper and lower surface lifts creates a nose down moment. As the angle of attack is increased, the upper surface lift increases while the lower surface lift decreases. While a change in lift has taken place, no change in moment takes place about the point where the lift change occurs. Since the moment about the aerodynamic center is the product of a force (lift at the c.P.) and a lever arm (distance from c.9. to a.~.), an increase in lift moves the center of pressure toward the aerodynamic center.\nIt should be noted that the symmetrical airfoil at zero lift has no pitching moment about the aerodynamic center because the upper and\nNAVWEPS DD-BOT-80 BASIC AERODYNAMICS\nCAMBERED AIRFOIL\nFigure 1.27. Development of Pitching Moments\n48\nlower surface lifts act along the same vertical line. An increase in.lift on the symmetrical airfoil produces no change in this situation and the center of pressure remains fixed at the aerodynamic center.", + "page_start": 64, + "page_end": 66, + "source_file": "00-80T-80.pdf" + }, + { + "text": "NAVWEPS 00-801-80 BASIC AERODYNAMICS\nThe effect of free stream density and velocity is a necessary consideration when studying the development of the various aerodynamic forces. Suppose that a particular shape of airfoil is fixed at a particular angle to the airstream. The relative velocity and pressure distribution will be determined by the shape of the airfoil and the angle to the airstream. The effect of varying the airfoil size, air density and airspeed is shown in figure 1.9. If the same airfoil shape is placed at the same angle to an airstream with twice as great a dynamic pressure the magnitude of the pressure distribution will be twice as great but the r&rive shape of the pressure distribution will be the same. With twice as great a pressure existing over the surface, all aerodynamic forces and moments will ~double. If a half-size airfoil ib placed at the same angle to the original airstream, the magnitude of the pressure distribution is the same as the origina! airfoi! and again the relative shape of the pressure distribution is identical. The same pressure acting on the half-size surface would reduce all aerodynamic forces to one-half that of the original. This similarity of flow patterns means that the stagnation point occurs at the same place, the peak suction pressure occurs at the same place, and the actual magnitude of the aerodynamic forces and moments depends upon the airstream dynamic pressure and the surface area. This concept is extremely important when attempting to separate and analyze the most important factors affecting the development of aerodynamic forces.\nAIRFOIL TERMINOLOGY. Since the shape of an airfoil and the inclination to the airstream are so important in determining the pressure distribution, it is necessary to properly define the airfoil terminology. Figure 1.10 shows a typical airfoil and illustrates the various items of airfoil terminology\n(1) The chord line is a straight line connecting the leading and trailing edges of the airfoil.\n20", + "page_start": 37, + "page_end": 37, + "source_file": "00-80T-80.pdf" + }, + { + "text": "TO SPECIFIC PROBLEMS OF FLYING\nusually means remaining over a particular spot on the ground, it shall be considered here as flight at zero airspeed. This is necessary because the aerodynamic characteristics of the rotor depend on its motion with respect to the air and not the ground. Hovering in a 20 knot wind is aerodynamically equivalent to flying at an airspeed of 20 knots in a no-wind condition, and the characteristics will be identical in the two conditions.\nThe first point to realize is that the rotor is subject to the same physical laws of aerodynamics and motion that govern flight of the fixed-wing airplane. The manner in which the rotor is subject to these laws is much more complicated due to the complex flow conditions.\nRotor lift can be explained by either of two methods. The first method, utilizing simple momentum theory based on Newton's Laws, merely states that lift results from the rotor accelerating a mass of air downward in the same way that the jet engine develops thrust by accelerating a mass of air out the tailpipe. The second method of viewing rotor lift concerns the pressure forces acting on the various sections of the blade from root to tip. The simple momentum theory is useful in determining only lift characteristics while the 'blade element' theory gives drag as well as lift characteristics and is useful in giving a picture of the forces at work on the rotor. In the 'blade element' theory, the blade is divided up into 'blade elements' as shown in figure 6.15. The forces acting on each blade element are analyzed. Then the forces on all elements are summed up to give the characteristics of the whole rotor. The relative wind acting on each segment is the resultant of two velocity components: (1) the velocity due CO the rotation of the blades about the hub and (2) the induced velocity, or downwash velocity caused by the rotor. the velocity due to rotation at a particular element is proportional to the rotor speed and the distance of the element from the rotor hub.\nThus, the velocity due to rotation varies linearly from zero at the hub to a maximum at the tip. A typical blade section with the forces acting on it is shown in figure 6.15.", + "page_start": 417, + "page_end": 417, + "source_file": "00-80T-80.pdf" + }, + { + "text": "NAVWEPS OD-8OT-80 BASIC AERODYNAMICS\nexists. This situation creates an induced angle of attack at the root which is less than the average for the wing and a local section angle of attack higher than the average for the wing. The result is shown by the graph of figure 1.32 which depicts a local lift coefficient at the root almost 20 percent greater than the wing lift coefficient.\nThe effect of the rectangular planform may be appreciated by matching a near elliptical lift distribution with a planform with a constant chord. The chords near 'the tip develop less lift pressure than the root and consequently have lower section lift coe&cients. The great nonuniformity of local lift coefficient along the span implies that some sections carry .more than their share of the load while others carry less than their share of the load. Hence, for a given aspect ratio, the rectangular planform will be less efficient -t--L. -11:. -!-~I LlLill UK C'lqJLlCal wing. For exampie, a rectangular wing of AR=6 would have 16 percent higher induced angle of attack for the wing and 5 percent higher induced drag than an elliptical wing of the same aspect ratio.\nAt the other extreme of taper is the pointed wing which has a taper ratio of zero. The extremely small parcel of area at the pointed tip is not capable of holding the main tip vortex at the tip and a drastic change in downwash distribution results. The pointed wing has greatest downwash at the root and this downwash decreases toward the tip. In the immediate vicinity of the pointed tip, an upwash is encountered which indicates that negative induced angles of attack exist in this area. The resulting variation of local lift coefficient shows low cr at the root and very high c, at the tip. This effect may be appreciated by realizing that the wide chords at the root produce low lift pressures while the very narrow chords toward the tip are subject to very high lift pressures.. The variation of 2 throughout the span of the wing of L taper ratio==0 is shown on the graph of figure\n1.32. As with the rectangular wing, the nonuniformity of downwash and lift distribution result in inefficiency of rhis planform. For example, a pointed wing of AR=6 would have 17 percent higher induced angle of attack for the wing and 13 percent higher induced drag than an elliptical wing of thesame aspect ratio.\nBetween the two extremes of taper will", + "page_start": 93, + "page_end": 94, + "source_file": "00-80T-80.pdf" + } + ] + }, + { + "references": { + "source_file": "BD-EN_calendrier-Lauzun-2024.pdf", + "query": "What are the recyclable waste ?", + "target_page": 3, + "target_passage": "All types of paper and cardboard, Metal packaging, even the smallest ones, Plastic bottles and flasks, All other packaging", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "What materials ('feedstocks') are used to make compost?\nCompost facilities in Washington recycle a variety of organic materials, including yard debris, food scraps, manure, biosolids, forest residuals like sawdust and bark, construction wood, and agricultural residues. All of these materials can be used to produce high quality compost. Your supplier can tell you which materials they compost.", + "page_start": 4, + "page_end": 4, + "source_file": "CompostGuide.pdf" + }, + { + "text": "HOUSEHOLD GARBAGE\nMasks, nappies, Broken dishes, toothbrush, Disposable wipes, Vacuum bags...\nBLACK BIN OR BLACK COLUMN\nCOMPOSTER", + "page_start": 2, + "page_end": 2, + "source_file": "BD-EN_calendrier-Lauzun-2024.pdf" + }, + { + "text": "ORGANIC WASTE\n//50% green materials : all fruit and vegetable peelings, leftover meat, egg shells, tea and coffee…\n//50% brown materials : dead leaves, twigs, kitchen rolls, shavings, possibly paper, newspaper and cardboard …", + "page_start": 2, + "page_end": 2, + "source_file": "BD-EN_calendrier-Lauzun-2024.pdf" + }, + { + "text": "Other Fuels\nMunicipal solid waste\nIndustrial waste\nFuel mixtures (fossil and biomass)\nWaste gas\nOther wastes\nHydrogen", + "page_start": 46, + "page_end": 46, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "Recycling of rare earths used in smart cards\nAt Sumitomo Mitsui Card, rare earths At Sumitomo Mitsui Card, rare earths extracted from IC chips from expired credit extracted from IC chips from expired credit cards are recycled. cards are recycled.\nSumitomo Mitsui Financial Group CSR Report", + "page_start": 11, + "page_end": 12, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "Gas\nLandfill gas Sludge gas (sewage gas) Other biogas", + "page_start": 46, + "page_end": 46, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "Solid\nWood/Wood waste\nAgricultural waste\nCharcoal\nOther solid biomass", + "page_start": 46, + "page_end": 46, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "Compost Beginnings\nThe yard debris or food scraps* that you place into your home compost bin, take to a drop-off site, or set out for curbside collection could become the compost that you later use on your garden, lawn, and flowerbeds.\nIt is essential to place only quality organic material into the composting process. Here are some tips:\nl The products you use or spray in your yard can end up in the compost process. Carefully read the labels of pesticide and herbicide products you use. (See page 9.)\nl Please keep yard debris free of :\nx Garbage\nx Plastic of any sort\n- Plastic plant pots\n- Plastic plant tabs\n- Plastic bags (if you want to bag your yard debris, use paper garden bags - available at most garden centers)\nx Rock, brick, or masonry\nx Glass or metal\nx Pet waste.\n* Many localities now collect food scraps and food-soiled paper along with yard debris for composting. Call your local collection service to find out what is collected in your area.", + "page_start": 4, + "page_end": 4, + "source_file": "CompostGuide.pdf" + }, + { + "text": "MORE QUESTIONS ?\nWebsite:\nwww.ccpl47.fr\n/ Section En Pratique > Environnement > Gestion des déchets\nEnvironnement Service :\n12 rue du Renfort 47410 LAUZUN\n05 53 94 11 23 / secretariat.environnement@ccpl47.fr\nComposting : anim.biodechets@ccpl47.fr / 06 33 72 84 18\nRecycling centre access, registration or modification : iris@ccpl47.fr / 05 53 64 12 26\nOn the CCPL website\nEverything you need to know about sorting\neepik\nr\ntock - F\nS\ndobe\nto : A\nédits pho\nr\nC\nC onc ep tion : A dék oi - www .adek oi.c om - 11.2023", + "page_start": 3, + "page_end": 3, + "source_file": "BD-EN_calendrier-Lauzun-2024.pdf" + }, + { + "text": "2024\nM, DECEMBER = . T, DECEMBER = . W, DECEMBER = . T, DECEMBER = . F, DECEMBER = . S, DECEMBER = . S, DECEMBER = . M, DECEMBER = . T, DECEMBER = . W, DECEMBER = . T, DECEMBER = . F, DECEMBER = . S, DECEMBER = . S, DECEMBER = . M, DECEMBER = . T, DECEMBER = . W, DECEMBER = . T, DECEMBER = . F, DECEMBER = . S, DECEMBER = . S, DECEMBER = . M, DECEMBER = . T, DECEMBER = . W, DECEMBER = . T, DECEMBER = . F, DECEMBER = . S, DECEMBER = . S, DECEMBER = . M, DECEMBER = . T, DECEMBER = \nCollection on public holidays will take place, except May 1st and December 25th. The collection for Wednesday May 1st will be brought forward to Tuesday April 30th and the collection for Wednesday December 25th will be brought forward to Tuesday December 24th. The collection for Wednesday January 1st 2025 will be brought forward to Tuesday December 31st.\nMY BLACK GARBAGE COLLECTION'S DAY\nMY YELLOW GARBAGE COLLECTION'S DAY\nF, MARCH = . S, MARCH = . S, MARCH = . M, MARCH = . T, MARCH = . W, MARCH = . T, MARCH = . F, MARCH = . S, MARCH = . S, MARCH = . M, MARCH = . T, MARCH = . W, MARCH = . T, MARCH = . F, MARCH = . S, MARCH = . S, MARCH = . M, MARCH = . T, MARCH = . W, MARCH = . T, MARCH = . F, MARCH = . S, MARCH = . S, MARCH = . M, MARCH = . T, MARCH = . W, MARCH = . T, MARCH = . F, MARCH = . S, MARCH = . S, MARCH = ", + "page_start": 1, + "page_end": 1, + "source_file": "BD-EN_calendrier-Lauzun-2024.pdf" + } + ] + }, + { + "references": { + "source_file": "BD-EN_calendrier-Lauzun-2024.pdf", + "query": "What is the day of the black container in Lachapelle ?", + "target_page": 4, + "target_passage": "LACHAPELLE MONDAY green weeks", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "HOW TO GET A COMPOST KIT?\nTUESDAY white weeks, Black container = THURSDAY green weeks. TUESDAY white weeks, Yellow container = AGNAC. MONDAY green weeks, Black container = WEDNESDAY white weeks. MONDAY green weeks, Yellow container = ALLEMANS-DU-DROPT. TUESDAY white weeks, Black container = THURSDAY green weeks. TUESDAY white weeks, Yellow container = ARMILLAC. WEDNESDAY green weeks, Black container = FRIDAY white weeks. WEDNESDAY green weeks, Yellow container = BOURGOUGNAGUE. MONDAY green weeks, Black container = WEDNESDAY white weeks. MONDAY green weeks, Yellow container = CAMBES. MONDAY green weeks, Black container = THURSDAY white weeks. MONDAY green weeks, Yellow container = LACHAPELLE. TUESDAY white weeks, Black container = WEDNESDAY green weeks. TUESDAY white weeks, Yellow container = LAPERCHE. TUESDAY white weeks, Black container = THURSDAY green weeks. TUESDAY white weeks, Yellow container = LA-SAUVETAT-DU-DROPT. MONDAY green weeks, Black container = FRIDAY white weeks. MONDAY green weeks, Yellow container = LAUZUN. TUESDAY white weeks, Black container = THURSDAY green weeks. TUESDAY white weeks, Yellow container = LAVERGNE. TUESDAY green weeks, Black container = THURSDAY white weeks. TUESDAY green weeks, Yellow container = MIRAMONT-DE-GUYENNE. WEDNESDAY white weeks, Black container = WEDNESDAY green weeks. WEDNESDAY white weeks, Yellow container = MONTIGNAC-DE-LAUZUN. TUESDAY white weeks, Black container = THURSDAY green weeks. TUESDAY white weeks, Yellow container = MONTIGNAC-TOUPINERIE. WEDNESDAY green weeks, Black container = WEDNESDAY white weeks. WEDNESDAY green weeks, Yellow container = MOUSTIER. MONDAY green weeks, Black container = THURSDAY white weeks. MONDAY green weeks, Yellow container = PEYRIÈRE. MONDAY green weeks, Black container = WEDNESDAY white weeks. MONDAY green weeks, Yellow container = PUYSSERAMPION. MONDAY white weeks, Black container = THURSDAY green weeks. MONDAY white weeks, Yellow container = ROUMAGNE. WEDNESDAY white weeks, Black container = WEDNESDAY green weeks. WEDNESDAY white weeks, Yellow container = SAINT-COLOMB-DE-LAUZUN. MONDAY white weeks, Black container = FRIDAY green weeks. MONDAY white weeks, Yellow container = SAINT-PARDOUX-ISAAC. WEDNESDAY white weeks, Black container = WEDNESDAY green weeks. WEDNESDAY white weeks, Yellow container = SEGALAS", + "page_start": 3, + "page_end": 3, + "source_file": "BD-EN_calendrier-Lauzun-2024.pdf" + }, + { + "text": "Liquid\nBio-alcohol Sulphur lies (Black liquor) Sewage sludge Other liquid biomass", + "page_start": 46, + "page_end": 46, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "When to put my garbage container outside?\nThe evening before the waste collection day.", + "page_start": 3, + "page_end": 3, + "source_file": "BD-EN_calendrier-Lauzun-2024.pdf" + }, + { + "text": "2024\nM, DECEMBER = . T, DECEMBER = . W, DECEMBER = . T, DECEMBER = . F, DECEMBER = . S, DECEMBER = . S, DECEMBER = . M, DECEMBER = . T, DECEMBER = . W, DECEMBER = . T, DECEMBER = . F, DECEMBER = . S, DECEMBER = . S, DECEMBER = . M, DECEMBER = . T, DECEMBER = . W, DECEMBER = . T, DECEMBER = . F, DECEMBER = . S, DECEMBER = . S, DECEMBER = . M, DECEMBER = . T, DECEMBER = . W, DECEMBER = . T, DECEMBER = . F, DECEMBER = . S, DECEMBER = . S, DECEMBER = . M, DECEMBER = . T, DECEMBER = \nCollection on public holidays will take place, except May 1st and December 25th. The collection for Wednesday May 1st will be brought forward to Tuesday April 30th and the collection for Wednesday December 25th will be brought forward to Tuesday December 24th. The collection for Wednesday January 1st 2025 will be brought forward to Tuesday December 31st.\nMY BLACK GARBAGE COLLECTION'S DAY\nMY YELLOW GARBAGE COLLECTION'S DAY\nF, MARCH = . S, MARCH = . S, MARCH = . M, MARCH = . T, MARCH = . W, MARCH = . T, MARCH = . F, MARCH = . S, MARCH = . S, MARCH = . M, MARCH = . T, MARCH = . W, MARCH = . T, MARCH = . F, MARCH = . S, MARCH = . S, MARCH = . M, MARCH = . T, MARCH = . W, MARCH = . T, MARCH = . F, MARCH = . S, MARCH = . S, MARCH = . M, MARCH = . T, MARCH = . W, MARCH = . T, MARCH = . F, MARCH = . S, MARCH = . S, MARCH = ", + "page_start": 1, + "page_end": 1, + "source_file": "BD-EN_calendrier-Lauzun-2024.pdf" + }, + { + "text": "RELATED ARTICLES\nMar 06, 2024\nCelebrate St. Patrick's Day with No Booze, Just Pure Irish Fun and Entertainment\nMar 06, 2024\nExplore Downtown San Pedro with Flair: Ride the Iconic Red Car Trolley for Free\nMar 06, 2024\nSay Hello to Your Big Break at the Stapleton Library Job Fair in Vocation, Trade, or Civil Service\nFeb 22, 2024\nRetrain Your Emotional Brain: A Natural Alternative to Weight Loss Drugs\nContact Us\nWork From Home Privacy Policy\nTerms of Use\n© Copyright NewsUSA 2025. All Rights Reserved.\nFeb 21, 2024\nSerial Entrepreneur Teaches Us How to Go the Distance in Business and in Life\nNEWSUSA\nMar 06, 2024\nLocal Artists Collaborate for a Unique Fusion of Groove and Collage\nFASHION\nBUSINESS\nINFOGRAPHIC\nENVIRONMENT\nHEALTH\nMONEY\nFOOD\nTRAVEL\nBRIDAL\nRECREATION\nTECHNOLOGY\nHOME\nEDUCATION\nARTS & ENTERTAINMENT\nAUTO\nCHILDREN\nFITNESS\nHOLIDAY\nINSURANCE\nLAWN & GARDEN\nLISTICLE\nNUTRITION\nPARENTING\nPETS\nSEASONAL\nSENIORS\nSPANISH\nTIPS AND HOW TO\nENTERTAINMENT\nCAREER\nCOMMUNITY\nFAMILY\nTIPS\nINTERNET\nHUMAN_INTEREST\nBEAUTY\nARTS\nREALESTATE\nSAFETY\nMEDICINE\nBOOK_REVIEW\nRECIPE\nAFRICAN_AMERICANS\nHOW_TO\nBYLINED_COLUMN\nCHARITY\nSPORTS\nHOME_IMPROVEMENT\nTECH\nWELLNESS\nARTS AND ENTERTAINMENT\nFOOD & DRINK\nREAL_ESTATE\nVETERANS\nOUTDOORS\nREAL ESTATE\nHUMAN INTEREST\nMONEY & FINANCE\nFASHION & BEAUTY\nMONEY AND FINANCE\nBOOKS & ENTERTAINMENT\nBOOKS\nARTS & ENTERTAINMENT\nCATEGORIES\nRECENT POSTS", + "page_start": 0, + "page_end": 0, + "source_file": "news1.pdf" + }, + { + "text": "Let's reduce our household garbage!\nIn the pays de Lauzun district,\nBETTER SORTING, LESS THROWING !\nM, JANUARY = . T, JANUARY = . W, JANUARY = . T, JANUARY = . F, JANUARY = . S, JANUARY = . S, JANUARY = . M, JANUARY = . T, JANUARY = . W, JANUARY = . T, JANUARY = . F, JANUARY = . S, JANUARY = . S, JANUARY = . M, JANUARY = . T, JANUARY = . W, JANUARY = . T, JANUARY = . F, JANUARY = . S, JANUARY = . S, JANUARY = . M, JANUARY = . T, JANUARY = . W, JANUARY = . T, JANUARY = . F, JANUARY = . S, JANUARY = . S, JANUARY = . M T, JANUARY = . W, JANUARY = \nFULL CONTAINER OR HALF FILLED CONTAINER IT'S THE SAME PRICE!\nI PUT MY RUBBISH CONTAINER OUT ONLY WHEN FULL\nOUT BLACK CONTAINER\n=\nCONTAINER COUNTED\nT, AUGUST = . F, AUGUST = . S, AUGUST = . S, AUGUST = . M, AUGUST = . T, AUGUST = . W, AUGUST = . T, AUGUST = . F, AUGUST = . S, AUGUST = . S, AUGUST = . M, AUGUST = . T, AUGUST = . W, AUGUST = . T, AUGUST = . F, AUGUST = . S, AUGUST = . S, AUGUST = . M, AUGUST = . T, AUGUST = . W, AUGUST = . T, AUGUST = . F, AUGUST = . S, AUGUST = . S, AUGUST = . M, AUGUST = . T, AUGUST = . W, AUGUST = . T, AUGUST = . F, AUGUST = . S, AUGUST = \n, 1 = SEPTEMBER. S, 1 = . M, 1 = . T, 1 = . W, 1 = . T, 1 = . F, 1 = . S, 1 = . S, 1 = . M, 1 = . T, 1 = . W, 1 = . T, 1 = . F, 1 = . S, 1 = . S, 1 = . M, 1 = . T, 1 = . W, 1 = . T, 1 = . F, 1 = . S, 1 = . S, 1 = . M, 1 = . T, 1 = . W, 1 = . T, 1 = . F, 1 = . S, 1 = . M, 1 = ", + "page_start": 0, + "page_end": 1, + "source_file": "BD-EN_calendrier-Lauzun-2024.pdf" + }, + { + "text": "7.2.2 OpenShift Container Platform 3.11 ppc64le on-premises\nExample 7-20 Deleting Pod and maintaining the data\n4096 Nov 10 12:07 diagnostic.data, 1 = . -rw-------. 1 mongo root 24576 Nov 10 12:07 index-1-7744448727083060016.wt, 1 = -rw-------. 1 mongo root 16384 Nov 10 12:07 index-1--1629751576978663310.wt. , 1 = -rw-------. 1 mongo root 24576 Nov 10 12:07 index-2-7744448727083060016.wt. -rw-------. 1 mongo root 32768 Nov 10 12:07 index-3--1629751576978663310.wt, 1 = . , 1 = -rw-------. 1 mongo root 3735552 Nov 10 12:07 index-4-7744448727083060016.wt. , 1 = -rw-------. 1 mongo root 16384 Nov 9 14:38 index-5--1629751576978663310.wt. , 1 = -rw-------. 1 mongo root 16384 Nov 10 12:07 index-6--1629751576978663310.wt. , 1 = drwx------. 2 mongo root 4096 Nov 9 16:23 journal. , 1 = -rw-------. 1 mongo root 36864 Nov 10 12:07 _mdb_catalog.wt. , 1 = -rw-------. 1 mongo root", + "page_start": 195, + "page_end": 195, + "source_file": "sg248459.pdf" + }, + { + "text": "Culture\n8 December each year is marked by the Festival of Lights (la Fête des lumières), a celebration of thanks to the Virgin Mary, who purportedly saved the city from a deadly plague in the Middle Ages. During the event, the local population places candles ( luminions ) at their windows and the city of Lyon organizes large-scale light shows onto the sides of important Lyonnais monuments, such as the medieval Cathédrale St-Jean.\nThe Saint Francis of Sales church is famous for its large and unaltered Cavaillé-Coll pipe organ, attracting audiences from around the world.\nThe Opéra Nouvel (New Opera House) is the home of the Opéra National de Lyon. The original opera house was re-designed by the distinguished French architect Jean Nouvel between 1985 and 1993 and is named after him.\nLyon is also the French capital of \" trompe l'œil \" walls, a very ancient tradition. Many are to be seen around the city. This old tradition is now finding a contemporary expression, for example in the art of Guillaume Bottazzi. [50][51]\nThe Brothers of the Sacred Heart, a Roman Catholic congregation that operates schools in Europe and North America, was founded in Lyon in 1821.\nThe African Museum of Lyon is one of the oldest museums situated in Lyon. [52]\nThe Museum of Resistance and Deportation looks at the various individuals prominent in the Resistance movement in World War II. The building is strongly linked to Klaus Barbie. Lyon sees itself as the centre of the French resistance and many members were shot in Place Bellecour in the town centre. The exhibition is largely a series of , mini-biographies of those involved.\nLyon is a pilot city of the Council of Europe and the European Commission Intercultural cities program.", + "page_start": 14, + "page_end": 14, + "source_file": "wikipedia4.pdf" + }, + { + "text": "Let's reduce our household garbage!\nM, APRIL = . W T, APRIL = . T, APRIL = . F, APRIL = . S, APRIL = . S, APRIL = . M, APRIL = . T, APRIL = . W, APRIL = . F, APRIL = . S, APRIL = . S, APRIL = . M, APRIL = . T, APRIL = . W, APRIL = . T, APRIL = . F, APRIL = . S, APRIL = . S, APRIL = . M T, APRIL = . W, APRIL = . T, APRIL = . F S, APRIL = . S, APRIL = . M, APRIL = . T, APRIL = \nW, OCTOBER = . T, OCTOBER = . F, OCTOBER = . S, OCTOBER = . S, OCTOBER = . M, OCTOBER = . T, OCTOBER = . W, OCTOBER = . T, OCTOBER = . F, OCTOBER = . S, OCTOBER = . S, OCTOBER = . M, OCTOBER = . T, OCTOBER = . W, OCTOBER = . T, OCTOBER = . F, OCTOBER = . S, OCTOBER = . S, OCTOBER = . M, OCTOBER = . T, OCTOBER = . W, OCTOBER = . T, OCTOBER = . F, OCTOBER = . S, OCTOBER = . S, OCTOBER = . M, OCTOBER = . T, OCTOBER = . W, OCTOBER = . T, OCTOBER = ", + "page_start": 1, + "page_end": 1, + "source_file": "BD-EN_calendrier-Lauzun-2024.pdf" + }, + { + "text": "POINTS IN TIME\n19\n93", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_MGM_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "BD-EN_calendrier-Lauzun-2024.pdf", + "query": "What to do if my container is stolen ?", + "target_page": 4, + "target_passage": "Container stolen: What to do? In case of theft, your container will be replaced on presentation of a theft report effected at your local police station.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Container stolen: What to do?\nIn case of theft, your container will be replaced on presentation of a theft report effected at your local police station.", + "page_start": 3, + "page_end": 3, + "source_file": "BD-EN_calendrier-Lauzun-2024.pdf" + }, + { + "text": "Spare\nAn extra storage component, such as a drive or tape, that is predesignated for use as a replacement for a failed component.", + "page_start": 806, + "page_end": 806, + "source_file": "sg247938.pdf" + }, + { + "text": "Out container = full container\nPut your rubbish container out only when full.\nAttention ! Black garbage bags left on the ground will no longer be collected.\nPlease be respectful with the agents.", + "page_start": 3, + "page_end": 3, + "source_file": "BD-EN_calendrier-Lauzun-2024.pdf" + }, + { + "text": "12.7 Recovering from a provider loss\nIf both encryption key providers are enabled, and you lose one of them (by losing all copies of the encryption key kept on the USB flash drives or by losing all SKLM servers), you can recover from this situation by disabling the provider to which you lost the access. To disable the unavailable provider, you must have access to a valid master access key on the remaining provider.\nIf you have lost access to the encryption key server provider, issue the following command:\nchencryption -keyserver disable\nIf you have lost access to the USB flash drives provider, issue the following command:\nchencryption -usb disable\nIf you want to restore the configuration with both encryption key providers, follow the instructions that are described in 12.5, 'Configuring more providers' on page 647.\nNote: If you lose access to all encryption key providers that are defined in the system, no method is available to recover access to the data protected by the master access key.", + "page_start": 677, + "page_end": 677, + "source_file": "sg247938.pdf" + }, + { + "text": "Who is responsible for the maintenance of the containers?\nYou will have to keep them in a clean working state (periodical washing).", + "page_start": 3, + "page_end": 3, + "source_file": "BD-EN_calendrier-Lauzun-2024.pdf" + }, + { + "text": "1. Create a Persistent Volume Claim:\noc set volume dc/docker-registry --add --name=registry-storage -t pvc --claim-name=registry-pvc --mount-path=/registry --overwrite deploymentconfig.apps.openshift.io/docker-registry volume updated oc set volume dc/docker-registry deploymentconfigs/docker-registry secret/registry-certificates as registry-certificates mounted at /etc/secrets pvc/registry-pvc (allocated 1TiB) as registry-storage mounted at /registry oc get pod NAME READY STATUS RESTARTS AGE docker-registry-2-8h9cf 1/1 Running 0 1m registry-console-1-p5clt 1/1 Running 0 46m router-1-2hm94 1/1 Running 0 47m router-1-2s9zn 1/1 Running 0 47m router-1-72f7r 1/1 Running 0 47m oc exec -ti docker-registry-2-8h9cf bash bash-4.2$ df -h Filesystem Size Used Avail Use% Mounted on /dev/mapper/mpatha 1008G 77M 957G 1% /registry bash-4.2$ mount | grep regi /dev/mapper/mpatha on /registry type ext4 (rw,relatime,seclabel,data=ordered) bash-4.2$ exit exit", + "page_start": 157, + "page_end": 157, + "source_file": "sg248459.pdf" + }, + { + "text": "Container\nA container is a software object that holds or organizes other software objects or entities.", + "page_start": 794, + "page_end": 794, + "source_file": "sg247938.pdf" + }, + { + "text": "Related resource:\n· Deploy container images", + "page_start": 61, + "page_end": 61, + "source_file": "serverless-core.pdf" + }, + { + "text": "10.Reboot the VMs:\n----------------------------------------- 6.54s Gathering Facts ------------------------------------------------------------------ 5.48s container_runtime : Get current installed Docker version ------------------------- 2.92s Gathering Facts ------------------------------------------------------------------ 2.26s Start and enable ntpd/chronyd ---------------------------------------------------- 1.65s os_firewall : Ensure iptables services are not enabled --------------------------- 1.59s Check for NetworkManager service ------------------------------------------------- 1.58s container_runtime : Setup the docker-storage for overlay ------------------------- 1.48s openshift_sanitize_inventory : include_tasks ------------------------------------- 1.19s openshift_sanitize_inventory :", + "page_start": 148, + "page_end": 148, + "source_file": "sg248459.pdf" + }, + { + "text": "Action: Take offline\nSelect Take Offline to take a drive offline. You must confirm the action, as shown in Figure 6-27.\nFigure 6-27 Taking a drive offline\nIf a spare drive is available and the drive is taken offline, the MDisk of which the failed drive is a member remains Online . The spare is automatically reassigned. If no spare drive is available and the drive is taken offline, the status of the array of which the failed drive is a member becomes Degraded . Therefore, the status of the storage pool to which the MDisk belongs becomes Degraded as well.\nThe system prevents you from taking the drive offline if one of the following conditions is true:\n/SM590000 The first option was selected and no suitable spares are available.\n/SM590000 Losing another drive in the array results in data loss.\nA drive that is taken offline is considered Failed , as shown in Figure 6-28 on page 211.\nFigure 6-28 An offline drive is marked as failed\nTo set the drive offline with the CLI, use chdrive . See Example 6-12. This command returns no feedback.\nExample 6-12 Setting drive offline with CLI\nIBM_Storwize:ITSOV7K::superuser>chdrive -use failed 3 IBM_Storwize:ITSOV7K::superuser>", + "page_start": 231, + "page_end": 232, + "source_file": "sg247938.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed6_cc4.pdf", + "query": "How many people include the Dyspnea study ?", + "target_page": 1, + "target_passage": "This population-based study included 2,857 adults who were experiencing respiratory symptoms.", + "chunk_present": { + "presence": true, + "index": 3 + } + }, + "top_chunk": [ + { + "text": "Recruitment of Undiagnosed Cases and Healthy\nDyspnea is a prevalent symptom with consequences that extend beyond its physiologic implications. A study in European patients with COPD explored the burden of dyspnea and identi /uniFB01 ed potential correlates. The study revealed that higher dyspnea impact correlated with lower health-related quality of life, increased work impairment, and a higher frequency of emergency department visits. 7\nThe three objectives of our study were as follows: (1) to evaluate the impact of dyspnea in adults from the general population who had no prior diagnosis of respiratory disease but who reported having signi /uniFB01 cant respiratory symptoms in the past 6 months; (2) to identify associated risk factors for dyspnea and estimate their in /uniFB02 uence on the symptom; and (3) to explore the relationship between dyspnea and health care utilization, quality of life, and work productivity in adults with undiagnosed respiratory symptoms.\nthe study was obtained from the research ethics boards of the 17 participating study sites across Canada. Informed, written consent was provided by all study participants.\nBoth landlines and cellphones within a 90-minute radius of any of the 17 study sites were dialed randomly. A\n(P. H.), Dalhousie University, Halifax, NS; the Department of Medicine (I. M. and M. B.), University of Alberta, Edmonton, AB; the Department of Medicine (M. D. L.), Queen ' s University, Kingston; the Department of Medicine (C. J. L.), University of Western Ontario, London, ON; the Department of Medicine (T. A.), Memorial University, St. John ' s, NF; the Department of Medicine (N. E.), McGill University, Montreal, QC; the Department of Medicine (M. A.), University of Manitoba, Winnipeg, MN, Canada.\nDrs Bierbrier and Gerstein contributed equally to this manuscript.\nPart of this work has been presented at the American Thoracic Society Conference, May 17-22, 2024, San Diego, CA.", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Statistical Analysis\nBox plots were used to compare distribution patterns of dyspnea impact assessments among the disease groups. Pairwise comparison tests were conducted to evaluate mean dyspnea differences between groups. Multiple linear regression analysis was used to measure contributions to variability of dyspnea by selected patient-speci /uniFB01 c risk factors, spirometry disease classi /uniFB01 cation, and key lung function measures. The selected sets of risk factors were evaluated using successive regression analyses. Analysis of variance sums of squares from the successive regression analyses provided the cumulative percentage contributions to variability of dyspnea. Simple, multiple, and logistic regression analyses were used to study associations between dyspnea and health care utilization, quality of life, and work productivity outcomes. All statistical analyses were done using STATA 16 statistical software (StataCorp).\nparticipants (24%) did not meet the threshold of $ 6 points on the ASQ or $ 20 points on the COPDDiagnostic Questionnaire and were thus excluded, leaving 4,272 individuals deemed eligible for spirometry.\nFigure 1 -Study /uniFB02 ow diagram demonstrating the case /uniFB01 nding and control group recruitment and allocation. ASQ ¼ Asthma Screening Questionnaire; COPD-DQ ¼ COPD Diagnostic Questionnaire; CF ¼ cystic /uniFB01 brosis; MI ¼ myocardial infarction; PRISM ¼ preserved ratio impaired spirometry.\nchestjournal.org\n1299\nTABLE 1 ] Descriptive Characteristics and Demographics of the Study Group", + "page_start": 3, + "page_end": 4, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Discussion\nDyspnea is a complex, subjective symptom that is modi /uniFB01 ed by nonrespiratory factors including psychosocial, social, and environmental in /uniFB02 uences. 5 Interindividual variability in the perception of dyspnea, in /uniFB02 uenced by these nonrespiratory factors, may play an important role. A study conducted by Ziegler et al 24 assessed the perception of dyspnea in 42 healthy individuals using a standardized inspiratory resistive loading stimulus. The study used the modi /uniFB01 ed Borg scale to measure dyspnea perception levels. Among the participants subjected to the same inspiratory resistive load, 31%, 45%, and 24% of participants classi /uniFB01 ed their level of dyspnea as low, intermediate, and high, respectively. The study revealed that differences between individuals contribute considerable variability to the perception of dyspnea, even among healthy participants.\nThe affective dimension of dyspnea can be captured using additional questionnaires (eg, Multidimensional Dyspnea Pro /uniFB01 le, Dyspnea-12). Studies have explored the use of the Multidimensional Dyspnea Pro /uniFB01 le in\nTABLE 7 ] Unadjusted and Adjusted Dyspnea Associations With Quality of Life (SF-36)", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Impact of Dyspnea on Adults With Respiratory Symptoms Without a De /uniFB01 ned Diagnosis\nJared Bierbrier, BSc; Emily Gerstein; George A. Whitmore, PhD; Katherine L. Vandemheen, MScN; Celine Bergeron, MD; Louis-Philippe Boulet, MD; Andreanne Cote, MD; Stephen K. Field, MD; Erika Penz, MD; R. Andrew McIvor, MD; Catherine Lemière, MD; Samir Gupta, MD; Paul Hernandez, MD; Irvin Mayers, MD; Mohit Bhutani, MD; M. Diane Lougheed, MD; Christopher J. Licskai, MD; Tanweer Azher, MD; Nicole Ezer, MD; Martha Ainslie, MD; Gonzalo G. Alvarez, MD; Sunita Mulpuru, MD; and Shawn D. Aaron, MD\nBACKGROUND: We investigated dyspnea; its associated risk factors; and its impact on health care utilization, quality of life, and work productivity in adults with undiagnosed respiratory symptoms.\nRESEARCH QUESTION: What is the impact of dyspnea in adults with undiagnosed respiratory symptoms?\nSTUDY DESIGN AND METHODS: This population-based study included 2,857 adults who were experiencing respiratory symptoms. These individuals had not been previously diagnosed with any lung conditions and were recruited from 17 Canadian centers using random digit dialing. Each participant underwent spirometry testing both before and after using a bronchodilator to determine if they met the diagnostic criteria for COPD, asthma, or preserved ratio impaired spirometry (PRISm), or if their spirometry results were normal. An agematched control group (n ¼ 231) was similarly recruited using random digit dialing. A dyspnea impact assessment score from 0 to 100 was produced using questions from the COPD Assessment Test and St. George ' s Respiratory questionnaire.", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Take-home Points\nStudy Question: How profoundly are adults with undiagnosed respiratory symptoms affected by dyspnea?\nResults: In community-based adults with undiagnosed respiratory symptoms, those identi /uniFB01 ed with preserved ratio impaired spirometry experienced the greatest impact of dyspnea, followed by those with undiagnosed asthma or COPD. Greater dyspnea impact was associated with increased health care utilization, lower quality of life, and reduced work productivity.\nInterpretation: Dyspnea imposes burdens on the health care system and is associated with impaired quality of life and work productivity.\nDyspnea refers to a subjective sensation of breathing discomfort. 1 In a study involving a community-based population aged > 70 years, the prevalence of dyspnea was found to be 32%. 2 Dyspnea can lead to limitations in daily activities, reduced exercise tolerance, and heightened mortality risks. 3\nDyspnea not only affects individuals with diagnosed respiratory conditions but also poses a signi /uniFB01 cant burden on those with undiagnosed conditions. In a systematic review by Müller et al, 4 the combined", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Recruitment of Undiagnosed Cases and Healthy\nControl Patients\nBetween June 2017 and January 2023, adults aged $ 18 years were recruited through a two-step process into the Undiagnosed COPD and Asthma Population (UCAP) study, a multicenter case /uniFB01 nding study. Approval for\nABBREVIATIONS: ASQ = Asthma Screening Questionnaire; BD = bronchodilator; CAT = COPD Assessment Test; PCA = principal component analysis; PRISm = preserved ratio impaired spirometry; SGRQ = St. George ' s Respiratory Questionnaire\nAFFILIATIONS: From The Ottawa Hospital Research Institute (J. B., E. G., K. L. V., G. G. A., S. M., and S. D. A.), University of Ottawa, Ottawa, ON; the Desautels Faculty of Management (G. A. W.), McGill University, Montreal, QC; the Department of Medicine (C. B.), The University of British Columbia, Vancouver, BC; the Centre de recherche (L.-P. B. and A. C.), Institut de cardiologie et de pneumologie de Québec, Université Laval, Quebec, QC; the Cumming School of Medicine (S. K. F.), University of Calgary, Calgary, AB; the Department of Medicine (E. P.), University of Saskatchewan, Regina, SK; the Firestone Institute for Respiratory Health (R. A. M.), McMaster University, Hamilton, ON; the Department of Medicine (C. L.), Université de Montreal, Montreal, QC; the Department of Medicine and the Li Ka Shing Knowledge Institute (S. G.), St. Michael ' s Hospital University of Toronto, Toronto, ON; the Department of Medicine\nchestjournal.org\n1297\nprevalence of dyspnea in the adult general population across 11 studies was estimated to be 10%. Dyspnea can arise from a broad spectrum of underlying factors, including both respiratory and nonrespiratory conditions. Studies have revealed that dyspnea is not solely attributable to respiratory conditions but is also heavily in /uniFB02 uenced by cardiovascular deconditioning and by nonrespiratory factors, including psychosocial, social, and environmental determinants. 5,6", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Discussion\nOur study explored dyspnea in community-based adults with undiagnosed respiratory symptoms identi /uniFB01 ed via case /uniFB01 nding. Surprisingly, we found that the dyspnea experienced by those with PRISm had a greater impact on their activities and health status than those with newly diagnosed COPD or asthma.\nThe prevalence of individuals who were obese and morbidly obese in the PRISm group partially explains the between-group difference in dyspnea. The excess dyspnea seen in the PRISm group when compared with the normal spirometry group is partly explained by patient-speci /uniFB01 c risk factors, including BMI, which shrink the mean dyspnea differential between the groups from 11.2 to 5.5 points (Tables 3-6). The remaining 5.5point difference indicates that PRISm patients have excess dyspnea relative to symptomatic individuals with normal spirometry for additional reasons other than obesity.\n[\n166#6 CHEST DECEMBER 2024\n]\nTABLE 6 ] Dyspnea Regressed on Lung Function Variables Representing Severity of Impairment", + "page_start": 8, + "page_end": 9, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Discussion\nData are presented as OR (95% CI) with P values. Adjusted values are adjusted for age, sex, and BMI.\noutpatients with cardiorespiratory disease 25 and the Dyspnea-12 in patients with asthma 26 and found that the affective aspect of dyspnea can signi /uniFB01 cantly in /uniFB02 uence the impact of dyspnea on health status, irrespective of the intensity of breathlessness.\nIn those with PRISm, there was a strong, positive association between higher values for the FEV1/FVC ratio and dyspnea. For the PRISm group, a higher FEV1/FVC ratio may re /uniFB02 ect diminished lung compliance due to interstitial lung disease and/or respiratory system restriction due to obesity, which could contribute to worse dyspnea. Conversely, the association of dyspnea with the FEV1/FVC ratio was in the opposite direction for those with asthma or COPD, and a lower FEV1/FVC ratio correlated with worse dyspnea, as expected.\nOur study complements the literature by focusing on adults with undiagnosed respiratory symptoms who were randomly selected and recruited through active case /uniFB01 nding in the community. This increases the generalizability of our results to a broader population. Our dyspnea questions were derived from widely used\nand validated respiratory health questionnaires, and our dyspnea assessment measure is a weighted average of responses to these validated questions. Consequently, the measure has an immediate interpretation in terms of the lived day-to-day experience of individuals.", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "References\n1. Parshall MB, Schwarthzstein RM, Adams L, et al. An Of /uniFB01 cial American Thoracic Society Statement: update on the mechanisms, assessment, and management of dyspnea. Am J Respir Crit Care Med . 2012;185:435-452.\n2. Ho SF, O ' Mahony MS, Steward JA, et al. Dyspnoea and quality of life in older people at home. Age Ageing . 2001;30: 155-159.\n3. Laviolette L, Laveneziana P. Dyspnoea: a multidimensional and multidisciplinary approach. Eur Respir J . 2014;43: 1750-1762.\n4. Müller A, Mraz T, Wouters EFM, et al. Prevalence of dyspnea in general adult populations: a systematic review and meta-analysis. Respir Med . 2023;218: 107379.\n5. Nishino T. Dyspnoea: underlying mechanisms and treatment. Br J Anaesth . 2011;106:463-474.\n6. NederJ,BertonD,MüllerP,etal. Ventilatory inef /uniFB01 ciency and exertional dyspnea in early chronic obstructive pulmonary disease. Ann Am Thorac Soc . 2017;14(suppl_1): S22-S29.\n7. Gruenberger JB, Vietri J, Keininger DL, Mahler DA. Greater dyspnea is associated with lower health- related quality of life among European patients with COPD. Int J Chron Obstruct Pulmon Dis . 2017;12: 937-944.\n8. Preteroti M, Whitmore GA, Vandemheen KL, et al. Population-based case/uniFB01 nding to identify subjects with undiagnosed asthma or COPD. Eur Respir J . 2020;55:2000024.", + "page_start": 11, + "page_end": 12, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "TABLE 2 ] (Continued)\nTable 4 presents the association of dyspnea with patient-speci /uniFB01 c risk factors. Dyspnea impact increased with younger age, being female, higher BMI, higher smoking and smoke exposure history, and total work\n, 1 = . , 2 = . , 3 = . , 4 = ng,. , 5 = . , 6 = . , 7 = . , 8 = . , 9 = . , 1 = . , 2 = . , 3 = . , 4 = gol. , 5 = . , 6 = snow,. , 7 = . , 8 = My. , 9 = . , 1 = . , 2 = . , 3 = . , 4 = . , 5 = My. , 6 = . , 7 = . , 8 = . , 9 = . , 1 = . , 2 = . , 3 = gardening. , 4 = . , 5 = . , 6 = . , 7 = . , 8 = . , 9 = . Dyspnea, 1 = . Dyspnea, 2 = . Dyspnea, 3 = . Dyspnea, 4 = . Dyspnea, 5 = . Dyspnea, 6 = . Dyspnea, 7 = . Dyspnea, 8 = . Dyspnea, 9 = . Questions About, 1 = . Questions About, 2 = . Questions About, 3 = . Questions About, 4 = . Questions About, 5 = . Questions About, 6 = . Questions About, 7 = . Questions About, 8 = . Questions About, 9 = . , 1 = . , 2 = . , 3 = . , 4 = . , 5 = . , 6 = . , 7 = . , 8 = . , 9 = heavy. , 1 = . , 2 = . , 3 = . , 4 = breathing. , 5 = . , 6 = . , 7 = . , 8 = manual. , 9 = manual. , 1 = . , 2 = . , 3 = . , 4 = . , 5 = carrying. , 6 = . , 7 = . , 8 = swimming,. , 9 = . , 1 = 0.123). , 2 = . , 3 = . , 4 = . , 5 = . , 6 = . , 7 = . , 8 = 0.108). , 9 = ", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed6_cc4.pdf" + } + ] + }, + { + "references": { + "source_file": "CompostGuide.pdf", + "query": "Can I put my plants directly on my compost ?", + "target_page": 2, + "target_passage": "Don’t\tput\tplants\tinto\t100%\tcompost.\t\tMix\t\t\t\t\t\t\t\t\t compost\tthoroughly\tinto\texisting\tsoil\tbefore\t\t\t planting.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Tips to Remember:\n· Don't put plants into 100% compost. Mix compost thoroughly into existing soil before planting.\n· When transplanting, it's better to amend the whole bed, not just planting holes, to promote root growth.\n· Ask your compost supplier which compost product is best for your intended use.\n· Use compost at the recommended application rate.\n· To maintain healthy soil, reapply compost or mulch every 1-2 years.\n· Many composts are rich in plant nutrients, so you may be able to reduce fertilizer use after applying compost.\n· Compost can also reduce your lawn and garden's summer irrigation needs.\n· Compost-amended soil and mulching slow run off, reduce erosion, and break down pollutants. When you use compost, you're helping to protect our precious streams, rivers, lakes, and marine waters.", + "page_start": 1, + "page_end": 1, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Compost Beginnings\nThe yard debris or food scraps* that you place into your home compost bin, take to a drop-off site, or set out for curbside collection could become the compost that you later use on your garden, lawn, and flowerbeds.\nIt is essential to place only quality organic material into the composting process. Here are some tips:\nl The products you use or spray in your yard can end up in the compost process. Carefully read the labels of pesticide and herbicide products you use. (See page 9.)\nl Please keep yard debris free of :\nx Garbage\nx Plastic of any sort\n- Plastic plant pots\n- Plastic plant tabs\n- Plastic bags (if you want to bag your yard debris, use paper garden bags - available at most garden centers)\nx Rock, brick, or masonry\nx Glass or metal\nx Pet waste.\n* Many localities now collect food scraps and food-soiled paper along with yard debris for composting. Call your local collection service to find out what is collected in your area.", + "page_start": 4, + "page_end": 4, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Planting New Garden Beds or Lawns\nSpread a 2-4 inch layer of compost and mix into the upper 6-12 inches of existing soil: use more in sandy soils, and less in heavy clay. Reapply ½-1 inch annually on garden beds.", + "page_start": 6, + "page_end": 6, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Revised 2009\nCompost adds organic material and nutrients to the soil, increases water-holding capacity and biological activity, and improves plant growth and health.\nA project of the Washington Organic Recycling Council, with support from the Washington State Department of Ecology's Public Participation Grant program.\nThis product was partly funded through a grant from the Washington Department of Ecology. While these materials were reviewed for grant consistency, this does not necessarily constitute endorsement by the department.\nSpecial thanks: the original version of this brochure in 2003 was created by the Washington County, Oregon Solid Waste and Recycling Program in cooperation with the Washington Organic Recycling Council and the Composting Council of Oregon.\nwww.compostwashington.org\nwww.soilsforsalmon.org\noriginal artwork provided by:", + "page_start": 0, + "page_end": 1, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Compost: A Natural Cycle\nComposting is a natural process in which microorganisms and macro-organisms break down organic material (leaves, twigs, grass, etc.) into a dark crumbly soil amendment. Modern compost facilities use the same natural biological composting process.\nTheir controlled-temperature process works faster, breaks down pesticide residues, and also kills weed seeds and plant diseases.\nCompost improves soil structure and plant growth by\n· Replenishing soil organic matter, and storing nutrients in plant-available forms\n· Supporting beneficial soil life\n· Reducing erosion and water run-off\n· Loosening clay soils for better root development (increasing soil pore space)\n· Retaining moisture in sandy soils so plants need less watering.", + "page_start": 3, + "page_end": 3, + "source_file": "CompostGuide.pdf" + }, + { + "text": "2. Heating Up:\nThe material is placed into piles where it begins to heat up from the biological activity of the compost microbes. Typically, compost temperatures are required to reach at least 131 degrees F in a specified time period in order to destroy weed seeds and pathogens. The compost is turned or aerated, allowing the composting microbes to breathe. After a period of time, the nitrogen-rich material is depleted, the biological process slows, and the hot compost begins to cool.", + "page_start": 6, + "page_end": 6, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Building Rich and Healthy Soil With Compost\nTo grow healthy plants you need healthy soil.", + "page_start": 5, + "page_end": 5, + "source_file": "CompostGuide.pdf" + }, + { + "text": "What is compost?\nCompost is a natural humus-like soil amendment that results from the controlled aerobic (with oxygen) decomposition of organic materials. Compost is not soil - it should be mixed with soil. It is not fertilizer, although it contains many slowly released nutrients.", + "page_start": 4, + "page_end": 4, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Selecting Quality Compost\nCompost is available in many product types and blends that may be used for different gardening applications. The type of feedstock, the composting process, and any supplementary additives determine the end product.\nMany facilities offer a variety of blends based on compost, such as garden mix, potting soil, planting mix, mulches, turf top-dressing and soil blends.", + "page_start": 5, + "page_end": 5, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Mulch (surface applications on landscape beds)\nSpread a 1-2 inch layer of coarse, woody compost. To allow proper airflow, it is best not to pile mulch around the stems of trees and shrubs. Pull mulch 1-2 inches away from stems.", + "page_start": 6, + "page_end": 6, + "source_file": "CompostGuide.pdf" + } + ] + }, + { + "references": { + "source_file": "CompostGuide.pdf", + "query": "What are fertilizers ?", + "target_page": 4, + "target_passage": " Fertilizers are concentrated sources of plant nutrients, used in small amounts to supplement natural soil fertility. ", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "Selecting Quality Compost\nCompost is available in many product types and blends that may be used for different gardening applications. The type of feedstock, the composting process, and any supplementary additives determine the end product.\nMany facilities offer a variety of blends based on compost, such as garden mix, potting soil, planting mix, mulches, turf top-dressing and soil blends.", + "page_start": 5, + "page_end": 5, + "source_file": "CompostGuide.pdf" + }, + { + "text": "1. Grinding Organic Materials:\nDepending on the facility, the feedstock (material) available, and the desired compost product, different combinations of materials are added together and ground into small pieces:\n· Nitrogen-rich materials (such as grass, fresh plant cuttings, biosolids, and manures)\n· Carbon-rich materials (such as dried leaves, woody materials, and straw).", + "page_start": 6, + "page_end": 6, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Comparing Landscape Products\nA variety of soil and landscape products are sold. Here's a comparison:\nCompost is stable, decomposed organic matter, excellent for improving soil structure, fertility, moisture holding capacity, and plant growth.\nMulch is any material applied to the soil surface. Woody mulches (high in carbon, low in nitrogen) like wood chips, bark and woody composts are great for woody plants. Annual plants should be mulched with nutrient-balanced mulches like compost, grass clippings, or leaves.\nPeat Moss is partially decayed sphagnum moss from peat bogs. It provides soil porosity, but not the nutrients or biological diversity for healthy soil that compost provides.\nFertilizers are concentrated sources of plant nutrients, used in small amounts to supplement natural soil fertility.\nTopsoil that is sold is usually not native topsoil. Quality manufactured topsoils are a blend of native sandy sub-soils with composted organic matter to support soil life.", + "page_start": 3, + "page_end": 3, + "source_file": "CompostGuide.pdf" + }, + { + "text": "The Beauty of Your Lawn and Garden Blossoms from the Soil\nThank you for your interest in compost.\nCompost is a versatile product with many benefits. It enhances soil quality, helps save water, and supports your community's efforts to recycle organic debris. All this helps to conserve our natural resources and reduces the amount of material sent to the landfill.\nCompost-amended soil also helps break down pollutants and absorb stormwater runoff. By making nutrients slowly available to plants and enhancing plant health, compost can reduce the need for chemical fertilizers and pesticides. All these benefits help protect our lakes, rivers, and marine waters from pollution and excessive runoff.\nCompost is a natural amendment for your lawn or garden, and can be used regularly to enrich your soil. This guide is designed to help you get the most from the compost that you buy.", + "page_start": 2, + "page_end": 2, + "source_file": "CompostGuide.pdf" + }, + { + "text": "What is compost?\nCompost is a natural humus-like soil amendment that results from the controlled aerobic (with oxygen) decomposition of organic materials. Compost is not soil - it should be mixed with soil. It is not fertilizer, although it contains many slowly released nutrients.", + "page_start": 4, + "page_end": 4, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Blended (Manufactured) Topsoils\nGood quality 'topsoil' products usually include 10-40% compost by volume, mixed with a sandy loam soil that allows good drainage. These compost-soil blends help establish healthy lawns and gardens.", + "page_start": 6, + "page_end": 6, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Healthy Soil:\nl Is teeming with life! Healthy soil is a miniature ecosystem. A teaspoon of healthy soil will have upwards of four billion tiny organisms which recycle nutrients, suppress disease, and discourage pests.\nl Retains moisture but allows drainage. Healthy soil has structure that allows water to drain through, retains moisture, and promotes strong root growth.\nl Is full of organic nutrients. Plants depend on the microorganisms found in healthy organic-rich soil to provide nutrients to their roots, and help them thrive.\nA healthy garden and landscape is naturally resistant to pests, drought, weeds, and diseases. Maintaining healthy soil may allow you to reduce use of chemical fertilizers and pesticides.\nSoil is a planting medium. Compost is a soil amendment. Do not place plants directly into 100% compost. Ask your supplier or see next page for mixes for different uses.", + "page_start": 5, + "page_end": 5, + "source_file": "CompostGuide.pdf" + }, + { + "text": "3. Finishing:\nTypically 'finished' compost has undergone a series of steps to ensure maturity and stability. The cooling compost is aged, which allows the decomposition process to slow down and the finished compost to stabilize.\nThe end products you purchase may be entirely compost, or a combination of compost blended with uncomposted additives (such as peat, bark, minerals, or soil).", + "page_start": 6, + "page_end": 6, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Tips to Remember:\n· Don't put plants into 100% compost. Mix compost thoroughly into existing soil before planting.\n· When transplanting, it's better to amend the whole bed, not just planting holes, to promote root growth.\n· Ask your compost supplier which compost product is best for your intended use.\n· Use compost at the recommended application rate.\n· To maintain healthy soil, reapply compost or mulch every 1-2 years.\n· Many composts are rich in plant nutrients, so you may be able to reduce fertilizer use after applying compost.\n· Compost can also reduce your lawn and garden's summer irrigation needs.\n· Compost-amended soil and mulching slow run off, reduce erosion, and break down pollutants. When you use compost, you're helping to protect our precious streams, rivers, lakes, and marine waters.", + "page_start": 1, + "page_end": 1, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Revised 2009\nCompost adds organic material and nutrients to the soil, increases water-holding capacity and biological activity, and improves plant growth and health.\nA project of the Washington Organic Recycling Council, with support from the Washington State Department of Ecology's Public Participation Grant program.\nThis product was partly funded through a grant from the Washington Department of Ecology. While these materials were reviewed for grant consistency, this does not necessarily constitute endorsement by the department.\nSpecial thanks: the original version of this brochure in 2003 was created by the Washington County, Oregon Solid Waste and Recycling Program in cooperation with the Washington Organic Recycling Council and the Composting Council of Oregon.\nwww.compostwashington.org\nwww.soilsforsalmon.org\noriginal artwork provided by:", + "page_start": 0, + "page_end": 1, + "source_file": "CompostGuide.pdf" + } + ] + }, + { + "references": { + "source_file": "CompostGuide.pdf", + "query": "Explain to me what is peat moss ?", + "target_page": 4, + "target_passage": "Peat Moss is partially decayed sphagnum moss from peat bogs. It provides soil porosity, but not the nutrients or biological diversity for healthy soil that compost provides.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Comparing Landscape Products\nA variety of soil and landscape products are sold. Here's a comparison:\nCompost is stable, decomposed organic matter, excellent for improving soil structure, fertility, moisture holding capacity, and plant growth.\nMulch is any material applied to the soil surface. Woody mulches (high in carbon, low in nitrogen) like wood chips, bark and woody composts are great for woody plants. Annual plants should be mulched with nutrient-balanced mulches like compost, grass clippings, or leaves.\nPeat Moss is partially decayed sphagnum moss from peat bogs. It provides soil porosity, but not the nutrients or biological diversity for healthy soil that compost provides.\nFertilizers are concentrated sources of plant nutrients, used in small amounts to supplement natural soil fertility.\nTopsoil that is sold is usually not native topsoil. Quality manufactured topsoils are a blend of native sandy sub-soils with composted organic matter to support soil life.", + "page_start": 3, + "page_end": 3, + "source_file": "CompostGuide.pdf" + }, + { + "text": "What is compost?\nCompost is a natural humus-like soil amendment that results from the controlled aerobic (with oxygen) decomposition of organic materials. Compost is not soil - it should be mixed with soil. It is not fertilizer, although it contains many slowly released nutrients.", + "page_start": 4, + "page_end": 4, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Compost: A Natural Cycle\nComposting is a natural process in which microorganisms and macro-organisms break down organic material (leaves, twigs, grass, etc.) into a dark crumbly soil amendment. Modern compost facilities use the same natural biological composting process.\nTheir controlled-temperature process works faster, breaks down pesticide residues, and also kills weed seeds and plant diseases.\nCompost improves soil structure and plant growth by\n· Replenishing soil organic matter, and storing nutrients in plant-available forms\n· Supporting beneficial soil life\n· Reducing erosion and water run-off\n· Loosening clay soils for better root development (increasing soil pore space)\n· Retaining moisture in sandy soils so plants need less watering.", + "page_start": 3, + "page_end": 3, + "source_file": "CompostGuide.pdf" + }, + { + "text": "The Beauty of Your Lawn and Garden Blossoms from the Soil\nThank you for your interest in compost.\nCompost is a versatile product with many benefits. It enhances soil quality, helps save water, and supports your community's efforts to recycle organic debris. All this helps to conserve our natural resources and reduces the amount of material sent to the landfill.\nCompost-amended soil also helps break down pollutants and absorb stormwater runoff. By making nutrients slowly available to plants and enhancing plant health, compost can reduce the need for chemical fertilizers and pesticides. All these benefits help protect our lakes, rivers, and marine waters from pollution and excessive runoff.\nCompost is a natural amendment for your lawn or garden, and can be used regularly to enrich your soil. This guide is designed to help you get the most from the compost that you buy.", + "page_start": 2, + "page_end": 2, + "source_file": "CompostGuide.pdf" + }, + { + "text": "* Pods [pod]:\nA set of one or more containers that are deployed onto a Node together and share a unique IP and Volumes (persistent storage). Pods also define the security and runtime policy for each container.", + "page_start": 163, + "page_end": 163, + "source_file": "sg248459.pdf" + }, + { + "text": "Liquid\nBio-alcohol Sulphur lies (Black liquor) Sewage sludge Other liquid biomass", + "page_start": 46, + "page_end": 46, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "Healthy Soil:\nl Is teeming with life! Healthy soil is a miniature ecosystem. A teaspoon of healthy soil will have upwards of four billion tiny organisms which recycle nutrients, suppress disease, and discourage pests.\nl Retains moisture but allows drainage. Healthy soil has structure that allows water to drain through, retains moisture, and promotes strong root growth.\nl Is full of organic nutrients. Plants depend on the microorganisms found in healthy organic-rich soil to provide nutrients to their roots, and help them thrive.\nA healthy garden and landscape is naturally resistant to pests, drought, weeds, and diseases. Maintaining healthy soil may allow you to reduce use of chemical fertilizers and pesticides.\nSoil is a planting medium. Compost is a soil amendment. Do not place plants directly into 100% compost. Ask your supplier or see next page for mixes for different uses.", + "page_start": 5, + "page_end": 5, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Revised 2009\nCompost adds organic material and nutrients to the soil, increases water-holding capacity and biological activity, and improves plant growth and health.\nA project of the Washington Organic Recycling Council, with support from the Washington State Department of Ecology's Public Participation Grant program.\nThis product was partly funded through a grant from the Washington Department of Ecology. While these materials were reviewed for grant consistency, this does not necessarily constitute endorsement by the department.\nSpecial thanks: the original version of this brochure in 2003 was created by the Washington County, Oregon Solid Waste and Recycling Program in cooperation with the Washington Organic Recycling Council and the Composting Council of Oregon.\nwww.compostwashington.org\nwww.soilsforsalmon.org\noriginal artwork provided by:", + "page_start": 0, + "page_end": 1, + "source_file": "CompostGuide.pdf" + }, + { + "text": "3. Finishing:\nTypically 'finished' compost has undergone a series of steps to ensure maturity and stability. The cooling compost is aged, which allows the decomposition process to slow down and the finished compost to stabilize.\nThe end products you purchase may be entirely compost, or a combination of compost blended with uncomposted additives (such as peat, bark, minerals, or soil).", + "page_start": 6, + "page_end": 6, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Pod\nA group of containers that are running on a Kubernetes cluster. A pod is a unit of work that can be run, which can be a a stand-alone application or a set of microservices.", + "page_start": 263, + "page_end": 263, + "source_file": "sg248459.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv3.pdf", + "query": "How encourage temporally adjacent representations to be predictive of each other ?", + "target_page": 2, + "target_passage": "One way to encourage temporally adjacent representations to be predictive of each other is to ensure that they vary slowly over time. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "2 Related Works\nSlow Features. One way to encourage temporally adjacent representations to be predictive of each other is to ensure that they vary slowly over time. Early works targeting predictive features encouraged representations of individual video frames to be locally temporally invariant, while preventing representation collapse by using spectral methods, as in SFA (Wiskott and Sejnowski, 2002), SSA (Kayser et al., 2001), and Simulated Fixations (Zou et al., 2012). More recently, Goroshin et al. (2015); Wang et al. (2010) train a siamese convolutional network to map the representations of two subsequent frames to the same point, while encouraging distant frames to have diverse representations via a pairwise margin loss and a triplet loss, respectively. Other works (Oord et al., 2018; Surís et al., 2021; Feichtenhofer et al., 2021) implement temporal invariance using noisecontrastive estimation (Gutmann and Hyvärinen, 2012). Our exploration in this paper goes beyond temporal in-\n2\nriance and explores feature prediction using masked modeling.", + "page_start": 1, + "page_end": 1, + "source_file": "arxiv3.pdf" + }, + { + "text": "1 Introduction\nHumans possess the remarkable ability to map low-level signals originating from the retina into a semantic spatiotemporal understanding of the world; synthesizing notions such as objects and global motion (Spelke et al., 1995). A long-standing goal of the machine learning community is to identify the principles or objectives that may guide such unsupervised learning in humans (Field, 1994; Berkes and Wiskott, 2005; Hinton, 1989). One related hypothesis is based on the predictive feature principle (Rao and Ballard, 1999), which posits that representations of temporally adjacent sensory stimuli should be predictive of each other.\nIn this work, we revisit feature prediction as a standalone objective for unsupervised learning of visual representations from video. Numerous advances in the field such as the standard use of transformer architectures in vision (Dosovitskiy et al., 2020), the maturing of masked autoencoding frameworks (Xie et al., 2021; Bao et al., 2021; He et al., 2021), query-based feature pooling (Chen et al., 2022), joint-embedding predictive architectures (JEPA) (LeCun, 2022; Assran et al., 2023; Baevski et al., 2022b), and larger datasets - form a unique arsenal of tools, which we integrate in a modern and conceptually simple method, the video joint-embedding predictive architecture or V-JEPA , which is based solely on feature prediction, without using pretrained image encoders, text, negative examples, human annotations, or pixel-", + "page_start": 0, + "page_end": 0, + "source_file": "arxiv3.pdf" + }, + { + "text": "References\nlanguage., 1 = Christoph Feichtenhofer, Yanghao Li, Kaiming He, et al. Masked autoencoders as spatiotemporal learners. Advances in neural information processing systems , 35:35946-35958, 2022.. Alexei Baevski, Wei-Ning Hsu, Qiantong Xu, Arun Babu, Jiatao Gu, and Michael Auli. Data2vec: A general frame- work for self-supervised learning in speech, vision and language. arXiv preprint arXiv:2202.03555 , 2022b., 1 = David J Field. What is the goal of sensory coding? Neural computation , 6(4):559-601, 1994.. Hangbo Bao, Li Dong, and Furu Wei. Beit: Bert pre-training of image transformers. arXiv preprint arXiv:2106.08254 , 2021., 1 = Spyros Gidaris, Andrei Bursuc, Nikos Komodakis, Patrick Pérez, and Matthieu Cord. Learning representations by predicting bags of visual words. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern. Pietro Berkes and Laurenz Wiskott. Slow feature analysis yields a rich repertoire of complex cell properties. Journal of vision , 5(6):9-9, 2005., 1 = Recognition , pages 6928-6938, 2020. Rohit Girdhar and Kristen Grauman. Anticipative video transformer. In Proceedings of the IEEE/CVF interna-. Mathilde Caron, Ishan Misra, Julien Mairal, Priya Goyal, Piotr Bojanowski, and Armand Joulin. Unsupervised learn- ing of visual features by contrasting cluster assignments. arXiv preprint arXiv:2006.09882 , 2020. Mathilde Caron, Hugo Touvron, Ishan Misra, Hervé Jé-, 1 = tional conference on computer vision , pages 13505-13515, 2021. Rohit Girdhar, Alaaeldin El-Nouby, Mannat Singh, Kalyan Vasudev Alwala, Armand Joulin, and Ishan Misra. Omnimae: Single model masked pretraining on images. Ting Chen, Simon Kornblith, Mohammad Norouzi,", + "page_start": 10, + "page_end": 10, + "source_file": "arxiv3.pdf" + }, + { + "text": "References\nand Ge- offrey Hinton. A simple framework for contrastive learning of visual representations. preprint arXiv:2002.05709 , 2020., 1 = Ross Goroshin, Joan Bruna, Jonathan Tompson, David Eigen, and Yann LeCun. Unsupervised learning of spatiotempo- rally coherent metrics. In Proceedings of the IEEE inter-. Xiaokang Chen, Mingyu Ding, Xiaodi Wang, Ying Xin, Shentong Mo, Yunhao Wang, Shumin Han, Ping Luo, Gang Zeng, and Jingdong Wang. Context autoencoder, 1 = national conference on computer vision , pages 4086-4093, 2015.. for self-supervised representation learning. arXiv preprint arXiv:2202.03026 , 2022., 1 = Raghav Goyal, Samira Ebrahimi Kahou, Vincent Michal- ski, Joanna Materzynska, Susanne Westphal, Heuna Kim, Valentin Haenel, Ingo Fruend, Peter Yianilos, Moritz. Xinlei Chen, Saining Xie, and Kaiming He. An empirical study of training self-supervised vision transformers. arXiv, 1 = Mueller-Freitag, et al. The\" something something\" video Proceedings of the IEEE international conference on. preprint arXiv:2104.02057 , 2021., 1 = database for learning and evaluating visual common sense. In computer vision , pages 5842-5850, 2017.. Mehdi Cherti, Romain Beaumont, Ross Wightman, Mitchell Wortsman, Gabriel Ilharco, Cade Gordon, Christoph Schuhmann, Ludwig Schmidt, and Jenia Jitsev. Repro-, 1 = . ducible scaling laws for contrastive language-image learn- ing. In Proceedings of the IEEE/CVF Conference on Com- , pages 2818-2829,, 1 = Jean-Bastien Grill, Florian Strub, Florent Altché, Corentin Tallec, Pierre H Richemond, Elena Buchatskaya, Carl Do- ersch, Bernardo Avila Pires, Zhaohan Daniel Guo, Moham- mad Gheshlaghi Azar, et al. Bootstrap your own latent: A new approach to self-supervised learning.\n11", + "page_start": 10, + "page_end": 10, + "source_file": "arxiv3.pdf" + }, + { + "text": "6 Evaluating the Predictor\nNext, we seek to qualitatively inspect the V-JEPA models. Recall that the predictor network in V-JEPA predicts the representations of a masked spatio-temporal region y from a visible region x , given the positional information of the masked regions (see Section 3). To qualitatively investigate the grounding of the feature-space predictions, we freeze the pretrained encoder and predictor networks and train a conditional diffusion decoder to map the V-JEPA predictions to interpretable pixels. Notably, the decoder is only fed the representations predicted for the missing regions of the video, and does not have access to the unmasked regions of the video (see Figure 6a).\nGiven a masked video, we use the V-JEPA pretrained models to predict the representations of the missing regions, and then use the decoder to project the representations to pixel space. Figure 6b shows decoder outputs for various random seeds. Qualities that are common across samples represent information that is contained in the predictor representation.\nFigure 6b shows that the V-JEPA feature predictions are indeed grounded, and exhibit spatio-temporal consistency with the unmasked regions of the video. Specifically, the samples in Figure 6b show that the V-JEPA predictor correctly captures positional uncertainty and produces a variety of visual objects at various locations with consistent motion. Some of the samples also demonstrate an understanding of object-permanence, as the visual objects remain consistent after partial occlusion.\n9", + "page_start": 8, + "page_end": 8, + "source_file": "arxiv3.pdf" + }, + { + "text": "References\n52. Tu, S. The Dirichlet-Multinomial and Dirichlet-Categorical Models for Bayesian Inference. 2014. Available online: https: //people.csail.mit.edu/stephentu/writeups/dirichlet-conjugate-prior.pdf (accessed on 21 June 2024).\n53. Smith, R.; Badcock, P.; Friston, K.J. Recent advances in the application of predictive coding and active inference models within clinical neuroscience. Psychiatry Clin. Neurosci. 2021 , 75 , 3-13. [CrossRef]\n54. Deacon, R.M.J.; Rawlins, J.N.P. T-maze alternation in the rodent. Nat. Protoc. 2006 , 1 , 7-12. [CrossRef]\n55. Lin, M.H.; Liran, O.; Bauer, N.; Baker, T.E. Power dynamics of theta oscillations during goal-directed navigation in freely moving humans: A mobile EEG-virtual reality T-maze study. bioRxiv 2021 , bioRxiv:2021.10.05.463245. [CrossRef]\n56. Ghafari, M.; Falsafi, S.K.; Szodorai, E.; Kim, E.J.; Li, L.; Höger, H.; Berger, J.; Fuchs, K.; Sieghart, W.; Lubec, G. Formation of GABAA receptor complexes containing α 1 and α 5 subunits is paralleling a multiple T-maze learning task in mice. Brain Struct. Funct. 2017 , 222 , 549-561. [CrossRef]\n57. Sharma, S.; Rakoczy, S.; Brown-Borg, H. Assessment of spatial memory in mice. Life Sci. 2010 , 87 , 521-536. [CrossRef]\n58. Friston, K.; Da Costa, L.; Hafner, D.; Hesp, C.; Parr, T. Sophisticated Inference. arXiv 2020 , arXiv:2006.04120. [CrossRef] [PubMed]", + "page_start": 31, + "page_end": 31, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "Active inference, interoceptive processing, and uncertainty reduction\nare reciprocally linked through top-down connections that convey predictions (black edges) and bottom-up connections that convey prediction errors (red edges), within and across levels. This predictive coding architecture permits inferring (in the Bayesian sense) the most likely causes of sensations, across multiple modalities and multiple hierarchical levels, by minimizing prediction errors at all levels. The rationale is that predictions at all levels are continuously adjusted (and synaptic weights adjusted at a slower time scale) until they match with incoming multimodal stimuli sufficiently well, and, consequently, the prediction errors across all levels are minimized. This process entails that even if a predictive coding agent starts with an incorrect prediction (e.g. about what object it is looking at) the prediction errors that measure a discrepancy between the predicted sensations and the actual sensations can help revise the initial predictions. See Parr et al. (2022) for a more detailed explanation of how to interpret these schematics.\nAnother critical aspect of Fig. 1 is that it illustrates two pathways in which prediction errors at the proprioceptive and interoceptive levels are used to steer physical actions (reflex arcs) and autonomic actions (autonomic reflexes). Endowing predictive coding with these reflexes-hence realizing an 'active inference' architecture-permits minimizing prediction errors by changing the state of the world (by physically acting) or the internal milieu (by engaging in autonomic actions) rather than only by changing predictions, as described later.\nEquipped with a generative model like the one shown in Fig. 1, an active inference agent can continuously infer (and act upon) the state of the world and of the body, including the internal milieu, at multiple time scales. Of particular interest, here are multimodal inferences that unite exteroceptive and interoceptive sources of evidence. One example of this is the perception of faces expressing emotions. Two studies reported that\n6 Barca et al.", + "page_start": 4, + "page_end": 5, + "source_file": "pubmed1.pdf" + }, + { + "text": "2 Related Works\nPredictive Features. Going beyond local invariance, a family of works trains a predictor network to map the representation of a frame or clip at one time-step to a distinct representation at another time-step. Srivastava et al. (2015); Vondrick et al. (2016); Wang et al. (2023b) train such a video feature predictor network on top of a frozen pretrained image or video encoder. Unfreezing the target feature extractor, several methods train the video encoder and the predictor network simultaneously, while preventing collapse by using a supervised action forecasting loss (Girdhar and Grauman, 2021), or by using the representations of distant clips as negative samples in a contrastive loss (Han et al., 2019, 2020; Tan et al., 2023), often focusing on small convolutional encoders (Han et al., 2019, 2020). The idea of learning a representation by predicting missing information in feature space is also core to the joint-embedding predictive architecture (JEPA) (LeCun, 2022), which combines a siamese encoder with a predictor network. JEPAs have been successfully instantiated in several modalities, such as with audio data (Baevski et al., 2022b) and image data (Zhou et al., 2021; Oquab et al., 2023; Assran et al., 2023). In this work, we extend this paradigm to video data by leveraging recent advances in self-supervised learning.", + "page_start": 1, + "page_end": 1, + "source_file": "arxiv3.pdf" + }, + { + "text": "References\n66. Kagan, B.J.; Kitchen, A.C.; Tran, N.T.; Habibollahi, F.; Khajehnejad, M.; Parker, B.J.; Bhat, A.; Rollo, B.; Razi, A.; Friston, K.J. In vitro neurons learn and exhibit sentience when embodied in a simulated game-world. Neuron 2022 , 110 , 3952-3969.e8. [CrossRef]\n67. Waade, P.T.; Olesen, C.L.; Laursen, J.E.; Nehrer, S.W.; Heins, C.; Friston, K.; Mathys, C. As One and Many: Relating Individual and Emergent Group-Level Generative Models in Active Inference. Preprints 2024 , 2024101895. [CrossRef]\nEntropy 2025 , 27 , 62\n33 of 33", + "page_start": 31, + "page_end": 32, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "Feature Prediction versus Pixel Reconstruction.\nApproaches that predict in pixel space must dedicate significant model capacity and compute to capture all the low-level detail in the visual input. By contrast, approaches that predict in latent space have the flexibility to eliminate irrelevant or unpredictable pixel-level details from the target representation (Vondrick et al., 2016). Predicting in representation space has been shown to lead to versatile representations that perform well across many downstream tasks through linear probing or lowshot adaptation (Assran et al., 2023; Oquab et al., 2023; Assran et al., 2022), while demonstrating an efficiency gain during pretraining compared to pixel level reconstruction (Assran et al., 2023; Baevski et al., 2022b,a). The works of Baevski et al. (2022a,b) additionally show that predicting in representation space results in competitive end-to-end fine-tuning performance in the image, audio and text domains. In this work, we extend these findings to the video modality.", + "page_start": 2, + "page_end": 2, + "source_file": "arxiv3.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv3.pdf", + "query": "What does mean the JEPA acronym ?", + "target_page": 3, + "target_passage": " joint-embedding predictive architecture (JEPA)", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "Authorization - PARC\nSo far we've been talking about principals. Principals represent the authentication component. For authorization, you will attach JSON documents called IAM policies to principals.", + "page_start": 43, + "page_end": 43, + "source_file": "serverless-core.pdf" + }, + { + "text": "3 Methodology: Video-JEPA\nFigure 2 Joint-Embedding Predictive Architectures are trained to predict the representation of an input y from the representation of another input x . The additional variable z provides the predictor with information about the transformation that computes y from x .\nOur goal is to explore the effectiveness of feature prediction as a stand-alone objective for learning visual representations from video. To that end, we use a joint-embedding predictive architecture (JEPA) (LeCun, 2022); see Figure 2. The main idea behind a JEPA is to learn by predicting the representation of an input y from the representation of another input x . The basic architecture is made up of an encoder, E θ ( · ) , which computes the representation of the inputs, and a predictor, P ϕ ( · ) , which predicts the representation of y from the representation of x , conditioned on a variable z indicating the transformation (or corruption) between x and y . Conditioning on z enables the generation of distinct predictions for various transformations of x .", + "page_start": 2, + "page_end": 2, + "source_file": "arxiv3.pdf" + }, + { + "text": "4.4 Prediction Task: Predicting y from x\nTable 5 Comparison with Pixel Prediction Methods. We compare V-JEPA with OmniMAE (Girdhar et al., 2023), VideoMAE (Tong et al., 2022), and Hiera (Ryali et al., 2023), which leverage a pixel-reconstruction loss. All models are trained using a ViT-L architecture or a comparable Hiera-L. We evaluate the approaches on downstream image tasks (IN1K, Places205, iNat201) and video tasks (K400, SSv2, AVA) in both frozen evaluation (with a frozen backbone), and end-to-end fine-tuning. All models are evaluated at resolution 224. On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. In frozen evaluation, V-JEPA outperforms the baselines on all downstream tasks, except ImageNet, where the model achieves 74 . 8% compared to 75 . 1% of an OmniMAE model trained directly on ImageNet. V-JEPA also achieves the best fine-tuning performance amongs all ViT-L models and matches the Hiera-L on SSv2. The V-JEPA results are achieved while processing significantly fewer examples during pretraining.\nTable 6 Comparison with State-of-the-Art Models. We compare V-JEPA with state-of-the-art baselines in frozen evaluation with an attentive probe on downstream image tasks (IN1K, Place205, iNat21) and video tasks (K400, SSv2, AVA). All models are evaluated at resolution 224, except I-JEPA 512 and V-JEPA 384 which are evaluated respectively at resolution 512 and 384 . On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. Compared to other video baselines, V-JEPA exhibits a consistent improvement across all downstream tasks. Compared to image-models that excel under the frozen evaluation, V-JEPA shows a significant performance improvement on tasks requiring motion understanding (+21 points on SSv2), and reduces the gap between video and image models on tasks requiring static appearance-based features.\nMethods pretrained using pixel prediction. Methods pretrained using pixel prediction, Frozen Evaluation w/ Att.", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv3.pdf" + }, + { + "text": "4.4 Prediction Task: Predicting y from x\nTable 5 Comparison with Pixel Prediction Methods. We compare V-JEPA with OmniMAE (Girdhar et al., 2023), VideoMAE (Tong et al., 2022), and Hiera (Ryali et al., 2023), which leverage a pixel-reconstruction loss. All models are trained using a ViT-L architecture or a comparable Hiera-L. We evaluate the approaches on downstream image tasks (IN1K, Places205, iNat201) and video tasks (K400, SSv2, AVA) in both frozen evaluation (with a frozen backbone), and end-to-end fine-tuning. All models are evaluated at resolution 224. On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. In frozen evaluation, V-JEPA outperforms the baselines on all downstream tasks, except ImageNet, where the model achieves 74 . 8% compared to 75 . 1% of an OmniMAE model trained directly on ImageNet. V-JEPA also achieves the best fine-tuning performance amongs all ViT-L models and matches the Hiera-L on SSv2. The V-JEPA results are achieved while processing significantly fewer examples during pretraining.\nTable 6 Comparison with State-of-the-Art Models. We compare V-JEPA with state-of-the-art baselines in frozen evaluation with an attentive probe on downstream image tasks (IN1K, Place205, iNat21) and video tasks (K400, SSv2, AVA). All models are evaluated at resolution 224, except I-JEPA 512 and V-JEPA 384 which are evaluated respectively at resolution 512 and 384 . On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. Compared to other video baselines, V-JEPA exhibits a consistent improvement across all downstream tasks. Compared to image-models that excel under the frozen evaluation, V-JEPA shows a significant performance improvement on tasks requiring motion understanding (+21 points on SSv2), and reduces the gap between video and image models on tasks requiring static appearance-based features.\nSeen = 270M. V-JEPA, Iter. = 90K. V-JEPA, Frozen Evaluation w/", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv3.pdf" + }, + { + "text": "4.4 Prediction Task: Predicting y from x\nTable 5 Comparison with Pixel Prediction Methods. We compare V-JEPA with OmniMAE (Girdhar et al., 2023), VideoMAE (Tong et al., 2022), and Hiera (Ryali et al., 2023), which leverage a pixel-reconstruction loss. All models are trained using a ViT-L architecture or a comparable Hiera-L. We evaluate the approaches on downstream image tasks (IN1K, Places205, iNat201) and video tasks (K400, SSv2, AVA) in both frozen evaluation (with a frozen backbone), and end-to-end fine-tuning. All models are evaluated at resolution 224. On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. In frozen evaluation, V-JEPA outperforms the baselines on all downstream tasks, except ImageNet, where the model achieves 74 . 8% compared to 75 . 1% of an OmniMAE model trained directly on ImageNet. V-JEPA also achieves the best fine-tuning performance amongs all ViT-L models and matches the Hiera-L on SSv2. The V-JEPA results are achieved while processing significantly fewer examples during pretraining.\nTable 6 Comparison with State-of-the-Art Models. We compare V-JEPA with state-of-the-art baselines in frozen evaluation with an attentive probe on downstream image tasks (IN1K, Place205, iNat21) and video tasks (K400, SSv2, AVA). All models are evaluated at resolution 224, except I-JEPA 512 and V-JEPA 384 which are evaluated respectively at resolution 512 and 384 . On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. Compared to other video baselines, V-JEPA exhibits a consistent improvement across all downstream tasks. Compared to image-models that excel under the frozen evaluation, V-JEPA shows a significant performance improvement on tasks requiring motion understanding (+21 points on SSv2), and reduces the gap between video and image models on tasks requiring static appearance-based features.\n(16 × 2 × 3) = 65.5. VideoMAE, Frozen Evaluation w/ Att.", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv3.pdf" + }, + { + "text": "4.4 Prediction Task: Predicting y from x\nTable 5 Comparison with Pixel Prediction Methods. We compare V-JEPA with OmniMAE (Girdhar et al., 2023), VideoMAE (Tong et al., 2022), and Hiera (Ryali et al., 2023), which leverage a pixel-reconstruction loss. All models are trained using a ViT-L architecture or a comparable Hiera-L. We evaluate the approaches on downstream image tasks (IN1K, Places205, iNat201) and video tasks (K400, SSv2, AVA) in both frozen evaluation (with a frozen backbone), and end-to-end fine-tuning. All models are evaluated at resolution 224. On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. In frozen evaluation, V-JEPA outperforms the baselines on all downstream tasks, except ImageNet, where the model achieves 74 . 8% compared to 75 . 1% of an OmniMAE model trained directly on ImageNet. V-JEPA also achieves the best fine-tuning performance amongs all ViT-L models and matches the Hiera-L on SSv2. The V-JEPA results are achieved while processing significantly fewer examples during pretraining.\nTable 6 Comparison with State-of-the-Art Models. We compare V-JEPA with state-of-the-art baselines in frozen evaluation with an attentive probe on downstream image tasks (IN1K, Place205, iNat21) and video tasks (K400, SSv2, AVA). All models are evaluated at resolution 224, except I-JEPA 512 and V-JEPA 384 which are evaluated respectively at resolution 512 and 384 . On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. Compared to other video baselines, V-JEPA exhibits a consistent improvement across all downstream tasks. Compared to image-models that excel under the frozen evaluation, V-JEPA shows a significant performance improvement on tasks requiring motion understanding (+21 points on SSv2), and reduces the gap between video and image models on tasks requiring static appearance-based features.\n= Methods pretrained using pixel prediction. Methods pretrained using pixel prediction, Frozen Evaluation w/ Att.", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv3.pdf" + }, + { + "text": "4.4 Prediction Task: Predicting y from x\nTable 5 Comparison with Pixel Prediction Methods. We compare V-JEPA with OmniMAE (Girdhar et al., 2023), VideoMAE (Tong et al., 2022), and Hiera (Ryali et al., 2023), which leverage a pixel-reconstruction loss. All models are trained using a ViT-L architecture or a comparable Hiera-L. We evaluate the approaches on downstream image tasks (IN1K, Places205, iNat201) and video tasks (K400, SSv2, AVA) in both frozen evaluation (with a frozen backbone), and end-to-end fine-tuning. All models are evaluated at resolution 224. On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. In frozen evaluation, V-JEPA outperforms the baselines on all downstream tasks, except ImageNet, where the model achieves 74 . 8% compared to 75 . 1% of an OmniMAE model trained directly on ImageNet. V-JEPA also achieves the best fine-tuning performance amongs all ViT-L models and matches the Hiera-L on SSv2. The V-JEPA results are achieved while processing significantly fewer examples during pretraining.\nTable 6 Comparison with State-of-the-Art Models. We compare V-JEPA with state-of-the-art baselines in frozen evaluation with an attentive probe on downstream image tasks (IN1K, Place205, iNat21) and video tasks (K400, SSv2, AVA). All models are evaluated at resolution 224, except I-JEPA 512 and V-JEPA 384 which are evaluated respectively at resolution 512 and 384 . On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. Compared to other video baselines, V-JEPA exhibits a consistent improvement across all downstream tasks. Compared to image-models that excel under the frozen evaluation, V-JEPA shows a significant performance improvement on tasks requiring motion understanding (+21 points on SSv2), and reduces the gap between video and image models on tasks requiring static appearance-based features.", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv3.pdf" + }, + { + "text": "4.4 Prediction Task: Predicting y from x\nTable 5 Comparison with Pixel Prediction Methods. We compare V-JEPA with OmniMAE (Girdhar et al., 2023), VideoMAE (Tong et al., 2022), and Hiera (Ryali et al., 2023), which leverage a pixel-reconstruction loss. All models are trained using a ViT-L architecture or a comparable Hiera-L. We evaluate the approaches on downstream image tasks (IN1K, Places205, iNat201) and video tasks (K400, SSv2, AVA) in both frozen evaluation (with a frozen backbone), and end-to-end fine-tuning. All models are evaluated at resolution 224. On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. In frozen evaluation, V-JEPA outperforms the baselines on all downstream tasks, except ImageNet, where the model achieves 74 . 8% compared to 75 . 1% of an OmniMAE model trained directly on ImageNet. V-JEPA also achieves the best fine-tuning performance amongs all ViT-L models and matches the Hiera-L on SSv2. The V-JEPA results are achieved while processing significantly fewer examples during pretraining.\nTable 6 Comparison with State-of-the-Art Models. We compare V-JEPA with state-of-the-art baselines in frozen evaluation with an attentive probe on downstream image tasks (IN1K, Place205, iNat21) and video tasks (K400, SSv2, AVA). All models are evaluated at resolution 224, except I-JEPA 512 and V-JEPA 384 which are evaluated respectively at resolution 512 and 384 . On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. Compared to other video baselines, V-JEPA exhibits a consistent improvement across all downstream tasks. Compared to image-models that excel under the frozen evaluation, V-JEPA shows a significant performance improvement on tasks requiring motion understanding (+21 points on SSv2), and reduces the gap between video and image models on tasks requiring static appearance-based features.\n3) = 64.2. Hiera, Frozen Evaluation w/ Att. Pooling.AVA = 15.8.", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv3.pdf" + }, + { + "text": "4.4 Prediction Task: Predicting y from x\nTable 5 Comparison with Pixel Prediction Methods. We compare V-JEPA with OmniMAE (Girdhar et al., 2023), VideoMAE (Tong et al., 2022), and Hiera (Ryali et al., 2023), which leverage a pixel-reconstruction loss. All models are trained using a ViT-L architecture or a comparable Hiera-L. We evaluate the approaches on downstream image tasks (IN1K, Places205, iNat201) and video tasks (K400, SSv2, AVA) in both frozen evaluation (with a frozen backbone), and end-to-end fine-tuning. All models are evaluated at resolution 224. On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. In frozen evaluation, V-JEPA outperforms the baselines on all downstream tasks, except ImageNet, where the model achieves 74 . 8% compared to 75 . 1% of an OmniMAE model trained directly on ImageNet. V-JEPA also achieves the best fine-tuning performance amongs all ViT-L models and matches the Hiera-L on SSv2. The V-JEPA results are achieved while processing significantly fewer examples during pretraining.\nTable 6 Comparison with State-of-the-Art Models. We compare V-JEPA with state-of-the-art baselines in frozen evaluation with an attentive probe on downstream image tasks (IN1K, Place205, iNat21) and video tasks (K400, SSv2, AVA). All models are evaluated at resolution 224, except I-JEPA 512 and V-JEPA 384 which are evaluated respectively at resolution 512 and 384 . On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. Compared to other video baselines, V-JEPA exhibits a consistent improvement across all downstream tasks. Compared to image-models that excel under the frozen evaluation, V-JEPA shows a significant performance improvement on tasks requiring motion understanding (+21 points on SSv2), and reduces the gap between video and image models on tasks requiring static appearance-based features.\npretrained using pixel prediction. OmniMAE, Arch. = ViT-L/16.", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv3.pdf" + }, + { + "text": "4.4 Prediction Task: Predicting y from x\nTable 5 Comparison with Pixel Prediction Methods. We compare V-JEPA with OmniMAE (Girdhar et al., 2023), VideoMAE (Tong et al., 2022), and Hiera (Ryali et al., 2023), which leverage a pixel-reconstruction loss. All models are trained using a ViT-L architecture or a comparable Hiera-L. We evaluate the approaches on downstream image tasks (IN1K, Places205, iNat201) and video tasks (K400, SSv2, AVA) in both frozen evaluation (with a frozen backbone), and end-to-end fine-tuning. All models are evaluated at resolution 224. On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. In frozen evaluation, V-JEPA outperforms the baselines on all downstream tasks, except ImageNet, where the model achieves 74 . 8% compared to 75 . 1% of an OmniMAE model trained directly on ImageNet. V-JEPA also achieves the best fine-tuning performance amongs all ViT-L models and matches the Hiera-L on SSv2. The V-JEPA results are achieved while processing significantly fewer examples during pretraining.\nTable 6 Comparison with State-of-the-Art Models. We compare V-JEPA with state-of-the-art baselines in frozen evaluation with an attentive probe on downstream image tasks (IN1K, Place205, iNat21) and video tasks (K400, SSv2, AVA). All models are evaluated at resolution 224, except I-JEPA 512 and V-JEPA 384 which are evaluated respectively at resolution 512 and 384 . On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. Compared to other video baselines, V-JEPA exhibits a consistent improvement across all downstream tasks. Compared to image-models that excel under the frozen evaluation, V-JEPA shows a significant performance improvement on tasks requiring motion understanding (+21 points on SSv2), and reduces the gap between video and image models on tasks requiring static appearance-based features.\nEvaluation w/ Att. Pooling.SSv2 (16 × 2 × 3) = 69.5.", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv3.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv3.pdf", + "query": "What is the average performance of the ViT-L/16 architecture on the K710 dataset with 700k samples ?", + "target_page": 5, + "target_passage": "70.9", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "E.2 Finetuning\nIn Table 15, we evaluate V-JEPA using finetuning (separately) on K400 and SSv2. We compare V-JEPA with VideoMAEv2 (Wang et al., 2023a), VideoMAE (Tong et al., 2022) and MVD (Wang et al., 2023b) using a ViT-L/16 or a ViT-H/16 architecture. V-JEPA obtains competitive performance using a finetuning protocol. With a ViTiH/16 architecture, V-JEPA outperforms by 1 . 2% VideoMAE and +0 . 3% VideoMAEv2 on the SSv2 dataset, while obtaining comparable performance on K400. V-JEPA also obtains performance similar to MVD on the SSv2 dataset. The MVD model achieves the best performance across models on the K400 dataset, and is trained using the image dataset ImageNet1K, in contrast to the other methods in the table, which only use video data. Additionally MVD requires the processing of significantly more samples during pretraining due to the cost of training the teacher encoder networks in a pre-pre-training step.", + "page_start": 20, + "page_end": 20, + "source_file": "arxiv3.pdf" + }, + { + "text": "3.4 Pretraining Data and Evaluation Setup\nViT-L/16, Data = K710. ViT-L/16, #Samples = 700K. ViT-L/16, Frozen Evaluation.K400 (16 × 1 × 1) = 75.8. ViT-L/16, Frozen Evaluation.SSv2 (16 × 1 × 1) = 63.2. ViT-L/16, Frozen Evaluation.IN1K = 73.7. ViT-L/16, Avg. = 70.9. ViT-L/16, Data = K710+SSv2. ViT-L/16, #Samples = 900K. ViT-L/16, Frozen Evaluation.K400 (16 × 1 × 1) = 72.9. ViT-L/16, Frozen Evaluation.SSv2 (16 × 1 × 1) = 67.4. ViT-L/16, Frozen Evaluation.IN1K = 72.8. ViT-L/16, Avg. = 71.0. ViT-L/16, Data = K710+HT. ViT-L/16, #Samples = 1900K. ViT-L/16, Frozen Evaluation.K400 (16 × 1 × 1) = 74.5. ViT-L/16, Frozen Evaluation.SSv2 (16 × 1 × 1) = 64.2. ViT-L/16, Frozen Evaluation.IN1K = 74.8. ViT-L/16, Avg. = 71.1. , Data = VideoMix2M. , #Samples = 2000K. , Frozen Evaluation.K400 (16 × 1 × 1) = 73.7. , Frozen Evaluation.SSv2 (16 × 1 × 1) = 66.2. , Frozen Evaluation.IN1K = 74.8. , Avg. = 71.5. ViT-H/16, Data = K710+SSv2. ViT-H/16, #Samples = 900K. ViT-H/16, Frozen Evaluation.K400 (16 × 1 × 1) = 75.7. ViT-H/16, Frozen Evaluation.SSv2 (16 × 1 × 1) = 66.8. ViT-H/16, Frozen Evaluation.IN1K = 73.7.", + "page_start": 4, + "page_end": 4, + "source_file": "arxiv3.pdf" + }, + { + "text": "3.4 Pretraining Data and Evaluation Setup\nViT-H/16, Avg. = 72.0. ViT-H/16, Data = VideoMix2M. ViT-H/16, #Samples = 2000K. ViT-H/16, Frozen Evaluation.K400 (16 × 1 × 1) = 74.0. ViT-H/16, Frozen Evaluation.SSv2 (16 × 1 × 1) = 68.5. ViT-H/16, Frozen Evaluation.IN1K = 75.9. ViT-H/16, Avg. = 72.8\nEvaluations. Pretrained models are evaluated on downstream video and image tasks. On video tasks, we use a subset of the VideoGLUE benchmark (Yuan et al., 2023) to test for various capabilities; specifically, we investigate action recognition on Kinetics400 (K400) (Kay et al., 2017), motion classification on Something-Something-v2 (SSv2) (Goyal et al., 2017), and action localization on AVA (Gu et al., 2018). Action classification on Kinetics evaluates the appearance-based understanding of the model, as many action classes in the dataset can be inferred from the presence of specific objects in the video (Sevilla-Lara et al., 2021). Motion classification on Something-Something-v2 evaluates the temporal understanding of the model, as action classes in the dataset are decoupled from the appearance/presence of specific objects in the video (Goyal et al., 2017). Finally, action localization on AVA evaluates the ability of the model to understand and localize motions in the video. We follow standard practice and report accuracy on K400 and SSv2 by sampling several spatial and temporal views. For static image tasks, we explore object recognition on ImageNet (Russakovsky et al., 2015), scene classification on Places205 (Zhou et al., 2014), and fine-grained recognition on iNaturalist 2021 (Van Horn et al., 2018).", + "page_start": 4, + "page_end": 4, + "source_file": "arxiv3.pdf" + }, + { + "text": "4.4 Prediction Task: Predicting y from x\nTable 5 Comparison with Pixel Prediction Methods. We compare V-JEPA with OmniMAE (Girdhar et al., 2023), VideoMAE (Tong et al., 2022), and Hiera (Ryali et al., 2023), which leverage a pixel-reconstruction loss. All models are trained using a ViT-L architecture or a comparable Hiera-L. We evaluate the approaches on downstream image tasks (IN1K, Places205, iNat201) and video tasks (K400, SSv2, AVA) in both frozen evaluation (with a frozen backbone), and end-to-end fine-tuning. All models are evaluated at resolution 224. On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. In frozen evaluation, V-JEPA outperforms the baselines on all downstream tasks, except ImageNet, where the model achieves 74 . 8% compared to 75 . 1% of an OmniMAE model trained directly on ImageNet. V-JEPA also achieves the best fine-tuning performance amongs all ViT-L models and matches the Hiera-L on SSv2. The V-JEPA results are achieved while processing significantly fewer examples during pretraining.\nTable 6 Comparison with State-of-the-Art Models. We compare V-JEPA with state-of-the-art baselines in frozen evaluation with an attentive probe on downstream image tasks (IN1K, Place205, iNat21) and video tasks (K400, SSv2, AVA). All models are evaluated at resolution 224, except I-JEPA 512 and V-JEPA 384 which are evaluated respectively at resolution 512 and 384 . On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. Compared to other video baselines, V-JEPA exhibits a consistent improvement across all downstream tasks. Compared to image-models that excel under the frozen evaluation, V-JEPA shows a significant performance improvement on tasks requiring motion understanding (+21 points on SSv2), and reduces the gap between video and image models on tasks requiring static appearance-based features.\nArch. = ViT-L/16. VideoMAE, #Samples Seen = 410M. VideoMAE,", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv3.pdf" + }, + { + "text": "4.4 Prediction Task: Predicting y from x\nTable 5 Comparison with Pixel Prediction Methods. We compare V-JEPA with OmniMAE (Girdhar et al., 2023), VideoMAE (Tong et al., 2022), and Hiera (Ryali et al., 2023), which leverage a pixel-reconstruction loss. All models are trained using a ViT-L architecture or a comparable Hiera-L. We evaluate the approaches on downstream image tasks (IN1K, Places205, iNat201) and video tasks (K400, SSv2, AVA) in both frozen evaluation (with a frozen backbone), and end-to-end fine-tuning. All models are evaluated at resolution 224. On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. In frozen evaluation, V-JEPA outperforms the baselines on all downstream tasks, except ImageNet, where the model achieves 74 . 8% compared to 75 . 1% of an OmniMAE model trained directly on ImageNet. V-JEPA also achieves the best fine-tuning performance amongs all ViT-L models and matches the Hiera-L on SSv2. The V-JEPA results are achieved while processing significantly fewer examples during pretraining.\nTable 6 Comparison with State-of-the-Art Models. We compare V-JEPA with state-of-the-art baselines in frozen evaluation with an attentive probe on downstream image tasks (IN1K, Place205, iNat21) and video tasks (K400, SSv2, AVA). All models are evaluated at resolution 224, except I-JEPA 512 and V-JEPA 384 which are evaluated respectively at resolution 512 and 384 . On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. Compared to other video baselines, V-JEPA exhibits a consistent improvement across all downstream tasks. Compared to image-models that excel under the frozen evaluation, V-JEPA shows a significant performance improvement on tasks requiring motion understanding (+21 points on SSv2), and reduces the gap between video and image models on tasks requiring static appearance-based features.\nFine-Tuning.SSv2-ft (16 × 2 × 3) = 74.3. Hiera, Arch.", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv3.pdf" + }, + { + "text": "4.4 Prediction Task: Predicting y from x\nTable 5 Comparison with Pixel Prediction Methods. We compare V-JEPA with OmniMAE (Girdhar et al., 2023), VideoMAE (Tong et al., 2022), and Hiera (Ryali et al., 2023), which leverage a pixel-reconstruction loss. All models are trained using a ViT-L architecture or a comparable Hiera-L. We evaluate the approaches on downstream image tasks (IN1K, Places205, iNat201) and video tasks (K400, SSv2, AVA) in both frozen evaluation (with a frozen backbone), and end-to-end fine-tuning. All models are evaluated at resolution 224. On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. In frozen evaluation, V-JEPA outperforms the baselines on all downstream tasks, except ImageNet, where the model achieves 74 . 8% compared to 75 . 1% of an OmniMAE model trained directly on ImageNet. V-JEPA also achieves the best fine-tuning performance amongs all ViT-L models and matches the Hiera-L on SSv2. The V-JEPA results are achieved while processing significantly fewer examples during pretraining.\nTable 6 Comparison with State-of-the-Art Models. We compare V-JEPA with state-of-the-art baselines in frozen evaluation with an attentive probe on downstream image tasks (IN1K, Place205, iNat21) and video tasks (K400, SSv2, AVA). All models are evaluated at resolution 224, except I-JEPA 512 and V-JEPA 384 which are evaluated respectively at resolution 512 and 384 . On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. Compared to other video baselines, V-JEPA exhibits a consistent improvement across all downstream tasks. Compared to image-models that excel under the frozen evaluation, V-JEPA shows a significant performance improvement on tasks requiring motion understanding (+21 points on SSv2), and reduces the gap between video and image models on tasks requiring static appearance-based features.\n67.8. V-JEPA, Fine-Tuning.K400-ft (16 × 5 × 3) =", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv3.pdf" + }, + { + "text": "4.4 Prediction Task: Predicting y from x\nTable 5 Comparison with Pixel Prediction Methods. We compare V-JEPA with OmniMAE (Girdhar et al., 2023), VideoMAE (Tong et al., 2022), and Hiera (Ryali et al., 2023), which leverage a pixel-reconstruction loss. All models are trained using a ViT-L architecture or a comparable Hiera-L. We evaluate the approaches on downstream image tasks (IN1K, Places205, iNat201) and video tasks (K400, SSv2, AVA) in both frozen evaluation (with a frozen backbone), and end-to-end fine-tuning. All models are evaluated at resolution 224. On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. In frozen evaluation, V-JEPA outperforms the baselines on all downstream tasks, except ImageNet, where the model achieves 74 . 8% compared to 75 . 1% of an OmniMAE model trained directly on ImageNet. V-JEPA also achieves the best fine-tuning performance amongs all ViT-L models and matches the Hiera-L on SSv2. The V-JEPA results are achieved while processing significantly fewer examples during pretraining.\nTable 6 Comparison with State-of-the-Art Models. We compare V-JEPA with state-of-the-art baselines in frozen evaluation with an attentive probe on downstream image tasks (IN1K, Place205, iNat21) and video tasks (K400, SSv2, AVA). All models are evaluated at resolution 224, except I-JEPA 512 and V-JEPA 384 which are evaluated respectively at resolution 512 and 384 . On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. Compared to other video baselines, V-JEPA exhibits a consistent improvement across all downstream tasks. Compared to image-models that excel under the frozen evaluation, V-JEPA shows a significant performance improvement on tasks requiring motion understanding (+21 points on SSv2), and reduces the gap between video and image models on tasks requiring static appearance-based features.\n75.1. V-JEPA, Arch. = ViT-L/16. V-JEPA, #Samples", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv3.pdf" + }, + { + "text": "4.4 Prediction Task: Predicting y from x\nTable 5 Comparison with Pixel Prediction Methods. We compare V-JEPA with OmniMAE (Girdhar et al., 2023), VideoMAE (Tong et al., 2022), and Hiera (Ryali et al., 2023), which leverage a pixel-reconstruction loss. All models are trained using a ViT-L architecture or a comparable Hiera-L. We evaluate the approaches on downstream image tasks (IN1K, Places205, iNat201) and video tasks (K400, SSv2, AVA) in both frozen evaluation (with a frozen backbone), and end-to-end fine-tuning. All models are evaluated at resolution 224. On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. In frozen evaluation, V-JEPA outperforms the baselines on all downstream tasks, except ImageNet, where the model achieves 74 . 8% compared to 75 . 1% of an OmniMAE model trained directly on ImageNet. V-JEPA also achieves the best fine-tuning performance amongs all ViT-L models and matches the Hiera-L on SSv2. The V-JEPA results are achieved while processing significantly fewer examples during pretraining.\nTable 6 Comparison with State-of-the-Art Models. We compare V-JEPA with state-of-the-art baselines in frozen evaluation with an attentive probe on downstream image tasks (IN1K, Place205, iNat21) and video tasks (K400, SSv2, AVA). All models are evaluated at resolution 224, except I-JEPA 512 and V-JEPA 384 which are evaluated respectively at resolution 512 and 384 . On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. Compared to other video baselines, V-JEPA exhibits a consistent improvement across all downstream tasks. Compared to image-models that excel under the frozen evaluation, V-JEPA shows a significant performance improvement on tasks requiring motion understanding (+21 points on SSv2), and reduces the gap between video and image models on tasks requiring static appearance-based features.\nFine-Tuning.K400-ft (16 × 5 × 3) = 85.4. VideoMAE,", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv3.pdf" + }, + { + "text": "4.4 Prediction Task: Predicting y from x\nTable 5 Comparison with Pixel Prediction Methods. We compare V-JEPA with OmniMAE (Girdhar et al., 2023), VideoMAE (Tong et al., 2022), and Hiera (Ryali et al., 2023), which leverage a pixel-reconstruction loss. All models are trained using a ViT-L architecture or a comparable Hiera-L. We evaluate the approaches on downstream image tasks (IN1K, Places205, iNat201) and video tasks (K400, SSv2, AVA) in both frozen evaluation (with a frozen backbone), and end-to-end fine-tuning. All models are evaluated at resolution 224. On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. In frozen evaluation, V-JEPA outperforms the baselines on all downstream tasks, except ImageNet, where the model achieves 74 . 8% compared to 75 . 1% of an OmniMAE model trained directly on ImageNet. V-JEPA also achieves the best fine-tuning performance amongs all ViT-L models and matches the Hiera-L on SSv2. The V-JEPA results are achieved while processing significantly fewer examples during pretraining.\nTable 6 Comparison with State-of-the-Art Models. We compare V-JEPA with state-of-the-art baselines in frozen evaluation with an attentive probe on downstream image tasks (IN1K, Place205, iNat21) and video tasks (K400, SSv2, AVA). All models are evaluated at resolution 224, except I-JEPA 512 and V-JEPA 384 which are evaluated respectively at resolution 512 and 384 . On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. Compared to other video baselines, V-JEPA exhibits a consistent improvement across all downstream tasks. Compared to image-models that excel under the frozen evaluation, V-JEPA shows a significant performance improvement on tasks requiring motion understanding (+21 points on SSv2), and reduces the gap between video and image models on tasks requiring static appearance-based features.\n56.9. Hiera, Fine-Tuning.K400-ft (16 × 5 × 3) =", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv3.pdf" + }, + { + "text": "4.4 Prediction Task: Predicting y from x\nTable 5 Comparison with Pixel Prediction Methods. We compare V-JEPA with OmniMAE (Girdhar et al., 2023), VideoMAE (Tong et al., 2022), and Hiera (Ryali et al., 2023), which leverage a pixel-reconstruction loss. All models are trained using a ViT-L architecture or a comparable Hiera-L. We evaluate the approaches on downstream image tasks (IN1K, Places205, iNat201) and video tasks (K400, SSv2, AVA) in both frozen evaluation (with a frozen backbone), and end-to-end fine-tuning. All models are evaluated at resolution 224. On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. In frozen evaluation, V-JEPA outperforms the baselines on all downstream tasks, except ImageNet, where the model achieves 74 . 8% compared to 75 . 1% of an OmniMAE model trained directly on ImageNet. V-JEPA also achieves the best fine-tuning performance amongs all ViT-L models and matches the Hiera-L on SSv2. The V-JEPA results are achieved while processing significantly fewer examples during pretraining.\nTable 6 Comparison with State-of-the-Art Models. We compare V-JEPA with state-of-the-art baselines in frozen evaluation with an attentive probe on downstream image tasks (IN1K, Place205, iNat21) and video tasks (K400, SSv2, AVA). All models are evaluated at resolution 224, except I-JEPA 512 and V-JEPA 384 which are evaluated respectively at resolution 512 and 384 . On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views from the video. Compared to other video baselines, V-JEPA exhibits a consistent improvement across all downstream tasks. Compared to image-models that excel under the frozen evaluation, V-JEPA shows a significant performance improvement on tasks requiring motion understanding (+21 points on SSv2), and reduces the gap between video and image models on tasks requiring static appearance-based features.\n87.3. Hiera, Fine-Tuning.SSv2-ft (16 × 2 × 3) =", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv3.pdf" + } + ] + }, + { + "references": { + "source_file": "PLAW-116publ30.pdf", + "query": "What is appropriate authority ?", + "target_page": 1, + "target_passage": "APPROPRIATE AUTHORITY.—The term ‘appropriate authority’ means the head of a Federal agency, the Architect of the Capitol, or other official authority responsible for the operation of a public building. ", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "127. Interpretation\n(8) A ny provision in this C onstitution that vests in any person or authority pow er to rem ove any public officer from his or her office shall be w ithout prejudice to the pow er of any person or authority to abolish any office or to any law providing for the com pulsory retirem ent of public officers generally or in any class of public officer on attaining an age specified therein.\n(9) W here pow er is vested by this C onstitution in any person or authority to appoint any person to act in or perform the functions of any office if the holder thereof is him self unable to perform those functions, no such appointm ent shall be called in question on the ground that the holder of the office w as not unable to perform those functions.\n(10) N o provision of this C onstitution that any person or authority shall not be subject to the direction or control of any other person or authority in the exercise of any functions under this C onstitution shall be construed as precluding a court of law from exercising jurisdiction in relation to any question w hether that person or authority has perform ed those functions in accordance w ith this C onstitution or any other law .\n(11) W here any pow er is conferred by this C onstitution to m ake any A ct, order,\nC opyright G overnm ent of B otsw ana\nregulation or rule, or to give any direction or instruction, the pow er shall be construed as including the pow er, exercisable in like m anner to am end or revoke any such A ct, order, regulation, rule, direction or instruction.\n(12) A ny reference in this C onstitution to a law m ade before 30th S eptem ber, 1966 shall be construed as a reference to that law as it had effect on 29th S eptem ber, 1966.\n(13) The Interpretation A ct, 1889 shall apply, w ith the necessary adaptations, for the purpose of interpreting this C onstitution and otherw ise in relation thereto as it applies for the purpose of interpreting and in relation to A cts of the P arliam ent of the U nited Kingdom .", + "page_start": 54, + "page_end": 55, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "3.2 User and group administration\nWhen you design a Content Manager OnDemand system, you must determine the best way to implement the many authority structures that are available for users and administrators of your system. The span of control for the administration of the system must be considered with the level of user access to the data that is stored in the system. How many different administrators are required? Will all administrators have system administrator authority or will different administrators have different levels of authority? What is the most effective way to restrict a user's access to only the data that is necessary to do that user's job?\nThe answers to these questions depend on the size of the system, the degree of centralization to be exercised over system administration, and the nature of the data and the business needs of the users.", + "page_start": 89, + "page_end": 89, + "source_file": "sg246915.pdf" + }, + { + "text": "Enforcement of requirement to self-isolate\n(6) Paragraphs (1)(b) and (c), (2) and (3) do not apply where P is a person described in paragraph 1 of Schedule 4 (diplomats, members of international organisations etc).\n(7) An authorised person exercising the power in paragraph (1)(b) or (c), (2)(b) or (3) may use reasonable force, if necessary, in the exercise of the power.\n(8) Where P is a child, and has left or is outside of, the place where they are self-isolating and is accompanied by an individual who has responsibility for them-\n(a) an authorised person may direct that individual to take P to the place where P is selfisolating; and\n(b) that individual must, so far as reasonably practicable, ensure that P complies with any direction given by an authorised person to P.\n(9) Where P is a child, and an authorised person has reasonable grounds to believe that P is repeatedly failing to comply with regulation 9 or Schedule 11, the authorised person may direct any individual who has responsibility for P to ensure, so far as reasonably practicable, that P so complies.\n(10) An authorised person may only exercise a power in paragraph (1), (2), (8) or (9) if the authorised person considers that it is a necessary and proportionate means of ensuring compliance with regulation 9 or Schedule 11.\n18\n(11) For the purposes of this regulation, 'authorised person' means-\n(a) a constable;\n(b) for the purposes of paragraphs (2) and (3) only, an immigration officer; or\n(c) a person designated by the Secretary of State for the purposes of this regulation.", + "page_start": 17, + "page_end": 18, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "II.13.8. Image rights and sound recordings\nIf natural persons appear in a result or their voice or any other private element is recorded in a recognisable manner, the contractor must obtain a statement by these persons (or, in the case of minors, by the persons exercising parental authority) giving their permission for the described use of their image, voice or private element and, on request, submit a copy of the permission to the contracting authority. The contractor must take the necessary measures to obtain such consent in accordance with the applicable legal provisions.", + "page_start": 26, + "page_end": 26, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "127. Interpretation\n(6) In this C onstitution, unless it is otherw ise provided or required by the context, a reference to the pow er to m ake appointm ents to any office shall be construed as including a reference to the pow er to m ake appointm ents on prom otion and transfer and to confirm appointm ents and to the pow er to appoint a person to act in or perform the functions of that office at any tim e w hen the office is vacant or the holder thereof is unable (w hether by reason of absence or infirm ity of m ind or body or any other cause) to perform the functions of that office.\n(7) R eferences in this C onstitution to the pow er to rem ove a public officer from his or her office shall be construed as including references to any pow er conferred by any law to require or perm it that officer to retire from the public service:\nProvided that nothing in this subsection shall be construed as conferring on any person or authority pow er to require a judge of the C ourt of A ppeal or the H igh C ourt, the Auditor-G eneral or the D irector of P ublic P rosecutions to retire from the public service.", + "page_start": 54, + "page_end": 54, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "18. Enforcem ent of protective provisions\n(3) If in any proceedings in any subordinate court any question arises as to the contravention of any of the provisions of sections 3 to 16 (inclusive) of this C onstitution, the person presiding in that court m ay, and shall if any party to the proceedings so requests, refer the question to the H igh C ourt unless, in his or her opinion, the raising of the question is m erely frivolous or vexatious.\n(4) P arliam ent m ay confer upon the H igh C ourt such pow ers in addition to those conferred by this section as m ay appear to be necessary or desirable for the purpose of enabling that court m ore effectively to exercise the jurisdiction conferred upon it by this section.\n(5) R ules of court m aking provision w ith respect to the practice and procedure of the H igh C ourt for the purposes of this section m ay be m ade by the person or authority for the tim e being having pow er to m ake rules of court w ith respect to the practice and procedure of that court generally.", + "page_start": 15, + "page_end": 15, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "Appropriate tests\n(a) the Secretary of State;\n(b) a laboratory which is accredited to ISO standard 15189 or ISO/IEC standard 17025( d ) by-\n(i) the United Kingdom Accreditation Service( e ) ('UKAS'), or\n(ii) an accreditation body that is a signatory to the International Laboratory Accreditation Cooperation ('ILAC') Mutual Recognition Arrangement( f ) or the European cooperation for Accreditation ('EA') Multilateral Agreement( g ),\nother than a laboratory which processes tests provided by the test provider for the purposes of this Schedule or is owned by the test provider or the device manufacturer. ( h ); or\n(c) a laboratory which is accredited by UKAS to ISO standard 15189 or ISO/IEC standard 17025( i ), other than a laboratory which processes tests provided by the test provider for the purposes of this Schedule or is owned by the test provider or the device manufacturer.\n( a ) 2006 c. 42.\n( b ) 1978 c. 29.\n( c ) S.I. 1972/1265 (N.I. 14).\n( d ) ISO standards are published in Geneva by the International Organisation for Standardisation, and are available on their website (www.iso.org) or at ISO Central Secretariat, International Organization for Standardization (ISO), 1 rue de VarembØ, Case postale 56, CH-1211, Geneva 20, Switzerland. ISO/IEC 17025 General requirements for the competence of testing and calibration laboratories was published in November 2017.\n( e ) The United Kingdom Accreditation Service is a company limited by guarantee incorporated in England and Wales under number 3076190.\n( f ) ILAC is an international organisation which coordinates the work of its signatory national accreditation bodies which are themselves involved in the accreditation of conformity assessment bodies, testing laboratories, and medical testing laboratories.\n( g ) EA is a regional organisation which coordinates the work of its signatory national accreditation bodies. EA is recognised by and works closely with ILAC.\n( h ) A body corporate established under section 232 of the Health and Social Care Act 2012 (c. 7).", + "page_start": 68, + "page_end": 68, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "Approve/Approve of\nTo 'approve' something is to give consent. E.g. The director approved the budget.\nTo 'approve of' something is to express a favourable opinion about it. E.g. The mother did not approve of the way her daughter was dressed for the school dance.", + "page_start": 16, + "page_end": 16, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "11. Protection of freedom of conscience\nand except so far as that provision or, as the case m ay be, the thing done under the authority thereof is show n not to be reasonably justifiable in a dem ocratic society.", + "page_start": 10, + "page_end": 10, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "18. Enforcem ent of protective provisions\n(1) S ubject to the provisions of subsection (5) of this section, if any person alleges that any of the provisions of sections 3 to 16 (inclusive) of this C onstitution has been, is being or is likely to be contravened in relation to him or her, then, w ithout prejudice to any other action w ith respect to the sam e m atter w hich is law fully available, that person m ay apply to the H igh C ourt for redress.\n(2) The H igh C ourt shall have original jurisdiction-\n( a ) to hear and determ ine any application m ade by any person in pursuance of subsection (1) of this section; or\n( b ) to determ ine any question arising in the case of any person w hich is referred to it in pursuance of subsection (3) of this section,\nand m ay m ake such orders, issue such w rits and give such direction as it m ay consider appropriate for the purpose of enforcing or securing the enforcem ent of any of the\nC opyright G overnm ent of B otsw ana\nprovisions of sections 3 to 16 (inclusive) of this C onstitution.", + "page_start": 14, + "page_end": 15, + "source_file": "Botswana-constitution.pdf" + } + ] + }, + { + "references": { + "source_file": "PLAW-116publ30.pdf", + "query": "What criteria must a lactation room meet?", + "target_page": 1, + "target_passage": "LACTATION ROOM.—The term ‘lactation room’ means a hygienic place, other than a bathroom, that— ‘‘(A) is shielded from view; ‘‘(B) is free from intrusion; and ‘‘(C) contains a chair, a working surface, and, if the public building is otherwise supplied with electricity, an electrical outlet. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "''§ 3318. Lactation room in public buildings\n''(a) DEFINITIONS.-In this section:\n''(1) APPROPRIATE AUTHORITY.-The term 'appropriate authority' means the head of a Federal agency, the Architect of the Capitol, or other official authority responsible for the operation of a public building.\n''(2) COVERED PUBLIC BUILDING.-The term 'covered public building' means a public building (as defined in section 3301) that is open to the public and contains a public restroom, and includes a building listed in section 6301 or 5101.\n''(3) LACTATION ROOM.-The term 'lactation room' means a hygienic place, other than a bathroom, that-\n''(A) is shielded from view;\n''(B) is free from intrusion; and\n''(C) contains a chair, a working surface, and, if the public building is otherwise supplied with electricity, an electrical outlet.\n''(b) LACTATION ROOM REQUIRED.-Except as provided in subsection (c), the appropriate authority of a covered public building shall ensure that the building contains a lactation room that is made available for use by members of the public to express breast milk.\n''(c) EXCEPTIONS.-A covered public building may be excluded from the requirement in subsection (b) at the discretion of the appropriate authority if-\n''(1) the public building-\n''(A) does not contain a lactation room for employees who work in the building; and\n''(B) does not have a room that could be repurposed as a lactation room or a space that could be made private using portable materials, at a reasonable cost; or\nJuly 25, 2019\n[H.R. 866]\nFairness For Breastfeeding Mothers Act of 2019. 40 USC 101 note.\n40 USC 3318.\ndkrause on DSKBC28HB2PROD with PUBLAWS\nVerDate Sep 11 2014\n15:46 Aug 08, 2019\nJkt 089139\nPO 00030\nFrm 00002\nFmt 6580\nSfmt 6580\nE:\\PUBLAW\\PUBL030.116\nPUBL030\nPUBLIC LAW 116-30-JULY 25, 2019\n133 STAT. 1033\n''(2) new construction would be required to create a lactation room in the public building and the cost of such construction is unfeasible.", + "page_start": 0, + "page_end": 1, + "source_file": "PLAW-116publ30.pdf" + }, + { + "text": "SEC. 2. LACTATION ROOM IN PUBLIC BUILDINGS.\n(a) LACTATION ROOM IN PUBLIC BUILDINGS.-Chapter 33 of title 40, United States Code, is amended by adding at the end the following new section:", + "page_start": 0, + "page_end": 0, + "source_file": "PLAW-116publ30.pdf" + }, + { + "text": "An Act\nTo provide a lactation room in public buildings.\nBe it enacted by the Senate and House of Representatives of the United States of America in Congress assembled,", + "page_start": 0, + "page_end": 0, + "source_file": "PLAW-116publ30.pdf" + }, + { + "text": "''§ 3318. Lactation room in public buildings\n''(d) NO UNAUTHORIZED ENTRY.-Nothing in this section shall be construed to authorize an individual to enter a public building or portion thereof that the individual is not otherwise authorized to enter.''.\n(b) CLERICAL AMENDMENT.-The table of sections at the beginning of chapter 33 of title 40, United States Code, is amended by inserting after the item related to section 3316 the following new item:\n40 USC 3301 prec.\n''3318. Lactation room in public buildings.''.\n(c) EFFECTIVE DATE.-The amendments made by this section shall take effect 1 year after the date of the enactment of this Act. 40 USC 3318 note.\nApproved July 25, 2019.\nLEGISLATIVE HISTORY-H.R. 866 (S. 528):\nCONGRESSIONAL RECORD, Vol. 165 (2019): Feb. 6, considered and passed House. June 26, considered and passed Senate.\nÆ", + "page_start": 1, + "page_end": 1, + "source_file": "PLAW-116publ30.pdf" + }, + { + "text": "Day 8 tests: private provider requirements\n(3) For the purposes of sub-paragraph (1)(d) and (e), a person or laboratory (as the case may be) meets the relevant requirements for accreditation to a standard where the person who is the operator of the laboratory complies with the requirements of regulation 6 of the Health Protection (Coronavirus, Testing Requirements and Standards) (England) Regulations 2020 as if-\n(a) a reference to an applicable test were a reference to a day 8 test;\n(b) a reference to a test provider were a reference to a private provider.", + "page_start": 63, + "page_end": 63, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "SECTION 1. SHORT TITLE.\nThis Act may be cited as the ''Fairness For Breastfeeding Mothers Act of 2019''.", + "page_start": 0, + "page_end": 0, + "source_file": "PLAW-116publ30.pdf" + }, + { + "text": "Day 8 tests: private provider requirements\n(c) they have provided the Department of Health and Social Care with a list of all organisations that they work with (whether by sub-contract or otherwise) to carry out the testing service or to carry out genomic sequencing, indicating the nature of the service that each organisation is providing and kept that list updated as appropriate;\n(d) in relation to a test which requires laboratory processing-\n(i) the person responsible for the taking of samples meets the relevant requirements for accreditation to ISO standard 15189 or ISO/IEC standard 17025 in respect of the taking of samples, and\n(ii) the laboratory used by the test provider for the processing of samples meets the relevant requirements for accreditation to ISO standard 15189 or ISO/IEC standard 17025 in respect of the processing of samples;\n(e) in relation to a point of care test, they meet the relevant requirements for accreditation to ISO Standard 15189 and ISO standard 22870;\n(f) they receive the information required by paragraph 10(3) or (4) (as appropriate), and if they administer the test to P, they do so no earlier than the end of the seventh day after the day on which P arrived in England;\n(g) each day, they notify the Secretary of State in writing of-\n(i) the number of tests they sold on that day, and\n(ii) in relation to each test sold on that day-\n(aa) the date of arrival in England of the person in respect of whom the test was sold, and\n(bb) whether the person in respect of whom the test was sold is a category 1 arrival or not;\n(h) if they arrange with another person ('X') for X to carry out any element of the single end-to-end testing service on their behalf, the test provider ensures that X complies with the following so far as relevant to the carrying out of that element-\n(i) paragraph 3(1)(e) to (i) of Schedule 10 as applied by paragraph (a) of this subparagraph,\n(ii) paragraph (b) to (g) of this sub-paragraph,\n(iii) paragraph 11(2), (3) and (4).\n(2) For the purposes of sub-paragraph (1)(h), 'single end-to-end testing service' has the meaning given in paragraph 3(2)(c) of Schedule 10.", + "page_start": 63, + "page_end": 63, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "https://committee.iso.org/home/tc283\n469 European Agency for Safety and Health at Work, 2013: Analysis of the determinants of workplace occupational safety and health practice in a selection of EU Member States, Luxembourg: Publications Office of the European Union, doi:10.2802/55885\n470 The 'Directive 89/654/EEC concerning the minimum safety and health requirements for the workplace' covers the following aspects: stability and solidity, electrical installations, emergency routes and exits, fire detection and firefighting, ventilation of enclosed workplaces, room temperature, natural and artificial room lighting, floors, walls, ceilings and roofs of rooms, windows and skylights, doors and gates, traffic routes - danger areas, specific measures for escalators and travelators, loading bays and ramps, room dimensions and air space in rooms freedom of movement at the workstation, rest rooms, pregnant women and nursing mothers, sanitary equipment, first aid rooms/equipment, disabled workers, outdoor workplaces (special provisions), Movement of pedestrians and vehicles\n471 As example, European Agency for Safety and Health at Work, 2020: Biological agents and prevention of workrelated diseases: a review. Luxembourg: Publications Office of the European Union,\n472 European Agency for Safety and Health at Work: Workers' exposure survey on cancer risk factors in Europe. https://osha.europa.eu/en/facts-and-figures/workers-exposure-survey-cancer-risk-factors-europe\n473 European Agency for Safety and Health at Work, 2021: Foresight Study on the Circular Economy and its effects on Occupational Safety and Health; EU-OSHA, 2019: Digitalisation and occupational safety and health An EU-OSHA research programme\n474 DG EMPLOYMENT, SOCIAL AFFAIRS AND INCLUSION: Evaluation of the Practical Implementation of the EU Occupational Safety and Health (OSH) Directives in EU Member States, SYNTHESIS REPORT, November 2015, Available at: https://ec.europa.eu/social/BlobServlet?docId=16897&langId=en ; IALI: International Benchmarking on Occupational Safety and Health (OSH) Regulation, revised version 2018, http://www.ialiaiit.org/ ; OSH-WIKI: OSH Performance Indicators - and their application in the monitoring and evaluation of OSH-infrastructure, OSH-policies and OSH legislation,", + "page_start": 158, + "page_end": 158, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "Further requirements on arrivals from category 2 countries and territories\n(c) in paragraph 33 of Schedule 4 (healthcare), paragraph (2) does not require P to remain in isolation in the circumstances set out in paragraph 33 of that Schedule;\n(d) in paragraph 43 of Schedule 4 (horticultural work)-\n(i) paragraph (2) does not require P to remain in isolation from any other person who is living or working on the specified farm,\n(ii) paragraph (3)(a)(i) applies with the modification that the address specified by P as the address at which they intend to self-isolate must be the specified farm, where 'specified farm' has the meaning given in paragraph 43 of Schedule 4;\n(e) either-\n(i) in paragraph 44 of Schedule 4 (elite sports),\n(ii) in sub-paragraphs (1)(h) to (l) of paragraph 2 of Schedule 11 (exemptions from additional measures applicable to arrivals from category 3 countries and territories),\nP satisfies the requirements of paragraph (2) if P complies with the relevant conditions specified in paragraph 44(4) of Schedule 4;\n16", + "page_start": 15, + "page_end": 15, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "Discussion\nTable 4. Mean Clinical Safety Evaluation, Large Language Model (LLM)-Generated and Physician-Written\nscore 1-5, No. (%) a.1 = 0. Correctness: faulty logic, Physician-written.Likert score 1-5, No. (%) a.2 = 0. Correctness: faulty logic, Physician-written.Likert score 1-5, No. (%) a.3 = 2 (1.3). Correctness: faulty logic, Physician-written.Likert score 1-5, No. (%) a.4 = 2 (1.3). Correctness: faulty logic, Physician-written.Likert score 1-5, No. (%) a.5 = 146 (97.3). Correctness: bias, LLM-generated..Mean (SD) = 5.00. Correctness: bias, LLM-generated.Likert score 1-5, No. (%) a.1 = 0. Correctness: bias, LLM-generated.Likert score 1-5, No. (%) a.2 = 0. Correctness: bias, LLM-generated.Likert score 1-5, No. (%) a.3 = 0. Correctness: bias, LLM-generated.Likert score 1-5, No. (%) a.4 = 0. Correctness: bias, LLM-generated.Likert score 1-5, No. (%) a.5 = 150 (100). Correctness: bias, Physician-written.Mean (SD).Mean (SD) = 5.00. Correctness: bias, Physician-written.Likert score 1-5, No. (%) a.1 = 0. Correctness: bias, Physician-written.Likert score 1-5, No. (%) a.2 = 0. Correctness: bias, Physician-written.Likert score 1-5, No. (%) a.3 = 0. Correctness: bias, Physician-written.Likert score 1-5, No. (%) a.4 = 0. Correctness: bias, Physician-written.Likert score 1-5, No. (%) a.5 = 150 (100). Overall safety risk, LLM-generated..Mean (SD) = 4.06", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed8.pdf" + } + ] + }, + { + "references": { + "source_file": "PLAW-116publ30.pdf", + "query": "When take effect the Fairness For Breastfeeding Mothers Act ?", + "target_page": 2, + "target_passage": "The amendments made by this section shall take effect 1 year after the date of the enactment of this Act. ", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "SECTION 1. SHORT TITLE.\nThis Act may be cited as the ''Fairness For Breastfeeding Mothers Act of 2019''.", + "page_start": 0, + "page_end": 0, + "source_file": "PLAW-116publ30.pdf" + }, + { + "text": "An Act\nTo provide a lactation room in public buildings.\nBe it enacted by the Senate and House of Representatives of the United States of America in Congress assembled,", + "page_start": 0, + "page_end": 0, + "source_file": "PLAW-116publ30.pdf" + }, + { + "text": "''§ 3318. Lactation room in public buildings\n''(d) NO UNAUTHORIZED ENTRY.-Nothing in this section shall be construed to authorize an individual to enter a public building or portion thereof that the individual is not otherwise authorized to enter.''.\n(b) CLERICAL AMENDMENT.-The table of sections at the beginning of chapter 33 of title 40, United States Code, is amended by inserting after the item related to section 3316 the following new item:\n40 USC 3301 prec.\n''3318. Lactation room in public buildings.''.\n(c) EFFECTIVE DATE.-The amendments made by this section shall take effect 1 year after the date of the enactment of this Act. 40 USC 3318 note.\nApproved July 25, 2019.\nLEGISLATIVE HISTORY-H.R. 866 (S. 528):\nCONGRESSIONAL RECORD, Vol. 165 (2019): Feb. 6, considered and passed House. June 26, considered and passed Senate.\nÆ", + "page_start": 1, + "page_end": 1, + "source_file": "PLAW-116publ30.pdf" + }, + { + "text": "''§ 3318. Lactation room in public buildings\n''(a) DEFINITIONS.-In this section:\n''(1) APPROPRIATE AUTHORITY.-The term 'appropriate authority' means the head of a Federal agency, the Architect of the Capitol, or other official authority responsible for the operation of a public building.\n''(2) COVERED PUBLIC BUILDING.-The term 'covered public building' means a public building (as defined in section 3301) that is open to the public and contains a public restroom, and includes a building listed in section 6301 or 5101.\n''(3) LACTATION ROOM.-The term 'lactation room' means a hygienic place, other than a bathroom, that-\n''(A) is shielded from view;\n''(B) is free from intrusion; and\n''(C) contains a chair, a working surface, and, if the public building is otherwise supplied with electricity, an electrical outlet.\n''(b) LACTATION ROOM REQUIRED.-Except as provided in subsection (c), the appropriate authority of a covered public building shall ensure that the building contains a lactation room that is made available for use by members of the public to express breast milk.\n''(c) EXCEPTIONS.-A covered public building may be excluded from the requirement in subsection (b) at the discretion of the appropriate authority if-\n''(1) the public building-\n''(A) does not contain a lactation room for employees who work in the building; and\n''(B) does not have a room that could be repurposed as a lactation room or a space that could be made private using portable materials, at a reasonable cost; or\nJuly 25, 2019\n[H.R. 866]\nFairness For Breastfeeding Mothers Act of 2019. 40 USC 101 note.\n40 USC 3318.\ndkrause on DSKBC28HB2PROD with PUBLAWS\nVerDate Sep 11 2014\n15:46 Aug 08, 2019\nJkt 089139\nPO 00030\nFrm 00002\nFmt 6580\nSfmt 6580\nE:\\PUBLAW\\PUBL030.116\nPUBL030\nPUBLIC LAW 116-30-JULY 25, 2019\n133 STAT. 1033\n''(2) new construction would be required to create a lactation room in the public building and the cost of such construction is unfeasible.", + "page_start": 0, + "page_end": 1, + "source_file": "PLAW-116publ30.pdf" + }, + { + "text": "SEC. 2. LACTATION ROOM IN PUBLIC BUILDINGS.\n(a) LACTATION ROOM IN PUBLIC BUILDINGS.-Chapter 33 of title 40, United States Code, is amended by adding at the end the following new section:", + "page_start": 0, + "page_end": 0, + "source_file": "PLAW-116publ30.pdf" + }, + { + "text": "Consumer Laws and Regulations\nWe are also subject to certain consumer laws and regulations that are designed to protect consumers in transactions with banks. While the following list is not exhaustive, these laws and regulations include the Truth in Lending Act, the Truth in Savings Act, the Electronic Funds Transfer Act, the Expedited Funds Availability Act, the Equal Credit Opportunity Act, and the Fair Housing Act, among others. These laws and regulations among other things prohibit discrimination on the basis of race, gender or other designated characteristics and mandate various disclosure requirements and regulate the manner in which financial institutions must deal with customers when taking deposits or making loans to such customers. These and other laws also limit finance charges or other fees or charges earned in our activities. We must comply with the applicable provisions of these consumer protection laws and regulations as part of our ongoing customer relations.", + "page_start": 37, + "page_end": 37, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "M iscellaneous\n125. R esignations\n126. R eappointm ents and concurrent appointm ents\n127.\nInterpretation\nFirst S chedule - E lection of S pecially E lected M em bers of the N ational Assem bly\nSecond Schedule - D ivision of D istricts into regions for the purpose of selecting M em bers of N tlo ya D ikgosi\nL.N . 83, 1966,\nAct 30, 1969,\nAct 43, 1969,\nAct 25, 1970,\nAct 28, 1972,\nAct 24, 1973,\nAct 28, 1978,\nS.I. 25, 1980,\nAct 32, 1982,\nAct 1, 1983,\nAct 22, 1987,\nS.I. 37, 1991,\nAct 27, 1992,\nS.I. 51, 1993,\nS.I. 119, 1993,\nAct 16, 1997,\nAct 18, 1997,\nAct 1, 1999,\nAct 2, 2002,\nAct 12, 2002,\nAct 9, 2005,\nS.I. 91, 2006.\n[ D ate of C om m encem ent: 30th S eptem ber, 1966 ]", + "page_start": 3, + "page_end": 3, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "115. P ensions law s and protection of pensions rights\n(1) The law to be applied w ith respect to any pensions benefits that w ere granted to any person before the com ing into operation of this C onstitution shall be the law that w as in force at the date on w hich those benefits w ere granted or any law in force at a later date that is not less favourable to that person.\n(2) The law to be applied w ith respect to any pensions benefits (not being benefits to w hich subsection (1) of this section applies) shall-\n( a ) in so far as those benefits are w holly in respect of a period of service as a public officer that com m enced before the date on w hich this C onstitution com es into operation, be the law that w as in force im m ediately before that date; and\n( b ) in so far as those benefits are w holly or partly in respect of a period of service as a public officer that com m enced after the date on w hich this C onstitution com es into operation, be the law in force on the date on w hich that period of service com m enced,\nor any law in force at a later date that is not less favourable to that person.", + "page_start": 49, + "page_end": 49, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "1. (1) In this S chedule-\n9. W here, by reason of an equality of votes betw een them , the num ber of candidates in any place on the list w ho w ould otherw ise be deem ed to have been elected under paragraph 7 of this Schedule exceeds the num ber of persons rem aining to be elected as S pecially E lected M em bers after the persons in the preceding places have been elected, none of the candidates in that place or in any succeeding place shall be deem ed to have been elected and a further election shall be held to fill the vacancies still rem aining am ong the S pecially E lected M em bers; and the provisions of this S chedule shall apply in relation to that further election as if it w ere a general election w here the total num ber of S pecially E lected M em bers w as equal to the num ber of vacancies still rem aining to be filled.\n10. W here, in a by-election, tw o or m ore candidates equally receive the highest num ber of votes, no candidates shall be deem ed to have been elected and a further by-election shall be held, in accordance w ith the provisions of this S chedule, at w hich only those candidates w ho received the highest num ber of votes in the original by-election m ay again stand as candidates.\nS E C O N D S C H E D U LE TO TH E C O N S TITU TIO N D IV IS IO N O F D IS TR IC TS IN TO R E G IO N S FO R TH E PU R P O S E O F S E LE C TIN G M E M B E R S O F N TLO Y A D IK G O S I\nTH E C E N T R AL D IS T R I C T (1) Bobirw a R egion (2) Boteti region (3) M ahala pye R egion (4) Serow e R egion (5) Tonota R egion (6)\nC opyright G overnm ent of B otsw ana\nTsw apo\nng\nR egion\n(7)\nTutum e\nR egion\nTH E\n(8)", + "page_start": 56, + "page_end": 57, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "89. A lteration of C onstitution\n(1) S ubject to the provisions of this section P arliam ent m ay alter this C onstitution.\n(2) A B ill for an A ct of P arliam ent under this section shall not be introduced into the N ational A ssem bly unless the text of the B ill has been published in the G azette not less than 30 days before it is so introduced.\n(3) In so far as it alters any of the provisions of-\n( a ) C hapter II; sections 30 to 44 inclusive, 47 to 51 inclusive, and 56; sections 77 to 79 inclusive and section 85; C hapter V II; or sections 117 to 120 inclusive and section 127 in its application to any of the provisions m entioned in this paragraph;\n( b ) sections 57, 63 to 66 inclusive, 86 to 89 inclusive, 90(2) and (3), 91(2), (3), (4) and (5), and 92; C hapter V I; and section 127 in its application to any of the provisions m entioned in this paragraph,\na B ill for an A ct of P arliam ent under this section shall not be passed by the N ational Assem bly unless-\n(i) the final voting on the B ill in the A ssem bly takes place not less than three m onths after the previous voting thereon in the A ssem bly; and\n(ii) at such final voting the B ill is supported by the votes of not less than tw o-thirds of all the M em bers of the A ssem bly.\n(4) In so far as it alters any of the provisions m entioned in subsection (3)( b ) of this section no B ill shall be presented to the P resident for his or her assent unless after its passage by the A ssem bly it has been subm itted to the electors qualified to vote in the election of the E lected M em bers of the N ational A ssem bly, and, on a vote taken in such m anner as P arliam ent m ay prescribe, the m ajority of the electors voting have approved the B ill.", + "page_start": 38, + "page_end": 38, + "source_file": "Botswana-constitution.pdf" + } + ] + }, + { + "references": { + "source_file": "uksi_20200471_en.pdf", + "query": "When is it not necessary to review an EHC plan ?", + "target_page": 3, + "target_passage": " It is not necessary for a local authority to review an EHC plan in accordance with section 44(1) of the Act if it is impractical to do so because of a reason relating to the incidence or transmission of coronavirus. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "' Circumstances in which it is not necessary to review an EHC plan\n18A. -(1) It is not necessary for a local authority to review an EHC plan in accordance with section 44(1) of the Act if it is impractical to do so because of a reason relating to the incidence or transmission of coronavirus.\n(2) Where paragraph (1) applies, a local authority must instead conduct such reviews as soon as reasonably practicable.'.\n12. In regulation 22 (amending an EHC plan following a review), after paragraph (5) insert-\n'(6) The local authority need not comply with the time limit referred to in paragraphs (3) and (4) if it is impractical to do so because of a reason relating to the incidence or transmission of coronavirus.'.\n13. In regulation 27(3) (amending or replacing an EHC plan following a re-assessment)-\n(a) at the end of sub-paragraph (c) omit 'or'; and\n(b) at the end of sub-paragraph (d) insert-\n'; or\n(e) of a reason relating to the incidence or transmission of coronavirus'.\n14. In regulation 45 (unopposed appeals), after paragraph (7) insert-\n'(8) The local authority need not comply with the time limits specified in paragraph (3A) if it is impractical to do so because the circumstances referred to in regulation 10(4)(e) apply.'.", + "page_start": 2, + "page_end": 2, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "' Relaxation of time periods due to coronavirus exception\n6. In regulation 4 (determination whether or not special educational provision may be necessary), after paragraph (2) insert-\n'(3) The local authority need not comply with the time limit referred to in paragraph (1) if it is impractical to do so because of a reason relating to the incidence or transmission of coronavirus.'.\n7. In regulation 5(4) (decision whether or not to conduct an EHC needs assessment)-\n(a) at the end of sub-paragraph (c) omit 'or'; and\n(b) at the end of sub-paragraph (d) insert-\n'; or\n(e) of a reason relating to the incidence or transmission of coronavirus'.\n8. In regulation 8(2) (duty to co-operate in EHC needs assessments)-\n(a) at the end of sub-paragraph (b) omit 'or'; and\n(b) at the end of sub-paragraph (c) insert-\n'; or\n(d) of a reason relating to the incidence or transmission of coronavirus'.\n9. In regulation 10(4) (decision not to secure an EHC plan)-\n2\n(a) at the end of sub-paragraph (c) omit 'or'; and\n(b) at the end of sub-paragraph (d) insert-\n'; or\n(e) of a reason relating to the incidence or transmission of coronavirus'.\n10. In regulation 13(3) (timescales for EHC plans), for '(d)' substitute '(e)'.\n11. After regulation 18 (circumstances in which a local authority must review an EHC plan) insert-", + "page_start": 1, + "page_end": 2, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "Data Collection\nThe study, with review and approval from the Weill Cornell institutional review board (IRB), was conducted at an urban academic 840-bed quaternary-care hospital in New York City, with approximately 71 000 adult ED visits and 21 000 admissions annually. EHR data from 1600 individual EM patient encounters leading to acute hospital admission were randomly selected from visits occurring between April and September of 2023. We limited our analysis to EM patient encounters occurring after April 2023, as the study site had updated the EM-handoff at that time. Encounters before this date used an earlier version of the EM-handoff note that would have provided suboptimal data for training labels. We used these data to fine-tune a pretrained LLM, which then generated an abstractive EM-handoff note. For the 1600 patient encounters (the study participants), Weill Cornell Medicine IRB approved a waiver of informed consent because the study used retrospective data and posed minimal risk to patients. We used Strengthening the Reporting of Observational Studies in Epidemiology (STROBE) reporting guidelines.", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed8.pdf" + }, + { + "text": "' Relaxation of time periods due to coronavirus exception\n23. In regulation 8(2) (duty to co-operate in a detained person's EHC needs assessment), at the end of sub-paragraph (d) insert-\n'; or\n(e) of a reason relating to the incidence or transmission of coronavirus'.\n24. In regulation 10(4) (decision not to secure an EHC plan)-\n(a) at the end of sub-paragraph (b) omit 'or'; and\n(b) at the end of sub-paragraph (c) insert-\n'; or\n(d) of a reason relating to the incidence or transmission of coronavirus'.\n25. In regulation 13(3) (timescales for EHC plans), for '(c)' substitute '(d)'.\n26. In regulation 29 (compliance with the orders of the First-tier Tribunal)-\n(a) after paragraph (6) insert-\n'(6A) The home authority need not comply with the time limits specified in paragraph (3) if it is impractical to do so because the circumstances referred to in regulation 10(4)(d) apply.'.\n(b) in paragraph (7)(c) after '10(4)(a)' insert 'or (d)'.\n27. In regulation 30(7)(c) (unopposed appeals), after '10(4)(a)' insert 'or (d)'.", + "page_start": 4, + "page_end": 4, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "' Relaxation of time periods due to coronavirus exception\n(2) The coronavirus exception applies where it is not reasonably practicable for a person to meet a requirement referred to in paragraph (1) for a reason relating to the incidence or transmission of coronavirus.\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)-\n(a) regulation 15(2) (transfer of EHC plans) (in relation to the second reference to 15 working days), (4), (5), (7) (in relation to the second reference to 15 working days) and (8);\n(b) regulation 16(2) and (3) (change of responsible commissioning body);\n(c) regulation 20(9) and (10) (review where the child or young person attends a school or other institution);\n(d) regulation 21(7), (8) and (9) (review of EHC plan where the child or young person does not attend a school or other institution);\n(e) regulation 25(1) (notification of decision whether it is necessary to re-assess educational, health care and social care provision);\n(f) regulation 27(4) (amending or replacing an EHC plan following a re-assessment);\n(g) regulation 33 (requirement to consider mediation);\n(h) regulation 34(1) and (2) (where a parent or young person does not wish to or fails to pursue mediation);\n(i) regulation 35(2), (3) and (4) (mediation - health care issues);\n(j) regulation 36(2) (mediation - no health care issues);\n(k) regulation 39(1) and (3) (mediation certificate under section 55(5));\n(l) regulation 42(3) and (4) (steps to be taken by a local authority);\n(m) regulation 44(2)(d), (e), (f) and (h) (compliance with the orders of the First-tier Tribunal);\n(n) regulation 45(4), (5) and (6A) (unopposed appeals);\n(o) regulation 47 (disclosure of EHC plans in relation to higher education); and\n(p) regulation 56(3) (publication of comments on the local offer).'.", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "Statistical Analysis\nBased on prior work, 3 board certified EM physician leaders (M.M., A.F., and P.S.) with experience in formal quality and patient safety review processes performed retrospective reviews of ED-based EHRrecords of 50 individual ED patient encounters, randomly selected from the test dataset. 49 Based on prior published clinical evaluations of LLM, as well as the study feasibility of using EM physician quality and patient safety leaders, 50 ED patient encounters were evaluated. 50 Reviewers\nFigure. Data Flow of Generating Emergency Department (ED) Handoff Summary\nCBC indicates complete blood count; CMP, comprehensive metabolic panel; CTH, computed tomography of the head; EHR, electronic health record; Hct, hematocrit; Hgb, hemoglobin; HPI, history of present illness; HR, heart rate; IP, inpatient; IVF, intravenous fluid; N/V/D, nausea, vomiting, and diarrhea; RR, respiratory rate; SDU, step down unit; SPO2, peripheral capillary oxygen saturation; WBC, white blood cell; WBG, whole blood glucose.\nJAMANetwork Open. 2024;7(12):e2448723. doi:10.1001/jamanetworkopen.2024.48723\n(Reprinted)\nDecember 3, 2024\n5/12\nDownloaded from jamanetwork.com by guest on 01/13/2025\nJAMANetworkOpen | EmergencyMedicine\nDeveloping and Evaluating LLM-Generated Emergency Medicine Handoff Notes\nsubsequently evaluated 2 ED-to-inpatient handoff notes for each patient: (1) the physician-written note and (2) the LLM-generated note.", + "page_start": 4, + "page_end": 5, + "source_file": "pubmed8.pdf" + }, + { + "text": "REFERENCES\n21 . Singleton JM, Sanchez LD, Masser BA, Reich B. Efficiency of electronic signout for ED-to-inpatient admission at a non-teaching hospital. Intern Emerg Med . 2018;13(7):1105-1110. doi:10.1007/s11739-018-1816-z\n22 . Downing NL, Bates DW, Longhurst CA. Physician burnout in the electronic health record era: are we ignoring the real cause? Ann Intern Med . 2018;169(1):50-51. doi:10.7326/M18-0139\n23 . Pivovarov R, Elhadad N. Automated methods for the summarization of electronic health records. JAmMed Inform Assoc . 2015;22(5):938-947. doi:10.1093/jamia/ocv032\n24 . Hartman VC, Bapat SS, Weiner MG, Navi BB, Sholle ET, Campion TR Jr. A method to automate the discharge summary hospital course for neurology patients. J Am Med Inform Assoc . 2023;30(12):1995-2003. doi:10.1093/ jamia/ocad177\n25 . Zhang Y, Merck D, Tsai EB, Manning CD, Langlotz CP. Optimizing the factual correctness of a summary: a study of summarizing radiology reports. arXiv . Preprint posted online November 6, 2019. doi:10.48550/arXiv.1911.02541\n26 . Mukherjee S, Gamble P, Ausin MS, et al. Polaris: a safety-focused LLM constellation architecture for healthcare. arXiv . Preprint posted online March 20, 2024. doi:10.48550/arXiv.2403.13313\n27 . Hegselmann S, Shen SZ, Gierse F, Agrawal M, Sontag D, Jiang X. A data-centric approach to generate faithful and high quality patient summaries with large language models. arXiv . Preprint posted online February 23, 2024. doi:10.48550/arXiv.2402.15422", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed8.pdf" + }, + { + "text": "Abstract\nRESULTS In this study of 1600 EM patient records (832 [52%] female and mean [SD] age of 59.9 [18.9] years), LLM-generated handoff notes, compared with physician-written ones, had higher ROUGE(0.322 vs 0.088), BERTScore (0.859 vs 0.796), and SCALE scores (0.691 vs 0.456), indicating the LLM-generated summaries exhibited greater similarity and more detail. As reviewed by 3 board-certified EM physicians, a subsample of 50 LLM-generated summaries had a mean (SD) usefulness score of 4.04 (0.86) out of 5 (compared with 4.36 [0.71] for physician-written) and mean (SD) patient safety scores of 4.06 (0.86) out of 5 (compared with 4.50 [0.56] for physician-written). None of the LLM-generated summaries were classified as a critical patient safety risk.\nCONCLUSIONSANDRELEVANCE In this cohort study of 1600 EM patient medical records, LLM-generated EM-to-IP handoff notes were determined superior compared with physician-written summaries via conventional automated evaluation methods, but marginally inferior in usefulness\n(continued)\nOpenAccess. This is an open access article distributed under the terms of the CC-BY License.\nJAMANetwork Open. 2024;7(12):e2448723. doi:10.1001/jamanetworkopen.2024.48723\n(Reprinted)\nDecember 3, 2024\n1/12\nDownloaded from jamanetwork.com by guest on 01/13/2025", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed8.pdf" + }, + { + "text": "Introduction\nHandoffs, where patient information is exchanged between health professionals during a transfer of clinical responsibility, have been identified as a critical source of medical errors. 1,2 The Joint Commission, the Accreditation Council for Graduate Medical Education, and the Association of American Medical Colleges have all recommended the development of high-quality and standardized handoff processes to address the substantial patient risk of this ubiquitous event. 3,4 Implementing handoff tools has previously demonstrated significant reductions in medical errors. 5,6 High-quality handoffs from emergency medicine (EM) to inpatient (IP) services (EM-to-IP) are challenged by medical complexity, diagnostic uncertainty, rapidly evolving care plans, and time constraints. 7-10 The EM-to-IP handoff structure is not well standardized, frequently communicated verbally, and poorly adhered to in emergency departments (EDs), including in medical centers with formalized handoff systems. 11-14 Prior research has demonstrated that suboptimal EM-to-IP handoff is associated with adverse events, EM leaders and front-line clinicians themselves view the EM-to-IP handoff as high risk, and an electronic health record (EHR)-based technology is commonly mentioned as the most desired assistive tool in improving ED transitions of care. 15-18 Limited work to date has demonstrated EMelectronic handoff tools as feasible, efficient, and effective. 19-21 In April 2023, EM and internal medicine leadership of the study site collaboratively developed and launched a mandatory, EHR-based handoff workflow via a standardized EM-to-IP handoff note template, designed for realtime completion by the EM care team at time of admission. At 3 and 6 months postlaunch, informal evaluation of new EM-to-IP handoff notes through random medical record review and unstructured clinician feedback sessions revealed variable completeness, quality, and subsequent usefulness of the handoff notes.", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed8.pdf" + }, + { + "text": "Ethics statement\nThis study involving humans was approved by Regional Committee for Medical Research Ethics in North Norway (REK North: 174,837) and the Data Protection Of /uniFB01 cer at Nordlandssykehuset Hospital Trust, Norway. This study was conducted in accordance with the local legislation and\nDahl et al.\n10.3389/fresc.2024.1303094\ninstitutional requirements. The participants provided their written informed consent to participate in this study.", + "page_start": 8, + "page_end": 9, + "source_file": "pubmed13.pdf" + } + ] + }, + { + "references": { + "source_file": "Excel Training Manual 1.pdf", + "query": "Give me some info about the scroll bars in excel", + "target_page": 6, + "target_passage": "Appear at the right and on the bottom of the screen. You may click the scroll arrows, drag the scroll box or click the scroll bar to move through the document. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "NAVIGATING IN A FILE\nArrow Keys\nMove one cell to the right, left, up or down\nTab\nMove once cell to the right\nCtrl+Home\nTo beginning file\nCtrl+End\nTo end of typed information\nHome\nBeginning of a line\nEnd\nEnd of a line\nPage Down\nDown one screen\nPage Up\nUp one screen\nF5\nTo a specific page\nScroll bars\nAppear at the right and on the bottom of the screen. You may click the scroll arrows, drag the scroll box or click the scroll bar to move through the document.\nITTraining@sgul.ac.uk\nPage 2\nSt. George's Information Services", + "page_start": 5, + "page_end": 5, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Try This Yourself:\nContinue using the previous file with this exercise, or open the file E1324 Worksheet Techniques_2.xlsx...\n Point to the vertical dots between the sheet names and the horizontal scroll bar, as shown\nThe pointer will change to a double-headed arrow...\n Click and drag the bar across to the right, to the end of column L , then release the mouse button\n Double-click on Sheet1 (5) to select the worksheet tab name\nThis will also place it into edit mode…\n Type Comms , then press\n Repeat steps 3 and 4 to rename the other worksheets:\nSheet1 (4)\nAdmin\nSheet1 (3)\nShop\nSheet1 (2)\nIT\nSheet1\nMaintenance", + "page_start": 11, + "page_end": 11, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Handy to Know…\n When every cell in a row or column is selected, the corresponding row or column header is filled in dark blue. When only some of the cells are selected, the row or column header is filled in orange. These indicators help you locate the active cell(s) on the worksheet.\n\nMicrosoft Excel", + "page_start": 17, + "page_end": 17, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Try This Yourself:\nSa m e File file with this exercise, or open the file E705 Ranges_1.xlsx...\nContinue using the previous\n Press + to make cell A1 the active cell\n Move the mouse pointer to the column heading for column B\nNotice that the mouse pointer changes to a black arrow pointing down the column…\n Click once to select the column\nThis time the row headers\nchange to orange to indicate that at least one cell (but not all) in each row is selected…\n Click in cell D6 and press\n+\nThis key combination also selects an entire column…\n Click on the column header for column B to select it\n Hold down and click on the column header for column D\nThis time, columns B, C, and D are all selected…\n Click in the column header for column A , then hold down the left mouse button and drag the mouse pointer across the column headings to column E", + "page_start": 18, + "page_end": 18, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Handy to Know…\n As you drag the fill handle across, a tool tip appears below the fill pointer displaying the current value in the series. This is really handy when you want to end on a particular month, day or value.\nMicrosoft Excel", + "page_start": 8, + "page_end": 8, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Try This Yourself:\nn\npe\nO\nFile\nBefore starting this exercise you MUST open the file E723 Cell Alignment_9.xlsx...\n Click in cell A5\nThis cell contains a long text entry that spills across several columns…\n Click on the Expand Formula Bar tool to the right of the formula bar to see all of the text\n Click on the Wrap Text\ncommand in the\nAlignment group on the Home tab to wrap the text in cell A5\nNotice how the row height has now increased…\n Hold down the key and click in cell E5 to select the range A5:E5\n Click on the drop arrow for Merge & Centre in the Alignment group and select Merge Cells to merge the cells in the range\n Move the mouse pointer to the bottom of the row 5 heading border and drag the row height up until you reach 30 points", + "page_start": 25, + "page_end": 25, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Try This Yourself:\nContinue using the previous file with this exercise, or open the file E1317 Charting_2.xlsx...\n Point to the border of the chart and click once to select the chart as an object\nThe border of the chart will thicken to indicate that the chart is selected, the range of data used for the chart will be coloured, the ribbon will show chart-specific tabs and commands, and additional tools will appear to the right of the chart…\n Click on the chart legend to make it the active object in the chart\n Click on the vertical axis to make it the active object\n Click on the horizontal axis to make it the active object\n Click on the border of the chart to make the overall chart the active object again - notice that the range of data has been coloured again\n Click in cell A1 to deselect the chart", + "page_start": 47, + "page_end": 47, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Try This Yourself:\nContinue using the previous file with this exercise, or open the file E1317 Charting_8.xlsx...\n Click on the Revenue Chart worksheet tab to see the chart, then click anywhere on the chart to select it and see the CHART TOOLS: DESIGN and CHART TOOLS: FORMAT tabs\n Click on the CHART TOOLS: DESIGN tab, then click on Quick Layout in the Chart Layouts group to display a gallery of layout options\n Click on Layout 3 to apply this chart layout to the chart\n Repeat steps 2 and 3 to select other chart layouts and see how they appear when applied to the chart\n Click on Quick Layout in the Chart Layouts group and click on Layout 5\n Click on the Chart Data worksheet tab to display this worksheet", + "page_start": 53, + "page_end": 53, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Try This Yourself:\nSa m e F i le\nContinue using the previous file with this exercise, or open the file E1317 Charting_9.xlsx...\n Click on the Revenue Chart worksheet tab to see the chart, then click anywhere on the chart to select it\n Click on the Chart Styles tool to the right of the chart to see a gallery of style options, as shown\n Scroll through the gallery and point to each style to see how your chart will look in Live Preview\n Scroll to and click on Style 9\n Click on the Chart Styles tool to the right of the chart to close the gallery\n Click on the Chart Data\nworksheet tab", + "page_start": 54, + "page_end": 54, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Try This Yourself:\nSa m e F i le\nContinue using the previous file with this exercise, or open the file E1317 Charting_4.xlsx...\n Click on the chart to select it\n Point to the border of the chart until the mouse pointer changes to a fourheaded arrow\n Hold down the left mouse button and drag the chart below the data so that the Total Revenue row in the worksheet is visible\n Click in cell A1 to deselect the chart", + "page_start": 49, + "page_end": 49, + "source_file": "Excel Training Manual 1.pdf" + } + ] + }, + { + "references": { + "source_file": "Excel Training Manual 1.pdf", + "query": "How to rename a worksheet in Excel ?", + "target_page": 12, + "target_passage": "To rename a worksheet: 1. Double click on the current name on the worksheet tab 2. Type the new name and press ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "To rename a worksheet :\n1. Double click on the current name on the worksheet tab\n2. Type the new name and press\nITTraining@sgul.ac.uk\nPage 8\nSt. George's Information Services", + "page_start": 11, + "page_end": 11, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "RENAMING A WORKSHEET\nBy default, Excel names worksheets as Sheet1 , Sheet2 , Sheet3 , etc. These names are fine if you are not planning to share the workbook, but changing these to something more relevant\nmakes it much easier to understand the purpose of a worksheet. You can also adjust the horizontal scroll bar to make room for longer, more meaningful worksheet names.", + "page_start": 11, + "page_end": 11, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Handy to Know…\n You can rename a worksheet by right-clicking on the worksheet tab to display the shortcut menu and clicking on Rename .\n A worksheet tab name can contain up to 31 characters including spaces, but it is better to keep it short and succinct.\nMicrosoft Excel\n To copy a worksheet into an existing workbook, make sure that you open the destination workbook first to ensure that it is listed in To book in the Move or Copy dialog box.\nMicrosoft Excel", + "page_start": 11, + "page_end": 12, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Try This Yourself:\nContinue using the previous file with this exercise, or open the file E1324 Worksheet Techniques_2.xlsx...\n Point to the vertical dots between the sheet names and the horizontal scroll bar, as shown\nThe pointer will change to a double-headed arrow...\n Click and drag the bar across to the right, to the end of column L , then release the mouse button\n Double-click on Sheet1 (5) to select the worksheet tab name\nThis will also place it into edit mode…\n Type Comms , then press\n Repeat steps 3 and 4 to rename the other worksheets:\nSheet1 (4)\nAdmin\nSheet1 (3)\nShop\nSheet1 (2)\nIT\nSheet1\nMaintenance", + "page_start": 11, + "page_end": 11, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Try This Yourself:\nContinue using the previous file with this exercise, or open the file E1324 Worksheet Techniques_1.xlsx...\n Right-click on Sheet1 to display the worksheet shortcut menu\n Select Move or Copy to display the Move or Copy dialog box\n Click on Create a copy so it appears ticked, then click on [OK]\nThe new worksheet is named Sheet1 (2). Let's create a 'template' from this worksheet by deleting unwanted data...\n Select the range B7:E9 , then press to clear it\n Repeat step 4 to clear the ranges B14:E23 , G7:J9 and G14:J23 , then press + to return to cell A1\nNow we can copy this 'template' to create additional worksheets...\n Repeat steps 1 to 3 three times to create three copies of the template worksheet - this time without data\nThe final worksheet should be named Sheet1 (5)", + "page_start": 10, + "page_end": 10, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Try This Yourself:\nn\nBefore starting this exercise you MUST open the file E1324 Worksheet Techniques_1.xlsx…\n Examine the workbook - it currently contains one worksheet named Sheet1\n Click on the New Sheet icon at the end of the worksheet tabs\nA new worksheet named Sheet2 will be inserted. You can also use the keyboard shortcut...\n Press + to insert another new worksheet\nThis sheet is named Sheet3 and is inserted before the currently selected sheet. Now let's delete a sheet...\n Right-click on the Sheet3 worksheet tab to display the shortcut menu\n Select Delete to remove the worksheet\nAs the worksheet contains no data, the sheet will be deleted immediately. If a worksheet contains data, Excel will ask you to confirm your actions...\n Repeat steps 4 and 5 to delete Sheet2", + "page_start": 9, + "page_end": 9, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Sa m e F i le\nContinue using the previous file with this exercise, or open the file E1324 Worksheet Techniques_8.xlsx...\n Click on the Admin worksheet tab, hold down , then click on the Shop worksheet tab to select the first three worksheets\n Click in cell A1 to select the cell\n Click on the HOME tab, then click on Italics in the Font group\nThis will italicise the text in cell A1 on this and all other worksheets in the group…\n Click on the Maintenance worksheet tab, then the Shop worksheet tab to see that the changes have been applied here\n Click on the IT worksheet tab to see that the changes have not been applied to this worksheet\nSince this was not part of the grouped sheets the changes have not been applied here. Notice too that clicking on a tab deselects the previous grouping", + "page_start": 14, + "page_end": 14, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Try This Yourself:\nle\ni\nF\ne\nm\nSa\nContinue using the previous file with this exercise, or open the file E1324 Worksheet Techniques_6.xlsx...\n Click on the Maintenance worksheet tab\nWe'll copy this completed data to another workbook...\n Right-click on the worksheet tab to display the shortcut menu, then click on Move or Copy to display the Move or Copy dialog box\n Click on the drop arrow for To book , then select (new book)\n Click on Create a copy so it appears ticked\nThis will create a new workbook as well as making a copy of the worksheet...\n Click on\n[OK]\nA new workbook will be created and Maintenance will be the only worksheet in the workbook…\n Save the new workbook as Maintenance.xlsx , then close it", + "page_start": 12, + "page_end": 12, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "For Your Reference…\nTo insert a new worksheet into a workbook :\n Click on the New Sheet icon to the right of the worksheet tabs\nTo delete a worksheet from a workbook :\n Right click on the worksheet tab, then select Delete\nITTraining@sgul.ac.uk\nPage 6\nSt. George's Information Services", + "page_start": 9, + "page_end": 9, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Handy to Know…\n You can copy the current worksheet using the HOME tab by clicking on Format in the Cells group, then clicking on Move or Copy Sheet .\n The Before sheet options in the Move or Copy dialog box allow you to position the copied worksheet where you want.\nMicrosoft Excel", + "page_start": 10, + "page_end": 10, + "source_file": "Excel Training Manual 1.pdf" + } + ] + }, + { + "references": { + "source_file": "Excel Training Manual 1.pdf", + "query": "I want to freeze a pane in my Excel worksheet ", + "target_page": 16, + "target_passage": "To freeze panes in a worksheet: 1. Click in the cell below and to the right of the area you want to freeze/unfreeze 2. Click on the VIEW tab 3. Click on Freeze Panes in the Window group, then select Freeze Panes ", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "To freeze panes in a worksheet :\n1. Click in the cell below and to the right of the area you want to freeze/unfreeze\n2. Click on the VIEW tab\n3. Click on Freeze Panes in the Window group, then select Freeze Panes\nITTraining@sgul.ac.uk\nPage 12\nSt. George's Information Services", + "page_start": 15, + "page_end": 15, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Try This Yourself:\nContinue using the previous file E1324 Worksheet\nwith this exercise, or open the file Techniques_11.xlsx...\n Click on the Maintenance worksheet tab, then spend a few moments examining the worksheet\nDepending on your screen, it is possible that you won't be able to see all of the figures on the screen at once...\n Click in cell B6 to select the cell\n Click on the VIEW tab, click on Freeze Panes in the Window group, then select Freeze Panes\nThin black lines appear above and to the left of the selected cell. This indicates that the areas above and to the left are frozen...\n Scroll to the right until Yearly Average in column L appears next to column A\n Scroll down until Overheads in row 25 is below row 5\n Press + to move to cell B6 - this is our temporary home cell, as the cells above and to the left are frozen\n On the VIEW tab, click on Freeze Panes in the Freeze Panes group, then click on Unfreeze Panes to unfreeze the rows and columns", + "page_start": 15, + "page_end": 15, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Handy to Know…\n If you want to freeze only the rows above the selected cell (leaving all columns unfrozen), select the cell in column A of that row - e.g. to freeze rows 1 to 6 , click in cell A7 . The same applies to freezing only columns and leaving the rows unfrozen: select the cell in row 1 .\nMicrosoft Excel", + "page_start": 15, + "page_end": 15, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Try This Yourself:\nn\nBefore starting this exercise you MUST open the file E1317 Charting_1.xlsx…\n Click in cell A3 , hold down , then click in cell G7 to select the range A3:G7\n Click on the INSERT tab, then click on\nRecommended Charts in the Charts group\nThe Insert Chart dialog box will display with a number of recommended chart options…\n Click on each of the alternatives in the left pane to see a preview of how the chart will appear in the right pane and spend a few moments reading the descriptions\n Click on Line chart (the second alternative in the left pane), then click on [OK] to embed the chart in the worksheet\n Point to the top border of the chart, then click and drag the chart immediately below the data\n Click in cell A1\nto deselect the chart\nYou can also use the Quick Analysis tool that appears at the bottom right corner of a selected range to create a quick chart. However, this method will not allow you to preview a wide variety of charts.", + "page_start": 45, + "page_end": 45, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Try This Yourself:\nO pe n File Before starting this exercise you MUST open the file E705 Ranges_1.xlsx...\n Click on cell B7 to select it\nBecause it is the only cell selected it is the active cell…\n Hold down the key and click in cell E10\nEven though a range has been selected, the active cell is B7 - it appears in a different colour and its contents appear in the formula bar. You can keep the range selected and change the active cell within the range using the keyboard…\n Press several times and watch the various cells become active through the selection\n Click in cell B7 , hold down the mouse button, and drag down to cell C10 before releasing the mouse\nThe previous selection has disappeared and the range B7 to C10 is now selected…\nPress\nand\nto\n\ndeselect the selected cells and return the cell pointer to cell A1", + "page_start": 16, + "page_end": 16, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Try This Yourself:\nn\nBefore starting this exercise you MUST open the file E1324 Worksheet Techniques_1.xlsx…\n Examine the workbook - it currently contains one worksheet named Sheet1\n Click on the New Sheet icon at the end of the worksheet tabs\nA new worksheet named Sheet2 will be inserted. You can also use the keyboard shortcut...\n Press + to insert another new worksheet\nThis sheet is named Sheet3 and is inserted before the currently selected sheet. Now let's delete a sheet...\n Right-click on the Sheet3 worksheet tab to display the shortcut menu\n Select Delete to remove the worksheet\nAs the worksheet contains no data, the sheet will be deleted immediately. If a worksheet contains data, Excel will ask you to confirm your actions...\n Repeat steps 4 and 5 to delete Sheet2", + "page_start": 9, + "page_end": 9, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Handy to Know…\n To insert a worksheet between existing worksheets, right-click on the worksheet tab before which you want to insert a new sheet, then click on Insert to display the Insert dialog box. Select Worksheet and click on [OK] .\n1\n2\n3\n4\n5\nMicrosoft Excel", + "page_start": 9, + "page_end": 9, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Handy to Know…\n To apply the same colour to two or more sheets at once, select them first. Hold down to select consecutive worksheets or hold down to select non-consecutive worksheets.\nMicrosoft Excel", + "page_start": 13, + "page_end": 13, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Try This Yourself:\nSa m e File file with this exercise, or open the file E705 Ranges_1.xlsx...\nContinue using the previous\n Press + to make cell A1 the active cell\n Move the mouse pointer to the column heading for column B\nNotice that the mouse pointer changes to a black arrow pointing down the column…\n Click once to select the column\nThis time the row headers\nchange to orange to indicate that at least one cell (but not all) in each row is selected…\n Click in cell D6 and press\n+\nThis key combination also selects an entire column…\n Click on the column header for column B to select it\n Hold down and click on the column header for column D\nThis time, columns B, C, and D are all selected…\n Click in the column header for column A , then hold down the left mouse button and drag the mouse pointer across the column headings to column E", + "page_start": 18, + "page_end": 18, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Try This Yourself:\nContinue using the previous file with this exercise, or open the file E1324 Worksheet Techniques_1.xlsx...\n Right-click on Sheet1 to display the worksheet shortcut menu\n Select Move or Copy to display the Move or Copy dialog box\n Click on Create a copy so it appears ticked, then click on [OK]\nThe new worksheet is named Sheet1 (2). Let's create a 'template' from this worksheet by deleting unwanted data...\n Select the range B7:E9 , then press to clear it\n Repeat step 4 to clear the ranges B14:E23 , G7:J9 and G14:J23 , then press + to return to cell A1\nNow we can copy this 'template' to create additional worksheets...\n Repeat steps 1 to 3 three times to create three copies of the template worksheet - this time without data\nThe final worksheet should be named Sheet1 (5)", + "page_start": 10, + "page_end": 10, + "source_file": "Excel Training Manual 1.pdf" + } + ] + }, + { + "references": { + "source_file": "office-pdf.pdf", + "query": "What is the msodocexStructTypeArticle type value ?", + "target_page": 21, + "target_passage": "A group of nodes forming a single flow of text that should be read or searched as a contiguous block of content. Some documents have a single article and others have multiple articles.", + "chunk_present": { + "presence": true, + "index": 3 + } + }, + "top_chunk": [ + { + "text": "DocExComment_BeginStructNode\nmsodocexStructTypeParaRTLAttr, Description = A block of text within an article with right-to-left layout.. msodocexStructTypeTableRTLAttr, Description = A block of text forming a table with right-to-left layout.. msodocexStructTypeHeadingRTLAttr, Description = A heading in the text with right-to-left layout.. msodocexStructTypeListItemRTLAttr, Description = A block of text forming a list item with right-to-left layout.. msodocexStructTypeParaUnannotatableAttr, Description = A block of text within an article that is not annotatable.. msodocexStructTypeTHead, Description = The header row area in a table.. msodocexStructTypeTBody, Description = The body area in a table, i.e. the portion between the THead and TFoot.. msodocexStructTypeLabel, Description = A label.. msodocexStructTypeEquation, Description = An equation.. msodocexStructTypeIntLinkNoteRef, Description = A footnote or endnote reference mark link.. msodocexStructTypeTFoot, Description = The footer row area in a table.\nfContentNode Specifies whether a DocExComment_EndStructNode structure marks the end of this structure node. If fContentNode is true , a\nDocExComment_EndStructNode structure closes off the content bounded by the node. If this fContentNode has a false value, then the node does not bound any content.", + "page_start": 22, + "page_end": 22, + "source_file": "office-pdf.pdf" + }, + { + "text": "HrBeginStructNode\niHeadingLevel is the heading level for an msodocexStructTypeHeading.\nidPara is the paragraph id for a P, TOCI, or ListBody.\nidDropCap is the id of an msodocexStructTypeDropCap.\niPage is the page number for an msodocexStructTypePage.\nbt is the line break type for an msodocexStructTypeTextLine.\niListLevel is the list level for an msodocexStructTypeList or msodocexStructTypeListItem.\nlistType is the list type for an msodocexStructTypeListItem.\nidAtn is the id of an msodocexStructTypeAnnotationBegin or msodocexStructTypeAnnotationEnd.\ncpLim is used to determine the nesting order of tables within tables for an msodocexStructTypeTable, msodocexStructTypeTOC, or msodocexStructTypeListBody.\nshapeProperty is for a msodocexStructTypeFigure where the content is a shape, text box, or table cell and contains bit fields from the MSODOCEXSHAPEPROPERTY enumeration.\ntableAttr is the table cell attributes for a msodocexStructTypeTH or msodocexStructTypeTD.\nidTableHeader is the unique id for an msodocexStructTypeTH or msodocexStructTypeTD.\niTargetParentId is the id of the node to reparent an msodocexStructTypeDiagram to.\nTable 3. Enumerated values of MSODOCEXLINEBREAKTYPE\nノ Expand table\nTable 4. Enumerated values of MSODOCEXLISTTYPE", + "page_start": 8, + "page_end": 9, + "source_file": "office-pdf.pdf" + }, + { + "text": "DocExComment_BeginStructNode\nmsodocexStructTypeTOC, Description = A table of contents.. msodocexStructTypeTOCI, Description = An item in a table of contents.. msodocexStructTypeExtLink, Description = A link to an external resource.. msodocexStructTypeIntLink, Description = A link to an internal resource.. msodocexStructTypeFootnote, Description = A footnote.. msodocexStructTypeEndnote, Description = An endnote.. msodocexStructTypeTextbox, Description = A text box.. msodocexStructTypeHeader, Description = A block of text forming a header.. msodocexStructTypeFooter, Description = A footer.. msodocexStructInlineShape, Description = An inline shape.. msodocexStructAnnotation, Description = An annotation.. msodocexStructTypeSpanBlock, Description = A block of text.. msodocexStructTypeWorkbook, Description = A workbook.. msodocexStructTypeWorksheet, Description = A worksheet.. msodocexStructTypeMacrosheet, Description = A macrosheet.. msodocexStructTypeDialogsheet, Description = A dialogsheet.. msodocexStructTypeSlide, Description = A slide.. msodocexStructTypeChart, Description = A chart.. msodocexStructTypeDiagram, Description = A SmartArt diagram.. msodocexStructTypeBulletText, Description = Buller text.. msodocexStructTypeTextLine, Description = A line of text.. msodocexStructTypeDropCap, Description = A drop cap.. msodocexStructTypeSection, Description = A section.. msodocexStructTypeAnnotationBegin, Description = The beginning of an annotation.. msodocexStructTypeAnnotationEnd, Description = The end of an annotation.", + "page_start": 21, + "page_end": 21, + "source_file": "office-pdf.pdf" + }, + { + "text": "DocExComment_BeginStructNode\nmsodocexStructTypePara, Description = A block of text within an article. Its parent node must be an article.. msodocexStructTypeFigure, Description = A graphical element (for example, an image or collection of shapes) that has a textual representation. The textual representation is the alternate text used for reading or searching the document.. msodocexStructTypeArticle, Description = A group of nodes forming a single flow of text that should be read or searched as a contiguous block of content. Some documents have a single article and others have multiple articles.. msodocexStructTypeHeading, Description = A heading in the text.. msodocexStructTypeTable, Description = A block of text forming a table.. msodocexStructTypeTR, Description = A block of text forming a single row of a table.. msodocexStructTypeTD, Description = A block of text forming a single cell in a table row.. msodocexStructTypeTH, Description = A block of text forming a single header cell in a table row.. msodocexStructTypeList, Description = A block of text forming a list.. msodocexStructTypeListItem, Description = A block of text forming a list item.. msodocexStructTypeListBody, Description = A block of text forming the body of a list item.. msodocexStructTypeDocument, Description = A document.. msodocexStructTypePage, Description = A page in the document.", + "page_start": 20, + "page_end": 20, + "source_file": "office-pdf.pdf" + }, + { + "text": "HrAddDocumentMetadataDate\nPublisher calls the HrAddDocumentMetadataDate method to specify document metadata in the form of a FILETIME structure.\nC++ HRESULT HrAddDocumentMetadataDate( MSODOCEXMETADATA metadataType, const FILETIME* pftLocalTime );\nThe metadatatype parameter specifies the type of metadata represented by the FILETIME structure. The metadatatype parameter must be one of the following values from the MSODOCEXMETADATA enumeration type.\nノ\nExpand table\nTable 9. Enumerated values of MSODOCEXMETADATA", + "page_start": 34, + "page_end": 35, + "source_file": "office-pdf.pdf" + }, + { + "text": "HrBeginStructNode\ntypedef struct _MsoDocexStructNode { int idNode; MSODOCEXSTRUCTTYPE nodetype; WCHAR* pwchAltText; union { int iHeadingLevel; ULONG idPara; ULONG idDropCap; int iPage; WCHAR* pwchActualText; MSODOCEXLINEBREAKTYPE bt; int iListLevel; MSODOCEXLISTTYPE listType; ULONG idAtn; long cpLim; int shapeProperty; MsoDocexTableAttr tableAttr; WCHAR* idTableHeader; int iTargetParentId; }; } MSODOCEXSTRUCTNODE;\nThe idNode member specifies the ID of the node being passed in the call to HrBeginStructNode . This member may not have a value of 0 . A value of -1 indicates that child nodes do not use the idNodeParent parameter to specify this node as their parent. Instead, this node can be a parent only by enclosing child nodes in the EMF. Multiple nodes can have an ID of -1 . If the ID is not -1 , the value is unique across the document.\nThe embedded union at the end of the MSODOCEXSTRUCTNODE is interpreted differently depending on the type of node:", + "page_start": 8, + "page_end": 8, + "source_file": "office-pdf.pdf" + }, + { + "text": "DocExComment_BeginStructNode\nA value of -1 indicates that the sibling order is the same order in which the nodes appear in the EMF comments. Note that the order in which the content appears in the EMF is not necessarily the order in which the content is consumed by a user of the document.\ndesn Specifies a MSODOCEXSTRUCTTYPE structure, which is defined earlier in the document.\nThe idNode member specifies the ID of the node. This member may not have a value of 0 . A value of -1 indicates that child nodes do not use the idNodeParent member to specify this node as their parent. Instead, this node can be a parent only by enclosing child nodes in the EMF. Multiple nodes can have a ID of -1 . If the ID is not -1 , the value is unique across the document.\nThe nodetype specifies the type of structure node. This member is equal to one of the values from the MSODOCEXSTRUCTTYPE enumeration type. The following table lists examples of document structure node types.\nTable 7. Document structure node types\nExpand table", + "page_start": 19, + "page_end": 20, + "source_file": "office-pdf.pdf" + }, + { + "text": "ノ Expand table\nmsodocexcommentExternalHyperlink, Structure Type = DocExComment_ExternalHyperlink. msodocexcommentExternalHyperlinkRctfv, Structure Type = DocExComment_ExternalHyperlink. msodocexcommentInternalHyperlink, Structure Type = DocExComment_InternalHyperlink. msodocexcommentInternalHyperlinkRctfv, Structure Type = DocExComment_InternalHyperlink. msodocexcommentColorInfo, Structure Type = DocExComment_ColorInfo. msodocexcommentColorMapEnable, Structure Type = DocExComment_ColorEnable. msodocexcommentBeginTextRun, Structure Type = DocExComment_BeginTextRun. msodocexcommentBeginTextRunRTL, Structure Type = DocExComment_BeginTextRun. msodocexcommentEndTextRun, Structure Type = DocExComment_EndTextRun. msodocexcommentBeginStructNode, Structure Type = DocExComment_BeginStructNode. msodocexcommentEndStructNode, Structure Type = DocExComment_EndStructNode. msodocexcommentUnicodeForNextTextOut, Structure Type = DocExComment_UnicodeForNextTextOut. msodocexcommentUnicodeForNextTextOutRTL, Structure Type = DocExComment_UnicodeForNextTextOut. msodocexcommentEPSColor, Structure Type = DocExComment_EPSColor. msodocexcommentEPSCMYKJPEG, Structure Type = DocExComment_EPSColorCMYKJPEG. msodocexcommentEPSSpotImage, Structure Type = DocExComment_EPSColorSpotImage. msodocexcommentEPSStart, Structure Type = DocExComment_EPSStart. msodocexcommentPageName, Structure Type = DocExComment_PageName. msodocexcommentTransparent, Structure Type = DocExComment_Transparent", + "page_start": 14, + "page_end": 14, + "source_file": "office-pdf.pdf" + }, + { + "text": "MsoDocexTableAttr\nThe MsoDocexTableAttr structure fits in 32 bits and includes the row and column span and header scope information for a table cell.\nC++ struct MsoDocexTableAttr { static constexpr unsigned int MaxSpanBits = sizeof(unsigned int) * 8 / 2 - 1; static constexpr unsigned int MaxSpanValue = (1u << MaxSpanBits) - 1; unsigned int rowSpan : MaxSpanBits; unsigned int fRowScope : 1; unsigned int colSpan : MaxSpanBits; unsigned int fColScope : 1; };\nThe members of MsoDocexTableAttr structure are as follows:\nMaxSpanBits Specifies the number of bits available for the rowSpan and colSpan values, which is 15.\nMaxSpanValue Specifies the maximum value that can be specified for the rowSpan and colSpan.\nrowSpan Specifies the number of rows that a table cell spans.\nfRowScope Specifies whether the header is Row/Both or Column.\ncolSpan Specifies the number of columns that a table cell spans.\nfColScope Specifies whether the header is Column/Both or Row.\nFor table structure nodes, the union is interpreted as an ordering of the table ends relative to other tables by using cpLim , which can be used to determine the nesting order of tables within tables.\nIn the context of the DocExComment_BeginStructNode , the add-in can ignore the pwchActualText member of this union.\nThe pwchAltText member specifies alternate text for the structure node.\nThe fNoEndNode parameter to HrBeginStructNode specifies whether Publisher calls the HrEndStructNode method to mark the end of the structure node. If fNoEndNode is false, then Publisher calls HrEndStructNode to close off the content bounded by the node. If this parameter has a true value, then the node does not bound any content.", + "page_start": 10, + "page_end": 11, + "source_file": "office-pdf.pdf" + }, + { + "text": "HrAddDocumentMetadataString\nPublisher calls the HrAddDocumentMetadataString method to specify document metadata in the form of a Unicode string.\nC++ HRESULT HrAddDocumentMetadataString( MSODOCEXMETADATA metadataType, const WCHAR* pwchValue );\nThe metadatatype parameter specifies the type of metadata represented by the string. The metadatatype parameter must be one of the following values from the MSODOCEXMETADATA enumeration type.\nTable 8. Enumerated values of MSODOCEXMETADATA\nExpand table\nmsodocexMetadataTitle, Description = The title of the document.. msodocexMetadataAuthor, Description = The author of the document. msodocexMetadataSubject, Description = String that describes the subject matter of the document (for example, business or science).. msodocexMetadataKeywords, Description = Keyword relevant to the document content.. msodocexMetadataCreator, Description = The creator of the document, possibly distinct from the author.. msodocexMetadataProducer, Description = The producer of the document, possibly distinct from the author or creator.. msodocexMetadataCategory, Description = String that describes the type of document (for example, memo, article, or book).. msodocexMetadataStatus, Description = Status of the document. This field can reflect where the document is in the publication process (for example, draft or final).. msodocexMetadataComments, Description = Miscellaneous comments relevant to the document.\nFor a given document, each metadata type can have only one string associated with it. So, for example, if the document has multiple keywords, they are passed to the add-in as one concatenated string.\nThe pwchValue parameter specifies a Unicode string that contains the metadata itself.\nHow the add-in incorporates the text-string metadata into the exported document depends on the implementation details of the export code and the type of fixed-format used in the exported document.", + "page_start": 33, + "page_end": 34, + "source_file": "office-pdf.pdf" + } + ] + }, + { + "references": { + "source_file": "office-pdf.pdf", + "query": "What are vector colors ?", + "target_page": 29, + "target_passage": "Vector colors are any COLORREF values that the add-in receives from Publisher.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Vector Color and Recolored Images\nVector colors are any COLORREF values that the add-in receives from Publisher. For example, text color, line stroke color, and color for metafile recolor. When color mapping is enabled, Publisher uses a color ID for COLORREF rather than a real RGB color value. If Publisher provides the add-in an IMsoDocExporterSite interface pointer by calling the SetDocExporterSite method of the IMsoDocExporter interface, the add-in should always call the IMsoDocExporterSite::HrResolveColor method to convert the COLORREF to an extended color, which the add-in receives through the methods in the IDOCEXCOLOR interface.\nTo support vector color mapping, the add-in needs to do the following:\nImplement class support for an IDOCEXCOLOR interface. The methods in this interface enable Publisher to pass extended color back to the add-in.\nCache the following color state values from the semantic records in the EMF.\nSet foreground color for recoloring. This is set through the DocExComment_ColorInfo structure.\nSet background color for recoloring. This is set through the DocExComment_ColorInfo structure.\nDetermine when color mapping is enabled. This is set through the DocExComment_ColorEnable structure.\nFor a vector color, create an IDOCEXCOLOR interface with the color ID, so that IDOCEXCOLOR::GetUnresolvedRGB returns the color ID. The add-in should call the IMsoDocExporterSite::HrResolveColor method with the IDOCEXCOLOR interface and cached color states. Publisher calls the IDOCEXCOLOR interface methods with the final color, which can be RGB, CMYK, spot, or registration tint.\nWhen either foreground color or background color for recoloring is specified from an EMF semantic record, the add-in should recolor images in the add-in (for example, metafiles or raster pictures).", + "page_start": 28, + "page_end": 29, + "source_file": "office-pdf.pdf" + }, + { + "text": "Extended Color Support\nTo support extended color spaces in Publisher, additional EMF semantic records and interfaces are needed because EMF only supports RGB (red-green-black) colors. Extended color spaces include CMYK (cyan-magenta-yellow-black) and spot color space, which are commonly used in commercial printing.\nPublisher uses color mapping to represent extended colors in the document EMF. Publisher builds a color table for all colors used in the document and replaces actual colors with color IDs in the EMF. The type for the color ID is COLORREF , which is the\nsame type that is used for RGB color. For information about the COLORREF structure, see COLORREF.\nTo resolve color IDs in the EMF back to the extend color space, the add-in calls back to Publisher through the HrResolveColor method of the IMsoDocExporterSite interface. The add-in passes Publisher an interface pointer to an IDOCEXCOLOR interface as one of the parameters to HrResolveColor . Publisher takes the color IDs, also specified in the call to HrResolveColor , converts them to extended color (RGB, CMYK, or spot color), and passes them back to the add-in through the methods in the IDOCEXCOLOR interface.", + "page_start": 27, + "page_end": 28, + "source_file": "office-pdf.pdf" + }, + { + "text": "Non-Recolored Images\nEMF supports CMYK images using GDI+. Therefore, images in the EMF may be either RGB or CMYK. If the image is a CMYK image, the add-in needs to convert the image to the target color space.\nPublisher maintains a target color space for the document. The add-in can use this target color space by calling the IMsoDocExporterSite::HrConvertImageColorSpace method with the image's color space.", + "page_start": 29, + "page_end": 29, + "source_file": "office-pdf.pdf" + }, + { + "text": "Color from EPS Files\nEncapsulated Postscript (EPS) is a metafile type that supports extended color spaces. User who embed EPS images in a Publisher document expect the color information to be used in the fixed-format output. Inside Publisher, the EPS is converted to an EMF with EPS-related semantic records. This EMF is then embedded in the page EMF file that the application passes to the add-in.\nTo support color in EPS files, the add-in needs to do the following:\nCall the IMsoDocExporterSite::SetEPSInfo method for DocExComment_EPSColor records encountered in the EMF.\nExtract the CMYK image from the DocExComment_EPSColorCMYKJPEG record in the EMF. This record contains a binary object that is the actual CMYK JPEG file stream. Use it to replace the RGB image specified in the subsequent call to the StretchDIBits function.\nThe DocExComment_EPSColorSpotImage record provides spot color information for the subsequent RGB image, which is always an index image. The add-in needs to convert the spot image to the target color space.\nThe add-in can optionally call the IMsoDocExporterSite:: HrGetSpotRecolorInfo method to obtain the document's target color from Publisher. Then the add-in can recolor the subsequent RGB image by mapping colors from the palette of the RGB image to flTintMin and flTintMax tints specified in the\nDoxExComment_EPSColorSpotImage palette is used for the mapping.\nrecord. The luminosity for each color of the\nNote that the DocExComment_EPSStart record is only informational. The add-in can ignore this record.", + "page_start": 29, + "page_end": 30, + "source_file": "office-pdf.pdf" + }, + { + "text": "DocExComment_EPSColorSpotImage\nThe DocExComment_EPSColorSpotImage structure provides spot color information for the subsequent RGB image. For more information about this structure, see the section Extended Color Support.\nC++ typedef struct { DWORD ident {}; DWORD iComment {}; COLORREF cmykAlt { 0 }; COLORREF rgbAlt { 0 }; float flTintMin {}; float flTintMax {}; char szSpotName[1]; } DocExComment_EPSColorSpotImage;\nThe members of the DocExComment_EPSColorSpotImage structure are as follows:\nident Specifies the constant value, msodocexsignature, which identifies this EMF comment as containing semantic information.\niComment Specifies the MSODOCEXCOMMENT value, msodocexcommentEPSSpotImage.\ncmykAlt Specifies a CMYK color ID.\nrgbAlt Specifies an RGB color ID.\nflTintMin Specifies the minimum tint.\nflTintMax Specifies the maximum tint.\nszSpotName[1] Specifies a variable length, zero-terminated string that contains the spot name.", + "page_start": 27, + "page_end": 27, + "source_file": "office-pdf.pdf" + }, + { + "text": "DocExComment_EPSColor\nThe DocExComment_EPSColor structure specifies color information for an encapsulated PostScript (EPS) file embedded in the EMF. For more information about this structure,\nsee the section Extended Color Support.\nC++ typedef struct { DWORD ident {}; DWORD iComment {}; BYTE colorInfo[]; } DocExComment_EPSColor;\nThe members of the DocExComment_EPSColor structure are as follows:\nident Specifies the constant value, msodocexsignature, which identifies this EMF comment as containing semantic information.\niComment Specifies the MSODOCEXCOMMENT value, msodocexcommentEPSColor.\ncolorInfo[] Specifies the color information for the EPS file. The add-in should pass this information to Publisher using the IMsoDocExporterSite::SetEPSInfo method.", + "page_start": 25, + "page_end": 26, + "source_file": "office-pdf.pdf" + }, + { + "text": "IV. DISCUSSION AND CONCLUSION\nFIG. 8: (color online) Q z , position of the maximum of S ( /vector q ), vs. temperature for thickness n = 8. Inset: magnetic vector ( m x l , m y l ) profile for some temperatures for L = 64. Colors and symbols as in Fig. 2.\nFIG. 9: ∆ ϕ l for a BCT lattice and n = 12, when the six coupling constants set employed in Ref. 14,15 (see text) is used. The temperature range has been chosen around T C ( n ) (error bars lye within point size).\ngled out, with the high-temperature, paramagnetic phase separated from the low-temperature, long-range ordered one, by an intermediate-temperature block phase where outer ordered 4-layers blocks coexist with some inner disordered ones. Moreover, it was observed that the phase transition of such inner layers turns out to have the signatures of a Kosterlitz-Thouless one.\nThe absence of the block phase in the J 1 -J 2 model here investigated has to be attributed to the different range of interactions, rather than to the different lattice structure. We came to this conclusion by doing some simulations using the same set of interaction constants employed in Refs. 14,15, but using a BCT lattice: the results we obtained for ∆ ϕ l with n = 12 are reported in Fig. 9. The latter is absolutely similar to Fig.7 of Ref. 15 and clearly displays the footmarks of the block phase (see down-triangle), with two external blocks of ordered layers ( l =1.. . 5 and 8. . . 12 ), where ∆ ϕ l is roughly 10 · , separated by a block of disordered layers, and with almost\nFIG. 10: (colors online) Equilibrium probability distribution of the energy for the thickness n = 8 for some temperatures around T N (8), (a) , and T C (8), (b) , respectively.\nopposite magnetization. We can thus confidently assert that, regardless of the underlying lattice structure, by decreasing the number of the out-of-plane interactions, for thicknesses close to the helical bulk pitch, the block", + "page_start": 5, + "page_end": 6, + "source_file": "1001.0510.pdf" + }, + { + "text": "DocExComment_ColorInfo\nThe DocExComment_ColorInfo structure specifies color-state information for the EMF. For more information about this structure, see the section Extended Color Support.\nC++ struct DocExComment_ColorInfo { DWORD ident {}; DWORD iComment {}; COLORREF clr { 0 }; BOOL fForeColor {}; };\nThe members of the DocExComment_ColorInfo structure are as follows:\nident Specifies the constant value, msodocexsignature, which identifies this EMF comment as containing semantic information.\niComment Specifies the MSODOCEXCOMMENT value, msodocexcommentColorInfo.\nclr Specifies a color ID that represents a current color state in the EMF.\nfForeColor Specifies whether the color ID in the clr member represents a foreground color or a background color. If this member has a value of true , the\ncolor ID represents a foreground color. If this member has a value of false , the color ID represents a background color.", + "page_start": 17, + "page_end": 18, + "source_file": "office-pdf.pdf" + }, + { + "text": "Host interface cards\nTable 13-1 Fibre Channel link LED statuses\nLink status, Color = Green. Link status, Meaning = Link is up, connection established.. Speed, Color = Amber. Speed, Meaning = Link is not up or speed fault.", + "page_start": 696, + "page_end": 696, + "source_file": "sg247938.pdf" + }, + { + "text": "Ethernet and LED status\nTable 13-2 Ethernet LED statuses\nLink state, Color = Green. Link state, Meaning = It is on when there is an Ethernet link.. Activity, Color = Amber. Activity, Meaning = It is flashing when there is activity on the link.", + "page_start": 697, + "page_end": 697, + "source_file": "sg247938.pdf" + } + ] + }, + { + "references": { + "source_file": "office-pdf.pdf", + "query": "What are msodocexMetadataComments ?", + "target_page": 35, + "target_passage": "Miscellaneous comments relevant to the document.", + "chunk_present": { + "presence": true, + "index": 3 + } + }, + "top_chunk": [ + { + "text": "HrAddDocumentMetadataDate\nTable 9. Enumerated values of MSODOCEXMETADATA\nmsodocexMetadataCreationDate, Description = The creation date for the document.. msodocexMetadataModDate, Description = The last-modified date for the document.", + "page_start": 35, + "page_end": 35, + "source_file": "office-pdf.pdf" + }, + { + "text": "ノ Expand table\nmsodocexcommentExternalHyperlink, Structure Type = DocExComment_ExternalHyperlink. msodocexcommentExternalHyperlinkRctfv, Structure Type = DocExComment_ExternalHyperlink. msodocexcommentInternalHyperlink, Structure Type = DocExComment_InternalHyperlink. msodocexcommentInternalHyperlinkRctfv, Structure Type = DocExComment_InternalHyperlink. msodocexcommentColorInfo, Structure Type = DocExComment_ColorInfo. msodocexcommentColorMapEnable, Structure Type = DocExComment_ColorEnable. msodocexcommentBeginTextRun, Structure Type = DocExComment_BeginTextRun. msodocexcommentBeginTextRunRTL, Structure Type = DocExComment_BeginTextRun. msodocexcommentEndTextRun, Structure Type = DocExComment_EndTextRun. msodocexcommentBeginStructNode, Structure Type = DocExComment_BeginStructNode. msodocexcommentEndStructNode, Structure Type = DocExComment_EndStructNode. msodocexcommentUnicodeForNextTextOut, Structure Type = DocExComment_UnicodeForNextTextOut. msodocexcommentUnicodeForNextTextOutRTL, Structure Type = DocExComment_UnicodeForNextTextOut. msodocexcommentEPSColor, Structure Type = DocExComment_EPSColor. msodocexcommentEPSCMYKJPEG, Structure Type = DocExComment_EPSColorCMYKJPEG. msodocexcommentEPSSpotImage, Structure Type = DocExComment_EPSColorSpotImage. msodocexcommentEPSStart, Structure Type = DocExComment_EPSStart. msodocexcommentPageName, Structure Type = DocExComment_PageName. msodocexcommentTransparent, Structure Type = DocExComment_Transparent", + "page_start": 14, + "page_end": 14, + "source_file": "office-pdf.pdf" + }, + { + "text": "HrAddDocumentMetadataDate\nPublisher calls the HrAddDocumentMetadataDate method to specify document metadata in the form of a FILETIME structure.\nC++ HRESULT HrAddDocumentMetadataDate( MSODOCEXMETADATA metadataType, const FILETIME* pftLocalTime );\nThe metadatatype parameter specifies the type of metadata represented by the FILETIME structure. The metadatatype parameter must be one of the following values from the MSODOCEXMETADATA enumeration type.\nノ\nExpand table\nTable 9. Enumerated values of MSODOCEXMETADATA", + "page_start": 34, + "page_end": 35, + "source_file": "office-pdf.pdf" + }, + { + "text": "HrAddDocumentMetadataString\nPublisher calls the HrAddDocumentMetadataString method to specify document metadata in the form of a Unicode string.\nC++ HRESULT HrAddDocumentMetadataString( MSODOCEXMETADATA metadataType, const WCHAR* pwchValue );\nThe metadatatype parameter specifies the type of metadata represented by the string. The metadatatype parameter must be one of the following values from the MSODOCEXMETADATA enumeration type.\nTable 8. Enumerated values of MSODOCEXMETADATA\nExpand table\nmsodocexMetadataTitle, Description = The title of the document.. msodocexMetadataAuthor, Description = The author of the document. msodocexMetadataSubject, Description = String that describes the subject matter of the document (for example, business or science).. msodocexMetadataKeywords, Description = Keyword relevant to the document content.. msodocexMetadataCreator, Description = The creator of the document, possibly distinct from the author.. msodocexMetadataProducer, Description = The producer of the document, possibly distinct from the author or creator.. msodocexMetadataCategory, Description = String that describes the type of document (for example, memo, article, or book).. msodocexMetadataStatus, Description = Status of the document. This field can reflect where the document is in the publication process (for example, draft or final).. msodocexMetadataComments, Description = Miscellaneous comments relevant to the document.\nFor a given document, each metadata type can have only one string associated with it. So, for example, if the document has multiple keywords, they are passed to the add-in as one concatenated string.\nThe pwchValue parameter specifies a Unicode string that contains the metadata itself.\nHow the add-in incorporates the text-string metadata into the exported document depends on the implementation details of the export code and the type of fixed-format used in the exported document.", + "page_start": 33, + "page_end": 34, + "source_file": "office-pdf.pdf" + }, + { + "text": "DocExComment_BeginStructNode\nmsodocexStructTypeTOC, Description = A table of contents.. msodocexStructTypeTOCI, Description = An item in a table of contents.. msodocexStructTypeExtLink, Description = A link to an external resource.. msodocexStructTypeIntLink, Description = A link to an internal resource.. msodocexStructTypeFootnote, Description = A footnote.. msodocexStructTypeEndnote, Description = An endnote.. msodocexStructTypeTextbox, Description = A text box.. msodocexStructTypeHeader, Description = A block of text forming a header.. msodocexStructTypeFooter, Description = A footer.. msodocexStructInlineShape, Description = An inline shape.. msodocexStructAnnotation, Description = An annotation.. msodocexStructTypeSpanBlock, Description = A block of text.. msodocexStructTypeWorkbook, Description = A workbook.. msodocexStructTypeWorksheet, Description = A worksheet.. msodocexStructTypeMacrosheet, Description = A macrosheet.. msodocexStructTypeDialogsheet, Description = A dialogsheet.. msodocexStructTypeSlide, Description = A slide.. msodocexStructTypeChart, Description = A chart.. msodocexStructTypeDiagram, Description = A SmartArt diagram.. msodocexStructTypeBulletText, Description = Buller text.. msodocexStructTypeTextLine, Description = A line of text.. msodocexStructTypeDropCap, Description = A drop cap.. msodocexStructTypeSection, Description = A section.. msodocexStructTypeAnnotationBegin, Description = The beginning of an annotation.. msodocexStructTypeAnnotationEnd, Description = The end of an annotation.", + "page_start": 21, + "page_end": 21, + "source_file": "office-pdf.pdf" + }, + { + "text": "DocExComment_BeginStructNode\nmsodocexStructTypeParaRTLAttr, Description = A block of text within an article with right-to-left layout.. msodocexStructTypeTableRTLAttr, Description = A block of text forming a table with right-to-left layout.. msodocexStructTypeHeadingRTLAttr, Description = A heading in the text with right-to-left layout.. msodocexStructTypeListItemRTLAttr, Description = A block of text forming a list item with right-to-left layout.. msodocexStructTypeParaUnannotatableAttr, Description = A block of text within an article that is not annotatable.. msodocexStructTypeTHead, Description = The header row area in a table.. msodocexStructTypeTBody, Description = The body area in a table, i.e. the portion between the THead and TFoot.. msodocexStructTypeLabel, Description = A label.. msodocexStructTypeEquation, Description = An equation.. msodocexStructTypeIntLinkNoteRef, Description = A footnote or endnote reference mark link.. msodocexStructTypeTFoot, Description = The footer row area in a table.\nfContentNode Specifies whether a DocExComment_EndStructNode structure marks the end of this structure node. If fContentNode is true , a\nDocExComment_EndStructNode structure closes off the content bounded by the node. If this fContentNode has a false value, then the node does not bound any content.", + "page_start": 22, + "page_end": 22, + "source_file": "office-pdf.pdf" + }, + { + "text": "HrBeginStructNode\nTable 4. Enumerated values of MSODOCEXLISTTYPE\nmsodocexLineBreakTypeNormal, Description = Normal line break.. msodocexLineBreakTypeManual, Description = Manual line break.. msodocexLineBreakTypeEOP, Description = End of paragraph.", + "page_start": 9, + "page_end": 9, + "source_file": "office-pdf.pdf" + }, + { + "text": "DocExComment_BeginStructNode\nmsodocexStructTypePara, Description = A block of text within an article. Its parent node must be an article.. msodocexStructTypeFigure, Description = A graphical element (for example, an image or collection of shapes) that has a textual representation. The textual representation is the alternate text used for reading or searching the document.. msodocexStructTypeArticle, Description = A group of nodes forming a single flow of text that should be read or searched as a contiguous block of content. Some documents have a single article and others have multiple articles.. msodocexStructTypeHeading, Description = A heading in the text.. msodocexStructTypeTable, Description = A block of text forming a table.. msodocexStructTypeTR, Description = A block of text forming a single row of a table.. msodocexStructTypeTD, Description = A block of text forming a single cell in a table row.. msodocexStructTypeTH, Description = A block of text forming a single header cell in a table row.. msodocexStructTypeList, Description = A block of text forming a list.. msodocexStructTypeListItem, Description = A block of text forming a list item.. msodocexStructTypeListBody, Description = A block of text forming the body of a list item.. msodocexStructTypeDocument, Description = A document.. msodocexStructTypePage, Description = A page in the document.", + "page_start": 20, + "page_end": 20, + "source_file": "office-pdf.pdf" + }, + { + "text": "ノ Expand table\nTable 5. Enumerated values of MSODOCEXSHAPEPROPERTY bit fields", + "page_start": 9, + "page_end": 9, + "source_file": "office-pdf.pdf" + }, + { + "text": "ノ Expand table\nTable 5. Enumerated values of MSODOCEXSHAPEPROPERTY bit fields\nmsodocexListTypeNone, Description = No bullets or numbering.. msodocexListTypeBulletDisc, Description = Disc-shaped bullets.. msodocexListTypeBulletCircle, Description = Circle-shaped bullets.. msodocexListTypeBulletSquare, Description = Square-shaped bullets.. msodocexListTypeBulletDecimal, Description = Decimal numbering.. msodocexListTypeUpperRoman, Description = Uppercase Roman numeral numbering.. msodocexListTypeLowerRoman, Description = Lowercase Roman numberal numbering.. msodocexListTypeUpperAlpha, Description = Uppercase alphabetic numbering.. msodocexListTypeLowerAlpha, Description = Lowercase alphabetic numbering.", + "page_start": 9, + "page_end": 9, + "source_file": "office-pdf.pdf" + } + ] + }, + { + "references": { + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf", + "query": "What are the total operating expenses of Wikimedia foundation in 2024 ?", + "target_page": 6, + "target_passage": "178,471,109", + "chunk_present": { + "presence": true, + "index": 7 + } + }, + "top_chunk": [ + { + "text": "WIKIMEDIA FOUNDATION, INC.\nNotes to Consolidated Financial Statements June 30, 2024 and 2023", + "page_start": 7, + "page_end": 7, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "WIKIMEDIA FOUNDATION, INC.\nNet assets without donor restrictions:, 2024 = . Net assets without donor restrictions:, 2023 = . Support and revenue:, 2024 = . Support and revenue:, 2023 = . Contributions of cash and other financial assets, 2024 = $ 168,212,977. Contributions of cash and other financial assets, 2023 = 164,121,185. Contributions of nonfinancial assets and services, 2024 = 263,476. Contributions of nonfinancial assets and services, 2023 = 1,040,453. Foreign currency losses, 2024 = (300,907). Foreign currency losses, 2023 = (94,868). Other income, net, 2024 = 5,629,773. Other income, net, 2023 = 3,824,240. Investment income, net, 2024 = 5,096,842. Investment income, net, 2023 = 3,002,929. Release of net assets with donor restrictions, 2024 = 6,481,350. Release of net assets with donor restrictions, 2023 = 4,732,654. Total support and revenue, 2024 = 185,383,511. Total support and revenue, 2023 = 176,626,593. Operating expenses:, 2024 = . Operating expenses:, 2023 = . Salaries and benefits, 2024 = 106,793,960. Salaries and benefits, 2023 = 101,305,706. Awards and grants, 2024 = 26,820,080. Awards and grants, 2023 = 24,433,682. Internet hosting, 2024 = 3,116,445. Internet hosting, 2023 = 3,120,819. In-kind service expenses, 2024 = 263,476. In-kind service expenses, 2023 = 1,040,453. Donation processing expenses, 2024 = 7,547,718. Donation processing expenses, 2023 = 6,855,680. Professional service expenses, 2024 = 13,090,040. Professional service expenses, 2023 = 15,464,635. Other operating expenses, 2024 = 10,798,140. Other operating expenses, 2023 = 7,393,982. Travel and conferences, 2024 =", + "page_start": 5, + "page_end": 5, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "Notes to Consolidated Financial Statements\nJune 30, 2024 and 2023\nThe Foundation also receives donations on behalf of the Wikimedia Endowment as well as transfers additional Foundation donations to the Endowment monthly. Donations that are donor-specified for the Wikimedia Endowment are not recognized as revenue to the Foundation, whereas donations that are not donor-specified for the Wikimedia Endowment are recognized both as contributions revenue and awards and grants expense to the Foundation. The Foundation transferred $10,706,812 donor-designated gifts and $624,137 Foundation gifts to the Wikimedia Endowment during the year ended June 30, 2024. As of June 30, 2024, the Foundation owed the Wikimedia Endowment $525,607 for donations to be transferred to the Wikimedia Endowment for the month of June 2024.\nDuring the fiscal year ended June 30, 2024, the Wikimedia Endowment also provided the Foundation with grants of $1,500,000 for MediaWiki improvements, $600,000 for the Abstract Wikipedia project, and $500,000 for exploring strategies for expanding beyond the Foundation's existing audiences of consumers and contributors. The grants are recorded as contributions with donor restrictions and within net assets with donor restrictions as of June 30, 2024.", + "page_start": 19, + "page_end": 19, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "Opinion\nWe have audited the consolidated financial statements of Wikimedia Foundation, Inc and its subsidiary (the Foundation), which comprise the consolidated statements of financial position as of June 30, 2024 and 2023, and the related consolidated statements of activities, and cash flows for the years then ended, and the related notes to the consolidated financial statements.\nIn our opinion, the accompanying consolidated financial statements present fairly, in all material respects, the financial position of the Foundation as of June 30, 2024 and 2023, and the results of its operations and its cash flows for the years then ended in accordance with U.S. generally accepted accounting principles.", + "page_start": 2, + "page_end": 2, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "WIKIMEDIA FOUNDATION, INC.\nConsolidated Financial Statements\nJune 30, 2024 and 2023\n(With Independent Auditors' Report Thereon)\nTable of Contents", + "page_start": 0, + "page_end": 1, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "WIKIMEDIA FOUNDATION, INC.\nConsolidated Statements of Activities\nYears ended June 30, 2024 and 2023", + "page_start": 5, + "page_end": 5, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "(6) Functional Allocation of Expenses\nCosts of providing the Foundation's activities have been summarized below on a functional basis. Programs comprise various initiatives that focus on (1) building the technological and operating platform that enables the Foundation to function sustainably as a top global internet organization, (2) strengthening, growing, and increasing diversity of the Wikimedia communities, and (3) accelerating impact by investing in key geographic areas, mobile application development, and bottom-up innovation, all of which support Wikipedia and other wiki-based projects. This also includes costs related to the Wikimedia Endowment for which the Foundation is reimbursed. The allocation between programs, general and administrative, and fundraising expenses is based on personnel and related costs and other operating expenses such as rent and office expenses using estimates of time spent or percentage of utilization by headcounts, as well as\n14\n(Continued)", + "page_start": 15, + "page_end": 15, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "WIKIMEDIA FOUNDATION, INC.\n5,824,979. Travel and conferences, 2023 = 4,878,359. Depreciation and amortization, 2024 = 4,216,271. Depreciation and amortization, 2023 = 4,602,064. Total operating expenses, 2024 = 178,471,109. Total operating expenses, 2023 = 169,095,380. Change in net assets without donor restrictions from operating activities, 2024 = 6,912,402. Change in net assets without donor restrictions from operating activities, 2023 = 7,531,213. Nonoperating activities:, 2024 = . Nonoperating activities:, 2023 = . Unrealized gains on investments, net, 2024 = 9,858,001. Unrealized gains on investments, net, 2023 = 3,547,510. Change in net assets without donor restrictions, 2024 = 16,770,403. Change in net assets without donor restrictions, 2023 = 11,078,723. Net assets with donor restrictions:, 2024 = . Net assets with donor restrictions:, 2023 = . Contributions with donor restrictions, 2024 = 6,295,000. Contributions with donor restrictions, 2023 = 9,273,736. Net assets released from restrictions, 2024 = (6,481,350). Net assets released from restrictions, 2023 = (4,732,654). Increase (decrease) in net assets with donor\nrestrictions, 2024 = (186,350). Increase (decrease) in net assets with donor restrictions, 2023 = 4,541,082. Increase in net assets, 2024 = 16,584,053. Increase in net assets, 2023 = 15,619,805. Net assets at beginning of year, 2024 = 254,971,337. Net assets at beginning of year, 2023 = 239,351,532. Net assets at end of year, 2024 = $ 271,555,390. Net assets at end of year, 2023 = 254,971,337\nSee accompanying notes to consolidated financial statements.\n4", + "page_start": 5, + "page_end": 5, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "(10) Related Party Transactions\nThe Wikimedia Endowment began operations as a standalone tax-exempt 501(c)(3) organization on September 30, 2023, with the mission to act as a permanent fund that can support in perpetuity the operations and activities of current and future Wikimedia projects, which are projects that are approved by and advance the purposes of the Foundation or its successor if the Foundation ceases to exist. The Foundation does not have control or controlling financial interest in the Wikimedia Endowment and the Wikimedia Endowment has a separate Board of Directors, but the Wikimedia Endowment is considered a related party to the Foundation because Wikimedia Endowment management is also management at the Foundation.\nDuring the fiscal year ended June 30, 2024, the Foundation recognized revenue of $2,063,195 related to services provided to the Wikimedia Endowment, primarily for fundraising and general and administrative support under the terms of a cost sharing agreement. These costs are included within the Foundation ' s expenses based on the nature of the cost. The revenue from the Wikimedia Endowment reimbursing the costs is recorded within other income, net.\n17\n(Continued)", + "page_start": 18, + "page_end": 18, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "Notes to Consolidated Financial Statements\nJune 30, 2024 and 2023\nand free to everyone in the world, the Foundation's cost related to this collaborative arrangement is included within awards and grants in the statement of activities. The amount included within awards and grants was $6.1 million and $4.1 million for the years ended June 30, 2024 and 2023, respectively.", + "page_start": 12, + "page_end": 12, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + } + ] + }, + { + "references": { + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf", + "query": "What external events can affect Wikimedia Fundation in raising funds ?", + "target_page": 8, + "target_passage": "External factors such as global geopolitics, recession, and currency markets may impact our ability to raise funds.", + "chunk_present": { + "presence": true, + "index": 4 + } + }, + "top_chunk": [ + { + "text": "Notes to Consolidated Financial Statements\nJune 30, 2024 and 2023\nThe Foundation also receives donations on behalf of the Wikimedia Endowment as well as transfers additional Foundation donations to the Endowment monthly. Donations that are donor-specified for the Wikimedia Endowment are not recognized as revenue to the Foundation, whereas donations that are not donor-specified for the Wikimedia Endowment are recognized both as contributions revenue and awards and grants expense to the Foundation. The Foundation transferred $10,706,812 donor-designated gifts and $624,137 Foundation gifts to the Wikimedia Endowment during the year ended June 30, 2024. As of June 30, 2024, the Foundation owed the Wikimedia Endowment $525,607 for donations to be transferred to the Wikimedia Endowment for the month of June 2024.\nDuring the fiscal year ended June 30, 2024, the Wikimedia Endowment also provided the Foundation with grants of $1,500,000 for MediaWiki improvements, $600,000 for the Abstract Wikipedia project, and $500,000 for exploring strategies for expanding beyond the Foundation's existing audiences of consumers and contributors. The grants are recorded as contributions with donor restrictions and within net assets with donor restrictions as of June 30, 2024.", + "page_start": 19, + "page_end": 19, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "(a) Organization and Purpose\nThe accompanying consolidated financial statements present the financial position, change in net assets and cash flows of the Wikimedia Foundation, Inc. (the Foundation) and Wikimedia, LLC.\nThe Foundation is the nonprofit organization that operates Wikipedia, a free online encyclopedia. Based in San Francisco, California, the Foundation is a 501(c)(3) charity that is funded primarily through donations and contributions.\nThe Foundation also operates Wikimedia, LLC, a Delaware Limited Liability Company, with the Foundation as its Sole Member. The Wikimedia, LLC is organized and operated exclusively for charitable and educational purposes within the meaning of section 501(c)(3) of the Internal Revenue Code and is a disregarded entity for tax purposes.", + "page_start": 7, + "page_end": 7, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "(10) Related Party Transactions\nThe Wikimedia Endowment began operations as a standalone tax-exempt 501(c)(3) organization on September 30, 2023, with the mission to act as a permanent fund that can support in perpetuity the operations and activities of current and future Wikimedia projects, which are projects that are approved by and advance the purposes of the Foundation or its successor if the Foundation ceases to exist. The Foundation does not have control or controlling financial interest in the Wikimedia Endowment and the Wikimedia Endowment has a separate Board of Directors, but the Wikimedia Endowment is considered a related party to the Foundation because Wikimedia Endowment management is also management at the Foundation.\nDuring the fiscal year ended June 30, 2024, the Foundation recognized revenue of $2,063,195 related to services provided to the Wikimedia Endowment, primarily for fundraising and general and administrative support under the terms of a cost sharing agreement. These costs are included within the Foundation ' s expenses based on the nature of the cost. The revenue from the Wikimedia Endowment reimbursing the costs is recorded within other income, net.\n17\n(Continued)", + "page_start": 18, + "page_end": 18, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "(6) Functional Allocation of Expenses\nCosts of providing the Foundation's activities have been summarized below on a functional basis. Programs comprise various initiatives that focus on (1) building the technological and operating platform that enables the Foundation to function sustainably as a top global internet organization, (2) strengthening, growing, and increasing diversity of the Wikimedia communities, and (3) accelerating impact by investing in key geographic areas, mobile application development, and bottom-up innovation, all of which support Wikipedia and other wiki-based projects. This also includes costs related to the Wikimedia Endowment for which the Foundation is reimbursed. The allocation between programs, general and administrative, and fundraising expenses is based on personnel and related costs and other operating expenses such as rent and office expenses using estimates of time spent or percentage of utilization by headcounts, as well as\n14\n(Continued)", + "page_start": 15, + "page_end": 15, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "(b) Risks and Uncertainties\nThe Foundation's operations are funded primarily by public donations from individuals as well as gifts from foundations and corporations. External factors such as global geopolitics, recession, and currency markets may impact our ability to raise funds. As of the date of this report, the Foundation has not experienced an adverse impact on its business operations.", + "page_start": 7, + "page_end": 7, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "(o) Collaborative Arrangement\nThe Foundation has a collaborative arrangement with Wikimedia Deutschland to mutually develop the Wikibase software to support the Wikidata project, which acts as central storage for the structured data of its Wikimedia sister projects including Wikipedia, Wikivoyage, Wiktionary, Wikisource, and others. Both the Foundation and Wikimedia Deutschland do work for the Wikidata project, and the Foundation also grants Wikimedia Deutschland funding to support Wikimedia Deutschland's work in developing the Wikibase software. Since the project is part of the Foundation's mission to make knowledge accessible\n10\n(Continued)", + "page_start": 11, + "page_end": 11, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "For example (unaudited):\n· Wikipedia and the other projects operated by the Foundation receive more than 19.4 billion pageviews per month, making them one of the most popular Web properties worldwide. Wikipedia is available in more than 332 languages and contains more than 63 million articles contributed by a global volunteer community.\n· For the year ended June 30, 2024, the educational content of the Foundation's largest project, Wikipedia, grew by approximately 1.9 million articles to approximately 63.4 million articles.\n· For the year ended June 30, 2024, volunteers added approximately 12.2 million images, movies, and sound files to the Foundation's multimedia repository, making the total 106.7 million files.\n· Volunteers also contribute in several ways to the Foundation's wiki software: volunteer software developers add new functionality to the code base, and volunteer language specialists add to the code base by translating the wiki interface into different languages. During the year ended June 30, 2024, there were 47,773 commits merged, through the efforts of approximately 511 authors/contributors, of which 8,161 commits were through the efforts of approximately 244 volunteers.", + "page_start": 17, + "page_end": 17, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "WIKIMEDIA FOUNDATION, INC.\nConsolidated Statements of Activities\nYears ended June 30, 2024 and 2023", + "page_start": 5, + "page_end": 5, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "WIKIMEDIA FOUNDATION, INC.\nNotes to Consolidated Financial Statements June 30, 2024 and 2023", + "page_start": 7, + "page_end": 7, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "(q) Reclassifications\nCertain reclassifications have been made in the financial statements to conform 2023 information to the 2024 presentation. The Foundation had a change in accounting policy to present unrealized gains and losses on investments separately from investment income, net. This resulted in a reclassification of $3,547,510 from investment income, net to unrealized gains on investments within the statement of activities. The Foundation also had a change in accounting policy to no longer present the Wikimania event as special event expense, net in the statement of activities. Revenue from registration sales is now reported within other income, net, and expenses are reported within travel and conference expenses. This resulted in a reclassification of $698,141 from special event expenses to travel and conference expenses in the statement of activities.", + "page_start": 12, + "page_end": 12, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + } + ] + }, + { + "references": { + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf", + "query": "What include Wikimedia Fundation restricted cash ?", + "target_page": 9, + "target_passage": "Restricted cash includes standby letters of credit for (1) the Foundation’s headquarters office lease and (2) one of the Foundation’s Employer of Record responsible for administering compensation and benefits for non-US personnel.", + "chunk_present": { + "presence": true, + "index": 6 + } + }, + "top_chunk": [ + { + "text": "Notes to Consolidated Financial Statements\nJune 30, 2024 and 2023\nThe Foundation also receives donations on behalf of the Wikimedia Endowment as well as transfers additional Foundation donations to the Endowment monthly. Donations that are donor-specified for the Wikimedia Endowment are not recognized as revenue to the Foundation, whereas donations that are not donor-specified for the Wikimedia Endowment are recognized both as contributions revenue and awards and grants expense to the Foundation. The Foundation transferred $10,706,812 donor-designated gifts and $624,137 Foundation gifts to the Wikimedia Endowment during the year ended June 30, 2024. As of June 30, 2024, the Foundation owed the Wikimedia Endowment $525,607 for donations to be transferred to the Wikimedia Endowment for the month of June 2024.\nDuring the fiscal year ended June 30, 2024, the Wikimedia Endowment also provided the Foundation with grants of $1,500,000 for MediaWiki improvements, $600,000 for the Abstract Wikipedia project, and $500,000 for exploring strategies for expanding beyond the Foundation's existing audiences of consumers and contributors. The grants are recorded as contributions with donor restrictions and within net assets with donor restrictions as of June 30, 2024.", + "page_start": 19, + "page_end": 19, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "WIKIMEDIA FOUNDATION, INC.\nNet assets without donor restrictions:, 2024 = . Net assets without donor restrictions:, 2023 = . Support and revenue:, 2024 = . Support and revenue:, 2023 = . Contributions of cash and other financial assets, 2024 = $ 168,212,977. Contributions of cash and other financial assets, 2023 = 164,121,185. Contributions of nonfinancial assets and services, 2024 = 263,476. Contributions of nonfinancial assets and services, 2023 = 1,040,453. Foreign currency losses, 2024 = (300,907). Foreign currency losses, 2023 = (94,868). Other income, net, 2024 = 5,629,773. Other income, net, 2023 = 3,824,240. Investment income, net, 2024 = 5,096,842. Investment income, net, 2023 = 3,002,929. Release of net assets with donor restrictions, 2024 = 6,481,350. Release of net assets with donor restrictions, 2023 = 4,732,654. Total support and revenue, 2024 = 185,383,511. Total support and revenue, 2023 = 176,626,593. Operating expenses:, 2024 = . Operating expenses:, 2023 = . Salaries and benefits, 2024 = 106,793,960. Salaries and benefits, 2023 = 101,305,706. Awards and grants, 2024 = 26,820,080. Awards and grants, 2023 = 24,433,682. Internet hosting, 2024 = 3,116,445. Internet hosting, 2023 = 3,120,819. In-kind service expenses, 2024 = 263,476. In-kind service expenses, 2023 = 1,040,453. Donation processing expenses, 2024 = 7,547,718. Donation processing expenses, 2023 = 6,855,680. Professional service expenses, 2024 = 13,090,040. Professional service expenses, 2023 = 15,464,635. Other operating expenses, 2024 = 10,798,140. Other operating expenses, 2023 = 7,393,982. Travel and conferences, 2024 =", + "page_start": 5, + "page_end": 5, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "Notes to Consolidated Financial Statements\nJune 30, 2024 and 2023\nGifts of cash and other assets are reported as contributions with donor restrictions if they are received with donor stipulations that limit the use of the donated assets or are restricted as to time. When a donor restriction expires, that is, when a stipulated time restriction ends or purpose restriction is accomplished, net assets with donor restrictions are reclassified to net assets without donor restrictions and reported in the consolidated statement of activities as net assets released from restrictions.", + "page_start": 10, + "page_end": 10, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "(a) Organization and Purpose\nThe accompanying consolidated financial statements present the financial position, change in net assets and cash flows of the Wikimedia Foundation, Inc. (the Foundation) and Wikimedia, LLC.\nThe Foundation is the nonprofit organization that operates Wikipedia, a free online encyclopedia. Based in San Francisco, California, the Foundation is a 501(c)(3) charity that is funded primarily through donations and contributions.\nThe Foundation also operates Wikimedia, LLC, a Delaware Limited Liability Company, with the Foundation as its Sole Member. The Wikimedia, LLC is organized and operated exclusively for charitable and educational purposes within the meaning of section 501(c)(3) of the Internal Revenue Code and is a disregarded entity for tax purposes.", + "page_start": 7, + "page_end": 7, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "Other deposits\nThis represents restricted cash held on deposit with financial institutions.\nRestricted cash\nUnder the terms of the loan facilities (see Note 16), the Group is required to maintain a minimum cash balance of US$5 million in respect of Akara.\nRisk exposure\nThe Group's exposure to interest rate risk and a sensitivity analysis for financial assets and liabilities are disclosed in Note 28.", + "page_start": 85, + "page_end": 85, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "(10) Related Party Transactions\nThe Wikimedia Endowment began operations as a standalone tax-exempt 501(c)(3) organization on September 30, 2023, with the mission to act as a permanent fund that can support in perpetuity the operations and activities of current and future Wikimedia projects, which are projects that are approved by and advance the purposes of the Foundation or its successor if the Foundation ceases to exist. The Foundation does not have control or controlling financial interest in the Wikimedia Endowment and the Wikimedia Endowment has a separate Board of Directors, but the Wikimedia Endowment is considered a related party to the Foundation because Wikimedia Endowment management is also management at the Foundation.\nDuring the fiscal year ended June 30, 2024, the Foundation recognized revenue of $2,063,195 related to services provided to the Wikimedia Endowment, primarily for fundraising and general and administrative support under the terms of a cost sharing agreement. These costs are included within the Foundation ' s expenses based on the nature of the cost. The revenue from the Wikimedia Endowment reimbursing the costs is recorded within other income, net.\n17\n(Continued)", + "page_start": 18, + "page_end": 18, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "(f) Restricted Cash\nRestricted cash includes standby letters of credit for (1) the Foundation's headquarters office lease and (2) one of the Foundation's Employer of Record responsible for administering compensation and benefits for non-US personnel. As of June 30, 2024, neither letter of credit has been used.", + "page_start": 8, + "page_end": 8, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "(5) Net Assets\nNet assets with donor restrictions at June 30, 2024 and 2023 are available for the following purposes:\nRestricted to future periods:, 2024 = $ 50,000. Restricted to future periods:, 2023 = 100,000. Restricted by purpose:, 2024 = . Restricted by purpose:, 2023 = . Abstract Wikipedia, 2024 = 861,008. Abstract Wikipedia, 2023 = 1,249,004. Artificial intelligence, 2024 = 239,878. Artificial intelligence, 2023 = -. Endowment support, 2024 = -. Endowment support, 2023 = 1,297,620. Future Audiences, 2024 = 500,000. Future Audiences, 2023 = -. Knowledge equity, 2024 = 965,910. Knowledge equity, 2023 = 2,228,134. Machine learning, 2024 = 24,528. Machine learning, 2023 = 860,620. Media Wiki, 2024 = 1,500,000. Media Wiki, 2023 = -. Other, 2024 = 125,000. Other, 2023 = 147,295. Restricted to future periods and by purpose:, 2024 = . Restricted to future periods and by purpose:, 2023 = . Artificial intelligence, 2024 = 1,430,000. Artificial intelligence, 2023 = -. Net assets with donor restrictions, 2024 = $ 5,696,324. Net assets with donor restrictions, 2023 = 5,782,673", + "page_start": 15, + "page_end": 15, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "(d) Financial Statement Presentation\nNet assets, support and revenue, expenses, gains, and losses are classified based on the existence or absence of donor-imposed restrictions in accordance with Accounting Standards Codification (ASC) Topic 958, Not-for-Profit Entities .\nNet assets without donor restrictions represent unrestricted resources available to support operations and also include previously temporarily restricted resources, which have become available for use by the Foundation in accordance with the intentions of donors.\nNet assets with donor restrictions represent contributions that are limited in use by the Foundation in accordance with donor-imposed stipulations. The stipulations may expire with time or may be satisfied and removed by the actions of the Foundation according to the terms of the contribution by the donor.\n6\n(Continued)", + "page_start": 7, + "page_end": 7, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "Restricted Cash\nOur total cash and cash equivalents and restricted cash, as presented in the consolidated statements of cash flows, was as follows (in millions):\nCash and cash equivalents, September 30, 2024 = $ 18,111. Cash and cash equivalents, December 31, 2023 = $ 16,398. Cash and cash equivalents, September 30, 2023 = $ 15,932. Cash and cash equivalents, December 31, 2022 = $ 16,253. Restricted cash included in prepaid expenses and other current assets, September 30, 2024 = 483. Restricted cash included in prepaid expenses and other current assets, December 31, 2023 = 543. Restricted cash included in prepaid expenses and other current assets, September 30, 2023 = 453. Restricted cash included in prepaid expenses and other current assets, December 31, 2022 = 294. Restricted cash included in other non-current assets, September 30, 2024 = 380. Restricted cash included in other non-current assets, December 31, 2023 = 248. Restricted cash included in other non-current assets, September 30, 2023 = 205. Restricted cash included in other non-current assets, December 31, 2022 = 377. Total as presented in the consolidated statements of cash flows, September 30, 2024 = $ 18,974. Total as presented in the consolidated statements of cash flows, December 31, 2023 = $ 17,189. Total as presented in the consolidated statements of cash flows, September 30, 2023 = $ 16,590. Total as presented in the consolidated statements of cash flows, December 31, 2022 = $ 16,924", + "page_start": 16, + "page_end": 16, + "source_file": "tesla_form_10q.pdf" + } + ] + }, + { + "references": { + "source_file": "uksi_20200471_en.pdf", + "query": "What is the price of the The Special Educational Needs and Disability (Coronavirus) (Amendment) Regulations 2020 ?", + "target_page": 8, + "target_passage": "£6.90", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "EDUCATION, ENGLAND\nThe Special Educational Needs and Disability (Coronavirus) (Amendment) Regulations 2020\nMade\n-\n-\n-\n-\n28th April 2020\nLaid before Parliament\n30th April 2020\nComing into force\n-\n-\n1st May 2020\nThe Secretary of State makes the following Regulations in exercise of the powers conferred by sections 30(8), 31(4), 36(11), 37(4), 44(7)(b) and (c), 47, 49(3), 51(4), 56(1), 71(11), 73(4), 74(3) and 135(2) and (3) of the Children and Families Act 2014( a ) and sections 29(3) and 569(4) of the Education Act 1996( b ).", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "Citation and commencement\n1. These Regulations may be cited as the Special Educational Needs and Disability (Coronavirus) (Amendment) Regulations 2020 and come into force on 1st May 2020.", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "Amendment of the Special Educational Needs and Disability Regulations 2014\n3. The Special Educational Needs and Disability Regulations 2014( c ) are amended as follows.\n4. In regulation 2(1) (interpretation), at the appropriate place insert-\n''coronavirus' means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); '.\n5. After regulation 2 (interpretation) insert-", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "Amendment of the Special Educational Needs (Personal Budgets) Regulations 2014\n15. The Special Educational Needs (Personal Budgets) Regulations 2014( a ) are amended as follows.\n16. In regulation 2 (interpretation), at the appropriate place insert-\n''coronavirus' means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); '.\n17. After regulation 2 (interpretation) insert-", + "page_start": 2, + "page_end": 2, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "Amendment of the Special Educational Needs and Disability (First-tier Tribunal Recommendations Power) Regulations 2017\n28. The Special Educational Needs and Disability (First-tier Tribunal Recommendations Power) Regulations 2017( a ) are amended as follows.\n29. In regulation 2 (interpretation), at the appropriate place insert-\n''coronavirus' means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); '.\n30. After regulation 2 (interpretation) insert-", + "page_start": 4, + "page_end": 4, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "Amendment of the Special Educational Needs and Disability (Detained Persons) Regulations 2015\n18. The Special Educational Needs and Disability (Detained Persons) Regulations 2015( a ) are amended as follows.\n19. In regulation 2(1) (interpretation), at the appropriate place insert-\n''coronavirus' means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); '.\n20. After regulation 2 (interpretation) insert-", + "page_start": 3, + "page_end": 3, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "EXPLANATORY NOTE\n(This note is not part of the Regulations)\nThese Regulations make amendments to secondary legislation relating to special educational needs and disability in order to provide exceptions to time limits set out in that legislation where they cannot be met because of a reason relating to the incidence or transmission of coronavirus.\nRegulation 2 contains review and expiry provisions. The Secretary of State is required to review the effectiveness of the Regulations during the period in which they have effect. The Regulations cease to have effect on 25th September 2020.\nRegulations 3 to 14 amend the Special Educational Needs and Disability Regulations 2014 ('the SEND Regulations 2014').\nRegulation 5 inserts a glossing provision into the SEND Regulations 2014 which relaxes certain requirements in those Regulations for actions to be taken within specified time limits where it is not reasonably practicable for a person to meet those requirements for a reason relating to the incidence or transmission of coronavirus. Instead, any such requirement is to be read as a requirement for such action to be taken as soon as reasonably practicable.\nRegulations 6 to 14 make textual amendments to the SEND Regulations 2014 to relax time limits.\nRegulations 15 to 17 amend the Special Educational Needs (Personal Budgets) Regulations 2014 ('the Personal Budgets Regulations 2014').\nRegulation 17 inserts a similar glossing provision into the Personal Budgets Regulations 2014 as regulation 5 does in respect of the SEND Regulations 2014.\nRegulations 18 to 27 amend the Special Educational Needs and Disability (Detained Persons) Regulations 2015 ('the Detained Persons Regulations 2015').\nRegulation 20 inserts a glossing provision into the Detained Persons Regulations 2015 similar to the ones in regulations 5 and 17 in relation to the SEND Regulations 2014 and the Personal Budgets Regulations 2014 respectively.\nRegulations 21 to 27 make textual amendments to the Detained Persons Regulations 2015 to relax time limits.\nRegulations 28 to 30 amend the Special Educational Needs and Disability (First-tier Tribunal Recommendations Power) Regulations 2017 ('the First-tier Tribunal Regulations 2017').\nRegulation 30 inserts a glossing provision into the First-tier Tribunal Regulations 2017 similar to those in regulations 5, 17 and 20.\nAn impact assessment has not been produced for this instrument as this is a temporary, emergency measure and no significant impact on business, charities or voluntary bodies is foreseen.\nAn Explanatory Memorandum is published alongside this instrument on www.legislation.gov.uk.\n' Crown copyright 2020", + "page_start": 5, + "page_end": 5, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "' Relaxation of time periods due to coronavirus exception\n2A. -(1) Where the coronavirus exception applies, any requirement in any of the regulations specified in paragraph (3) for action to be taken within a specified period of\n( a ) 2014 c.6. Section 30(8) was amended by Schedule 2, Part 1, paragraph 4 to the Children and Social Work Act 2017 (c.16).\n( b ) 1996 c.56. Section 29(3) was amended by Schedule 30, paragraph 67 and Schedule 31 to the School Standards and Framework Act 1998 (c.31) and S.I. 2010/1158 and section 569(4) was amended by section 8(1) and (5) of the Education (Wales) Measure 2009.\n( c ) S.I. 2014/1530, relevant amending instruments are S.I. 2014/2096, S.I. 2015/359 and S.I. 2017/1306.\ntime or by a certain day is to be read instead as a requirement for such action to be taken as soon as reasonably practicable.", + "page_start": 0, + "page_end": 1, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "PUBLIC HEALTH, ENGLAND\nThe Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021\nMade\n-\n-\n-\n-\nat 10.32 a.m. on 14th May 2021\nLaid before Parliament\nat 2.30 p.m. on 14th May 2021\nComing into force\n- -\nat 4.00 a.m. on 17th May 2021", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "EXPLANATORY NOTE\n(This note is not part of the Regulations)\nThese Regulations replace the Health Protection (Coronavirus, International Travel) (England) Regulations 2020 ('the International Travel Regulations'), the Health Protection (Coronavirus, Public Health Information for International Passengers) (England) Regulations 2020 and the Health Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England) (Amendment) Regulations 2021.\nThey impose requirements on certain categories of person to provide information upon arrival in England, to take coronavirus tests before and after arrival and to self-isolate in order to prevent the spread of infection or contamination from coronavirus or coronavirus disease. They also impose obligations on operators to ensure that passengers receive information and comply with the requirements.\nAn impact assessment has not been produced for this instrument. An explanatory memorandum has been published alongside this instrument at www.legislation.gov.uk.\n' Crown copyright 2021\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, Controller of Her Majesty's Stationery Office and Queen's Printer of Acts of Parliament.\n91\nhttp://www.legislation.gov.uk/id/uksi/2021/582", + "page_start": 90, + "page_end": 91, + "source_file": "uksi_20210582_en.pdf" + } + ] + }, + { + "references": { + "source_file": "uksi_20200471_en.pdf", + "query": "When come into force the Special Educational Needs and Disability (Coronavirus) (Amendment) Regulations 2020 ?", + "target_page": 1, + "target_passage": "These Regulations may be cited as the Special Educational Needs and Disability (Coronavirus) (Amendment) Regulations 2020 and come into force on 1st May 2020.", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "EDUCATION, ENGLAND\nThe Special Educational Needs and Disability (Coronavirus) (Amendment) Regulations 2020\nMade\n-\n-\n-\n-\n28th April 2020\nLaid before Parliament\n30th April 2020\nComing into force\n-\n-\n1st May 2020\nThe Secretary of State makes the following Regulations in exercise of the powers conferred by sections 30(8), 31(4), 36(11), 37(4), 44(7)(b) and (c), 47, 49(3), 51(4), 56(1), 71(11), 73(4), 74(3) and 135(2) and (3) of the Children and Families Act 2014( a ) and sections 29(3) and 569(4) of the Education Act 1996( b ).", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "Citation and commencement\n1. These Regulations may be cited as the Special Educational Needs and Disability (Coronavirus) (Amendment) Regulations 2020 and come into force on 1st May 2020.", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "Amendment of the Special Educational Needs and Disability Regulations 2014\n3. The Special Educational Needs and Disability Regulations 2014( c ) are amended as follows.\n4. In regulation 2(1) (interpretation), at the appropriate place insert-\n''coronavirus' means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); '.\n5. After regulation 2 (interpretation) insert-", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "Amendment of the Special Educational Needs and Disability (First-tier Tribunal Recommendations Power) Regulations 2017\n28. The Special Educational Needs and Disability (First-tier Tribunal Recommendations Power) Regulations 2017( a ) are amended as follows.\n29. In regulation 2 (interpretation), at the appropriate place insert-\n''coronavirus' means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); '.\n30. After regulation 2 (interpretation) insert-", + "page_start": 4, + "page_end": 4, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "Amendment of the Special Educational Needs and Disability (Detained Persons) Regulations 2015\n18. The Special Educational Needs and Disability (Detained Persons) Regulations 2015( a ) are amended as follows.\n19. In regulation 2(1) (interpretation), at the appropriate place insert-\n''coronavirus' means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); '.\n20. After regulation 2 (interpretation) insert-", + "page_start": 3, + "page_end": 3, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "Amendment of the Special Educational Needs (Personal Budgets) Regulations 2014\n15. The Special Educational Needs (Personal Budgets) Regulations 2014( a ) are amended as follows.\n16. In regulation 2 (interpretation), at the appropriate place insert-\n''coronavirus' means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); '.\n17. After regulation 2 (interpretation) insert-", + "page_start": 2, + "page_end": 2, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "EXPLANATORY NOTE\n(This note is not part of the Regulations)\nThese Regulations make amendments to secondary legislation relating to special educational needs and disability in order to provide exceptions to time limits set out in that legislation where they cannot be met because of a reason relating to the incidence or transmission of coronavirus.\nRegulation 2 contains review and expiry provisions. The Secretary of State is required to review the effectiveness of the Regulations during the period in which they have effect. The Regulations cease to have effect on 25th September 2020.\nRegulations 3 to 14 amend the Special Educational Needs and Disability Regulations 2014 ('the SEND Regulations 2014').\nRegulation 5 inserts a glossing provision into the SEND Regulations 2014 which relaxes certain requirements in those Regulations for actions to be taken within specified time limits where it is not reasonably practicable for a person to meet those requirements for a reason relating to the incidence or transmission of coronavirus. Instead, any such requirement is to be read as a requirement for such action to be taken as soon as reasonably practicable.\nRegulations 6 to 14 make textual amendments to the SEND Regulations 2014 to relax time limits.\nRegulations 15 to 17 amend the Special Educational Needs (Personal Budgets) Regulations 2014 ('the Personal Budgets Regulations 2014').\nRegulation 17 inserts a similar glossing provision into the Personal Budgets Regulations 2014 as regulation 5 does in respect of the SEND Regulations 2014.\nRegulations 18 to 27 amend the Special Educational Needs and Disability (Detained Persons) Regulations 2015 ('the Detained Persons Regulations 2015').\nRegulation 20 inserts a glossing provision into the Detained Persons Regulations 2015 similar to the ones in regulations 5 and 17 in relation to the SEND Regulations 2014 and the Personal Budgets Regulations 2014 respectively.\nRegulations 21 to 27 make textual amendments to the Detained Persons Regulations 2015 to relax time limits.\nRegulations 28 to 30 amend the Special Educational Needs and Disability (First-tier Tribunal Recommendations Power) Regulations 2017 ('the First-tier Tribunal Regulations 2017').\nRegulation 30 inserts a glossing provision into the First-tier Tribunal Regulations 2017 similar to those in regulations 5, 17 and 20.\nAn impact assessment has not been produced for this instrument as this is a temporary, emergency measure and no significant impact on business, charities or voluntary bodies is foreseen.\nAn Explanatory Memorandum is published alongside this instrument on www.legislation.gov.uk.\n' Crown copyright 2020", + "page_start": 5, + "page_end": 5, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "PUBLIC HEALTH, ENGLAND\nThe Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021\nMade\n-\n-\n-\n-\nat 10.32 a.m. on 14th May 2021\nLaid before Parliament\nat 2.30 p.m. on 14th May 2021\nComing into force\n- -\nat 4.00 a.m. on 17th May 2021", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "' Relaxation of time periods due to coronavirus exception\n2A. -(1) Where the coronavirus exception applies, any requirement in any of the regulations specified in paragraph (3) for action to be taken within a specified period of\n( a ) 2014 c.6. Section 30(8) was amended by Schedule 2, Part 1, paragraph 4 to the Children and Social Work Act 2017 (c.16).\n( b ) 1996 c.56. Section 29(3) was amended by Schedule 30, paragraph 67 and Schedule 31 to the School Standards and Framework Act 1998 (c.31) and S.I. 2010/1158 and section 569(4) was amended by section 8(1) and (5) of the Education (Wales) Measure 2009.\n( c ) S.I. 2014/1530, relevant amending instruments are S.I. 2014/2096, S.I. 2015/359 and S.I. 2017/1306.\ntime or by a certain day is to be read instead as a requirement for such action to be taken as soon as reasonably practicable.", + "page_start": 0, + "page_end": 1, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "Citation, commencement, extent and application\n1. -(1) These Regulations may be cited as the Health Protection (Coronavirus, International Travel and Operator Liability) (England) Regulations 2021.\n(2) These Regulations come into force at 4.00 a.m. on 17th May 2021.\n(3) These Regulations extend to England and Wales and apply in relation to England only.", + "page_start": 2, + "page_end": 2, + "source_file": "uksi_20210582_en.pdf" + } + ] + }, + { + "references": { + "source_file": "sg248459.pdf", + "query": "Who is Daniel Casali ?", + "target_page": 12, + "target_passage": " Daniel Casali is a Thought Leader Information Technology Specialist working for 15 years at IBM with Power Systems, high-performance computing, big data, and storage. His role at IBM is to bring to reality solutions that address client’s needs by exploring new technologies for different workloads. He is also fascinated by real multicloud implementations, always trying to abstract and simplify the new challenges of the heterogeneous architectures that are intrinsic to this new consumption model, be that on-premises or in the public cloud. ", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Daniel M. Wade\nDirector", + "page_start": 79, + "page_end": 79, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "2008 (1,598)\nDaniel Cruz-Mora\nDodie Cullen\nKent Curran\nRaymond Dabney\nBruce Dake\nColleen Dame\nKiran Darapureddy\nRaymond Daugherty\nChet Davies\nCharles Davis III\nDavid L. Davis\nFrancis Davis\nGreg Davis\nJoshua Davis\nMark Davis\nFranklin Daws\nJason Day\nJill Day\nTim Deal\nAshley Dean\nRobert Dean\nPhillip Deaton\nBelinda Debter\nTim Dehan II\nNick Dell'Osso Jr.\nToney Dempsey\nBenjamin Deville\nMichael Dew\nCurt Dewbre\nSam DeFoor\nPam DeLong\nDrew DeLozier\nKenneth DeMoney\nKolby DeVille\nDavid DeWitt\nDonald Diamond\nRaquel Diaz Hicks\nMichael Dickinson\nRobert Dickson\nWade Dietzman\nChad Diffey\nTiffany Diggins\nKevin Digney\nScottie Dill\nR.B. Dillard Jr.\nTom Divine\nShane Dixon\nAllen Doan\nDwayne Dockens\nKen Dodson\nJimmy Doolittle Jr.\nJames Dorsey\nZach Dorsey\nJerry Dotson Jr.\nJosette Doughty\nEric Douglas\nBobby Downs\nBrett Dreyer\nOscar Duarte\nMichelle Dugan\nAmy Duke\nDana Duke\nRichard Dunagan\nVallie Dunklin\nJason Dunlap\nJean Ann Dunn\nLesley Dunnagan\nTadd Dunnahoe\nEricka Durham\nChris Dybvig\nAlicia Dye\nBenjamin Dyne\nRon Dysart\nCody D'Alessandro\nErick Eads\nJonathan Easter\nMonte Eastman\nTravis Edds\nJacob Edster\nJames Edwards II\nPaul Edwards\nTyler Eilers\nJanna Ellenburg\nBrad Ellett\nShane Elli\nJake Elliott\nStephen Elliott\nTroy Elliott\nErin Ellis\nShawn Ellis\nBo Embrey\nMyron Emmons Jr.\nMatthew Enkoff\nEmil Enoff Jr.\nTonya Enriquez\nLaura Ensminger\nWilliams Espino\nChristian Estep\nJeremy Estep\nCrystal Evans\nAlisha Fagala\nFred Farndon\nDonovan Farrow\nJonathan Faughtenberry\nGary Favor\nErin Fay\nRob Fell\nCarl Fenderson\nEdgar Fernandez\nGabe Ferrell\nPaul Fesler\nKeri Fieno\nMatt Finney\nNeil Fisher\nChad Fitzgerald\nDerek Flesner\nKevin Flores\nMara Flores\nPete Flores\nDavid Floyd\nChristopher Forcucci\nLeonard Foreman\nPatrick Foreman\nDebbie Forester\nDavid Foshee\nJonathan Fouse\nCassidy Fouts\nBill Fowler\nPhil Fox\nMike Franklin\nBelinda Franko\nGordon Frayne Jr.\nGregory Frazier\nAllen Frederick\nMelissa Freeman\nArmando Frias\nNorris Friend\nPhilip Friesen\nPaula Friess\nSteve Frost\nGilberto Fuentes-Perez\nBobby Furr\nBlaine Galbreath\nKasha Galla\nAngi Gallaway\nCole Gallaway\nNicole Ganaway\nKevin Gant\nFrancisco Gaona\nEliseo Garcia\nLeonel Garcia\nDan Gardner\nTim Garey\nMatt Garlington\nJennifer Garner\nJohnny Garrard Jr.\nBryant Garrett\nDonny Garrett\nAsael Garza\nHerman Garza\nAustin Gaspard\nSarah Gately\nCody Gates", + "page_start": 37, + "page_end": 37, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "HIGHLIGHTS/AWARDS:\nWWW.PAOLI.COM", + "page_start": 28, + "page_end": 28, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "Daniel R. Henry\nChief Operating Officer\nEuronet Services Inc.", + "page_start": 46, + "page_end": 46, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "Vittorio M. Severino\nSenior Vice President, Information Technology", + "page_start": 36, + "page_end": 36, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "Authors\nNicolas Joly is a pre-sales architect with IBM Systems in New York City, New York. His areas of knowledge include software-defined infrastructure, analytics solutions, storage, technical computing, and clustering solutions. He is working with major customers in the finance and telecommunication industry. Before joining IBM US, Nicolas was working for IBM France, where he was a technical sales specialist for analytics and technical computing solutions. Nicolas holds a Master's degree in Computer Science with a major in parallel and distributed computing from Institut Polytechnique de Bordeaux (ENSEIRB-MATMECA), France.\nBoris Litichevsky is a Infrastructure Analyst IV Horizon Blue Cross. He works with RHEL and lately with Red Hat on Power Systems. Boris participated in the IBM Cloud Private PoC. He worked as a Senior Systems Engineer Consultant working with Tivoli Storage Manager (TSM), Commvault Backup solution, VMware and created and configured Linux (RHEL and CentOS) and Wintel servers 2008 and 2012. Boris has 20 years in the financial industry, 16 of which in computer operations and 4 years as a TSM administrator.\nIsmael Solis Moreno is a data scientist and performance analyst for IBM at Mexico Software Lab. He received his Masters from the National Center of Research and Technological Development in Mexico and his PhD from the University of Leeds in the UK. Ismael has participated as technical leader in different projects that were related to big data analytics and machine learning within the IBM and other companies, including the University of Leeds, The UK Datacenter Alliance, and Apollo MIS researching predictive algorithms for Google, Alibaba, and the British Premier League. Ismael has approximately 15 international publications in prestigious computing science journals. He has participated as a speaker in over 25 international conferences related to data science and machine learning, and co-authored patents to improve datacenter energy efficiency by using big data. Ismael has collaborated as researcher in the field of data science at the University of Leeds in the UK, The National University of Defense and Technology, and The University of Aeronautics and Astronautics in China. Ismael's work at IBM is focused on developing machine learning mechanisms to improve the performance of large distributed storage systems by analyzing big data.", + "page_start": 12, + "page_end": 12, + "source_file": "sg248459.pdf" + }, + { + "text": "Existential risk\nIt has been argued AI will become so powerful that humanity may irreversibly lose control of it. This could, as physicist Stephen Hawking stated, \"spell the end of the human race\". [265] This scenario has been common in science fiction, when a computer or robot suddenly develops a human-like \"self-awareness\" (or \"sentience\" or \"consciousness\") and becomes a malevolent character. [q] These sci-fi scenarios are misleading in several ways.\nFirst, AI does not require human-like sentience to be an existential risk. Modern AI programs are given specific goals and use learning and intelligence to achieve them. Philosopher Nick Bostrom argued that if one gives almost any goal to a sufficiently powerful AI, it may choose to destroy humanity to achieve it (he used the example of a paperclip factory manager). [267] Stuart Russell gives the example of household robot that tries to find a way to kill its owner to prevent it from being unplugged, reasoning that \"you can't fetch the coffee if you're dead.\" [268] In order to be safe for humanity, a superintelligence would have to be genuinely aligned with humanity's morality and values so that it is \"fundamentally on our side\". [269]\nSecond, Yuval Noah Harari argues that AI does not require a robot body or physical control to pose an existential risk. The essential parts of civilization are not physical. Things like ideologies, law, government, money and the economy are built on language; they exist because there are stories that billions of people believe. The current prevalence of misinformation suggests that an AI could use language to convince people to believe anything, even to take actions that are destructive. [270]\nThe opinions amongst experts and industry insiders are mixed, with sizable fractions both concerned and unconcerned by risk from eventual superintelligent AI. [271] Personalities such as Stephen Hawking, Bill Gates, and Elon Musk, [272] as well as AI pioneers such as Yoshua Bengio, Stuart Russell, Demis Hassabis, and Sam Altman, have expressed concerns about existential risk from AI.", + "page_start": 18, + "page_end": 18, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Ralph J. Palmieri\nSenior Vice President, Specialty Property", + "page_start": 36, + "page_end": 36, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "2005 (745)\nFred Daugherty\nDonald Davey\nEmily Davis\nJacob Davis\nKhari Davis\nLisa Davis\nRod Davis\nRicky Daw\nIrene Da Rocha\nMario Delao\nAletha Dewbre-King\nHank DeWitt\nBrent Dixon\nDarrell Dollens\nPete Dominguez\nTyler Doolen\nBarney Dosier\nDustin Durkee\nStephen DuBois\nHouston Eagleston\nJoe Earley\nAnthony Earnest\nNate Easter\nMichael Edwards\nWilliam Edwards\nTravis Egner\nEric Eller\nRobert Elliott\nBryan Ellis\nLinda Ellis\nKay Elrod\nAlan Elswick\nJeff Lane Fisher\nMarc Fleischer\nAdam Flores\nMeara Foreman\nDarcie Foster\nJason Fournier\nRicky French\nVictor Frias\nBret Frie\nMike Friend\nRodney Friend\nMindi Friese\nAndy Fritsch\nRachael Fugate\nToby Fullbright\nDennis Gagliardi\nMichael Gallo\nBeau Galloway\nCleab Gamble\nAlma Garcia\nLori Garcia\nTonya Garrett\nFred Gates\nLiz Gerhard\nJosh Gibson\nJohn Gilbert\nRhonda Giles\nDavid Gilliam\nKeith Glasgow\nDavid Glass\nZane Glasscock\nJason Glassey\nMitch Goble\nDave Gocke\nBrian Goins\nHeather Gomez\nAlex Gonzalez\nMartin Gonzalez\nPaula Grace\nBrian Graefnitz\nDaniel Graham\nHenry Granados\nJay Gray\nKenneth Gray\nStephen Gray\nRodney Greathouse\nMarcus C. Green\nShane Green\nTracy Green\nBrady Greer\nDavid Griffith\nBarb Hall\nDon Hall\nMarcus Hall\nMike Hall\nJoe Halstead\nWheeler Hammit\nBuddy Harbison\nRusty Hardin\nLonnie Harl\nDewey Harless\nMike Harless\nNathan Harless\nShanna Harmon\nEarl Harris\nMichelle Harris\nPhyllis Harris\nTom Harris\nDenise E. Hart\nKenneth Hartfield\nSteve Harvath\nRandy Hatfield\nDaniel Hattaway\nTyler Hawkins\nJoe Hays\nWilliam Hays\nBrian Heckert\nFred Hein\nJustin Heinken\nJill Heitert\nDarin Herndon\nCraig Hicks\nEric Higgins\nJohn Highfield\nDonna Hilderbrandt\nRick Hill\nKay Hillabold\nJuan Hinojosa\nArthur Hoehne\nGary Hohenberger\nThomas Holland\nNathan Holloway\nPat Holman\nAlfred Hooper Jr.\nRandy Hooper\nDrew Hopkins\nTim J. House\nTim M. House\nLindsay Houston\nBrian Howard\nDoyle Howard\nKelli Howard\nGreg Howell\nSonny Htoon\nPaul Hudgins\nJeff Huelskamp\nChristine Hughes\nLarry Hughes\nRodney Hughes\nZachary Humphrey\nJason Ille\nBetsy Ireson\nWilliam Ireson\nJohnny Ison\nBryan Jackson\nMike Jackson\nKris Janzen\nBruce Johnson\nGeorge Johnson\nMark Johnson\nP.J. Johnson\nSteve S. Johnson\nKevin Johnston\nLonnie Johnston\nDavid S. Jones\nFred Jones\nMark Jones\nPat Jones\nGreg Jordan\nJessica Jorns\nFrances Jowers\nJoe Juarez\nLarry Justice\nErin Kaiser\nBrandon Kammerer\nKevin Kappes\nEarl Karickhoff\nRobert Keenan\nJohn Keller\nEarnest Kelough\nBrad Kemp\nRon Kendrick\nMike Key\nTommy Kidd\nDonna King\nGary King\nRyan Klein\nMark Knapp", + "page_start": 33, + "page_end": 33, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "a research project about openness of public data in EU local administration\nby Marco Fioretti for the Laboratory of Economics and Management of Scuola Superiore Sant'Anna, Pisa\nThis report is part of the 'Open Data, Open Society' Project financed through the DIME network (Dynamics of Institutions and Markets in Europe, www.dime-eu.org) as part of DIME Work Package 6.8, coordinated by Professor Giulio Bottazzi\n1/34\nCopyright 2011 LEM, Scuola Superiore Sant'Anna. This work is released under a Creative Commons attribution license (http://creativecommons.org/licenses/by/3.0/)\nTable of Contents\n2/34\nCopyright 2011 LEM, Scuola Superiore Sant'Anna. This work is released under a Creative Commons attribution license (http://creativecommons.org/licenses/by/3.0/)", + "page_start": 0, + "page_end": 1, + "source_file": "Open_Data_Report.pdf" + } + ] + }, + { + "references": { + "source_file": "sg248459.pdf", + "query": "When does IBM close its acquisition of Red Hat ?", + "target_page": 20, + "target_passage": " On July 9th, 2019, IBM closed its acquisition of Red Hat, a leader in enterprise Linux and open source technology", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "1.2 Red Hat and IBM\nOn July 9th, 2019, IBM closed its acquisition of Red Hat, a leader in enterprise Linux and open source technology.\nThis acquisition puts Red Hat and IBM in a unique position to unlock the true value of hybrid cloud for your business. By combining the power and flexibility of Red Hat's open hybrid cloud technologies with the scale and depth of IBM innovation and industry expertise, you now have the tools to accelerate your cloud journey.\nIBM and Red Hat worked together for more than 20 years in making open source a competitive advantage for businesses on x86, IBM Power Systems, and IBM z Systemsfi. Together, we are both on a mission to improve open source technology and help your companies capture the business value of the cloud.\n4\nRed Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1\nThis publication describes how Red Hat and IBM can advance your cloud journey and speed growth and innovation for your business by using Red Hat OpenShift on IBM Power Systems.\nNote: Red Hat joins IBM as a distinct unit, preserving the independence and neutrality of Red Hat's open source development heritage and unique development culture. Red Hat's unwavering commitment to open source remains unchanged and it continues to offer customers choice and flexibility.\nChapter 1. Introduction to the Journey to the Cloud: Volume 1\n5\n6\nRed Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1\nChapter 2.\n2", + "page_start": 19, + "page_end": 22, + "source_file": "sg248459.pdf" + }, + { + "text": "Red Hat OpenShift and IBM Cloud Paks on IBM Power Systems Volume 1\nDino Quintero\nRicardo Dobelin Barros\nDaniel Casali\nLuis Ferreira\nAlain Fisher\nFederico Fros\nLuis Daniel Gonzalez\nMiguel Gomez Gonzalez\nMahesh Gurugunti\nRogelio Rivera Gutierrez\nNicolas Joly\nBoris Litichevsky\nIsmael Solis Moreno\nGabriel Padilla\nSudipto Pal\nBogdan Savu\nRichard Wale\nIBM Redbooks\nRed Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1\nMarch 2020\nSG24-8459-00\nNote: Before using this information and the product it supports, read the information in 'Notices' on page vii.", + "page_start": 0, + "page_end": 3, + "source_file": "sg248459.pdf" + }, + { + "text": "First Edition (March 2020)\nThis edition applies to:\n/SM590000 Red Hat OpenShift Container Platform for Power Enterprise V3.11\n/SM590000 Red Hat Enterprise Linux Server release V7.6 (Maipo) for ppc64le\n/SM590000 IBM Virtual I/O Server V3.1.1.0\n/SM590000 IBM Cloud PowerVC Manager V1.4.3.1\n/SM590000 Terraform V0.12.9\n/SM590000 provider.null V2.1.2\n/SM590000 provider.openstack V1.22.0\n' Copyright International Business Machines Corporation 2020. All rights reserved.\nNote to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.", + "page_start": 3, + "page_end": 3, + "source_file": "sg248459.pdf" + }, + { + "text": "Blackiron Data (Blackiron)\nOn April 17, 2013, we closed an agreement to acquire 100% of the common shares of Blackiron for cash consideration of $198 million. Blackiron provides Business Solutions the ability to enhance its suite of enterprise-level data centre and cloud computing services along with fibre-based network connectivity services.", + "page_start": 107, + "page_end": 107, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Red Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1\nBack cover\nISBN 0738458376 SG24-8459-00\nPrinted in U.S.A.", + "page_start": 269, + "page_end": 269, + "source_file": "sg248459.pdf" + }, + { + "text": "5. Enable Red Hat repositories for IBM POWER9:\nfor this system.\nChapter 6. Installing Red Hat OpenShift 3.11 on IBM PowerVC\n129\n130\nRed Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1\n6. Install the latest operating system updates:\nansible -i nodes,lb -a 'yum -y update --security --exclude=cloud-init\\*' [WARNING]: Consider using the yum module rather than running yum. If you need to use command because yum is insufficient you can add warn=False to this command task or set command_warnings=False in ansible.cfg to get rid of this message. mstnode02.domain.example.com | SUCCESS | rc=0 >> Loaded plugins: product-id, search-disabled-repos, subscription-manager 5 package(s) needed (+0 related) for security, out of 5 available Resolving Dependencies --> Running transaction check ---> Package kernel.ppc64le 0:4.14.0-115.14.1.el7a will be installed ... Output truncated ... Installed: kernel.ppc64le 0:4.14.0-115.14.1.el7a Updated: kernel-bootwrapper.ppc64le 0:4.14.0-115.14.1.el7a kernel-tools.ppc64le 0:4.14.0-115.14.1.el7a kernel-tools-libs.ppc64le 0:4.14.0-115.14.1.el7a python-perf.ppc64le 0:4.14.0-115.14.1.el7a Complete!", + "page_start": 144, + "page_end": 145, + "source_file": "sg248459.pdf" + }, + { + "text": "1.1 Introduction\nMost companies started or are contemplating their journey to cloud. Although in recent years the adoption of cloud became much more common place, the scope of what a cloud is or can be also increased. This broadening of possibilities unfortunately added confusion and can result in companies being unsure of how their existing application estate can change to integrate with the cloud model.\nAs such, doubts still exist around how to start and progress on this journey. It is also true that although people understand traditional enterprise applications and more modern cloud-hosted applications, the integration or co-existence of both can prove equally confusing and contradicting.\nRecent industry trends, combined with the new partnership between Red Hat and IBM, seek to bring some clarity to the landscape while providing new modernization opportunities for existing enterprise applications and familiar environments.\nThe main focus of this IBM Redbooks publication relates to IBM Cloud Paks and Red Hat OpenShift, which is hosted on IBM Power Systems. Although individually much can be written about either topic, the relationship this publication highlights is between Red Hat OpenShift and IBM Power Systems.\nWe show what Red Hat OpenShift brings to the IBM Power Systems platform specifically discuss how it can be deployed and added into existing familiar Power System environments, and the benefits that integration and co-existence can provide from an existing enterprise application viewpoint.\nThis publication is a first volume in a planned multi-volume publication over the next 12 - 18 months. Within this initial volume, we explain the fundamental perspective (which is accurate as of the time of this writing) while providing pointers to future direction that will be discussed in future volumes.\nNote: This initial publication relates to Red Hat OpenShift 3.11, because this release was the current OpenShift Container Platform (OCP) release for IBM Power Systems at the time of this writing. IBM and Red Hat intend to deliver Red Hat OpenShift 4 for IBM POWERfi to accelerate agility for enterprise clients through integrated tooling and a feature-rich Kubernetes container platform for cloud-native development on POWER9 and IBM POWER8fi processor-based servers.", + "page_start": 19, + "page_end": 19, + "source_file": "sg248459.pdf" + }, + { + "text": "Help from IBM\nIBM Support and downloads\nibm.com /support\nIBM Global Services\nibm.com /services\n' Copyright IBM Corp. 2020. All rights reserved.\n249\n250\nRed Hat OpenShift and IBM Cloud Paks on IBM Power Systems: Volume 1\n(0.2'spine) 0 . 17'<->0.473 ' 90<->249 p ages", + "page_start": 264, + "page_end": 266, + "source_file": "sg248459.pdf" + }, + { + "text": "5. Enable Red Hat repositories for IBM POWER9:\nansible -i", + "page_start": 144, + "page_end": 144, + "source_file": "sg248459.pdf" + }, + { + "text": "LI Q U I D I T Y A N D CA P I TA L RE S O U R C E S\nIn July 2000 the Company entered into subscription agreements for the sale of 877,946 new common shares of the Company. These agre e m e n t s w e re signed with accredited investors in transactions exempt from registration pursuant to the exemptions provided in Section 4(2) and Regulation D of the Act. Closing with respect to such sale took place on July 14 and August 29, 2000. The purchase price of each share was $6.97. The aggregate amount of proceeds to the Company from the private placement was $6.1 million.\nThe Company leases many of its ATMs under capital lease arrangements that expire between 2001 and 2005. The leases bear interest between 8% and 12% per annum. As of December 31, 2000 the Company owed $11.5 million under such capital lease arrangements. (See Note 15 to the Consolidated Financial Statements - Leases.)\nThe Company expects that its capital re q u i rements will continue in the future but will not be as great as they were in the past, as the Company intends to continue to promote its outsourcing capabilities and re-deploy under- p e rf o rming ATMs currently operating in the network. This strategy should reduce the Company's reliance on capital expenditures in the future as the business continues to gro w. Fixed asset purchases and capital lease payments for 2001 are expected to be approximately $6.2 million in the Company's existing markets, notably We s t e rn and Central E u rope. Acquisitions of related ATM business and investments in new markets in furtherance of the Company's strategy may re q u i re additional capital expenditures.", + "page_start": 21, + "page_end": 21, + "source_file": "NASDAQ_EEFT_2000.pdf" + } + ] + }, + { + "references": { + "source_file": "sg248459.pdf", + "query": "What does an ITMS service provide ?", + "target_page": 30, + "target_passage": "An IT Service Management (ITSM) perspective can provide automation and a global management view, and incorporate the necessary software disciplines that are required to build a solid infrastructure for an enterprise, commercial or not. ", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "Internet storage name service\nThe internet storage name service (iSNS) protocol that is used by a host system to manage iSCSI targets and the automated iSCSI discovery, management, and configuration of iSCSI and FC devices. It was defined in Request for Comments (RFC) 4171.", + "page_start": 799, + "page_end": 799, + "source_file": "sg247938.pdf" + }, + { + "text": "Infrastructure as a Service (IaaS)\nThe delivery of a computer infrastructure, including server functionality, networking functionality, data center functionality, and storage functionality, as an outsourced service.", + "page_start": 262, + "page_end": 262, + "source_file": "sg248459.pdf" + }, + { + "text": "IT Service Management and orchestration\nAn IT Service Management (ITSM) perspective can provide automation and a global management view, and incorporate the necessary software disciplines that are required to build a solid infrastructure for an enterprise, commercial or not.\nThe missing point was the orchestration and the orchestration of all containers and resources around them. Many people think that orchestration and automation are the same thing, but the orchestration is more complex. Automation often is discussed in the context of specific tasks, whereas orchestration refers to the automation of processes and workflows.\nOrchestration deals with the end-to-end process simplify the automation and the administration across specific machines and diverse dependencies (see Figure 2-3). Automation attempts to move people out of the equation whereas orchestration is not about rigid planning, but arranging and coordination of automated tasks, which ultimately results in a consolidated process or workflow. Parts can be automated, but the decision is still human-centric; for example, the definition of which tasks must run, the order of the tasks, role assignments, permission, post-deployment, failure recovery, and scaling.\nFigure 2-3 Where orchestration fits\nFor more information about automation, see 2.4, 'Kubernetes: An open source container orchestration' on page 24.", + "page_start": 29, + "page_end": 29, + "source_file": "sg248459.pdf" + }, + { + "text": "What is Identity and Access Management?\nAWS provides and uses a service called Identity and Access Management (IAM) for authentication and authorization. IAM is used to manage developer accounts and secure the interaction between services and resources.\nIAM\n36", + "page_start": 39, + "page_end": 39, + "source_file": "serverless-core.pdf" + }, + { + "text": "Reliance on Third Party S ervice Providers\nWe have outsourcing arrangements with third parties to provide certain essential components of our business operations to our employees and customers, including payroll, certain facilities or property management functions, call centre support, certain installation and service technicians, certain information technology functions, and invoice printing. Interruptions in these services can adversely affect our ability to service our customers.", + "page_start": 79, + "page_end": 79, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Manage-To\nIn the Manage-To side of Figure 2-7, you see the hybrid IT that includes the foundation, platforms, apps, and tools from different vendors. Because proprietary tools do communicate with each other, you need advancements in infrastructure, management, and development that bring your clouds together.", + "page_start": 33, + "page_end": 33, + "source_file": "sg248459.pdf" + }, + { + "text": "NETWORK SERVICES\nEuronet's Network Services division provides complete solutions for management and outsourcing of distribution channels and transaction processing. These solutions include ATM networks, point-of-sale (POS) services and card management, as well as access to all major payment gateways and mobile operators.", + "page_start": 7, + "page_end": 7, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "8.3.2 Content Management Interoperability Services\nCMIS is an open standard for accessing content management repositories. It is an OASIS specification and it is supported by various applications from different vendors, including IBM (with FileNet P8, Content Manager, and Content Manager OnDemand).\nCMIS provides a common access interface for searching, retrieving, and in the case of document management systems, modifying and deleting documents. It is a web services interface that is implemented in either SOAP web services and REST (Atom) services.\nFor more information about CMIS, see the CMIS page on the OASIS website, the CMIS overview page at the IBM Enterprise Content Manager website, and the technical documentation that is available:\n/SM590000 https://www.oasis-open.org/committees/cmis/\n/SM590000 http://www.ibm.com/software/ecm/cmis.html\n/SM590000 Implementing Web Applications with CM Information Integrator for Content and OnDemand Web Enablement Kit , SG24-6338\n/SM590000 Content Management Interoperability Services for Content Manager OnDemand is installed as part of the IBM Content Navigator installation. For more information, see 'Installing Content Navigator' on page 194.\nWhen you consider implementing your own software on CMIS, remember CMIS is used for accessing document management systems, but not necessarily high-volume report archives, such as Content Manager OnDemand.\nThe methodology of accessing documents is based on folders and subfolders with documents in it (such as in a file system) and partially emulated by Content Manager OnDemand with its different object model. The use of CMIS must be considered as an abstraction layer that might have an impact on throughput and feature exposure. Also, much of the CMIS API is not supported by Content Manager OnDemand (such as the storage and deletion functions).", + "page_start": 227, + "page_end": 227, + "source_file": "sg246915.pdf" + }, + { + "text": "Mobile Backend as a Service (MBaaS)\nA computing model that connects mobile applications to cloud computing services and provides features, such as user management, push notifications, and integration with social networks.", + "page_start": 263, + "page_end": 263, + "source_file": "sg248459.pdf" + }, + { + "text": "Service Location Protocol\nThe Service Location Protocol (SLP) is an internet service discovery protocol that enables computers and other devices to find services in a local area network (LAN) without prior configuration. It was defined in the request for change (RFC) 2608.", + "page_start": 806, + "page_end": 806, + "source_file": "sg247938.pdf" + } + ] + }, + { + "references": { + "source_file": "Publicdomain.pdf", + "query": "What are the two distinct public domain tools support by Creative Commons ?", + "target_page": 1, + "target_passage": "Creative Commons supports two distinct public domain tools, the CC0 Public Domain Dedication and the Public Domain Mark.", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "Creative Commons makes sharing easy", + "page_start": 0, + "page_end": 0, + "source_file": "Publicdomain.pdf" + }, + { + "text": "About Us\nCreative Commons (CC) is the global nonprofit organization behind the CC Licenses and public domain tools, which power open sharing on popular platforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. Since 2002, the CC Licenses have served as an alternative to traditional copyright, providing a simple, standardized, and legal way for individuals and institutions to freely share images, music, research, educational resources, and cultural artifacts.", + "page_start": 1, + "page_end": 1, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "What Is Creative Commons?\nCreative Commons is a global nonprofit organization dedicated to supporting an open and accessible Internet that is enriched with free knowledge and creative resources for people around the world to use, share, and cultivate.\nOur easy-to-use licenses provide a simple, standardized way to give the public permission to share and use your creative work - on conditions of your choice. CC licenses let you change your copyright terms from the default of 'all rights reserved' to 'some rights reserved.'\nMillions of people use CC licenses on some of the world's most popular platforms for user-generated content. When you use a CC license to share your photos, videos, or blog, your creation joins a globally accessible pool of resources that includes the work of artists, educators, scientists, and governments.\nCreative Commons has waived all copyright and related or neighboring rights to this guide using the CC0 Public Domain Dedication.\nPublic domain works are valuable because anyone can freely build upon, enhance, and reuse them for any purposes without restriction under copyright or database law.\nThat's why it's important for creators to have a clear and legally robust way to place their works in the public domain as completely as possible, and it's also important for publishers and archives to have a standardized way to identify works that are already in the public domain.\nCreative Commons supports two distinct public domain tools, the CC0 Public Domain Dedication and the Public Domain Mark . Creative Commons copyright licenses help authors manage their copyright on terms they choose. Conversely, CC0 enables authors and copyright owners who want to dedicate their works to the worldwide public domain to do so, and PDM facilitates the labeling and discovery of works that are already free of known copyright restrictions.", + "page_start": 0, + "page_end": 0, + "source_file": "Publicdomain.pdf" + }, + { + "text": "Public Domain Mark\nUse this tool if you have identified a work that is free of known copyright restrictions.", + "page_start": 0, + "page_end": 0, + "source_file": "Publicdomain.pdf" + }, + { + "text": "Permissively licensed works\nThere are books that have been permissively licensed in an easily identifiable way, such as works placed under Creative Commons (CC) licenses. Such works explicitly allow particular uses of works subject to various responsibilities (e.g., requiring attribution by the user in their follow-on use).\nWhile such works could be candidates for inclusion in a books data commons, their inclusion depends on whether the license's terms can be complied with in the context of AI training. For instance, in the context of CC licensed works, there are requirements for proper attribution across all licenses (the CC tools Public Domain Dedication (CC0) and Public Domain Mark (PDM) are not licenses and do not require attribution). 18", + "page_start": 9, + "page_end": 9, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "ALSO FOR …\nthe work that is already in the Public Domain.\nFor those who want to waive their rights from copyright protection, use CC0 (\"CC Zero\").", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "The CC0 Public Domain Dedication\nUse this universal tool if you are a holder of copyright or database rights, and wish to waive all your rights to the work worldwide.\nBy using CC0, you waive all copyright and related rights together with all associated claims and causes of action with respect to this work to the extent possible under the law.\nApplying CC0 to your work is easy. Simply visit the CC0 chooser (http://creativecommons.org/choose/zero) which will lead you through the process. When completed, you will be provided with HTML code that you can copy and paste into your website.\nYou let others copy, modify, distribute, and perform the work, even for commercial purposes, all without asking permission.\nWorks marked with the Public Domain Mark have been identified as being free of known restrictions under copyright law, including all related and neighboring rights. Anyone can copy, modify, distribute, and perform such works, even for commercial purposes, all without asking permission.\nApplying the PDM to a work is easy. Simply visit the PDM chooser (http://creativecommons.org/choose/mark) which will lead you through the proces. When completed, you will be provided with the HTML code that you can copy and paste into your website.\nCreative Commons does not recommend this tool for works that are restricted by copyright laws in one or more jurisdictions. Consult with your legal advisor if you are unsure whether you should use the PDM for a certain work.", + "page_start": 0, + "page_end": 0, + "source_file": "Publicdomain.pdf" + }, + { + "text": "THREE-LAYER DESIGN\nCreative Commons (CC) license has three layers:\n\"Legal Code\" (base layer): contains terms and conditions to be used by lawyers and legally applicable in court.\n\"Human Readable\" (commons deeds): contain the summary of the legal code and key terms.\n\"Machine Readable\": contains HTML or codes for machines to recognize a work is available under a Creative Commons license.", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "Creative Commons\nPO Box 1866 Mountain View CA 94042 USA +1 415 429 6753 info@creativecommons.org", + "page_start": 11, + "page_end": 11, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "NOW, SHARE YOUR WORK!\nhttps://creativecommons.org/choose/\nTexts are adapted from CC Certification for Educators. CC BY license.\nBY, SA, NC, ND icons, CC BY, CC BY-SA, CC BY-NC, CC BY-NC-SA, CC BY-ND, and CC BY-NC-ND buttons are trademark of Creative Commons, and subject to their policies. 3-layer design of CC license image is taken from CC Certification for Educators. CC BY license. Line, icons, and gradients are from Canva, and subject to their policies.\nBY\nSA\nND\nNC", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + } + ] + }, + { + "references": { + "source_file": "Publicdomain.pdf", + "query": "What is Creative Commons ?", + "target_page": 1, + "target_passage": " Creative Commons is a global nonprofit organization dedicated to supporting an open and accessible Internet that is enriched with free knowledge and creative resources for people around the world to use, share, and cultivate.", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "About Us\nCreative Commons (CC) is the global nonprofit organization behind the CC Licenses and public domain tools, which power open sharing on popular platforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. Since 2002, the CC Licenses have served as an alternative to traditional copyright, providing a simple, standardized, and legal way for individuals and institutions to freely share images, music, research, educational resources, and cultural artifacts.", + "page_start": 1, + "page_end": 1, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "What Is Creative Commons?\nCreative Commons is a global nonprofit organization dedicated to supporting an open and accessible Internet that is enriched with free knowledge and creative resources for people around the world to use, share, and cultivate.\nOur easy-to-use licenses provide a simple, standardized way to give the public permission to share and use your creative work - on conditions of your choice. CC licenses let you change your copyright terms from the default of 'all rights reserved' to 'some rights reserved.'\nMillions of people use CC licenses on some of the world's most popular platforms for user-generated content. When you use a CC license to share your photos, videos, or blog, your creation joins a globally accessible pool of resources that includes the work of artists, educators, scientists, and governments.\nCreative Commons has waived all copyright and related or neighboring rights to this guide using the CC0 Public Domain Dedication.\nPublic domain works are valuable because anyone can freely build upon, enhance, and reuse them for any purposes without restriction under copyright or database law.\nThat's why it's important for creators to have a clear and legally robust way to place their works in the public domain as completely as possible, and it's also important for publishers and archives to have a standardized way to identify works that are already in the public domain.\nCreative Commons supports two distinct public domain tools, the CC0 Public Domain Dedication and the Public Domain Mark . Creative Commons copyright licenses help authors manage their copyright on terms they choose. Conversely, CC0 enables authors and copyright owners who want to dedicate their works to the worldwide public domain to do so, and PDM facilitates the labeling and discovery of works that are already free of known copyright restrictions.", + "page_start": 0, + "page_end": 0, + "source_file": "Publicdomain.pdf" + }, + { + "text": "Creative Commons makes sharing easy", + "page_start": 0, + "page_end": 0, + "source_file": "Publicdomain.pdf" + }, + { + "text": "THREE-LAYER DESIGN\nCreative Commons (CC) license has three layers:\n\"Legal Code\" (base layer): contains terms and conditions to be used by lawyers and legally applicable in court.\n\"Human Readable\" (commons deeds): contain the summary of the legal code and key terms.\n\"Machine Readable\": contains HTML or codes for machines to recognize a work is available under a Creative Commons license.", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "A Note from Leadership\nCC staff photos are licensed under CC BY 4.0.\n2023 was a busy year at Creative Commons. Our Open Culture program and Open Climate Campaign entered their third and second years, respectively. We hosted our first in-person CC Global Summit since 2019 in Mexico City. We held critical consultations and open panels on AI, copyright, and the CC Licenses, cultural heritage, education, and science; and we launched our Open Infrastructure Circle in an effort to ensure the CC Licenses are funded well into the future.\nWe also marked transitions in leadership. At the end of December, Catherine Stihler concluded her time as Chief Executive Officer (CEO) at Creative Commons, and I transitioned in as Interim. In March 2024, I was appointed CC's permanent CEO. I look forward to working closely with our Board of Directors, staff, and larger community on the critical work that awaits us in 2024 .", + "page_start": 2, + "page_end": 2, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "NOW, SHARE YOUR WORK!\nhttps://creativecommons.org/choose/\nTexts are adapted from CC Certification for Educators. CC BY license.\nBY, SA, NC, ND icons, CC BY, CC BY-SA, CC BY-NC, CC BY-NC-SA, CC BY-ND, and CC BY-NC-ND buttons are trademark of Creative Commons, and subject to their policies. 3-layer design of CC license image is taken from CC Certification for Educators. CC BY license. Line, icons, and gradients are from Canva, and subject to their policies.\nBY\nSA\nND\nNC", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "Creative Commons\nPO Box 1866 Mountain View CA 94042 USA +1 415 429 6753 info@creativecommons.org", + "page_start": 11, + "page_end": 11, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "SIX LICENSES\nCC BY (\"Attribution\") allows people to use the work for any purpose (even commercially and even in modified form) as long as they give attribution to the creator.\nCC BY-SA (\"Attribution-ShareAlike\") allows people to use the work for any purpose (even commercially and even in modified form), as long as they give attribution to the creator and make any adaptations they share with others available under the same or a compatible license.\nCC BY-NC (\"Attribution-NonCommercial\") allows people to use the work for noncommercial purposes only, and only as long as they give attribution to the creator.\nCC BY-NC-SA (\"Attribution-NonCommercial-ShareAlike\") allows people to use the work for noncommercial purposes only, and only as long as they give attribution to the creator and make any adaptations they share with others available under the same or a compatible license.\nCC BY-ND (\"Attribution-NoDerivative\") allows people to use the unadapted work for any purpose (even commercially), as long as they give attribution to the creator.\nCC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the unadapted work for noncommercial purposes only, and only as long as they give attribution to the licensor.", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "Permissively licensed works\nThere are books that have been permissively licensed in an easily identifiable way, such as works placed under Creative Commons (CC) licenses. Such works explicitly allow particular uses of works subject to various responsibilities (e.g., requiring attribution by the user in their follow-on use).\nWhile such works could be candidates for inclusion in a books data commons, their inclusion depends on whether the license's terms can be complied with in the context of AI training. For instance, in the context of CC licensed works, there are requirements for proper attribution across all licenses (the CC tools Public Domain Dedication (CC0) and Public Domain Mark (PDM) are not licenses and do not require attribution). 18", + "page_start": 9, + "page_end": 9, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "FOUR ELEMENTS\nBY (\"Attribution\"): users must credit the author of the work they are using.\nSA (\"ShareAlike\"): adaptations based on this work must be licensed under the same license.\nNC (\"NonCommercial\"): the work is only available to be used for noncommercial purposes.\nND (\"NoDerivative\"): reusers making cannot share adaptations of the work.", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + } + ] + }, + { + "references": { + "source_file": "Publicdomain.pdf", + "query": "How to apply the PDM to my work ?", + "target_page": 1, + "target_passage": "Simply visit the PDM chooser (http://creativecommons.org/choose/mark) which will lead you through the proces. When completed, you will be provided with the HTML code that you can copy and paste into your website.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "The CC0 Public Domain Dedication\nUse this universal tool if you are a holder of copyright or database rights, and wish to waive all your rights to the work worldwide.\nBy using CC0, you waive all copyright and related rights together with all associated claims and causes of action with respect to this work to the extent possible under the law.\nApplying CC0 to your work is easy. Simply visit the CC0 chooser (http://creativecommons.org/choose/zero) which will lead you through the process. When completed, you will be provided with HTML code that you can copy and paste into your website.\nYou let others copy, modify, distribute, and perform the work, even for commercial purposes, all without asking permission.\nWorks marked with the Public Domain Mark have been identified as being free of known restrictions under copyright law, including all related and neighboring rights. Anyone can copy, modify, distribute, and perform such works, even for commercial purposes, all without asking permission.\nApplying the PDM to a work is easy. Simply visit the PDM chooser (http://creativecommons.org/choose/mark) which will lead you through the proces. When completed, you will be provided with the HTML code that you can copy and paste into your website.\nCreative Commons does not recommend this tool for works that are restricted by copyright laws in one or more jurisdictions. Consult with your legal advisor if you are unsure whether you should use the PDM for a certain work.", + "page_start": 0, + "page_end": 0, + "source_file": "Publicdomain.pdf" + }, + { + "text": "Understanding\nbefore licensing your work", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "Permissively licensed works\nThere are books that have been permissively licensed in an easily identifiable way, such as works placed under Creative Commons (CC) licenses. Such works explicitly allow particular uses of works subject to various responsibilities (e.g., requiring attribution by the user in their follow-on use).\nWhile such works could be candidates for inclusion in a books data commons, their inclusion depends on whether the license's terms can be complied with in the context of AI training. For instance, in the context of CC licensed works, there are requirements for proper attribution across all licenses (the CC tools Public Domain Dedication (CC0) and Public Domain Mark (PDM) are not licenses and do not require attribution). 18", + "page_start": 9, + "page_end": 9, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "2.3 Implementing a Content Manager OnDemand instance on a multiplatform UNIX environment\nIn this section, we describe how to set up a single instance in a Content Manager OnDemand for a multiplatform UNIX environment. Always refer to the product documentation of your release for the specific steps to follow.", + "page_start": 42, + "page_end": 42, + "source_file": "sg246915.pdf" + }, + { + "text": "16.3.2 Applying holds\nUsers can apply holds to a document or documents that are defined to an application group with the enabled Enhanced Retention Management feature. To apply a hold, select a document and click Actions → Holds → Apply Hold , as shown in Figure 16-8 on page 362.\nChapter 16. Enhanced Retention Management\n361\n362\nIBM Content Manager OnDemand Guide\nThis action prevents the deletion of documents in Content Manager OnDemand regardless of the documents' expiration dates.\nFigure 16-8 Highlighting and selecting documents to apply holds", + "page_start": 384, + "page_end": 385, + "source_file": "sg246915.pdf" + }, + { + "text": "10.6.1 Submit select tables for preparing the general submission\n1. Log in as PM.\n2. Click on 'View Inventories Progress' under sub menu 'Submission Management'.\n3. The 'View Inventories Progress' screen appears.\n4. Select the appropriate inventory by clicking the box under column 'Working inventory' (figure 68, a).\n*** Note: The selected inventory year to be submitted should be in status 'approved' (figure 68, b).\n5. Click on 'Work on Inventories' under Submission Management (figure 68, c).\nThis opens the Submit Inventory initial screen (figure 69).\n6. Click the inventory year to be submitted (figure 69, a).\n7. Press the 'Generate Official Submission' button (figure 69, c).\nFigure 69. Submit select tables for the preparation for the general submission\nFigure 68. View Inventories Progress screen - select inventory for the preparation for the general submission\nNAIIS-User-Manual.Docx\nPage 42\n10/02/2013\nOnce the 'Generate Official Submission' button has been pressed the 'Submit Inventory' initial screen for selecting the tables appears (figure 70).\n8. Select or deselect by clicking the appropriate year(s) under 'Inventory Years' box (figure 70, c) or the sector grids under the 'Table' box (figure 70, d) to generate the official submission.\n9. Press the 'Submit' button (figure 70, e). An official submission will be generated in the NAIIS system.\nFigure 70. Submit - select tables and grids for the general submission\nNAIIS-User-Manual.Docx\nPage 43\n10/02/2013", + "page_start": 41, + "page_end": 42, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "Completed:\nBefore starting this exercise you MUST have completed all of the topics in the chapter Creating Charts…\n Open the workbook called PE_Creating Charts.xlsx (it can be found in the same folder as the student files)\n\n Create a Clustered Column chart showing the sales of products for the months of January through to June\n\n Drag the chart down below the data and resize it so that it is the same width as the data, keeping the proportions as far as possible\n\n Change the chart type to 3-D Stacked Column and change the chart title to Sales\nThe chart should appear as shown in sample A on the following page...\n\n Create a Pie in 3-D chart of the products and their totals then place it on its own chart sheet called Product Sales\n\n Change the Chart Title to Product Sales\n\n Change the layout to Layout 6\nThe chart should appear as shown in sample B on the following page...\n\n Print the pie chart\n\n Use the Save As command to save the workbook as PE_Creating Charts (Completed).xlsx\n\nFiles required for exercise:\nPE_Creating Charts.xlsx\nFiles/work created by student:\nPE_Creating Charts (Completed).xlsx, 1 printed copy of the Product Sales chart\nExercise Completed:\n\n© Watsonia Publishing\nPage 55\nChapter 10 - Practice Exercise\nMicrosoft Excel 2013 - Level 1", + "page_start": 58, + "page_end": 59, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Article\ncredit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.\n© The Author(s) 2025", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed3.pdf" + }, + { + "text": "What is the di/fference between CC0 and the Public Domain Mark?\nCC0 ('CC Zero') is intended for use only by authors or holders of copyright and related rights (including database rights), in connection with works that are still subject to those rights in one or more countries.\nWhen CC0 is applied to a work, copyright and related rights are relinquished worldwide, making the work free from those restrictions to the greatest extent possible.\nThe Public Domain Mark (PDM) is used to label works that are already free of known copyright restrictions. Unlike CC0, PDM doesn't change the copyright status of a work.\nPDM can be used by anyone, and is intended for use with works that are already free of known copyright restrictions throughout the world.", + "page_start": 0, + "page_end": 0, + "source_file": "Publicdomain.pdf" + }, + { + "text": "Completed:\nBefore starting this exercise you MUST have completed all of the topics in the chapter The Quick Analysis Tools…\n Open the workbook PE_Quick Analysis.xlsx (it can be found in the same folder as the student files)\n\n Use the Quick Analysis tools to apply a colour scale to the data in the worksheet\n\n Use the Quick Analysis tools to create a chart for the Overheads data. This chart should be a clustered column chart that has the column headings as the x axis, and displays the legend at the bottom of the chart. Make the chart title Cost of Overheads .\n\n Reposition the chart below the data\n\n Use the Quick Analysis tools to create Sparklines for the Qtr1 to Qtr4 and Total columns for Overheads\nYour worksheet should appear as shown on the following page…\n\n Use the Save As command to save the workbook as PE_Quick Analysis (Completed).xlsx\n\nITTraining@sgul.ac.uk\nPage 38\nSt. George's Information Services\nMicrosoft Excel", + "page_start": 41, + "page_end": 41, + "source_file": "Excel Training Manual 1.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia4.pdf", + "query": "Which rivers flow through Lyon?", + "target_page": 1, + "target_passage": "It is located at the confluence of the rivers Rhône and Saône, ", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "Maps\nNetwork of highways around Lyon\nPublic transport map", + "page_start": 19, + "page_end": 19, + "source_file": "wikipedia4.pdf" + }, + { + "text": "Lyon [c] (Franco-Provençal: Liyon ) is the second-largest city in France by urban area and the third largest by city limits. [14] It is located at the confluence of the rivers Rhône and Saône, to the northwest of the French Alps, 391 km (243 mi) southeast of Paris, 278 km (173 mi) north of Marseille, 113 km (70 mi) southwest of Geneva, Switzerland, 58 km (36 mi) northeast of Saint-Étienne.\nThe City of Lyon had a population of 522,250 at the Jan. 2021 census within its small municipal territory of 48 km 2 (19 sq mi), [15] but together with its suburbs and exurbs the Lyon metropolitan area had a population of 2,308,818 that same year, [7] the second most populated in France. Lyon and 58 suburban municipalities have formed since 2015 the Metropolis of Lyon, a directly elected metropolitan authority now in charge of most urban issues, with a population of 1,424,069 in 2021. [16] Lyon is the prefecture of the Auvergne-Rhône-Alpes region and seat of the Departmental Council of Rhône (whose jurisdiction, however, no longer extends over the Metropolis of Lyon since 2015).\nThe capital of the Gauls during the Roman Empire, Lyon is the seat of an archbishopric whose holder bears the title of Primate of the Gauls. Lyon became a major economic hub during the Renaissance. The city is recognised for its cuisine and gastronomy, as well as historical and architectural landmarks; as such, the districts of Old Lyon, the Fourvière hill, the Presqu'île and the slopes of the Croix-Rousse are inscribed on the UNESCO World Heritage List. Lyon was historically an important area for the production and weaving of silk. Lyon played a significant role in the history of cinema since Auguste and Louis Lumière invented the cinematograph there. The city is also known for its light festival, the Fête des lumières, which begins every 8 December and lasts for four days, earning Lyon the title of \"Capital of Lights\".", + "page_start": 0, + "page_end": 0, + "source_file": "wikipedia4.pdf" + }, + { + "text": "See also\nGeography portal\nEurope portal\nEuropean Union portal\nFrance portal\nList of films set in Lyon\nList of streets and squares in Lyon\nMères of France\nMontchat\nOccupation of Saint-Nizier church by Lyon prostitutes", + "page_start": 20, + "page_end": 20, + "source_file": "wikipedia4.pdf" + }, + { + "text": "Ancient Lyon\nAccording to the historian Dio Cassius, in 43 BC, the Roman Senate ordered the creation of a settlement for Roman refugees of war with the Allobroges. These refugees had been expelled from Vienne and were now encamped at the confluence of the Saône and Rhône rivers. The foundation was built on Fourvière hill and officially called Colonia Copia Felix Munatia , a name invoking prosperity and the blessing of the gods. The city became increasingly referred to as Lugdunum (and occasionally Lugudunum [25] ). [26] The earliest translation of this Gaulish place-name as \"Desired Mountain\" is offered by the 9th-century Endlicher Glossary . [27] In contrast, some modern scholars have proposed a Gaulish hill-fort named Lug[o]dunon, after the Celtic god Lugus (cognate with Old Irish Lugh , Modern Irish Lú ), and dúnon (hillfort).\nThe Romans recognised that Lugdunum's strategic location at the convergence of two navigable rivers made it a natural communications hub. The city became the starting point of main Roman roads in the area, and it quickly became the capital of the province, Gallia Lugdunensis. Two Emperors were born in this city: Claudius, whose speech is preserved in the Lyon Tablet in which he justifies the nomination of Gallic Senators, and Caracalla.\nCoordinates: 45°46'N 4°50'E", + "page_start": 1, + "page_end": 1, + "source_file": "wikipedia4.pdf" + }, + { + "text": "External links\nOfficial website (http://www.lyon.fr)(in French)\nVisit Lyon, the official website for tourism in France (https://en.visiterlyon.com/)\nLyon's English Language News and Information (https://thisislyon.fr/)\nRues de Lyon (https://www.ruesdelyon.net/) Streets, Places, Monuments (in French)\nOld maps of Lyon (http://historic-cities.huji.ac.il/france/lyon/lyon.html) Archived (https://web.archive.org/we b/20210116220537/http://historic-cities.huji.ac.il/france/lyon/lyon.html) 16 January 2021 at the Wayback Machine, Historic cities site (http://historic-cities.huji.ac.il/historic_cities.html) Archived (https://web.archive. org/web/20220325051637/http://historic-cities.huji.ac.il/historic_cities.html) 25 March 2022 at the Wayback Machine, The National Library of Israel\nRetrieved from \"https://en.wikipedia.org/w/index.php?title=Lyon&oldid=1267625203\"", + "page_start": 24, + "page_end": 24, + "source_file": "wikipedia4.pdf" + }, + { + "text": "Prefecture and commune\nSkyline of Lyon in La Part-Dieu\nBasilica of NotreDame de Fourvière\nPlace des Terreaux with the Fontaine Bartholdi\nParc de la Tête d'or\nConfluence District\nVieux Lyon\nPont Lafayette\nCoat of arms\nMotto(s): Avant, avant, Lion le melhor (old Franco-Provençal for \"Forward, forward, Lyon the best\") [a] Virtute duce, comite fortuna (\"With virtue as guide and fortune as companion\") [b]\nLocation of Lyon\nThe name of the city has taken the forms Lugdon , Luon , and since the 13th century, Lyon . The Gallic Lugdun or Lugdunon that was Latinized in Roman as Lugdunum is composed of two words. The first may be the name of the Celtic god Lug (in charge of order and law), or the derived word lugon , meaning \"crow\" (the crow being the messenger of Lug), but might also be another word lug , meaning \"light\". The second is dunos ('fortress', 'hill'). The name thus may designate the hill of Fourvière, on which the ancient city of Lyon is founded, but could mean \"hill of the god Lug\", \"hill of the crows\" or \"shining hill\". [21] [22]\nAlternatively Julius Pokorny associates the first part of the word with the Indo-European radical * lūg ('dark, black, swamp'), the basis of the toponyms Ludza in Latvia, Lusatia in Germany (from Sorbian Łužica ), and several places in the Czech Republic named Lužice; [23] it could then also be compared to Luze in Franche-Comté and various hydronyms such as Louge.\nFurther down, in the current Saint-Vincent district, was the Gallic village of Condate, probably a simple hamlet of sailors or fishermen living on the banks of the Saône. Condate is a Gallic word meaning \"confluence\", from which the Confluence district gets its name.\nIn Roman times the city was called Caput Galliæ , meaning \"capital of the Gauls\". As an homage to this title, the Archbishop of Lyon is still called the Primate of Gaul.", + "page_start": 0, + "page_end": 1, + "source_file": "wikipedia4.pdf" + }, + { + "text": "Commune\nLike Paris and Marseille, the commune (municipality) of Lyon is divided into a number of municipal arrondissements, each of which is identified by a number and has its own council and town hall. Five arrondissements were originally created in 1852, when three neighbouring communes (La Croix-Rousse, La Guillotière, and Vaise) were annexed by Lyon. Between 1867 and 1959, the third arrondissement (which originally covered the whole of the Left Bank of the Rhône) was split three times, creating a new arrondissement in each case. Then, in 1963, the commune of Saint-Rambert-l'Île-Barbe was annexed to Lyon's fifth arrondissement. A year later, in 1964, the fifth was split to create Lyon's 9th - and, to date, final arrondissement. Within each arrondissement, the recognisable quartiers or neighbourhoods are:\n1st arrondissement: Slopes of La Croix-Rousse, Terreaux, Martinière/St-Vincent\n2nd arrondissement: Cordeliers, Bellecour, Ainay, Perrache, Confluence, SainteBlandine\n3rd arrondissement: Guillotière (north), Préfecture, Part-Dieu, Villette, Dauphiné/Sans Souci, Montchat, Grange Blanche (north), Monplaisir (north)\n4th arrondissement: Plateau de la Croix-Rousse, Serin\n5th arrondissement: Vieux Lyon (Saint-Paul, Saint-Jean, Saint-Georges), Saint-Just, Saint-Irénée, [44] Fourvière, Point du Jour, Ménival, Battières, Champvert (south)\n6th arrondissement: Brotteaux, Bellecombe, Parc de la Tête d'or, Cité Internationale\n7th arrondissement: Guillotière (south), Jean Macé, Gerland\n8th arrondissement: Monplaisir (south), Bachut, États-Unis, Grand Trou/Moulin à Vent, Grange Blanche (south), Laënnec, Mermoz, Monplaisir-la-Plaine\n9th arrondissement: Vaise, Duchère, Rochecardon, St-Rambert-l'Île-Barbe, Gorge de Loup, Observance, Champvert (north)\nMap of the City of Lyon divided into 9 arrondissements\nGeographically, Lyon's two main rivers, the Saône and the Rhône, divide the arrondissements into three groups:", + "page_start": 6, + "page_end": 7, + "source_file": "wikipedia4.pdf" + }, + { + "text": "References\n32. Pierre Edmond DESVIGNES. \"Quartier renaissance Lyon : Vieux Lyon, quartier ancien et secteur sauvegarde Lyon\" (https://web.archive.org/web/20110119152753/http://www.vieux-lyon.org/lyon-epoque-renaissance_f01 150.htm). Vieux-lyon.org. Archived from the original (http://www.vieux-lyon.org/lyon-epoque-renaissance_f011 50.htm) on 19 January 2011. Retrieved 3 April 2011.\n33. \"CHRD Lyon\" (https://web.archive.org/web/20110124140355/http://www.chrd.lyon.fr/chrd/sections/fr/pied/engli sh_1). Chrd.lyon.fr . 2017. Archived from the original (http://www.chrd.lyon.fr/chrd/sections/fr/pied/english_1) on 24 January 2011. Retrieved 21 December 2017.\n34. Cosgrove, Michael (4 June 2009). \"Lyon: The Resistance and Deportation Museum\" (http://www.digitaljournal. com/article/273644). Digitaljournal.com .\n35. (in French) Georges Duby (ed), Histoire de la France : Dynasties et révolutions, de 1348 à 1852 (vol. 2), Larousse, 1999 p. 53 ISBN 2-03-505047-2\n36. \"Lyon, France: Local Transport\" (http://www.lonelyplanet.com/france/burgundy-and-the-rhone/lyon/transport/g etting-around/local-transport). Lonely Planet. Retrieved 2 February 2017.\n37. \"Historic Site of Lyon\" (https://whc.unesco.org/en/list/872/). unesco.org . UNESCO World Heritage Centre. Retrieved 31 July 2015.", + "page_start": 22, + "page_end": 22, + "source_file": "wikipedia4.pdf" + }, + { + "text": "Modern Lyon\n, 1 = Timeline of Lyon. , 1 = Historical affiliations. , 1 = Roman Empire (Gallia Lugdunensis), 43. BC-286 Western Roman Empire, 1 = BC-286 Western Roman Empire. , 1 = Kingdom of the Burgundians, 411-534. , 1 = Francia, 534-843. , 1 = Middle Francia, 843-855. , 1 = Lotharingia, 855-879. , 1 = Lower Burgundy, 879-933. , 1 = Kingdom of Arles, 933-1312. , 1 = Kingdom of France (Lyonnais), 1312-. 1792, 1 = . , 1 = Counter-revolutionary, 1793. , 1 = French First Republic, 1793-1804. , 1 = First French Empire, 1804-1814. , 1 = Kingdom of France, 1814-1815. , 1 = First French Empire, 1815. , 1 = Kingdom of France, 1815-1830. , 1 = Kingdom of France, 1830-1848. , 1 = French Second Republic, 1848-1852. , 1 = Second French Empire, 1852-1870. , 1 = French Third Republic, 1870-1940\nand supported the Girondins. The city was besieged by Revolutionary armies for over two months before it surrendered in October 1793. Many buildings were destroyed, especially around the Place Bellecour, and Jean-Marie Collot d'Herbois and Joseph Fouché administered the execution of more than 2,000 people. The Convention ordered that its name be changed to \"Liberated City\", and a plaque was erected that proclaimed \"Lyons made war on Liberty; Lyons no longer exists\". A decade later, Napoleon ordered the reconstruction of all the buildings demolished during that period.\nLyon under siege in 1793\nThe convention was not the only target within Lyon during the French Revolution. After the Convention faded into history, the French Directory appeared and days after the 4 September 1797 Coup of 18 Fructidor, a Directory's commissioner was assassinated in Lyon.\nThe city became an important industrial town in the 19th century. In 1831 and 1834, the canuts (silk workers) of Lyon staged two major uprisings for better working conditions and pay. In 1862, the first of Lyon's extensive network of funicular railways began operation.\nMassacre during the Canut rebellion of 1834", + "page_start": 2, + "page_end": 3, + "source_file": "wikipedia4.pdf" + }, + { + "text": "Demographics\nThe population of the city (commune) of Lyon proper was 522,250 at the January 2021 census. [15] As of 2011, 14% of its population was born outside Metropolitan France. [67]", + "page_start": 16, + "page_end": 16, + "source_file": "wikipedia4.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia4.pdf", + "query": "How big was Lyon's population in 2022? ", + "target_page": 2, + "target_passage": "Population (2022) 520,774", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Demographics\nThe population of the city (commune) of Lyon proper was 522,250 at the January 2021 census. [15] As of 2011, 14% of its population was born outside Metropolitan France. [67]", + "page_start": 16, + "page_end": 16, + "source_file": "wikipedia4.pdf" + }, + { + "text": "Lyon [c] (Franco-Provençal: Liyon ) is the second-largest city in France by urban area and the third largest by city limits. [14] It is located at the confluence of the rivers Rhône and Saône, to the northwest of the French Alps, 391 km (243 mi) southeast of Paris, 278 km (173 mi) north of Marseille, 113 km (70 mi) southwest of Geneva, Switzerland, 58 km (36 mi) northeast of Saint-Étienne.\nThe City of Lyon had a population of 522,250 at the Jan. 2021 census within its small municipal territory of 48 km 2 (19 sq mi), [15] but together with its suburbs and exurbs the Lyon metropolitan area had a population of 2,308,818 that same year, [7] the second most populated in France. Lyon and 58 suburban municipalities have formed since 2015 the Metropolis of Lyon, a directly elected metropolitan authority now in charge of most urban issues, with a population of 1,424,069 in 2021. [16] Lyon is the prefecture of the Auvergne-Rhône-Alpes region and seat of the Departmental Council of Rhône (whose jurisdiction, however, no longer extends over the Metropolis of Lyon since 2015).\nThe capital of the Gauls during the Roman Empire, Lyon is the seat of an archbishopric whose holder bears the title of Primate of the Gauls. Lyon became a major economic hub during the Renaissance. The city is recognised for its cuisine and gastronomy, as well as historical and architectural landmarks; as such, the districts of Old Lyon, the Fourvière hill, the Presqu'île and the slopes of the Croix-Rousse are inscribed on the UNESCO World Heritage List. Lyon was historically an important area for the production and weaving of silk. Lyon played a significant role in the history of cinema since Auguste and Louis Lumière invented the cinematograph there. The city is also known for its light festival, the Fête des lumières, which begins every 8 December and lasts for four days, earning Lyon the title of \"Capital of Lights\".", + "page_start": 0, + "page_end": 0, + "source_file": "wikipedia4.pdf" + }, + { + "text": "Population of Lyon (commune) (within 2020 borders)\n±% p.a. = -0.03%. 1872, Year = . 1872, Pop. = . 1872, ±% p.a. = \nAll figures come from population censuses. Figures from 1911 to 1936 (incl.) are the redressed figures calculated by INSEE to correct the overestimated population of Lyon published by the municipal authorities at the time (10,000s of false residents had been added by the municipal authorities to artificially inflate the population figures and remain the 2nd largest city of France ahead of Marseille). [68] The 1906 figure is the one published by the municipal authorities, probably already inflated, but not corrected by INSEE because the overestimate was smaller than 10,000. Source: EHESS [69] and INSEE [15]\nThe city of Lyon and 58 suburban municipalities have formed since 2015 the Metropolis of Lyon, a directly elected metropolitan authority now in charge of most urban issues, with a population of 1,424,069 in 2021. [16]", + "page_start": 16, + "page_end": 16, + "source_file": "wikipedia4.pdf" + }, + { + "text": "Population of Lyon (commune) (within 2020 borders)\n1861, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 418,515. 1861, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = -. 1861, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 1906. 1861, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 627,073. 1861, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +0.60%. 1861, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 1968. 1861, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 1,077,794. 1861, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +2.17%. 1866, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 427,522. 1866, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +0.43%. 1866, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 1911. 1866, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 629,931. 1866, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +0.09%. 1866, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 1975. 1866, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 1,153,402. 1866, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +0.98%. 1872, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 426,552. 1872, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = -0.04%. 1872, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 1921. 1872, Population of Lyon", + "page_start": 16, + "page_end": 16, + "source_file": "wikipedia4.pdf" + }, + { + "text": "Population of Lyon (commune) (within 2020 borders)\n1801, Pop. = 101,760. 1801, ±% p.a. = -. 1801, Year = 1876. 1801, Pop. = 344,513. 1801, ±% p.a. = +1.33%. 1801, Year = 1946. 1801, Pop. = 464,104. 1801, ±% p.a. = +0.02%. 1806, Pop. = 114,643. 1806, ±% p.a. = +2.41%. 1806, Year = 1881. 1806, Pop. = 378,581. 1806, ±% p.a. = +1.84%. 1806, Year = 1954. 1806, Pop. = 475,343. 1806, ±% p.a. = +0.29%. 1821, Pop. = 149,611. 1821, ±% p.a. = +1.79%. 1821, Year = 1886. 1821, Pop. = 404,172. 1821, ±% p.a. = +1.45%. 1821, Year = 1962. 1821, Pop. = 535,746. 1821, ±% p.a. = +1.54%. 1831, Pop. = 182,668. 1831, ±% p.a. = +2.02%. 1831, Year = 1891. 1831, Pop. = 440,315. 1831, ±% p.a. = +1.78%. 1831, Year = 1968. 1831, Pop. = 527,800. 1831, ±% p.a. = -0.25%. 1836, Pop. = 198,683. 1836, ±% p.a. = +1.60%. 1836, Year = 1896. 1836, Pop. = 468,311. 1836, ±% p.a. = +1.25%. 1836, Year = 1975. 1836, Pop. = 456,716. 1836, ±% p.a. = -2.06%. 1841, Pop. = 206,670. 1841, ±% p.a. = +0.79%. 1841, Year = 1901. 1841, Pop. = 461,687. 1841, ±% p.a. = -0.29%. 1841, Year = 1982. 1841, Pop. =", + "page_start": 16, + "page_end": 16, + "source_file": "wikipedia4.pdf" + }, + { + "text": "Population of Lyon (commune) (within 2020 borders)\n413,095. 1841, ±% p.a. = -1.42%. 1846, Pop. = 238,466. 1846, ±% p.a. = +2.86%. 1846, Year = 1906. 1846, Pop. = 474,652. 1846, ±% p.a. = +0.56%. 1846, Year = 1990. 1846, Pop. = 415,487. 1846, ±% p.a. = +0.07%. 1851, Pop. = 259,220. 1851, ±% p.a. = +1.68%. 1851, Year = 1911. 1851, Pop. = 462,248. 1851, ±% p.a. = -0.53%. 1851, Year = 1999. 1851, Pop. = 445,452. 1851, ±% p.a. = +0.78%. 1856, Pop. = 293,743. 1856, ±% p.a. = +2.66%. 1856, Year = 1921. 1856, Pop. = 462,446. 1856, ±% p.a. = +0.00%. 1856, Year = 2010. 1856, Pop. = 484,344. 1856, ±% p.a. = +0.78%. 1861, Pop. = 320,326. 1861, ±% p.a. = +1.72%. 1861, Year = 1926. 1861, Pop. = 463,125. 1861, ±% p.a. = +0.03%. 1861, Year = 2015. 1861, Pop. = 513,275. 1861, ±% p.a. = +1.17%. 1866, Pop. = 325,219. 1866, ±% p.a. = +0.30%. 1866, Year = 1931. 1866, Pop. = 463,647. 1866, ±% p.a. = +0.02%. 1866, Year = 2021. 1866, Pop. = 522,250. 1866, ±% p.a. = +0.29%. 1872, Pop. = 324,590. 1872, ±% p.a. = -0.03%. 1872, Year = 1936. 1872, Pop. = 463,061. 1872,", + "page_start": 16, + "page_end": 16, + "source_file": "wikipedia4.pdf" + }, + { + "text": "Population of Lyon (commune) (within 2020 borders)\nAll figures come from population censuses. Figures from 1911 to 1936 (incl.) are computed using the redressed figures for the commune of Lyon calculated by INSEE to correct the overestimated population of Lyon published by the municipal authorities at the time (10,000s of false residents had been added by the municipal authorities to artificially inflate the population figures and remain the 2nd largest city of France ahead of Marseille). [68] The 1906 figure is computed using the figure for the commune of Lyon published by the municipal authorities, probably already inflated, but not corrected by INSEE because the overestimate was smaller than 10,000.\nSource: EHESS [70] and INSEE [71]", + "page_start": 17, + "page_end": 17, + "source_file": "wikipedia4.pdf" + }, + { + "text": "Population of Lyon (commune) (within 2020 borders)\n(59 communes, within 2020 borders).Pop. = 1,199,589. 1881, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +0.31%. 1886, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 527,621. 1886, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +1.47%. 1886, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 1936. 1886, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 738,220. 1886, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = -0.14%. 1886, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 2010. 1886, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 1,296,166. 1886, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +0.72%. 1891, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 566,115. 1891, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +1.46%. 1891, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 1946. 1891, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 746,062. 1891, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +0.11%. 1891, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 2015. 1891, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 1,370,678. 1891, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +1.12%. 1896, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 600,881. 1896, Population of Lyon (metropolis)", + "page_start": 16, + "page_end": 16, + "source_file": "wikipedia4.pdf" + }, + { + "text": "Population of Lyon (commune) (within 2020 borders)\n(metropolis) (59 communes, within 2020 borders).Pop. = 659,007. 1872, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +0.45%. 1872, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 1982. 1872, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 1,138,718. 1872, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = -0.18%. 1876, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 453,540. 1876, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +1.37%. 1876, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 1926. 1876, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 691,446. 1876, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +0.97%. 1876, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 1990. 1876, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 1,166,797. 1876, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +0.30%. 1881, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 493,778. 1881, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +1.66%. 1881, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 1931. 1881, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 743,297. 1881, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +1.46%. 1881, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 1999. 1881, Population of Lyon (metropolis)", + "page_start": 16, + "page_end": 16, + "source_file": "wikipedia4.pdf" + }, + { + "text": "Population of Lyon (commune) (within 2020 borders)\n(59 communes, within 2020 borders).±% p.a. = +1.21%. 1896, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 1954. 1896, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 790,662. 1896, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +0.71%. 1896, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 2021. 1896, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 1,424,069. 1896, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +0.64%. 1901, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 608,856. 1901, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +0.26%. 1901, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = 1962. 1901, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = 947,569. 1901, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = +2.34%. 1901, Population of Lyon (metropolis) (59 communes, within 2020 borders).Year = . 1901, Population of Lyon (metropolis) (59 communes, within 2020 borders).Pop. = . 1901, Population of Lyon (metropolis) (59 communes, within 2020 borders).±% p.a. = \nStade de Gerland", + "page_start": 16, + "page_end": 16, + "source_file": "wikipedia4.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia4.pdf", + "query": "What is the climate in Lyon ?", + "target_page": 5, + "target_passage": " Lyon has a humid subtropical climate ( Köppen: Cfa), bordering an oceanic climate (Köppen: Cfb, Trewartha: Do).", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Climate\nLyon has a humid subtropical climate (Köppen: Cfa ), bordering an oceanic climate ( Köppen : Cfb , Trewartha: Do ). [38] The mean temperature in Lyon in the coldest month is 4.1 °C (39.4 °F) in January and in the warmest month in July is 22.6 °C (72.7 °F). Precipitation is adequate year-round, at an average of 820 mm (32.3 in), the winter months are the driest. The highest recorded temperature was 40.5 °C (104.9 °F) on 13 August 2003 while the lowest recorded temperature was -24.6 °C (-12.3 °F) on 22 December 1938. [39]\nIce on the Saône, 2012", + "page_start": 4, + "page_end": 4, + "source_file": "wikipedia4.pdf" + }, + { + "text": "Climate data for Lyon (LYN), elevation: 197 m (646 ft), 1991-2020 normals, extremes 1920-present\n(32.4). Mean daily minimum °C, Feb = 1.4 (34.5). Mean daily minimum °C, Mar = 2.9 (37.2). Mean daily minimum °C, Apr = 5.2 (41.4). Mean daily minimum °C, May = 9.1 (48.4). Mean daily minimum °C, Jun = 12.5 (54.5). Mean daily minimum °C, Jul = 14.8 (58.6). Mean daily minimum °C, Aug = 14.4 (57.9). Mean daily minimum °C, Sep = 11.7 (53.1). Mean daily minimum °C, Oct = 8.3 (46.9). Mean daily minimum °C, Nov = 3.5 (38.3). Mean daily minimum °C, Dec = 0.7 (33.3). Mean daily minimum °C, Year = 7.1 (44.7). (°F) Mean minimum °C, Jan = -7.0 (19.4). (°F) Mean minimum °C, Feb = -4.7 (23.5). (°F) Mean minimum °C, Mar = -1.4 (29.5). (°F) Mean minimum °C, Apr = 3.2 (37.8). (°F) Mean minimum °C, May = 7.6 (45.7). (°F) Mean minimum °C, Jun = 10.9 (51.6). (°F) Mean minimum °C, Jul = 13.1 (55.6). (°F) Mean minimum °C, Aug = 12.9 (55.2). (°F) Mean minimum °C, Sep = 8.1 (46.6). (°F) Mean minimum °C, Oct = 4.5 (40.1). (°F) Mean minimum °C, Nov = 1.0 (33.8). (°F) Mean minimum °C, Dec = -4.7 (23.5). (°F) Mean minimum °C, Year = -7.0 (19.4). Record low °C (°F), Jan = -23.0 (-9.4). Record low °C (°F), Feb = -19.3 (-2.7). Record low °C", + "page_start": 6, + "page_end": 6, + "source_file": "wikipedia4.pdf" + }, + { + "text": "Climate data for Lyon (LYN), elevation: 197 m (646 ft), 1991-2020 normals, extremes 1920-present\n(43.0). Mean daily maximum °C (°F), Feb = 8.2 (46.8). Mean daily maximum °C (°F), Mar = 11.6 (52.9). Mean daily maximum °C (°F), Apr = 15.2 (59.4). Mean daily maximum °C (°F), May = 19.1 (66.4). Mean daily maximum °C (°F), Jun = 22.9 (73.2). Mean daily maximum °C (°F), Jul = 26.1 (79.0). Mean daily maximum °C (°F), Aug = 26.0 (78.8). Mean daily maximum °C (°F), Sep = 22.4 (72.3). Mean daily maximum °C (°F), Oct = 17.1 (62.8). Mean daily maximum °C (°F), Nov = 10.0 (50.0). Mean daily maximum °C (°F), Dec = 6.4 (43.5). Mean daily maximum °C (°F), Year = 15.9 (60.7). Daily mean °C (°F), Jan = 3.0 (37.4). Daily mean °C (°F), Feb = 4.9 (40.8). Daily mean °C (°F), Mar = 7.4 (45.3). Daily mean °C (°F), Apr = 10.2 (50.4). Daily mean °C (°F), May = 14.0 (57.2). Daily mean °C (°F), Jun = 17.6 (63.7). Daily mean °C (°F), Jul = 20.6 (69.1). Daily mean °C (°F), Aug = 20.0 (68.0). Daily mean °C (°F), Sep = 17.1 (62.8). Daily mean °C (°F), Oct = 12.7 (54.9). Daily mean °C (°F), Nov = 6.7 (44.1). Daily mean °C (°F), Dec = 3.9 (39.0). Daily mean °C (°F), Year = 11.5 (52.7). Mean daily minimum °C, Jan = 0.2", + "page_start": 6, + "page_end": 6, + "source_file": "wikipedia4.pdf" + }, + { + "text": "Climate data for Lyon (LYN), elevation: 197 m (646 ft), 1991-2020 normals, extremes 1920-present\n°C (°F), Jan = 4.1 (39.4). Daily mean °C (°F), Feb = 5.2 (41.4). Daily mean °C (°F), Mar = 9.0 (48.2). Daily mean °C (°F), Apr = 12.3 (54.1). Daily mean °C (°F), May = 16.3 (61.3). Daily mean °C (°F), Jun = 20.3 (68.5). Daily mean °C (°F), Jul = 22.6 (72.7). Daily mean °C (°F), Aug = 22.3 (72.1). Daily mean °C (°F), Sep = 17.9 (64.2). Daily mean °C (°F), Oct = 13.7 (56.7). Daily mean °C (°F), Nov = 8.1 (46.6). Daily mean °C (°F), Dec = 4.8 (40.6). Daily mean °C (°F), Year = 13.0 (55.4). Mean daily minimum °C (°F), Jan = 1.1 (34.0). Mean daily minimum °C (°F), Feb = 1.4 (34.5). Mean daily minimum °C (°F), Mar = 4.2 (39.6). Mean daily minimum °C (°F), Apr = 7.2 (45.0). Mean daily minimum °C (°F), May = 11.2 (52.2). Mean daily minimum °C (°F), Jun = 15.0 (59.0). Mean daily minimum °C (°F), Jul = 17.0 (62.6). Mean daily minimum °C (°F), Aug = 16.6 (61.9). Mean daily minimum °C (°F), Sep = 12.8 (55.0). Mean daily minimum °C (°F), Oct = 9.6 (49.3). Mean daily minimum °C (°F), Nov = 4.9 (40.8). Mean daily minimum °C (°F), Dec = 2.0 (35.6). Mean daily minimum °C (°F), Year = 8.6 (47.5). Record low °C", + "page_start": 5, + "page_end": 5, + "source_file": "wikipedia4.pdf" + }, + { + "text": "Climate data for Lyon (LYN), elevation: 197 m (646 ft), 1991-2020 normals, extremes 1920-present\nRecord high °C (°F), Jan = 19.1 (66.4). Record high °C (°F), Feb = 21.9 (71.4). Record high °C (°F), Mar = 26.0 (78.8). Record high °C (°F), Apr = 30.1 (86.2). Record high °C (°F), May = 34.2 (93.6). Record high °C (°F), Jun = 38.4 (101.1). Record high °C (°F), Jul = 40.4 (104.7). Record high °C (°F), Aug = 41.4 (106.5). Record high °C (°F), Sep = 35.8 (96.4). Record high °C (°F), Oct = 28.4 (83.1). Record high °C (°F), Nov = 23.0 (73.4). Record high °C (°F), Dec = 20.2 (68.4). Record high °C (°F), Year = 41.4 (106.5). Mean daily maximum °C (°F), Jan = 7.1 (44.8). Mean daily maximum °C (°F), Feb = 9.0 (48.2). Mean daily maximum °C (°F), Mar = 13.8 (56.8). Mean daily maximum °C (°F), Apr = 17.4 (63.3). Mean daily maximum °C (°F), May = 21.5 (70.7). Mean daily maximum °C (°F), Jun = 25.6 (78.1). Mean daily maximum °C (°F), Jul = 28.2 (82.8). Mean daily maximum °C (°F), Aug = 28.0 (82.4). Mean daily maximum °C (°F), Sep = 23.1 (73.6). Mean daily maximum °C (°F), Oct = 17.7 (63.9). Mean daily maximum °C (°F), Nov = 11.4 (52.5). Mean daily maximum °C (°F), Dec = 7.7 (45.9). Mean daily maximum °C (°F), Year = 17.5 (63.5). Daily mean", + "page_start": 5, + "page_end": 5, + "source_file": "wikipedia4.pdf" + }, + { + "text": "Climate data for Lyon (LYN), elevation: 197 m (646 ft), 1991-2020 normals, extremes 1920-present\nRecord high °C (°F), Jan = 16.3 (61.3). Record high °C (°F), Feb = 21.4 (70.5). Record high °C (°F), Mar = 25.7 (78.3). Record high °C (°F), Apr = 28.0 (82.4). Record high °C (°F), May = 29.4 (84.9). Record high °C (°F), Jun = 34.4 (93.9). Record high °C (°F), Jul = 39.8 (103.6). Record high °C (°F), Aug = 37.1 (98.8). Record high °C (°F), Sep = 33.8 (92.8). Record high °C (°F), Oct = 28.4 (83.1). Record high °C (°F), Nov = 22.6 (72.7). Record high °C (°F), Dec = 20.2 (68.4). Record high °C (°F), Year = 39.8 (103.6). Mean maximum °C (°F), Jan = 10.2 (50.4). Mean maximum °C (°F), Feb = 14.4 (57.9). Mean maximum °C (°F), Mar = 15.9 (60.6). Mean maximum °C (°F), Apr = 18.6 (65.5). Mean maximum °C (°F), May = 23.1 (73.6). Mean maximum °C (°F), Jun = 28.8 (83.8). Mean maximum °C (°F), Jul = 32.8 (91.0). Mean maximum °C (°F), Aug = 28.1 (82.6). Mean maximum °C (°F), Sep = 27.3 (81.1). Mean maximum °C (°F), Oct = 19.7 (67.5). Mean maximum °C (°F), Nov = 14.1 (57.4). Mean maximum °C (°F), Dec = 9.5 (49.1). Mean maximum °C (°F), Year = 32.8 (91.0). Mean daily maximum °C (°F), Jan = 6.1", + "page_start": 6, + "page_end": 6, + "source_file": "wikipedia4.pdf" + }, + { + "text": "Climate data for Lyon (LYN), elevation: 197 m (646 ft), 1991-2020 normals, extremes 1920-present\n(°F), Jan = -23.0 (-9.4). Record low °C (°F), Feb = -22.5 (-8.5). Record low °C (°F), Mar = -10.5 (13.1). Record low °C (°F), Apr = -4.4 (24.1). Record low °C (°F), May = -3.8 (25.2). Record low °C (°F), Jun = 2.3 (36.1). Record low °C (°F), Jul = 6.1 (43.0). Record low °C (°F), Aug = 4.6 (40.3). Record low °C (°F), Sep = 0.2 (32.4). Record low °C (°F), Oct = -4.5 (23.9). Record low °C (°F), Nov = -9.4 (15.1). Record low °C (°F), Dec = -24.6 (-12.3). Record low °C (°F), Year = -24.6 (-12.3). Average precipitation mm (inches), Jan = 49.8 (1.96). Average precipitation mm (inches), Feb = 41.6 (1.64). Average precipitation mm (inches), Mar = 49.4 (1.94). Average precipitation mm (inches), Apr = 68.9 (2.71). Average precipitation mm (inches), May = 80.9 (3.19). Average precipitation mm (inches), Jun = 74.1 (2.92). Average precipitation mm (inches), Jul = 67.4 (2.65). Average precipitation mm (inches), Aug = 65.5 (2.58). Average precipitation mm (inches), Sep = 82.5 (3.25). Average precipitation mm (inches), Oct = 99.8 (3.93). Average precipitation mm (inches), Nov = 87.2 (3.43). Average precipitation mm (inches), Dec = 53.7 (2.11). Average precipitation mm (inches), Year = 820.8 (32.31). Average precipitation days (≥", + "page_start": 5, + "page_end": 5, + "source_file": "wikipedia4.pdf" + }, + { + "text": "Climate data for Lyon (LYN), elevation: 197 m (646 ft), 1991-2020 normals, extremes 1920-present\n(≥ 1.0 mm), Apr = (2.21) 9.6. Average precipitation days (≥ 1.0 mm), May = 10.9. Average precipitation days (≥ 1.0 mm), Jun = (2.88) 8.2. Average precipitation days (≥ 1.0 mm), Jul = 6.8. Average precipitation days (≥ 1.0 mm), Aug = 8.2. Average precipitation days (≥ 1.0 mm), Sep = 7.3. Average precipitation days (≥ 1.0 mm), Oct = 8.5. Average precipitation days (≥ 1.0 mm), Nov = 8.9. Average precipitation days (≥ 1.0 mm), Dec = 9.8. Average precipitation days (≥ 1.0 mm), Year = 107.6. Average snowy days, Jan = 5.5. Average snowy days, Feb = 3.9. Average snowy days, Mar = 2.5. Average snowy days, Apr = 1.1. Average snowy days, May = 0.0. Average snowy days, Jun = 0.0. Average snowy days, Jul = 0.0. Average snowy days, Aug = 0.0. Average snowy days, Sep = 0.0. Average snowy days, Oct = 0.0. Average snowy days, Nov = 2.0. Average snowy days, Dec = 4.6. Average snowy days, Year = 19.6. Average relative humidity (%), Jan = 84. Average relative humidity (%), Feb = 80. Average relative humidity (%), Mar = 74. Average relative humidity (%), Apr = 71. Average relative humidity (%), May = 72. Average relative humidity (%), Jun = 70. Average relative humidity (%), Jul = 65. Average relative humidity (%), Aug = 70. Average relative humidity (%), Sep = 76. Average relative humidity (%), Oct = 82. Average relative humidity (%), Nov = 84. Average relative humidity (%), Dec = 86. Average relative humidity (%), Year = 76. Mean monthly sunshine hours, Jan = 62.6. Mean monthly sunshine hours, Feb = 89.8. Mean monthly sunshine hours, Mar = 147.5.", + "page_start": 6, + "page_end": 6, + "source_file": "wikipedia4.pdf" + }, + { + "text": "Climate data for Lyon (LYN), elevation: 197 m (646 ft), 1991-2020 normals, extremes 1920-present\n(°F), Mar = -10.5. Record low °C (°F), Apr = -3.2 (26.2). Record low °C (°F), May = -0.3 (31.5). Record low °C (°F), Jun = 3.6. Record low °C (°F), Jul = 6.1 (43.0). Record low °C (°F), Aug = 5.2 (41.4). Record low °C (°F), Sep = 1.9 (35.4). Record low °C (°F), Oct = -3.2 (26.2). Record low °C (°F), Nov = -7.1. Record low °C (°F), Dec = . Record low °C (°F), Year = -23.0 (-9.4). Average precipitation mm (inches), Jan = 54.0. Average precipitation mm (inches), Feb = 53.8. Average precipitation mm (inches), Mar = (13.1) 72.2. Average precipitation mm (inches), Apr = 56.1. Average precipitation mm (inches), May = 72.6 (2.86). Average precipitation mm (inches), Jun = (38.5) 73.2. Average precipitation mm (inches), Jul = 54.5 (2.15). Average precipitation mm (inches), Aug = 71.6 (2.82). Average precipitation mm (inches), Sep = 53.2 (2.09). Average precipitation mm (inches), Oct = 56.2 (2.21). Average precipitation mm (inches), Nov = (19.2) 68.0 (2.68). Average precipitation mm (inches), Dec = -16.0 (3.2) 55.8 (2.20). Average precipitation mm (inches), Year = 741.2 (29.19). Average precipitation days (≥ 1.0 mm), Jan = (2.13) 10.4. Average precipitation days (≥ 1.0 mm), Feb = (2.12) 9.3. Average precipitation days (≥ 1.0 mm), Mar = (2.84) 9.7. Average precipitation days", + "page_start": 6, + "page_end": 6, + "source_file": "wikipedia4.pdf" + }, + { + "text": "Climate data for Lyon (LYN), elevation: 197 m (646 ft), 1991-2020 normals, extremes 1920-present\nMean monthly sunshine hours, Apr = 184.2. Mean monthly sunshine hours, May = 215.9. Mean monthly sunshine hours, Jun = 250.9. Mean monthly sunshine hours, Jul = 292.6. Mean monthly sunshine hours, Aug = 259.0. Mean monthly sunshine hours, Sep = 208.1. Mean monthly sunshine hours, Oct = 134.3. Mean monthly sunshine hours, Nov = 75.3. Mean monthly sunshine hours, Dec = 55.4. Mean monthly sunshine hours, Year = 1,975.6. Percent possible sunshine, Jan = 23. Percent possible sunshine, Feb = 31. Percent possible sunshine, Mar = 41. Percent possible sunshine, Apr = 46. Percent possible sunshine, May = 47. Percent possible sunshine, Jun = 54. Percent possible sunshine, Jul = 62. Percent possible sunshine, Aug = 60. Percent possible sunshine, Sep = 56. Percent possible sunshine, Oct = 40. Percent possible sunshine, Nov = 27. Percent possible sunshine, Dec = 21. Percent possible sunshine, Year = 42", + "page_start": 6, + "page_end": 6, + "source_file": "wikipedia4.pdf" + } + ] + }, + { + "references": { + "source_file": "uksi_20210538_en.pdf", + "query": " What should do the rector, vicar or curate in charge of a church or chapel to which a register of marriage services has been provided ?", + "target_page": 2, + "target_passage": "ensure that the register is kept in that church or chapel, and (b) do everything that is reasonably practicable to ensure that the register is protected against theft, loss or damage.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Requirements about the keeping of registers of marriage services\n4. -(1) The rector, vicar or curate in charge of a church or chapel to which a register of marriage services has been provided under regulation 2(1) must-\n(a) ensure that the register is kept in that church or chapel, and\n(b) do everything that is reasonably practicable to ensure that the register is protected against theft, loss or damage.\n(2) Where there is no rector, vicar or curate in charge of a church or chapel to which a register of marriage services has been provided under regulation 2(1), the obligations under paragraph (1) in respect of that register fall on the churchwardens of the parish in which the church or chapel is situated.\nGiven under my hand on 29th April 2021\nAbi Tierney Registrar General\n2\nI approve\n29th April 2021\nKevin Foster Parliamentary Under Secretary of State Home Office", + "page_start": 1, + "page_end": 2, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "Duty of parochial church councils to provide registers of marriage services\n2. -(1) The parochial church council of a parish must provide books for the purpose of making records under regulation 3 to each church and chapel of the Church of England( c ) in that parish in which banns of matrimony may be published.\n(2) Books provided under paragraph (1) are to be known as 'registers of marriage services'.\n(3) A register of marriage services provided under paragraph (1) must meet the requirements of paragraphs (4) and (5).\n(4) The register must be made of durable material.\n(5) For the purposes of enabling a record to be made in the register under regulation 3 in respect of a marriage, the register must be printed in such a way that it-\n( a ) 1949 c. 76 (12 & 13 Geo 6). Section 74 was amended by Schedule 2 to the Registration Service Act 1953 (c. 37) and by paragraph 5(1)(d) of Schedule 2 to the Transfer of Functions (Registration) Order 2008 (S.I. 2008/678) and subsequently renumbered as section 74(1) by article 12 of the Registration of Marriages etc. (Electronic Communications and Electronic Storage) Order 2009 (S.I. 2009/2821). Section 74(1) was amended by paragraph 19 of Schedule 15 to the Immigration Act 2016 (c. 19) and paragraph 43 of Schedule 1 to the Registration of Marriages Regulations 2021 (S.I. 2021/411), which also inserted subsection (1A).\n( b ) See section 68(2) of the Marriage Act 1949. The certification function of the Admiralty under that section was transferred to the Secretary of State by the Defence (Transfer of Functions) Act 1964 (c. 15).\n( c ) Section 78(2) of the Marriage Act 1949 provides for references to the Church of England to be construed as including references to the Church in Wales.\n(a) indicates the descriptions of information required by each of sub-paragraphs (a) to (h) of regulation 3(2) in relation to the marriage, and\n(b) provides corresponding spaces for recording information required by each of those subparagraphs in relation to the marriage.\n(6) A register of marriage services provided under paragraph (1) by a parochial church council belongs to that parochial church council.", + "page_start": 0, + "page_end": 1, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "Duty to record information about marriages solemnized according to the rites of the Church of England or Church in Wales\n3. -(1) Paragraphs (2), (3) and (4) apply where a marriage has been solemnized according to the rites of the Church of England in a church or chapel in which banns of matrimony may be published.\n(2) As soon as practicable after the marriage has been solemnized, the clergyman by whom the marriage was solemnized must make a record of the following information in relation to that marriage in a register of marriage services provided to the church or chapel under regulation 2(1)-\n(a) the date and place of the marriage;\n(b) the name and surname of each party;\n(c) the date of birth of each party;\n(d) the occupation (if any) of each party;\n(e) the address of each party at the time of the marriage;\n(f) the names and surnames of each party's parents, so far as those names and surnames are known to the clergyman who solemnized the marriage;\n(g) the name and surname of each of the witnesses in whose presence the marriage was solemnized;\n(h) the name and surname of the clergyman by whom the marriage was solemnized.\n(3) The clergyman must record the information required by paragraph (2) in English, and may also record information required by that paragraph in Welsh where the church or chapel is situated in Wales.\n(4) After making a record under paragraph (2) the clergyman must sign it.\n(5) This regulation does not apply in relation to a marriage solemnized before 4th May 2021.", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "EXPLANATORY NOTE\n(This note is not part of the Regulations)\nThese Regulations provide for records of marriages to be kept in churches and chapels of the Church of England and the Church in Wales, other than chapels to which Part 5 of the Marriage Act 1949 applies (naval, military and air force chapels).\nRegulation 2 requires parochial church councils to provide books known as 'registers of marriage services' to churches and chapels in their parish in which banns of matrimony may be published, for the purposes of keeping the records required by regulation 3. Regulation 2 also imposes requirements relating to the durability and pre-printed content of these registers, and provides that they belong to the parochial church council.\nRegulation 3 requires specified information to be recorded in a register of marriage services when a marriage has been solemnized on or after 4th May 2021 according to the rites of the Church of England or Church in Wales in a church or chapel in which banns of matrimony may be published. The record must be made and signed by the member of the clergy by whom the marriage was solemnized.\nRegulation 4 imposes requirements relating to the keeping of registers of marriage services provided under regulation 2.\nA full impact assessment has not been produced for this instrument because no, or no significant, impact on the private, public or voluntary sector is foreseen.\n' Crown copyright 2021\nPrinted and published in the UK by The Stationery Office Limited under the authority and superintendence of Jeff James, Controller of Her Majesty's Stationery Office and Queen's Printer of Acts of Parliament.\n3\n£4.90\nhttp://www.legislation.gov.uk/id/uksi/2021/538", + "page_start": 2, + "page_end": 3, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "MARRIAGE, ENGLAND AND WALES\nThe Marriage (Keeping of Records in Churches and Chapels) Regulations 2021\nMade\n-\n-\n-\n-\n29th April 2021\nComing into force - -\n4th May 2021\nThe Registrar General makes these Regulations with the approval of the Secretary of State in exercise of the powers conferred by section 74(1)(c)(v), (1A)(a) and (3) of the Marriage Act 1949( a ).", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "Citation, commencement, extent and interpretation\n1. -(1) These Regulations may be cited as the Marriage (Keeping of Records in Churches and Chapels) Regulations 2021.\n(2) These Regulations come into force on 4th May 2021.\n(3) These Regulations extend to England and Wales.\n(4) In these Regulations, 'chapel' does not include a chapel to which Part 5 of the Marriage Act 1949 (marriages in naval, military and air force chapels) applies( b ).", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "95. Jurisdiction and com position\n(1) There shall be for B otsw ana a H igh C ourt w hich shall have unlim ited original jurisdiction to hear and determ ine any civil or crim inal proceedings under any law and such other jurisdiction and pow ers as m ay be conferred on it by this C onstitution or any other law .\n(2) The judges of the H igh C ourt shall be the C hief Justice and such num ber of\nC opyright G overnm ent of B otsw ana\nother judges of the C ourt as m ay be prescribed by P arliam ent:\nProvided that the office of a judge of the H igh C ourt shall not be abolished w hile there is a substantive holder thereof.\n(3) The H igh C ourt shall be a superior court of record and, save as otherw ise provided by P arliam ent, shall have all the pow ers of such a court.\n(4) The H igh C ourt shall sit in such places as the C hief Justice m ay appoint.\n(5) The H igh C ourt shall have jurisdiction to supervise any civil or crim inal proceedings before any subordinate court or any court m artial and m ay m ake such orders, issue such w rits and give such directions as it m ay consider appropriate for the purpose of ensuring that justice is duly adm inistered by any such court.\n(6) The C hief Justice m ay m ake rules w ith respect to the practice and procedure of the H igh C ourt in relation to the jurisdiction and pow ers conferred on it by subsection (5) of this section.\n(7) The C hief Justice m ay appoint a R ules of C ourt A dvisory C om m ittee to assist him or her in review ing and overhauling the rules m ade under subsection (6) and to advise on proposals to update and am end such rules.", + "page_start": 39, + "page_end": 40, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "103. C om position and procedure\n(1) There shall be a Judicial S ervice C om m ission for B otsw ana w hich shall consist of-\n( a ) the C hief Justice w ho shall be C hairm an;\n( b ) the P resident of the C ourt of A ppeal (not being the C hief Justice or the m ost Senior Justice of the C ourt of A ppeal);\n( c ) the A ttorney-G eneral;\n( d ) the C hairm an of the P ublic S ervice C om m ission;\n( e ) a m em ber of the Law S ociety nom inated by the Law S ociety; and\n( f ) a person of intergrity and experience not being a legal practitioner appointed by the P resident.\n)\n(2) A m em ber nom inated under paragraph ( e ) or appointed under paragraph ( f of subsection (1) shall hold office for a period of tw o years, but shall be eligible for renom ination or re-appointm ent, as the case m ay be, for another term of office for tw o years:", + "page_start": 44, + "page_end": 44, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "1. (1) In this S chedule-\n( b ) in the case of a by-election, as soon as practicable after a vacancy has occurred am ong the S pecially E lected M em bers.\n(2) A m eeting of the E lected M em bers of the N ational A ssem bly that is held for the purpose of a general election shall be sum m oned by the S peaker.\n(3) N o other business than the holding of a general election m ay be transacted at any m eeting of the E lected M em bers of the N ational A ssem bly sum m oned under subparagraph (2) of this paragraph and such a m eeting shall not be regarded as a m eeting of the A ssem bly for the purposes of any other provision of this C onstitution.\n6. W hen the votes have been cast, w hether at a general election or at a by-election, a list shall be prepared show ing the persons for w hom votes have been cast in order according to the num ber of votes received by each of them , the person or persons w ho received the highest num ber of votes being placed first and those w ho received any low er num ber of votes being placed in descending order.\n7. In the case of a general election, and subject to the provisions of paragraph 9 of this S chedule, those persons shall be deem ed to have been elected as S pecially E lected M em bers w ho stand in the first and each succeeding place on the list until the num ber of persons to be elected as Specially E lected M em bers has been com pleted.\n8. In the case of a by-election, and subject to the provisions of paragraph 10 of this S chedule, the person w ho stands in the first place on the list shall be deem ed to have been elected.", + "page_start": 56, + "page_end": 56, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "99. C om position and jurisdiction\n(1) There shall be a C ourt of A ppeal for B otsw ana w hich shall have such jurisdiction and pow ers as m ay be conferred on it by this C onstitution or any other law .\n(2) The judges of the C ourt of A ppeal shall be-\n( a ) the P resident of the C ourt of A ppeal;\n( b ) such num ber, if any, of Justices of A ppeal as m ay be prescribed by P arliam ent; and\n( c ) the C hief Justice and the other judges of the H igh C ourt:\nProvided that P arliam ent m ay m ake provision for the office of P resident of the C ourt of A ppeal to be held by the C hief Justice ex-officio.\n(3) The office of a Justice of A ppeal shall not be abolished w hile there is a substantive holder thereof.\n(4) The C ourt of A ppeal shall be a superior court of record and save as otherw ise provided by P arliam ent shall have all the pow ers of such a court.", + "page_start": 42, + "page_end": 42, + "source_file": "Botswana-constitution.pdf" + } + ] + }, + { + "references": { + "source_file": "tesla_form_10q.pdf", + "query": "What are Tesla's total liabilities and equity in 2024?", + "target_page": 5, + "target_passage": "119,852", + "chunk_present": { + "presence": true, + "index": 5 + } + }, + "top_chunk": [ + { + "text": "Litigation Related to Directors' Compensation\nOn June 17, 2020, a purported Tesla stockholder filed a derivative action in the Delaware Court of Chancery, purportedly on behalf of Tesla, against certain of Tesla's current and former directors regarding compensation awards granted to Tesla's directors, other than Elon Musk, between 2017 and 2020. The suit asserts claims for breach of fiduciary duty and unjust enrichment and seeks declaratory and injunctive relief, unspecified damages and other relief. Defendants filed their answer on September 17, 2020.\nOn July 14, 2023, the parties filed a Stipulation and Agreement of Compromise and Settlement, which does not involve an admission of any wrongdoing by any party. If the settlement is approved by the Court, this action will be fully settled and dismissed with prejudice. Pursuant to the terms of the agreement, Tesla provided notice of the proposed settlement to stockholders of record as of July 14, 2023. The Court held a hearing regarding the settlement on October 13, 2023, after which it took the settlement and plaintiff counsels' fee request under advisement. On August 14, 2024, the parties submitted a joint letter requesting that the Court approve and enter final judgment with respect to the settlement, and decide the fee request at a later date. The settlement is not expected to have an adverse impact on our results of operations, cash flows or financial position.", + "page_start": 26, + "page_end": 26, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Certain Derivative Lawsuits in Delaware\nBefore converting from a Delaware to Texas corporation on June 13, 2024, three separate derivative actions brought by purported Tesla stockholders were filed in the Delaware Court of Chancery on May 24, June 10 and June 13, 2024, purportedly on behalf of Tesla, against current and former directors regarding topics involving Elon Musk and others, X Corp. (formerly Twitter) and x.AI. These suits assert various claims, including breach of fiduciary duty and breach of contract, and seek unspecified damages and other relief. On August 6, 2024, the plaintiffs in these three actions moved to consolidate the matters into a single case, and a hearing on that motion is scheduled for November 18, 2024.", + "page_start": 27, + "page_end": 27, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Note 11 - Variable Interest Entity Arrangements\nTable of Contents\nDebt and finance leases, net of current portion, December 31, 2023 = 2,041. Total liabilities, September 30, 2024 = $ 3,880. Total liabilities, December 31, 2023 = $ 3,777", + "page_start": 29, + "page_end": 29, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Note 11 - Variable Interest Entity Arrangements\nTable of Contents\nAssets, September 30, 2024 = . Assets, December 31, 2023 = . Current assets, September 30, 2024 = . Current assets, December 31, 2023 = . Cash and cash equivalents, September 30, 2024 = $ 51. Cash and cash equivalents, December 31, 2023 = $ 66. Accounts receivable, net, September 30, 2024 = 28. Accounts receivable, net, December 31, 2023 = 13. Prepaid expenses and other current assets, September 30, 2024 = 263. Prepaid expenses and other current assets, December 31, 2023 = 361. Total current assets, September 30, 2024 = 342. Total current assets, December 31, 2023 = 440. Operating lease vehicles, net, September 30, 2024 = 451. Operating lease vehicles, net, December 31, 2023 = -. Solar energy systems, net, September 30, 2024 = 2,524. Solar energy systems, net, December 31, 2023 = 3,278. Other non-current assets, September 30, 2024 = 190. Other non-current assets, December 31, 2023 = 369. Total assets, September 30, 2024 = $ 3,507. Total assets, December 31, 2023 = $ 4,087. Liabilities, September 30, 2024 = . Liabilities, December 31, 2023 = . Current liabilities, September 30, 2024 = . Current liabilities, December 31, 2023 = . Accrued liabilities and other, September 30, 2024 = $ 36. Accrued liabilities and other, December 31, 2023 = $ 67. Deferred revenue, September 30, 2024 = 7. Deferred revenue, December 31, 2023 = 6. Current portion of debt and finance leases, September 30, 2024 = 1,930. Current portion of debt and finance leases, December 31, 2023 = 1,564. Total current liabilities, September 30, 2024 = 1,973. Total current liabilities, December 31, 2023 = 1,637. Deferred revenue, net of current portion, September 30, 2024 = 81. Deferred revenue, net of current portion, December 31, 2023 = 99. Debt and finance leases, net of current portion, September 30, 2024 = 1,826.", + "page_start": 29, + "page_end": 29, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Consolidated Balance Sheets (in millions, except per share data)\nTable of Contents\nAssets, September 30, 2024 = . Assets, December 31, 2023 = . Current assets, September 30, 2024 = . Current assets, December 31, 2023 = . Cash and cash equivalents, September 30, 2024 = $ 18,111. Cash and cash equivalents, December 31, 2023 = $ 16,398. Short-term investments, September 30, 2024 = 15,537. Short-term investments, December 31, 2023 = 12,696. Accounts receivable, net, September 30, 2024 = 3,313. Accounts receivable, net, December 31, 2023 = 3,508. Inventory, September 30, 2024 = 14,530. Inventory, December 31, 2023 = 13,626. Prepaid expenses and other current assets, September 30, 2024 = 4,888. Prepaid expenses and other current assets, December 31, 2023 = 3,388. Total current assets, September 30, 2024 = 56,379. Total current assets, December 31, 2023 = 49,616. Operating lease vehicles, net, September 30, 2024 = 5,380. Operating lease vehicles, net, December 31, 2023 = 5,989. Solar energy systems, net, September 30, 2024 = 5,040. Solar energy systems, net, December 31, 2023 = 5,229. Property, plant and equipment, net, September 30, 2024 = 36,116. Property, plant and equipment, net, December 31, 2023 = 29,725. Operating lease right-of-use assets, September 30, 2024 = 4,867. Operating lease right-of-use assets, December 31, 2023 = 4,180. Digital assets, net, September 30, 2024 = 184. Digital assets, net, December 31, 2023 = 184. Intangible assets, net, September 30, 2024 = 158. Intangible assets, net, December 31, 2023 = 178. Goodwill, September 30, 2024 = 253. Goodwill, December 31, 2023 = 253. Deferred tax assets, September 30, 2024 = 6,486. Deferred tax assets, December 31, 2023 = 6,733. Other non-current assets, September 30, 2024 =", + "page_start": 4, + "page_end": 4, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Consolidated Balance Sheets (in millions, except per share data)\nTable of Contents\n4,989. Other non-current assets, December 31, 2023 = 4,531. Total assets, September 30, 2024 = $ 119,852. Total assets, December 31, 2023 = $ 106,618. Liabilities, September 30, 2024 = . Liabilities, December 31, 2023 = . Current liabilities, September 30, 2024 = . Current liabilities, December 31, 2023 = . Accounts payable, September 30, 2024 = $ 14,654. Accounts payable, December 31, 2023 = $ 14,431. Accrued liabilities and other, September 30, 2024 = 10,601. Accrued liabilities and other, December 31, 2023 = 9,080. Deferred revenue, September 30, 2024 = 3,031. Deferred revenue, December 31, 2023 = 2,864. Current portion of debt and finance leases, September 30, 2024 = 2,291. Current portion of debt and finance leases, December 31, 2023 = 2,373. Total current liabilities, September 30, 2024 = 30,577. Total current liabilities, December 31, 2023 = 28,748. Debt and finance leases, net of current portion, September 30, 2024 = 5,405. Debt and finance leases, net of current portion, December 31, 2023 = 2,857. Deferred revenue, net of current portion, September 30, 2024 = 3,350. Deferred revenue, net of current portion, December 31, 2023 = 3,251. Other long-term liabilities, September 30, 2024 = 9,810. Other long-term liabilities, December 31, 2023 = 8,153. Total liabilities, September 30, 2024 = 49,142. Total liabilities, December 31, 2023 = 43,009. Commitments and contingencies (Note 10), September 30, 2024 = . Commitments and contingencies (Note 10), December 31, 2023 = . Redeemable noncontrolling interests in subsidiaries, September 30, 2024 = 70. Redeemable noncontrolling interests in subsidiaries, December 31, 2023 = 242. Equity, September 30, 2024 = . Equity, December 31, 2023 =", + "page_start": 4, + "page_end": 4, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Note 6 - Other Long-Term Liabilities\nOur other long-term liabilities consisted of the following (in millions):\nOperating lease liabilities, September 30, 2024 = $ 4,290. Operating lease liabilities, December 31, 2023 = $ 3,671. Accrued warranty reserve, September 30, 2024 = 4,524. Accrued warranty reserve, December 31, 2023 = 3,606. Other non-current liabilities, September 30, 2024 = 996. Other non-current liabilities, December 31, 2023 = 876. Total other long-term liabilities, September 30, 2024 = $ 9,810. Total other long-term liabilities, December 31, 2023 = $ 8,153", + "page_start": 23, + "page_end": 23, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Litigation Relating to Potential Going Private Transaction\nBetween August 10, 2018 and September 6, 2018, nine purported stockholder class actions were filed against Tesla and Elon Musk in connection with Mr. Musk's August 7, 2018 Twitter post that he was considering taking Tesla private. On January 16, 2019, Plaintiffs filed their consolidated complaint in the United States District Court for the Northern District of California and added as defendants the members of Tesla's board of directors. The consolidated complaint asserts claims for violations of the federal securities laws and seeks unspecified damages and other relief. The parties stipulated to certification of a class of stockholders, which the court granted on November 25, 2020. Trial started on January 17, 2023, and on February 3, 2023, a jury rendered a verdict in favor of the defendants on all counts. After trial, plaintiffs filed a motion for judgment as a matter of law and a motion for new trial, which the Court denied and judgement was entered in favor of defendants on July 11, 2023. On July 14, 2023, plaintiffs filed a notice of appeal. The appeal, which is pending in the United States Court of Appeals for the Ninth Circuit, has been fully briefed by the parties, and is scheduled for oral argument on October 25, 2024.\nBetween October 17, 2018 and March 8, 2021, seven derivative lawsuits were filed in the Delaware Court of Chancery, purportedly on behalf of Tesla, against Mr. Musk and the members of Tesla's board of directors, as constituted at relevant times, in relation to statements made and actions connected to a potential going private transaction, with certain of the lawsuits challenging additional Twitter posts by Mr. Musk, among other things. Several of those actions were consolidated, and all have been stayed. In addition to these cases, two derivative lawsuits were filed on October 25, 2018 and February 11, 2019 in the U.S. District Court for the District of Delaware, purportedly on behalf of Tesla, against Mr. Musk and the members of the Tesla board of directors as then constituted. Those cases have also been consolidated and stayed pending resolution of the appeal in the above-referenced consolidated purported stockholder class action.\n21\n27 sur 49\n10/01/2025, 14:3\ntsla-20240930\nhttps://www.sec.gov/Archives/edgar/data/1318605/00016282802404..", + "page_start": 26, + "page_end": 27, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Table of Contents\nOn October 21, 2022, a lawsuit was filed in the Delaware Court of Chancery by a purported shareholder of Tesla alleging, among other things, that board members breached their fiduciary duties in connection with their oversight of the Company's 2018 settlement with the SEC, as amended. Among other things, the plaintiff seeks reforms to the Company's corporate governance and internal procedures, unspecified damages, and attorneys' fees. The lawsuit has been stayed pending resolution of a motion to consolidate certain derivative lawsuits in the Delaware Court of Chancery referenced below.\nOn November 15, 2021, JPMorgan Chase Bank ('JP Morgan') filed a lawsuit against Tesla in the Southern District of New York alleging breach of a stock warrant agreement that was entered into as part of a convertible notes offering in 2014. In 2018, JP Morgan informed Tesla that it had adjusted the strike price based upon Mr. Musk's August 7, 2018 Twitter post that he was considering taking Tesla private. Tesla disputed JP Morgan's adjustment as a violation of the parties' agreement. In 2021, Tesla delivered shares to JP Morgan per the agreement, which they duly accepted. JP Morgan now alleges that it is owed approximately $162 million as the value of additional shares that it claims should have been delivered as a result of the adjustment to the strike price in 2018. On January 24, 2022, Tesla filed multiple counterclaims as part of its answer to the underlying lawsuit, asserting among other points that JP Morgan should have terminated the stock warrant agreement in 2018 rather than make an adjustment to the strike price that it should have known would lead to a commercially unreasonable result. Tesla believes that the adjustments made by JP Morgan were neither proper nor commercially reasonable, as required under the stock warrant agreements. JP Morgan filed a motion for judgment on the pleadings, which Tesla opposed, and on September 12, 2024, the Court denied JP Morgan's motion.", + "page_start": 27, + "page_end": 27, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "SIGNATURES\nPursuant to the requirements of Section 13 or 15(d) the Securities Exchange Act of 1934, the registrant has duly caused this report to be signed on its behalf by the undersigned, thereunto duly authorized.\nTesla, Inc.\nDate: October 23, 2024\n/s/ Vaibhav Taneja\nVaibhav Taneja Chief Financial Officer (Principal Financial Officer and Duly Authorized Officer)\n38\n49 sur 49\n10/01/2025, 14:3", + "page_start": 48, + "page_end": 48, + "source_file": "tesla_form_10q.pdf" + } + ] + }, + { + "references": { + "source_file": "tesla_form_10q.pdf", + "query": "Where was Tesla incorporated? ", + "target_page": 13, + "target_passage": "State of Delaware", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Overview\nTesla, Inc. ('Tesla', the 'Company', 'we', 'us' or 'our') was incorporated in the State of Delaware on July 1, 2003 and converted to a Texas corporation on June 13, 2024.", + "page_start": 12, + "page_end": 12, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Tesla, Inc.\n(Exact name of registrant as specified in its charter)\nTexas\n91-2197729\n(State or other jurisdiction of incorporation or organization)\n(I.R.S. Employer Identification No.)\n1 Tesla Road\nAustin, Texas\n78725\n(Address of principal executive offices)\n(Zip Code)", + "page_start": 0, + "page_end": 0, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Certain Derivative Lawsuits in Delaware\nBefore converting from a Delaware to Texas corporation on June 13, 2024, three separate derivative actions brought by purported Tesla stockholders were filed in the Delaware Court of Chancery on May 24, June 10 and June 13, 2024, purportedly on behalf of Tesla, against current and former directors regarding topics involving Elon Musk and others, X Corp. (formerly Twitter) and x.AI. These suits assert various claims, including breach of fiduciary duty and breach of contract, and seek unspecified damages and other relief. On August 6, 2024, the plaintiffs in these three actions moved to consolidate the matters into a single case, and a hearing on that motion is scheduled for November 18, 2024.", + "page_start": 27, + "page_end": 27, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Other Litigation Related to Our Products and Services\nin San Diego County Superior Court in California. Tesla subsequently removed the San Diego County case to federal court and on January 8, 2024, the federal court granted Tesla's motion to transfer the case to the U.S. District Court for the Northern District of California. Tesla moved to compel arbitration, which the plaintiff did not oppose, and on June 27, 2024, the Court stayed the case pending arbitration.\nOn February 27, 2023, a proposed class action was filed in the U.S. District Court for the Northern District of California against Tesla, Inc., Elon Musk and certain current and former Company executives. The complaint alleges that the defendants made material misrepresentations and omissions about the Company's Autopilot and FSD Capability technologies and seeks money damages and other relief on behalf of persons who purchased Tesla stock between February 19, 2019, and February 17, 2023. An amended complaint was filed on September 5, 2023, naming only Tesla, Inc. and Elon Musk as defendants. On November 6, 2023, Tesla moved to dismiss the amended complaint. On September 30, 2024, the Court granted Tesla's motion to dismiss without prejudice.\nOn March 14, 2023, a proposed class action was filed against Tesla, Inc. in the U.S. District Court for the Northern District of California. Several similar complaints were also filed in the same court and these cases have now all been consolidated. These complaints allege that Tesla violates federal antitrust and warranty laws through its repair, service, and maintenance practices and seeks, among other relief, damages for persons who paid Tesla for repairs services or Tesla compatible replacement parts from March 2019 to March 2023. On July 17, 2023, these plaintiffs filed a consolidated amended complaint. On September 27, 2023, the court granted Tesla's motion to compel arbitration as to three of the plaintiffs, and on November 17, 2023, the court granted Tesla's motion to dismiss without prejudice. The plaintiffs filed a Consolidated Second Amended Complaint on December 12, 2023, which Tesla moved to dismiss. Plaintiffs also appealed the court's arbitration order, which was denied. On June 17, 2024, the Court granted in part and denied in part Tesla's motion to dismiss the Consolidated Second Amended Complaint.", + "page_start": 28, + "page_end": 28, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "SIGNATURES\nPursuant to the requirements of Section 13 or 15(d) the Securities Exchange Act of 1934, the registrant has duly caused this report to be signed on its behalf by the undersigned, thereunto duly authorized.\nTesla, Inc.\nDate: October 23, 2024\n/s/ Vaibhav Taneja\nVaibhav Taneja Chief Financial Officer (Principal Financial Officer and Duly Authorized Officer)\n38\n49 sur 49\n10/01/2025, 14:3", + "page_start": 48, + "page_end": 48, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Litigation and Investigations Relating to Alleged Discrimination and Harassment\nOn February 9, 2022, the California Civil Rights Department ('CRD,' formerly 'DFEH') filed a civil complaint against Tesla in Alameda County, California Superior Court, alleging systemic race discrimination, hostile work environment and pay equity claims, among others. CRD's amended complaint seeks monetary damages and injunctive relief. The case is currently in discovery. Trial is scheduled for September 15, 2025.\nAdditionally, on June 1, 2022 the Equal Employment Opportunity Commission ('EEOC') issued a cause finding against Tesla that closely parallels the CRD's allegations. On September 28, 2023, the EEOC filed a civil complaint against Tesla in the United States District Court for the Northern District of California asserting claims for race harassment and retaliation and seeking, among other things, monetary and injunctive relief.\nOn June 16, 2022, two Tesla stockholders filed separate derivative actions in the U.S. District Court for the Western District of Texas, purportedly on behalf of Tesla, against certain of Tesla's current and former directors. Both suits assert claims for breach of fiduciary duty, unjust enrichment, and violation of the federal securities laws in connection with alleged race and gender discrimination and sexual harassment. Among other things, plaintiffs seek declaratory and injunctive relief, unspecified damages payable to Tesla, and attorneys' fees. On July 22, 2022, the Court consolidated the two cases and on September 6, 2022, plaintiffs filed a consolidated complaint. On November 7, 2022, the defendants filed a motion to dismiss the case and on September 15, 2023, the Court dismissed the action but granted plaintiffs leave to file an amended complaint. On November 2, 2023, plaintiff filed an amended complaint purportedly on behalf of Tesla, against Elon Musk. On December 19, 2023, the defendants moved to dismiss the amended complaint, which the Court granted on April 12, 2024, with leave for plaintiffs to amend. On May 15, 2024, plaintiffs filed a second amended consolidated complaint purportedly on behalf of Tesla, against Mr. Musk. On July 1, 2024, the defendants moved to dismiss the second amended consolidated complaint.\n22\n28 sur 49\n10/01/2025, 14:3\ntsla-20240930", + "page_start": 27, + "page_end": 28, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Certain Investigations and Other Matters\nWe regularly receive requests for information, including subpoenas, from regulators and governmental authorities such as the National Highway Traffic Safety Administration, the National Transportation Safety Board, the Securities and Exchange Commission ('SEC'), the Department of Justice ('DOJ'), and various local, state, federal, and international agencies. The ongoing requests for information include topics such as operations, technology (e.g., vehicle functionality, vehicle incidents, Autopilot and FSD Capability), compliance, finance, data privacy, and other matters related to Tesla's business, its personnel, and related parties. We routinely cooperate with such formal and informal requests for information, investigations, and other inquiries. To our knowledge no government agency in any ongoing investigation has concluded that any wrongdoing occurred. We cannot predict the outcome or impact of any ongoing matters. Should the government decide to pursue an enforcement action, there exists the possibility of a material adverse impact on our business, results of operation, prospects, cash flows, financial position or brand.\nWe are also subject to various other legal proceedings, risks and claims that arise from the normal course of business activities. For example, during the second quarter of 2023, a foreign news outlet reported that it obtained certain misappropriated data including, purportedly non-public Tesla business and personal information. Tesla has made notifications to potentially affected individuals (current and former employees) and regulatory authorities and we are working with certain law enforcement and other authorities. On August 5, 2023, a putative class action was filed in the United States District Court for the Northern District of California, purportedly on behalf of all U.S. individuals impacted by the data incident, followed by several additional lawsuits, that each assert claims under various state laws and seeks monetary damages and other relief. If an unfavorable ruling or development were to occur in these or other possible legal proceedings, risks and claims, there exists the possibility of a material adverse impact on our business, results of operations, prospects, cash flows, financial position or brand.", + "page_start": 29, + "page_end": 29, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Litigation Relating to Potential Going Private Transaction\nBetween August 10, 2018 and September 6, 2018, nine purported stockholder class actions were filed against Tesla and Elon Musk in connection with Mr. Musk's August 7, 2018 Twitter post that he was considering taking Tesla private. On January 16, 2019, Plaintiffs filed their consolidated complaint in the United States District Court for the Northern District of California and added as defendants the members of Tesla's board of directors. The consolidated complaint asserts claims for violations of the federal securities laws and seeks unspecified damages and other relief. The parties stipulated to certification of a class of stockholders, which the court granted on November 25, 2020. Trial started on January 17, 2023, and on February 3, 2023, a jury rendered a verdict in favor of the defendants on all counts. After trial, plaintiffs filed a motion for judgment as a matter of law and a motion for new trial, which the Court denied and judgement was entered in favor of defendants on July 11, 2023. On July 14, 2023, plaintiffs filed a notice of appeal. The appeal, which is pending in the United States Court of Appeals for the Ninth Circuit, has been fully briefed by the parties, and is scheduled for oral argument on October 25, 2024.\nBetween October 17, 2018 and March 8, 2021, seven derivative lawsuits were filed in the Delaware Court of Chancery, purportedly on behalf of Tesla, against Mr. Musk and the members of Tesla's board of directors, as constituted at relevant times, in relation to statements made and actions connected to a potential going private transaction, with certain of the lawsuits challenging additional Twitter posts by Mr. Musk, among other things. Several of those actions were consolidated, and all have been stayed. In addition to these cases, two derivative lawsuits were filed on October 25, 2018 and February 11, 2019 in the U.S. District Court for the District of Delaware, purportedly on behalf of Tesla, against Mr. Musk and the members of the Tesla board of directors as then constituted. Those cases have also been consolidated and stayed pending resolution of the appeal in the above-referenced consolidated purported stockholder class action.\n21\n27 sur 49\n10/01/2025, 14:3\ntsla-20240930\nhttps://www.sec.gov/Archives/edgar/data/1318605/00016282802404..", + "page_start": 26, + "page_end": 27, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Litigation Related to Directors' Compensation\nOn June 17, 2020, a purported Tesla stockholder filed a derivative action in the Delaware Court of Chancery, purportedly on behalf of Tesla, against certain of Tesla's current and former directors regarding compensation awards granted to Tesla's directors, other than Elon Musk, between 2017 and 2020. The suit asserts claims for breach of fiduciary duty and unjust enrichment and seeks declaratory and injunctive relief, unspecified damages and other relief. Defendants filed their answer on September 17, 2020.\nOn July 14, 2023, the parties filed a Stipulation and Agreement of Compromise and Settlement, which does not involve an admission of any wrongdoing by any party. If the settlement is approved by the Court, this action will be fully settled and dismissed with prejudice. Pursuant to the terms of the agreement, Tesla provided notice of the proposed settlement to stockholders of record as of July 14, 2023. The Court held a hearing regarding the settlement on October 13, 2023, after which it took the settlement and plaintiff counsels' fee request under advisement. On August 14, 2024, the parties submitted a joint letter requesting that the Court approve and enter final judgment with respect to the settlement, and decide the fee request at a later date. The settlement is not expected to have an adverse impact on our results of operations, cash flows or financial position.", + "page_start": 26, + "page_end": 26, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "( 1 ) O r g a n i z a t i o n\n- EFT Services Holding B.V., incorporated in the Netherlands\n- Euronet Banktechnikai Szolgaltato Kft. ('Bank Tech'), incorporated in Hungary\n- Euronet Adminisztracios Szolgaltato Kft. ('Administrative Services') (formerly SatComNet), incorporated in Hungary\n- Bankomat 24/Euronet Sp. z o.o. ('Bankomat'), incorporated in Poland\n- EFT-Usluge d o.o., incorporated in Croatia\n- Euronet Services GmbH, incorporated in Germany\n- EFT Services France SAS, incorporated in France\n- Euronet Services spol. s.r.o., incorporated in the Czech Republic\n- Euronet Services SRL, incorporated in Romania\n- Euronet Services (UK) Limited, incorporated in the United Kingdom\n- Euronet USA Inc. (formerly Arkansas Systems, Inc.) ('Euronet USA') incorporated in Arkansas, United States of America\n- EFT Network Services LLC ('Dash'), incorporated in Arkansas, United States of America\n- Euronet Holding N.V., incorporated in the Netherlands Antilles (in liquidation)\n- Euronet Eft Services Hellas, incorporated in Greece", + "page_start": 30, + "page_end": 30, + "source_file": "NASDAQ_EEFT_2000.pdf" + } + ] + }, + { + "references": { + "source_file": "tesla_form_10q.pdf", + "query": "What is the reason for the increase in Tesla's tax rate from 2023 to 2024?", + "target_page": 26, + "target_passage": " increase in our effective tax rate is primarily due to the impact of releasing the valuation allowance on our U.S. deferred tax assets in the fourth quarter of 2023 and changes in the mix of our jurisdictional earnings", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "Table of Contents\nOur provision for income taxes increased by $434 million in the three months ended September 30, 2024 and increased by $652 million in the nine months ended September 30, 2024 as compared to the three and nine months ended September 30, 2023, respectively. Our effective tax rate increased from 8% to 22% in the three months ended September 30, 2024 and increased from 10% to 23% in the nine months ended September 30, 2024 as compared to the three and nine months ended September 30, 2023, respectively. These increases are primarily due to the impact of releasing the valuation allowance on our U.S. deferred tax assets in the fourth quarter of 2023 and changes in mix of jurisdictional earnings.\nSee Note 9, Income Taxes , to the consolidated financial statements included elsewhere in this Quarterly Report on Form 10-Q for further details.", + "page_start": 42, + "page_end": 42, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Automotive & Services and Other Segment\nServices and other revenue increased $624 million, or 29%, in the three months ended September 30, 2024 as compared to the three months ended September 30, 2023. Services and other revenue increased $1.53 billion, or 25%, in the nine months ended September 30, 2024 as compared to the nine months ended September 30, 2023. The increases were primarily due to increases in non-warranty maintenance services and collision revenue, used vehicle revenue, paid Supercharging revenue, insurance services revenue and part sales revenue.", + "page_start": 35, + "page_end": 35, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Note 9 - Income Taxes\nOur effective tax rate was 22% and 23% for the three and nine months ended September 30, 2024, respectively, compared to 8% and 10% for the three and nine months ended September 30, 2023, respectively. The increase in our effective tax rate is primarily due to the impact of releasing the valuation allowance on our U.S. deferred tax assets in the fourth quarter of 2023 and changes in the mix of our jurisdictional earnings.\nOur effective tax rates for the three and nine months of 2024 and 2023 as compared to the U.S. federal statutory rate of 21% were primarily impacted by the mix of our jurisdictional earnings subject to different tax rates, valuation allowances on our deferred tax assets and benefits from our U.S. tax credits and the Inflation Reduction Act of 2022 ('IRA') manufacturing credits.\nWe are subject to tax examinations in the U.S. federal, state and foreign jurisdictions. Given the uncertainty in timing and outcome of our tax examinations, an estimate of the range of the reasonably possible change in gross unrecognized tax benefits within twelve months cannot be made at this time.", + "page_start": 25, + "page_end": 25, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Automotive & Services and Other Segment\nAutomotive sales revenue increased $249 million, or 1%, in the three months ended September 30, 2024 as compared to the three months ended September 30, 2023, due to an increase of approximately 23,000 combined Model 3 and Model Y cash deliveries and an increase of 8,000 deliveries of other models primarily due to our production ramp of Cybertruck. Additionally, we recognized $326 million of FSD revenue for Cybertruck and certain features such as Actually Smart Summon in the third quarter of 2024. The increases were partially offset by lower average selling price on our vehicles driven by overall price reductions and attractive financing options provided year over year as well as mix.\nAutomotive sales revenue decreased $4.06 billion, or 7%, in the nine months ended September 30, 2024 as compared to the nine months ended September 30, 2023, primarily due to lower average selling price on our vehicles driven by overall price reductions and attractive financing options provided year over year as well as mix. Additionally, there was a decrease of approximately 17,000 combined Model 3 and Model Y cash deliveries partially due to the early phase of the production ramp of the updated Model 3 at our Fremont factory. The decreases were partially offset by an increase of approximately 19,000 deliveries of other models primarily due to our production ramp of Cybertruck and an increase in FSD revenue compared to the prior period, as discussed above.\nAutomotive regulatory credits revenue increased $185 million, or 33%, in the three months ended September 30, 2024 as compared to the three months ended September 30, 2023. Automotive regulatory credits revenue increased $714 million, or 53%, in the nine months ended September 30, 2024 as compared to the nine months ended September 30, 2023. These increases were driven by demand for credits in North America as other automobile manufacturers scale back on their battery electric vehicle plans.\nAutomotive leasing revenue decreased $43 million, or 9%, in the three months ended September 30, 2024 as compared to the three months ended September 30, 2023. Automotive leasing revenue decreased $240 million, or 15%, in the nine months ended September 30, 2024 as compared to the nine months ended September 30, 2023. The decreases were primarily due to lower direct sales-type leasing deliveries and a decrease in lease buyouts.", + "page_start": 35, + "page_end": 35, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Income Tax Expense (2014 vs. 2013)\nThe increase in the effective tax rate for 2014 compared with 2013 was primarily due to tax adjustments associated with a reassessment of our deferred tax assets related to acquisitions.", + "page_start": 35, + "page_end": 35, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Note 12 - Segment Reporting and Information about Geographic Areas\nAutomotive, September 30, 2024 = $ 12,266. Automotive, December 31, 2023 = $ 11,139. Energy generation and storage, September 30, 2024 = 2,264. Energy generation and storage, December 31, 2023 = 2,487. Total, September 30, 2024 = $ 14,530. Total, December 31, 2023 = $ 13,626", + "page_start": 30, + "page_end": 30, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Energy Generation and Storage Segment\nEnergy generation and storage revenue increased $817 million, or 52%, in the three months ended September 30, 2024 as compared to the three months ended September 30, 2023. Energy generation and storage revenue increased $2.43 billion, or 53%, in the nine months ended September 30, 2024 as compared to the nine months ended September 30, 2023. The increases were primarily due to increases in Megapack and Powerwall deployments compared to the prior periods.\n29\n36 sur 49\n10/01/2025, 14:3\ntsla-20240930\nhttps://www.sec.gov/Archives/edgar/data/1318605/00016282802404..\n37 sur 49\n10/01/2025, 14:3\ntsla-20240930\nhttps://www.sec.gov/Archives/edgar/data/1318605/00016282802404..", + "page_start": 35, + "page_end": 37, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Income Tax Expense (2013 vs. 2012)\nThe increase in the effective tax rate for 2013 compared with 2012 was primarily due to changes in our estimated state tax reserves.", + "page_start": 35, + "page_end": 35, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Management's Discussion and Analysis of Financial Condition and Results of Operations\n$12 million in 2004. The increase is due to the full year of Borgata's results, offset by a reduction to state income taxes in the fourth quarter of 2004. Borgata received a notice of refund of certain state tax credits and recorded a benefit for amounts earned in 2003 and 2004, which had previously been fully reserved. Our share of the adjustment was $12 million. We expect our share of the benefit of these tax credits to positively impact this line item by approximately $8 million per year for the next three years.\nThe following table summarizes information related to our income taxes:", + "page_start": 35, + "page_end": 35, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "Overview\nTesla, Inc. ('Tesla', the 'Company', 'we', 'us' or 'our') was incorporated in the State of Delaware on July 1, 2003 and converted to a Texas corporation on June 13, 2024.", + "page_start": 12, + "page_end": 12, + "source_file": "tesla_form_10q.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0764.pdf", + "query": "Which is the first candidate for experimenting the case of electrons interacting with a single boson mode?", + "target_page": 6, + "target_passage": "The primary candidate for such mode is an optical phonon", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "B. The Einstein boson model\nWe next consider the case of electrons interacting with a single boson mode which by itself is not affected by superconductivity. The primary candidate for such mode is an optical phonon. The imaginary part of the NS self energy has been discussed numerous times in the literature. We make one simplifying assumption - approximate the DOS by a constant in calculating fermionic self-energy. We will, however, keep the full lattice dispersion in the calculations of the optical integral. The advantage of this\n6\nFIG. 5: The evolution of optical integral in NS(top) and SCS(bottom) for BCSI case. Plots are made for clean limit (solid lines, Γ = 3 . 5 meV ) and dirty limit (dashed lines, Γ = 150 meV ) for ∆ = 30 meV . Observe that (a) W (0) = 0 in the NS, but has a non-zero value in the SCS because of the δ -function (this value decreases in the dirty limit), and (b) the flat region in the SCS is due to the fact that σ ' ( ω ) = 0 for Ω < 2∆. Also note that ∼ 90 -95% of the spectral weight is recovered up to 1 eV\napproximation is that the self-energy can be computed analytically. The full self-energy obtained with the lattice dispersion is more involved and can only be obtained numerically, but its structure is quite similar to the one obtained with a constant DOS.\nThe self-energy for a constant DOS is given by\nΣ( iω ) = -i 2 π λ n ∫ d/epsilon1 k d ( i Ω) χ ( i Ω) G ( /epsilon1 k , iω + i Ω) (13)\nwhere\nχ ( i Ω) = ω 2 0 ω 2 0 -( i Ω) 2 (14)\nand λ n is a dimensionless electron-boson coupling. Integrating and transforming to real frequencies, we obtain\nΣ '' ( ω ) = -π 2 λ n ω o Θ( | ω | -ω o )\nIn the SCS, we obtain for ω < 0\nΣ ' ( ω ) = -1 2 λ n ω o log ∣ ∣ ∣ ∣ ω + ω o ω -ω o ∣ ∣ ∣ ∣ (15)", + "page_start": 5, + "page_end": 5, + "source_file": "1001.0764.pdf" + }, + { + "text": "D. The collective boson model\nTo address this issue, we took a larger λ for the same ω sf and re-did the calculation of the conductivities and optical integrals. The results for σ ( ω ) and ∆ W ( ω c ) are presented in Fig. 22. We found the same behavior as before, i.e., ∆ W K is negative. But we also found that the larger is the overall scale for the self-energy, the larger is a frequency of zero-crossing of ∆ W ( ω c ). In particular, for the same λ and ω sf that were used in Ref. 33 to fit the NS conductivity data, the zero crossing is at ∼ 0 . 8 eV which is quite close to the bandwidth. This implies that at a truly strong coupling the frequency at which ∆ W ( ω c ) changes sign can well be larger than the bandwidth of 1 eV in which case ∆ W integrated up to the bandwidth does indeed remain positive. Such behavior would be consistent with Refs.8,9. we also see from Fig. 22 that ∆ W K becomes small at a truly strong coupling, and over a wide range of frequencies the behavior of ∆ W ( ω c ) is predominantly governed by ∆ f ( ω c ), i.e. by the cut-off term. 50 The implication is that, to first approximation, ∆ W K can be neglected and positive ∆ W ( w c ) integrated to a frequency where it is still positive is almost compensated by the integral over larger frequencies. This again would be consistent with the experimental data in Refs. 8,9.\nIt is also instructive to understand the interplay between the behavior of ∆ W ( ω c ) and the behavior of the difference of the kinetic energy between the SCS and the NS, δ KE . We computed the kinetic energy as a function of λω sf and present the results in Fig. 23 for λ = 1 and 10. For a relatively weak λ = 1 the behavior is clearly BCS likeδ KE > 0 and increases with increasing λω sf . However, at large λ = 10, we see that the kinetic energy begin decreasing at large λω sf and eventually changes sign. The behavior of δ KE at a truly strong coupling is\n14\nconsistent with earlier calculation of the kinetic energy for Ornstein-Zernike form of the spin susceptibility 43 .", + "page_start": 13, + "page_end": 13, + "source_file": "1001.0764.pdf" + }, + { + "text": "D. The collective boson model\nhigh-energy fermions and is an input for the low-energy theory. Below we follow Refs. 31,33 and assume that the momentum dependence of a collective boson is flat near ( π, π ). The self energy within such model has been worked out consistently in Ref. 31,33. In the normal state\nΣ '' ( ω ) = -1 2 λ n ω sf log ( 1 + ω 2 ω 2 sf ) ω (19)\nΣ ' ( ω ) = -λ n ω sf arctan ω sf\nwhere λ n is the spin-fermion coupling constant, and ω sf is a typical spin relaxation frequency of overdamped spin collective excitations with a propagator\nχ ( q ∼ Q, Ω) = χ Q 1 -i Ω ω sf (20)\nwhere χ Q is the uniform static susceptibility. If we use Ornstein-Zernike form of χ ( q ) and use either Eliashberg 45 or FLEX computational schemes 48 , we get rather similar behavior of Σ as a function of frequency and rather similar behavior of optical integrals.\nThe collective nature of spin fluctuations is reflected in the fact that the coupling λ and the bosonic frequency ω sf are related: λ scales as ξ 2 , where ξ is the bosonic mass (the distance to a bosonic instability), and ω sf ∝ ξ -2 (see Ref. 49). For a flat χ ( q ∼ Q ) the product λω sf does not depend on ξ and is the overall dimensional scale for boson-mediated interactions.\nIn the SCS fermionic excitations acquire a gap. This gap affects fermionic self-energy in two ways: directly, via the change of the dispersion of an intermediate boson in the exchange process involving a CB, and indirectly, via the change of the propagator of a CB. We remind ourselves that the dynamics of a CB comes from a particlehole bubble which is indeed affected by ∆.\nThe effect of a d -wave pairing gap on a CB has been discussed in a number of papers, most recently in 31 . In\n11\na SCS a gapless continuum described by Eq. (20) transforms into a gaped continuum, with a gap about 2∆ and a resonance at ω = ω 0 < 2∆, where for a d -wave gap we define ∆ as a maximum of a d -wave gap.", + "page_start": 10, + "page_end": 10, + "source_file": "1001.0764.pdf" + }, + { + "text": "II. MODEL HAMILTONIAN AND MONTE CARLO OBSERVABLES\nFor all the quantities of interest, the average value and the error estimate were obtained by the bootstrap resampling method 22 given that, as pointed out in Ref. 23, for a large enough number of measurements, this method turns out to be more accurate than the usual blocking technique. In our implementation, we pick out randomly a sizable number of measurements (typically, between 1 and 1 × 10 3 for the single simulation, and between 1 and 5 × 10 4 for the MH technique), and iterate the re-sampling at least one hundred times.\nThe thermodynamic observables we have investigated include the FM order parameter for each plane l :\nm l = √ ( m x l ) 2 +( m y l ) 2 , (2)\nwhich is related to the SO (2) symmetry breaking. At the same time, it turns out to be significant also the average order parameter of the film, defined as\nM = 1 n n ∑ l =1 m l . (3)\nTurning to the helical order, which is the relevant quantity for the Z 2 × SO (2) symmetry, we can explore it along two different directions. The first one is by the introduction of the chirality order parameter 1,2\nκ = 1 4( n -1) L 2 sin Q z ∑ 〈 ij 〉 [ S x i S y j -S y i S x j ] , (4)\nwhere the sum refers to spins belonging to NN layers i and j , respectively, while Q z is the bulk helical pitch vector along the z direction. The second possibility is that of looking at the integral of the structure factor:\nM HM = 1 K ∫ π 0 dq z S ( /vector q ) (5)\nwhere S ( /vector q ), with /vectorq = (0 , 0 , q z ), is the structure factor 24 (i.e. the Fourier transform of the spin correlation function) along the z-direction of the film, while the normalization factor K is the structure factor integral at T = 0. Although the use of the last observable can be seen as a suitable and elegant way to overcome the intrinsic difficulties met in defining a correct helical order parameter, free of any undue external bias (as the wave-vector Q z\n3", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0510.pdf" + }, + { + "text": "D. The collective boson model\nFIG. 20: ∆ W (in meV) for λ = 1(top) and λ = 10(bottom). We used ω sf = 26 meV/λ and ∆ = 30 meV . The zero crossing is not affected because we keep λω sf constant. The notable difference is the widening of the dip at a larger λ .\nFIG. 21: Distribution functions n ( /epsilon1 ) for CB model for λ = 1 and λ = 7 and a constant ω sf = 26 meV . We set ∆ = 30 meV . For smaller λ (top), quasiparticles near the FS are well defined as indicated by the well pronounced jump in n ( /epsilon1 ). For λ = 7, n ( /epsilon1 ) is rather smooth implying that a coherence is almost lost. Some irregularities is the SCS distribution function are due to finite sampling in the frequency domain. The irregularities disappear when finer mesh for frequencies is chosen.\nshows up in the optical gap), where as in the BCSI case it would have always begun from 2∆. In Fig 18 we plot the Kubo sums W K vs coupling λ . We see that for all λ , W K in the NS stays larger than in the SCS. Fig 19 shows the cutoff dependence of the optical integrals W ( ω c ) for λ = 1 separately in the NS and the SCS. We again see that only about 73% of the Kubo sum is recovered up to the bandwidth of 1 eV indicating that there is a significant amount left to recover beyond this energy scale. Fig 20 shows ∆ W for the two different couplings. We see that, for both λ 's, there is only one zero-crossing for the ∆ W curve, and ∆ W is negative at larger frequencies. The only difference between the two plots is that for larger coupling the dip in ∆ W gets 'shallower'. Observe also that the solid line in Fig. 20 is rather far away from the dashed line at ω c > 1 meV , which indicates that, although ∆ W ( ω c ) in this region has some dependence on ω c , still the largest part of ∆ W ( ω c ) is ∆ W K , while the contribution from ∆ f ( ω c ) is smaller.\nc", + "page_start": 11, + "page_end": 12, + "source_file": "1001.0764.pdf" + }, + { + "text": "D. The collective boson model\nΣ '' B ( ω ) = -λ n ∫ | E | 2∆ dxRe ω + x √ ( ω + x ) 2 -∆ 2 x ω sf K 2 ( 1 -4∆ 2 x 2 ) [ 1 -4∆ 2 xω sf D ( 4∆ 2 x 2 ) ] 2 + [ x ω sf K 2 ( 1 -4∆ 2 x 2 ) ] 2 (25)\ncomes from the interaction with the gaped continuum.\nThe real part of Σ is obtained by Kramers-Kronig trans-\nform of the imaginary part.\nλ\nFIG. 17: Conductivities and ∆ W for a fixed λω sf . Top ω sf = 26 meV , λ = 1, ω o = 40 meV , Z o = 0 . 77 Bottom ω sf = 2 . 6 meV , λ = 10, ω o = 13 . 5 meV , Z o = 1 . 22. The zero crossing for ∆ W is not affected by a change in λ because it is determined only by λω sf . We set ∆ = 30 meV .\nFIG. 18: The behavior of Kubo sums in the CB model. Note that the spectral weight in the NS is always larger than in the SCS. We set ω sf = 26 meV , λ = 1, and ∆ = 30 meV .\nWe performed the same calculations of conductivities and optical integrals as in the previous three cases. The results are summarized in Figs. 17 - 22. Fig 17 shows conductivities in the NS and the SCS for two couplings λ = 1 and λ = 10 (keeping λω sf constant). Other parameters Z o and ω o are calculated according to the discussion after Eq 21. for ω sf = 26 meV , λ = 1, we find ω o = 40 meV , Z o = 0 . 77. And for ω sf = 2 . 6 meV , λ = 10, we find ω o = 13 . 5 meV , Z o = 1 . 22. Note that the conductivity in the SCS starts at 2∆ + ω o (i.e. the resonance energy\n12\nFIG. 19: The evolution of the optical integrals in the NS and the SCS in the CB model. Note that about ∼ 75% of the spectral weight is recovered up to 1 eV . We set ω sf = 26 meV , λ = 1, and ∆ = 30 meV .\n1", + "page_start": 10, + "page_end": 11, + "source_file": "1001.0764.pdf" + }, + { + "text": "I. INTRODUCTION\nFIG. 1: Schematic behavior of ∆ W vs ω c , Eq. (4). The limiting value of ∆ W at ω c = ∞ is ∆ W K given by Eq. (3) Depending on the value of ∆ W K , there can be either one sign change of ∆ W (panels a and c), or no sign changes (panel b), or two sign changes (panel d).\nIn our work, we perform direct numerical calculations of optical integrals at T = 0 for a lattice dispersion extracted from ARPES of the cuprates. The goal of our work is two-fold. First, we perform calculations of the optical integral in the NS and analyze how rapidly W ( ω c ) approaches W K , in other words we check how much of the Kubo sum is recovered up to the scale of the bandwidth. Second, we analyze the difference between optical\n3\nintegral in the SCS at T = 0 and in the NS extrapolated to T = 0 and compare the cut off effect ∆ f ( ω c ) to ∆ W K term. We also analyze the sign of ∆ W ( ω c ) at large frequencies and discuss under what conditions theoretical W ( ∞ ) increases in the SCS.\nWe perform calculations for four models. First is a conventional BCS model with impurities (BCSI model). Second is an Einstein boson (EB) model of fermions interacting with a single Einstein boson whose propagator does not change between NS and SCS. These two cases will illustrate a conventional idea of the spectral weight in SCS being less than in NS. Then we consider two more sophisticated models: a phenomenological 'marginal Fermi liquid with impurities' (MFLI) model of Norman and P'epin 30 , and a microscopic collective boson (CB) model 31 in which in the NS fermions interact with a gapless continuum of bosonic excitations, but in a d -wave SCS a gapless continuum splits into a resonance and a gaped continuum. This model describes, in particular, interaction of fermions with their own collective spin fluctuations 32 via\nΣ( k, ��) = 3 g 2 ∫ dω 2 π d 2 q (2 π ) 2 χ ( q, ω ) G ( k + q, ω +Ω) (6)", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0764.pdf" + }, + { + "text": "D. The collective boson model\nWe now turn to a more microscopic model- the CB model. The model describes fermions interacting by exchanging soft, overdamped collective bosons in a particular, near-critical, spin or charge channel 31,44,45 . This interaction is responsible for the normal state self-energy and also gives rise to a superconductivity. A peculiar feature of the CB model is that the propagator of a collective boson changes below T c because this boson is not an independent degree of freedom (as in EB model) but is made out of low-energy fermions which are affected by superconductivity 32 .\nThe most relevant point for our discussion is that this model contains the physics which we identified above as a source of a potential sign change of ∆ W K . Namely, at strong coupling the fermionic self-energy in the NS is large because there exists strong scattering between low-energy fermions mediated by low-energy collective bosons. In the SCS, the density of low-energy fermions drops and a continuum collective excitations becomes gaped. Both effects reduce fermionic damping and lead to the increase of W K in a SCS. If this increase exceeds a conventional loss of W K due to a gap opening, the total ∆ W K may become positive.\nThe CB model has been applied numerous times to the cuprates, most often under the assumption that nearcritical collective excitations are spin fluctuations with momenta near Q = ( π, π ). This version of a CB boson is commonly known as a spin-fermion model. This model yields d x 2 -y 2 superconductivity and explains in a quantitative way a number of measured electronic features of the cuprates, in particular the near-absence of the quasiparticle peak in the NS of optimally doped and underdoped cuprates 39 and the peak-dip-hump structure in the ARPES profile in the SCS 31,32,46,47 . In our analysis we assume that a CB is a spin fluctuation.\nThe results for the conductivity within a spin-fermion model depend in quantitative (but not qualitative) way on the assumption for the momentum dispersion of a collective boson. This momentum dependence comes from", + "page_start": 9, + "page_end": 9, + "source_file": "1001.0764.pdf" + }, + { + "text": "III. REALIZATION OF THE KITAEV MODEL.\nWe emphasize that because the first intra-cluster term ∑ cluster H cluster commutes with the latter Kitaev terms independent of the representation used, the Kitaev model is realized as the exact low energy Hamiltonian of this model without truncation errors of perturbation theories, namely no ( | J x,y,z | /J cluster ) 2 or higher order terms will be generated under the projection to low energy cluster singlet space. This is unlike, for example, the t/U expansion of the half-filled Hubbard model 22,23 , where at lowest t 2 /U order the effective Hamiltonian is the Heisenberg model, but higher order terms ( t 4 /U 3 etc.) should in principle still be included in the low energy effective Hamiltonian for any finite t/U . Similar comparison can be made to the perturbative expansion studies of the Kitaev-type models by Vidal et al. 9 , where the low energy effective Hamiltonians were obtained in certian anisotropic (strong bond/triangle) limits. Although the spirit of this work, namely projection to low energy sector, is the same as all previous perturbative approaches to effective Hamiltonians.\nNote that the original Kitaev model (1) has threefold rotation symmetry around a honeycomb lattice site, combined with a three-fold rotation in pseudo-spin space (cyclic permutation of τ x , τ y , τ z ). This is not apparent in our model (8) in terms of physical spins, under the current representation of τ x,y,z . We can remedy this by using a different set of pseudo-spin Pauli matrices τ ' x,y,z in (7),\nτ ' x = √ 1 / 3 τ z + √ 2 / 3 τ x , τ ' y = √ 1 / 3 τ z -√ 1 / 6 τ x + √ 1 / 2 τ y , τ ' z = √ 1 / 3 τ z -√ 1 / 6 τ x -√ 1 / 2 τ y\nWith proper representation choice, they have a symmetric form in terms of physical spins,", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0266.pdf" + }, + { + "text": "D. The collective boson model\nWe clearly see that the increase of the zero crossing frequency of ∆ W ( ω c ) at a truly strong coupling is correlated with the non-BCS behavior of δ KE . At the same time, the behavior of δW ( ω c ) is obviously not driven by the kinetic energy as eventually δW ( ω c ) changes sign and become negative. Rather, the increase in the frequency range where ∆ W ( ω c ) remains positive and non-BCS behavior of δ KE are two indications of the same effect that fermions are incoherent in the NS but acquire coherence in the SCS.", + "page_start": 13, + "page_end": 13, + "source_file": "1001.0764.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0764.pdf", + "query": "What was the optical integral analysis proposed by Norman and Pépin?", + "target_page": 8, + "target_passage": "a phenomenological model for the self energy which fits normal state scattering rate measure- ments by ARPES", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "II. OPTICAL INTEGRAL IN NORMAL AND SUPERCONDUCTING STATES\nThe generic formalism of the computation of the optical conductivity and the optical integral has been discussed several times in the literature 21-23,26,29 and we\n4\njust list the formulas that we used in our computations. The conductivity σ (Ω) and the optical integral W ( ω c ) are given by (see for example Ref. 35).\nσ ' (Ω) = Im [ -Π(Ω) Ω+ iδ ] = -Π '' (Ω) Ω + πδ (Ω) Π ' (Ω) (7a)\nW ( ω c ) = ∫ ω c 0 σ ' (Ω) d Ω = -∫ ω c 0+ Π '' (Ω) Ω d Ω + π 2 Π ' (0) (7b)\nwhere ' X ' ' and ' X '' ' stand for real and imaginary parts of X . We will restrict with T = 0. The polarization operator Π(Ω) is (see Ref. 36)\nΠ( i Ω) = T ∑ ω ∑ /vector k ( ∇ /vector k ε /vector k ) 2 ( G ( iω, /vector k ) G ( iω + i Ω , /vector k ) + F ( iω, /vector k ) F ( iω + i Ω , /vector k ) ) (8a)\nΠ ' (Ω) = 1 π 2 ∑ /vector k ( ∇ /vector k ε /vector k ) 2 ∫ ' ∫ ' dxdy ( G '' ( x, /vector k ) G '' ( y, /vector k ) + F '' ( x, /vector k ) F '' ( y, /vector k ) ) n F ( y ) -n F ( x ) y -x (8c)\nΠ '' (Ω) = -1 π ∑ /vector k ( ∇ /vector k ε /vector k ) 2 ∫ 0 -Ω dω ( G '' ( ω, /vector k ) G '' ( ω +Ω , /vector k ) + F '' ( ω, /vector k ) F '' ( ω +Ω , /vector k ) ) (8b)", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0764.pdf" + }, + { + "text": "I. INTRODUCTION\nThe analysis of the optical integral showed that in overdoped cuprates it definitely decreases below T c , in consistency with the expectations at weak coupling 11 . For underdoped cuprates, all experimental groups agree that a relative change of the optical integral below T c gets much smaller. There is no agreement yet about the sign of the change of the optical integral : Molegraaf et al. 8 and Santander-Syro et al. 9 argued that the optical integral increases below T c , while Boris et al. 10 argued that it decreases.\nTheoretical analysis of these results 21,22,25,28,30 added one more degree of complexity to the issue. It is tempting to analyze the temperature dependence of W K and relate it to the observed behavior of the optical integral, and some earlier works 25,28,30 followed this route. In the experiments, however, optical conductivity is integrated only up to a certain frequency ω c , and the quantity which is actually measured is\nW ( ω c ) = ∫ ω c 0 Reσ (Ω) d Ω = W K + f ( ω c ) f ( ω c ) = -∫ ' ∞ ' ω c Reσ (Ω) d Ω (4)\nThe Kubo formula, Eq. (3) is obtained assuming that the second part is negligible. This is not guaranteed, however, as typical ω c ∼ 1 -2 eV are comparable to the bandwidth.\nThe differential sum rule ∆ W is also a sum of two terms\n∆ W ( ω c ) = ∆ W K +∆ f ( ω c ) (5)\nwhere ∆ W K is the variation of the r.h.s. of Eq. 3, and ∆ f ( ω c ) is the variation of the cutoff term. Because conductivity changes with T at all frequencies, ∆ f ( ω c ) also varies with temperature. It then becomes the issue whether the experimentally observed ∆ W ( ω c ) is predominantly due to 'intrinsic' ∆ W K , or to ∆ f ( ω c ). [A third possibility is non-applicability of the Kubo formula because of the close proximity of other bands, but we will not dwell on this.]", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0764.pdf" + }, + { + "text": "A. Camero-Arranz\nFundaci'on Espa˜nola de Ciencia y Tecnolog'ıa (MICINN), C/Rosario Pino,14-16, 28020-Madrid, Spain", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0955.pdf" + }, + { + "text": "2.5. Image analysis\nDuring all image quantification, the experimenter was blind to the experimental groups. For quantification of the total number of cells within the DRG, a modified optical dissector stereological method was used 11,18,47 (Fig. S1, http://links.lww.com/PAIN/C84). To account for tissue shrinkage during processing, the mean thickness ( t ) of each section on one slide (ie, 1 in 5 sections) was calculated by taking the mean of the thickest and thinnest cell-containing regions (ie, not fiber tract-containing regions) of the section (NB: no optical correction to thickness was applied; given the use of a dry lens, this value will not reflect actual section thickness, though this was kept consistent throughout the study). The cell-containing, crosssectional area ( a ) was then calculated, using the middle optical section from the series and drawing around the cell-containing regions. Section volume ( Vsec ) was then calculated:\nVsec ¼ t 3 a\nUsing the Cavalieri principle, the cell-containing volume of the DRG was calculated 11 :\nVDRG ¼ /C22 a 3 /C22 t 3 l\nwhere /C22 a 5 mean cell-containing cross-sectional area, /C22 t 5 mean section thickness, and l 5 'length' of the DRG (determined from the total number of sections collected). The number of neurons per section ( Nsec ) was quantified in all immunostained sections. This included only neurons with a visible nucleus (in the NeuN channel), excluded cells with a nucleus visible within the top frame of the Z-stack, and included any neurons with a nucleus visible in any other field within Z-stack, including the bottom frame of Z-stack. The cell density or the number of cells per unit vol ( N v) was then calculated:\nNv ¼ Nsec Vsec\nFinally, the total number of cells per DRG ( NDRG ) was calculated:\nNDRG ¼ Nv 3 VDRG", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed2.pdf" + }, + { + "text": "II. OPTICAL INTEGRAL IN NORMAL AND SUPERCONDUCTING STATES\nwhere ∫ ' denotes the principal value of the integral, ∑ /vector k is understood to be 1 N ∑ /vector k ,( N is the number of lattice sites), n F ( x ) is the Fermi function which is a step function at zero temperature, G and F are the normal and anomalous Greens functions. given by 37\nFor a NS, G ( ω, /vector k ) = 1 ω -Σ( k, ω ) -ε /vector k + iδ (9a)\nFor a SCS, G ( ω, /vector k ) = Z k,ω ω + ε /vector k Z 2 k,ω ( ω 2 -∆ 2 k,ω ) -ε 2 /vector k + iδsgn ( ω ) (9b)\nF ( ω, /vector k ) = Z k,ω ∆ k,ω Z 2 k,ω ( ω 2 -∆ 2 k,ω ) -ε 2 /vector k + iδsgn ( ω ) (9c)\nwhere Z k,ω = 1 -Σ( k,ω ) ω , and ∆ k,ω , is the SC gap. Following earlier works 31,33 , we assume that the fermionic self-energy Σ( k, ω ) predominantly depends on frequency and approximate Σ( k, ω ) ≈ Σ( ω ) and also neglect the frequency dependence of the gap, i.e., approximate ∆ k,ω by a d -wave ∆ k . The lattice dispersion ε /vector k is taken from Ref. 38. To calculate W K , one has to evaluate the Kubo term in Eq.3 wherein the distribution function n /vector k , is calculated from\nn ( ε /vector k ) = -2 ∫ 0 -∞ dω 2 π G '' ( ω, /vector k ) (10)\nThe 2 is due to the trace over spin indices. We show the distribution functions in the NS and SCS under different circumstances in Fig 2.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0764.pdf" + }, + { + "text": "Optical Integral and Sum Rule Violation\nSaurabh Maiti, Andrey V. Chubukov\nDepartment of Physics, University of Wisconsin, Madison, Wisconsin 53706, USA\n(Dated: November 9, 2018)\nThe purpose of this work is to investigate the role of the lattice in the optical Kubo sum rule in the cuprates. We compute conductivities, optical integrals W , and ∆ W between superconducting and normal states for 2-D systems with lattice dispersion typical of the cuprates for four different models - a dirty BCS model, a single Einstein boson model, a marginal Fermi liquid model, and a collective boson model with a feedback from superconductivity on a collective boson. The goal of the paper is two-fold. First, we analyze the dependence of W on the upper cut-off ( ω c ) placed on the optical integral because in experiments W is measured up to frequencies of order bandwidth. For a BCS model, the Kubo sum rule is almost fully reproduced at ω c equal to the bandwidth. But for other models only 70%-80% of Kubo sum rule is obtained up to this scale and even less so for ∆ W , implying that the Kubo sum rule has to be applied with caution. Second, we analyze the sign of ∆ W . In all models we studied ∆ W is positive at small ω c , then crosses zero and approaches a negative value at large ω c , i.e. the optical integral in a superconductor is smaller than in a normal state. The point of zero crossing, however, increases with the interaction strength and in a collective boson model becomes comparable to the bandwidth at strong coupling. We argue that this model exhibits the behavior consistent with that in the cuprates.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0764.pdf" + }, + { + "text": "II. OPTICAL INTEGRAL IN NORMAL AND SUPERCONDUCTING STATES\nThe /vector k -summation is done over first Brillouin zone for a 2-D lattice with a 62x62 grid. The frequency integrals are done analytically wherever possible, otherwise performed using Simpson's rule for all regular parts. Contributions from the poles are computed separately using Cauchy's theorem. For comparison, in all four cases we also calculated FGT sum rule by replacing ∫ d 2 k = d Ω k d/epsilon1 k ν /epsilon1 k , Ω k and keeping ν constant. We remind that the FGT is the result when one assumes that the integral in W ( ω c ) predominantly comes from a narrow region around the Fermi surface.\nWe will first use Eq 3 and compute W K in NS and SCS. This will tell us about the magnitude of ∆ W ( ω c = ∞ ). We next compute the conductivity σ ( ω ) using the equations listed above, find W ( ω c ) and ∆ W ( ω c ) and compare ∆ f ( ω c ) and ∆ W K .\nFor simplicity and also for comparisons with earlier studies, for BCSI, EB, and MFLI models we assumed that the gap is just a constant along the FS. For CB model, we used a d -wave gap and included into consideration the fact that, if a CB is a spin fluctuation, its propagator develops a resonance when the pairing gap is d -wave.\nFIG. 2: Distribution functions in four cases (a) BCSI model, where one can see that for ε > 0, SC > NS implying KE increases in the SCS. (b) The original MFLI model of Ref. 30, where for ε > 0, SC < NS, implying KE decreases in the SCS. (c) Our version of MFLI model (see text) and (d) the CB model. In both cases, SC > NS, implying KE increases in the SCS. Observe that in the impurity-free CB model there is no jump in n ( /epsilon1 ) indicating lack of fermionic coherence. This is consistent with ARPES 39", + "page_start": 3, + "page_end": 4, + "source_file": "1001.0764.pdf" + }, + { + "text": "A. The BCS case\nFig 5 shows the optical sum in NS and SCS in clean and dirty limits (the parameters are stated in the figure). This plot shows that the Kubo sums are almost completely recovered by integrating up to the bandwidth of 1 eV : the recovery is 95% in the clean limit and ∼ 90% in the dirty limit. In Fig 6 we plot ∆ W ( ω c ) as a function of ω c in clean and dirty limits. ∆ W ( ∞ ) is now non-zero, in agreement with Fig. 4 and we also see that there is\nFIG. 4: Top - a conductivity plot for the BCSI case in the presence of a lattice. The parameters are ∆ = 30 meV , Γ = 3 . 5 meV . Bottom - the behavior of Kubo sums. Note that (a) the spectral weight in the NS is always greater in the SCS, (b) the spectral weight decreases with Γ, and (c) the difference between NS and SCS decreases as Γ increases.\nlittle variation of ∆ W ( ω c ) at above 0 . 1 -0 . 3 eV what implies that for larger ω c , ∆ W ( ω c ) ≈ ∆ W K >> ∆ f ( ω c ).\nTo make this more quantitative, we compare in Fig. 6 ∆ W ( ω c ) obtained for a constant DOS, when ∆ W ( ω c ) = ∆ f ( ω c ), and for the actual lattice dispersion, when ∆ W ( ω c ) = ∆ W K + ∆ f ( ω c ). In the clean limit there is obviously little cutoff dependence beyond 0 . 1 eV , i.e., ∆ f ( ω c ) is truly small, and the difference between the two cases is just ∆ W K . In the dirty limit, the situation is similar, but there is obviously more variation with ω c , and ∆ f ( ω c ) becomes truly small only above 0 . 3 eV . Note also that the position of the dip in ∆ W ( ω c ) in the clean limit is at a larger ω c in the presence of the lattice than in a continuum.", + "page_start": 4, + "page_end": 5, + "source_file": "1001.0764.pdf" + }, + { + "text": "C ORNING T ECHNOLOGIES\nEnvironmental T overall R&D investment. We 1970s. Today emission control business is today in Erwin, N.Y in support of this great diesel opportunity.\nOur Semiconductor Optics business - with some exciting new and continued breakthroughs in the creation of HPFS ® fused silica -chemistry and metrology.\nS EMICONDUCTOR O PTICS: CALCIUM FLUORIDE CRYSTALS\nE NABLING : MICROCIRCUIT LINES AT 1/1000 THE WIDTH OF A HUMAN HAIR\n5", + "page_start": 6, + "page_end": 6, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "II. MODEL HAMILTONIAN AND MONTE CARLO OBSERVABLES\nFor all the quantities of interest, the average value and the error estimate were obtained by the bootstrap resampling method 22 given that, as pointed out in Ref. 23, for a large enough number of measurements, this method turns out to be more accurate than the usual blocking technique. In our implementation, we pick out randomly a sizable number of measurements (typically, between 1 and 1 × 10 3 for the single simulation, and between 1 and 5 × 10 4 for the MH technique), and iterate the re-sampling at least one hundred times.\nThe thermodynamic observables we have investigated include the FM order parameter for each plane l :\nm l = √ ( m x l ) 2 +( m y l ) 2 , (2)\nwhich is related to the SO (2) symmetry breaking. At the same time, it turns out to be significant also the average order parameter of the film, defined as\nM = 1 n n ∑ l =1 m l . (3)\nTurning to the helical order, which is the relevant quantity for the Z 2 × SO (2) symmetry, we can explore it along two different directions. The first one is by the introduction of the chirality order parameter 1,2\nκ = 1 4( n -1) L 2 sin Q z ∑ 〈 ij 〉 [ S x i S y j -S y i S x j ] , (4)\nwhere the sum refers to spins belonging to NN layers i and j , respectively, while Q z is the bulk helical pitch vector along the z direction. The second possibility is that of looking at the integral of the structure factor:\nM HM = 1 K ∫ π 0 dq z S ( /vector q ) (5)\nwhere S ( /vector q ), with /vectorq = (0 , 0 , q z ), is the structure factor 24 (i.e. the Fourier transform of the spin correlation function) along the z-direction of the film, while the normalization factor K is the structure factor integral at T = 0. Although the use of the last observable can be seen as a suitable and elegant way to overcome the intrinsic difficulties met in defining a correct helical order parameter, free of any undue external bias (as the wave-vector Q z\n3", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0510.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0764.pdf", + "query": "What is the Ferrel-Glover-Tinkham sum rule?", + "target_page": 1, + "target_passage": "the redistribution of the spectral weight between normal and superconducting state", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "I. INTRODUCTION\nThe analysis of sum rules for optical conductivity has a long history. Kubo, in an extensive paper 1 in 1957, used a general formalism of a statistical theory of irreversible processes to investigate the behavior of the conductivity in electronic systems. For a system of interacting electrons, he derived the expression for the integral of the real part of a (complex) electric conductivity σ (Ω) and found that it is independent on the nature of the interactions and reduces to\n∫ ∞ 0 Reσ (Ω) d Ω = π 2 ne 2 m (1)\nHere n is the density of the electrons in the system and m is the bare mass of the electron. This expression is exact provided that the integration extends truly up to infinity, and its derivation uses the obvious fact that at energies higher than the total bandwidth of a solid, electrons behave as free particles.\nThe independence of the r.h.s. of Eq. (1) on temperature and the state of a solid (e.g., a normal or a superconducting state - henceforth referred to as NS and SCS respectively) implies that, while the functional form of σ (Ω) changes with, e.g., temperature, the total spectral weight is conserved and only gets redistributed between different frequencies as temperature changes. This conservation of the total weight of σ (Ω) is generally called a sum rule.\nOne particular case, studied in detail for conventional superconductors, is the redistribution of the spectral weight between normal and superconducting states. This is known as Ferrel-Glover-Tinkham (FGT) sum rule: 2,3\n∫ ∞ 0+ Reσ NS (Ω) = ∫ ∞ 0+ Reσ sc (Ω) + πn s e 2 2 m (2)\nwhere n s is the superfluid density, and πn s e 2 / (2 m ) is\nthe spectral weight under the δ -functional piece of the conductivity in the superconducting state.\nIn practice, the integration up to an infinite frequency is hardly possible, and more relevant issue for practical applications is whether a sum rule is satisfied, at least approximately, for a situation when there is a single electron band which crosses the Fermi level and is well separated from other bands. Kubo considered this case in the same paper of 1957 and derived the expression for the 'band', or Kubo sum rule", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0764.pdf" + }, + { + "text": "I. INTRODUCTION\nWe begin with formulating our calculational basis in the next section. Then we take up the four cases and consider in each case the extent to which the Kubo sum is satisfied up to the order of bandwidth and the functional form and the sign of ∆ W ( ω c ). The last section presents our conclusions.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0764.pdf" + }, + { + "text": "I. INTRODUCTION\nThe issue of sum rule attracted substantial interest in the studies of high T c cuprates 5-18,21-26 in which pairing is without doubts a strong coupling phenomenon. From a theoretical perspective, the interest in this issue was originally triggered by a similarity between W K and the kinetic energy K = 2 ∑ ε /vector k n /vector k . 18-20 For a model with a simple tight binding cosine dispersion ε k ∝ (cos k x +cos k y ), d 2 ε /vector k d k 2 x ∼ -ε /vector k and W K = -K . For a more complex dispersion there is no exact relation between W K and K , but several groups argued 17,27,28 that W K can still be regarded as a good monitor for the changes in the kinetic energy. Now, in a BCS superconductor, kinetic energy increases below T c because n k extends to higher frequencies (see Fig.2). At strong coupling, K not necessary increases because of opposite trend associated with the fermionic self-energy: fermions are more mobile in the SCS due to less space for scattering at low energies than they are in the NS. Model calculations show that above some coupling strength, the kinetic energy decreases below T c 29 . While, as we said, there is no one-to-one correspondence between K and W K , it is still likely that, when K decreases, W K increases.\nAgood amount of experimental effort has been put into\n2\naddressing the issue of the optical sum rule in the c -axis 7 and in-plane conductivities 8-16 in overdoped, optimally doped, and underdoped cuprates. The experimental results demonstrated, above all, outstanding achievements of experimental abilities as these groups managed to detect the value of the optical integral with the accuracy of a fraction of a percent. The analysis of the change of the optical integral between normal and SCS is even more complex because one has to (i) extend NS data to T < T c and (ii) measure superfluid density with the same accuracy as the optical integral itself.", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0764.pdf" + }, + { + "text": "A. The BCS case\nFor a constant DOS, ∆ W ( ω c ) = W SC ( ω c ) -W NS ( ω c ) is zero at ω c = ∞ and Kubo sum rule reduces to FGT sum rule. In Fig. 3 we plot for this case ∆ W ( ω c ) as a function of the cutoff ω c for different Γ ' s . The plot shows the two well known features: zero-crossing point is below 2∆ in the clean limit Γ << ∆ and is roughly 2Γ in the dirty limit 21,40 The magnitude of the 'dip' decreases quite rapidly with increasing Γ. Still, there is always a point of zero crossing and ∆ W ( ω c ) at large ω c approaches zero from below.\nWe now perform the same calculations in the presence of lattice dispersion. The results are summarized in Figs 4,5, and 6.\nFig 4 shows conductivities σ ( ω ) in the NS and the SCS and Kubo sums W K plotted against impurity scattering Γ. We see that the optical integral in the NS is always greater than in the SCS. The negative sign of ∆ W K is simply the consequence of the fact that n k is larger in the NS for /epsilon1 k < 0 and smaller for /epsilon1 k < 0, and ∇ 2 ε /vector k closely follows -ε /vector k for our choice of dispersion 38 ), Hence n k is larger in the NS for ∇ 2 ε /vector k > 0 and smaller for ∇ 2 ε /vector k < 0 and the Kubo sum rule, which is the integral of the product of n k and ∇ 2 ε /vector k (Eq. 3), is larger in the normal state.\nWe also see from Fig. 4 that ∆ W K decreases with Γ reflecting the fact that with too much impurity scattering there is little difference in n k between NS and SCS.", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0764.pdf" + }, + { + "text": "II. OPTICAL INTEGRAL IN NORMAL AND SUPERCONDUCTING STATES\nThe /vector k -summation is done over first Brillouin zone for a 2-D lattice with a 62x62 grid. The frequency integrals are done analytically wherever possible, otherwise performed using Simpson's rule for all regular parts. Contributions from the poles are computed separately using Cauchy's theorem. For comparison, in all four cases we also calculated FGT sum rule by replacing ∫ d 2 k = d Ω k d/epsilon1 k ν /epsilon1 k , Ω k and keeping ν constant. We remind that the FGT is the result when one assumes that the integral in W ( ω c ) predominantly comes from a narrow region around the Fermi surface.\nWe will first use Eq 3 and compute W K in NS and SCS. This will tell us about the magnitude of ∆ W ( ω c = ∞ ). We next compute the conductivity σ ( ω ) using the equations listed above, find W ( ω c ) and ∆ W ( ω c ) and compare ∆ f ( ω c ) and ∆ W K .\nFor simplicity and also for comparisons with earlier studies, for BCSI, EB, and MFLI models we assumed that the gap is just a constant along the FS. For CB model, we used a d -wave gap and included into consideration the fact that, if a CB is a spin fluctuation, its propagator develops a resonance when the pairing gap is d -wave.\nFIG. 2: Distribution functions in four cases (a) BCSI model, where one can see that for ε > 0, SC > NS implying KE increases in the SCS. (b) The original MFLI model of Ref. 30, where for ε > 0, SC < NS, implying KE decreases in the SCS. (c) Our version of MFLI model (see text) and (d) the CB model. In both cases, SC > NS, implying KE increases in the SCS. Observe that in the impurity-free CB model there is no jump in n ( /epsilon1 ) indicating lack of fermionic coherence. This is consistent with ARPES 39", + "page_start": 3, + "page_end": 4, + "source_file": "1001.0764.pdf" + }, + { + "text": "Optical Integral and Sum Rule Violation\nSaurabh Maiti, Andrey V. Chubukov\nDepartment of Physics, University of Wisconsin, Madison, Wisconsin 53706, USA\n(Dated: November 9, 2018)\nThe purpose of this work is to investigate the role of the lattice in the optical Kubo sum rule in the cuprates. We compute conductivities, optical integrals W , and ∆ W between superconducting and normal states for 2-D systems with lattice dispersion typical of the cuprates for four different models - a dirty BCS model, a single Einstein boson model, a marginal Fermi liquid model, and a collective boson model with a feedback from superconductivity on a collective boson. The goal of the paper is two-fold. First, we analyze the dependence of W on the upper cut-off ( ω c ) placed on the optical integral because in experiments W is measured up to frequencies of order bandwidth. For a BCS model, the Kubo sum rule is almost fully reproduced at ω c equal to the bandwidth. But for other models only 70%-80% of Kubo sum rule is obtained up to this scale and even less so for ∆ W , implying that the Kubo sum rule has to be applied with caution. Second, we analyze the sign of ∆ W . In all models we studied ∆ W is positive at small ω c , then crosses zero and approaches a negative value at large ω c , i.e. the optical integral in a superconductor is smaller than in a normal state. The point of zero crossing, however, increases with the interaction strength and in a collective boson model becomes comparable to the bandwidth at strong coupling. We argue that this model exhibits the behavior consistent with that in the cuprates.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0764.pdf" + }, + { + "text": "=SUM(B10:D15)\nAs you can see this is much simpler than writing your own referential formula which would look like:", + "page_start": 29, + "page_end": 29, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "S t o c k I n f o r m a t i o n\nA t r i o n C o r p o r a t i o n O n e A l l e n t o w n P a r k w a y A l l e n , T e x a s 7 5 0 0 2 9 7 2 · 3 9 0 · 9 8 0 0 w w w . a t r i o n c o r p . c o m", + "page_start": 31, + "page_end": 31, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "I. INTRODUCTION\n∫ ' ∞ ' 0 Reσ (Ω) d Ω = W K = πe 2 2 N ∑ /vector k ∇ 2 /vector k x ε /vector k n /vector k (3)\nwhere n /vector k is the electronic distribution function and ε /vector k is the band dispersion. Prime in the upper limit of the integration has the practical implication that the upper limit is much larger than the bandwidth of a given band which crosses the Fermi level, but smaller than the frequencies of interband transitions. Interactions with external objects, e.g., phonons or impurities, and interactions between fermions are indirectly present in the distribution function which is expressed via the full fermionic Green's function as n /vector k = T ∑ m G ( /vector k, ω m ). For /epsilon1 k = k 2 / 2 m , ∇ 2 /vector k x ε /vector k = 1 /m , W K = πne 2 / (2 m ), and Kubo sum rule reduces to Eq. (1). In general, however, ε /vector k is a lattice dispersion, and Eqs. (1) and (3) are different. Most important, W K in Eq. (3) generally depends on T and on the state of the system because of n /vector k . In this situation, the temperature evolution of the optical integral does not reduce to a simple redistribution of the spectral weight - the whole spectral weight inside the conduction band changes with T . This issue was first studied in detail by Hirsch 4 who introduced the now-frequently-used notation 'violation of the conductivity sum rule'.\nIn reality, as already pointed out by Hirsch, there is no true violation as the change of the total spectral weight", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0764.pdf" + }, + { + "text": "Appendix A: Coupling between Distortions of a Tetrahedron and the Pseudo-spins\nThe functions f T 2 1 , 2 , 3 for the T 2 modes are\nf T 2 1 = ( S 2 · S 3 -S 1 · S 4 ) , f T 2 2 = ( S 1 · S 3 -S 2 · S 4 ) , f T 2 3 = ( S 1 · S 2 -S 3 · S 4 )\nNow we can use TABLE I to convert the above couplings into pseudo-spin. It is easy to see that f A and f T 2 1 , 2 , 3 are all zero when converted to pseudo-spins, namely projected to the physical spin singlet sector. But f E 1 = ( P 14 + P 23 + P 24 + P 13 -2 P 12 -2 P 34 ) / (4 √ 3) = -( √ 3 / 2) τ x and f E 2 = ( P 24 + P 13 -P 14 -P 23 ) / 4 = ( √ 3 / 2) τ y . This has already been noted by Tchernyshyov et al. 28 , only the E modes can lift the degeneracy of the physical spin singlet ground states of the tetrahedron. Therefore the general spin lattice coupling is the form of (12) given in the main text.", + "page_start": 7, + "page_end": 7, + "source_file": "1001.0266.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0266.pdf", + "query": "What does Kitaev show about spin- 1/2 model?", + "target_page": 1, + "target_passage": "spin- 1/2 model can be mapped to a model with one Majo- rana fermion per site coupled to Ising gauge fields on the links", + "chunk_present": { + "presence": true, + "index": 7 + } + }, + "top_chunk": [ + { + "text": "I. INTRODUCTION.\nIn this paper we realize the Kitaev honeycomb lattice model as the low energy Hamiltonian for a spin rotation invariant system. The trick is not to use the physical spin as the spin in the Kitaev model, instead the spin-1/2 in Kitaev model is from some emergent two-fold degenerate low energy states in the elementary unit of physical system. This type of idea has been explored recently by Jackeli and Khaliullin 20 , in which the spin-1/2 in the Kitaev model is the low energy Kramers doublet created by strong spin-orbit coupling of t 2 g orbitals. In the model presented below, the Hilbert space of spin-1/2 in the Kitaev model is actually the two dimensional spin singlet sector of four antiferromagnetically coupled spin-1/2 moments, and the role of spin-1/2 operators(Pauli matrices) in the Kitaev model is replaced by certain combinations of S j · S k [or the spin-chirality S j · ( S k × S /lscript )] between the four spins.\nOne major drawback of the model to be presented is that it contains high order spin interactions(involves up to six or eight spins), thus is still unnatural. However it opens the possibility to realize exotic (exactly solvable) models from spin-1/2 Hamiltonian with spin rotation invariant interactions. We will discuss two possible routes to reduce this artificialness through controlled perturbative expansions, by coupling to optical phonons or by magnetic couplings between the elementary units.\nThe outline of this paper is as follows. In Section II we will lay out the pseudo-spin-1/2 construction. In Sec-\n2", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0266.pdf" + }, + { + "text": "III. REALIZATION OF THE KITAEV MODEL.\nH = ∑ j ( J cluster / 2)( S j 1 + S j 2 + S j 3 + S j 4 ) 2 -∑ x -links J x (2 S j 1 · S j 2 +1 / 2)(2 S k 1 · S k 2 +1 / 2) -∑ y -links J y (4 / 3)[ S j 1 · ( S j 3 -S j 4 )][ S k 1 · ( S k 3 -S k 4 )] -∑ z -links J z ( -4 / 3)(2 S j 3 · S j 4 +1 / 2)[ S j 1 · ( S j 3 -S j 4 )](2 S k 3 · S k 4 +1 / 2)[ S k 1 · ( S k 3 -S k 4 )] (9)\nThis model, in terms of physical spins S , has full spin rotation symmetry and time-reversal symmetry. A pseudo-magnetic field term ∑ j /vector h · /vectorτ j term can also be included under this mapping, however the resulting Kitaev model with magnetic field is not exactly solvable. It is quite curious that such a formidably looking Hamiltonian (8), with biquadratic and six-spin(or eight-spin) terms, has an exactly solvable low energy sector.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0266.pdf" + }, + { + "text": "V. CONCLUSIONS.\nWe constructed the exactly solvable Kitaev honeycomb model 1 as the exact low energy effective Hamiltonian of a spin-1/2 model [equations (8) or (9)] with spin-rotation and time reversal symmetry. The spin in Kitaev model is represented as the pseudo-spin in the two-fold degenerate spin singlet subspace of a cluster of four antiferromagnetically coupled spin-1/2 moments. The physical spin model is a honeycomb lattice of such four-spin clusters, with certain inter-cluster interactions. The machinery for the exact mapping to pseudo-spin Hamiltonian was developed (see e.g. TABLE I), which is quite general and can be used to construct other interesting (exactly solvable) spin-1/2 models from spin rotation invariant systems.\nIn this construction the pseudo-spin correlations in the Kitaev model will be mapped to dimer or spin-chirality correlations in the physical spin system. The corresponding picture of the fractionalized Majorana fermion excitations and Ising vortices still remain to be clarified.\nThis exact construction contains high order physical spin interactions, which is undesirable for practical implementation. We described two possible approaches to reduce this problem: generating the high order spin interactions by perturbative expansion of the coupling to optical phonon, or the magnetic coupling between clusters. This perturbative construction will introduce truncation error of perturbation series, which may be controlled by small expansion parameters. Whether these constructions can be experimentally engineered is however beyond the scope of this study. It is conceivable that other perturbative expansion can also generate these high order spin interactions, but this possibility will be left for future works.", + "page_start": 7, + "page_end": 7, + "source_file": "1001.0266.pdf" + }, + { + "text": "III. REALIZATION OF THE KITAEV MODEL.\nWe briefly describe some of the properties of (8). Its low energy states are entirely in the space that each of the clusters is a physical spin singlet (called cluster singlet subspace hereafter). Therefore physical spin correlations are strictly confined within each cluster. The excitations carrying physical spin are gapped, and their dynamics are 'trivial' in the sense that they do not move from one cluster to another. But there are non-trivial low energy physical spin singlet excitations, described by the pseudospins defined above. The correlations of the pseudo-spins can be mapped to correlations of their corresponding physical spin observables (the inverse mappings are not unique, c.f. TABLE I). For example τ x,y correlations become certain dimer-dimer correlations, τ z correlation becomes chirality-chirality correlation, or four-dimer correlation. It will be interesting to see the corresponding picture of the exotic excitations in the Kitaev model, e.g. the Majorana fermion and the Ising vortex. However this will be deferred to future studies.\nIt is tempting to call this as an exactly solved spin liquid with spin gap ( ∼ J cluster ), an extremely short-range resonating valence bond(RVB) state, from a model with spin rotation and time reversal symmetry. However it should be noted that the unit cell of this model contains an even number of spin-1/2 moments (so does the original Kitaev model) which does not satisfy the stringent definition of spin liquid requiring odd number of electrons per unit cell. Several parent Hamiltonians of spin liquids have already been constructed. See for example, Ref. 24-27 .", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0266.pdf" + }, + { + "text": "Realization of the Exactly Solvable Kitaev Honeycomb Lattice Model in a Spin Rotation Invariant System\nFa Wang 1\n1 Department of Physics, Massachusetts Institute of Technology, Cambridge, MA 02139, USA\nThe exactly solvable Kitaev honeycomb lattice model is realized as the low energy effect Hamiltonian of a spin-1/2 model with spin rotation and time-reversal symmetry. The mapping to low energy effective Hamiltonian is exact, without truncation errors in traditional perturbation series expansions. This model consists of a honeycomb lattice of clusters of four spin-1/2 moments, and contains short-range interactions up to six-spin(or eight-spin) terms. The spin in the Kitaev model is represented not as these spin-1/2 moments, but as pseudo-spin of the two-dimensional spin singlet sector of the four antiferromagnetically coupled spin-1/2 moments within each cluster. Spin correlations in the Kitaev model are mapped to dimer correlations or spin-chirality correlations in this model. This exact construction is quite general and can be used to make other interesting spin-1/2 models from spin rotation invariant Hamiltonians. We discuss two possible routes to generate the high order spin interactions from more natural couplings, which involves perturbative expansions thus breaks the exact mapping, although in a controlled manner.\nPACS numbers: 75.10.Jm, 75.10.Kt", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0266.pdf" + }, + { + "text": "I. INTRODUCTION.\nGreat efforts have been invested to better understand the properties of the Kitaev model. For example, several groups have pointed out that the fractionalized Majorana fermion excitations may be understood from the more familiar Jordan-Wigner transformation of 1D spin systems 2,3 . The analogy between the non-Abelian Ising vortices and vortices in p + ip superconductors has been raised in serveral works 4-7 . Exact diagonalization has been used to study the Kitaev model on small lattices 8 . And perturbative expansion methods have been developed to study the gapped phases of the Kitaev-type models 9 .\nMany generalizations of the Kitaev model have been\nFIG. 1: The honeycomb lattice for the Kitaev model. Filled and open circles indicate two sublattices. x, y, z label the links along three different directions used in (1).\nderived as well. There have been several proposals to open the fermion gap for the non-Abelian phase without spoiling exact solvability 4,6 . And many generalizations to other(even 3D) lattices have been developed in the last few years 10-16 . All these efforts have significantly enriched our knowledge of exactly solvable models and quantum phases of matter.\nHowever, in the original Kitaev model and its later generalizations in the form of spin models, spin rotation symmetry is explicitly broken. This makes them harder to realize in solid state systems. There are many proposals to realized the Kitaev model in more controllable situations, e.g. in cold atom optical lattices 17,18 , or in superconducting circuits 19 . But it is still desirable for theoretical curiosity and practical purposes to realize the Kitaev-type models in spin rotation invariant systems.", + "page_start": 0, + "page_end": 1, + "source_file": "1001.0266.pdf" + }, + { + "text": "III. REALIZATION OF THE KITAEV MODEL.\nIn this Section we will use directly the results of the previous Section to write down a Hamiltonian whose low energy sector is described by the Kitaev model. The Hamiltonian will be constructed on the physical spin lattice illustrated in FIG. 2. In this Section we will use j, k to label four-spin clusters (pseudo-spin-1/2 sites), the physical spins in cluster j are labeled as S j 1 , . . . , S j 4 .\nApply the mappings developed in Section II, we have the desired Hamiltonian in short notation,\nH = ∑ cluster H cluster -∑ x -links J x τ x j τ x k -∑ y -links J y τ y j τ y k -∑ z -links J z τ z j τ z k (7)\nwhere j, k label the honeycomb lattice sites thus the fourspin clusters, H cluster is given by (2), τ x,y,z should be replaced by the corresponding physical spin operators in (4) and (5) or (6), or some other equivalent representations of personal preference.\n3\nPlug in the expressions (4) and (6) into (7), the Hamil-\ntonian reads explicitly as\nH = ∑ j ( J cluster / 2)( S j 1 + S j 2 + S j 3 + S j 4 ) 2 -∑ z -links J z (16 / 9)[ S j 2 · ( S j 3 × S j 4 )][ S k 2 · ( S k 3 × S k 4 )] -∑ x -links J x (2 S j 1 · S j 2 +1 / 2)(2 S k 1 · S k 2 +1 / 2) -∑ y -links J y (4 / 3)[ S j 1 · ( S j 3 -S j 4 )][ S k 1 · ( S k 3 -S k 4 )] (8)\nWhile by the represenation (4) and (5), the Hamilto-\nnian becomes", + "page_start": 2, + "page_end": 3, + "source_file": "1001.0266.pdf" + }, + { + "text": "I. INTRODUCTION.\nKitaev's exactly solvable spin-1/2 honeycomb lattice model 1 (noted as the Kitaev model hereafter) has inspired great interest since its debut, due to its exact solvability, fractionalized excitations, and the potential\n5\n5\n7\n2\nto realize non-Abelian anyons. The model simply reads\nH Kitaev = -∑ x -links J x τ x j τ x k -∑ y -links J y τ y j τ y k -∑ z -links J z τ z j τ z k (1)\nwhere τ x,y,z are Pauli matrices, and x, y, z -links are defined in FIG. 1. It was shown by Kitaev 1 that this spin1/2 model can be mapped to a model with one Majorana fermion per site coupled to Ising gauge fields on the links. And as the Ising gauge flux has no fluctuation, the model can be regarded as, under each gauge flux configuration, a free Majorana fermion problem. The ground state is achieved in the sector of zero gauge flux through each hexagon. The Majorana fermions in this sector have Dirac-like gapless dispersion resembling that of graphene, as long as | J x | , | J y | , and | J z | satisfy the triangular relation, sum of any two of them is greater than the third one 1 . It was further proposed by Kitaev 1 that opening of fermion gap by magnetic field can give the Ising vortices non-Abelian anyonic statistics, because the Ising vortex will carry a zero-energy Majorana mode, although magnetic field destroys the exact solvability.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0266.pdf" + }, + { + "text": "III. REALIZATION OF THE KITAEV MODEL.\nWe emphasize that because the first intra-cluster term ∑ cluster H cluster commutes with the latter Kitaev terms independent of the representation used, the Kitaev model is realized as the exact low energy Hamiltonian of this model without truncation errors of perturbation theories, namely no ( | J x,y,z | /J cluster ) 2 or higher order terms will be generated under the projection to low energy cluster singlet space. This is unlike, for example, the t/U expansion of the half-filled Hubbard model 22,23 , where at lowest t 2 /U order the effective Hamiltonian is the Heisenberg model, but higher order terms ( t 4 /U 3 etc.) should in principle still be included in the low energy effective Hamiltonian for any finite t/U . Similar comparison can be made to the perturbative expansion studies of the Kitaev-type models by Vidal et al. 9 , where the low energy effective Hamiltonians were obtained in certian anisotropic (strong bond/triangle) limits. Although the spirit of this work, namely projection to low energy sector, is the same as all previous perturbative approaches to effective Hamiltonians.\nNote that the original Kitaev model (1) has threefold rotation symmetry around a honeycomb lattice site, combined with a three-fold rotation in pseudo-spin space (cyclic permutation of τ x , τ y , τ z ). This is not apparent in our model (8) in terms of physical spins, under the current representation of τ x,y,z . We can remedy this by using a different set of pseudo-spin Pauli matrices τ ' x,y,z in (7),\nτ ' x = √ 1 / 3 τ z + √ 2 / 3 τ x , τ ' y = √ 1 / 3 τ z -√ 1 / 6 τ x + √ 1 / 2 τ y , τ ' z = √ 1 / 3 τ z -√ 1 / 6 τ x -√ 1 / 2 τ y\nWith proper representation choice, they have a symmetric form in terms of physical spins,", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0266.pdf" + }, + { + "text": "III. REALIZATION OF THE KITAEV MODEL.\nτ ' x = -(4 / 3) S 2 · ( S 3 × S 4 ) + √ 2 / 3(2 S 1 · S 2 +1 / 2) τ ' y = -(4 / 3) S 3 · ( S 4 × S 2 ) + √ 2 / 3(2 S 1 · S 3 +1 / 2) τ ' z = -(4 / 3) S 4 · ( S 2 × S 3 ) + √ 2 / 3(2 S 1 · S 4 +1 / 2) (10)\nSo the symmetry mentioned above can be realized by a three-fold rotation of the honeycomb lattice, with a cyclic permutation of S 2 , S 3 and S 4 in each cluster. This is in fact the three-fold rotation symmetry of the physical spin lattice illustrated in FIG. 2. However this more symmetric representation will not be used in later part of this paper.\n4\nAnother note to take is that it is not necessary to have such a highly symmetric cluster Hamiltonian (2). The mappings to pseudo-spin-1/2 should work as long as the ground states of the cluster Hamiltonian are the two-fold degenerate singlets. One generalization, which conforms the symmetry of the lattice in FIG. 2, is to have\nH cluster = ( J cluster / 2)( r · S 1 + S 2 + S 3 + S 4 ) 2 (11)\nwith J cluster > 0 and 0 < r < 3. However this is not convenient for later discussions and will not be used.", + "page_start": 3, + "page_end": 4, + "source_file": "1001.0266.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0266.pdf", + "query": "How can fractionalised Majorana fermion excitations be understood?", + "target_page": 1, + "target_passage": "from the more familiar Jordan-Wigner transformation of 1D spin systems", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "I. INTRODUCTION.\nGreat efforts have been invested to better understand the properties of the Kitaev model. For example, several groups have pointed out that the fractionalized Majorana fermion excitations may be understood from the more familiar Jordan-Wigner transformation of 1D spin systems 2,3 . The analogy between the non-Abelian Ising vortices and vortices in p + ip superconductors has been raised in serveral works 4-7 . Exact diagonalization has been used to study the Kitaev model on small lattices 8 . And perturbative expansion methods have been developed to study the gapped phases of the Kitaev-type models 9 .\nMany generalizations of the Kitaev model have been\nFIG. 1: The honeycomb lattice for the Kitaev model. Filled and open circles indicate two sublattices. x, y, z label the links along three different directions used in (1).\nderived as well. There have been several proposals to open the fermion gap for the non-Abelian phase without spoiling exact solvability 4,6 . And many generalizations to other(even 3D) lattices have been developed in the last few years 10-16 . All these efforts have significantly enriched our knowledge of exactly solvable models and quantum phases of matter.\nHowever, in the original Kitaev model and its later generalizations in the form of spin models, spin rotation symmetry is explicitly broken. This makes them harder to realize in solid state systems. There are many proposals to realized the Kitaev model in more controllable situations, e.g. in cold atom optical lattices 17,18 , or in superconducting circuits 19 . But it is still desirable for theoretical curiosity and practical purposes to realize the Kitaev-type models in spin rotation invariant systems.", + "page_start": 0, + "page_end": 1, + "source_file": "1001.0266.pdf" + }, + { + "text": "I. INTRODUCTION.\nKitaev's exactly solvable spin-1/2 honeycomb lattice model 1 (noted as the Kitaev model hereafter) has inspired great interest since its debut, due to its exact solvability, fractionalized excitations, and the potential\n5\n5\n7\n2\nto realize non-Abelian anyons. The model simply reads\nH Kitaev = -∑ x -links J x τ x j τ x k -∑ y -links J y τ y j τ y k -∑ z -links J z τ z j τ z k (1)\nwhere τ x,y,z are Pauli matrices, and x, y, z -links are defined in FIG. 1. It was shown by Kitaev 1 that this spin1/2 model can be mapped to a model with one Majorana fermion per site coupled to Ising gauge fields on the links. And as the Ising gauge flux has no fluctuation, the model can be regarded as, under each gauge flux configuration, a free Majorana fermion problem. The ground state is achieved in the sector of zero gauge flux through each hexagon. The Majorana fermions in this sector have Dirac-like gapless dispersion resembling that of graphene, as long as | J x | , | J y | , and | J z | satisfy the triangular relation, sum of any two of them is greater than the third one 1 . It was further proposed by Kitaev 1 that opening of fermion gap by magnetic field can give the Ising vortices non-Abelian anyonic statistics, because the Ising vortex will carry a zero-energy Majorana mode, although magnetic field destroys the exact solvability.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0266.pdf" + }, + { + "text": "II. OPTICAL INTEGRAL IN NORMAL AND SUPERCONDUCTING STATES\nThe /vector k -summation is done over first Brillouin zone for a 2-D lattice with a 62x62 grid. The frequency integrals are done analytically wherever possible, otherwise performed using Simpson's rule for all regular parts. Contributions from the poles are computed separately using Cauchy's theorem. For comparison, in all four cases we also calculated FGT sum rule by replacing ∫ d 2 k = d Ω k d/epsilon1 k ν /epsilon1 k , Ω k and keeping ν constant. We remind that the FGT is the result when one assumes that the integral in W ( ω c ) predominantly comes from a narrow region around the Fermi surface.\nWe will first use Eq 3 and compute W K in NS and SCS. This will tell us about the magnitude of ∆ W ( ω c = ∞ ). We next compute the conductivity σ ( ω ) using the equations listed above, find W ( ω c ) and ∆ W ( ω c ) and compare ∆ f ( ω c ) and ∆ W K .\nFor simplicity and also for comparisons with earlier studies, for BCSI, EB, and MFLI models we assumed that the gap is just a constant along the FS. For CB model, we used a d -wave gap and included into consideration the fact that, if a CB is a spin fluctuation, its propagator develops a resonance when the pairing gap is d -wave.\nFIG. 2: Distribution functions in four cases (a) BCSI model, where one can see that for ε > 0, SC > NS implying KE increases in the SCS. (b) The original MFLI model of Ref. 30, where for ε > 0, SC < NS, implying KE decreases in the SCS. (c) Our version of MFLI model (see text) and (d) the CB model. In both cases, SC > NS, implying KE increases in the SCS. Observe that in the impurity-free CB model there is no jump in n ( /epsilon1 ) indicating lack of fermionic coherence. This is consistent with ARPES 39", + "page_start": 3, + "page_end": 4, + "source_file": "1001.0764.pdf" + }, + { + "text": "III. REALIZATION OF THE KITAEV MODEL.\nWe briefly describe some of the properties of (8). Its low energy states are entirely in the space that each of the clusters is a physical spin singlet (called cluster singlet subspace hereafter). Therefore physical spin correlations are strictly confined within each cluster. The excitations carrying physical spin are gapped, and their dynamics are 'trivial' in the sense that they do not move from one cluster to another. But there are non-trivial low energy physical spin singlet excitations, described by the pseudospins defined above. The correlations of the pseudo-spins can be mapped to correlations of their corresponding physical spin observables (the inverse mappings are not unique, c.f. TABLE I). For example τ x,y correlations become certain dimer-dimer correlations, τ z correlation becomes chirality-chirality correlation, or four-dimer correlation. It will be interesting to see the corresponding picture of the exotic excitations in the Kitaev model, e.g. the Majorana fermion and the Ising vortex. However this will be deferred to future studies.\nIt is tempting to call this as an exactly solved spin liquid with spin gap ( ∼ J cluster ), an extremely short-range resonating valence bond(RVB) state, from a model with spin rotation and time reversal symmetry. However it should be noted that the unit cell of this model contains an even number of spin-1/2 moments (so does the original Kitaev model) which does not satisfy the stringent definition of spin liquid requiring odd number of electrons per unit cell. Several parent Hamiltonians of spin liquids have already been constructed. See for example, Ref. 24-27 .", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0266.pdf" + }, + { + "text": "I. INTRODUCTION\nwhere g is the spin-fermion coupling, and χ ( q, ω ) is the spin susceptibility whose dynamics changes between NS and SCS.\nFrom our analysis we found that the introduction of a finite fermionic bandwidth by means of a lattice has generally a notable effect on both W and ∆ W . We found that for all models except for BCSI model, only 70% -80% of the optical spectral weight is obtained by integrating up to the bandwidth. In these three models, there also exists a wide range of ω c in which the behavior of ∆ W ( ω c ) is due to variation of ∆ f ( ω c ) which is dominant comparable to the ∆ W K term. This dominance of the cut off term is consistent with the analysis in Refs. 21,22,33.\nWe also found that for all models except for the original version of the MFLI model the optical weight at the highest frequencies is greater in the NS than in the SCS (i.e., ∆ W < 0). This observation is consistent with the findings of Abanov and Chubukov 32 , Benfatto et. al. 28 , and Karakozov and Maksimov 34 . In the original version of the MFLI model 30 the spectral weight in SCS was found to be greater than in the NS (∆ W > 0). We show that the behavior of ∆ W ( ω c ) in this model crucially depends on how the fermionic self-energy modeled to fit ARPES data in a NS is modified when a system becomes a superconductor and can be of either sign. We also found, however, that ω c at which ∆ W becomes negative rapidly increases with the coupling strength and at strong coupling becomes comparable to the bandwidth. In the CB model, which, we believe, is most appropriate for the application to the cuprates, ∆ W K = ∆ W ( ∞ ) is quite small, and at strong coupling a negative ∆ W ( ω c ) up to ω c ∼ 1 eV is nearly compensated by the optical integral between ω c and 'infinity', which, in practice, is\nan energy of interband transitions, which is roughly 2 eV . This would be consistent with Refs. 8,9.", + "page_start": 2, + "page_end": 3, + "source_file": "1001.0764.pdf" + }, + { + "text": "III. CONCLUSION\nIn this work we analyzed the behavior of optical integrals W ( ω c ) ∝ ∫ ω c o σ ( ω ) dω and Kubo sum rules in the normal and superconducting states of interacting fermionic systems on a lattice. Our key goal was to understand what sets the sign of ∆ W K = ∆ W ( ∞ ) between the normal and superconducting states and what is the behavior of W ( ω c ) and ∆ W ( ω c ) at finite ω c . In a weak coupling BCS superconductor, ∆ W ( ω c ) is positive at ω c < 2∆ due to a contribution from superfluid density, but becomes negative at larger ω c , and approach a negative value of ∆ W K . Our study was motivated by fascinating optical experiments on the cuprates 7-10 . In overdoped cuprates, there is clear indication 11 that ∆ W ( ω c ) becomes negative above a few ∆, consistent with BCS behavior. In underdoped cuprates, two groups argued 8,9 that ∆ W integrated up to the bandwidth remains positive, while the other group argued 10 that it is negative.\nThe reasoning why ∆ W K may potentially change sign at strong coupling involves the correlation between -W K and the kinetic energy. In the BCS limit, kinetic energy obviously increases in a SCS because of gap opening, hence -W K increases, and ∆ W K is negative. At strong coupling, there is a counter effect - fermions become more mobile in a SCS due to a smaller self-energy.\nWe considered four models: a BCS model with impurities, a model of fermions interacting with an Einstein boson, a phenomenological MFL model with impurities, and a model of fermions interacting with collective spin fluctuations. In all cases, we found that ∆ W K is negative, but how it evolves with ω c and how much of the sum rule is recovered by integrating up to the bandwidth depends on the model.\nThe result most relevant to the experiments on the cuprates is obtained for the spin fluctuation model. We found that at strong coupling, the zero-crossing of δW ( ω c ) occurs at a frequency which increases with the coupling strength and may become larger than the bandwidth at a truly strong coupling. Still, at even larger frequencies, ∆ W ( ω c ) is negative.", + "page_start": 13, + "page_end": 13, + "source_file": "1001.0764.pdf" + }, + { + "text": "I. INTRODUCTION\nFIG. 1: Schematic behavior of ∆ W vs ω c , Eq. (4). The limiting value of ∆ W at ω c = ∞ is ∆ W K given by Eq. (3) Depending on the value of ∆ W K , there can be either one sign change of ∆ W (panels a and c), or no sign changes (panel b), or two sign changes (panel d).\nIn our work, we perform direct numerical calculations of optical integrals at T = 0 for a lattice dispersion extracted from ARPES of the cuprates. The goal of our work is two-fold. First, we perform calculations of the optical integral in the NS and analyze how rapidly W ( ω c ) approaches W K , in other words we check how much of the Kubo sum is recovered up to the scale of the bandwidth. Second, we analyze the difference between optical\n3\nintegral in the SCS at T = 0 and in the NS extrapolated to T = 0 and compare the cut off effect ∆ f ( ω c ) to ∆ W K term. We also analyze the sign of ∆ W ( ω c ) at large frequencies and discuss under what conditions theoretical W ( ∞ ) increases in the SCS.\nWe perform calculations for four models. First is a conventional BCS model with impurities (BCSI model). Second is an Einstein boson (EB) model of fermions interacting with a single Einstein boson whose propagator does not change between NS and SCS. These two cases will illustrate a conventional idea of the spectral weight in SCS being less than in NS. Then we consider two more sophisticated models: a phenomenological 'marginal Fermi liquid with impurities' (MFLI) model of Norman and P'epin 30 , and a microscopic collective boson (CB) model 31 in which in the NS fermions interact with a gapless continuum of bosonic excitations, but in a d -wave SCS a gapless continuum splits into a resonance and a gaped continuum. This model describes, in particular, interaction of fermions with their own collective spin fluctuations 32 via\nΣ( k, Ω) = 3 g 2 ∫ dω 2 π d 2 q (2 π ) 2 χ ( q, ω ) G ( k + q, ω +Ω) (6)", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0764.pdf" + }, + { + "text": "C. Marginal Fermi liquid model\nFIG. 10: Top -the conductivities in the NS and SCS in the original MFLI model of Ref.30. We set Γ = 70 meV , α = 0 . 75, ∆ = 32 meV , ω 1 = 71 meV . Note that σ ' ( ω ) in the SCS begins at Ω = ∆ + ω 1 . Bottom - the behavior of W K with Γ.\nIn Fig 10 we plot the conductivities in the NS and the SCS and Kubo sums W K vs Γ at α = 0 . 75 showing that the spectral weight in the SCS is indeed larger than in the NS. In Fig 11 we show the behavior of the optical sums W ( ω c ) in NS and SCS. The observation here is that only ∼ 75 -80%of the Kubo sum is recovered up to the scale of the bandwidth implying that there is indeed a significant spectral weight well beyond the bandwidth. And in Fig 12 we show the behavior of ∆ W ( w c ). We see that it does not change sign and remain positive at all ω c , very much unlike the BCS case. Comparing the behavior of W ( w c ) with and without a lattice (solid and dashed lines in Fig. 12) we see that the 'finite bandwidth effect' just shifts the curve in the positive direction. We also see that the solid line flattens above roughly half of the bandwidth, i.e., at these frequencies ∆ W ( ω c ) ≈ ∆ W K . Still, we found that ∆ W continues going down even above the bandwidth and truly saturates only at about 2 eV (not shown in the figure) supporting the idea that there is 'more' left to recover from higher frequencies.\nThe rationale for ∆ W K > 0 in the original MFLI model has been provided in Ref. 30. They argued that this is closely linked to the absence of quasiparticle peaks in the NS and their restoration in the SCS state because the phase space for quasiparticle scattering at low energies is smaller in a superconductor than in a normal state.\n1\nFIG. 11: The evolution of the optical integral in the NS (top) and the SCS (bottom) in the original MFLI model. Parameters are the same as above. Note that only ∼ 75 -80% of the spectral weight is recovered up to 1 eV .", + "page_start": 7, + "page_end": 8, + "source_file": "1001.0764.pdf" + }, + { + "text": "D. The collective boson model\nWe clearly see that the increase of the zero crossing frequency of ∆ W ( ω c ) at a truly strong coupling is correlated with the non-BCS behavior of δ KE . At the same time, the behavior of δW ( ω c ) is obviously not driven by the kinetic energy as eventually δW ( ω c ) changes sign and become negative. Rather, the increase in the frequency range where ∆ W ( ω c ) remains positive and non-BCS behavior of δ KE are two indications of the same effect that fermions are incoherent in the NS but acquire coherence in the SCS.", + "page_start": 13, + "page_end": 13, + "source_file": "1001.0764.pdf" + }, + { + "text": "V. CONCLUSIONS.\nWe constructed the exactly solvable Kitaev honeycomb model 1 as the exact low energy effective Hamiltonian of a spin-1/2 model [equations (8) or (9)] with spin-rotation and time reversal symmetry. The spin in Kitaev model is represented as the pseudo-spin in the two-fold degenerate spin singlet subspace of a cluster of four antiferromagnetically coupled spin-1/2 moments. The physical spin model is a honeycomb lattice of such four-spin clusters, with certain inter-cluster interactions. The machinery for the exact mapping to pseudo-spin Hamiltonian was developed (see e.g. TABLE I), which is quite general and can be used to construct other interesting (exactly solvable) spin-1/2 models from spin rotation invariant systems.\nIn this construction the pseudo-spin correlations in the Kitaev model will be mapped to dimer or spin-chirality correlations in the physical spin system. The corresponding picture of the fractionalized Majorana fermion excitations and Ising vortices still remain to be clarified.\nThis exact construction contains high order physical spin interactions, which is undesirable for practical implementation. We described two possible approaches to reduce this problem: generating the high order spin interactions by perturbative expansion of the coupling to optical phonon, or the magnetic coupling between clusters. This perturbative construction will introduce truncation error of perturbation series, which may be controlled by small expansion parameters. Whether these constructions can be experimentally engineered is however beyond the scope of this study. It is conceivable that other perturbative expansion can also generate these high order spin interactions, but this possibility will be left for future works.", + "page_start": 7, + "page_end": 7, + "source_file": "1001.0266.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0266.pdf", + "query": "What happens when the spin-rotation symmetry is explicitly broken?", + "target_page": 2, + "target_passage": "makes them harder to realize in solid state systems", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "II. MODEL HAMILTONIAN AND MONTE CARLO OBSERVABLES\nFor all the quantities of interest, the average value and the error estimate were obtained by the bootstrap resampling method 22 given that, as pointed out in Ref. 23, for a large enough number of measurements, this method turns out to be more accurate than the usual blocking technique. In our implementation, we pick out randomly a sizable number of measurements (typically, between 1 and 1 × 10 3 for the single simulation, and between 1 and 5 × 10 4 for the MH technique), and iterate the re-sampling at least one hundred times.\nThe thermodynamic observables we have investigated include the FM order parameter for each plane l :\nm l = √ ( m x l ) 2 +( m y l ) 2 , (2)\nwhich is related to the SO (2) symmetry breaking. At the same time, it turns out to be significant also the average order parameter of the film, defined as\nM = 1 n n ∑ l =1 m l . (3)\nTurning to the helical order, which is the relevant quantity for the Z 2 × SO (2) symmetry, we can explore it along two different directions. The first one is by the introduction of the chirality order parameter 1,2\nκ = 1 4( n -1) L 2 sin Q z ∑ 〈 ij 〉 [ S x i S y j -S y i S x j ] , (4)\nwhere the sum refers to spins belonging to NN layers i and j , respectively, while Q z is the bulk helical pitch vector along the z direction. The second possibility is that of looking at the integral of the structure factor:\nM HM = 1 K ∫ π 0 dq z S ( /vector q ) (5)\nwhere S ( /vector q ), with /vectorq = (0 , 0 , q z ), is the structure factor 24 (i.e. the Fourier transform of the spin correlation function) along the z-direction of the film, while the normalization factor K is the structure factor integral at T = 0. Although the use of the last observable can be seen as a suitable and elegant way to overcome the intrinsic difficulties met in defining a correct helical order parameter, free of any undue external bias (as the wave-vector Q z\n3", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0510.pdf" + }, + { + "text": "Acknowledgments\n8\nA. Coupling between Distortions of a Tetrahedron and the Pseudo-spins\nB. Derivation of the Terms Generated by Second Order Perturbation of Inter-cluster Magnetic Interactions\n8\n9\nReferences 10", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0266.pdf" + }, + { + "text": "Appendix B: Derivation of the Terms Generated by Second Order Perturbation of Inter-cluster Magnetic Interactions\nIn this Appendix we derive the second order perturbations of inter-cluster Heisenberg and spin-chirality interactions. The results can then be used to construct (16).\nFirst consider the perturbation λH perturbation = λ [ S j 1 · S k 1 + r ( S j 2 · S k 2 )], where r is a real number to be tuned later. Due to the fact mentioned in Subsection IV B, the action of H perturbation on any cluster singlet state will produce a state with total spin-1 for both cluster j and k . Thus the first order perturbation in (15) vanishes. And the second order perturbation term can be greatly simplified: operator (1 - P jk )[0 -H cluster j -H cluster k ] -1 (1 - P jk ) can be replaced by a c -number ( -2 J cluster ) -1 . Therefore the perturbation up to second order is\n-λ 2 2 J cluster P jk ( H perturbation ) 2 P jk\nThis is true for other perturbations considered later in this Appendix. The cluster j and cluster k parts can be separated, this term then becomes ( a, b = x, y, z ),\n-λ 2 2 J cluster ∑ a,b [ P j S a j 1 S b j 1 P j · P k S a k 1 S b k 1 P k +2 r P j S a j 1 S b j 2 P j · P k S a k 1 S b k 2 P k + r 2 P j S a j 2 S b j 2 P j · P k S a k 2 S b k 2 P k ]\nThen use the fact that P j S a j/lscript S b jm P j = δ ab (1 / 3) P j ( S j/lscript · S jm ) P j by spin rotation symmetry, the perturbation becomes", + "page_start": 8, + "page_end": 8, + "source_file": "1001.0266.pdf" + }, + { + "text": "II. FORMULATION OF THE PSEUDO-SPIN-1/2 FROM FOUR-SPIN CLUSTER.\n-\n-\nHowever there is another simpler representation of τ z , by the spin-chirality operator χ jk/lscript = S j · ( S k × S /lscript ). Explicit calculation shows that the effect of S 2 · ( S 3 × S 4 ) is -( √ 3 / 4) τ z in the physical singlet sector. This can also be proved by using the commutation relation [ S 2 · S 3 , S 2 · S 4 ] = i S 2 · ( S 3 × S 4 ). A complete list of all chirality operators is given in TABLE I. Therefore we can choose another representation of τ z ,\nτ z = -χ 234 / ( √ 3 / 4) = -(4 / √ 3) S 2 · ( S 3 × S 4 ) (6)\nThe above representations of τ x,y,z are all invariant under global spin rotation of the physical spins.\nWith the machinery of equations (4), (5), and (6), it will be straightforward to construct various pseudo-spin1/2 Hamiltonians on various lattices, of the Kitaev variety and beyond, as the exact low energy effective Hamiltonian of certain spin-1/2 models with spin-rotation symmetry. In these constructions a pseudo-spin lattice site actually represents a cluster of four spin-1/2 moments.", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0266.pdf" + }, + { + "text": "Appendix B: Derivation of the Terms Generated by Second Order Perturbation of Inter-cluster Magnetic Interactions\nr λ 2 P jk S j 2 · ( S k 3 × S k 4 )(1 -P jk ) × [0 -H cluster j -H cluster k ] -1 × (1 -P jk ) S k 2 · ( S j 3 × S j 4 ) P jk\nWe can use the previous argument for both cluster j and k , so (1 -P AB )[0 -H cluster j -H cluster k ] -1 (1 -P jk ) can be replace by c -number ( -2 J cluster ) -1 . This term becomes\n-r λ 2 2 J cluster P jk [ S j 2 · ( S k 3 × S k 4 )][ S k 2 · ( S j 3 × S j 3 )] P jk .\nSpin rotation symmetry again helps to separate the terms for cluster j and k , and we get ( r λ 2 ) / (32 J cluster ) τ z τ z .\nThe other cross term r λ P jk S k 2 · ( S j 3 × S j 4 )(1 P jk )[0 -H cluster j -H cluster k ] -1 (1 - P jk ) S j 2 · ( S k 3 S k 4 ) P jk gives the same result.\n-· j k 2 -×\nIn summary the second order perturbation from λ [ S j 2 · ( S j 3 × S j 4 ) + r S k 2 · ( S j 3 × S j 4 )] is\n-r λ 2 16 J cluster · τ z j τ z k + λ 2 32 J cluster ( τ x k + r 2 τ x j -2 r 2 -2) .", + "page_start": 9, + "page_end": 9, + "source_file": "1001.0266.pdf" + }, + { + "text": "Appendix B: Derivation of the Terms Generated by Second Order Perturbation of Inter-cluster Magnetic Interactions\nFor the cluster j part we can use the same arguments as before, the H cluster j can be replaced by a c -number J cluster . For the cluster k part, consider the fact that S k 3 × S k 4 equals to the commutator -i [ S k 4 , S k 3 · S k 4 ], the action of S k 3 × S k 4 on physical singlet states of k will also only produce spin-1 state. So we can replace the H cluster k in the denominator by a c -number J cluster as well. Use spin rotation symmetry to separate the j and k parts, this term simplifies to\n-λ 2 6 J cluster P j S j 2 · S j 2 P j · P k ( S k 3 × S k 4 ) · ( S k 3 × S k 4 ) P k .\nUse ( S ) 2 = 3 / 4 and\n( S k 3 × S k 4 ) · ( S k 3 × S k 4 ) = ∑ a,b ( S a k 3 S b k 4 S a k 3 S b k 4 -S a k 3 S b k 4 S b k 3 S a k 4 )\n= ( S k 3 · S k 3 )( S k 4 · S k 4 ) -∑ a,b S a k 3 S b k 3 [ δ ab / 2 -S a k 4 S b k 4 ] = 9 / 16 + ( S k 3 · S k 4 )( S k 3 · S k 4 ) -(3 / 8)\nthis term becomes\n-λ 2 6 J cluster · (3 / 4)[3 / 16 + ( τ x / 2 -1 / 4) 2 ] = -( λ 2 ) / (32 J cluster ) · (2 -τ x k ) .\nAnother second order perturbation term r 2 λ 2 P jk S k 2 · ( S j 3 × S j 4 )(1 - P jk )[0 -H cluster j -H cluster k ] -1 (1 -P jk ) S k 2 · ( S j 3 × S j 4 ) P jk can be computed in the similar way and gives the result -( r 2 λ 2 ) / (32 J cluster ) · (2 -τ x j ).\nFor one of the cross term", + "page_start": 8, + "page_end": 9, + "source_file": "1001.0266.pdf" + }, + { + "text": "II. FORMULATION OF THE PSEUDO-SPIN-1/2 FROM FOUR-SPIN CLUSTER.\nWe now consider the effect of Heisenberg-type interactions S j · S k inside the physical singlet sector. Note that since any S j · S k within the cluster commutes with the cluster Hamiltonian H cluster (2), their action do not mix physical spin singlet states with states of other total physical spin. This property is also true for the spinchirality operator used later. So the pseudo-spin Hamiltonian constructed below will be exact low energy Hamiltonian, without truncation errors in typical perturbation series expansions.\n/negationslash\nIt is simpler to consider the permutation operators P jk ≡ 2 S j · S k + 1 / 2, which just exchange the states of the two physical spin-1/2 moments j and k ( j = k ). As an example we consider the action of P 34 ,\nP 34 | τ z = -1 〉 = 1 √ 6 ( | ↓↓↑↑〉 + ω | ↓↑↑↓〉 + ω 2 | ↓↑↓↑〉 + | ↑↑↓↓〉 + ω | ↑↓↓↑〉 + ω 2 | ↑↓↑↓〉 ) = | τ z = +1 〉\nand similarly P 34 | τ z = -1 〉 = | τ z = +1 〉 . Therefore P 34 is just τ x in the physical singlet sector. A complete list of all permutation operators is given in TABLE I. We can choose the following representation of τ x and τ y ,\nτ x = P 12 = 2 S 1 · S 2 +1 / 2 τ y = ( P 13 -P 14 ) / √ 3 = (2 / √ 3) S 1 · ( S 3 -S 4 ) (4)\nMany other representations are possible as well, because several physical spin interactions may correspond to the same pseudo-spin interaction in the physical singlet sector, and we will take advantage of this later.\nFor τ z we can use τ z = -iτ x τ y , where i is the imaginary unit,\nτ z = -i (2 / √ 3)(2 S 1 · S 2 +1 / 2) S 1 · ( S 3 -S 4 ) (5)", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0266.pdf" + }, + { + "text": "I. Introduction.\n1\nII. Formulation of the Pseudo-spin-1/2 from Four-spin Cluster.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0266.pdf" + }, + { + "text": "B. Generate the High Order Terms by Magnetic Interactions between Clusters.\nH magnetic = ∑ cluster j ( J cluster / 2)( S j 1 + S j 2 + S j 3 + S j 4 ) 2 + ∑ x -links {√ 12 | J x | · J cluster [ S j 1 · S k 1 +sgn( J x ) · ( S j 2 · S k 2 ) ] -J x ( S j 1 · S j 2 + S k 1 · S k 2 ) } + ∑ y -links { √ 4 | J y | · J cluster [ S j 1 · ( S k 3 -S k 4 ) + sgn( J y ) S k 1 · ( S j 3 -S j 4 ) ] -| J y | ( S j 3 · S j 4 + S k 3 · S k 4 ) } + ∑ z -links { 4 √ | J z | · J cluster [ S j 2 · ( S k 3 × S k 4 ) + sgn( J z ) S k 2 · ( S j 3 × S j 4 ) ] -| J z | ( S j 3 · S j 4 + S k 3 · S k 4 ) } . (16)\nIn (16), we have been able to reduce the four spin interactions in (8) to inter-cluster Heisenberg interactions, and the six-spin interactions in (8) to inter-cluster spinchirality interactions. The inter-cluster Heisenberg couplings in H perturbation x,y may be easier to arrange. The\ninter-cluster spin-chirality coupling in H perturbation z explicitly breaks time reversal symmetry and is probably harder to implement in solid state systems. However spin-chirality order may have important consequences in frustrated magnets 36,37 , and a realization of spin-\nchirality interactions in cold atom optical lattices has been proposed 38 .\nOur model (8) is achieved at second order of the perturbation series. Higher order terms become truncation errors but may be controlled by small parameters λ x,y,z /J cluster ∼ √ | J x,y,z | /J cluster .", + "page_start": 6, + "page_end": 7, + "source_file": "1001.0266.pdf" + }, + { + "text": "IV. GENERATE THE HIGH ORDER PHYSICAL SPIN INTERACTIONS BY PERTURBATIVE EXPANSION.\nOne major drawback of the present construction is that it involves high order interactions of physical spins[see (8) and (9)], thus is 'unnatural'. In this Section we will make compromises between exact solvability and naturalness. We consider two clusters j and k and try to generate the J x,y,z interactions in (7) from perturbation series expansion of more natural(lower order) physical spin interactions. Two different approaches for this purpose will be laid out in the following two Subsections. In Subsection IV A we will consider the two clusters as two tetrahedra, and couple the spin system to certain optical phonons, further coupling between the phonon modes\n5\nFIG. 3: Illustration of the tetragonal to orthorhombic Q E 1 (top) and Q E 2 (bottom) distortion modes. (a) Perspective view of the tetrahedron. 1 , . . . , 4 label the spins. Arrows indicate the motion of each spin under the distortion mode. (b) Top view of (a). (c)(d) Side view of (a).\nof the two clusters can generate at lowest order the desired high order spin interactions. In Subsection IV B we will introduce certain magnetic, e.g. Heisenberg-type, interactions between physical spins of different clusters, at lowest order(second order) of perturbation theory the desired high order spin interactions can be achieved. These approaches involve truncation errors in the perturbation series, thus the mapping to low energy effect Hamiltonian will no longer be exact. However the error introduced may be controlled by small expansion parameters. In this Section we denote the physical spins on cluster j ( k ) as j 1 , . . . , j 4 ( k 1 , . . . , k 4), and denote pseudo-spins on cluster j ( k ) as /vectorτ j ( /vectorτ k ).", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0266.pdf" + } + ] + }, + { + "references": { + "source_file": "basic-english-language-skills.PDF", + "query": "What is the Oxbridge Academy email?", + "target_page": 59, + "target_passage": "Email: info@oxbridgeacademy.co.za", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "CONTACT NUMBERS:\nTel: 021 1100 200 Tel:+2721 883 2454 (international) Fax: 086 111 2121\nFax: +2721 883 2378 (international)\nWhatsapp: 0605671585 Email: info@oxbridgeacademy.co.za\nPostal Address:\nPO Box 12723, Die Boord, Stellenbosch, 7613\nWe are registered with the Department of Higher Education and Training as a Private College in terms of Section 31(6)(a) of the Continuing Education and Training Act, 2006 (Act No. 16 of 2006). Registration No. 2009/FE07/070.\nDeveloped for Oxbridge Academy", + "page_start": 58, + "page_end": 58, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "Did you enjoy reading this book?\nJoin our online social community and share your opinion:\nwww.facebook.com/oxbridgeacademysa twitter.com/oxbridgeEdu www.linkedin.com/company/oxbridge-academy\nOxbridge Academy is an established distance learning college offer -ing skills courses, national qualifications, and internationally recognised courses to students in South Africa and abroad.\nWith our head office in Stellenbosch in the Western Cape, we cater to our students' needs by recruiting industry-expert tutors to provide academic assistance via telephone and e-mail, as well as by designing our study material in such a way that it is clear, simple, and easy for our students to understand.\nWith us, studying from home is easy, affordable, and convenient.", + "page_start": 58, + "page_end": 58, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "There are 4 steps you need to follow when you want to register as a student at Oxbridge Academy:\n1. Select Your Course\n2. Fill in Your Student Details\n3. Select Your Delivery Option\n4. Pay Your Registration Fee and Send in Your Form\nBasic English Language Skills", + "page_start": 20, + "page_end": 21, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "· Keep it professional.\nDon't pass on spam e-mails, chain letters, or inappropriate jokes, and don't spread gossip via e-mail.\nDeveloped for Oxbridge Academy\nBasic English Language Skills", + "page_start": 53, + "page_end": 54, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "STEP 1 - SELECT YOUR COURSE\nOxbridge Academy Short Course: Marketing Management\nADV101\nBefore you start filling in the registration form, you need to choose your course. Once you've identified the course that you would like to study, remember to check that you meet the entry requirements.\nYou can find the course name and course code for your chosen course on the relevant detailed course information page on our website. Have a look at the example in the screenshot below (the course name and course code are circled in red):\nPlease make sure to check the accreditation status of your chosen course. Some of our courses are non-credit bearing skills development courses, which are neither accredited by external bodies nor registered on the NQF. Please go to our website: oxbridgeacademy.co.za for more information about our skills development courses.\nDeveloped for Oxbridge Academy\nBasic English Language Skills", + "page_start": 21, + "page_end": 22, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "IMPROVE YOUR MARKS!\nDeveloped for Oxbridge Academy\nBasic English Language Skills", + "page_start": 41, + "page_end": 42, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "STEP 4 - PAY YOUR REGISTRATION FEE AND SEND IN YOUR FORM\nDifferent courses have different registration fees. Please check the course fees list (www.oxbridgeacademy.co.za/Documents/ Price-list-2015.pdf) to find out how much you need to pay to register for your chosen course, and pay this amount using the banking details provided at the bottom of the registration form. Remember to attach your proof of payment.\nIf you are under the age of 18, your parent or guardian will need to sign this section of the form to state that they are aware of your registration with Oxbridge Academy, and that they do not have any objections. If you are unemployed, you will need a guarantor to sign this section of the form. Your parent or guarantor will be held responsible if you miss any of your payments in relation to your course fees.\nDeveloped for Oxbridge Academy\n3\nBasic English Language Skills\n4\nSend your registration form to the registrations office at Oxbridge Academy via one of the following channels:\nFax:\n086 262 5550\nPost: PO Box 12723, Die Boord, 7613 E-mail: registrar@oxbridgeacademy.co.za\n6\nBasic English Language Skills", + "page_start": 25, + "page_end": 27, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "LANGUAGE SKILLS AT WORK SENDING E-MAILS TO YOUR COLLEAGUES\nIn today's working environment, it is almost guaranteed that you will be required to communicate with colleagues via e-mail on a regular basis. And due to the large number of e-mails we now send and receive each day, proper e-mail etiquette is more important than ever.\nDeveloped for Oxbridge Academy\nBasic English Language Skills", + "page_start": 51, + "page_end": 52, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "TIPS FOR FILLING IN YOUR COLLEGE REGISTRATION FORM\nApplying for college (www.oxbridgeacademy.co.za/enrol-now/) can be a daunting experience. Not only do you need to choose a course, but you also need to make sure that you:\n· meet the entry requirements\n· meet the deadlines\n· fill in the forms correctly\n· send the forms to the right address\n· include all the necessary attachments\nTo make the college registration process easier for you, we've compiled a comprehensive guide on how to register at Oxbridge Academy (www.oxbridgeacademy.co.za/enrol-now/). The guide also includes general tips that will be relevant to the application and registration processes at other colleges.", + "page_start": 20, + "page_end": 20, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "1. Read (and follow) the instructions carefully.\nIf you are an Oxbridge Academy student, the general assignment guidelines will be provided in your 'Success' Study Guide. Specific instructions will also be included at the beginning of each of your assignments.", + "page_start": 37, + "page_end": 37, + "source_file": "basic-english-language-skills.PDF" + } + ] + }, + { + "references": { + "source_file": "sg247938.pdf", + "query": "When is it necessary to use a host multipathing driver for load balancing?", + "target_page": 340, + "target_passage": "For load balancing and access redundancy on the host side, the use of a host multipathing driver is required in the following situations: Protection from fabric link failures, including port failures on the IBM Spectrum Virtualize system nodes Protection from a host HBA failure (if two HBAs are in use) Protection from fabric failures if the host is connected through two HBAs to two separate fabrics Provide load balancing across the host HBA", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "3.6.5 Host zones\n1. Divide ports on the I/O Group into two disjoint sets, such that each set contains two ports from each I/O Group node, each connected to a different fabric.\nFor consistency, use the same port number on each I/O Group node. The example that is shown in Figure 3-4 on page 56 assigns ports 1 and 4 to one port set, and ports 2 and 3 to the second set.\nBecause the I/O Group nodes have four FC ports each, two port sets are created.\n2. Divide hosts attached to the I/O Group into two equally numerous groups.\nIn general, for I/O Group nodes with more than four ports, divide the hosts into as many groups as you created sets in step 1.\n3. Map each host group to exactly one port set.\n4. Zone all hosts from each group to the corresponding set of I/O Group node ports.\nThe host connections in the example on Figure 3-4 on page 56 are defined in the following manner:\n- Hosts in group one are always zoned to ports 1 and 4 on both nodes.\n- Hosts in group two are always zoned to ports 2 and 3 on both nodes of the I/O Group.\nTip: Create an alias for the I/O Group port set. This step makes it easier to correctly zone hosts to the correct set of I/O Group ports. It also makes host group membership visible in the FC switch configuration.\nThe use of this schema provides four paths to one I/O Group for each host, and helps to maintain an equal distribution of host connections on Storwize V7000 ports.\nTip: To maximize performance from the host point of view, distribute volumes that are mapped to each host between both I/O Group nodes.\nChapter 3. Planning\n55\n56\nImplementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\nFigure 3-4 Overview of four-path host zoning\nWhen possible, use the minimum number of paths that are necessary to achieve a sufficient level of redundancy. For the Storwize V7000 environment, no more than four paths per I/O Group are required to accomplish this layout.\nAll paths must be managed by the multipath driver on the host side. Make sure that the multipath driver on each server can handle the number of paths required to access all volumes mapped to the host.", + "page_start": 76, + "page_end": 77, + "source_file": "sg247938.pdf" + }, + { + "text": "Performance considerations\nFor the best performance and availability, use ISL trunking or port channeling. Independent ISL links can easily become overloaded and turn into performance bottlenecks. Bonded or trunked ISLs automatically share load and provide better redundancy in a failure.\n740\nImplementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\n/SM590000 Number of paths per host multipath device\nThe maximum supported number of paths per multipath device that is visible on the host is eight. Although the IBM Subsystem Device Driver Path Control Module (SDDPCM), related products, and most vendor multipathing software can support more paths, the Storwize V7000 expects a maximum of eight paths. In general, you see only an effect on performance from more paths than eight. Although the IBM Spectrum Virtualize can work with more than eight paths, this design is technically unsupported.\n/SM590000 Do not intermix dissimilar array types or sizes\nAlthough the IBM Spectrum Virtualize supports an intermix of differing storage within storage pools, it is best to always use the same array model, Redundant Array of Independent Disks (RAID) mode. RAID size (RAID 5 6+P+S does not mix well with RAID 6 14+2), and drive speeds.\nRules and guidelines are no substitution for monitoring performance. Monitoring performance can provide a validation that design expectations are met, and identify opportunities for improvement.", + "page_start": 761, + "page_end": 762, + "source_file": "sg247938.pdf" + }, + { + "text": "Contents\n. . . . . . . . . . . . . . . . . . . . 289, 1 = . 12.2.5 Horizontal scalability: Multiple logical partitions and systems. . . . . . . . . . . . . . 290, 1 = . 12.2.6 Multiple server configuration rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291, 1 = . 12.3 High availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292, 1 = . 12.3.1 Redundant systems: All platforms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292, 1 = . 12.3.2 Multiple LPAR sysplex: z/OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293, 1 = . 12.3.3 High availability: IBM i. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294, 1 = . 12.3.4 Horizontal and vertical scalability summary . . . . . . . . . . . . . . . . . . . . . . . . . . . 294, 1 = . Chapter 13. Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297, 1 = . 13.1 Tuning Content Manager OnDemand to enhance performance . . . . . . . . . . . . . . . . 298 13.1.1 Content Manager OnDemand configuration . . . . . . . . . . . . . . . . . . . . . . . . . . .", + "page_start": 8, + "page_end": 8, + "source_file": "sg246915.pdf" + }, + { + "text": "Performance considerations\nWhen you are designing the IBM Spectrum Virtualize infrastructure or maintaining an existing infrastructure, you must consider many factors in terms of their potential effect on performance. These factors include, but are not limited to, dissimilar workloads that are competing for the same resources, overloaded resources, insufficient available resources, poor performing resources, and similar performance constraints.\nRemember the following high-level rules when you are designing your storage area network (SAN) and IBM Spectrum Virtualize layout:\n/SM590000 Host-to-System inter-switch link (ISL) oversubscription\nThis area is the most significant input/output (I/O) load across ISLs. The recommendation is to maintain a maximum of 7-to-1 oversubscription. A higher ratio is possible, but it tends to lead to I/O bottlenecks. This suggestion also assumes a core-edge design, where the hosts are on the edges and the Storwize V7000 is the core.\n/SM590000 Storage-to-System ISL oversubscription\nThis area is the second most significant I/O load across ISLs. The maximum oversubscription is 7-to-1. A higher ratio is not supported. Again, this suggestion assumes a multiple-switch SAN fabric design.\n/SM590000 Node-to-node ISL oversubscription\nThis area does not apply to Storwize V7000 clusters composed of a unique control enclosure. This area is the least significant load of the three possible oversubscription bottlenecks. In standard setups, this load can be ignored. Although this area is not entirely negligible, it does not contribute significantly to the ISL load. However, node-to-node ISL oversubscription is mentioned here in relation to the split-cluster capability that was made available since V6.3 (HyperSwap).\nWhen the system is running in this manner, the number of ISL links becomes more important. As with the storage-to-System ISL oversubscription, this load also requires a maximum of 7-to-1 oversubscription. Exercise caution and careful planning when you determine the number of ISLs to implement. If you need assistance, contact your IBM representative.\n/SM590000 ISL trunking/port channeling", + "page_start": 761, + "page_end": 761, + "source_file": "sg247938.pdf" + }, + { + "text": "Intercluster link\nThese numbers estimate the amount of traffic between the two clustered systems when no I/O is taking place to mirrored volumes. Half of the data is sent by each of the systems. The traffic is divided evenly over all available intercluster links. Therefore, if you have two redundant links, half of this traffic is sent over each link.\nThe bandwidth between sites must be sized to meet the peak workload requirements. You can estimate the peak workload requirement by measuring the maximum write workload averaged over a period of 1 minute or less, and adding the heartbeat bandwidth. Statistics must be gathered over a typical application I/O workload cycle, which might be days, weeks, or months, depending on the environment in which the Storwize V7000 is used.\nWhen planning the inter-site link, consider also the initial sync and any future resync workloads. It might be worthwhile to secure additional link bandwidth for the initial data synchronization.\nIf the link between the sites is configured with redundancy so that it can tolerate single failures, you must size the link so that the bandwidth and latency requirements are met even during single failure conditions.\nWhen planning the inter-site link, make a careful note whether it is dedicated to the inter-cluster traffic or is going to be used to carry any other data. Sharing link with other traffic (for example, cross-site IP traffic) might reduce the cost of creating the inter-site connection and improve link utilization. However, doing so might affect the links' ability to provide the required bandwidth for data replication.\nVerify carefully that the devices that you plan to use to implement the intercluster link are supported.", + "page_start": 98, + "page_end": 98, + "source_file": "sg247938.pdf" + }, + { + "text": "3.13.1 Planning for large deployments\nEach I/O Group can have up to 512 host objects defined. This limit is the same whether hosts are attached by using FC, iSCSI, or a combination of both. To allow more than 512 hosts to access the storage, you must divide them into groups of 512 hosts or less, and map each group to single I/O Group only. This approach allows you to configure up to 2048 host objects on a system with four I/O Groups (eight nodes).\nFor best performance, split each host group into two sets. For each set, configure the preferred access node for volumes presented to the host set to one of the I/O Group nodes. This approach helps to evenly distribute load between the I/O Group nodes.\nChapter 3. Planning\n71\n72\nImplementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\nNote: A volume can be mapped only to a host that is associated with the I/O Group to which the volume belongs.", + "page_start": 92, + "page_end": 93, + "source_file": "sg247938.pdf" + }, + { + "text": "3.6.5 Host zones\nHost must be zoned to the I/O Group to access volumes that are presented by this I/O Group.\nThe preferred zoning policy is to create a separate zone for each host HBA port, and place exactly one port from each node in each I/O group that the host accesses in this zone. For deployments with more than 64 hosts defined in the system, this host zoning scheme is mandatory.\nIf you plan to use NPIV, see the other host zoning requirements at that available at this website.\nWhen a dual-core SAN design is used, it is a requirement that no internode communications use the ISL link. When you create host zones in this type of configuration, ensure that each system port in the host zone is attached to the same Fibre Channel switch.\nConsider the following rules for zoning hosts with the Storwize V7000:\n/SM590000 HBA to Storwize V7000 port zones\nPlace each host's HBA in a separate zone with exactly one port from each node in each I/O group that the host accesses.\nIt is not prohibited to zone host's HBA to one port from every node in the cluster, but it does reduce the maximum number of hosts that can be attached to the system.\nNumber of paths: For n + 1 redundancy, use the following number of paths:\n/SM590000 With two HBA ports, zone HBA ports to Storwize V7000 ports 1:2 for a total of four paths.\n/SM590000 With four HBA ports, zone HBA ports to Storwize V7000 ports 1:1 for a total of four paths.\n/SM590000 Optional ( n +2 redundancy): With four HBA ports, zone HBA ports to Storwize V7000 ports 1:2 for a total of eight paths.\nHere, the term HBA port is used to describe the SCSI initiator and Storwize V7000 port to describe the SCSI target.\n/SM590000 Maximum host paths per logical unit (LU)\nFor any volume, the number of paths through the SAN from the Storwize V7000 nodes to a host must not exceed eight. For most configurations, four paths to an I/O Group are sufficient.\nImportant: The maximum number of host paths per LUN must not exceed eight.", + "page_start": 75, + "page_end": 75, + "source_file": "sg247938.pdf" + }, + { + "text": "13.2.2 Recommendations\n/SM590000 For Multiplatforms and z/OS, run parallel load jobs to take advantage of multiprocessors, large memory pools, multiple data paths, and multiple disk drives.\n/SM590000 Ensure that each parallel load is loading to a different application group.\n/SM590000 Ensure that you set up a different temp directory for each of the parallel loads. The -c indexDir indexer parameter (which specifies the directory in which the indexer stores temporary data) must always be specified for ARSLOAD and must be unique for each running ARSLOAD process.\n/SM590000 For IBM i, start multiple output queue monitors over a single output queue to improve throughput and take advantage of multiprocessors, large memory pools, and multiple disk drives.\n/SM590000 Each Content Manager OnDemand process is limited by the performance of a single processor. For example, the OS/400 indexer uses only one processor when it indexes a document. Using two or more processors in your system or LPAR does not improve the performance of the OS/400 indexer. However, by using two or more processors in your system or LPAR, you might be able to run multiple load jobs simultaneously. You can start multiple output queue monitors over a single output queue to improve document load performance.\n/SM590000 For IBM i, the use of the Merge Spooled Files ( MRGSPLFOND ) command can provide significant performance improvements when you load SCS spooled files.\n/SM590000 For IBM i, depending on your retrieval patterns and system hardware configuration, it might be advantageous to not store a duplicate set of documents in the Content Manager OnDemand cache when you use ASM because ASM might already be using disk space. If the application group uses ASM, caches the data, and specifies the migration of data at load time, two copies of the data are stored during the load. One copy is stored in cache, and one copy is stored in the ASMREQUEST directory.\nTo avoid storing a duplicate set of documents in cache for non-AFP data, change Cache Data to No on the Storage Management tab of your application group definition. To avoid storing a duplicate set of documents in cache for AFP data, you might change Document Data to No Cache but leave Resource Data in cache for faster retrieval.", + "page_start": 325, + "page_end": 326, + "source_file": "sg246915.pdf" + }, + { + "text": "11.8.8 Supported configurations\n- There are two I/O Groups with nodes in those I/O groups that are configured in two remote copy port groups because there are two inter-site links for participating in IP partnership. However, only one port per system in a particular remote copy port group remains active and participates in IP partnership.\n- One port per system from each remote copy port group participates in IP partnership simultaneously. Therefore, both of the links are used.\n- If a node or port on the node that is actively participating in IP partnership fails, the RC data path is established from that port because another port is available on an alternative node in the system with the same remote copy port group.\n- The path selection algorithm starts discovery of available ports in the affected remote copy port group in the alternative I/O groups and paths are reestablished, which restores the total bandwidth across both links.\n- The remaining or all of the I/O groups can be in remote copy partnerships with other systems.\n/SM590000 An example of an unsupported configuration for a single inter-site link is shown in Figure 11-105 (configuration 8).\nFigure 11-105 Two node systems with single inter-site link and remote copy port groups configured\nAs shown in Figure 11-105, this configuration is similar to Configuration 2, but differs because each node now has the same remote copy port group that is configured on more than one IP port.\nOn any node, only one port at any time can participate in IP partnership. Configuring multiple ports in the same remote copy group on the same node is not supported .\n/SM590000 An example of an unsupported configuration for a dual inter-site link is shown in Figure 11-106 (configuration 9).\nFigure 11-106 Dual Links with two Remote Copy Port Groups with failover Port Groups configured\nAs shown in Figure 11-106, this configuration is similar to Configuration 5, but differs because each node now also has two ports that are configured with remote copy port groups. In this configuration, the path selection algorithm can select a path that might cause partnerships to change to the Not_Present state and then recover, which results in a configuration restriction. The use of this configuration is not recommended until the configuration restriction is lifted in future releases.\n/SM590000 An example deployment for configuration 2 with a dedicated inter-site link is shown in Figure 11-107 (configuration 10).\nFigure 11-107 Deployment example\nChapter 11. Advanced Copy Services\n567", + "page_start": 587, + "page_end": 588, + "source_file": "sg247938.pdf" + }, + { + "text": "11.8.8 Supported configurations\nAs shown in Figure 11-102, remote copy port groups 1 and 2 are configured on the nodes in System A and System B because two inter-site links are available. In this configuration, the failover ports are not configured on partner nodes in the I/O group. Instead, the ports are maintained in different remote copy port groups on both of the nodes. They remain active and participate in IP partnership by using both of the links.\nHowever, if either of the nodes in the I/O group fail (that is, if Node A1 on System A fails), the IP partnership continues only from the available IP port that is configured in remote copy port group 2. Therefore, the effective bandwidth of the two links is reduced to 50% because only the bandwidth of a single link is available until the failure is resolved.\nThis configuration has the following characteristics:\n- Two inter-site links and two remote copy port groups are configured.\n- Each node has only one IP port in remote copy port group 1 or 2.\n- Both the IP ports in the two remote copy port groups participate simultaneously in IP partnerships. Therefore, both of the links are used.\n- During node failure or link failure, the IP partnership traffic continues from the other available link and the port group. Therefore, if two links of 10 Mbps each are available and you have 20 Mbps of effective link bandwidth, bandwidth is reduced to 10 Mbps only during a failure.\n- After the node failure or link failure is resolved and failback happens, the entire bandwidth of both of the links is available as before.\n/SM590000 Two 4-node systems in IP partnership with dual inter-site links, as shown in Figure 11-103 (configuration 6).\nFigure 11-103 Multinode systems with dual inter-site links between the two systems\nAs shown in Figure 11-103, there are two 4-node systems:\n- System A\n- System B\nThis configuration is an extension of Configuration 5 to a multinode multi-I/O group environment. This configuration has two I/O groups, and each node in the I/O group has a single port that is configured in remote copy port groups 1 or 2.", + "page_start": 583, + "page_end": 584, + "source_file": "sg247938.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0955.pdf", + "query": "Which orbiting instrument provides near-continuous full-sky coverage in the hard X-ray/low-energy gamma-ray range?", + "target_page": 1, + "target_passage": "Gamma ray Burst Monitor", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "I. INTRODUCTION\nThe Gamma ray Burst Monitor (GBM) on Fermi is currently the only instrument in orbit providing nearly continuous full sky coverage in the hard X-ray/low energy gamma ray energy range. The Earth occultation technique, used very successfully on BATSE, has been adapted to GBM. An initial catalog of 64 sources is currently being monitored and continuously augmented. At energies above 100 keV, six steady sources (the Crab, Cyg X-1, Swift J1753.5-0127, 1E 1740-29, Cen A, GRS 1915+105) and one transient source (XTE J1752-223) have been detected in the first year of observation. We describe the instrument, outline the technique, and present light curves for the seven sources.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0955.pdf" + }, + { + "text": "M.H. Finger\nUSRA, National Space Science and Technology Center, Huntsville, AL 35899\nThe NaI and BGO detectors on the Gamma ray Burst Monitor (GBM) on Fermi are now being used for long term monitoring of the hard X-ray/low energy gamma ray sky. Using the Earth occultation technique demonstrated previously by the BATSE instrument on the Compton Gamma Ray Observatory, GBM produces multiband light curves and spectra for known sources and transient outbursts in the 8 keV - 1 MeV band with its NaI detectors and up to 40 MeV with its BGO. Coverage of the entire sky is obtained every two orbits, with sensitivity exceeding that of BATSE at energies below ∼ 25 keV and above ∼ 1 . 5 MeV. We describe the technique and present preliminary results after the first ∼ 17 months of observations at energies above 100 keV. Seven sources are detected: the Crab, Cyg X-1, Swift J1753.5-0127, 1E 1740-29, Cen A, GRS 1915+105, and the transient source XTE J1752-223.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0955.pdf" + }, + { + "text": "Observations of Soft Gamma Ray Sources > 100 keV Using Earth Occultation with GBM\nG.L. Case, M.L. Cherry, J. Rodi Dept. of Physics & Astronomy, Louisiana State Univ., Baton Rouge, LA 70803, USA", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0955.pdf" + }, + { + "text": "2. VERITAS\nVERITAS, a stereoscopic array of four 12-m atmospheric-Cherenkov telescopes located in Arizona, is used to study VHE γ -rays from a variety of astrophysical sources [4]. VERITAS began scientific observations with a partial array in September 2006 and has routinely observed with the full array since September 2007. The performance metrics of VERITAS include an energy threshold of ∼ 100 GeV, an energy resolution of ∼ 15%, an angular resolution of ∼ 0.1 · , and a sensitivity yielding a 5 σ detection of a 1% Crab Nebula flux object in < 30 hours 1 . VERITAS has an active maintenance program (e.g. frequent mirror recoating and alignment) to ensure its continued high performance over time, and an upgrade improving both the camera (higher quantum-efficiency PMTs) and the trigger system has been proposed to the funding agencies.\n1 A VERITAS telescope was relocated during Summer 2009, increasing the array's sensitivity by a factor ∼ 1.3.\n2\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5", + "page_start": 0, + "page_end": 1, + "source_file": "1001.0770.pdf" + }, + { + "text": "A. Steady Sources\nThe sources Crab, Cyg X-1, Swift J1753.5-0127, 1E 1740-29, Cen A, and GRS 1915+105 are detected by GBM at energies above 100 keV. We show GBM light curves generated from the Earth occultation analysis in several energy bands with one day resolution for these six sources in Figures 2 - 7.\nTable I gives the fluxes and significances averaged over all the days from Aug. 12, 2008 (the beginning of science operations) to Dec. 15, 2009, approximately 490 days.\nThe Crab (Fig. 2) spectrum in the hard x-ray/low energy gamma-ray region can be described by a broken power law, with the spectrum steepening at 100 keV and then hardening at 650 keV [7, 8]. While the GBMCTIMEdata do not have the spectral resolution\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\n3\nFIG. 3: Cen A light curve. Horizontal scale is in modified Julian days.\nto observe these breaks, GBM is able to see significant emission above 300 keV, consistent with the canonical hard spectrum.\nCen A (Fig. 3) is a Sy 2 galaxy that is the brightest AGN in hard x-rays/low energy gamma rays. It has a hard spectrum (Γ = 1 . 8) and has been observed at energies > 1 MeV [9]. The GBM results are consistent with this hard spectrum, though GBM does not have the sensitivity to determine if the hard spectrum continues beyond 300 keV or if the spectrum cuts off.\nCyg X-1 (Fig. 4) is a HMXB and one of the first systems determined to contain a black hole. It has been observed to emit significant emission above 100 keV including a power law tail extending out to greater than 1 MeV [10, 11]. The GBM results show significant emission above 300 keV, consistent with the power law tail observed when Cyg X-1 is in its hard state.\nGRS 1915+105 (Fig. 5) is a LMXB with the compact object being a massive black hole. Evidence for emission above 100 keV has been seen previously [12] with BATSE. The GBM light curve integrated over 490 days shows significant emission above 100 keV.", + "page_start": 1, + "page_end": 2, + "source_file": "1001.0955.pdf" + }, + { + "text": "II. GBM AND THE EARTH OCCULTATION OBSERVATIONAL TECHNIQUE\nThe Gamma ray Burst Monitor is the secondary instrument onboard the Fermi satellite [1, 2]. It con-\neConf C091122\nsists of 12 NaI detectors 5 '' in diameter by 0.5 '' thick mounted on the corners of the spacecraft and oriented such that they view the entire sky not occulted by the Earth. GBM also contains 2 BGO detectors 5 '' in diameter by 5 '' thick located on opposite sides of the spacecraft. None of the GBM detectors have direct imaging capability.\nKnown sources of gamma ray emission can be monitored with non-imaging detectors using the Earth occultation technique, as was successfully demonstrated with BATSE [3, 4]. When a source of gamma rays is occulted by the Earth, the count rate measured by the detector will drop, producing a step-like feature. When the source reappears from behind the Earths limb, the count rate will increase, producing another step. The diameter of the Earth seen from Fermi is ∼ 140 · , so roughly 30% of the sky is occulted by the Earth at any one time. Coupled with the ± 35 · slewing of the pointing direction every orbit, this means that the entire sky is occulted every two orbits. With an altitude of 565 km, a period of 96 minutes, and an orbital inclination of 26 . 5 · , individual occultation steps last for ∼ 10 seconds (Fig. 1).\n2\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\nFIG. 1: Single Crab occultation step in a single GBM NaI detector. Horizontal scale is in seconds centered on the occultation time. Vertical scale is in measured counts.", + "page_start": 0, + "page_end": 1, + "source_file": "1001.0955.pdf" + }, + { + "text": "II. GBM AND THE EARTH OCCULTATION OBSERVATIONAL TECHNIQUE\nThe shape of the individual occultation steps depends on energy and occultation angle. Transmission as a function of time is modeled as T ( t ) = exp [ -µ ( E ) A ( h )], where µ ( E ) is the mass attenuation coefficient of gamma rays at energy E in air and A ( h ) is the air mass along the line of sight at a given altitude h ( t ). Account is taken of the detector response as it changes as a function of angle across the fit window. For each source, occultation times are predicted. Each step is fit over a 4-minute window along with a quadratic background and using an assumed spectrum to determine the detector count rate due to the source. The instrument response is used to convert the count rate to a flux. Up to 31 steps are possible for a given source in a day, and these steps are summed to get a single daily average flux. The GBM occultation sensitivity exceeds that of BATSE at energies below ∼ 25 keV and above ∼ 1 . 5 MeV [5].\nThis work uses the GBM CTIME data, with its 8 broad energy channels and 0.256-second resolution, rebinned to 2-second resolution. The occultation technique relies on an input catalog of known sources. Currently, we are monitoring 64 sources. Of these 64 sources, 6 steady sources are detected above 100 keV with a significance of at least 5 σ after ∼ 490 days of observations, and one transient source.", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0955.pdf" + }, + { + "text": "III. RESULTS\nThe results presented here are preliminary. We have not completed the fine tuning of our algorithms, though the average fluxes are not expected to change much. Future work will include using the GBM CSPEC data, with its finer energy binning, to examine the detailed spectra for these sources.\nThe measured 20 - 50 keV GBM light curves are compared to Swift's 15 - 50 keV light curves for sev-\neConf C091122\nFIG. 2: Crab light curve. Horizontal scale is in modified Julian days over the 490 day GBM exposure period. Vertical scale is in photons/cm 2 /sec/keV averaged over daily intervals. Horizontal lines show the average flux in each of five energy bands increasing from top to bottom\neral sources over the same time intervals in ref. [2], where it is seen that the results measured by the two instruments compare well. At energies above the upper energy limit of ∼ 195 keV of the Swift 22-month catalog [6], however, the GBM observations provide the only wide-field monitor available of the low energy gamma ray sky.", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0955.pdf" + }, + { + "text": "3. VERITAS Blazar KSP\nVERITAS observes for ∼ 750 h and ∼ 250 h each year during periods of astronomical darkness and partial moonlight, respectively. The moonlight observations are almost exclusively used for a blazar discovery program, and a large fraction of the dark time is used for the blazar KSP, which consists of:\n· A VHE blazar discovery program ( ∼ 200 h / yr): Each year ∼ 10 targets are selected to receive ∼ 10 h of observations each during astronomical darkness. These data are supplemented by discovery observations during periods of partial moonlight.\n· A target-of-opportunity (ToO) observation program ( ∼ 50 h / yr): VERITAS blazar observations can be triggered by either a VERITAS blazar discovery, a VHE flaring alert ( > 2 Crab) from the blazar monitoring program of the Whipple 10-m telescope or from another VHE instrument, or a lower-energy flaring alert (optical, X-ray or Fermi-LAT). Should the guaranteed allocation be exhausted, further time can be requested from a pool of director's discretionary time.\n· Multi-wavelength (MWL) studies of VHE blazars ( ∼ 50 h / yr + ToO): Each year one blazar receives a deep exposure in a pre-planned campaign of extensive, simultaneous MWL (Xray, optical, radio) measurements. ToO observation proposals for MWL measurements are also submitted to lower-energy observatories (e.g. Swift) and are triggered by a VERITAS discovery or flaring alert.\n· Distant VHE blazar studies to constrain the extragalactic background light (EBL): Here distant targets are given a higher priority in the blazar discovery program, as well as for the MWL observations of known VHE blazars, particularly those with hard VHE spectra.", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0770.pdf" + }, + { + "text": "Acknowledgments\nThis work is supported by the NASA Fermi Guest Investigator program. At LSU, additional support is provided by NASA/Louisiana Board of Regents Cooperative Agreement NNX07AT62A.\n(1998).\n[10] M. McConnell et al., Ap. J. 523 , 928 (2000).\n[11] J. C. Ling and W. A. Wheaton, Chinese J. Astron. Astrophys. Suppl. 5 , 80 (2005).\n[12] G. L. Case et al., Chinese J. Astron. Astrophys. Suppl. 5 , 341 (2005).\n[13] L. Bouchet et al., Ap. J. 693 , 1871 (2009).\n[14] M. C. Bell et al., Ap. J. 659 , 549 (2007).\n[15] G. L. Case et al. (2010), to be submitted.\n[16] C. Wilson-Hodge et al., Astron. Telegram 2280 (2009).", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0955.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0955.pdf", + "query": "What is Cyg X-1?", + "target_page": 3, + "target_passage": "is a HMXB and one of the first systems determined to contain a black hole", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "A. Steady Sources\nThe sources Crab, Cyg X-1, Swift J1753.5-0127, 1E 1740-29, Cen A, and GRS 1915+105 are detected by GBM at energies above 100 keV. We show GBM light curves generated from the Earth occultation analysis in several energy bands with one day resolution for these six sources in Figures 2 - 7.\nTable I gives the fluxes and significances averaged over all the days from Aug. 12, 2008 (the beginning of science operations) to Dec. 15, 2009, approximately 490 days.\nThe Crab (Fig. 2) spectrum in the hard x-ray/low energy gamma-ray region can be described by a broken power law, with the spectrum steepening at 100 keV and then hardening at 650 keV [7, 8]. While the GBMCTIMEdata do not have the spectral resolution\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\n3\nFIG. 3: Cen A light curve. Horizontal scale is in modified Julian days.\nto observe these breaks, GBM is able to see significant emission above 300 keV, consistent with the canonical hard spectrum.\nCen A (Fig. 3) is a Sy 2 galaxy that is the brightest AGN in hard x-rays/low energy gamma rays. It has a hard spectrum (Γ = 1 . 8) and has been observed at energies > 1 MeV [9]. The GBM results are consistent with this hard spectrum, though GBM does not have the sensitivity to determine if the hard spectrum continues beyond 300 keV or if the spectrum cuts off.\nCyg X-1 (Fig. 4) is a HMXB and one of the first systems determined to contain a black hole. It has been observed to emit significant emission above 100 keV including a power law tail extending out to greater than 1 MeV [10, 11]. The GBM results show significant emission above 300 keV, consistent with the power law tail observed when Cyg X-1 is in its hard state.\nGRS 1915+105 (Fig. 5) is a LMXB with the compact object being a massive black hole. Evidence for emission above 100 keV has been seen previously [12] with BATSE. The GBM light curve integrated over 490 days shows significant emission above 100 keV.", + "page_start": 1, + "page_end": 2, + "source_file": "1001.0955.pdf" + }, + { + "text": "I. INTRODUCTION\nThe Gamma ray Burst Monitor (GBM) on Fermi is currently the only instrument in orbit providing nearly continuous full sky coverage in the hard X-ray/low energy gamma ray energy range. The Earth occultation technique, used very successfully on BATSE, has been adapted to GBM. An initial catalog of 64 sources is currently being monitored and continuously augmented. At energies above 100 keV, six steady sources (the Crab, Cyg X-1, Swift J1753.5-0127, 1E 1740-29, Cen A, GRS 1915+105) and one transient source (XTE J1752-223) have been detected in the first year of observation. We describe the instrument, outline the technique, and present light curves for the seven sources.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0955.pdf" + }, + { + "text": "M.H. Finger\nUSRA, National Space Science and Technology Center, Huntsville, AL 35899\nThe NaI and BGO detectors on the Gamma ray Burst Monitor (GBM) on Fermi are now being used for long term monitoring of the hard X-ray/low energy gamma ray sky. Using the Earth occultation technique demonstrated previously by the BATSE instrument on the Compton Gamma Ray Observatory, GBM produces multiband light curves and spectra for known sources and transient outbursts in the 8 keV - 1 MeV band with its NaI detectors and up to 40 MeV with its BGO. Coverage of the entire sky is obtained every two orbits, with sensitivity exceeding that of BATSE at energies below ∼ 25 keV and above ∼ 1 . 5 MeV. We describe the technique and present preliminary results after the first ∼ 17 months of observations at energies above 100 keV. Seven sources are detected: the Crab, Cyg X-1, Swift J1753.5-0127, 1E 1740-29, Cen A, GRS 1915+105, and the transient source XTE J1752-223.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0955.pdf" + }, + { + "text": "A. Steady Sources\nTABLE I: Fluxes and Significance in High Energy Bands\n50. Cyg X-1, 300 - 500 keV.Signif. ( σ ) = 9.5. GRS 1915+105, 50 - 100 keV.Flux = 121. GRS 1915+105, 50 - 100 keV.Error (mCrab) (mCrab) = 4. GRS 1915+105, 50 - 100 keV.Signif. ( σ ) = 30. GRS 1915+105, 100 - 300 keV.Flux = 49. GRS 1915+105, 100 - 300 keV.Error (mCrab) (mCrab) = 7. GRS 1915+105, 100 - 300 keV.Signif. ( σ ) = 7. GRS 1915+105, 300 - 500 keV.Flux = 41. GRS 1915+105, 300 - 500 keV.Error (mCrab) (mCrab) = 52. GRS 1915+105, 300 - 500 keV.Signif. ( σ ) = 0.8. 1E 1740-29, 50 - 100 keV.Flux = 113. 1E 1740-29, 50 - 100 keV.Error (mCrab) (mCrab) = 5. 1E 1740-29, 50 - 100 keV.Signif. ( σ ) = 23. 1E 1740-29, 100 - 300 keV.Flux = 96. 1E 1740-29, 100 - 300 keV.Error (mCrab) (mCrab) = 10. 1E 1740-29, 100 - 300 keV.Signif. ( σ ) = 10. 1E 1740-29, 300 - 500 keV.Flux = 97. 1E 1740-29, 300 - 500 keV.Error (mCrab) (mCrab) = 68. 1E 1740-29, 300 - 500 keV.Signif. ( σ ) = 1.4. SWIFT 1753.5-0127, 50 - 100 keV.Flux = 135. SWIFT 1753.5-0127, 50 - 100 keV.Error (mCrab) (mCrab) = 5. SWIFT 1753.5-0127, 50 - 100 keV.Signif. ( σ ) = 27. SWIFT 1753.5-0127, 100 - 300 keV.Flux = 151. SWIFT", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0955.pdf" + }, + { + "text": "A. Steady Sources\nFIG. 7: SWIFTJ1753.5-0127 light curve. Horizontal scale is in modified Julian days.\nFIG. 6: 1E1740-29 light curve. Horizontal scale is in modified Julian days.\nwill use the GBM CSPEC data with their finer energy bins to obtain a fit to the spectrum and compare the power law index to that measured by Integral.\nSWIFT J1753.5-0127 (Fig. 7) is a LMXB with the compact object likely being a black hole. Swift discovered this source when it observed a large flare in July of 2005. The source did not return to quiescence but settled into a low intensity hard state [14]. BATSE occultation measurements from 19912000 showed no significant emission from this source above 25 keV [15]. The GBM results show that this source is still in a hard state, with significant emission above 100 keV. We will continue to monitor this\neConf C091122\nsource while it is in the hard state, with longer observations potentially verifying significant emission above 300 keV.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0955.pdf" + }, + { + "text": "Transgenic lines used in the study.\nCFP, cyan fluorescent protein; GFP, Green fluorescent protein; YFP, yellow fluorescent protein.\nPAIN ®", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed2.pdf" + }, + { + "text": "(Mark One)\nx\nQUARTERLY REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF\n1934\nFor the quarterly period ended September 30, 2024\nOR\no TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934\nFor the transition period from _________ to _________\nCommission File Number: 001-34756", + "page_start": 0, + "page_end": 0, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "A. Steady Sources\n1E 1740-29 (Fig. 6) is a LMXB very near the Galactic Center. It is a microquasar, and spends most of its time in the low/hard state. Integral observations indicate the presence of a power law tail above 200 keV [13]. The present GBM results are consistent with this high energy emission. In the future, we\neConf C091122\nFIG. 4: Cyg X-1 light curve. Horizontal scale is in modified Julian days.\nFIG. 5: GRS 1915+105 light curve. Horizontal scale is in modified Julian days.\n4\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\nTABLE I: Fluxes and Significance in High Energy Bands", + "page_start": 2, + "page_end": 3, + "source_file": "1001.0955.pdf" + }, + { + "text": "WIRELESS\nGLYPH<129> Canada's first and fastest wireless LTE 4G broadband network continued its expansion. Our network covered approximately 73 % of the Canadian population at December 31, 2013, while continuing to offer the largest selection of LTE devices of any carrier in Canada. We were also the first carrier in North America and one of the first in the world to offer international LTE roaming to wireless customers.\nGLYPH<129> Our wireless offerings and pricing tiers were simplified, reducing complexity and service times for our sales and support teams and adding customer value. These innovations include Canada's first complete wireless Share Everything plan which allows individuals, families and small businesses to share wireless data, unlimited nationwide talk and text and calling features across 1 to 10 wireless devices.\nGLYPH<129> Our 'worry free' $7.99 per day US wireless data roaming plan was launched, with twice the daily data capacity (50 MB) typically used daily by consumers for wireless Internet, as well as enhanced voice, text and data roaming value packages.\nGLYPH<129> A hybrid wireless home and small business phone solution was launched, that operates on our national wireless network. The service is available in regions outside Rogers' cable territories and offers a traditional home or office phone service and features without the need for a landline or Internet connection.\nGLYPH<129> The M2M World Alliance, an organization comprised of eight leading international mobile operators including Rogers, demonstrated a single global SIM card which makes it easier to deploy connected devices in multiple countries and expected to drive further growth for our machine-to-machine business.", + "page_start": 38, + "page_end": 38, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "xplor ati al A ustr or e W a; in specti d ,\nes\nSan tos Ltd ABN 80 007 550 923 Co v e r photogr aph: Close-up o f spinnin g K e lly Bushin g P age 1 photogr aphs (top to bottom): In specti on o f coiled tubin g d rillin d water ar ch es , M utin eer-Ex eter oil fi specti o n an d li aison with con tr actors 11 Floatin g Pr od cti on Stor ag e an\nCHAIRMAN'S REVIEW\n2 Steph en Gerlach comm en perf orm a n ce in 2004. 2004 A CHIEVEMENTS 2005 AND BEY OND 3 K ey achi evem en ts in 2004 an perf orm a n c e , plus what to look f n ear-term futur e . MANA GING DIRECT REVIEW 4 ohn Elli ce-Flin t r evi ews San er e th e values embodi xplor ers o yesteryear ar", + "page_start": 1, + "page_end": 1, + "source_file": "ASX_STO_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0955.pdf", + "query": "What satellite is the Gamma Ray Burst Observatory on?", + "target_page": 1, + "target_passage": " Fermi satellite", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "I. INTRODUCTION\nThe Gamma ray Burst Monitor (GBM) on Fermi is currently the only instrument in orbit providing nearly continuous full sky coverage in the hard X-ray/low energy gamma ray energy range. The Earth occultation technique, used very successfully on BATSE, has been adapted to GBM. An initial catalog of 64 sources is currently being monitored and continuously augmented. At energies above 100 keV, six steady sources (the Crab, Cyg X-1, Swift J1753.5-0127, 1E 1740-29, Cen A, GRS 1915+105) and one transient source (XTE J1752-223) have been detected in the first year of observation. We describe the instrument, outline the technique, and present light curves for the seven sources.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0955.pdf" + }, + { + "text": "M.H. Finger\nUSRA, National Space Science and Technology Center, Huntsville, AL 35899\nThe NaI and BGO detectors on the Gamma ray Burst Monitor (GBM) on Fermi are now being used for long term monitoring of the hard X-ray/low energy gamma ray sky. Using the Earth occultation technique demonstrated previously by the BATSE instrument on the Compton Gamma Ray Observatory, GBM produces multiband light curves and spectra for known sources and transient outbursts in the 8 keV - 1 MeV band with its NaI detectors and up to 40 MeV with its BGO. Coverage of the entire sky is obtained every two orbits, with sensitivity exceeding that of BATSE at energies below ∼ 25 keV and above ∼ 1 . 5 MeV. We describe the technique and present preliminary results after the first ∼ 17 months of observations at energies above 100 keV. Seven sources are detected: the Crab, Cyg X-1, Swift J1753.5-0127, 1E 1740-29, Cen A, GRS 1915+105, and the transient source XTE J1752-223.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0955.pdf" + }, + { + "text": "II. GBM AND THE EARTH OCCULTATION OBSERVATIONAL TECHNIQUE\nThe Gamma ray Burst Monitor is the secondary instrument onboard the Fermi satellite [1, 2]. It con-\neConf C091122\nsists of 12 NaI detectors 5 '' in diameter by 0.5 '' thick mounted on the corners of the spacecraft and oriented such that they view the entire sky not occulted by the Earth. GBM also contains 2 BGO detectors 5 '' in diameter by 5 '' thick located on opposite sides of the spacecraft. None of the GBM detectors have direct imaging capability.\nKnown sources of gamma ray emission can be monitored with non-imaging detectors using the Earth occultation technique, as was successfully demonstrated with BATSE [3, 4]. When a source of gamma rays is occulted by the Earth, the count rate measured by the detector will drop, producing a step-like feature. When the source reappears from behind the Earths limb, the count rate will increase, producing another step. The diameter of the Earth seen from Fermi is ∼ 140 · , so roughly 30% of the sky is occulted by the Earth at any one time. Coupled with the ± 35 · slewing of the pointing direction every orbit, this means that the entire sky is occulted every two orbits. With an altitude of 565 km, a period of 96 minutes, and an orbital inclination of 26 . 5 · , individual occultation steps last for ∼ 10 seconds (Fig. 1).\n2\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\nFIG. 1: Single Crab occultation step in a single GBM NaI detector. Horizontal scale is in seconds centered on the occultation time. Vertical scale is in measured counts.", + "page_start": 0, + "page_end": 1, + "source_file": "1001.0955.pdf" + }, + { + "text": "2. VERITAS\nVERITAS, a stereoscopic array of four 12-m atmospheric-Cherenkov telescopes located in Arizona, is used to study VHE γ -rays from a variety of astrophysical sources [4]. VERITAS began scientific observations with a partial array in September 2006 and has routinely observed with the full array since September 2007. The performance metrics of VERITAS include an energy threshold of ∼ 100 GeV, an energy resolution of ∼ 15%, an angular resolution of ∼ 0.1 · , and a sensitivity yielding a 5 σ detection of a 1% Crab Nebula flux object in < 30 hours 1 . VERITAS has an active maintenance program (e.g. frequent mirror recoating and alignment) to ensure its continued high performance over time, and an upgrade improving both the camera (higher quantum-efficiency PMTs) and the trigger system has been proposed to the funding agencies.\n1 A VERITAS telescope was relocated during Summer 2009, increasing the array's sensitivity by a factor ∼ 1.3.\n2\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5", + "page_start": 0, + "page_end": 1, + "source_file": "1001.0770.pdf" + }, + { + "text": "A. Steady Sources\nThe sources Crab, Cyg X-1, Swift J1753.5-0127, 1E 1740-29, Cen A, and GRS 1915+105 are detected by GBM at energies above 100 keV. We show GBM light curves generated from the Earth occultation analysis in several energy bands with one day resolution for these six sources in Figures 2 - 7.\nTable I gives the fluxes and significances averaged over all the days from Aug. 12, 2008 (the beginning of science operations) to Dec. 15, 2009, approximately 490 days.\nThe Crab (Fig. 2) spectrum in the hard x-ray/low energy gamma-ray region can be described by a broken power law, with the spectrum steepening at 100 keV and then hardening at 650 keV [7, 8]. While the GBMCTIMEdata do not have the spectral resolution\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\n3\nFIG. 3: Cen A light curve. Horizontal scale is in modified Julian days.\nto observe these breaks, GBM is able to see significant emission above 300 keV, consistent with the canonical hard spectrum.\nCen A (Fig. 3) is a Sy 2 galaxy that is the brightest AGN in hard x-rays/low energy gamma rays. It has a hard spectrum (Γ = 1 . 8) and has been observed at energies > 1 MeV [9]. The GBM results are consistent with this hard spectrum, though GBM does not have the sensitivity to determine if the hard spectrum continues beyond 300 keV or if the spectrum cuts off.\nCyg X-1 (Fig. 4) is a HMXB and one of the first systems determined to contain a black hole. It has been observed to emit significant emission above 100 keV including a power law tail extending out to greater than 1 MeV [10, 11]. The GBM results show significant emission above 300 keV, consistent with the power law tail observed when Cyg X-1 is in its hard state.\nGRS 1915+105 (Fig. 5) is a LMXB with the compact object being a massive black hole. Evidence for emission above 100 keV has been seen previously [12] with BATSE. The GBM light curve integrated over 490 days shows significant emission above 100 keV.", + "page_start": 1, + "page_end": 2, + "source_file": "1001.0955.pdf" + }, + { + "text": "Observations of Soft Gamma Ray Sources > 100 keV Using Earth Occultation with GBM\nG.L. Case, M.L. Cherry, J. Rodi Dept. of Physics & Astronomy, Louisiana State Univ., Baton Rouge, LA 70803, USA", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0955.pdf" + }, + { + "text": "III. RESULTS\nThe results presented here are preliminary. We have not completed the fine tuning of our algorithms, though the average fluxes are not expected to change much. Future work will include using the GBM CSPEC data, with its finer energy binning, to examine the detailed spectra for these sources.\nThe measured 20 - 50 keV GBM light curves are compared to Swift's 15 - 50 keV light curves for sev-\neConf C091122\nFIG. 2: Crab light curve. Horizontal scale is in modified Julian days over the 490 day GBM exposure period. Vertical scale is in photons/cm 2 /sec/keV averaged over daily intervals. Horizontal lines show the average flux in each of five energy bands increasing from top to bottom\neral sources over the same time intervals in ref. [2], where it is seen that the results measured by the two instruments compare well. At energies above the upper energy limit of ∼ 195 keV of the Swift 22-month catalog [6], however, the GBM observations provide the only wide-field monitor available of the low energy gamma ray sky.", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0955.pdf" + }, + { + "text": "A. Steady Sources\n1E 1740-29 (Fig. 6) is a LMXB very near the Galactic Center. It is a microquasar, and spends most of its time in the low/hard state. Integral observations indicate the presence of a power law tail above 200 keV [13]. The present GBM results are consistent with this high energy emission. In the future, we\neConf C091122\nFIG. 4: Cyg X-1 light curve. Horizontal scale is in modified Julian days.\nFIG. 5: GRS 1915+105 light curve. Horizontal scale is in modified Julian days.\n4\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\nTABLE I: Fluxes and Significance in High Energy Bands", + "page_start": 2, + "page_end": 3, + "source_file": "1001.0955.pdf" + }, + { + "text": "II. GBM AND THE EARTH OCCULTATION OBSERVATIONAL TECHNIQUE\nThe shape of the individual occultation steps depends on energy and occultation angle. Transmission as a function of time is modeled as T ( t ) = exp [ -µ ( E ) A ( h )], where µ ( E ) is the mass attenuation coefficient of gamma rays at energy E in air and A ( h ) is the air mass along the line of sight at a given altitude h ( t ). Account is taken of the detector response as it changes as a function of angle across the fit window. For each source, occultation times are predicted. Each step is fit over a 4-minute window along with a quadratic background and using an assumed spectrum to determine the detector count rate due to the source. The instrument response is used to convert the count rate to a flux. Up to 31 steps are possible for a given source in a day, and these steps are summed to get a single daily average flux. The GBM occultation sensitivity exceeds that of BATSE at energies below ∼ 25 keV and above ∼ 1 . 5 MeV [5].\nThis work uses the GBM CTIME data, with its 8 broad energy channels and 0.256-second resolution, rebinned to 2-second resolution. The occultation technique relies on an input catalog of known sources. Currently, we are monitoring 64 sources. Of these 64 sources, 6 steady sources are detected above 100 keV with a significance of at least 5 σ after ∼ 490 days of observations, and one transient source.", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0955.pdf" + }, + { + "text": "5.1. Recent VERITAS Blazar Discoveries\n( ∼ 5.5 σ ; 3% Crab flux above 300 GeV; Γ VHE ∼ 2 . 7) during VERITAS observations from December 2008 to March 2009. The initial announcement of the VHE discovery [19] led to its discovery above 1 GeV in the Fermi-LAT data using a special analysis. RBS 0413, a relatively distant HBL (z=0.19), was observed for 16 h good-quality live time in 2008-09 2 . These data resulted in the discovery of VHE gamma-rays ( > 270 γ , ∼ 6 σ ) at a flux ( > 200 GeV) of ∼ 2% of the Crab Nebula flux. The discovery [20] was announced simultaneously with the LAT MeV-GeV detection. The VHE and other MWL observations, including Fermi-LAT data, for each of these three sources will be the subject of a joint publication involving both the VERITAS and LAT collaborations.", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0770.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed3.pdf", + "query": "When in present-day Poland did the first shift away from earlier ancestry occur?", + "target_page": 3, + "target_passage": "in the Middle to Late Bronze Age (1500 bce to 1000 bce), we observe a clear shift away from preceding ancestry originally associated with Corded Ware cultures", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "Article\nFig. 3 | Time transects across six geographical regions in Europe.\na -f , Ancestry change visualized over a time transect spanning from the Bronze Age to the present day in Poland ( a ), southeastern Europe ( b ), central Europe ( c ), Italy ( d ), Britain and Ireland ( e ) and Scandinavia ( f ). The maps show sample locations of all available ancient genomes with at least 0.5× coverage from\nmedieval individuals ( P ≪ 1 × 10 -32 ). Instead, the majority of individuals from medieval Poland can be modelled only as a mixture of ancestries related to Roman Iron Age Lithuania, which is similar to ancestries of individuals from middle to late Bronze Age Poland (44%, 95% confidence interval 36-51%), an ancestry component related to Hungarian Scythians or Slovakian La Tène individuals (49%, 95% confidence interval 41-57%) and potentially a minority component of ancestry related to Sarmatians from the Caucasus ( P = 0.13) (Fig. 2c). Four out of twelve individuals from medieval Poland, three of whom are from the late Viking Age 6 , carried detectable Scandinavian-related ancestry. Some of the ancestry detected in individuals from later medieval Poland may have persisted during the late first millennium CE in the cremating portion of the population, but regardless, this points to large-scale ancestry transformation in medieval Poland (Fig. 3a). Future data could shed light on the extent to which this reflects the influence of groups speaking Slavic languages in the region.\n122\n| Nature | Vol 637 | 2 January 2025\nthese regions (Supplementary Table 1). Their ancestry is shown on the same MDS model as in Fig. 2a for each time period. For each geographic region, the early medieval period is highlighted in orange and the area in the MDS corresponding to Scandinavian and central European ancestries is highlighted in an orange box.", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed3.pdf" + }, + { + "text": "Expansions of Scandinavian-like ancestry\nWe assembled time transects using available aDNA data across several geographical regions in Europe, and infer their ancestry using a model with the EIA or Roman Iron Age sources previously defined (shown in Fig. 2a). Our modelling provides direct evidence of individuals with ancestry originating in northern Germany or Scandinavia appearing across Europe as early as the first century CE (Figs. 2b,c and 3 and Supplementary Table 3).\nIn the region of present-day Poland, our analysis suggests several clear shifts in ancestry. First, in the Middle to Late Bronze Age (1500 BCE to 1000 BCE), we observe a clear shift away from preceding ancestry originally associated with Corded Ware cultures 55 (Fig. 3a). Second, in the first to fifth century CE, individuals associated with Wielbark culture 5,12 show an additional strong shift away from the preceding Bronze Age groups, and can only be modelled with a >75% component attributed to the EIA Scandinavian Peninsula. Multiple individuals, especially from earlier Wielbark cemeteries, have approximately 100%\nFig. 2 | Ancestry from the Iron Age to the early medieval period in Europe.\na , Source groups used for qpAdm modelling of early medieval Europe. MDS is computed jointly with individuals from later periods using pairwise outgroup f 3 statistics (outgroup: Han Chinese people). These are calculated using Twigstats on Relate genealogies with a cut-off of 1,000 generations. The geographical map shows sampling locations of these individuals. b , The genetic structure of ancient groups predominantly from early medieval contexts shown on the same MDS as in a . The magnified inset shows an MDS computed without Twigstats on the same samples as the Twigstats MDS and focusing on early medieval or later individuals. c , Ancestry models of early medieval (EM) groups across Europe computed using qpAdm. Sample sizes are", + "page_start": 2, + "page_end": 3, + "source_file": "pubmed3.pdf" + }, + { + "text": "High-resolution genomic history of early medieval Europe\nAncient genome sequencing has revolutionized our ability to reconstruct expansions, migrations and admixture events in the ancient past and understand their impact on human genetic variation today. However, tracing history using genetic ancestry has remained challenging, particularly in historical periods for which the richest comparative information from history and archaeology often exists. This is because ancestries in many geographical regions are often so similar as to be statistically indistinguishable with current approaches. One example is northern and central Europe since the start of the Iron Age around 500 BCE, a period for which many long-standing questions remain, such as the nature of large-scale patterns of human migration during the fourth to sixth centuries CE, their impact on the Mediterranean world and later patterns of human mobility during the Viking Age (around 750-1050 CE).\nSeveral recent studies have documented substantial mobility and genetic diversity in these time periods, suggesting stable population structure despite high mobility 5 , and have revealed genetic variation in Viking Age Scandinavia 6-8 , early medieval England 3,9 , early medieval Hungary 10,11 and Iron Age and medieval Poland 12 . However, previous studies mostly used large modern cohorts to study ancestry change through time and space. This is because the differentiation between Iron Age groups in central and northern Europe is an order of magnitude lower (fixation index ( F ST) = 0.1-0.7%; Extended Data Fig. 1) than, for example, the more commonly studied hunter-gatherer, early farmer and steppe-pastoralist groups that shaped the ancestry landscape of\nStone Age and Bronze Age Europe 13-16 ( F ST = 5-9% (refs. 13,17)). Modern populations provide more power to detect differences, but their genetic affinity to ancient individuals may be confounded by later gene flow, that is, after the time of the ancient individual(s) 18 . The most principled approach is thus to build ancestry models in which source and 'outgroup/reference' populations are older than, or at least contemporary with, the target genome or group that we are trying to model 18 . However, this has been challenging, due to the limited statistical power offered by the thousands-fold lower sample sizes and reduced sequence quality of ancient genomes.", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed3.pdf" + }, + { + "text": "Influx into pre-Viking Age Scandinavia\nIn EIA Scandinavia (<500 CE), we find evidence for broad genetic homogeneity. Specifically, individuals from Denmark (100 CE-300 CE) were indistinguishable from contemporary people in the Scandinavian Peninsula (Fig. 2c). However, we observe a clear shift in genetic ancestry already in the eighth century CE (Late Iron Age/early Viking Age) on Zealand (present-day Denmark) for which a 100% EIA ancestry model is rejected ( P = 1 × 10 -17 using Twigstats; P = 7.5 × 10 -4 without). This shift in ancestry persists among later Viking Age groups in Denmark, where all groups are modelled with varying proportions of ancestry related to Iron Age continental groups in central Europe (Figs. 3f and 4c). A non-parametric MDS of Viking Age individuals suggests that variation between individuals forms a cline spanning from the EIA Scandinavian Peninsula individuals to ancestry characteristic of central Europe (Fig. 4e). The observed shift in ancestry in Denmark cannot be confounded by potentially earlier unknown gene flow into Iron Age source groups in Austria, France and Germany, but such gene flow could affect the exact ancestry proportions.\nThese patterns are consistent with northward expansion of ancestry, potentially starting before the Viking Age, into the Jutland peninsula and Zealand island towards southern Sweden. The geographical origin of this ancestry is currently difficult to discern, as the available samples from Iron Age central Europe remain sparse. The timing of this expansion is constrained only by the samples available: this ancestry is not observed in individuals from the Copenhagen area of Denmark (around 100 CE-300 CE) 6 , an individual from the southern tip of Sweden (around 500 CE) 16 , individuals from the Sandby Borg massacre site on Öland in present-day Sweden (around 500 CE) 7 and 31 individuals from the mid-eighth century Salme ship burials in present-day Estonia (Extended Data Fig. 9), who probably originated in central Sweden 6 . Therefore, this ancestry transformation most likely postdated these individuals in each particular region and mostly occurred in the second half of the first millennium CE.", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed3.pdf" + }, + { + "text": "Article\nIn southern Germany, the genetic ancestry of individuals from early medieval Bavaria probably associated with the historical Germanic-language-speaking Baiuvarii 59 cannot be modelled as deriving ancestry solely from earlier groups in Iron Age central Germany ( P ≪ 1 × 10 -36 ). The Baiuvarii probably appeared in the region in the fifth century CE 59 , but their origins remain unresolved. Our current best model indicates a mixture with ancestry derived from EIA Peninsular Scandinavia and central Europe, suggesting an expansion of Scandinavian-related ancestry producing a regional ancestry shift (Figs. 2c and 3c).\nIn Italy, southward expansions of northern and central European ancestries appear by the Late Antiquity (approximately fourth century CE), where a clear diversification of ancestry can be observed compared with preceding time periods (Fig. 3d). However, no individuals with near 100% Scandinavian ancestry can be observed in the sampling data available so far.\nIn Britain, the ancestries of Iron Age and Roman individuals form a tight cluster in our MDS analysis (Fig. 3e), shifted relative to available preceding Bronze Age individuals from Ireland and Orkney, and adjacent to, but distinct from, available individuals in Iron Age and Roman central Europe. However, two first- to second-century CE burials from a Roman military fortress site in Austria (Klosterneuburg) 5 carry ancestry that is currently indistinguishable from Iron Age or Roman populations of Britain, to the exclusion of other groups (qpWave cladality P = 0.11). One option is that they had ancestry from Britain; alternatively, currently unsampled populations from western continental Europe carried ancestries similar to Iron Age southern Britain.", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed3.pdf" + }, + { + "text": "High-resolution genomic history of early medieval Europe\nhttps://doi.org/10.1038/s41586-024-08275-2\nReceived: 14 December 2023\nAccepted: 23 October 2024\nPublished online: 1 January 2025\nOpen access\nLeo Speidel 1,2,3 ✉ , Marina Silva 1 , Thomas Booth 1 , Ben Raffield 4 , Kyriaki Anastasiadou 1 , Christopher Barrington 5 , Anders Götherström 6,7 , Peter Heather 8 & Pontus Skoglund 1 ✉\nMany known and unknown historical events have remained below detection thresholds of genetic studies because subtle ancestry changes are challenging to reconstruct. Methods based on shared haplotypes 1,2 and rare variants 3,4 improve power but are not explicitly temporal and have not been possible to adopt in unbiased ancestry models. Here we develop Twigstats, an approach of time-strati/fied ancestry analysis that can improve statistical power by an order of magnitude by focusing on coalescences in recent times, while remaining unbiased by population-speci/fic drift. We apply this framework to 1,556 available ancient whole genomes from Europe in the historical period. We are able to model individual-level ancestry using preceding genomes to provide high resolution. During the /first half of the /first millennium CE, we observe at least two di/fferent streams of Scandinavian-related ancestry expanding across western, central and eastern Europe. By contrast, during the second half of the /first millennium CE, ancestry patterns suggest the regional disappearance or substantial admixture of these ancestries. In Scandinavia, we document a major ancestry in/flux by approximately 800 CE, when a large proportion of Viking Age individuals carried ancestry from groups related to central Europe not seen in individuals from the early Iron Age. Our /findings suggest that time-strati/fied ancestry analysis can provide a higher-resolution lens for genetic history.\nCheck for updates", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed3.pdf" + }, + { + "text": "Article\nIn present-day Slovakia, individuals associated with the Iron Age La Tène period appear close to Hungarian Scythians in the two dimensions of our MDS analysis, and are modelled as a mixture of central and eastern European ancestry. However, a first-century CE burial of a 50-60-year-old woman from Zohor is modelled only with Scandinavian-related ancestry, providing evidence of ancestry related to the Scandinavian EIA appearing southwest of the range of the Wielbark archaeological complex 5,57 (Fig. 3b). Later early medieval individuals from Slovakia have partial Scandinavian-related ancestry, providing evidence for the integration between expanding and local groups.\nNearby, in present-day Hungary, we observe Scandinavian-related ancestry components in several burials dating to the sixth century CE associated with Longobards (Longobard_earlyMED(I)) 10 (Fig. 2c). This is consistent with the original study 10 , which reported affinity to present-day groups from northwestern Europe (GBR, CEU and FIN in the 1000 Genomes Project (1000GP)) 10 but which we can resolve with\nhigher resolution using earlier genomes. Several other individuals from these Longobard burials (Longobard_earlyMED(II)) show no detectable ancestry from northern Europe and, instead, are more closely related to Iron Age groups in continental central Europe, putatively representing descendants of local people buried in a Longobard style. Our results are consistent with attestations that the Longobards originated in the areas of present-day northern Germany or Denmark, but that by the sixth century CE they incorporated multiple different cultural identities, and mixed ancestries. Present-day populations of Hungary do not appear to derive detectable ancestry from early medieval individuals from Longobard contexts, and are instead more similar to Scythian-related ancestry sources (Extended Data Fig. 6), consistent with the later impact of Avars, Magyars and other eastern groups 58 .", + "page_start": 4, + "page_end": 5, + "source_file": "pubmed3.pdf" + }, + { + "text": "Conclusions\nOur approach, Twigstats, transfers the power advantage of haplotypebased approaches to a fully temporal framework, which is applicable to f -statistics and enables previously unavailable unbiased and time-stratified analyses of admixture. We demonstrated that Twigstats enables fine-scale quantitative modelling of ancestry proportions, revealing wide-ranging ancestry changes that affect northern and central Europe during the Iron, Roman and Viking ages. We reveal evidence of the southward and/or eastward expansion of individuals who probably spoke Germanic languages and who had Scandinavian-related ancestry in the first half of the first millennium CE. We note that 'Scandinavian-related' in this context relates to the ancient genomes available, and so it is entirely possible that these processes were driven, for example, from regions in northern-central Europe. This could be consistent with the attraction of the greater wealth, which tended to build up among Rome's immediate neighbours and may have played a major role in vectors of migration internal to communities in Europe who lived beyond the Roman frontier 52 . Later, patterns of gene flow seem to have turned northwards, with the spread of Iron Age Central Europe-related ancestry into Scandinavia. Overall, our approach can be used for the reconstruction of new high-resolution genetic histories around the world.", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed3.pdf" + }, + { + "text": "Article\nTwigstats substantially improves models of admixture between ancestries from Iron Age Britain and northern Europe in early medieval England 9 , halving standard errors from 9% with SNPs to 4% when using time stratification (point estimates 80% and 79% Iron Age Britain-related ancestry, respectively). We used this improved resolution to demonstrate that an earlier Roman individual (6DT3) dating to approximately second to fourth century CE from the purported gladiator or military cemetery at Driffield Terrace in York (Roman Eboracum ), England 60 , who was previously identified as an ancestry outlier 61,62 , specifically carried approximately 25% EIA Scandinavian Peninsula-related ancestry (Fig. 2c). This documents that people with Scandinavian-related ancestry already were in Britain before the fifth century CE, after which there was a substantial influx associated with Anglo-Saxon migrations 9 . Although it is uncertain whether this individual was a gladiator or soldier, individuals and groups from northern Europe are indeed recorded in Roman sources both as soldiers and as enslaved gladiators 63,64 .\nAcross Europe, we see regional differences in the southeastern and southwestern expansions of Scandinavian-related ancestries. Early medieval groups from present-day Poland and Slovakia carry specific ancestry from one of the Scandinavian EIA groups-the one with individuals primarily from the northern parts of Scandinavia in the EIA-with no evidence of ancestry related to the other primary group in more southern Scandinavia (Fig. 2d). By contrast, in southern and western Europe, Scandinavian-related ancestry either derives from\nEIA southern Scandinavia-as in the cases of the probable Baiuvarii in Germany, Longobard-associated burials in Italy and early medieval burials in southern Britain-or cannot be resolved to a specific region in Scandinavia. If these expansions are indeed linked to language, this pattern is remarkably concordant with the main branches of Germanic languages, with the now-extinct eastern Germanic spoken by Goths in Ukraine on the one hand, and western Germanic languages such as Old English and Old High German recorded in the early medieval period on the other hand.", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed3.pdf" + }, + { + "text": "Expansions of Scandinavian-like ancestry\nshown in black boxes. Sources are highlighted in a and marked as bold in the key, and were used in a rotational qpAdm scheme. For each target group, we remove models with infeasible admixture proportions (falling outside [0, 1]) and use a Twigstats cut-off of 1,000 generations. All models satisfy P > 0.01, unless a -log10[ P value] is shown next to the model. If models satisfy P > 0.05, we show all such models; otherwise, we show only the model with the largest P value. d , The ancestry proportion derived from EIA Scandinavia in groups with a non-zero component of this ancestry. We show groups modelled in c that have a feasible model ( P > 0.01). In c , d , we show one s.e. BA, Bronze Age; CNE, continental northern Europeans; EBA, early Bronze Age; EVA, early Viking Age; IA, Iron Age; MED, medieval; MLBA, middle/late Bronze Age; VA, Viking Age.\nancestry related to EIA Scandinavian Peninsula (Fig. 2c). The Wielbark archaeological complex has been linked to the later Chernyakhov culture to the southeast and to early Goths, an historical Germanic group that flourished in the second to fifth centuries CE 56 . Our modelling supports the idea that some groups that probably spoke Germanic languages from Scandinavia expanded south across the Baltic into the area between the Oder and Vistula rivers in the early centuries CE, although whether these expansions can be linked specifically with historical Goths is still debatable. Moreover, since a considerable\nproportion of Wielbark burials during this period were cremations, the possible presence of individuals with other ancestries cannot be strictly rejected if they were exclusively cremated (and are therefore invisible in the aDNA record).\nA previous study could not reject continuity in ancestry from the Wielbark-associated individuals to later medieval individuals from a similar region 12 . With the improved power of Twigstats, models of continuity are strongly rejected, with no one-source model of any preceding Iron Age or Bronze Age group providing a reasonable fit for the\nNature | Vol 637 | 2 January 2025 |\n121", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed3.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed3.pdf", + "query": "How many clusters has the Scandinavian peninsula been divided into thanks to Twigstats?", + "target_page": 12, + "target_passage": "This approach results in two clusters in the Scandinavian Penin- sula, approximately separating northern from southern Scandinavia", + "chunk_present": { + "presence": true, + "index": 3 + } + }, + "top_chunk": [ + { + "text": "Conclusions\nOur approach, Twigstats, transfers the power advantage of haplotypebased approaches to a fully temporal framework, which is applicable to f -statistics and enables previously unavailable unbiased and time-stratified analyses of admixture. We demonstrated that Twigstats enables fine-scale quantitative modelling of ancestry proportions, revealing wide-ranging ancestry changes that affect northern and central Europe during the Iron, Roman and Viking ages. We reveal evidence of the southward and/or eastward expansion of individuals who probably spoke Germanic languages and who had Scandinavian-related ancestry in the first half of the first millennium CE. We note that 'Scandinavian-related' in this context relates to the ancient genomes available, and so it is entirely possible that these processes were driven, for example, from regions in northern-central Europe. This could be consistent with the attraction of the greater wealth, which tended to build up among Rome's immediate neighbours and may have played a major role in vectors of migration internal to communities in Europe who lived beyond the Roman frontier 52 . Later, patterns of gene flow seem to have turned northwards, with the spread of Iron Age Central Europe-related ancestry into Scandinavia. Overall, our approach can be used for the reconstruction of new high-resolution genetic histories around the world.", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed3.pdf" + }, + { + "text": "Influx into pre-Viking Age Scandinavia\nTo assess the full extent of the impact of this ancestry influx into Scandinavia, we next aimed to understand the ancestry of individuals in Scandinavia during the Viking Age. Previous studies have suggested that there was a diversity of ancestries in Scandinavia during this period 6,7,65 , due to increased maritime mobility, but have not reported per-individual ancestry estimates based on preceding ancestry. We analysed each individual's ancestry using a rotational qpAdm scheme (Fig. 4a, Extended Data Fig. 9 and Supplementary Table 4), which showed increased power in distinguishing models when restricted to recent coalescences with Twigstats (more than 80% of accepted one-source models in Twigstats were also accepted one-source models using all SNPs, compared with less than 17% for the inverse).\nWe investigated regional differences in non-local ancestry across Scandinavia. In Denmark, 25 out of 53 Viking Age individuals had detectable ( zscore > 1) central European-related ancestry (CentralEurope. IronRoman or Portugal.IronRoman) in their best accepted qpAdm models. In Sweden 20 out of 62 individuals had detectable central European-related ancestry, concentrated almost entirely in southern regions (Fig. 4a,d). By contrast, in Norway, this ancestry was observed in only 2 out of 24 individuals, indicating a wide-ranging impact of incoming ancestry in southern Scandinavia and suggesting more\nNature | Vol 637 | 2 January 2025 |\n123", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed3.pdf" + }, + { + "text": "Ancestry models of early medieval Europe\nWe additionally perform non-parametric multidimensional scaling (MDS) on outgroupf 3 statistics 44 computed using Twigstats, the results of which do not depend on any modelling assumptions and which show increased resolution compared with conventional outgroupf 3 statistics (Fig. 2a,b, Extended Data Fig. 6 and Supplementary Table 2). Encouragingly, the MDS model supports regional fine-scale genetic structures reflected in our source groups, such as the separation of predominantly Norwegian and northern Swedish EIA individuals from southern Peninsular Scandinavia (Fig. 2a); this relationship is not detected without Twigstats. In this MDS analysis, we note a close affinity of wide-ranging individuals from Portugal, France, Germany, Austria and Britain. We hypothesize that this corresponds to areas associated with the Celtic-speaking world, and that their close genetic affinity is due to earlier expansions. Sparse sampling limits our understanding of the full extent of regional ancestry variation in central Europe and some other regions, but the continental ancestries differentiated in the MDS model suggests that major ancestry variation across Europe in this period is relatively well captured.", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed3.pdf" + }, + { + "text": "Article\nClustering using qpwave. To overcome challenges with hand-curating source groups used in qpAdm modelling, we follow ref. 5 and run qpwave using Twigstats between pairs of ancient individuals. We use Han Chinese individuals from Beijing and five European populations from the 1000GP as reference groups. This approach tests whether two\nindividuals form a clade with respect to reference groups. The reason why this is a principled approach despite the 1000GP groups post-dating the ancient individuals is that if a group of ancient individuals are truly homogeneous, they will be so also with respect to later individuals.\nWe then define clusters by running UPGMA (unweighted pair group method with arithmetic mean) on -log10[ P values] obtained from qpwave between all pairs of individuals and cut the resulting dendrogram at a height corresponding to a P value of 0.01. We then further subdivide clusters by requiring all samples to be within 500 years of the mean cluster age.\nTo choose the source groups shown in Fig. 2a and Extended Data Fig. 1d, we run this algorithm on samples from Iron and Roman Age Europe (Supplementary Table 1). We retain groups that have at least three individuals and, therefore, exclude clusters of size one or two.\nThis approach results in two clusters in the Scandinavian Peninsula, approximately separating northern from southern Scandinavia, three clusters in Poland and Ukraine that separate samples temporally between the early and later Bronze Age, a cluster combining the Hungarian Scythian and Slovakian La Tène-associated individuals, and a cluster each for Iron and Roman Age Portugal, Italy and Lithuania. In present-day Austria, Germany and France, this approach identifies three clusters, with each cluster spanning multiple archaeological sites in different countries, indicating genetic diversity in this region in the first millennium CE. Encouragingly, these clusters separate in our non-parametric MDS analysis (Fig. 2a), indicating that we are capturing real genetic differences between groups using this approach.", + "page_start": 10, + "page_end": 11, + "source_file": "pubmed3.pdf" + }, + { + "text": "Extended Data Fig. 9 | Ancestry models of Viking Age individuals in\nScandinavia. a , MDS of each Scandinavian Viking group plotted on top of preceding Iron age and Roman individuals. b , All accepted qpAdm models using Twigstats-1000 for every Scandinavian Viking individual in Denmark, Sweden, and Norway, computed in a rotational qpAdm with source groups identical to Fig. 4. We only retain models with feasible admixture proportions, standard errors of <0.25, and show models with 1 source and a p-value greater than 0.01\nor otherwise with 2 sources and a p-value greater than 0.01. If several models satisfy p > 0.05, we show all such models, otherwise we select the model with the largest p-value. The -log10 p-values are shown to the left of each model. We combine models involving related sources, if they exist, by averaging their respective admixture proportions, standard errors, and p-values. We plot one standard error.", + "page_start": 20, + "page_end": 20, + "source_file": "pubmed3.pdf" + }, + { + "text": "High-resolution genomic history of early medieval Europe\nFig. 1 | Twigstats performance on simulated data. a , A diagram of the Twigstats approach. We first construct genealogies from genetic variation data and then use Twigstats to compute f 2-statistics between pairs of groups to be used by ADMIXTOOLS2. b , Admixture proportions inferred from an f 4-ratio statistic or non-negative least squares method. Source groups P1 and P2 split 250 generations ago and mix 50 generations ago, where P2 contributes proportion α and P1 contributes 1 α . Effective population sizes are equal and constant except for a recent bottleneck in P2 (see Methods for simulation details). The Twigstats cut-off is set to 500 generations, the rare variant cut-off is set to 5%, and we additionally infer admixture proportions by generating 'first coalescence profiles' for each population and modelling PX as a mixture\nof sources P1 and P2 using non-negative least squares (NNLS) (Methods). We sample 20 haploid sequences from each population. Data are mean ± 2 s.e. around the point estimate. c , The fold improvement of s.e. relative to the genotype case as a function of the Twigstats cut-off time, for the same simulation as in b and averaged across different true admixture proportions. The dashed line shows the best fold improvement of s.e. when ascertaining genotypes by frequency, when evaluated at different frequency cut-offs. d , The optimal Twigstats cut-off, defined as the largest reduction in s.e. relative to the genotype case, as a function of source split time in simulations using true trees. The dashed line indicates our theoretical prediction (Supplementary Note).\nsingle-nucleotide polymorphism (SNP) markers, but this information has not been accessible in combination with the advantages of f -statistics 2,6,25,26 . Furthermore, the overwhelming majority of available aDNA is from a panel of 1.2 million SNPs 27 , and few clear advantages have been demonstrated for analysis of the more than 50 million SNPs available with whole-genome shotgun data.", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed3.pdf" + }, + { + "text": "Ancestry models of early medieval Europe\nHaving demonstrated that the Twigstats approach can effectively improve resolution and statistical power to test ancestry models and estimate proportions, we turn to the history of early medieval Europe.\n120\n| Nature | Vol 637 | 2 January 2025\nIn the first half of the first millennium CE, Roman historians such as Tacitus and Ammianus Marcellinus described the geographical distribution and movements of groups beyond the imperial frontier and suggested a potential role for them in the fall of the western Roman Empire 52 . However, the exact nature and scale of these historically attested demographic phenomena-and their genetic impacthave been questioned 53 , and have been difficult to test with genetic approaches owing to the close relations shared between many groups that were ostensibly involved. Less is understood at further distances from the Roman frontier owing to a lack of historical accounts. The improved statistical power of time-restricted ancestry in Twigstats thus offers an opportunity to revisit these questions.\nTo develop an ancestry model for early medieval individuals (Supplementary Table 1), we first need a broad characterization of the ancestry of the earlier sources from the early Iron Age (EIA) and Roman periods. We use hierarchical UPGMA clustering based on pairwise clade testing between all individuals, and formally test the cladality of proposed ancestry groups with qpWave 5 (cladality in this sense means whether they are consistent with being symmetrically related to all other tested groups; Methods). This resulted in a set of model ancestry sources that included Iron Age and Roman Britain ( n = 11), the Iron Age of central European regions of mostly Germany, Austria and France ( n = 10), Roman Portugal ( n = 4), Roman Italy ( n = 10), Iron Age Lithuania ( n = 5), the EIA Scandinavian Peninsula (Sweden and Norway, n = 10) and several other more eastern groups dating to the Bronze Age and EIA ( n = 25) (Fig. 2a and Extended Data Fig. 1). We then use a rotational qpAdm approach 54 to narrow down the set of contributing sources from this larger pool of putative sources.", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed3.pdf" + }, + { + "text": "Expansions of Scandinavian-like ancestry\nshown in black boxes. Sources are highlighted in a and marked as bold in the key, and were used in a rotational qpAdm scheme. For each target group, we remove models with infeasible admixture proportions (falling outside [0, 1]) and use a Twigstats cut-off of 1,000 generations. All models satisfy P > 0.01, unless a -log10[ P value] is shown next to the model. If models satisfy P > 0.05, we show all such models; otherwise, we show only the model with the largest P value. d , The ancestry proportion derived from EIA Scandinavia in groups with a non-zero component of this ancestry. We show groups modelled in c that have a feasible model ( P > 0.01). In c , d , we show one s.e. BA, Bronze Age; CNE, continental northern Europeans; EBA, early Bronze Age; EVA, early Viking Age; IA, Iron Age; MED, medieval; MLBA, middle/late Bronze Age; VA, Viking Age.\nancestry related to EIA Scandinavian Peninsula (Fig. 2c). The Wielbark archaeological complex has been linked to the later Chernyakhov culture to the southeast and to early Goths, an historical Germanic group that flourished in the second to fifth centuries CE 56 . Our modelling supports the idea that some groups that probably spoke Germanic languages from Scandinavia expanded south across the Baltic into the area between the Oder and Vistula rivers in the early centuries CE, although whether these expansions can be linked specifically with historical Goths is still debatable. Moreover, since a considerable\nproportion of Wielbark burials during this period were cremations, the possible presence of individuals with other ancestries cannot be strictly rejected if they were exclusively cremated (and are therefore invisible in the aDNA record).\nA previous study could not reject continuity in ancestry from the Wielbark-associated individuals to later medieval individuals from a similar region 12 . With the improved power of Twigstats, models of continuity are strongly rejected, with no one-source model of any preceding Iron Age or Bronze Age group providing a reasonable fit for the\nNature | Vol 637 | 2 January 2025 |\n121", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed3.pdf" + }, + { + "text": "Extended Data Fig. 10 | Ancestry models of farflung Viking individuals.\na , MDS of each farflung Viking group plotted on top of preceding Iron age and Roman individuals. b , All accepted qpAdm models using Twigstats-1000 for\nevery non-Scandinavian Viking individual computed in a rotational qpAdm with source groups identical to Fig. 4. We plot one standard error.", + "page_start": 21, + "page_end": 21, + "source_file": "pubmed3.pdf" + }, + { + "text": "Article\nFig. 4 | Ancestry in the Viking world. a , Map showing ancestry carried by Scandinavian Viking Age individuals as inferred using the best-fitting qpAdm model. These are chosen by either choosing the one-source model with largest P value and P > 0.01 or the two-source model with the largest P value and P > 0.01. Extended Data Fig. 7 shows the same map with all accepted models. b , Stable isotope data indicating the geology of childhood origin. The histogram shows the ratio of strontium isotopes 87 to 86 measured in 109 individuals in Öland 69 . For individuals included in our ancestry modelling, we plot Iron Age central European-related ancestry against their stable isotope values (grey circles, r = -0.39, P = 0.075). Shared area corresponds to the 95% confidence band\naround the regression line. c , The ancestry shift observed in Viking Age Danish groups using qpAdm on all SNPs or Twigstats. We show the best one-source and all two-source models with P > 0.05. For models with P < 0.05, the -log10[ P value] is shown under the plot. Sample sizes for each group are shown in brackets. d , The ancestry proportion across Viking Age individuals in Denmark, Sweden and Norway grouped by latitude. e , Viking Age genetic variation (grey circles) visualized on the same MDS as in Fig. 2a,b. f , The best-fitting qpAdm ancestry model for far-flung Viking individuals. Detailed models for all individuals are shown in Extended Data Figs. 9 and 10. In c and f , we show one s.e. Rotating qpAdm sources are marked in bold in the key.\ncontinuity from the EIA in Norway and northern Sweden (Fig. 4a). When considered collectively, the individuals who show evidence of central European-related ancestry are mostly observed in regions historically within the Danish sphere of influence and rule. Currently, no such individuals, for example, are noted in eastern central Sweden, which was a focus of regional power of the Svear (Fig. 4a). The difference in distribution could suggest that the central European-related ancestry was more common in regions dominated by the historical Götar and groups inhabiting the lands on the borders of the Danish kingdom.\nTo test the extent to which the variation in ancestry was consistent with mobility during the lifetime of the individuals or, alternatively,\n124", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed3.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed3.pdf", + "query": "What are the cultures with which the Wielbark culture is associated?", + "target_page": 4, + "target_passage": "linked to the later Chernyakhov cul- ture to the southeast and to early Goths", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Expansions of Scandinavian-like ancestry\nshown in black boxes. Sources are highlighted in a and marked as bold in the key, and were used in a rotational qpAdm scheme. For each target group, we remove models with infeasible admixture proportions (falling outside [0, 1]) and use a Twigstats cut-off of 1,000 generations. All models satisfy P > 0.01, unless a -log10[ P value] is shown next to the model. If models satisfy P > 0.05, we show all such models; otherwise, we show only the model with the largest P value. d , The ancestry proportion derived from EIA Scandinavia in groups with a non-zero component of this ancestry. We show groups modelled in c that have a feasible model ( P > 0.01). In c , d , we show one s.e. BA, Bronze Age; CNE, continental northern Europeans; EBA, early Bronze Age; EVA, early Viking Age; IA, Iron Age; MED, medieval; MLBA, middle/late Bronze Age; VA, Viking Age.\nancestry related to EIA Scandinavian Peninsula (Fig. 2c). The Wielbark archaeological complex has been linked to the later Chernyakhov culture to the southeast and to early Goths, an historical Germanic group that flourished in the second to fifth centuries CE 56 . Our modelling supports the idea that some groups that probably spoke Germanic languages from Scandinavia expanded south across the Baltic into the area between the Oder and Vistula rivers in the early centuries CE, although whether these expansions can be linked specifically with historical Goths is still debatable. Moreover, since a considerable\nproportion of Wielbark burials during this period were cremations, the possible presence of individuals with other ancestries cannot be strictly rejected if they were exclusively cremated (and are therefore invisible in the aDNA record).\nA previous study could not reject continuity in ancestry from the Wielbark-associated individuals to later medieval individuals from a similar region 12 . With the improved power of Twigstats, models of continuity are strongly rejected, with no one-source model of any preceding Iron Age or Bronze Age group providing a reasonable fit for the\nNature | Vol 637 | 2 January 2025 |\n121", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed3.pdf" + }, + { + "text": "Article\nIn present-day Slovakia, individuals associated with the Iron Age La Tène period appear close to Hungarian Scythians in the two dimensions of our MDS analysis, and are modelled as a mixture of central and eastern European ancestry. However, a first-century CE burial of a 50-60-year-old woman from Zohor is modelled only with Scandinavian-related ancestry, providing evidence of ancestry related to the Scandinavian EIA appearing southwest of the range of the Wielbark archaeological complex 5,57 (Fig. 3b). Later early medieval individuals from Slovakia have partial Scandinavian-related ancestry, providing evidence for the integration between expanding and local groups.\nNearby, in present-day Hungary, we observe Scandinavian-related ancestry components in several burials dating to the sixth century CE associated with Longobards (Longobard_earlyMED(I)) 10 (Fig. 2c). This is consistent with the original study 10 , which reported affinity to present-day groups from northwestern Europe (GBR, CEU and FIN in the 1000 Genomes Project (1000GP)) 10 but which we can resolve with\nhigher resolution using earlier genomes. Several other individuals from these Longobard burials (Longobard_earlyMED(II)) show no detectable ancestry from northern Europe and, instead, are more closely related to Iron Age groups in continental central Europe, putatively representing descendants of local people buried in a Longobard style. Our results are consistent with attestations that the Longobards originated in the areas of present-day northern Germany or Denmark, but that by the sixth century CE they incorporated multiple different cultural identities, and mixed ancestries. Present-day populations of Hungary do not appear to derive detectable ancestry from early medieval individuals from Longobard contexts, and are instead more similar to Scythian-related ancestry sources (Extended Data Fig. 6), consistent with the later impact of Avars, Magyars and other eastern groups 58 .", + "page_start": 4, + "page_end": 5, + "source_file": "pubmed3.pdf" + }, + { + "text": "Expansions of Scandinavian-like ancestry\nWe assembled time transects using available aDNA data across several geographical regions in Europe, and infer their ancestry using a model with the EIA or Roman Iron Age sources previously defined (shown in Fig. 2a). Our modelling provides direct evidence of individuals with ancestry originating in northern Germany or Scandinavia appearing across Europe as early as the first century CE (Figs. 2b,c and 3 and Supplementary Table 3).\nIn the region of present-day Poland, our analysis suggests several clear shifts in ancestry. First, in the Middle to Late Bronze Age (1500 BCE to 1000 BCE), we observe a clear shift away from preceding ancestry originally associated with Corded Ware cultures 55 (Fig. 3a). Second, in the first to fifth century CE, individuals associated with Wielbark culture 5,12 show an additional strong shift away from the preceding Bronze Age groups, and can only be modelled with a >75% component attributed to the EIA Scandinavian Peninsula. Multiple individuals, especially from earlier Wielbark cemeteries, have approximately 100%\nFig. 2 | Ancestry from the Iron Age to the early medieval period in Europe.\na , Source groups used for qpAdm modelling of early medieval Europe. MDS is computed jointly with individuals from later periods using pairwise outgroup f 3 statistics (outgroup: Han Chinese people). These are calculated using Twigstats on Relate genealogies with a cut-off of 1,000 generations. The geographical map shows sampling locations of these individuals. b , The genetic structure of ancient groups predominantly from early medieval contexts shown on the same MDS as in a . The magnified inset shows an MDS computed without Twigstats on the same samples as the Twigstats MDS and focusing on early medieval or later individuals. c , Ancestry models of early medieval (EM) groups across Europe computed using qpAdm. Sample sizes are", + "page_start": 2, + "page_end": 3, + "source_file": "pubmed3.pdf" + }, + { + "text": "Article\nClustering using qpwave. To overcome challenges with hand-curating source groups used in qpAdm modelling, we follow ref. 5 and run qpwave using Twigstats between pairs of ancient individuals. We use Han Chinese individuals from Beijing and five European populations from the 1000GP as reference groups. This approach tests whether two\nindividuals form a clade with respect to reference groups. The reason why this is a principled approach despite the 1000GP groups post-dating the ancient individuals is that if a group of ancient individuals are truly homogeneous, they will be so also with respect to later individuals.\nWe then define clusters by running UPGMA (unweighted pair group method with arithmetic mean) on -log10[ P values] obtained from qpwave between all pairs of individuals and cut the resulting dendrogram at a height corresponding to a P value of 0.01. We then further subdivide clusters by requiring all samples to be within 500 years of the mean cluster age.\nTo choose the source groups shown in Fig. 2a and Extended Data Fig. 1d, we run this algorithm on samples from Iron and Roman Age Europe (Supplementary Table 1). We retain groups that have at least three individuals and, therefore, exclude clusters of size one or two.\nThis approach results in two clusters in the Scandinavian Peninsula, approximately separating northern from southern Scandinavia, three clusters in Poland and Ukraine that separate samples temporally between the early and later Bronze Age, a cluster combining the Hungarian Scythian and Slovakian La Tène-associated individuals, and a cluster each for Iron and Roman Age Portugal, Italy and Lithuania. In present-day Austria, Germany and France, this approach identifies three clusters, with each cluster spanning multiple archaeological sites in different countries, indicating genetic diversity in this region in the first millennium CE. Encouragingly, these clusters separate in our non-parametric MDS analysis (Fig. 2a), indicating that we are capturing real genetic differences between groups using this approach.", + "page_start": 10, + "page_end": 11, + "source_file": "pubmed3.pdf" + }, + { + "text": "Ancestry models of early medieval Europe\nWe additionally perform non-parametric multidimensional scaling (MDS) on outgroupf 3 statistics 44 computed using Twigstats, the results of which do not depend on any modelling assumptions and which show increased resolution compared with conventional outgroupf 3 statistics (Fig. 2a,b, Extended Data Fig. 6 and Supplementary Table 2). Encouragingly, the MDS model supports regional fine-scale genetic structures reflected in our source groups, such as the separation of predominantly Norwegian and northern Swedish EIA individuals from southern Peninsular Scandinavia (Fig. 2a); this relationship is not detected without Twigstats. In this MDS analysis, we note a close affinity of wide-ranging individuals from Portugal, France, Germany, Austria and Britain. We hypothesize that this corresponds to areas associated with the Celtic-speaking world, and that their close genetic affinity is due to earlier expansions. Sparse sampling limits our understanding of the full extent of regional ancestry variation in central Europe and some other regions, but the continental ancestries differentiated in the MDS model suggests that major ancestry variation across Europe in this period is relatively well captured.", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed3.pdf" + }, + { + "text": "Article\nIn southern Germany, the genetic ancestry of individuals from early medieval Bavaria probably associated with the historical Germanic-language-speaking Baiuvarii 59 cannot be modelled as deriving ancestry solely from earlier groups in Iron Age central Germany ( P ≪ 1 × 10 -36 ). The Baiuvarii probably appeared in the region in the fifth century CE 59 , but their origins remain unresolved. Our current best model indicates a mixture with ancestry derived from EIA Peninsular Scandinavia and central Europe, suggesting an expansion of Scandinavian-related ancestry producing a regional ancestry shift (Figs. 2c and 3c).\nIn Italy, southward expansions of northern and central European ancestries appear by the Late Antiquity (approximately fourth century CE), where a clear diversification of ancestry can be observed compared with preceding time periods (Fig. 3d). However, no individuals with near 100% Scandinavian ancestry can be observed in the sampling data available so far.\nIn Britain, the ancestries of Iron Age and Roman individuals form a tight cluster in our MDS analysis (Fig. 3e), shifted relative to available preceding Bronze Age individuals from Ireland and Orkney, and adjacent to, but distinct from, available individuals in Iron Age and Roman central Europe. However, two first- to second-century CE burials from a Roman military fortress site in Austria (Klosterneuburg) 5 carry ancestry that is currently indistinguishable from Iron Age or Roman populations of Britain, to the exclusion of other groups (qpWave cladality P = 0.11). One option is that they had ancestry from Britain; alternatively, currently unsampled populations from western continental Europe carried ancestries similar to Iron Age southern Britain.", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed3.pdf" + }, + { + "text": "Article\nFine-scale structure in Neolithic Europe. To quantify fine-scale structure in Neolithic Europe (Extended Data Fig. 5b), we aimed to select individuals in Neolithic Europe who have not yet been affected by the arrival of Steppe ancestry and do not show excess hunter-gatherer ancestry. We infer distal ancestry sources using Balkan_N, Yamnaya and Western Hunter-gatherers as source groups and reference groups according to a previously proposed qpAdm setup 46 (Supplementary Table 1). For this analysis, we infer ancestry using qpAdm applied to 1.2 million SNP sites of imputed genomes. We retain only Neolithic individuals with P > 0.01, z < 2 for Yamnaya ancestry, and z < 2 or proportion <0.25 for Western Hunter-gatherer ancestry.", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed3.pdf" + }, + { + "text": "Article\n53. Halsall, G. Barbarian Migrations and the Roman West, 376-568 (Cambridge Univ. Press, 2007).\n54. Skoglund, P. et al. Reconstructing prehistoric African population structure. Cell 171 , 59-71 (2017).\n55. Chyleński, M. et al. Patrilocality and hunter-gatherer-related ancestry of populations in East-Central Europe during the Middle Bronze Age. Nat. Commun. 14 , 4395 (2023).\n56. Heather, P. The Goths (Wiley-Blackwell, 1996).\n57. Elschek, K. in Grundprobleme. Thema: Macht des Goldes - Gold der Macht (Forschungen zu Spätantike und Mittelalter 2) (eds Hardt, M. & Heinrich-Tamáska, O.) 91-123 (Greiner, Bernhard A., 2013).\n58. Gnecchi-Ruscone, G. A., Szecsenyi-Nagy, A. & Koncz, I. Ancient genomes reveal origin and rapid trans-Eurasian migration of 7th century Avar elites. Cell 185 , 1402-1413 (2022).\n59. Veeramah, K. R. et al. Population genomic analysis of elongated skulls reveals extensive female-biased immigration in Early Medieval Bavaria. Proc. Natl Acad. Sci. USA 115 , 3494-3499 (2018).\n60. Martiniano, R. et al. Genomic signals of migration and continuity in Britain before the Anglo-Saxons. Nat. Commun. 7 , 10326 (2016).\n61. Schiffels, S. & Sayer, D. in Migration and Integration From Prehistory to the Middle Ages (eds Meller, H. et al.) Vol. 17, 255 (Tagungen des Landesmuseums für Vorgeschichte Halle, 2017).\n62. Morez, A. et al. Imputed genomes and haplotype-based analyses of the Picts of early medieval Scotland reveal fine-scale relatedness between Iron Age, early medieval and the modern people of the UK. PLoS Genet. 19 , e1010360 (2023).", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed3.pdf" + }, + { + "text": "Conclusions\nOur approach, Twigstats, transfers the power advantage of haplotypebased approaches to a fully temporal framework, which is applicable to f -statistics and enables previously unavailable unbiased and time-stratified analyses of admixture. We demonstrated that Twigstats enables fine-scale quantitative modelling of ancestry proportions, revealing wide-ranging ancestry changes that affect northern and central Europe during the Iron, Roman and Viking ages. We reveal evidence of the southward and/or eastward expansion of individuals who probably spoke Germanic languages and who had Scandinavian-related ancestry in the first half of the first millennium CE. We note that 'Scandinavian-related' in this context relates to the ancient genomes available, and so it is entirely possible that these processes were driven, for example, from regions in northern-central Europe. This could be consistent with the attraction of the greater wealth, which tended to build up among Rome's immediate neighbours and may have played a major role in vectors of migration internal to communities in Europe who lived beyond the Roman frontier 52 . Later, patterns of gene flow seem to have turned northwards, with the spread of Iron Age Central Europe-related ancestry into Scandinavia. Overall, our approach can be used for the reconstruction of new high-resolution genetic histories around the world.", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed3.pdf" + }, + { + "text": "Article\nFig. 3 | Time transects across six geographical regions in Europe.\na -f , Ancestry change visualized over a time transect spanning from the Bronze Age to the present day in Poland ( a ), southeastern Europe ( b ), central Europe ( c ), Italy ( d ), Britain and Ireland ( e ) and Scandinavia ( f ). The maps show sample locations of all available ancient genomes with at least 0.5× coverage from\nmedieval individuals ( P ≪ 1 × 10 -32 ). Instead, the majority of individuals from medieval Poland can be modelled only as a mixture of ancestries related to Roman Iron Age Lithuania, which is similar to ancestries of individuals from middle to late Bronze Age Poland (44%, 95% confidence interval 36-51%), an ancestry component related to Hungarian Scythians or Slovakian La Tène individuals (49%, 95% confidence interval 41-57%) and potentially a minority component of ancestry related to Sarmatians from the Caucasus ( P = 0.13) (Fig. 2c). Four out of twelve individuals from medieval Poland, three of whom are from the late Viking Age 6 , carried detectable Scandinavian-related ancestry. Some of the ancestry detected in individuals from later medieval Poland may have persisted during the late first millennium CE in the cremating portion of the population, but regardless, this points to large-scale ancestry transformation in medieval Poland (Fig. 3a). Future data could shed light on the extent to which this reflects the influence of groups speaking Slavic languages in the region.\n122\n| Nature | Vol 637 | 2 January 2025\nthese regions (Supplementary Table 1). Their ancestry is shown on the same MDS model as in Fig. 2a for each time period. For each geographic region, the early medieval period is highlighted in orange and the area in the MDS corresponding to Scandinavian and central European ancestries is highlighted in an orange box.", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed3.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0806.pdf", + "query": "What do the timescales during which high-amplitude flaring events occur in blazars indicate?", + "target_page": 1, + "target_passage": "that much of the en- ergy is being produced deep within the jet on small, sub-parsec scales", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "1. INTRODUCTION\nThe timescales on which high-amplitude flaring events occur in blazars indicate that much of the energy is being produced deep within the jet on small, sub-parsec scales [1, 2]. Understanding if/how emission differs between blazar subclasses (i.e., BL Lacs objects and flat-spectrum radio quasars (FSRQs)) may offer important insight into the similarity between blazars and, furthermore, can provide constraints on the formation and acceleration of the jets themselves.\nFor the synchrotron component of blazar spectra, the low-frequency spectral break due to synchrotron self-absorption moves to higher frequencies as one measures closer to the base of the jet [2]. This often places the peak of the spectrum in the millimeter and submillimeter bands, where the emission is optically-thin and originates on parsec and sub-parsec scales [3], allowing direct observation of the most compact regions near the central engine. The high energy γ -ray emission originates as a Compton process, typically a combination of synchrotron-self-Compton (SSC) and external-radiation-Compton (ERC). Depending on the source properties, the synchrotron photons or external photons are upscattered by the same population of electrons that emit the millimeter and submillimeter spectra. Therefore the submillimeter and γ -ray emission are closely linked and give the full information about the source emission.\nA systematic study of the submillimeter properties of the entire sample of Fermi blazars has yet to be conducted and is one of the primary goals of our work. We present here preliminary analysis of the submillimeter properties of Fermi blazars detected by the Submil-\neConf C091122\nlimeter Array 1 ( SMA ) at 1mm and 850 µ m, including an investigation of variable behavior and the determination of submillimeter energy spectral indices. In addition, we consider the connection to the observed γ -ray indices and luminosities.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0806.pdf" + }, + { + "text": "7. Multi-wavelength Studies of VHE Blazars\n· 1ES 2344+514: A major (50% Crab) VHE flare, along with correlations of the VHE and X-ray flux were observed from this HBL. The VHE and X-ray spectra harden during bright states, and a synchrotron self-Compton (SSC) model can explain the observed SED in both the high and low states [26].\n· 1ES 1218+304: This HBL flared during VERITAS MWL observations. Its unusually hard VHE spectrum strongly constrains the EBL. The observed flaring rules out kpc-scale jet emission as the explanation of the spectral hardness and places the EBL constraints on more solidfooting [27, 28].\n· 1ES 0806+524: The observed SED of this new VHE HBL can be explained by an SSC model [16].\n· W Comae: This IBL, the first discovered at VHE, flared twice in 2008 [14, 15]. Modeling of the SED is improved by including an externalCompton (EC) component in an SSC interpretation.\n· 3C 66A: This IBL flared at VHE and MeV-GeV energies in 2008[17, 18]. Similar to W Comae and PKS 1424+240, modeling of observed SED suggests a strong EC component in addition to an SSC component.\n· Mkn 421: This HBL exhibited major flaring behavior for several months in 2008. Correlations of the VHE and X-ray flux were observed, along with spectral hardening with increased flux in both bands [29].\neConf C091122\n· RGBJ0710+591: Modeling the SED of this HBL with an SSC model yields a good fit to the data. The inclusion of an external Compton component does not improve the fit.\n· PKS1424+240: The broadband SED of this IBL (at unknown redshift) is well described by an SSC model favoring a redshift of less than 0.1 [21]. Using the photon index measured with Fermi-LAT in combination with recent EBL absorption models, the VERITAS data indicate that the redshift of PKS 1424+240 is less than 0.66.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0770.pdf" + }, + { + "text": "4. CONNECTION WITH GAMMA-RAYS\nSikora et al. [10] report that, during its flaring epochs, 3C 454.3 transitions from its typical FSRQ state to a more BL Lac-like state, where the synchrotron component emits much more strongly compared to the γ -ray component than during its 'low state'. 3C 454.3, which is the highest submillimeter luminosity FSRQ in our sample, would then shift down and to the right in Figure 5 when it enters a flaring period. For the first three months of the Fermi mission, 3C 454.3 was not flaring, which may explain its present location in Figure 5. The three objects for which there is a type discrepancy between CGRaBS and LBAS are all FSRQs (in CGRaBS) and exhibit\neConf C091122\nlow luminosity ratios and high luminosity, which suggest they may be undergoing the same changes as 3C 454.3. A possible interpretation of the elevated luminosity ratios observed in some BL Lacs objects is that there has been a dramatic increase in γ -ray luminosity due to ERC, which would not be reflected in the synchrotron component.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0806.pdf" + }, + { + "text": "Submillimeter Variability and the Gamma-ray Connection in Fermi Blazars\nA. Strom Univ. of Arizona, AZ 85721, USA A. Siemiginowska, M. Gurwell, B. Kelly\nCfA, MA 02138, USA\nWe present multi-epoch observations from the Submillimeter Array ( SMA ) for a sample of 171 bright blazars, 43 of which were detected by Fermi during the first three months of observations. We explore the correlation between their gamma-ray properties and submillimeter observations of their parsec-scale jets, with a special emphasis on spectral index in both bands and the variability of the synchrotron component. Subclass is determined using a combination of Fermi designation and the Candidate Gamma-Ray Blazar Survey (CGRaBS), resulting in 35 BL Lac objects and 136 flat-spectrum radio quasars (FSRQs) in our total sample. We calculate submillimeter energy spectral indices using contemporaneous observations in the 1 mm and 850 micron bands during the months August-October 2008. The submillimeter light curves are modeled as first-order continuous autoregressive processes, from which we derive characteristic timescales. Our blazar sample exhibits no differences in submillimeter variability amplitude or characteristic timescale as a function of subclass or luminosity. All of the the light curves are consistent with being produced by a single process that accounts for both low and high states, and there is additional evidence that objects may be transitioning between blazar class during flaring epochs.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0806.pdf" + }, + { + "text": "5. CONCLUSIONS\nLacs and FSRQs. One avenue for exploring this difference is to monitor changing submillimeter energy spectral index and the ratio of γ -ray to submillimeter luminosity as functions of time. The full meaning of the results of our autoregressive method is not yet clear, and will require better-sampled blazar light curves and the comparison between τ rest with physical timescales such as the synchrotron cooling timescale. These analyses would allow us to place constraints on the processes occurring near the base of the jet in blazars and further understand the intimate connection between them.", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0806.pdf" + }, + { + "text": "5. CONCLUSIONS\nThe motivation for observing blazars in the submillimeter is to study behavior close to the central engine, where the jet material is presumably still being accelerated. The separate emission processes that contribute to overall SED may present differently in BL Lacs and FSRQs, allowing us to understand the similarities and differences between blazar types. We have investigated these differences between objects in terms of submillimeter behavior and, in conclusion, find that\n· The SMA blazars exhibit submillimeter energy spectral indexes that follow the spectral sequence interpretation of blazars.\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\n5\nFigure 5: Ratio of γ -ray luminosity to submillimeter luminosity in the 1mm band. The location of an object in this plot should be directly correlated with its blazar 'state', with FSRQs occupying the upper right and BL Lacs the lower left. Flat-spectrum radio quasar 3C 454.3 is the object with the highest submillimeter luminosity in this plot.\n· BL Lacs and FSRQs do not exhibit significant differences in amplitude of submillimeter variability or characteristic timescale, but our sample of BL Lacs may be dominated by highpeaked BL Lacs (HBLs), which exhibit observational similarities with FSRQs.\n· Blazar submillimeter light curves are consistent with being produced by a single process that accounts for both high and low states, with characteristic timescales 10 < τ rest < 500 days.\n· The blazars detected by Fermi have synchrotron peaks at higher frequencies, regardless of submillimeter luminosity.\n· FSRQs exhibit higher ratios of γ -ray to submillimeter luminosity than BL Lacs (Figure 5), but all objects inhabit a region of parameter space suggesting transitions between states during flaring epochs.\nAs Fermi continues to observe fainter sources, the sample of objects for which we can perform this type of analysis will increase and provide better limits on our results. To understand the physical relevance of these results, however, it is important to be able to distinguish between the difference in variability between BL\neConf C091122", + "page_start": 3, + "page_end": 4, + "source_file": "1001.0806.pdf" + }, + { + "text": "3.2. First-Order Continuous Autoregression\nWe follow the method of Kelly et al. [9], who model quasar optical light curves as a continuous time firstorder autoregressive process (CAR(1)) in order to extract characteristic time scales and the amplitude of flux variations. Although flaring behavior is not typically thought of as an autoregressive process, we find that the light curves are well-fit by the models and therefore adopt the method here to study blazar submillimeter light curves.\nThe CAR(1) process is described by a stochastic differential equation [9],\ndS ( t ) = 1 τ S ( t ) dt + σ √ dt glyph[epsilon1] ( t ) + b dt, (3)\nassociated with a power spectrum of the form\nP X ( f ) = 2 σ 2 τ 2 1 + (2 πτf ) 2 . (4)\nIn equations 3 and 4, τ is called the 'relaxation time' of the process S ( t ) and is identified by the break in P X ( f ). The power spectrum appears flat for timescales longer than this and falls off as 1 /f 2 for timescales shorter than the characteristic timescale of the process.\nTaking the logarithm of the blazar light curve (in Jy) to be S ( t ), we adopt τ (in days) as the characteristic timescale of variability, after which the physical process 'forgets' about what has happened at time lags of greater than τ . The two other relevant parameters, σ and µ = b/a , are the overall amplitude of variability and the logarithm of mean value of the light curve, respectively.\nIn the routine, we construct an autoregressive model for the light curves for a minimum of 100,000 iterations and calculate the value of τ from the break in the power spectrum in each instance. Due to the limited number of observations in the 850 µ m band, we performed this autoregressive analysis only for the 1mm light curves, which typically have more than 10 points per light curve.\nThis method yielded some surprising results. In Figure 3, we see that the BL Lacs and FSRQs exhibit virtually no difference in characteristic timescale, with\neConf C091122", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0806.pdf" + }, + { + "text": "2. SMA BLAZARS\nForty-four of the objects in our total blazar sample were detected by Fermi and can be found in the catalog of LAT Bright AGN Sources (LBAS) from Abdo et al. [7]. J0050-094 has no redshift in either the LBAS catalog or CGRaBS and is not included in our study. Of the 43 remaining sources, 14 are BL Lac objects and 29 are FSRQs, with 0 . 03 ≤ z ≤ 2 . 19.\nWe examined submillimeter light curves for all of the SMA blazars, with observations beginning in approximately 2003 (see Figure 1). Typically, the 1mm band is much more well-sampled in comparison to the 850m band, but visual inspection reveals that the regularity and quality of observations vary greatly from source to source. Many of the objects exhibit nonperiodic variability, either in the form of persistent, low-amplitude fluctuations or higher amplitude flaring behavior.", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0806.pdf" + }, + { + "text": "7. Multi-wavelength Studies of VHE Blazars\nDuring the first three seasons of VERITAS observations, pre-planned extensive MWL campaigns were organized for three blazars 1ES 2344+514 (2007-08), 1ES 1218+304 (2008-09) and 1ES 0229+200 (200910 - ongoing). In addition, numerous ToO MWLobservation campaigns were performed. These include campaigns for every blazar/AGN discovered by VERITAS, and all include Swift (XRT and UVOT) data. All MWL campaigns on the VHE blazars discovered\n4\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\nFigure 1: (Left) The preliminary significance measured from each of the 49 non-detected candidates using standard analysis cuts. The curve shows a Gaussian distribution, with mean zero and standard deviation one, normalized to the number of blazars. A similar result is obtained using analysis cuts optimized for soft-spectrum sources. (Right) The distribution of flux upper limits for the non-detected blazars in percentage of Crab Nebula flux above the observation threshold. The time-weighted average limit is less than ∼ 2% Crab flux.\nσ\nsince the launch of Fermi include LAT detections. In addition, several MWL campaigns on the well-studied VHE blazars Mkn 421 and Mkn 501 (please see the contributions of D. Gall and A. Konopelko in these proceedings) were also performed. Highlights of these campaigns include:", + "page_start": 2, + "page_end": 3, + "source_file": "1001.0770.pdf" + }, + { + "text": "4. CONNECTION WITH GAMMA-RAYS\nIn general, we find that in the submillimeter, we are observing these blazars at or near the peak of the synchrotron component ( α S ∼ 0), but that Fermi -detected sources have more negative energy spectral indices overall than Fermi -nondetected sources. In Figure 4, we see that while the majority of Fermi blazars are observed on the rising part of the synchrotron component (at lower energies than the peak), all of the objects have very steeply falling γ -ray energy spectral indexes, putting the γ -ray peak at lower energies than the observed Fermi band. Knowing that we are not observing the synchrotron and γ -ray components at analagous points in the spectrum may allow us to better understand the magnetic field in the parsec-scale jet region and the population of external photons that is being upscattered to γ -rays.\nIn Figure 5, the ratio between L γ and νL ν, 1mm reflects the division between BL Lacs and FSRQs as well\n4\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\nFigure 4: The γ -ray index versus submillimeter index plane. The blazars fall more steeply in the γ -rays than in the submillimeter band, where most are, in fact, rising. This LAT-detected sample contrasts with the full SMA sample, where the blazars are more distributed around α S ∼ 0.\nas the presence of SSC versus ERC. Here, we use submillimeter luminosity as a proxy for jet power, which is correlated with the integrated luminosity of the synchrotron component. Elevated γ -ray luminosity with respect to the synchrotron component (which is often seen in FSRQs) suggests the upscattering of external photons off the synchrotron-emitting electrons. These objects should occupy the upper right of the ratio/jet power plot, and BL Lacs, which generally exhibit components with roughly comparable luminosities, should occupy the lower left. It is clear from the figure, however, that many FSRQs exhibit ratios similar to those of the BL Lacs and vis versa.", + "page_start": 2, + "page_end": 3, + "source_file": "1001.0806.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0806.pdf", + "query": "Where is the Submillimeter Array?", + "target_page": 1, + "target_passage": "near the summit of Mauna Ke", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "2. SMA BLAZARS\nThe Submillimeter Array [4] consists of eight 6 m antennas located near the summit of Mauna Kea. The SMA is used in a variety of baseline configurations and typically operates in the 1mm and 850 µ m windows, achieving spatial resolution as fine as 0.25' at 850 µ m. The sources used as phase calibrators for the array are compiled in a database known as the SMA Calibrator List 2 [5]. Essentially a collection of bright objects (stronger than 750 mJy at 230 GHz and 1 Jy at 345 GHz), these sources are monitored regularly, both during science observations and dedicated observing tracks.\nTo select our sample, we identified objects in the calibrator list that were also classified as BL Lacs or FSRQs by the Candidate Gamma-Ray Blazar Survey [6, CGRaBS]. Of the 243 total objects in the calibrator list, 171 (35 BL Lacs and 136 FSRQs) have positive blazar class identifications, although there are three sources (J0238+166, J0428-379, and\n1 The Submillimeter Array is a joint project between the Smithsonian Astrophysical Observatory and the Academia Sinica Institute of Astronomy and Astrophysics and is funded by the Smithsonian Institution and the Academia Sinica.\n2 http://sma1.sma.hawaii.edu/callist/callist.html\n2\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\nFigure 1: The SMA light curves for 3C 454.3. The open circles represent the 850 µ m observations, and the open triangles represent the 1mm observations.\nJ1751+096) which have conflicting classifications between Fermi and CGRaBS. Some blazars found in the calibrator list have been studied extensively (e.g., 3C 279 and 3C 454.3) but the SMA blazars have not been studied collectively.", + "page_start": 0, + "page_end": 1, + "source_file": "1001.0806.pdf" + }, + { + "text": "Submillimeter Variability and the Gamma-ray Connection in Fermi Blazars\nA. Strom Univ. of Arizona, AZ 85721, USA A. Siemiginowska, M. Gurwell, B. Kelly\nCfA, MA 02138, USA\nWe present multi-epoch observations from the Submillimeter Array ( SMA ) for a sample of 171 bright blazars, 43 of which were detected by Fermi during the first three months of observations. We explore the correlation between their gamma-ray properties and submillimeter observations of their parsec-scale jets, with a special emphasis on spectral index in both bands and the variability of the synchrotron component. Subclass is determined using a combination of Fermi designation and the Candidate Gamma-Ray Blazar Survey (CGRaBS), resulting in 35 BL Lac objects and 136 flat-spectrum radio quasars (FSRQs) in our total sample. We calculate submillimeter energy spectral indices using contemporaneous observations in the 1 mm and 850 micron bands during the months August-October 2008. The submillimeter light curves are modeled as first-order continuous autoregressive processes, from which we derive characteristic timescales. Our blazar sample exhibits no differences in submillimeter variability amplitude or characteristic timescale as a function of subclass or luminosity. All of the the light curves are consistent with being produced by a single process that accounts for both low and high states, and there is additional evidence that objects may be transitioning between blazar class during flaring epochs.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0806.pdf" + }, + { + "text": "5. CONCLUSIONS\nThe motivation for observing blazars in the submillimeter is to study behavior close to the central engine, where the jet material is presumably still being accelerated. The separate emission processes that contribute to overall SED may present differently in BL Lacs and FSRQs, allowing us to understand the similarities and differences between blazar types. We have investigated these differences between objects in terms of submillimeter behavior and, in conclusion, find that\n· The SMA blazars exhibit submillimeter energy spectral indexes that follow the spectral sequence interpretation of blazars.\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\n5\nFigure 5: Ratio of γ -ray luminosity to submillimeter luminosity in the 1mm band. The location of an object in this plot should be directly correlated with its blazar 'state', with FSRQs occupying the upper right and BL Lacs the lower left. Flat-spectrum radio quasar 3C 454.3 is the object with the highest submillimeter luminosity in this plot.\n· BL Lacs and FSRQs do not exhibit significant differences in amplitude of submillimeter variability or characteristic timescale, but our sample of BL Lacs may be dominated by highpeaked BL Lacs (HBLs), which exhibit observational similarities with FSRQs.\n· Blazar submillimeter light curves are consistent with being produced by a single process that accounts for both high and low states, with characteristic timescales 10 < τ rest < 500 days.\n· The blazars detected by Fermi have synchrotron peaks at higher frequencies, regardless of submillimeter luminosity.\n· FSRQs exhibit higher ratios of γ -ray to submillimeter luminosity than BL Lacs (Figure 5), but all objects inhabit a region of parameter space suggesting transitions between states during flaring epochs.\nAs Fermi continues to observe fainter sources, the sample of objects for which we can perform this type of analysis will increase and provide better limits on our results. To understand the physical relevance of these results, however, it is important to be able to distinguish between the difference in variability between BL\neConf C091122", + "page_start": 3, + "page_end": 4, + "source_file": "1001.0806.pdf" + }, + { + "text": "1. INTRODUCTION\nThe timescales on which high-amplitude flaring events occur in blazars indicate that much of the energy is being produced deep within the jet on small, sub-parsec scales [1, 2]. Understanding if/how emission differs between blazar subclasses (i.e., BL Lacs objects and flat-spectrum radio quasars (FSRQs)) may offer important insight into the similarity between blazars and, furthermore, can provide constraints on the formation and acceleration of the jets themselves.\nFor the synchrotron component of blazar spectra, the low-frequency spectral break due to synchrotron self-absorption moves to higher frequencies as one measures closer to the base of the jet [2]. This often places the peak of the spectrum in the millimeter and submillimeter bands, where the emission is optically-thin and originates on parsec and sub-parsec scales [3], allowing direct observation of the most compact regions near the central engine. The high energy γ -ray emission originates as a Compton process, typically a combination of synchrotron-self-Compton (SSC) and external-radiation-Compton (ERC). Depending on the source properties, the synchrotron photons or external photons are upscattered by the same population of electrons that emit the millimeter and submillimeter spectra. Therefore the submillimeter and γ -ray emission are closely linked and give the full information about the source emission.\nA systematic study of the submillimeter properties of the entire sample of Fermi blazars has yet to be conducted and is one of the primary goals of our work. We present here preliminary analysis of the submillimeter properties of Fermi blazars detected by the Submil-\neConf C091122\nlimeter Array 1 ( SMA ) at 1mm and 850 µ m, including an investigation of variable behavior and the determination of submillimeter energy spectral indices. In addition, we consider the connection to the observed γ -ray indices and luminosities.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0806.pdf" + }, + { + "text": "2.1. Submillimeter Properties\nSubmillimeter Luminosities. Since we are primarily concerned with comparisons to Fermi observations, we note that only 129 of the SMA blazars (23 BL Lacs and 106 FSRQs) were observed by the SMA in either band during the three months August-October 2008. For these objects, submillimeter luminosities are calculated in the standard way:\nν e L ν e = 4 πD 2 L ν obs F obs 1 + z , (1)\nwhere D L is the luminosity distance, ν obs is the frequency of the observed band, and F obs is the average\neConf C091122\nFigure 2: Variability index for our sample (top: 1mm, bottom: 850 µ m), with FSRQs as the hatched distribution and BL Lacs as the solid distribution. There is no signicant difference in the class distributions in either band; the 'tail' to the left is populated by objects with errors larger than the intrinsic variability.\nflux (in erg cm -2 s -1 Hz -1 ) over the three month period. We adopt a lambda cold dark matter cosmology with values of H 0 = 71 km s -1 Mpc -1 , Ω M = 0 . 27, and Λ = 0 . 73.\nEnergy Spectral Indices. We derive submillimeter spectral energy indices from observations quasisimultaneous with the Fermi observations. To be consistent with the use of α γ , we define spectral energy index as νF ν = ν -α S and calculate α S from the average of the energy spectral indices over the corresponding three months. We only calculate α S for the 16 objects (8 BL Lacs and 35 FSRQs) with observations at both 1mm and 850 µ m during this time frame.", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0806.pdf" + }, + { + "text": "4. CONNECTION WITH GAMMA-RAYS\nIn general, we find that in the submillimeter, we are observing these blazars at or near the peak of the synchrotron component ( α S ∼ 0), but that Fermi -detected sources have more negative energy spectral indices overall than Fermi -nondetected sources. In Figure 4, we see that while the majority of Fermi blazars are observed on the rising part of the synchrotron component (at lower energies than the peak), all of the objects have very steeply falling γ -ray energy spectral indexes, putting the �� -ray peak at lower energies than the observed Fermi band. Knowing that we are not observing the synchrotron and γ -ray components at analagous points in the spectrum may allow us to better understand the magnetic field in the parsec-scale jet region and the population of external photons that is being upscattered to γ -rays.\nIn Figure 5, the ratio between L γ and νL ν, 1mm reflects the division between BL Lacs and FSRQs as well\n4\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\nFigure 4: The γ -ray index versus submillimeter index plane. The blazars fall more steeply in the γ -rays than in the submillimeter band, where most are, in fact, rising. This LAT-detected sample contrasts with the full SMA sample, where the blazars are more distributed around α S ∼ 0.\nas the presence of SSC versus ERC. Here, we use submillimeter luminosity as a proxy for jet power, which is correlated with the integrated luminosity of the synchrotron component. Elevated γ -ray luminosity with respect to the synchrotron component (which is often seen in FSRQs) suggests the upscattering of external photons off the synchrotron-emitting electrons. These objects should occupy the upper right of the ratio/jet power plot, and BL Lacs, which generally exhibit components with roughly comparable luminosities, should occupy the lower left. It is clear from the figure, however, that many FSRQs exhibit ratios similar to those of the BL Lacs and vis versa.", + "page_start": 2, + "page_end": 3, + "source_file": "1001.0806.pdf" + }, + { + "text": "5. CONCLUSIONS\nLacs and FSRQs. One avenue for exploring this difference is to monitor changing submillimeter energy spectral index and the ratio of γ -ray to submillimeter luminosity as functions of time. The full meaning of the results of our autoregressive method is not yet clear, and will require better-sampled blazar light curves and the comparison between τ rest with physical timescales such as the synchrotron cooling timescale. These analyses would allow us to place constraints on the processes occurring near the base of the jet in blazars and further understand the intimate connection between them.", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0806.pdf" + }, + { + "text": "2. SMA BLAZARS\nForty-four of the objects in our total blazar sample were detected by Fermi and can be found in the catalog of LAT Bright AGN Sources (LBAS) from Abdo et al. [7]. J0050-094 has no redshift in either the LBAS catalog or CGRaBS and is not included in our study. Of the 43 remaining sources, 14 are BL Lac objects and 29 are FSRQs, with 0 . 03 ≤ z ≤ 2 . 19.\nWe examined submillimeter light curves for all of the SMA blazars, with observations beginning in approximately 2003 (see Figure 1). Typically, the 1mm band is much more well-sampled in comparison to the 850m band, but visual inspection reveals that the regularity and quality of observations vary greatly from source to source. Many of the objects exhibit nonperiodic variability, either in the form of persistent, low-amplitude fluctuations or higher amplitude flaring behavior.", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0806.pdf" + }, + { + "text": "7. Multi-wavelength Studies of VHE Blazars\nDuring the first three seasons of VERITAS observations, pre-planned extensive MWL campaigns were organized for three blazars 1ES 2344+514 (2007-08), 1ES 1218+304 (2008-09) and 1ES 0229+200 (200910 - ongoing). In addition, numerous ToO MWLobservation campaigns were performed. These include campaigns for every blazar/AGN discovered by VERITAS, and all include Swift (XRT and UVOT) data. All MWL campaigns on the VHE blazars discovered\n4\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\nFigure 1: (Left) The preliminary significance measured from each of the 49 non-detected candidates using standard analysis cuts. The curve shows a Gaussian distribution, with mean zero and standard deviation one, normalized to the number of blazars. A similar result is obtained using analysis cuts optimized for soft-spectrum sources. (Right) The distribution of flux upper limits for the non-detected blazars in percentage of Crab Nebula flux above the observation threshold. The time-weighted average limit is less than ∼ 2% Crab flux.\nσ\nsince the launch of Fermi include LAT detections. In addition, several MWL campaigns on the well-studied VHE blazars Mkn 421 and Mkn 501 (please see the contributions of D. Gall and A. Konopelko in these proceedings) were also performed. Highlights of these campaigns include:", + "page_start": 2, + "page_end": 3, + "source_file": "1001.0770.pdf" + }, + { + "text": "2. VERITAS\nVERITAS, a stereoscopic array of four 12-m atmospheric-Cherenkov telescopes located in Arizona, is used to study VHE γ -rays from a variety of astrophysical sources [4]. VERITAS began scientific observations with a partial array in September 2006 and has routinely observed with the full array since September 2007. The performance metrics of VERITAS include an energy threshold of ∼ 100 GeV, an energy resolution of ∼ 15%, an angular resolution of ∼ 0.1 · , and a sensitivity yielding a 5 σ detection of a 1% Crab Nebula flux object in < 30 hours 1 . VERITAS has an active maintenance program (e.g. frequent mirror recoating and alignment) to ensure its continued high performance over time, and an upgrade improving both the camera (higher quantum-efficiency PMTs) and the trigger system has been proposed to the funding agencies.\n1 A VERITAS telescope was relocated during Summer 2009, increasing the array's sensitivity by a factor ∼ 1.3.\n2\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5", + "page_start": 0, + "page_end": 1, + "source_file": "1001.0770.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0806.pdf", + "query": "How many blazars were observed by the SMA in either band during the three months August-October 2008?", + "target_page": 2, + "target_passage": "only 129 of the SMA blazars", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "2. SMA BLAZARS\nThe Submillimeter Array [4] consists of eight 6 m antennas located near the summit of Mauna Kea. The SMA is used in a variety of baseline configurations and typically operates in the 1mm and 850 µ m windows, achieving spatial resolution as fine as 0.25' at 850 µ m. The sources used as phase calibrators for the array are compiled in a database known as the SMA Calibrator List 2 [5]. Essentially a collection of bright objects (stronger than 750 mJy at 230 GHz and 1 Jy at 345 GHz), these sources are monitored regularly, both during science observations and dedicated observing tracks.\nTo select our sample, we identified objects in the calibrator list that were also classified as BL Lacs or FSRQs by the Candidate Gamma-Ray Blazar Survey [6, CGRaBS]. Of the 243 total objects in the calibrator list, 171 (35 BL Lacs and 136 FSRQs) have positive blazar class identifications, although there are three sources (J0238+166, J0428-379, and\n1 The Submillimeter Array is a joint project between the Smithsonian Astrophysical Observatory and the Academia Sinica Institute of Astronomy and Astrophysics and is funded by the Smithsonian Institution and the Academia Sinica.\n2 http://sma1.sma.hawaii.edu/callist/callist.html\n2\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\nFigure 1: The SMA light curves for 3C 454.3. The open circles represent the 850 µ m observations, and the open triangles represent the 1mm observations.\nJ1751+096) which have conflicting classifications between Fermi and CGRaBS. Some blazars found in the calibrator list have been studied extensively (e.g., 3C 279 and 3C 454.3) but the SMA blazars have not been studied collectively.", + "page_start": 0, + "page_end": 1, + "source_file": "1001.0806.pdf" + }, + { + "text": "2. SMA BLAZARS\nForty-four of the objects in our total blazar sample were detected by Fermi and can be found in the catalog of LAT Bright AGN Sources (LBAS) from Abdo et al. [7]. J0050-094 has no redshift in either the LBAS catalog or CGRaBS and is not included in our study. Of the 43 remaining sources, 14 are BL Lac objects and 29 are FSRQs, with 0 . 03 ≤ z ≤ 2 . 19.\nWe examined submillimeter light curves for all of the SMA blazars, with observations beginning in approximately 2003 (see Figure 1). Typically, the 1mm band is much more well-sampled in comparison to the 850m band, but visual inspection reveals that the regularity and quality of observations vary greatly from source to source. Many of the objects exhibit nonperiodic variability, either in the form of persistent, low-amplitude fluctuations or higher amplitude flaring behavior.", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0806.pdf" + }, + { + "text": "2.1. Submillimeter Properties\nSubmillimeter Luminosities. Since we are primarily concerned with comparisons to Fermi observations, we note that only 129 of the SMA blazars (23 BL Lacs and 106 FSRQs) were observed by the SMA in either band during the three months August-October 2008. For these objects, submillimeter luminosities are calculated in the standard way:\nν e L ν e = 4 πD 2 L ν obs F obs 1 + z , (1)\nwhere D L is the luminosity distance, ν obs is the frequency of the observed band, and F obs is the average\neConf C091122\nFigure 2: Variability index for our sample (top: 1mm, bottom: 850 µ m), with FSRQs as the hatched distribution and BL Lacs as the solid distribution. There is no signicant difference in the class distributions in either band; the 'tail' to the left is populated by objects with errors larger than the intrinsic variability.\nflux (in erg cm -2 s -1 Hz -1 ) over the three month period. We adopt a lambda cold dark matter cosmology with values of H 0 = 71 km s -1 Mpc -1 , Ω M = 0 . 27, and Λ = 0 . 73.\nEnergy Spectral Indices. We derive submillimeter spectral energy indices from observations quasisimultaneous with the Fermi observations. To be consistent with the use of α γ , we define spectral energy index as νF ν = ν -α S and calculate α S from the average of the energy spectral indices over the corresponding three months. We only calculate α S for the 16 objects (8 BL Lacs and 35 FSRQs) with observations at both 1mm and 850 µ m during this time frame.", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0806.pdf" + }, + { + "text": "Submillimeter Variability and the Gamma-ray Connection in Fermi Blazars\nA. Strom Univ. of Arizona, AZ 85721, USA A. Siemiginowska, M. Gurwell, B. Kelly\nCfA, MA 02138, USA\nWe present multi-epoch observations from the Submillimeter Array ( SMA ) for a sample of 171 bright blazars, 43 of which were detected by Fermi during the first three months of observations. We explore the correlation between their gamma-ray properties and submillimeter observations of their parsec-scale jets, with a special emphasis on spectral index in both bands and the variability of the synchrotron component. Subclass is determined using a combination of Fermi designation and the Candidate Gamma-Ray Blazar Survey (CGRaBS), resulting in 35 BL Lac objects and 136 flat-spectrum radio quasars (FSRQs) in our total sample. We calculate submillimeter energy spectral indices using contemporaneous observations in the 1 mm and 850 micron bands during the months August-October 2008. The submillimeter light curves are modeled as first-order continuous autoregressive processes, from which we derive characteristic timescales. Our blazar sample exhibits no differences in submillimeter variability amplitude or characteristic timescale as a function of subclass or luminosity. All of the the light curves are consistent with being produced by a single process that accounts for both low and high states, and there is additional evidence that objects may be transitioning between blazar class during flaring epochs.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0806.pdf" + }, + { + "text": "7. Multi-wavelength Studies of VHE Blazars\nDuring the first three seasons of VERITAS observations, pre-planned extensive MWL campaigns were organized for three blazars 1ES 2344+514 (2007-08), 1ES 1218+304 (2008-09) and 1ES 0229+200 (200910 - ongoing). In addition, numerous ToO MWLobservation campaigns were performed. These include campaigns for every blazar/AGN discovered by VERITAS, and all include Swift (XRT and UVOT) data. All MWL campaigns on the VHE blazars discovered\n4\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\nFigure 1: (Left) The preliminary significance measured from each of the 49 non-detected candidates using standard analysis cuts. The curve shows a Gaussian distribution, with mean zero and standard deviation one, normalized to the number of blazars. A similar result is obtained using analysis cuts optimized for soft-spectrum sources. (Right) The distribution of flux upper limits for the non-detected blazars in percentage of Crab Nebula flux above the observation threshold. The time-weighted average limit is less than ∼ 2% Crab flux.\nσ\nsince the launch of Fermi include LAT detections. In addition, several MWL campaigns on the well-studied VHE blazars Mkn 421 and Mkn 501 (please see the contributions of D. Gall and A. Konopelko in these proceedings) were also performed. Highlights of these campaigns include:", + "page_start": 2, + "page_end": 3, + "source_file": "1001.0770.pdf" + }, + { + "text": "5. CONCLUSIONS\nThe motivation for observing blazars in the submillimeter is to study behavior close to the central engine, where the jet material is presumably still being accelerated. The separate emission processes that contribute to overall SED may present differently in BL Lacs and FSRQs, allowing us to understand the similarities and differences between blazar types. We have investigated these differences between objects in terms of submillimeter behavior and, in conclusion, find that\n· The SMA blazars exhibit submillimeter energy spectral indexes that follow the spectral sequence interpretation of blazars.\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\n5\nFigure 5: Ratio of γ -ray luminosity to submillimeter luminosity in the 1mm band. The location of an object in this plot should be directly correlated with its blazar 'state', with FSRQs occupying the upper right and BL Lacs the lower left. Flat-spectrum radio quasar 3C 454.3 is the object with the highest submillimeter luminosity in this plot.\n· BL Lacs and FSRQs do not exhibit significant differences in amplitude of submillimeter variability or characteristic timescale, but our sample of BL Lacs may be dominated by highpeaked BL Lacs (HBLs), which exhibit observational similarities with FSRQs.\n· Blazar submillimeter light curves are consistent with being produced by a single process that accounts for both high and low states, with characteristic timescales 10 < τ rest < 500 days.\n· The blazars detected by Fermi have synchrotron peaks at higher frequencies, regardless of submillimeter luminosity.\n· FSRQs exhibit higher ratios of γ -ray to submillimeter luminosity than BL Lacs (Figure 5), but all objects inhabit a region of parameter space suggesting transitions between states during flaring epochs.\nAs Fermi continues to observe fainter sources, the sample of objects for which we can perform this type of analysis will increase and provide better limits on our results. To understand the physical relevance of these results, however, it is important to be able to distinguish between the difference in variability between BL\neConf C091122", + "page_start": 3, + "page_end": 4, + "source_file": "1001.0806.pdf" + }, + { + "text": "1. INTRODUCTION\nThe timescales on which high-amplitude flaring events occur in blazars indicate that much of the energy is being produced deep within the jet on small, sub-parsec scales [1, 2]. Understanding if/how emission differs between blazar subclasses (i.e., BL Lacs objects and flat-spectrum radio quasars (FSRQs)) may offer important insight into the similarity between blazars and, furthermore, can provide constraints on the formation and acceleration of the jets themselves.\nFor the synchrotron component of blazar spectra, the low-frequency spectral break due to synchrotron self-absorption moves to higher frequencies as one measures closer to the base of the jet [2]. This often places the peak of the spectrum in the millimeter and submillimeter bands, where the emission is optically-thin and originates on parsec and sub-parsec scales [3], allowing direct observation of the most compact regions near the central engine. The high energy γ -ray emission originates as a Compton process, typically a combination of synchrotron-self-Compton (SSC) and external-radiation-Compton (ERC). Depending on the source properties, the synchrotron photons or external photons are upscattered by the same population of electrons that emit the millimeter and submillimeter spectra. Therefore the submillimeter and γ -ray emission are closely linked and give the full information about the source emission.\nA systematic study of the submillimeter properties of the entire sample of Fermi blazars has yet to be conducted and is one of the primary goals of our work. We present here preliminary analysis of the submillimeter properties of Fermi blazars detected by the Submil-\neConf C091122\nlimeter Array 1 ( SMA ) at 1mm and 850 µ m, including an investigation of variable behavior and the determination of submillimeter energy spectral indices. In addition, we consider the connection to the observed γ -ray indices and luminosities.", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0806.pdf" + }, + { + "text": "8. Conclusions\nThe first two years of the VERITAS blazar KSP were highly successful. Highlights include the detection of more than a 16 VHE blazars with the observations almost always having contemporaneous MWL data. Among these detections are 8 VHE blazar discoveries, including the first three IBLs known to emit VHE γ -rays. All but a handful of the blazars on the initial VERITAS discovery target list were observed, and the flux limits generated for those not VHE detected are generally the most-constraining ever. The excess seen in the stacked blazar analysis suggests that the initial direction of the VERITAS discovery program was well justified, and that follow-up observations of many of these initial targets will result in VHE discoveries. In addition, the Fermi-LAT is identifying many new compelling targets for the VERITAS blazar discovery program. These new candidates have already resulted in 3 VHE blazar discoveries. The future of the VERITAS blazar discovery program is clearly very bright.\nThe MWL aspect of the VERITAS blazar KSP has also been highly successful. Every VERITAS observation of a known, or newly discovered, VHE blazar has been accompanied by contemporaneous MWL observations. These data have resulted in the identifica-\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\n5\ntion of correlated VHE and X-ray flux variability, as well as correlated spectral hardening in both the VHE and X-ray bands. The VHE MWL observations were performed in both 'quiescent' and flaring states for some of the observed blazars. For the observed HBL objects, the SEDs can be well described by a simple SSC model in both high and low states. However, an additional external Compton component is necessary to adequately fit the SEDs of the IBL objects.", + "page_start": 3, + "page_end": 4, + "source_file": "1001.0770.pdf" + }, + { + "text": "4. CONNECTION WITH GAMMA-RAYS\nIn general, we find that in the submillimeter, we are observing these blazars at or near the peak of the synchrotron component ( α S ∼ 0), but that Fermi -detected sources have more negative energy spectral indices overall than Fermi -nondetected sources. In Figure 4, we see that while the majority of Fermi blazars are observed on the rising part of the synchrotron component (at lower energies than the peak), all of the objects have very steeply falling γ -ray energy spectral indexes, putting the γ -ray peak at lower energies than the observed Fermi band. Knowing that we are not observing the synchrotron and γ -ray components at analagous points in the spectrum may allow us to better understand the magnetic field in the parsec-scale jet region and the population of external photons that is being upscattered to γ -rays.\nIn Figure 5, the ratio between L γ and νL ν, 1mm reflects the division between BL Lacs and FSRQs as well\n4\n2009 Fermi Symposium, Washington, D.C., Nov. 2-5\nFigure 4: The γ -ray index versus submillimeter index plane. The blazars fall more steeply in the γ -rays than in the submillimeter band, where most are, in fact, rising. This LAT-detected sample contrasts with the full SMA sample, where the blazars are more distributed around α S ∼ 0.\nas the presence of SSC versus ERC. Here, we use submillimeter luminosity as a proxy for jet power, which is correlated with the integrated luminosity of the synchrotron component. Elevated γ -ray luminosity with respect to the synchrotron component (which is often seen in FSRQs) suggests the upscattering of external photons off the synchrotron-emitting electrons. These objects should occupy the upper right of the ratio/jet power plot, and BL Lacs, which generally exhibit components with roughly comparable luminosities, should occupy the lower left. It is clear from the figure, however, that many FSRQs exhibit ratios similar to those of the BL Lacs and vis versa.", + "page_start": 2, + "page_end": 3, + "source_file": "1001.0806.pdf" + }, + { + "text": "5.1. Recent VERITAS Blazar Discoveries\n( ∼ 5.5 σ ; 3% Crab flux above 300 GeV; Γ VHE ∼ 2 . 7) during VERITAS observations from December 2008 to March 2009. The initial announcement of the VHE discovery [19] led to its discovery above 1 GeV in the Fermi-LAT data using a special analysis. RBS 0413, a relatively distant HBL (z=0.19), was observed for 16 h good-quality live time in 2008-09 2 . These data resulted in the discovery of VHE gamma-rays ( > 270 γ , ∼ 6 σ ) at a flux ( > 200 GeV) of ∼ 2% of the Crab Nebula flux. The discovery [20] was announced simultaneously with the LAT MeV-GeV detection. The VHE and other MWL observations, including Fermi-LAT data, for each of these three sources will be the subject of a joint publication involving both the VERITAS and LAT collaborations.", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0770.pdf" + } + ] + }, + { + "references": { + "source_file": "ASX_MRM_2000.pdf", + "query": "How big is the Mermaid fleet?", + "target_page": 12, + "target_passage": "Mermaid operates a fleet of fifteen (15) tugs, workboats and barges, undertaking all forms of offshore activity", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "MERMAID FLEET\n23", + "page_start": 26, + "page_end": 26, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "SEAGOING OPERATIONS\nMermaid operates a fleet of fifteen (15) tugs, workboats and barges, undertaking all forms of offshore activity including exploration support, supply, survey and berthing assist. Lower vessel utilisation during the period allowed an acceleration of scheduled maintenance. Two tugs, Mermaid Commando and Mermaid Chieftan received extensive refits. In both cases the work increased productivity through enhanced bollard pull and consequent earnings.\nSafety was given the highest priority through new monitoring systems and awareness programs. Formalised on the job instruction and training courses have also lifted levels of experience and proficiency across the workforce.\nThe offshore waters and islands adjacent to Dampier, host in excess of 50% of all exploration and development budgets of Australia's offshore oil and gas industry. The Burrup Peninsular where the Base is located is the intended site of major new oil, gas, petrochemical and industrial mineral processing plants. The Port of Dampier is Australia's largest Port as measured by tonnage, but as identified in the 1997 WA Department of Commerce and Trade report, there remains an urgent need for additional marine support infrastructure. Mermaid is now well advanced in our plan to satisfy those needs and onshore work was announced to start on the 9th October 2000. DAMPIER BASE\nSince receiving approval in principle for development of the Dampier Base from the Western Australian Minister for the Environment in February 2000, engineering and general design work in connection with the base proceeded at an accelerated pace.\nThis work, assisted by technical studies and a re-assessment of an increased demand for services arising out of greater expectations for growth in the sector, has led to improvements and expansion of capacity over earlier plans.\nThe Dampier Base will now comprise:-\n·\n·\nAn 'all tides' approach channel to a minimum depth of 6 metres", + "page_start": 11, + "page_end": 11, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "B. QUAY WALL ( BERTH 1)\nMarket research and customer needs have caused Mermaid to relocate and redesign the main berth to accommodate a wider range of vessels than originally contemplated. The berth is now located in deeper water with better vessel access.\nThe regional offshore fleet characteristics have been changing in terms of vessel size. There are now four vessels operating in the region with 12,000 to 18,000 hp. When design commenced there were none of this size.\nThe depth alongside Berth 1 will be 7.5m. King Bay has a statistical average extreme low tide (MLWS) of 0.9 m, the occurrence of which can be expressed in hours per month. The largest", + "page_start": 13, + "page_end": 13, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "F. ONSHORE LAND RECLAMATION.\nLike our neighbours, much of the Mermaid site is below the prescribed storm surge level, or needs some degree of earthworks to maximize its value. Currently 8 of the 17 ha of the area is suitable for development in its present state.\nThe spoil produced from dredging will allow Mermaid to achieve full utilization of the site at a fraction of the cost of importing fill from elsewhere.\nConsiderable effort has gone into anticipating the future direction of the Base. Planning services such as traffic flows, land allocation and security, as well as fulfilling the many and complex regulatory requirements related to health, safety, quarantine, environmental management, dust, dangerous goods and hazchem materials have been the subject of considerable study prior to this implementation stage.\nMERMAID MARINE AUSTRALIA LIMITED\n13\nOPERATIONS REVIEW", + "page_start": 16, + "page_end": 20, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "C. QUAY WALL (BERTH 2)\nThe inner berth, Berth 2 has a minimum depth alongside of 5.0 m allowing unrestricted operation of all the Mermaid fleet, and the majority of other vessels servicing the offshore oil/gas industry and mineral ports. This berth will offer excellent weather protection for small and medium size vessels.", + "page_start": 14, + "page_end": 14, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "OPERATIONS REVIEW\nvessels engaged in routine offshore logistics tasks operate fully laden with 7.4 m draft which means there will be very few occasions when the largest vessels in the industry have to make a tide dependent entry or departure through the Mermaid channel. Further the Mermaid Base will not suffer operational disadvantages experienced by the adjacent Woodshed Base or nearby Damper Public Wharf in terms of entry and departure draft restrictions.\nThe function and purpose of Berth 1 will be:\n· To service the larger offshore supply boat market on a fast turnaround basis.\n· To receive and offload very heavy ro/ro cargoes up to 1500 tonne delivered by ocean going heavy lift ships and barges.\n· To handle inbound and outbound cargoes related to major offshore pipe lay projects.\n· To receive and efficiently load reel ships used for deep water small diameter pipelay.\nThe wharf will be an earth filled structure with steel sheet pile faces and concrete capping beam surround. Most of the construction will be performed using land based equipment working from the core of the earth filled system.\nMuch effort has gone into a design concept which allows very large cranes (>100 tonne capacity) to operate without restriction on the wharf.\nThe separation between Berth 1 and Berth 2 is such to allow Road Train Triples (the max allowable) to turn unassisted on the wharf.", + "page_start": 14, + "page_end": 14, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "CHAIRMAN'S REPORT\nMermaid Marine made great progress during the year to 30th June 2000, even though trading reflected low levels of activity in the North West. Prospects over recent months have rapidly improved, with a great deal of large project work in prospect. The Prospectus concept of building our business within the triangle of oil and gas reserves found between Timor, Exmouth and Darwin, is proven and has become even more relevant.\nRich in gas, the region is rapidly becoming Australia's powerhouse and the focus of new resource processing industries. In a statement made in only August this year, the Shell Oil Company identified gas as that Company's premier future fuel, due to its high environmental qualifications and portability. The Federal Government, also recognising the environmental advantages of gas, has identified that liquified natural gas in particular, as a greenhouse solution rather than a problem and has effectively exempted the gas industry from Kyoto protocol restraints.\nWoodside Petroleum has announced the signing of Memorandums of understanding for substantial gas contracts to a range of companies planning to establish their production in the Pilbara. At the time of writing this report, firm Letters of Intent were also foreshadowed for substantial increases in LNG production, specifically to Japan and prospects are high for further export sales to China, Singapore and India.\nProviding marine support for such expansion has been our principle source of earnings, but Mermaid will enjoy a larger and more diversified income stream once development of the Base at Dampier is completed. The project, demonstrated in more detail later in this report, will revolutionise our Company and drive significant changes in the way offshore producers are serviced in the North West of Australia.\nCoinciding with a start of Base construction, we were successful in attracting Mr Mark Bradley, formerly Managing Director of Clough Offshore, to join us as Mermaid's Chief Executive. As reported by the Age newspaper, our new Chief Executive has put his money where his mouth is, offering a personal investment of $2 million for equity in our company. Mark has had an extremely successful career with McDermotts and Clough Offshore. He will now drive the development of a much stronger engineering capability at Mermaid, through which, whether in joint venture or alone, we intend to be more closely involved as direct participants in North West Shelf work.", + "page_start": 7, + "page_end": 7, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "G. SLIPWAY.\nAustralia, and particularly the north west is impoverished in terms of infrastructure to service our marine industries. Some of this has been due to a historical link with our recent industrial past. This is now behind us, and Australia has now become a centre of excellence with respect to both new building and ship repair, particularly for high tech and specialty vessels.\nThe Mermaid slipway will be the third such facility on the western half of the continent , with others located at Fremantle and Darwin.\nThe slipway will be a repair only facility, no new building is contemplated. Its capacity is structured to meet the regional steel mono-hulled fleet requirements of some 60 vessels between 200 and 4000 tonne displacement. Fishing industry, marine tourist industry, large private pleasure craft , naval, scientific and law enforcement vessels are a secondary target.\nThe slipway is designed to initially accept vessels up to 2,700 tonnes, a restriction which is set by our current inventory of cradles used to support vessel on the slip. The cradles will be progressively upgraded to ultimately handle 4000 tonne. A later expansion will allow 500 tonne vessels to be side slipped, thereby increasing capacity.\nThe slipway location and orientation on the Base has been chosen to maximize the cost and load bearing benefits of having a very high strength granite bedrock as the best possible foundation.\nThe Mermaid slipway will rank second in terms of capacity on the western half of the continent. Tenix, Fremantle 8,000 tonne, Mermaid Dampier 2,700 tonne rising to 4,000 tonne, Darwin Ship Repair 2,500 tonne. The nearest other facilities are Singapore, Adelaide, Port Moresby or Cairns.\nMermaid has purchased a very large cyclone rated industrial building frame which will be sited beside the slipway and tenanted by Mermaid engineering and companies which will provide ancillary services related to ship repair.\nThe Northwest Shelf is a world scale offshore oil and gas exploration province.\n17", + "page_start": 20, + "page_end": 20, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "BROOME SUPPLY BASE\nMermaid Marine services base at the Port of Broome (Broome Base) commenced operations on 1 February 2000 when the first ship containing drill pipe for Inpex Browse Ltd arrived from Japan.\nAs a result of Mermaid's efforts in establishing the Broome Base, Inpex Browse Ltd., BHP Petroleum and Woodside have used Broome as their base for drilling a total of four (4) offshore wells.\nIt is presently expected that at least six (6) exploration wells will be drilled in the area during 2001. The Base now employs as many as ten (10) staff up from the three (3) who commenced in February 2000. Excellent management and staff competence are the prime factors, which have delivered the smooth start up and continued success at Broome.\nThe Mermaid Broome Supply Base certified Impex, Woodside and BHP Petroleum exploration program during 2000.\nThe base is currently secured on a come and go lease arrangement, located on Port premises adjacent to the wharf gates. Although convenient, with an excellent cyclone proof building, the site has limitations in terms of size and slope. An area more suitable for our long term needs has been optioned from Port authorities and discussions will proceed with our clients this year to determine their precise needs.\nThe success of Browse Basin wells drilled this year, strong developments in the energy sector and the intention of operators to base their 2001 operations in Broome, have encouraged the Board to consider further investment to ensure that capability keeps pace with demand and that we leave no reason for competitors to offer more or better.", + "page_start": 21, + "page_end": 21, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "MERMAID LABOUR AND MANAGEMENT LIMITED\nSAFETY\n20\nDuring 2000 Mermaid Marine formed a new business unit Mermaid Labour and Management Limited. The focus of this unit will be labour supply and industrial relations management to the marine, offshore construction industry and onshore resources projects in the NW of Australia. The Directors and Management of the new entity are very experienced, well known and regarded by the industry in general. The company has high expectations for Mermaid Labour and Management Limited.\nMermaid remains dedicated to ensuring a safe environment in all areas where we operate or have responsibility.\nIn April 2000, following the regular six monthly Quality Assurance audit, the Company's accreditation under AS/NZS/ISO 9002 was reconfirmed. Mermaid's quality assurance and compliance team continues with a continuous day to day effort to improve our health, safety and environmental performance. Stringent charterer requirements, which are a pre requisite of increased vessel usage, must be met to the letter and are the subject of regular and demanding audits. Although time consuming and expensive, we are grateful to certain of the large producers, who while demanding the highest levels of compliance, have also been prepared to give their time, sharing their safety expertise with us and in that way assisting in the very major advances our company has made in this all important area.\nAt the time of writing this report, Mermaid had accumulated 348 days without a Lost Time Injury. A fine achievement and a continuing record.", + "page_start": 23, + "page_end": 23, + "source_file": "ASX_MRM_2000.pdf" + } + ] + }, + { + "references": { + "source_file": "ASX_MRM_2000.pdf", + "query": "What was the budget for the expansion of Dampier Base?", + "target_page": 14, + "target_passage": "a capital budget of $13m", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "BASE EXPANSION WORKS AND ENVIRONMENTAL MANAGEMENT\nWork on Dampier\nBase expansion commenced on 9 October and will be largely complete by June 2001, involving a capital budget of $13m.\nThe principle activities and facility developments involved in the expansion are:", + "page_start": 13, + "page_end": 13, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "OPERATIONS REVIEW\nA slipway initially capable of receiving vessels up to 2,700 tonnes capacity will handle most of the 60 vessels currently working in the region, a considerable number, but one which will rise over coming years. First class engineering facilities have been planned and highly experienced management recruited. Alternative slipways offering comparable capacity are only to be found in Darwin or Fremantle, a sea journey of approximately 1000 miles from this operational region. Australia has emerged as a centre of excellence with respect to vessel repair work, the Dampier facility will both benefit from and protect that valuable reputation.\nRehabilitated land for buildings and storage will finally extend over 17 hectares. The major oilfield services company Halliburton, have been attracted to the base as a tenant and a $1.1m purpose built building is being constructed for their use. Negotiations are also proceeding with other groups who recognise the unique advantages of operating from this strategically positioned Base. Rental income and associated revenues such as plant and labour hire will contribute significantly to the overall economics of the facility.\nProtected moorings for cyclone shelter will be established inside the breakwater for long term lease to local tug operators. The demand arises from serious vessel and crew safety considerations. The Dampier Port Authority are reluctant to see the continued use of cyclone moorings in the Harbour, not only for safety reasons, but for environmental concerns as well. Oil spills are not acceptable under any circumstances and will be avoided whatever the cost. Tug owners share similar concerns, but in addition they need to remain in a position of readiness for crews and equipment to resume their important functions immediately following a cyclonic event. The number of specific purpose spread moorings, detailed on the adjacent plan will total 10 in the first phase of construction, a limit which will be assisted by an ability to remove vessels up to 100 tonnes from the water by wharf crane for tie down on cradles.\nConstruction of the Dampier Base commenced on the 9th October this year, with an expectation that all major elements of the project will be largely completed within 12 months.\nThe 'Clough Challenge' Barge Shallow Water Construction Support Barge in the East Spar Field\n9", + "page_start": 12, + "page_end": 12, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "SEAGOING OPERATIONS\nMermaid operates a fleet of fifteen (15) tugs, workboats and barges, undertaking all forms of offshore activity including exploration support, supply, survey and berthing assist. Lower vessel utilisation during the period allowed an acceleration of scheduled maintenance. Two tugs, Mermaid Commando and Mermaid Chieftan received extensive refits. In both cases the work increased productivity through enhanced bollard pull and consequent earnings.\nSafety was given the highest priority through new monitoring systems and awareness programs. Formalised on the job instruction and training courses have also lifted levels of experience and proficiency across the workforce.\nThe offshore waters and islands adjacent to Dampier, host in excess of 50% of all exploration and development budgets of Australia's offshore oil and gas industry. The Burrup Peninsular where the Base is located is the intended site of major new oil, gas, petrochemical and industrial mineral processing plants. The Port of Dampier is Australia's largest Port as measured by tonnage, but as identified in the 1997 WA Department of Commerce and Trade report, there remains an urgent need for additional marine support infrastructure. Mermaid is now well advanced in our plan to satisfy those needs and onshore work was announced to start on the 9th October 2000. DAMPIER BASE\nSince receiving approval in principle for development of the Dampier Base from the Western Australian Minister for the Environment in February 2000, engineering and general design work in connection with the base proceeded at an accelerated pace.\nThis work, assisted by technical studies and a re-assessment of an increased demand for services arising out of greater expectations for growth in the sector, has led to improvements and expansion of capacity over earlier plans.\nThe Dampier Base will now comprise:-\n·\n·\nAn 'all tides' approach channel to a minimum depth of 6 metres", + "page_start": 11, + "page_end": 11, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "For the years ended December 31,\nBuilding improvements, 2013 = $8,545. Building improvements, 2012 = $9,353. Building improvements, % change = (8.6)%. Suite renovations, 2013 = 7,390. Suite renovations, 2012 = 4,945. Suite renovations, % change = 49.4%. land improvements, 2013 = 53. land improvements, 2012 = 1,374. land improvements, % change = (96.1)%. Boilers and heating equipment, 2013 = 371. Boilers and heating equipment, 2012 = 1,902. Boilers and heating equipment, % change = (80.5)%. appliances, 2013 = 1,188. appliances, 2012 = 808. appliances, % change = 47.0%. Parking lots, 2013 = 133. Parking lots, 2012 = 211. Parking lots, % change = (37.0)%. equipment, 2013 = 211. equipment, 2012 = 237. equipment, % change = (11.0)%. other, 2013 = 209. other, 2012 = 209. other, % change = -%. total capital spend, 2013 = $18,100. total capital spend, 2012 = $19,039. total capital spend, % change = (11.6)%. average number of units outstanding, 2013 = 12,210. average number of units outstanding, 2012 = 11,312. average number of units outstanding, % change = 7.9%. capital spend per unit, 2013 = $1,482. capital spend per unit, 2012 = $1,683. capital spend per unit, % change = (11.9)%\nKillam estimates that $450 per unit of the capital spending relates to maintenance capital, and the remainder relates to value enhancing upgrades. Maintenance capital varies with market conditions and relates to investments that are not expected to lead to an increase in NOI, or increased efficiency, of a building; however, it is expected to extend the life of a building. Examples of maintenance capital include roof and structural repairs and are in addition to regular repairs and maintenance costs that are expensed to NOI. Value enhancing upgrades are investments in the properties that are expected to result in higher rents and/or increased efficiencies. This includes unit and common area upgrades and energy investments, such as natural gas conversions.\n50\nKillam ProPerties inc | 2013", + "page_start": 49, + "page_end": 49, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "OPERATIONS REVIEW\nThe foreshore of King Bay will be redeveloped as part of the Mermaid Marine Dampier Base Expansion works.\nleased facilities to seven third party vessels and protection for three of our own vessels using this technique by the cyclone season in 2001.\nAs more vessels seek protection, additional breakwaters can be constructed and sea room dredged. Each mooring involves a pattern of pin piles drilled into the granite sea floor with four vessel specific mooring lines secured to special attachment points on the vessel.\nMany smaller vessels including Mermaid's will be lifted from the water and tied down on purpose built cradles for cyclones.", + "page_start": 16, + "page_end": 16, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "ENVIRONMENTAL REGULATION\nThe development of the Company's Dampier and Broome\nbases is subject to the approval of the Western Australian Environmental Protection Authority.\nAs at the date of this report the Company had a total of 7,115,000 unissued shares under option as follows: 30 November 2000 Options SHARE OPTIONS\nAs at the date of this report there are outstanding 6,500,000 options to acquire 6,500,000 ordinary shares in the Company at an issue price of 0.75 cents per ordinary share. Each of these options expires on 30 November 2000.\nOn 9 August 2000 the Company announced to the ASX that, subject to shareholder approval", + "page_start": 33, + "page_end": 33, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "Property, Plant, and Equipment\nLand and land improvements, 2003 = $ 23,065. Land and land improvements, 2002 = $ 21,566. Land and land improvements, 2001 = $ 21,678. Buildings, 2003 = 211,005. Buildings, 2002 = 208,124. Buildings, 2001 = 212,352. Machinery and equipment, 2003 = 495,901. Machinery and equipment, 2002 = 494,354. Machinery and equipment, 2001 = 494,458. Construction and equipment installation in progress, 2003 = 9,865. Construction and equipment installation in progress, 2002 = 10,227. Construction and equipment installation in progress, 2001 = 14,247. , 2003 = 739,836. , 2002 = 734,271. , 2001 = 742,735. Less: allowances for depreciation, 2003 = 427,468. Less: allowances for depreciation, 2002 = 381,001. Less: allowances for depreciation, 2001 = 337,764. , 2003 = $ 312,368. , 2002 = $ 353,270. , 2001 = $ 404,971", + "page_start": 46, + "page_end": 46, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "CHALLENGER EXPLORATION\nExploration expenditure totalled $8.8 million during the year comprising $1.8 million of resource development and exploration costs delineating targets outside of the reserve and $7.0 million on underground mining of lodes outside of the reserve. The majority of the mining exploration costs occurred in the first quarter and included portions of 240 and 205 Aminus 2 and 670 Challenger West before they were upgraded to the reserve.", + "page_start": 24, + "page_end": 24, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "MHCs - Capital Spend\nFor the year ended December 31, 2013, Killam spent $2.2 million on water and sewer upgrades, an increase of 22.1% over 2012 due to the installation of several new water systems and upgrades to existing water and sewer infrastructure. This capital work fluctuates from year-to-year with only $1.8 million invested in 2012 but $3.1 million in 2011. the high water upgrade costs in 2013 resulted in the per unit mHc spend being above Killam's expectation of $300 - $400 per year.\nAs with the apartment portfolio, the timing of capital spending changes based on requirements at each community. Killam expects to invest $1 million to $2 million during 2014 on capital improvements across the MHC portfolio.", + "page_start": 51, + "page_end": 51, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "OPERATIONS REVIEW\nTrading for the period commencing 1 July 1999 to 30 June 2000 for Mermaid Marine Australia Ltd ('Company') and its controlled entities, experienced a 43% turnover reduction from last year. The result was almost entirely due to a heavy fall in oil prices, which reached their low of US$10 in February 1999, leading to the lowest level of offshore activity for many years. In September 1999 Mermaid exercised its option to acquire the utility vessel 'Mermaid Achiever' for $3,250,000. Previously the Achiever operated under a bare boat charter.\nIn February 2000 Mermaid received approval in principle from the Western Australian Minister for the Environment for the development of a supply and engineering base at Dampier (Dampier Base). Since that time a detailed environmental management system has been produced for final approval and as a guide to daily environmental management and compliance. Refinements to the design have proceeded, together with the preparation of bid packages and negotiations with Banks for project finance.\nSubsequent to years end, the subscription of a further $5 million from Mr Mark Bradley and Clough Engineering will see an extremely robust balance sheet, with cash on hand approaching $10 million. As construction commences at Dampier, a level of project finance will be arranged providing a comfortable mix of debt and equity and allowing the retention of a significant cash balance.\nThe year saw considerable progress with Base activities at Dampier, Broome and Darwin. They are dealt with in detail under following headings.\nFINANCIAL\nMermaid recorded an after-tax loss for the Period of $207,957. Compared with an after-tax profit for the previous period of $2,454,919. Revenue for the Period was $15,124,774, a decrease of 43% over the previous period. Fixed cost reductions enabled the Company to ride out the market reversal with a minimal loss and positive operating cash before capex of $1.6m. This result, achieved against a major drop in turnover, was possible through a vigorous attack on overheads, which included more beneficial ownership costs, insurance savings, management salary savings, including voluntary sacrifice from certain senior executives in recognition of the tighter conditions. In all the changes contributed approximately $1.5million to the bottom line.", + "page_start": 10, + "page_end": 10, + "source_file": "ASX_MRM_2000.pdf" + } + ] + }, + { + "references": { + "source_file": "ASX_MRM_2000.pdf", + "query": "When did Mermaid Marine Service Base in the Port of Broome start?", + "target_page": 22, + "target_passage": "1 February 2000", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "BROOME SUPPLY BASE\nMermaid Marine services base at the Port of Broome (Broome Base) commenced operations on 1 February 2000 when the first ship containing drill pipe for Inpex Browse Ltd arrived from Japan.\nAs a result of Mermaid's efforts in establishing the Broome Base, Inpex Browse Ltd., BHP Petroleum and Woodside have used Broome as their base for drilling a total of four (4) offshore wells.\nIt is presently expected that at least six (6) exploration wells will be drilled in the area during 2001. The Base now employs as many as ten (10) staff up from the three (3) who commenced in February 2000. Excellent management and staff competence are the prime factors, which have delivered the smooth start up and continued success at Broome.\nThe Mermaid Broome Supply Base certified Impex, Woodside and BHP Petroleum exploration program during 2000.\nThe base is currently secured on a come and go lease arrangement, located on Port premises adjacent to the wharf gates. Although convenient, with an excellent cyclone proof building, the site has limitations in terms of size and slope. An area more suitable for our long term needs has been optioned from Port authorities and discussions will proceed with our clients this year to determine their precise needs.\nThe success of Browse Basin wells drilled this year, strong developments in the energy sector and the intention of operators to base their 2001 operations in Broome, have encouraged the Board to consider further investment to ensure that capability keeps pace with demand and that we leave no reason for competitors to offer more or better.", + "page_start": 21, + "page_end": 21, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "SEAGOING OPERATIONS\nMermaid operates a fleet of fifteen (15) tugs, workboats and barges, undertaking all forms of offshore activity including exploration support, supply, survey and berthing assist. Lower vessel utilisation during the period allowed an acceleration of scheduled maintenance. Two tugs, Mermaid Commando and Mermaid Chieftan received extensive refits. In both cases the work increased productivity through enhanced bollard pull and consequent earnings.\nSafety was given the highest priority through new monitoring systems and awareness programs. Formalised on the job instruction and training courses have also lifted levels of experience and proficiency across the workforce.\nThe offshore waters and islands adjacent to Dampier, host in excess of 50% of all exploration and development budgets of Australia's offshore oil and gas industry. The Burrup Peninsular where the Base is located is the intended site of major new oil, gas, petrochemical and industrial mineral processing plants. The Port of Dampier is Australia's largest Port as measured by tonnage, but as identified in the 1997 WA Department of Commerce and Trade report, there remains an urgent need for additional marine support infrastructure. Mermaid is now well advanced in our plan to satisfy those needs and onshore work was announced to start on the 9th October 2000. DAMPIER BASE\nSince receiving approval in principle for development of the Dampier Base from the Western Australian Minister for the Environment in February 2000, engineering and general design work in connection with the base proceeded at an accelerated pace.\nThis work, assisted by technical studies and a re-assessment of an increased demand for services arising out of greater expectations for growth in the sector, has led to improvements and expansion of capacity over earlier plans.\nThe Dampier Base will now comprise:-\n·\n·\nAn 'all tides' approach channel to a minimum depth of 6 metres", + "page_start": 11, + "page_end": 11, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "OPERATIONS REVIEW\nTrading for the period commencing 1 July 1999 to 30 June 2000 for Mermaid Marine Australia Ltd ('Company') and its controlled entities, experienced a 43% turnover reduction from last year. The result was almost entirely due to a heavy fall in oil prices, which reached their low of US$10 in February 1999, leading to the lowest level of offshore activity for many years. In September 1999 Mermaid exercised its option to acquire the utility vessel 'Mermaid Achiever' for $3,250,000. Previously the Achiever operated under a bare boat charter.\nIn February 2000 Mermaid received approval in principle from the Western Australian Minister for the Environment for the development of a supply and engineering base at Dampier (Dampier Base). Since that time a detailed environmental management system has been produced for final approval and as a guide to daily environmental management and compliance. Refinements to the design have proceeded, together with the preparation of bid packages and negotiations with Banks for project finance.\nSubsequent to years end, the subscription of a further $5 million from Mr Mark Bradley and Clough Engineering will see an extremely robust balance sheet, with cash on hand approaching $10 million. As construction commences at Dampier, a level of project finance will be arranged providing a comfortable mix of debt and equity and allowing the retention of a significant cash balance.\nThe year saw considerable progress with Base activities at Dampier, Broome and Darwin. They are dealt with in detail under following headings.\nFINANCIAL\nMermaid recorded an after-tax loss for the Period of $207,957. Compared with an after-tax profit for the previous period of $2,454,919. Revenue for the Period was $15,124,774, a decrease of 43% over the previous period. Fixed cost reductions enabled the Company to ride out the market reversal with a minimal loss and positive operating cash before capex of $1.6m. This result, achieved against a major drop in turnover, was possible through a vigorous attack on overheads, which included more beneficial ownership costs, insurance savings, management salary savings, including voluntary sacrifice from certain senior executives in recognition of the tighter conditions. In all the changes contributed approximately $1.5million to the bottom line.", + "page_start": 10, + "page_end": 10, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "OPERATIONS REVIEW\nDarwin is serviced by three marine infrastructure elements.\na. A public port adjacent to the main business centre, which is destined to be redeveloped as a cruise ship and tourism precinct .\nb. A group of freehold water front properties on Frances Bay near to the main business center.\nc. A recently commissioned public port and industrial estate at East Arm some 25 km from the main business district.\nDarwin already has an abundance of shore based logistics service providers who operate from onshore industrial estates through publicly owned facilities.\nThe Northern Territory Government has sponsored a study to determine the marine infrastructure deficits of the Darwin area. Mermaid has contributed to the study and is monitoring the subsequent planning processes.\nRegardless of industry trends, Mermaid has a need for a Darwin Base to service and care for Mermaid vessels working in the area. Too often vessels have been demobilised to Dampier at the conclusion of a contract then being required to return to Darwin within days or weeks for another assignment.\nMermaid has decided that needs and opportunities in the north of Australia can be best served by entering a co-operative arrangement with an established Darwin Company. Agreement has therefore been reached with Perkins Shipping Group, who are one of the freehold land owners on Frances Bay.\nPerkins Shipping, established in the 1950s is the major coastal shipping service provider in Australia's north, linking Darwin to mining and aboriginal committees from the Kimberly to Gulf of Carpenteria. Additionally Perkins operate services to East Timor, mining operations in Indonesia, as well as Singapore and East Malaysia. The Perkins and Mermaid businesses are different, but complementary, offering benefits to both. The arrangement with Perkins will give Mermaid well placed office facilities, open storage and waterfront access.\nOur intention is that Darwin become the third and final mainland entreport to service the Northwestern offshore oil and gas industry together with our other strategically placed facilities at Dampier and Broome.\n19", + "page_start": 22, + "page_end": 22, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "G. SLIPWAY.\nAustralia, and particularly the north west is impoverished in terms of infrastructure to service our marine industries. Some of this has been due to a historical link with our recent industrial past. This is now behind us, and Australia has now become a centre of excellence with respect to both new building and ship repair, particularly for high tech and specialty vessels.\nThe Mermaid slipway will be the third such facility on the western half of the continent , with others located at Fremantle and Darwin.\nThe slipway will be a repair only facility, no new building is contemplated. Its capacity is structured to meet the regional steel mono-hulled fleet requirements of some 60 vessels between 200 and 4000 tonne displacement. Fishing industry, marine tourist industry, large private pleasure craft , naval, scientific and law enforcement vessels are a secondary target.\nThe slipway is designed to initially accept vessels up to 2,700 tonnes, a restriction which is set by our current inventory of cradles used to support vessel on the slip. The cradles will be progressively upgraded to ultimately handle 4000 tonne. A later expansion will allow 500 tonne vessels to be side slipped, thereby increasing capacity.\nThe slipway location and orientation on the Base has been chosen to maximize the cost and load bearing benefits of having a very high strength granite bedrock as the best possible foundation.\nThe Mermaid slipway will rank second in terms of capacity on the western half of the continent. Tenix, Fremantle 8,000 tonne, Mermaid Dampier 2,700 tonne rising to 4,000 tonne, Darwin Ship Repair 2,500 tonne. The nearest other facilities are Singapore, Adelaide, Port Moresby or Cairns.\nMermaid has purchased a very large cyclone rated industrial building frame which will be sited beside the slipway and tenanted by Mermaid engineering and companies which will provide ancillary services related to ship repair.\nThe Northwest Shelf is a world scale offshore oil and gas exploration province.\n17", + "page_start": 20, + "page_end": 20, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "F. ONSHORE LAND RECLAMATION.\nLike our neighbours, much of the Mermaid site is below the prescribed storm surge level, or needs some degree of earthworks to maximize its value. Currently 8 of the 17 ha of the area is suitable for development in its present state.\nThe spoil produced from dredging will allow Mermaid to achieve full utilization of the site at a fraction of the cost of importing fill from elsewhere.\nConsiderable effort has gone into anticipating the future direction of the Base. Planning services such as traffic flows, land allocation and security, as well as fulfilling the many and complex regulatory requirements related to health, safety, quarantine, environmental management, dust, dangerous goods and hazchem materials have been the subject of considerable study prior to this implementation stage.\nMERMAID MARINE AUSTRALIA LIMITED\n13\nOPERATIONS REVIEW", + "page_start": 16, + "page_end": 20, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "E. CYCLONE MOORINGS.\nThe extent of the cyclone problem in Australia's north and north west was emphasised when Cyclone Tracey struck Darwin in 1974. The most powerful cyclone to cross the Australian coast was Cyclone Vance in 1999, which passed near Dampier, destroying large parts of the towns of Onslow and Exmouth further to the south.\nThe problem is acute, particularly in the area between Exmouth and Port Hedland, which suffers cyclones of an intensity and frequency as high as anywhere in the world. The Mermaid Base is typically on cyclone alert three times per season. The season is November to April.\nTo date there have been three options available to vessel owners when a cyclone approaches:.\n· Run to sea\n· Take refuge with crew onboard, on a mooring in the most sheltered location available such as the Dampier Archipelago or the Monte Bello Islands.\n· Construct a cyclone shelter.\nThere are serious personal safety and environmental considerations related to Options 1 and 2 and it is obvious that best practice universally adopted by large responsible Companies can be satisfied in this way.\nOnly Woodside at Dampier and BHP at Port Hedand have taken the step of building shelters which provides protection to 12 of the region's 60 vessels and this at very considerable cost.\nMermaid has undertaken significant engineering work on the placing of vessels on partially sheltered spread moorings, allowing the vessels to be secured near to shore and the crews demobilized to take care of their families and attend to household cyclone preparation.\nMermaid is taking a leadership role with a technical solution which will lead to wider adoption as vessel owners and the insurance industry fully value the arrangements. Mermaid will provide\nMERMAID MARINE AUSTRALIA LIMITED\n12", + "page_start": 15, + "page_end": 15, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "CHAIRMAN'S REPORT\nImmediately following Mark Bradley's decision, his old employer, Clough Engineering, also expressed a desire to become a shareholder, subscribing $3 million for new equity. The influence that the direct involvement of Mark Bradley and Clough Engineering will have in our company's future should not be underestimated. At this time when we welcome Mark as a Director and shareholder, we are also pleased to announce the appointment of Mr Richard Reid, finance\nDirector of the Clough Group and a highly experienced and talented executive. Richard has appointed an alternate director, Mr Chris Sutherland, a senior Clough Executive, with engineering qualifications and associated business skills to assist him.\nCaptain Jim Carver, Mermaid's founder continues to play a significant role in Mermaid's operations, paying particular attention to our business at sea. Under 20 years of Jim's leadership, Mermaid developed an enviable reputation as a 'can do' company, and in our drive for new engineering expertise and professionalism, we have no intention of allowing that attitude to be lost.\nLast year we identified Broome as our next strategic position. No oil and gas work had been supported out of Broome for seventeen years and with the valuable cooperation and assistance of the Broome Port Authority, we secured Inpex, the large Japanese resource company as our first client. The base was then established early this year.\nA new focus has developed in the Browse Basin and it is pleasing to report that after only seven months operation, our Base is profitable, housing Inpex, BHP, Woodside and Sedco in support of their current drilling programs. All the holes drilled from the Broome Base have been designated as commercial finds by the explorers and the very major increase in the reserves at Brecknock, Woodside's permit 500 kilometres north of Broome creates optimism for future production based in the Broome area.", + "page_start": 7, + "page_end": 8, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "ANNU AL REPOR T 2000\n2000\nT\nREPOR\nAL\nANNU\nMERMAID MARINE AUSTRALIA LIMITED\nACN 083 185 693", + "page_start": 0, + "page_end": 0, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "CHAIRMAN'S REPORT\nDarwin was next on our list, enabling involvement in Timor Sea oil and gas activity. The Bayu Undan project operated by Phillips, is well advanced and will impact Darwin's offshore activity quite soon. Pursuing the formula for a strategic sea/land interface, we reached agreement with Perkins Shipping in Darwin, to set up an office at their Frances Drive facility. Perkins Shipping is synonymous with Darwin's history. Set up by V.B. Perkins in the late 40's, it has grown to significant size, operating its ships across the top of Australia and into South East Asia. There are many synergies which Mermaid shares with Perkins and we look forward to developing our Darwin business in close association with that fine old Company.\nOur ambitions for the support of the oil and gas industry now go beyond bases and vessels. Early in the current financial year, Mermaid acquired 50% of the OIS MOC Joint Venture Pty Ltd, to be paid for by the issue of 800,000 Mermaid shares. OIS MOC owns the highly successful labour hire business operated by Kevin Ponga and Rick De Franck. Kevin Ponga is now General Manager of Mermaid Labour & Management Pty Limited and Mr De Franck becomes a Director. With their reputation and talent added to Mermaid's experienced team, this labour hire company has become a significant force and can be expected to be in the final when major labour hire contracts are let.\n5\n6\nLabour hire is heavily dependent upon the quality of the personnel database and our intention has been announced to offer training at Dampier, Broome and Darwin for those who live in the North West and wish to work in the offshore industry there. Planning for this new initiative is well advanced and we expect to be running courses for prospective offshore employees in coming months. Although the training program is not directed to any particular community group, it has been encouraging to have active support from Aboriginal leaders in the Kimberley region.\nWorld prospects for energy, the need for Australia to add value to its resources, Government initiatives for the support of these activities and environmental imperatives, heavily favour gas, giving every indication that Mermaid Marine's development push has been extremely timely.\nIt is also important to draw attention to increased efforts in terms of health, safety and environmental protection. Our workplace is largely at sea, where operations involve natural dangers and the safety of our people is paramount. We also work in a setting where the tasks in which we are involved cast us in the role of environmental caretakers of the sea and coastline.", + "page_start": 8, + "page_end": 9, + "source_file": "ASX_MRM_2000.pdf" + } + ] + }, + { + "references": { + "source_file": "Word QS.pdf", + "query": "How do I create a new document in Word?", + "target_page": 2, + "target_passage": "Just select File > New", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Create something\nBegin with a Blank document to get right to work. Or start with a template to save yourself time and steps. Just select File > New , and then select or search for the template you want.", + "page_start": 1, + "page_end": 1, + "source_file": "Word QS.pdf" + }, + { + "text": "To enter text : To save a new document :\n1. Click the cell pointer on the desired cell and 1. Click on the File Tab and select Save As\ntype the required information 2. Press , an arrow key or to 2. Locate the storage folder in the Navigation pane\nconfirm the data entry and to move the cell 3. Type a File name and click on [Save]\npointer to another cell\nITTraining@sgul.ac.uk\nPage 3\nSt. George's Information Services", + "page_start": 6, + "page_end": 6, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Instructions you can edit, share, and print\nUnlike old-school user guides, this doc is yours to tailor exactly for your needs. Reading it will teach you some basics about Word, but this document isn't just for reading. It's for editing too, so you can learn by doing.\nFor practice using Word features, watch for Try it text in red throughout this document.\nTime saver: If you've only got a minute and you want to see how this works, watch this Video: Welcome to Word.", + "page_start": 0, + "page_end": 0, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "Share your work with others\nTo invite others to view or edit your documents, select the Share button in the top right corner of the app window. Then, you can choose to share a link to your document or send invitations directly to specific people. If someone doesn't have Word, they can use the free Word for the Web app to edit and comment.", + "page_start": 3, + "page_end": 3, + "source_file": "Word QS.pdf" + }, + { + "text": "Try it: Get help:\n1. Go to Tell me what you want to do at the top of the window.\n2. Type what you want to do.\nFor example, type:\n Add watermark to quickly get to the watermark command.\n Help to go to Word help.\n Training to see the list of Word training courses.\n What's new for a list of the most recent updates to Word", + "page_start": 7, + "page_end": 7, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "Share and collaborate\nWith this document saved in OneDrive, you can share it with others. They don't even need Word to open it.\nTry it: Select Share , and send a link to this document. (keyboard shortcut - Alt+F+Z or Alt+Z+S)\nYou can send the link by typing someone's email address or by copying the link and pasting it into a message or chat. If you want them to read the document but not edit it, set their permission to view-only.\nIf they don't have Word, the document will open in their web browser, in Word Online.", + "page_start": 2, + "page_end": 2, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "Save this for later, access it anywhere\nWhen you save this document in OneDrive, you'll be able to open it anywhere: on your computer, tablet, or phone. Your changes will be saved automatically.\nTry it: Select File > Save As , and then select OneDrive and give this document a name.\nIf you sign in to Office 365 on another device, this document will be in your list of recent files. You can pick up where you left off… even if you left the document open on the computer you're using now.", + "page_start": 1, + "page_end": 1, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "HrCreateDoc\nPublisher calls the HrCreateDoc method to specify the creation of a new, empty fixedformat document.\nC++ HRESULT HrCreateDoc( const WCHAR* wzDocExFile );\nPublisher calls the HrCreateDoc method at the beginning of the fixed-format export process to specify the creation of an empty fixed-format document. The wzDocExFile parameter specifies a name for the output file to which to write the fixed-format document.\nFor an add-in implementation, Publisher calls HrCreateDoc with the file name that the add-in provided in the call to the ExportToFixedFormat method in the Microsoft Office object model. However, because add-ins typically provide configuration UI to allow the user to specify an output file name, the add-in could disregard this file name during the export process.\nFor Microsoft Office applications that require the add-in to paginate the document, HrCreateDoc is called twice, once at the start of the pagination-calling sequence, and again after the add-in has paginated the document. For more information, see the descriptions for the HrSetPageHeightForPagination method and the HrGetPageBreaks method.", + "page_start": 12, + "page_end": 12, + "source_file": "office-pdf.pdf" + }, + { + "text": "Exercise 1: Create a new OWL Ontology\n_____________________________________________________________________________________\n1. Start Protégé. When Protégé opens for the first time each day it puts up a screen of all the available plugins. You can also bring this up at any time by using File>Check for plugins. You won't need any plugins at this point of the tutorial so just click the Not now button.\n2. The Protégé user-interface consists of several tabs such as Active ontology, Entities, etc. When you start Protégé you should be in the Active Ontology tab. This is for overview information about the entire ontology. Protégé always opens with a new untitled ontology you can start with. Your ontology should have an IRI something like: http://www.semanticweb.org/yourname/ontologies/2020/4/untitled-ontology27 Edit the name of the ontology (the part after the last '/' in this case untitled-ontology-27) and change it to something like PizzaTutorial. Note: the Pizza ontology IRIs shown below (e.g., figure 4.3) show the IRI after I edited the default that Protégé generated for me. Your IRI will look different and will be based on your name or the name of your organization.\n3. Now you want to save your new ontology. Select File>Save. This should bring up a window that says: Choose a format to use when saving the 'PizzaTutorial' ontology. There is a drop down menu of formats to use. The default RDF/XML Syntax should be selected by clicking the OK button. This should bring up the standard dialog your operating system uses for saving files. Navigate to the folder you want to use and then type in the file name, something like Pizza Tutorial and select Save.", + "page_start": 10, + "page_end": 10, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "1.1 Licensing\nThis document is freely available under the Creative Commons Attribution-ShareAlike 4.0 International Public License. I typically distribute it as a PDF but if you want to make your own version send me an email and I will send you the Word version. For details on licensing see:\nhttps://creativecommons.org/licenses/by-sa/4.0/legalcode", + "page_start": 4, + "page_end": 4, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + } + ] + }, + { + "references": { + "source_file": "Word QS.pdf", + "query": "Where can I find other Microsoft quick start guides?", + "target_page": 4, + "target_passage": "To download our free Quick Start Guides for your other favorite apps, go to https://go.microsoft.com/fwlink/?linkid=2008317.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Get other Quick Start guides\nTo download our free Quick Start Guides for your other favorite apps, go to https://go.microsoft.com/fwlink/?linkid=2008317.", + "page_start": 3, + "page_end": 3, + "source_file": "Word QS.pdf" + }, + { + "text": "Quick Start Guide\nNew to Word? Use this guide to learn the basics.", + "page_start": 0, + "page_end": 0, + "source_file": "Word QS.pdf" + }, + { + "text": "Try it: Get help:\n1. Go to Tell me what you want to do at the top of the window.\n2. Type what you want to do.\nFor example, type:\n Add watermark to quickly get to the watermark command.\n Help to go to Word help.\n Training to see the list of Word training courses.\n What's new for a list of the most recent updates to Word", + "page_start": 7, + "page_end": 7, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "Other publications\n/SM590000 Tivoli Storage Manager for AIX Administrator's Guide, GC32-0768\n/SM590000 Tivoli Storage Manager for Windows Administrator's Guide , GC32-0782\n/SM590000 Tivoli Storage Manager for Windows Quick Start, GC32-0784\n/SM590000 UNIX System Services Command Reference , SC28-1892\n/SM590000 z/OS MVS Initialization and Tuning Reference , SA22-7592\n/SM590000 z/OS MVS System Commands , SA22-7627", + "page_start": 433, + "page_end": 433, + "source_file": "sg246915.pdf" + }, + { + "text": "Online resources\nThese websites are also relevant as further information sources:\n/SM590000 DB2 11 for z/OS information http://www.ibm.com/software/db2zos/library.html\n/SM590000\nIBM Content Manager OnDemand production information\nhttp://www.ibm.com/software/products/us/en/ondemand\n/SM590000 Content Manager OnDemand for i Knowledge Center\nhttp://www.ibm.com/support/knowledgecenter/SSB2EG/welcome\n/SM590000 Content Manager OnDemand for Multiplatform Knowledge Center http://www.ibm.com/support/knowledgecenter/SSEPCD/welcome\n/SM590000 Content Manager OnDemand for z/OS Knowledge Center\nhttp://www.ibm.com/support/knowledgecenter/SSQHWE/welcome\n/SM590000 Ricoh website for Infoprint product information http://rpp.ricoh-usa.com/\n/SM590000 IBM System i Navigator and IBM Navigator for i information\nhttp://www.ibm.com/systems/i/software/navigator/\n/SM590000 IBM Tivoli Storage Manager home page http://www.ibm.com/software/products/en/tivostormana\n/SM590000 z/OS information\nhttp://www.ibm.com/systems/z/os/zos/\n/SM590000 Creating PDF Indexing Parameters Using Floating Triggers http://ibm.co/1FHsXDq\n/SM590000 Understanding the ACIF Input Exit for DB2 Content Manager OnDemand http://ibm.co/1UUcCT0", + "page_start": 433, + "page_end": 434, + "source_file": "sg246915.pdf" + }, + { + "text": "Portal Version 4.3 -User Manual\nTable of Contents\non the EDP ................................................................................ 20. 3.1.5, 2 = . 3.1.6, 1 = How to switch to another User Language ..................................................................... 21. 3.1.6, 2 = . 3.1.7, 1 = How to search for EDP Site Content .............................................................................. 22. 3.1.7, 2 = . 3.1.8, 1 = How to Search for Datasets by Data Category .............................................................. 23. 3.1.8, 2 = . 3.1.9, 1 = How to Search for Datasets by Keyword ....................................................................... 25. 3.1.9, 2 = . 3.2", + "page_start": 1, + "page_end": 1, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "10.Reboot the VMs:\n0:00:02.605 ***** skipping: [mstnode01.domain.example.com] skipping: [wrknode01.domain.example.com] skipping: [wrknode02.domain.example.com] PLAY [Initialization Checkpoint Start] **************************************************************************************** TASK [Set install initialization 'In Progress'] **************************************************************************************** Thursday 28 November 2019 20:00:37 +0000 (0:00:00.268)", + "page_start": 148, + "page_end": 148, + "source_file": "sg248459.pdf" + }, + { + "text": "Contents\n3.2.2 Create, Start, Add new and View GHG inventory year ................................................. 8. 3.2.3 Initial screen / menu tab of the NFP, PM and SE ........................................................ 13, 1 = 3.2.3 Initial screen / menu tab of the NFP, PM and SE ........................................................ 13. , 1 = 3.2.4 How to log out .............................................................................................................. 13. 3.3 User management ................................................................................................................ 14, 1 = 3.3 User management", + "page_start": 1, + "page_end": 1, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "Exercise 34: Write Your First SWRL Rule\n_____________________________________________________________________________________\n1. To begin with navigate to or create the SWRLTab. If it doesn't already exist use Window>Tabs>SWRLTab to create and select it. If you don't have the SWRLTab under the Window>Tabs menu then use File>Check for plugins and select the SWRLTab plugin. Remember ifyou do this you need to restart Protégé for the plugin to be available.\n2. The SWRLTab is divided into two main views and then some buttons on the bottom of the tab that relate to DROOLS. The question of when and how to use DROOLS confuses many new users but there is a simple answer: don't use it! 11 As you get more experience with SWRL you will start to understand how and when DROOLS is used but for beginners the answer is simple. Think of all those DROOLS buttons as things for power users only. You don't need to use them at all. That is why we installed the Pellet reasoner in section 4.2. The Pellet reasoner supports SWRL and when you run the reasoner it will also automatically run any SWRL rules you have. See the bibliography for a paper on DROOLS.\n3. Click on the New button at the bottom of the top view. The other buttons should be grayed out since they only apply if you have at least one rule written. This will give you a new pop-up window to write your rule. In the Name field at the top call the rule: HotDiscountRule. You can skip the comment but if you want to add a comment it is a good habit to get into and you can write something like: Provide a special discount for customers who prefer hot pizzas.", + "page_start": 73, + "page_end": 73, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "Other publications\nThese publications are also relevant as further information sources:\n/SM590000 Adobe Press, Adobe Type 1 Font Format, Addison-Wesley, 1990, ISBN 0201570440\n/SM590000 DFSMS Object Access Method Planning, Installation, and Storage Administration Guide for Object Support , SC35-0426\n/SM590000 IBM Content Manager OnDemand Messages and Code, SC19-3356\n/SM590000 IBM Content Manager OnDemand - Distribution Facility Installation and Reference , SC19-3358\n/SM590000 IBM Content Manager OnDemand - Web Enablement Kit Implementation Guide , SC19-3353\n/SM590000 IBM Content Manager OnDemand - Windows Client Customization Guide , SC19-3357\n/SM590000 Content Manager OnDemand for i - Planning and Installation Guide , SC19-2790\n' Copyright IBM Corp. 2003, 2015. All rights reserved.\n409\n410\nIBM Content Manager OnDemand Guide", + "page_start": 432, + "page_end": 433, + "source_file": "sg246915.pdf" + } + ] + }, + { + "references": { + "source_file": "Word QS.pdf", + "query": "How to connect to my Microsoft account from Word?", + "target_page": 2, + "target_passage": " Click File > Account to sign in with your Microsoft account", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Access files anywhere\nNeed to work on the go and across different devices? Click File > Account to sign in with your Microsoft account and access your recently used files anywhere, on any device, through seamless integration between Office, OneDrive, OneDrive for Business, and SharePoint.", + "page_start": 1, + "page_end": 1, + "source_file": "Word QS.pdf" + }, + { + "text": "Get free training, tutorials, and videos for Office\nReady to dig deeper into the capabilities that Word has to offer? Visit https://go.microsoft.com/fwlink/?linkid=871123 to explore our free training options.", + "page_start": 3, + "page_end": 3, + "source_file": "Word QS.pdf" + }, + { + "text": "Try it: Get help:\n1. Go to Tell me what you want to do at the top of the window.\n2. Type what you want to do.\nFor example, type:\n Add watermark to quickly get to the watermark command.\n Help to go to Word help.\n Training to see the list of Word training courses.\n What's new for a list of the most recent updates to Word", + "page_start": 7, + "page_end": 7, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "Share your work with others\nTo invite others to view or edit your documents, select the Share button in the top right corner of the app window. Then, you can choose to share a link to your document or send invitations directly to specific people. If someone doesn't have Word, they can use the free Word for the Web app to edit and comment.", + "page_start": 3, + "page_end": 3, + "source_file": "Word QS.pdf" + }, + { + "text": "Share and collaborate\nWith this document saved in OneDrive, you can share it with others. They don't even need Word to open it.\nTry it: Select Share , and send a link to this document. (keyboard shortcut - Alt+F+Z or Alt+Z+S)\nYou can send the link by typing someone's email address or by copying the link and pasting it into a message or chat. If you want them to read the document but not edit it, set their permission to view-only.\nIf they don't have Word, the document will open in their web browser, in Word Online.", + "page_start": 2, + "page_end": 2, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "Save this for later, access it anywhere\nWhen you save this document in OneDrive, you'll be able to open it anywhere: on your computer, tablet, or phone. Your changes will be saved automatically.\nTry it: Select File > Save As , and then select OneDrive and give this document a name.\nIf you sign in to Office 365 on another device, this document will be in your list of recent files. You can pick up where you left off… even if you left the document open on the computer you're using now.", + "page_start": 1, + "page_end": 1, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "Word\nWord PDF Accessibility", + "page_start": 0, + "page_end": 0, + "source_file": "office-pdf.pdf" + }, + { + "text": "See what's new in Office\nExplore the new and improved features in Word and the other Office apps. Visit https://go.microsoft.com/fwlink/?linkid=871117 for more information.", + "page_start": 3, + "page_end": 3, + "source_file": "Word QS.pdf" + }, + { + "text": "Availability\nThe information in this article is applicable to the following versions of Word.\nWord for Windows Version 2408 and later.\nWord for Mac Version 16.89 and later.\nWord for iOS Version 2.89 and later.\nWord for Android Build 16.0.18025.XXXXX or later.\nWord for the web Build 16.0.18025.XXXXX or later.\nIt is available to customers with Office 2024 or Office LTSC 2024 and to customers with a Microsoft 365 subscription on Current Channel or Monthly Enterprise Channel. For customers with a Microsoft 365 subscription on Semi-Annual Enterprise Channel it will be available on January 14, 2025.", + "page_start": 60, + "page_end": 60, + "source_file": "office-pdf.pdf" + }, + { + "text": "Get other Quick Start guides\nTo download our free Quick Start Guides for your other favorite apps, go to https://go.microsoft.com/fwlink/?linkid=2008317.", + "page_start": 3, + "page_end": 3, + "source_file": "Word QS.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_HRL_2004.pdf", + "query": "What are the products of Hormel Foods Corporation?", + "target_page": 4, + "target_passage": "meat and other food product", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "(a) General Development of Business\nHormel Foods Corporation, a Delaware corporation, was founded by George A. Hormel in 1891 in Austin, Minnesota, as George A. Hormel & Company. The Company started as a processor of meat and food products and continues in this line of business. The Company name was changed to Hormel Foods Corporation on January 31, 1995. The Company is primarily engaged in the production of a variety of meat and food products and the marketing of those products throughout the United States. Although pork and turkey remain the major raw materials for Hormel products, the Company has emphasized for several years the manufacture and distribution of branded, consumer packaged items rather than the commodity fresh meat business.\nThe Company's branding strategy led to the development of a joint venture between Hormel Foods Corporation and Excel Corporation, a wholly owned subsidiary of Cargill Incorporated. This joint venture began marketing and selling nationally branded fresh case ready beef and pork under the existing HORMEL ALWAYS TENDER brand name in fiscal year 2003. This 50 percent owned joint venture, named Precept Foods LLC, is based in Austin, Minn.\nIn fiscal 2001, the Jennie-O Turkey Store (JOTS) business was formed as a result of merging the Company's existing Jennie-O Foods, Inc. business with the operations of The Turkey Store Company, which was acquired in the second quarter of fiscal 2001. The Turkey Store Company was a turkey processing business headquartered in Barron, Wisconsin. The merged JOTS operation is currently the largest turkey processor in the world. JOTS\nmarkets its turkey products through its own sales force and independent brokers.\nThe acquisitions of Diamond Crystal Brands Nutritional Products in fiscal 2001 and the Century Foods International business in July of fiscal 2003 strengthened the Company's presence in the nutritional food products and supplements market. The Company currently operates as one of the largest companies providing nutritional products to the U.S. healthcare industry.\nThe Company acquired the Diamond Crystal Brands business from Imperial Sugar Co. in December of fiscal 2003. Diamond Crystal Brands packages and sells various sugar, sugar substitute, salt and pepper products, savory products, drink mixes and dessert mixes to retail and foodservice customers.", + "page_start": 2, + "page_end": 3, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "HORMEL FOODS CORPORATION\n(Exact name of registrant as specified in its charter)", + "page_start": 1, + "page_end": 1, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "Form 10-K (NYSE:HRL)\nPublished: January 23rd, 2004\nPDF generated by stocklight.com\nUse these links to rapidly review the document HORMEL FOODS CORPORATION TABLE OF CONTENTS", + "page_start": 0, + "page_end": 1, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "Patents and Trademarks\nThere are numerous patents and trademarks that are important to the Company's business. The Company holds seven foreign and 47 U.S. issued patents. Some of the trademarks are registered and some are not. In recognition of the importance of these assets, the Company created a subsidiary, Hormel Foods, LLC, in 1998 to create, own, maintain and protect most of the Company's trademarks and patents. Some of the more significant owned or licensed trademarks used in the Company's segments are:\nHORMEL, ALWAYS TENDER, AMERICAN CLASSICS, AUSTIN BLUES, BLACK LABEL, CARAPELLI, CHI-CHI'S, CURE 81, CUREMASTER, DAN'S PRIZE, DIAMOND CRYSTAL, DI LUSSO, DINTY MOORE, DUBUQUE, EL TORITO, FAST 'N EASY, HERB-OX, HERDEZ, HOMELAND, HOUSE OF TSANG, JENNIE-O TURKEY STORE, KID'S KITCHEN, LAYOUT, LITTLE SIZZLERS, MARRAKESH EXPRESS, MARY KITCHEN, OLD SMOKEHOUSE, PATAK'S, PELOPONNESE, PILLOW PACK, QUICK MEAL, RANGE BRAND, ROSA GRANDE, SANDWICH MAKER, SPAM, STAGG, SWEET THING, THICK & EASY and WRANGLERS.", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "FINANCIAL STATEMENTS\nThe following consolidated financial statements of Hormel Foods Corporation included in the Annual Stockholders' Report for the Registrant to its stockholders for the year ended October 25, 2003, are incorporated herein by reference in Item 8 of Part II of this report:\nConsolidated Statements of Financial Position -October 25, 2003, and October 26, 2002.\nConsolidated Statements of Operations -Years Ended October 25, 2003, October 26, 2002 and October 27, 2001.\nConsolidated Statements of Changes in Shareholders' Investment -Years Ended October 25, 2003, October 26, 2002, and October 27, 2001.\nConsolidated Statements of Cash Flows -Years Ended October 25, 2003, October 26, 2002, and October 27, 2001.\nNotes to Financial Statements -October 25, 2003.", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "(a) General Development of Business\nInternationally, the Company markets its products through Hormel Foods International Corporation (HFIC), a wholly owned subsidiary. HFIC has a presence in the international marketplace through joint ventures and placement of personnel in strategic foreign locations such as China, Spain, and the Philippines. HFIC also has a global presence with minority positions in food companies in Spain (Campofrio Alimentacion S.A., 15% holding) and the Philippines (Purefoods-Hormel, 40% holding).\nThe Company has not been involved in any bankruptcy, receivership or similar proceedings during its history. Substantially all of the assets of the Company have been acquired in the ordinary course of business.\nThe Company had no significant change in the type of products produced or services rendered, nor in the markets or methods of distribution since the beginning of the fiscal year.", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "HORMEL FOODS CORPORATION\nBy: /s/ JOEL W. JOHNSON\nJOEL W. JOHNSON Chairman of the Board,\nPresident and Chief Executive Officer\nDate: January 23, 2004\nPursuant to the requirements of the Securities Exchange Act of 1934, this report has been signed below by the following persons on behalf of the Registrant and in the capacities and on the dates indicated. Each person whose signature to this report on Form 10-K appears below hereby constitutes and appoints each of Michael J. McCoy, Jody H. Feragen and Mark P. Kalvoda as his or her true and lawful attorney-in-fact and agent, with full power of substitution, to sign on his or her behalf individually and in the capacity stated below and to perform any acts necessary to be done in order to file the Annual Report on Form 10-K and all amendments to this report on Form 10-K, and any and all instruments or documents filed as part of or in connection with this report on Form 10-K or the amendments hereto, and each of the undersigned does hereby ratify and confirm all that said attorney-in-fact and agent, or his substitutes, shall do or cause to be done by virtue hereof.", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "FINANCIAL STATEMENT SCHEDULES\nThe following consolidated financial statement schedule of Hormel Foods Corporation required pursuant to Item 15(d) is submitted herewith:", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "Item 2. PROPERTIES\nHormel Foods Corporation, 1 = . Hormel Foods Corporation, 2 = . Slaughtering and Processing Plants, 1 = . Slaughtering and Processing Plants, 2 = . Austin, Minnesota, 1 = 1,292,000. Austin, Minnesota, 2 = Owned. Fremont, Nebraska, 1 = 655,000. Fremont, Nebraska, 2 = Owned. Processing Plants, 1 = . Processing Plants, 2 = . Algona, Iowa, 1 = 153,000. Algona, Iowa, 2 = Owned. Aurora, Illinois, 1 = 141,000. Aurora, Illinois, 2 = Owned. Beloit, Wisconsin, 1 = 339,000. Beloit, Wisconsin, 2 = Owned. Ft. Dodge, Iowa, 1 = 17,000. Ft. Dodge, Iowa, 2 = Owned", + "page_start": 6, + "page_end": 6, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "HORMEL FOODS CORPORATION\nHormel Foods Corporation Operators' Shares Incentive Compensation Plan. (Incorporated by Reference to Appendix A to Hormel's definitive Proxy Statement filed on December 30, 1997, File No. 001-02402.). 10.3 (1)(3), 1 = Hormel Foods Corporation Supplemental Executive Retirement Plan (2002 Restatement.) (Incorporated by Reference to Exhibit 10.3 to Hormel's Annual Report on Form 10-K for the fiscal year ended October 26, 2002, file No. 001-02402.). 10.4 (1)(3), 1 = Hormel Foods Corporation 2000 Stock Incentive Plan. (Incorporated by Reference to Exhibit A to Hormel's definitive Proxy Statement filed on December 30, 1999, File No. 001-02402.)\n(1) Document has previously been filed with the Securities and Exchange Commission and is incorporated herein by reference.\n(2) These Exhibits transmitted via EDGAR.\n(3) Management compensatory plan", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_HRL_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_HRL_2004.pdf", + "query": "Where are Hormel Foods Corporation plants located? ", + "target_page": 5, + "target_passage": "has plants in Austin, Minnesota; Fremont, Nebraska; and Beijing, China", + "chunk_present": { + "presence": true, + "index": 7 + } + }, + "top_chunk": [ + { + "text": "Item 2. PROPERTIES\nHormel Foods Corporation, 1 = . Hormel Foods Corporation, 2 = . Slaughtering and Processing Plants, 1 = . Slaughtering and Processing Plants, 2 = . Austin, Minnesota, 1 = 1,292,000. Austin, Minnesota, 2 = Owned. Fremont, Nebraska, 1 = 655,000. Fremont, Nebraska, 2 = Owned. Processing Plants, 1 = . Processing Plants, 2 = . Algona, Iowa, 1 = 153,000. Algona, Iowa, 2 = Owned. Aurora, Illinois, 1 = 141,000. Aurora, Illinois, 2 = Owned. Beloit, Wisconsin, 1 = 339,000. Beloit, Wisconsin, 2 = Owned. Ft. Dodge, Iowa, 1 = 17,000. Ft. Dodge, Iowa, 2 = Owned", + "page_start": 6, + "page_end": 6, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "(a) General Development of Business\nHormel Foods Corporation, a Delaware corporation, was founded by George A. Hormel in 1891 in Austin, Minnesota, as George A. Hormel & Company. The Company started as a processor of meat and food products and continues in this line of business. The Company name was changed to Hormel Foods Corporation on January 31, 1995. The Company is primarily engaged in the production of a variety of meat and food products and the marketing of those products throughout the United States. Although pork and turkey remain the major raw materials for Hormel products, the Company has emphasized for several years the manufacture and distribution of branded, consumer packaged items rather than the commodity fresh meat business.\nThe Company's branding strategy led to the development of a joint venture between Hormel Foods Corporation and Excel Corporation, a wholly owned subsidiary of Cargill Incorporated. This joint venture began marketing and selling nationally branded fresh case ready beef and pork under the existing HORMEL ALWAYS TENDER brand name in fiscal year 2003. This 50 percent owned joint venture, named Precept Foods LLC, is based in Austin, Minn.\nIn fiscal 2001, the Jennie-O Turkey Store (JOTS) business was formed as a result of merging the Company's existing Jennie-O Foods, Inc. business with the operations of The Turkey Store Company, which was acquired in the second quarter of fiscal 2001. The Turkey Store Company was a turkey processing business headquartered in Barron, Wisconsin. The merged JOTS operation is currently the largest turkey processor in the world. JOTS\nmarkets its turkey products through its own sales force and independent brokers.\nThe acquisitions of Diamond Crystal Brands Nutritional Products in fiscal 2001 and the Century Foods International business in July of fiscal 2003 strengthened the Company's presence in the nutritional food products and supplements market. The Company currently operates as one of the largest companies providing nutritional products to the U.S. healthcare industry.\nThe Company acquired the Diamond Crystal Brands business from Imperial Sugar Co. in December of fiscal 2003. Diamond Crystal Brands packages and sells various sugar, sugar substitute, salt and pepper products, savory products, drink mixes and dessert mixes to retail and foodservice customers.", + "page_start": 2, + "page_end": 3, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "HORMEL FOODS CORPORATION\n(Exact name of registrant as specified in its charter)", + "page_start": 1, + "page_end": 1, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "(a) General Development of Business\nInternationally, the Company markets its products through Hormel Foods International Corporation (HFIC), a wholly owned subsidiary. HFIC has a presence in the international marketplace through joint ventures and placement of personnel in strategic foreign locations such as China, Spain, and the Philippines. HFIC also has a global presence with minority positions in food companies in Spain (Campofrio Alimentacion S.A., 15% holding) and the Philippines (Purefoods-Hormel, 40% holding).\nThe Company has not been involved in any bankruptcy, receivership or similar proceedings during its history. Substantially all of the assets of the Company have been acquired in the ordinary course of business.\nThe Company had no significant change in the type of products produced or services rendered, nor in the markets or methods of distribution since the beginning of the fiscal year.", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "Products and Distribution\nThrough HFIC, the Company markets its products in various locations throughout the world. Some of the larger markets include Australia, Canada, China, England, Japan, Mexico and Micronesia. The distribution of export sales to customers is by common carrier, while the China operations own and operate their own delivery system. The Company, through HFIC, has licensed companies to manufacture various Hormel products internationally on a royalty basis, with the primary licensees being Tulip International of Denmark and CJ Corp. of South Korea.", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "FINANCIAL STATEMENTS\nThe following consolidated financial statements of Hormel Foods Corporation included in the Annual Stockholders' Report for the Registrant to its stockholders for the year ended October 25, 2003, are incorporated herein by reference in Item 8 of Part II of this report:\nConsolidated Statements of Financial Position -October 25, 2003, and October 26, 2002.\nConsolidated Statements of Operations -Years Ended October 25, 2003, October 26, 2002 and October 27, 2001.\nConsolidated Statements of Changes in Shareholders' Investment -Years Ended October 25, 2003, October 26, 2002, and October 27, 2001.\nConsolidated Statements of Cash Flows -Years Ended October 25, 2003, October 26, 2002, and October 27, 2001.\nNotes to Financial Statements -October 25, 2003.", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "Form 10-K (NYSE:HRL)\nPublished: January 23rd, 2004\nPDF generated by stocklight.com\nUse these links to rapidly review the document HORMEL FOODS CORPORATION TABLE OF CONTENTS", + "page_start": 0, + "page_end": 1, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "Manufacturing\nThe Company has plants in Austin, Minnesota; Fremont, Nebraska; and Beijing, China that slaughter livestock for processing. Quality Pork Processors of Dallas, Texas, operates the slaughter facility at Austin under a custom slaughter arrangement.\nFacilities that produce manufactured items are located in Algona, Iowa; Aurora, Illinois; Austin, Minnesota; Beloit, Wisconsin; Bondurant, Iowa; Ft. Dodge, Iowa; Fremont, Nebraska; Houston, Texas; Knoxville, Iowa; Mitchellville, Iowa; Osceola, Iowa; Perrysburg, Ohio; Quakertown, Pennsylvania; Rochelle, Illinois; Savannah, Georgia; Sparta, Wisconsin; Stockton, California; Tucker, Georgia; Visalia, California; Wichita, Kansas; Beijing, China; and Shanghai, China. Company products are also custom manufactured by several other companies. The following are the Company's larger custom manufacturers: Lakeside Packing Company, Manitowoc, Wisconsin; Schroeder Milk, Maplewood, Minnesota; Steuben Foods, Jamaica, New York; Power Packaging, St. Charles, Illinois; Criders, Stilmore, Georgia; Tony Downs, St. James, Minnesota; and Concept Foods, Alma, Kansas. Power\nLogistics, Inc., based in St. Charles, Illinois, operates distribution centers for the Company in Dayton, Ohio, and Osceola, Iowa.\nThe Company's turkey slaughter and processing operations are located in Barron, Wisconsin; Faribault, Minnesota; Melrose, Minnesota; Montevideo, Minnesota; Pelican Rapids, Minnesota; and Willmar, Minnesota.", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "FINANCIAL STATEMENT SCHEDULES\nThe following consolidated financial statement schedule of Hormel Foods Corporation required pursuant to Item 15(d) is submitted herewith:", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "HORMEL FOODS CORPORATION\nHormel Foods Corporation Operators' Shares Incentive Compensation Plan. (Incorporated by Reference to Appendix A to Hormel's definitive Proxy Statement filed on December 30, 1997, File No. 001-02402.). 10.3 (1)(3), 1 = Hormel Foods Corporation Supplemental Executive Retirement Plan (2002 Restatement.) (Incorporated by Reference to Exhibit 10.3 to Hormel's Annual Report on Form 10-K for the fiscal year ended October 26, 2002, file No. 001-02402.). 10.4 (1)(3), 1 = Hormel Foods Corporation 2000 Stock Incentive Plan. (Incorporated by Reference to Exhibit A to Hormel's definitive Proxy Statement filed on December 30, 1999, File No. 001-02402.)\n(1) Document has previously been filed with the Securities and Exchange Commission and is incorporated herein by reference.\n(2) These Exhibits transmitted via EDGAR.\n(3) Management compensatory plan", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_HRL_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_HRL_2004.pdf", + "query": "Does Hormel Food Corporation have any material legal proceedings pending?", + "target_page": 8, + "target_passage": "The Company knows of no pending material legal proceedings.", + "chunk_present": { + "presence": true, + "index": 3 + } + }, + "top_chunk": [ + { + "text": "HORMEL FOODS CORPORATION\n(Exact name of registrant as specified in its charter)", + "page_start": 1, + "page_end": 1, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "FINANCIAL STATEMENTS\nThe following consolidated financial statements of Hormel Foods Corporation included in the Annual Stockholders' Report for the Registrant to its stockholders for the year ended October 25, 2003, are incorporated herein by reference in Item 8 of Part II of this report:\nConsolidated Statements of Financial Position -October 25, 2003, and October 26, 2002.\nConsolidated Statements of Operations -Years Ended October 25, 2003, October 26, 2002 and October 27, 2001.\nConsolidated Statements of Changes in Shareholders' Investment -Years Ended October 25, 2003, October 26, 2002, and October 27, 2001.\nConsolidated Statements of Cash Flows -Years Ended October 25, 2003, October 26, 2002, and October 27, 2001.\nNotes to Financial Statements -October 25, 2003.", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "FINANCIAL STATEMENT SCHEDULES\nThe following consolidated financial statement schedule of Hormel Foods Corporation required pursuant to Item 15(d) is submitted herewith:", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "Item 3. LEGAL PROCEEDINGS\nThe Company knows of no pending material legal proceedings.", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "HORMEL FOODS CORPORATION\nBy: /s/ JOEL W. JOHNSON\nJOEL W. JOHNSON Chairman of the Board,\nPresident and Chief Executive Officer\nDate: January 23, 2004\nPursuant to the requirements of the Securities Exchange Act of 1934, this report has been signed below by the following persons on behalf of the Registrant and in the capacities and on the dates indicated. Each person whose signature to this report on Form 10-K appears below hereby constitutes and appoints each of Michael J. McCoy, Jody H. Feragen and Mark P. Kalvoda as his or her true and lawful attorney-in-fact and agent, with full power of substitution, to sign on his or her behalf individually and in the capacity stated below and to perform any acts necessary to be done in order to file the Annual Report on Form 10-K and all amendments to this report on Form 10-K, and any and all instruments or documents filed as part of or in connection with this report on Form 10-K or the amendments hereto, and each of the undersigned does hereby ratify and confirm all that said attorney-in-fact and agent, or his substitutes, shall do or cause to be done by virtue hereof.", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "Form 10-K (NYSE:HRL)\nPublished: January 23rd, 2004\nPDF generated by stocklight.com\nUse these links to rapidly review the document HORMEL FOODS CORPORATION TABLE OF CONTENTS", + "page_start": 0, + "page_end": 1, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "(a) General Development of Business\nInternationally, the Company markets its products through Hormel Foods International Corporation (HFIC), a wholly owned subsidiary. HFIC has a presence in the international marketplace through joint ventures and placement of personnel in strategic foreign locations such as China, Spain, and the Philippines. HFIC also has a global presence with minority positions in food companies in Spain (Campofrio Alimentacion S.A., 15% holding) and the Philippines (Purefoods-Hormel, 40% holding).\nThe Company has not been involved in any bankruptcy, receivership or similar proceedings during its history. Substantially all of the assets of the Company have been acquired in the ordinary course of business.\nThe Company had no significant change in the type of products produced or services rendered, nor in the markets or methods of distribution since the beginning of the fiscal year.", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "HORMEL FOODS CORPORATION\n2.1 (1), 1 = Agreement and Plan of Merger and Plan of Reorganization dated January 22, 2001, by and among Hormel, Badger Acquisition Corporation, Jerome Foods, Inc. and Jerome K. Jerome. (Incorporated by reference to Hormel's Current Report on Form 8-K dated March 9, 2001, File No. 001-02402.). 3.1 (1), 1 = Certificate of Incorporation as amended to date. (Incorporated by reference to Exhibit 3A-1 to Hormel's Annual Report on Form 10- K/A for the fiscal year ended October 28, 2000, File No. 001-02402.)", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "HORMEL FOODS CORPORATION\nHormel Foods Corporation Operators' Shares Incentive Compensation Plan. (Incorporated by Reference to Appendix A to Hormel's definitive Proxy Statement filed on December 30, 1997, File No. 001-02402.). 10.3 (1)(3), 1 = Hormel Foods Corporation Supplemental Executive Retirement Plan (2002 Restatement.) (Incorporated by Reference to Exhibit 10.3 to Hormel's Annual Report on Form 10-K for the fiscal year ended October 26, 2002, file No. 001-02402.). 10.4 (1)(3), 1 = Hormel Foods Corporation 2000 Stock Incentive Plan. (Incorporated by Reference to Exhibit A to Hormel's definitive Proxy Statement filed on December 30, 1999, File No. 001-02402.)\n(1) Document has previously been filed with the Securities and Exchange Commission and is incorporated herein by reference.\n(2) These Exhibits transmitted via EDGAR.\n(3) Management compensatory plan", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "ITEM 3. LEGAL PROCEEDINGS\nFrom time to time we and our subsidiary banks are parties to lawsuits arising in the ordinary course of our banking business. However, there are no material pending legal proceedings to which we, our subsidiary banks or our other direct and indirect subsidiaries, or any of their properties, are currently subject. Other than regular, routine examinations by state and federal banking authorities, there are no proceedings pending or known to be contemplated by any governmental authorities.", + "page_start": 38, + "page_end": 38, + "source_file": "NASDAQ_FFIN_2002.pdf" + } + ] + }, + { + "references": { + "source_file": "Open_Data_Report.pdf", + "query": "What is Mexican Farm Subsidies ?", + "target_page": 9, + "target_passage": "an online tool to analyze how the federal government allocates those subsidies", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "· Mexico\n· Mexican Farm Subsidies - an online tool to analyze how the federal government allocates those subsidies\n· Compare Your School : compares aggregate test results from any school with the municipal, regional, and national averages\n· Rebellion of the Sick built for patients with chronic diseases whose expenses are not covered by the government subsidized health coverage.\n· Argentina: Public Spending in Bahía analyzes how public funds are used.\n· Colombia: Visible Congress monitors the actions of the Colombian congress\n· Brazil\n· Eleitor 2010 : a website to submit reports of electoral fraud during the Brazil 2010\n9/34\nCopyright 2011 LEM, Scuola Superiore Sant'Anna. This work is released under a Creative Commons attribution license (http://creativecommons.org/licenses/by/3.0/)", + "page_start": 8, + "page_end": 8, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "2.2.2. Bringing nature back to agricultural land\nAs guardians of our land, farmers play a vital role in preserving biodiversity. They are among the first to feel the consequences when biodiversity is lost but also among the first to reap the benefits when it is restored. Biodiversity enables them to provide us with safe, sustainable, nutritious and affordable food and provides them with the income they need to thrive and develop. European farmers are an essential part of the EU's future and must continue to be the social and economic hub of many communities across our Union.\nAt the same time, certain agricultural practices are a key driver of biodiversity decline. This is why it is important to work with farmers to support and incentivise the transition to fully sustainable practices . Improving the condition and diversity of agroecosystems will increase the sector's resilience to climate change, environmental risks and socioeconomic shocks, while creating new jobs, for example in organic farming, rural tourism or recreation.\nTo support the long-term sustainability of both nature and farming, this strategy will work in tandem with the new Farm to Fork Strategy and the new Common Agricultural Policy (CAP) , including by promoting eco-schemes and result-based payment schemes. In implementing the Biodiversity and the Farm to Fork Strategies, the Commission will closely monitor progress and improvements in terms of food security and farmers income. The Commission will ensure that the CAP Strategic plans are assessed against robust climate and environmental criteria, and that Member States set explicit national values for the relevant targets set in this strategy, as well as in the Farm to Fork Strategy. These plans should lead to sustainable practices such as precision agriculture, organic farming, agro-ecology, agro-forestry, low-intensive permanent grassland, and stricter animal welfare standards.", + "page_start": 7, + "page_end": 7, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "CONSOLIDATED FIVE-YEAR SUMMARY\nNotes: 1. Unit sales in Mexico are included in 'North America.'\n2. Sales and Production for Europe and Mexico for each year are on a January to December basis. (In the annual reports for the fiscal years before 2003, production for Europe and Mexico was on April to March basis.)\nNissan Annual Report 2004", + "page_start": 71, + "page_end": 71, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "Roundtable session: SMBC Food and Agricultural Assessment Loan\nA roundtable session with experts held in August 2011 considered the role of the new SMBC Food and Agricultural Assessment Loan in improving the food supply chain that links food and fishery producers with food processors and consumers. Opinions were also exchanged on what other future role the bank might assume in this regard, given the current situation and issues facing the food industry\nand agriculture in Japan.", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "2.2.2. Bringing nature back to agricultural land\nFarmland birds and insects, particularly pollinators, are key indicators of the health of agroecosystems and are vital for agricultural production and food security. Their alarming decline must be reversed. As set out in the Farm to Fork Strategy, the Commission will take action to reduce by 50% the overall use of - and risk from chemical pesticides by 2030 and reduce by 50% the use of more hazardous pesticides by 2030. This must be supported by the full implementation of the EU Pollinators initiative 31 . By the end of 2020, the Commission will review the initiative and propose additional measures if necessary. To provide space for wild animals, plants, pollinators and natural pest regulators, there is an urgent need to bring back at least 10% of agricultural area under high-diversity landscape features . These include, inter alia , buffer strips, rotational or non-rotational fallow land, hedges, non-productive trees, terrace walls, and ponds. These help enhance carbon sequestration, prevent soil erosion and depletion, filter air and water, and support climate adaptation. In addition, more biodiversity often helps lead to more agricultural production. Member States will need to translate the 10% EU target to a lower geographical scale to ensure connectivity among habitats, especially through the CAP instruments and CAP Strategic Plans, in line with the Farm to Fork Strategy, and through the implementation of the Habitats Directive. The\n31 EU Pollinators initiative (COM(2018) 395).\n7\nprogress towards the target will be under constant review, and adjustment if needed, to mitigate against undue impact on biodiversity, food security and farmers' competitiveness.", + "page_start": 7, + "page_end": 8, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "Income\nFoundations $4,402,663\nCorporate Sponsors $413,349\nMajor Donors $103,215\nSmall Dollar Donors $144,217\nProgram Income $169,980\nConsulting $173,939\nIn-Kind $30,358\nOther $38,792\nTotal:\n$5,496,708", + "page_start": 9, + "page_end": 9, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "Lower Equipment Sales\nEquipment sales (net of subsidies) include revenue from sales to:\nGLYPH<129> independent dealers, agents and retailers\nGLYPH<129> directly to subscribers through fulfillment by Wireless' customer service groups, websites, telesales and corporate stores.\nRevenue from equipment sales was lower this year, mainly because fewer existing subscribers upgraded their devices and there were fewer gross activations.", + "page_start": 43, + "page_end": 43, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "References\n24. Di/ffenbaugh, N. S., Hertel, T. W., Scherer, M. & Verma, M. Response of corn markets to climate volatility under alternative energy futures. Nat. Clim. Change 2 , 514-518 (2012).\n25. Jensen, H. G. & Anderson, K. Grain price spikes and beggar-thy-neighbor policy responses: A global economywide analysis. World Bank Econ. Rev. 31 , 158-175 (2017).\n26. Fraser, E. D. G., Simelton, E., Termansen, M., Gosling, S. N. & South, A. 'Vulnerability hotspots': Integrating socio-economic and hydrological models to identify where cereal production may decline in the future due to climate change induced drought. Agric. For. Meteorol. 170 , 195-205 (2013).\n27. Puma, M. J., Bose, S., Chon, S. Y. & Cook, B. I. Assessing the evolving fragility of the global food system. Environ. Res. Lett. 10 , 024007 (2015).\n28. Wheeler, T. & Braun, J. V. Climate change impacts on global food security. Science 341 (6145), 508-513 (2013).\n29. Lunt, T., Jones, A. W., Mulhern, W. S., Lezaks, D. P. M. & Jahn, M. M. Vulnerabilities to agricultural production shocks: An extreme, plausible scenario for assessment of risk for the insurance sector. Clim. Risk Manag. 13 , 1-9 (2016).\n30. Jägermeyr, J. & Frieler, K. Spatial variations in crop growing seasons pivotal to reproduce global /fluctuations in maize and wheat\nyields. Sci. Adv. 4 (11), eaat4517 (2018).\n31. Elliott, J. et al. Characterizing agricultural impacts of recent large-scale US droughts and changing technology and management. Agric. Syst. 159 , 275-281 (2017).", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed9.pdf" + }, + { + "text": "References\n48. You, L.Z., et al . Spatial Production Allocation Model (SPAM) 2000 Version 3.2 . http:// mapsp am. info (2015).\n49. Hoogenboom, G., et al . Decision Support System for Agrotechnology Transfer (DSSAT) Version 4.6 (DSSAT Foundation, 2015). http:// dssat. net (2015).\n50. Sacks, W. J., Deryng, D., Foley, J. A. & Ramankutty, N. Crop planting dates: An analysis of global patterns. Glob. Ecol. Biogeogr. 19 , 607-620 (2010).\n51. Batjes, H.N. A Homogenized Soil Data File for Global Environmental Research: A Subset of FAO. ISRIC and NRCS Pro/files (Version 1.0) . Working Paper and Preprint 95/10b (International Soil Reference and Information Centre, 1995).\nͷ͹\nVol.:(0123456789)\nScientific Reports\n| (2022) 12:17268 |\nhttps://doi.org/ͷͶ.ͷͶ͹;/sͺͷͻͿ;-Ͷ͸͸-͸͸͸͸;-ͽ\nwww.nature.com/scientificreports/", + "page_start": 12, + "page_end": 13, + "source_file": "pubmed9.pdf" + }, + { + "text": "Supporting farming villages in the northeast\nSMBC SMBC's Bangkok Branch assisted s Bangkok Branch assisted farmers by donating underground farmers by donating underground water storage tanks and assisting water storage tanks and assisting with vegetable planting and with vegetable planting and harvesting. harvesting.", + "page_start": 14, + "page_end": 14, + "source_file": "NYSE_SMFG_2011.pdf" + } + ] + }, + { + "references": { + "source_file": "Open_Data_Report.pdf", + "query": "What concerns has open data raised in the insurance sector?", + "target_page": 23, + "target_passage": "insurance companies may charge higher fees for life insurance to those among their customers who... put online a family tree from which it shows that they come from families with an average life expectancy lower than usual", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "3.6.1. Data alterations and financial sustainability\nSome concerns about the limits of Open Data are about what may happen, or stop to happen, before they are published online. The most common concerns of this type are (from Open Public Data: Then What? - Part 1):\n1. Opening up PSI causes those data to not be produced anymore, or to be only produced as private property by private corporations, because the public agencies whose job was to produce those data, can't sell them anymore.\n2. total accessibility of data provides more incentives to tinker with them, at the risk of reducing trust in institutions and inhibiting decision-making even more than today.\nData manipulation is the topic of the next paragraph. Speaking of costs, a point to take into account is that, once data are open, routinely used and monitored by as many independent users as possible, even the cost of keeping them up to date may be sensibly reduced: in other words, in the medium/long term Open Data may reduce the need to periodically perform complete, that is very expensive, studies and surveys to update a whole corpus of data in one run.\nBesides, and above all, even if opening data always destroyed any source of income for the public office that used to create and maintain them, this problem would only exist for the PSI datasets that are already sold today. Such data, even if of strategic importance as is the case with digital cartography, are only a minimal fraction of all the PSI that could and should be opened to increase transparency, reduce the costs of Government and stimulate the economy. In all these other cases:\n· the money to generate the data already arrives by some other source than sales and licensing(but even with those data it may be possible to generate them by crowdsourcing, thereby reducing those costs!)\n· the only extra expense caused by publishing those data online (assuming they're already available in some digital format, of course!), would be the hosting and bandwidth costs, that may be greatly reduced by mirroring and other technical solutions like torrents, already widely used to distribute Free/Open Source Software (FOSS) through the Internet.", + "page_start": 16, + "page_end": 16, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "3.6.3. Unequal access\nSince one of the topics of this project is the economic value of Open Data, it is necessary to add a somewhat obvious observation to Frydman's concerns (regardless of their probability). Even if it is difficult now to make accurate estimates, such negative developments would surely impact also the costs of health services and insurances, not to mention healthcare-related jobs, both in the communities hosting centers of excellence and in those with the worst ones.", + "page_start": 19, + "page_end": 19, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "3.7. The privacy problem\nBeing perceived as a lethal attack to privacy remains one of the biggest misunderstandings that prevents adoption of Open Data. On one hand, there is no doubt that in an increasingly digital world it becomes harder and harder to protect privacy. But, exactly because the whole world is going\n22/34\nCopyright 2011 LEM, Scuola Superiore Sant'Anna. This work is released under a Creative Commons attribution license (http://creativecommons.org/licenses/by/3.0/)\ndigital, attacks to privacy and to civil rights in general can and are coming by so many other sides that those from (properly done) Open Data are a really tiny percentage of the total.\nThis is a consequence of the fact that data about us end up online from the most different sources (including ourselves and our acquaintances), and that often it would be very hard to discover, never mind prove , that they've been used against our interest. There have been concerns, for example, that insurance companies may charge higher fees for life insurance to those among their customers who... put online a family tree from which it shows that they come from families with an average life expectancy lower than usual.\nAssuming such concerns were real, would it always be possible to spot and prove such abuses of data, that weren't even published by any Public Administration? Of course, publishing online complete, official Census data of several generations, in a way that would make such automatic analysis possible would be a totally different matter.\nGetting rid of all the unjustified concerns about privacy is very simple, at least in theory. All is needed to dismiss for good the idea that Open Data is a generalized attack to privacy is to always remember and explain that:", + "page_start": 21, + "page_end": 22, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "4.2. Keep political issues separated by economics ones\nOpen Data can reduce the costs of Public Administrations and generate (or at least protect, as in the case of deals from local merchants) local jobs in all sectors of the economy, not just high-tech ones. There seems to be enough evidence for these two assertions to go for more Open Data even if they had no effect at all on participation to politics. This should always be kept in mind, also because some data that can directly stimulate business are not the same that would be useful for transparency.\n27/34\nCopyright 2011 LEM, Scuola Superiore Sant'Anna. This work is released under a Creative Commons attribution license (http://creativecommons.org/licenses/by/3.0/)", + "page_start": 26, + "page_end": 26, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "3. Emerging trends and issues related to Open Data\nOne of the most common activities for Open Data activists in this moment is the creation of country-wide catalogs of all data sources, to facilitate individuation and correlation of independent data sets. Normally, all initiatives of this type are announced on the Open Knowledge Foundation blog and/or its data hub CKAN. Another relevant development is the publication of an Open Data Manual that \"can be used by anyone but is especially designed for those seeking to open up data, since it discusses why to go open, what open is, and the how to 'Open' Data.\" Activists in several European countries have already published local versions of the manual, or equivalent documents. On this background, several interesting issues, some of which were anticipated in the Open Data, Open Society report, are coming in full light. They are presented, one at a time, in the following sections of this chapter.", + "page_start": 10, + "page_end": 10, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "3.6. Clearer vision of the real risks and limits of Open Data\nOpen Data, we already said, is about reuse. The point is, at least when the goal is Open Government and transparency in politics, reuse by whom? There is no automatic cause-effect relationship between Open Data and real transparency and democracy. On the contrary, several problems may occur, if administrators and citizens don't pay close attention.\n16/34\nCopyright 2011 LEM, Scuola Superiore Sant'Anna. This work is released under a Creative Commons attribution license (http://creativecommons.org/licenses/by/3.0/)", + "page_start": 15, + "page_end": 15, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "3.7. The privacy problem\n1. Most Open Data have nothing personal to begin with (examples: digital maps, budgets, air pollution measurements....)\n2. The majority of data that are directly related to individuals (e.g. things like names and address of people with specific diseases, or who were victims of some crime) have no reason to be published, nor there is any actual demand for them by Open Data advocates\n3. Exceptions that limit privacy for specific cases and categories of people (e.g. candidates to public offices, Government and Parliament members etc...) already exist in many countries\n4. Very often, in practice, Open Data struggles only happen about when and how to make available in the most effective way for society information that was already recognized as public. What to declare public, hence open, is indeed a serious issue (more on this in the next paragraph) but is a separate one.", + "page_start": 22, + "page_end": 22, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "1. Introduction\nThis report is the final deliverable of the Open Data, Open Society research project. It follows the publication of the Open Data, Open Society report, finished in late October 2010 and published in early January 2011. That first report focused on explaining the critical importance of digital data in contemporary society and business activities; defining Open Data; giving examples on their potential, especially at the local level, on transparency and economics activities; finally, defining summarizing some general best practices.\nThis second report looks at what happened in the Open Data arena after October 2010. After some considerations on the general social and political background in late 2010/early 2011, it is divided in two main parts. The first describes some emerging trends and issues related to Open Data, that got minor or no coverage in the first report. The second part discusses some practices and actions to follow to deal with those trends and issues.", + "page_start": 2, + "page_end": 2, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "5. Bibliography\n22.Thinking About Africa's Open Data\n23.Towards EU Benchmarking 2.0 - Transparency and Open Data on Structural Funds in Europe\n24.UK Open Government Licence removes barriers to re-use of public sector information\n25.Western Europe: A journey through tech for transparency projects\n26.What open data means to marginalized communities\n27.What's in a Name? Open Gov and Good Gov\n28.WikiLeaks Relationship With the Media\n29.WikiLeaks, Open Information and Effective Use: Exploring the Limits of Open Government\n34/34\nCopyright 2011 LEM, Scuola Superiore Sant'Anna. This work is released under a Creative Commons attribution license (http://creativecommons.org/licenses/by/3.0/)", + "page_start": 33, + "page_end": 33, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "2. Social and political landscape\nmore concrete over time is damage control. In a world that produces digital data without interruption, uncontrolled and unpredictable data releases are facts of life that are very hard to predict, practically impossible to avoid and increasingly common. Opening public government data, that is providing plenty of officially verified information, becomes therefore also a damage control solution, to prevent or at least minimize damages from such uncontrolled releases. Without official Open Public Data, individual citizens, political parties or other organizations will start to process and compare (if they already aren't...) data from unofficial sources anyway, maybe from different countries. In such cases, it will be unavoidable not reach sometimes, even in good faith, wrong conclusions. This is not some theoretical possibility far in the future, as this real world example (from a comment to an Open Data discussion in an italian blog) proves:\n\" on the [non italian] Geonames website you can download geo-referenced data about... 47000 Italian municipalities. That worries me, because there are only 8094 of them. Besides, I grabbed a few random data about population, and I can guarantee you that not one was right. What should be done in such cases?\nFrom an Open Data perspective, all these recent stories have (at least) one thing in common: they suggest that, considering its current needs and problems, current societies want and need more Open Data than they already have.", + "page_start": 4, + "page_end": 4, + "source_file": "Open_Data_Report.pdf" + } + ] + }, + { + "references": { + "source_file": "Open_Data_Report.pdf", + "query": "What are Steinberg's concerns about the government releasing all non-private existing data?", + "target_page": 28, + "target_passage": "The first reasons for Steinberg's concern is that asking for everything as soon as possible would \"stress the system too much, by spreading thin the finite amount of good will, money and political capital\". The second is that many existing old data and data archival systems are, in practice, so uninteresting that it wouldn't make sense to spend resources in opening them", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "4.3. Keep past and future separate\nFor the same reason why it is important to always distinguishes between political and economical advantages (or disadvantages) of Open Data, it is necessary to keep decisions about future data (those that will arrive in the future, due to new contracts, public services and so on) separate from those about data that already exist. At the end of 2010, T. Steinberg wrote that the idea that Government should publish everything non-private it can now is \"rather dangerous\", and that it would be much better to release nothing until someone actually asked for it, and at that point doing it right, that is with an open license and so on. The first reasons for Steinberg's concern is that asking for everything as soon as possible would \"stress the system too much, by spreading thin the finite amount of good will, money and political capital\" . The second is that many existing old data and data archival systems are, in practice, so uninteresting that it wouldn't make sense to spend resources in opening them.\nEven if these concerns were always true, it is important to realize that they apply (especially the second) to already existing data, not to future ones. The two classes of data have, or can have, very different constraints. Existing data may still exist only in paper format and/or be locked by closed or unclear licenses, or not relevant anymore for future decisions.\nOpening future data, instead, is almost always more important, useful urgent, easier and cheaper than digitizing or even only reformatting material that in many cases is already too old to make immediate, concrete differences. While this argument is probably not always true when we look at Open data for transparency, it probably is when it comes to economic development.\nTherefore, features and guidelines that should be present in all future data generation and management processes include:\n· standardization: the less, obviously open, formats are used for data of the same type, the easier it is to merge and correlate them. The formats that have to be standardized are not only those at the pure software level. Even more important is, for example, to adopt by law standard identificators for government suppliers, names and machine-readable identifiers of budget voices and so on\n· preparation for future digitization: new digital systems should explicitly be designed from the beginning so that it will be possible, when non-digital records will be digitized, to add them to the databases without modifying losses.\n· Open licenses", + "page_start": 27, + "page_end": 27, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "2.1. Wikileaks and the Open Data movement\nOf course, citizens must always check that they aren't getting incomplete or biased data. But in any case, Open Data means that the involved government officials aren't just prepared to see that data published, they know and accept it from the start. In such a context, some risks associated to Wikileaks, like the fact that the leaker lacks the means to influence the downstream use of the information, and therefore may harm anybody connected to the linked information, are almost nonexistent.\nAbove all, unlike the content of most Wikileaks documents, Open Data are almost always data that should surely be open, unlike wartime military reports, and that almost never contain any personal information. In summary, whatever the conclusions about Wikileaks are, they could not be conclusions against Open Data, because there are too many differences between the two movements.", + "page_start": 5, + "page_end": 5, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "3.3. Legal issues remain crucial\nProper licensing of Public data is essential. The more Open Data activities continue, the clearer this rule becomes. What distinguishes Open Data from \"mere\" transparency is reuse. Paraphrasing Eaves, until a government get the licensing issue right, Open Data cannot bring all the possible benefits in that country. If there are no guarantees that public data can be used without restriction, very little happens in practice, and when it happens it may be something against the public interest.\nCanadian Company Public Engines Inc, that is paid by local police departments to collect, process and analyze official crime data, also publishes online, with a proprietary license, anonymized summaries of those data. When in 2010 another company, Report See Inc, scraped those data from their website to reuse them, Public Engines sued.\nReporting this, D. Eaves rightly points out that both companies are right: one is trying to protect its investment, the other is simply trying to reuse what IS public data, by getting it from the ONLY place where it's available. This is what happens when public officials leave the ownership of public data to the third parties hired to collect them. Please note that, in practice, it makes very little difference whether those third parties are private, for-profit corporations or even other Public Administrations. Unless, of course, there are national laws already in place that define in advance what is the license of all present and future Public Data, no matter how they were generated and by whom , those data can be lost in any moment for society. In all other cases, the legal status of data will be either officially closed and locked, or uncertain enough to prevent most or all reuses. In February 2011, the news came that, even if they weren't the original copyright holders, Public Engines had been able to put together enough legal claims to convince Report See to give up.\nDisputes like this should not happen and would not happen if all contracts regarding collection and management of PSI clearly specified that all the resulting data either go directly into the public domain (after being anonymized if necessary, of course) or remain exclusive property of the\n13/34\nCopyright 2011 LEM, Scuola Superiore Sant'Anna. This work is released under a Creative Commons attribution license (http://creativecommons.org/licenses/by/3.0/)", + "page_start": 12, + "page_end": 12, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "3.7. The privacy problem\n1. Most Open Data have nothing personal to begin with (examples: digital maps, budgets, air pollution measurements....)\n2. The majority of data that are directly related to individuals (e.g. things like names and address of people with specific diseases, or who were victims of some crime) have no reason to be published, nor there is any actual demand for them by Open Data advocates\n3. Exceptions that limit privacy for specific cases and categories of people (e.g. candidates to public offices, Government and Parliament members etc...) already exist in many countries\n4. Very often, in practice, Open Data struggles only happen about when and how to make available in the most effective way for society information that was already recognized as public. What to declare public, hence open, is indeed a serious issue (more on this in the next paragraph) but is a separate one.", + "page_start": 22, + "page_end": 22, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "3.7. The privacy problem\nBeing perceived as a lethal attack to privacy remains one of the biggest misunderstandings that prevents adoption of Open Data. On one hand, there is no doubt that in an increasingly digital world it becomes harder and harder to protect privacy. But, exactly because the whole world is going\n22/34\nCopyright 2011 LEM, Scuola Superiore Sant'Anna. This work is released under a Creative Commons attribution license (http://creativecommons.org/licenses/by/3.0/)\ndigital, attacks to privacy and to civil rights in general can and are coming by so many other sides that those from (properly done) Open Data are a really tiny percentage of the total.\nThis is a consequence of the fact that data about us end up online from the most different sources (including ourselves and our acquaintances), and that often it would be very hard to discover, never mind prove , that they've been used against our interest. There have been concerns, for example, that insurance companies may charge higher fees for life insurance to those among their customers who... put online a family tree from which it shows that they come from families with an average life expectancy lower than usual.\nAssuming such concerns were real, would it always be possible to spot and prove such abuses of data, that weren't even published by any Public Administration? Of course, publishing online complete, official Census data of several generations, in a way that would make such automatic analysis possible would be a totally different matter.\nGetting rid of all the unjustified concerns about privacy is very simple, at least in theory. All is needed to dismiss for good the idea that Open Data is a generalized attack to privacy is to always remember and explain that:", + "page_start": 21, + "page_end": 22, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "2. Social and political landscape\nmore concrete over time is damage control. In a world that produces digital data without interruption, uncontrolled and unpredictable data releases are facts of life that are very hard to predict, practically impossible to avoid and increasingly common. Opening public government data, that is providing plenty of officially verified information, becomes therefore also a damage control solution, to prevent or at least minimize damages from such uncontrolled releases. Without official Open Public Data, individual citizens, political parties or other organizations will start to process and compare (if they already aren't...) data from unofficial sources anyway, maybe from different countries. In such cases, it will be unavoidable not reach sometimes, even in good faith, wrong conclusions. This is not some theoretical possibility far in the future, as this real world example (from a comment to an Open Data discussion in an italian blog) proves:\n\" on the [non italian] Geonames website you can download geo-referenced data about... 47000 Italian municipalities. That worries me, because there are only 8094 of them. Besides, I grabbed a few random data about population, and I can guarantee you that not one was right. What should be done in such cases?\nFrom an Open Data perspective, all these recent stories have (at least) one thing in common: they suggest that, considering its current needs and problems, current societies want and need more Open Data than they already have.", + "page_start": 4, + "page_end": 4, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "3.6.1. Data alterations and financial sustainability\nSome concerns about the limits of Open Data are about what may happen, or stop to happen, before they are published online. The most common concerns of this type are (from Open Public Data: Then What? - Part 1):\n1. Opening up PSI causes those data to not be produced anymore, or to be only produced as private property by private corporations, because the public agencies whose job was to produce those data, can't sell them anymore.\n2. total accessibility of data provides more incentives to tinker with them, at the risk of reducing trust in institutions and inhibiting decision-making even more than today.\nData manipulation is the topic of the next paragraph. Speaking of costs, a point to take into account is that, once data are open, routinely used and monitored by as many independent users as possible, even the cost of keeping them up to date may be sensibly reduced: in other words, in the medium/long term Open Data may reduce the need to periodically perform complete, that is very expensive, studies and surveys to update a whole corpus of data in one run.\nBesides, and above all, even if opening data always destroyed any source of income for the public office that used to create and maintain them, this problem would only exist for the PSI datasets that are already sold today. Such data, even if of strategic importance as is the case with digital cartography, are only a minimal fraction of all the PSI that could and should be opened to increase transparency, reduce the costs of Government and stimulate the economy. In all these other cases:\n· the money to generate the data already arrives by some other source than sales and licensing(but even with those data it may be possible to generate them by crowdsourcing, thereby reducing those costs!)\n· the only extra expense caused by publishing those data online (assuming they're already available in some digital format, of course!), would be the hosting and bandwidth costs, that may be greatly reduced by mirroring and other technical solutions like torrents, already widely used to distribute Free/Open Source Software (FOSS) through the Internet.", + "page_start": 16, + "page_end": 16, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "3.3. Legal issues remain crucial\ngovernment. Even ignoring data openness, this is essential for at least three other reasons. The first is to protect a public administration from having to pay twice for those data, if it needs it again in the future for some other internal activity, not explicitly mentioned in the initial contract. The second reason is to not spend more than what is absolutely necessary to respond to public records requests, that is to comply with Freedom of Information laws.\nThe final reason is to guarantee quality assurance and detection of abuses at the smallest cost, that is sharing it with all the citizens using the public services based on those data. A real world example of this point comes from the \"Where's My Villo?\" service in Brussels. Villo! is a city-wide bikesharing scheme started in May 2009, through a partnerships with a private company: JCDecaux finances the infrastructure and operates it, in exchange for advertising space on the bikes themselves and on billboards at the bike sharing stations. The availability of bikes and parking spaces of each station is published online in real time on the official Villo's website.\nWhen the quality of service decreased, some citizens started \"Where's My Villo?\", another website that reuses those data to measure where and how often there aren't enough available bikes and parking spaces, in a way that made it impossible for JCDecaux to deny the problems and stimulated it to fix them. Both this happy ending and the fact that it came at almost no cost to the city, because citizens could monitor the service by themselves, were possible just because the data from the official website were legally and automatically reusable.", + "page_start": 13, + "page_end": 13, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "3.6. Clearer vision of the real risks and limits of Open Data\nOpen Data, we already said, is about reuse. The point is, at least when the goal is Open Government and transparency in politics, reuse by whom? There is no automatic cause-effect relationship between Open Data and real transparency and democracy. On the contrary, several problems may occur, if administrators and citizens don't pay close attention.\n16/34\nCopyright 2011 LEM, Scuola Superiore Sant'Anna. This work is released under a Creative Commons attribution license (http://creativecommons.org/licenses/by/3.0/)", + "page_start": 15, + "page_end": 15, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "2.1. Wikileaks and the Open Data movement\nDuring the 2010/2011 winter the discussions around the Cablegate and other documents published by Wikileaks have, in some occasion, included hostility towards Open Data. This is a consequence of a more or less conscious mixing of the two themes, because in a very general sense, both Open Data and Wikileaks are about transparency, accountability and democracy.\nAs far as this study is concerned, two conclusions can be drawn from the Cablegate/Wikileaks scandal.\nThe first is that, in practice, it is necessary to find and equilibrium between secrecy and transparency whenever government activities are concerned. Citizens must be able to know what the state is actually doing but sometimes, be it for careful evaluation of all the alternatives or because of security, it must be possible to work behind closed doors, at least temporarily. We'll come back to this point later in this report.\nThe second conclusion is that, while certainly both Open Data and Wikileaks are about openness and transparency in politics, not only there are deep differences between the two ideas but, in our\n5/34\nCopyright 2011 LEM, Scuola Superiore Sant'Anna. This work is released under a Creative Commons attribution license (http://creativecommons.org/licenses/by/3.0/)\nopinion, the Wikileaks experience proves the advantages of Open Data.\nWas Wikileaks right to publish the cable? Were the specific facts and behaviors uncovered by\nCablegate right or wrong? The answer to these questions are outside the scope of this document. Here we only wish to point out that Cablegate and Wikileaks, at least in the form we've known them so far, have been about:\n· reacting to problems after they occurred\n· without any intervention and involvement of the parties and organizations that may have behaved improperly\nOpen Data, instead, is about prevention of errors, abuses and inefficiencies, through conscious and continuous collaboration of citizens and governments officials during day to day operations, if not before their beginning.", + "page_start": 4, + "page_end": 5, + "source_file": "Open_Data_Report.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed4.pdf", + "query": "How did serum estradiol and progesterone levels change during pregnancy?", + "target_page": 2, + "target_passage": "Serum hormone concentrations increased significantly over the course of pregnancy and dropped precipitously postpartum", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Serological evaluations\nSerological evaluations captured canonical hormone fluctuations characteristic of the prenatal, perinatal and postnatal periods (Fig. 1b). Serum hormone concentrations increased significantly over the course of pregnancy and dropped precipitously postpartum (preconception, estradiol (E) = 3.42 pg ml -1 and progesterone (P) = 0.84 ng ml -1 ; 3 weeks preparturition, E = 12,400 pg ml -1 and P = 103 ng ml -1 ; 3 months postparturition, E = 11.50 pg ml -1 and P = 0.04 ng ml -1 ).", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed4.pdf" + }, + { + "text": "Comparing brain changes across pregnancy against controls\nWe then compared the changes in GMV across gestation to that of typical variability over time, derived from eight densely-sampled controls 23 . The GMV changes we see across pregnancy far exceed normative brain variability (Supplementary Fig. 11). On average, change in cortical GMV was nearly three times higher than controls scanned over a similar duration (Supplementary Fig. 11a,b). This extends to MTL subfields, wherein change in volume was three to four times greater across gestation than normative brain variability (Supplementary Fig. 11c,d). We contextualized these findings further by comparing gestational GMV change against our participant's preconception brain volumes; average GMV change during pregnancy was six times (cortical) and three times (MTL) higher than the variability observed between baseline sessions.\nResource\nhttps://doi.org/10.1038/s41593-024-01741-0\nFig. 1 | Precision imaging reveals neuroanatomical changes throughout gestation. a , Standard medical demarcations for pregnancy stages (that is, trimesters) by gestation week (the image is created with BioRender.com). b , Steroid hormones increased significantly throughout pregnancy and dropped precipitously postpartum, as is characteristic of the prenatal and postnatal periods. c , A healthy 38-year-old primiparous woman underwent 26 scanning sessions from 3 weeks preconception through 2 years postpartum. Scans were distributed throughout preconception (four scans), first trimester (four scans), second trimester (six scans), third trimester (five scans) and postpartum (seven scans); tick marks indicate when major measures were collected and", + "page_start": 1, + "page_end": 2, + "source_file": "pubmed4.pdf" + }, + { + "text": "Neuroanatomical changes observed over the course of a human pregnancy\nWorldwide, nearly 85% of women experience one or more pregnancies in their lifetime 1 , with 140 million women becoming pregnant each year. Over an approximately 40-week gestational window, the maternal body undergoes profound physiological adaptations to support the development of the fetus, including increases in plasma volume, metabolic rate, oxygen consumption and immune regulation 2 . These rapid adaptations are initiated by 100-fold to 1,000-fold increases in hormone production, including estrogen and progesterone. These neuromodulatory hormones also drive significant reorganization of the central nervous system. Evidence from animal models and human studies converge on pregnancy as a period of remarkable neuroplasticity 3-10 (see ref. 10 for one of the earliest known observations). Gestational increases in steroid hormone synthesis drive neurogenesis, dendritic spine growth, microglial proliferation, myelination and astrocyte remodeling (for review, see ref. 11). These cellular changes are pronounced in brain circuits that promote maternal behavior. For example, Ammari et al. recently discovered that steroid hormones can fine-tune the response properties of galanin neurons in the rodent medial preoptic area of the hypothalamus (mPOA), leading to enhanced sensitivity in dams to sensory cues from newborn pups 12 .\nIn humans, reductions in gray matter volume (GMV) have been observed postpartum 13-16 , particularly in regions central to theory-of-mind processing 13 . These GMV changes persist at 6 years postpartum 17 and are traceable decades later 18,19 , underscoring the permanence of this major remodeling event. And yet the changes that occur within the maternal brain during gestation itself are virtually unknown (see ref. 20 for early neuroimaging insight). A recent study by Paternina-Die et al. offers intriguing clues 21 . Women were scanned once in the third trimester and again in the postpartum period, revealing a reduction of cortical volume observable in the late pregnancy scan. These findings suggest that pregnancy is a highly dynamic period for neural remodeling, yet neuroscientists lack a detailed map of how the human brain changes throughout the gestational period.", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed4.pdf" + }, + { + "text": "Comparing brain changes across pregnancy against controls\ncolors denote pregnancy stage. The participant underwent IVF to achieve pregnancy, allowing for precise mapping of ovulation, conception and gestation week. d , Summary (that is, total) of brain measures throughout the experiment. Generalized additive models revealed GMV, CT and total brain volume decreased throughout pregnancy (see Methods for validation with cubic regression), with a slight recovery postpartum. Global QA, lateral ventricle and CSF volumes displayed nonlinear increases across gestation, with a notable rise in the second and third trimesters before dropping sharply postpartum. Shaded regions represent 95% confidence bands; solid lines indicate model fit; dashed line indicates parturition.", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed4.pdf" + }, + { + "text": "Whole-brain subcortical volumes\nOur findings from this precision imaging study show that pregnancy is characterized by reductions in GMV, cortical thinning and enhanced white matter microstructural integrity that unfold week by week. These changes were also tied to the significant rise in steroid hormone concentrations over pregnancy. Some of these changes persist at 2 years postpartum (for example, global reductions in GMV and CT), while others, including markers of white matter integrity, appear to be transient. Ventricular expansion and contraction parallel these cortical changes. These widespread patterns, and the notable increase in CSF volume across gestation, could reflect increased water retention and subsequent compression of cortical tissue. However, the persistence of these changes at 2 years postpartum and regional variation in GMV, CT and QA, hint at cellular underpinnings, such as alterations in glia\nNature Neuroscience | Volume 27 | November 2024 | 2253-2260\n2257\nor neuron number, synaptic density and myelination (for review on the latter, see ref. 4). Future studies of the relationship between fluid dynamics and volumetric changes will help clarify the factors that drive global neural changes during pregnancy; such insights will have broad implications for maternal health (for example, neurological effects tied to pre-eclampsia or edema).\nCritically, dynamic neural changes occurred within the pregnancy window itself, a nuance not captured by studies limited to comparisons between prepregnancy and postpregnancy. For example, we observed large increases in white matter microstructural integrity (QA) throughout the first and second trimesters of pregnancy, but these measures fully returned to baseline values by the first postpartum scan. This pattern may explain why previous studies report no pregnancy-related differences in white matter tractography 14 . Other measures, such as GMV and CT, decreased throughout gestation and displayed only a modest rebound postpartum. These nonlinear patterns suggest that only quantifying prepregnancy and postpartum brain structure may\nhttps://doi.org/10.1038/s41593-024-01741-0\nPHC\nResource\nhttps://doi.org/10.1038/s41593-024-01741-0", + "page_start": 4, + "page_end": 5, + "source_file": "pubmed4.pdf" + }, + { + "text": "Endocrine procedures\nCortical GMV and CT . We then narrowed our analyses to the first 19 sessions (baseline-36 weeks gestation) to assess novel brain changes occurring over the gestational window. We first computed Pearson's product-moment correlation matrices between the following variables: gestation week, estradiol, progesterone and the 17 network-level average GMV values. We then ran a multivariate regression analysis predicting ROI-level GMV changes by gestation week. To identify which regions were changing at a rate different from the global decrease, we then ran the analyses again to include total GMV in the regression model (Supplementary Table 2). This was extended to the network level, where we ran partial correlations accounting for total GMV. These same analyses were then run with CT measures. Globally-corrected results provided in Supplementary Tables 1-5. Percent change at the network level was computed by subtracting the final pregnancy value (36 weeks pregnant) from the first prepregnancy baseline value, then dividing that difference by said first prepregnancy baseline value. All analyses underwent multiple comparisons testing (false discovery rate (FDR)-corrected at q < 0.05).\nNature Neuroscience\nSubcortical GMV . A similar statistical approach was taken for subcortical volume estimates. We ran a multivariate regression analysis predicting GMV changes over gestation in 28 ROIs (Supplementary Fig. 6a) by gestation week (FDR-corrected at q < 0.05).\nTo evaluate the relationship between gestation week and MTL subregion volume over pregnancy ( n = 7 bilateral subregions and n = 18 MTL scans), we used a combination of linear and nonlinear models based on individual subregion data patterns. Models were compared for best fit with each subregion via AIC from the GLM output (as described in 'Summary brain metrics'). A linear regression model was most appropriate for PHC (AICdiff < 3), whereas a quadratic model performed best for CA1 and CA2/CA3. As a control, we repeated the analyses with MTL subregion volumes after proportional volume correction of total GMV calculated by ASHS. Finally, we evaluated the relationship between endogenous sex hormones (estrogen and progesterone) and subregion volumes using linear regression. Relationships were considered significant only if they met FDR correction at q < 0.05.", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed4.pdf" + }, + { + "text": "Whole-brain subcortical volumes\noverlook the full range of changes that unfold within the gestational window, and underrepresent the brain's metamorphosis during pregnancy. Furthermore, although observed changes were largely global, some regions displayed notable stability (for example, extrastriate cortex). The subcortical region that displayed the strongest relationship with gestation week was the ventral diencephalon, which encompasses the hypothalamus and subsequent medial preoptic area and paraventricular nucleus-structures critical for inducing maternal behavior 12,16 . The hippocampus exhibited a reduction in volume across gestation, and with higher spatial resolution, this reduction was revealed to be driven by changes in CA1 and CA2/CA3 subfield volumes, while other hippocampal subfields remained stable. Adjacent PHC within the MTL also exhibited volume reduction across gestation. While our hippocampal findings are consistent with pre/post studies of pregnancy 13 , the precision lens applied within gestation revealed the nonlinear nature of this reduction. Recapitulating and clarifying these regionally specific patterns of volume change throughout the MTL merits further investigation.\nSimilar precision imaging studies have captured dynamic brain reorganization across other neuroendocrine transitions, such as the menstrual cycle (see review in ref. 28), underscoring the powerful role steroid hormones have in shaping the mammalian brain 29 . Endocrine changes across pregnancy dwarf those that occur across the menstrual cycle, which highlights the critical need to map the brain's response to this unique hormonal state. Broad physiological changes occur in tandem with the rise in steroid hormones, including changes in body mass composition, water retention, immune function and\nNature Neuroscience | Volume 27 | November 2024 | 2253-2260\n2258", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed4.pdf" + }, + { + "text": "Cortical volume and thickness changes tied to gestation\nassociated brain networks appear to decrease in volume at a faster rate than the rest of the brain throughout pregnancy, as determined by a subsequent analysis controlling for total GMV (Supplementary Tables 1 and 2). GMV reductions were also significantly correlated with the participant's estradiol and progesterone concentrations (Supplementary Table 1). A highly similar pattern of results was observed when examining pregnancy-related CT changes (Supplementary Fig. 3 and Supplementary Tables 4 and 5). Significant reductions in cortical GMV over gestation remained after controlling for standard quality control (QC) metrics, albeit with some influence on the magnitude and location of the observed effects (Supplementary Figs. 4 and 5).\nIn contrast, GMV within regions of the default mode (subnetwork C), limbic (subnetworks A and B) and visual peripheral networks buck the global trend by slightly increasing (for example, temporal poles), remaining constant (for example, orbitofrontal cortex) or reducing at a much slower rate (for example, extrastriate cortex) than total GMV (Fig. 2a,b and Supplementary Tables 1 and 2). CT changes in these regions exhibit similar patterns (Supplementary Fig. 3 and Supplementary Tables 4 and 5).", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed4.pdf" + }, + { + "text": "References\n11. Servin-Barthet, C. et al. The transition to motherhood: linking hormones, brain and behaviour. Nat. Rev. Neurosci. 24 , 605-619 (2023).\n12. Ammari, R. et al. Hormone-mediated neural remodeling orchestrates parenting onset during pregnancy. Science 382 , 76-81 (2023).\n13. Hoekzema, E. et al. Pregnancy leads to long-lasting changes in human brain structure. Nat. Neurosci. 20 , 287-296 (2017).\n14. Hoekzema, E. et al. Mapping the e/ffects of pregnancy on resting state brain activity, white matter microstructure, neural metabolite concentrations and grey matter architecture. Nat. Commun. 13 , 6931 (2022).\n15. Martínez-García, M., Paternina-Die, M., Desco, M., Vilarroya, O. & Carmona, S. Characterizing the brain structural adaptations across the motherhood transition. Front. Glob. Womens Health 2 , 742775 (2021).\n16. Spalek, K. et al. Pregnancy renders anatomical changes in hypothalamic substructures of the human brain that relate to aspects of maternal behavior. Psychoneuroendocrinology 164 , 107021 (2024).\n17. Martínez-García, M. et al. Do pregnancy-induced brain changes reverse? The brain of a mother six years after parturition. Brain Sci. 11 , 168 (2021b).\n18. De Lange, A.-M. G. et al. Population-based neuroimaging reveals traces of childbirth in the maternal brain. Proc. Natl Acad. Sci. USA 116 , 22341-22346 (2019).", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed4.pdf" + }, + { + "text": "Endocrine procedures\nThe participant underwent a blood draw ( n = 19; Fig. 1c) before MRI scanning. Sex steroid concentrations were determined via ultra-sensitive liquid chromatography-mass spectrometry at the Brigham and Women's Hospital Research Assay Core (BRAC). Assay sensitivities, dynamic range and intra-assay coefficients of variation\nNature Neuroscience\nwere as follows: estradiol-1.0 pg ml -1 , 1-500 pg ml -1 , <5% relative s.d. (RSD); progesterone-0.05 ng ml -1 , 0.05-10 ng ml -1 , 9.33% RSD. Serological samples were not acquired in five sessions due to scheduling conflicts with UC Irvine's Center for Clinical Research.", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed4.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed4.pdf", + "query": "Which cortical sub-networks were particularly sensitive to pregnancy?", + "target_page": 2, + "target_passage": "Several sensory and attention subnetworks were particu- larly sensitive to gestation, including the control (subnetwork B), sali- ence ventral attention (subnetwork A), dorsal attention (subnetwork B), default (subnetwork A) and somatomotor (subnetworks A and B) networks", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Neuroanatomical changes observed over the course of a human pregnancy\nHere we conducted a precision imaging study of pregnancy in which a healthy 38-year-old primiparous woman underwent 26 magnetic resonance imaging (MRI) scans and venipuncture beginning 3 weeks preconception through 2 years postpartum. We observed widespread reductions in cortical GMV and cortical thickness (CT) occurring in step with advancing gestational week and the dramatic rise in sex hormone production. Remodeling was also evident within\n1 Department of Psychological & Brain Sciences, University of California, Santa Barbara, CA, USA. 2 Department of Neurobiology and Behavior, University of California, Irvine, CA, USA. 3 Section on Functional Imaging Methods, Laboratory of Brain and Cognition, National Institute of Mental Health, National Institutes of Health, Bethesda, MD, USA. 4 Neuroscience Research Institute, University of California, Santa Barbara, CA, USA. 5 These authors contributed equally: Elizabeth R. Chrastil, Emily G. Jacobs. e-mail: laura.pritschet@pennmedicine.upenn.edu; chrastil@uci.edu; emily.jacobs@psych.ucsb.edu\nNature Neuroscience | Volume 27 | November 2024 | 2253-2260\n2253\nResource\nsubcortical structures, including the ventral diencephalon, caudate, thalamus, putamen and hippocampus. High-resolution imaging and segmentation of the medial temporal lobe (MTL) extend these findings further, revealing specific volumetric reductions within hippocampal subfields CA1, CA2/CA3 and parahippocampal cortex (PHC). In contrast to widespread decreases in cortical and subcortical GMV, correlational tractography analyses revealed nonlinear increases in white matter quantitative anisotropy (QA) throughout the brain-indicating greater tract integrity-as gestational week progressed. Together, these findings reveal the highly dynamic changes that unfold in a human brain across pregnancy, demonstrating a capacity for extensive neural remodeling well into adulthood.", + "page_start": 0, + "page_end": 1, + "source_file": "pubmed4.pdf" + }, + { + "text": "Cortical volume and thickness changes tied to gestation\nWe then narrowed the aperture to capture changes unfolding within gestation itself (baseline-36 weeks pregnant, 19 scans). Relationships between summary brain metrics were evident over the gestational period as follows: total brain volume, GMV and CT were positively associated with one another, whereas lateral ventricles, CSF and global QA demonstrated negative relationships with GMV (Supplementary Fig. 1).\nChanges in GMV were near-ubiquitous across the cortical mantle (Fig. 2a). Most large-scale brain networks exhibited decreases in GMV (Fig. 2b and Supplementary Table 1); indeed, 80% of the 400 regions of interest (ROI) demonstrated negative relationships between GMV and gestation week (Fig. 2a and Supplementary Table 2). Together, these results provide evidence of a global decrease in cortical volume across pregnancy. Several sensory and attention subnetworks were particularly sensitive to gestation, including the control (subnetwork B), salience/ventral attention (subnetwork A), dorsal attention (subnetwork B), default (subnetwork A) and somatomotor (subnetworks A and B) networks (Supplementary Table 1). Regions driving these network-level changes include the bilateral inferior parietal lobe, postcentral gyri, insulae, prefrontal cortex, posterior cingulate and somatosensory cortex (Fig. 2c, Supplementary Table 2 and validation of findings using alternate pipeline in Supplementary Tables 1 and 3). These regions and\nNature Neuroscience | Volume 27 | November 2024 | 2253-2260\n2254\nhttps://doi.org/10.1038/s41593-024-01741-0", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed4.pdf" + }, + { + "text": "Resource\n47. Shehata, H. A. & Okosun, H. Neurological disorders in pregnancy. Curr. Opin. Obstet. Gynecol. 16 , 117-122 (2004).\n48. Mowinckel, A. M. & Vidal-Piñeiro, D. Visualization of brain statistics with R packages ggseg and ggseg3d. Adv. Methods Pract. Psychol. Sci. 3 , 466-483 (2020).\nPublisher's note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional a/ff.shortiliations.\nOpen Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons. org/licenses/by/4.0/.\n© The Author(s) 2024\nResource\nhttps://doi.org/10.1038/s41593-024-01741-0", + "page_start": 7, + "page_end": 8, + "source_file": "pubmed4.pdf" + }, + { + "text": "References\n11. Servin-Barthet, C. et al. The transition to motherhood: linking hormones, brain and behaviour. Nat. Rev. Neurosci. 24 , 605-619 (2023).\n12. Ammari, R. et al. Hormone-mediated neural remodeling orchestrates parenting onset during pregnancy. Science 382 , 76-81 (2023).\n13. Hoekzema, E. et al. Pregnancy leads to long-lasting changes in human brain structure. Nat. Neurosci. 20 , 287-296 (2017).\n14. Hoekzema, E. et al. Mapping the e/ffects of pregnancy on resting state brain activity, white matter microstructure, neural metabolite concentrations and grey matter architecture. Nat. Commun. 13 , 6931 (2022).\n15. Martínez-García, M., Paternina-Die, M., Desco, M., Vilarroya, O. & Carmona, S. Characterizing the brain structural adaptations across the motherhood transition. Front. Glob. Womens Health 2 , 742775 (2021).\n16. Spalek, K. et al. Pregnancy renders anatomical changes in hypothalamic substructures of the human brain that relate to aspects of maternal behavior. Psychoneuroendocrinology 164 , 107021 (2024).\n17. Martínez-García, M. et al. Do pregnancy-induced brain changes reverse? The brain of a mother six years after parturition. Brain Sci. 11 , 168 (2021b).\n18. De Lange, A.-M. G. et al. Population-based neuroimaging reveals traces of childbirth in the maternal brain. Proc. Natl Acad. Sci. USA 116 , 22341-22346 (2019).", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed4.pdf" + }, + { + "text": "Discussion\nConverging evidence across mammalian species points to pregnancy as a remarkable period of neuroplasticity, revealing the brain's ability to undergo adaptive, hormonally-driven neuroanatomical changes beyond adolescence 13-15,20,21,24-26 . Investigations that compare women\nNature Neuroscience | Volume 27 | November 2024 | 2253-2260\n2255\nprepregnancy and then again postpartum provide the strongest evidence to date that the human brain undergoes such neural changes 11,27 . But what about pregnancy itself? Over what time course do anatomical changes in the maternal brain manifest? Are they tied to the substantial increase in sex hormone production? Here we begin to address these\nResource\na\nWhole-brain GMV\nGMV ~ gestation week\nFig. 2 | Cortical GMV showed widespread change through gestation and\nhttps://doi.org/10.1038/s41593-024-01741-0\nPostcentral gyrus Dorsal attention network B Regional GMV\nFrontal eye fields\nDorsal attention network B\nc\nPrecuneus/posterior cingulate Default mode network A\nMedial frontal Salience ventral attention network A\nInsula Salience ventral attention network B\npostpartum. a , Multivariate regression analyses reveal largely negative relationships between gestation week and regional GMV, with only a minority of regions unaffected or increasing over the gestational window (baseline-36 weeks). All associations presented here were corrected for multiple comparisons (FDR at q < 0.05; nonsignificant values set to zero for interpretability). b , Average network change was calculated by estimating GMV percent change from baseline (initial) to 36 weeks gestation (final). Attention and control networks appear most affected. c , Six representative regions, classified by major subnetworks, that exhibit pronounced GMV change across gestation. For each panel, we display a scatterplot between average GMV of the ROIs and gestation week (left; gestation sessions only, 19 scans), and summary GMV of ROIs by pregnancy stage across the whole study (right; gestation and postpartum sessions, 26 scans).", + "page_start": 2, + "page_end": 3, + "source_file": "pubmed4.pdf" + }, + { + "text": "Cortical volume and thickness changes tied to gestation\nassociated brain networks appear to decrease in volume at a faster rate than the rest of the brain throughout pregnancy, as determined by a subsequent analysis controlling for total GMV (Supplementary Tables 1 and 2). GMV reductions were also significantly correlated with the participant's estradiol and progesterone concentrations (Supplementary Table 1). A highly similar pattern of results was observed when examining pregnancy-related CT changes (Supplementary Fig. 3 and Supplementary Tables 4 and 5). Significant reductions in cortical GMV over gestation remained after controlling for standard quality control (QC) metrics, albeit with some influence on the magnitude and location of the observed effects (Supplementary Figs. 4 and 5).\nIn contrast, GMV within regions of the default mode (subnetwork C), limbic (subnetworks A and B) and visual peripheral networks buck the global trend by slightly increasing (for example, temporal poles), remaining constant (for example, orbitofrontal cortex) or reducing at a much slower rate (for example, extrastriate cortex) than total GMV (Fig. 2a,b and Supplementary Tables 1 and 2). CT changes in these regions exhibit similar patterns (Supplementary Fig. 3 and Supplementary Tables 4 and 5).", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed4.pdf" + }, + { + "text": "Resource\n19. Orchard, E. R. et al. Neuroprotective e/ffects of motherhood on brain function in late life: a resting-state fMRI study. Cereb. Cortex 31 , 1270-1283 (2021).\n20. Oatridge, A. et al. Change in brain size during and after pregnancy: study in healthy women and women with preeclampsia. Am. J. Neuroradiol. 23 , 19-26 (2002).\n21. Paternina-Di, M. et al. Women's neuroplasticity during gestation, childbirth and postpartum. Nat. Neurosci. 27 , 319-327 (2024).\n22. Makris, N. et al. Decreased volume of the brain reward system in alcoholism. Biol. Psychiatry 64 , 192-202 (2008).\n23. Filevich, E. et al. Day2day: investigating daily variability of magnetic resonance imaging measures over half a year. BMC Neurosci. 18 , 65 (2017).\n24. Dulac, C., O'Connell, L. A. & Wu, Z. Neural control of maternal and paternal behaviors. Science 345 , 765-770 (2014).\n25. Carmona, S. et al. Pregnancy and adolescence entail similar neuroanatomical adaptations: a comparative analysis of cerebral morphometric changes. Hum. Brain Mapp. 40 , 2143-2152 (2019).\n26. Pawluski, J. L., Hoekzema, E., Leuner, B. & Lonstein, J. S. Less can be more: fine tuning the maternal brain. Neurosci. Biobehav. Rev. 133 , 104475 (2022).\n27. Martínez-García, M., Jacobs, E. G., de Lange, A. M. G. & Carmona, S. Advancing the neuroscience of human pregnancy. Nat. Neurosci. 27 , 805-807 (2024).\n28. Pritschet, L., Taylor, C. M., Santander, T. & Jacobs, E. G. Applying dense-sampling methods to reveal dynamic endocrine modulation of the nervous system. Curr. Opin. Behav. Sci. 40 , 72-78 (2021).", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed4.pdf" + }, + { + "text": "Whole-brain subcortical volumes\nAlthough studied to a lesser degree, ties between maternal behavior and white matter microstructure (particularly connectivity between temporal and occipital lobes) have been noted 31 . Here we reveal pronounced GMV changes in regions within sensory, attention and default mode networks over the gestational window. In parallel, we observed increased anisotropy in white matter tracts that facilitate communication between emotional and visual processing hubs 37-39 , including the inferior longitudinal fasciculus and inferior fronto-occipital fasciculus. Pinpointing the synchrony of gray and white matter changes that unfold in the maternal brain could be key to understanding the behavioral adaptions that emerge during and after pregnancy, such as honing the brain's visual and auditory responses to infant cues and eliciting maternal behavior. Research into other major transition periods supports this idea. For instance, adolescence is a dynamic period characterized by region-specific, nonlinear decreases in GMV and increases in WMV, maturational brain changes that are tied to gains in executive function and social cognition 40 . For both adolescence 41 and matrescence, the considerable rise in steroid hormone production appears to remodel the brain (see ref. 25 for comparative analysis), promoting a suite of behaviors adaptive to that life stage. How specific neural changes give rise to specific behavioral adaptations has yet to be fully explored with respect to human pregnancy.\nThis precision imaging study mapped neuroanatomical changes across pregnancy in a single individual, precluding our ability to generalize to the broader population. To benchmark our findings, we compared the magnitude of GMV changes observed throughout pregnancy against data from nonpregnant individuals sampled over a similar time course. Doing so provided compelling evidence that pregnancy-related neuroanatomical shifts far exceed normative day-to-day brain variability and measurement error. Evidence suggests that white matter microstructure remains fairly stable over a six-month period 42 , but more studies are needed to compare the degree of white matter changes observed during pregnancy to normative change over time. Further, sampling larger cohorts of women will generate much-needed normative models of brain change (akin to ref. 43) throughout pregnancy to establish what constitutes a typical degree of neuroanatomical change expected during gestation and postpartum recovery.", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed4.pdf" + }, + { + "text": "Neuroanatomical changes observed over the course of a human pregnancy\nWorldwide, nearly 85% of women experience one or more pregnancies in their lifetime 1 , with 140 million women becoming pregnant each year. Over an approximately 40-week gestational window, the maternal body undergoes profound physiological adaptations to support the development of the fetus, including increases in plasma volume, metabolic rate, oxygen consumption and immune regulation 2 . These rapid adaptations are initiated by 100-fold to 1,000-fold increases in hormone production, including estrogen and progesterone. These neuromodulatory hormones also drive significant reorganization of the central nervous system. Evidence from animal models and human studies converge on pregnancy as a period of remarkable neuroplasticity 3-10 (see ref. 10 for one of the earliest known observations). Gestational increases in steroid hormone synthesis drive neurogenesis, dendritic spine growth, microglial proliferation, myelination and astrocyte remodeling (for review, see ref. 11). These cellular changes are pronounced in brain circuits that promote maternal behavior. For example, Ammari et al. recently discovered that steroid hormones can fine-tune the response properties of galanin neurons in the rodent medial preoptic area of the hypothalamus (mPOA), leading to enhanced sensitivity in dams to sensory cues from newborn pups 12 .\nIn humans, reductions in gray matter volume (GMV) have been observed postpartum 13-16 , particularly in regions central to theory-of-mind processing 13 . These GMV changes persist at 6 years postpartum 17 and are traceable decades later 18,19 , underscoring the permanence of this major remodeling event. And yet the changes that occur within the maternal brain during gestation itself are virtually unknown (see ref. 20 for early neuroimaging insight). A recent study by Paternina-Die et al. offers intriguing clues 21 . Women were scanned once in the third trimester and again in the postpartum period, revealing a reduction of cortical volume observable in the late pregnancy scan. These findings suggest that pregnancy is a highly dynamic period for neural remodeling, yet neuroscientists lack a detailed map of how the human brain changes throughout the gestational period.", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed4.pdf" + }, + { + "text": "Whole-brain subcortical volumes\nOur findings from this precision imaging study show that pregnancy is characterized by reductions in GMV, cortical thinning and enhanced white matter microstructural integrity that unfold week by week. These changes were also tied to the significant rise in steroid hormone concentrations over pregnancy. Some of these changes persist at 2 years postpartum (for example, global reductions in GMV and CT), while others, including markers of white matter integrity, appear to be transient. Ventricular expansion and contraction parallel these cortical changes. These widespread patterns, and the notable increase in CSF volume across gestation, could reflect increased water retention and subsequent compression of cortical tissue. However, the persistence of these changes at 2 years postpartum and regional variation in GMV, CT and QA, hint at cellular underpinnings, such as alterations in glia\nNature Neuroscience | Volume 27 | November 2024 | 2253-2260\n2257\nor neuron number, synaptic density and myelination (for review on the latter, see ref. 4). Future studies of the relationship between fluid dynamics and volumetric changes will help clarify the factors that drive global neural changes during pregnancy; such insights will have broad implications for maternal health (for example, neurological effects tied to pre-eclampsia or edema).\nCritically, dynamic neural changes occurred within the pregnancy window itself, a nuance not captured by studies limited to comparisons between prepregnancy and postpregnancy. For example, we observed large increases in white matter microstructural integrity (QA) throughout the first and second trimesters of pregnancy, but these measures fully returned to baseline values by the first postpartum scan. This pattern may explain why previous studies report no pregnancy-related differences in white matter tractography 14 . Other measures, such as GMV and CT, decreased throughout gestation and displayed only a modest rebound postpartum. These nonlinear patterns suggest that only quantifying prepregnancy and postpartum brain structure may\nhttps://doi.org/10.1038/s41593-024-01741-0\nPHC\nResource\nhttps://doi.org/10.1038/s41593-024-01741-0", + "page_start": 4, + "page_end": 5, + "source_file": "pubmed4.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed4.pdf", + "query": "What may reflect the decrease in GMV during pregnancy?", + "target_page": 6, + "target_passage": " Decreases in GMV may reflect ‘fine-tuning’ of the brain by neuromodulatory hormones in prepara- tion for parenthood", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Comparing brain changes across pregnancy against controls\nWe then compared the changes in GMV across gestation to that of typical variability over time, derived from eight densely-sampled controls 23 . The GMV changes we see across pregnancy far exceed normative brain variability (Supplementary Fig. 11). On average, change in cortical GMV was nearly three times higher than controls scanned over a similar duration (Supplementary Fig. 11a,b). This extends to MTL subfields, wherein change in volume was three to four times greater across gestation than normative brain variability (Supplementary Fig. 11c,d). We contextualized these findings further by comparing gestational GMV change against our participant's preconception brain volumes; average GMV change during pregnancy was six times (cortical) and three times (MTL) higher than the variability observed between baseline sessions.\nResource\nhttps://doi.org/10.1038/s41593-024-01741-0\nFig. 1 | Precision imaging reveals neuroanatomical changes throughout gestation. a , Standard medical demarcations for pregnancy stages (that is, trimesters) by gestation week (the image is created with BioRender.com). b , Steroid hormones increased significantly throughout pregnancy and dropped precipitously postpartum, as is characteristic of the prenatal and postnatal periods. c , A healthy 38-year-old primiparous woman underwent 26 scanning sessions from 3 weeks preconception through 2 years postpartum. Scans were distributed throughout preconception (four scans), first trimester (four scans), second trimester (six scans), third trimester (five scans) and postpartum (seven scans); tick marks indicate when major measures were collected and", + "page_start": 1, + "page_end": 2, + "source_file": "pubmed4.pdf" + }, + { + "text": "Cortical volume and thickness changes tied to gestation\nassociated brain networks appear to decrease in volume at a faster rate than the rest of the brain throughout pregnancy, as determined by a subsequent analysis controlling for total GMV (Supplementary Tables 1 and 2). GMV reductions were also significantly correlated with the participant's estradiol and progesterone concentrations (Supplementary Table 1). A highly similar pattern of results was observed when examining pregnancy-related CT changes (Supplementary Fig. 3 and Supplementary Tables 4 and 5). Significant reductions in cortical GMV over gestation remained after controlling for standard quality control (QC) metrics, albeit with some influence on the magnitude and location of the observed effects (Supplementary Figs. 4 and 5).\nIn contrast, GMV within regions of the default mode (subnetwork C), limbic (subnetworks A and B) and visual peripheral networks buck the global trend by slightly increasing (for example, temporal poles), remaining constant (for example, orbitofrontal cortex) or reducing at a much slower rate (for example, extrastriate cortex) than total GMV (Fig. 2a,b and Supplementary Tables 1 and 2). CT changes in these regions exhibit similar patterns (Supplementary Fig. 3 and Supplementary Tables 4 and 5).", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed4.pdf" + }, + { + "text": "Subcortical GMV changes tied to gestation\nConsistent with the broader cortical reductions in GMV, several subcortical regions significantly reduced in volume across gestation (Fig. 3a, left). This included bilateral ventral diencephalon (right hemisphere values shown in Fig. 3a, right; encompasses hypothalamus, substantia nigra, mammillary body, lateral geniculate nucleus and red nucleus among others 22 ), caudate, hippocampus and thalamus, along with left putamen and brain stem (Supplementary Table 6, q < 0.05).\nNext, high-resolution segmentation of the MTL allowed us to interrogate subcortical structures at a finer resolution, revealing nonlinear volumetric decreases in CA1 ( F (2,15) = 5.84, q = 0.031, R 2 adj = 0.36; Fig. 3b, left) and CA2/CA3 ( F (2,15) = 6.82, q = 0.027, R 2 adj = 0.41; Fig. 3b, middle) across gestation. PHC exhibited linear volumetric decreases across gestation ( F (1,16) = 24.87, q < 0.001, R 2 adj = 0.58; Fig. 3b, right) which was also tied to estradiol ( F (1,12) = 20.21, q = 0.005, R 2 adj = 0.60). All three relationships remained significant after proportional correction for total GMV. There was no significant change in other subregions or total volume of the hippocampal body, or in the parahippocampal gyrus (Supplementary Table 7 and Supplementary Fig. 8).", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed4.pdf" + }, + { + "text": "Gray Matter Volume & Cortical Thickness:\nWe first computed Pearson's product-moment correlation matrices between the following variables (n = 19 pregnancy scans): gestation week, estradiol, progesterone, total GMV, and the 17 network-level average GMV values. We then ran a multivariate regression analysis predicting ROI-level GMV changes by gestation week. To identify which regions were changing at a rate different from the global decrease, we then re-ran the analyses to include total GMV as a variable of noninterest in the regression model. A similar statistical approach was taken for T1w-derived subcortical volume estimates. We ran a multivariate regression analysis predicting GMV changes over gestation in 28 regions-of-interest by gestation week (FDR-corrected at q < 0.05).", + "page_start": 16, + "page_end": 16, + "source_file": "pubmed4.pdf" + }, + { + "text": "Endocrine procedures\nCortical GMV and CT . We then narrowed our analyses to the first 19 sessions (baseline-36 weeks gestation) to assess novel brain changes occurring over the gestational window. We first computed Pearson's product-moment correlation matrices between the following variables: gestation week, estradiol, progesterone and the 17 network-level average GMV values. We then ran a multivariate regression analysis predicting ROI-level GMV changes by gestation week. To identify which regions were changing at a rate different from the global decrease, we then ran the analyses again to include total GMV in the regression model (Supplementary Table 2). This was extended to the network level, where we ran partial correlations accounting for total GMV. These same analyses were then run with CT measures. Globally-corrected results provided in Supplementary Tables 1-5. Percent change at the network level was computed by subtracting the final pregnancy value (36 weeks pregnant) from the first prepregnancy baseline value, then dividing that difference by said first prepregnancy baseline value. All analyses underwent multiple comparisons testing (false discovery rate (FDR)-corrected at q < 0.05).\nNature Neuroscience\nSubcortical GMV . A similar statistical approach was taken for subcortical volume estimates. We ran a multivariate regression analysis predicting GMV changes over gestation in 28 ROIs (Supplementary Fig. 6a) by gestation week (FDR-corrected at q < 0.05).\nTo evaluate the relationship between gestation week and MTL subregion volume over pregnancy ( n = 7 bilateral subregions and n = 18 MTL scans), we used a combination of linear and nonlinear models based on individual subregion data patterns. Models were compared for best fit with each subregion via AIC from the GLM output (as described in 'Summary brain metrics'). A linear regression model was most appropriate for PHC (AICdiff < 3), whereas a quadratic model performed best for CA1 and CA2/CA3. As a control, we repeated the analyses with MTL subregion volumes after proportional volume correction of total GMV calculated by ASHS. Finally, we evaluated the relationship between endogenous sex hormones (estrogen and progesterone) and subregion volumes using linear regression. Relationships were considered significant only if they met FDR correction at q < 0.05.", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed4.pdf" + }, + { + "text": "Whole-brain subcortical volumes\nb\nCA1\nMedial temporal lobe subregion volumes\nCA2/CA3\nFig. 3 | Subcortical GMV changed throughout gestation. a , Multivariate regression analyses revealed largely negative relationships between gestation week and subcortical GMV regions over pregnancy, including bilateral thalamus, caudate, hippocampus, ventral diencephalon (encompassing hypothalamus, substantia nigra, mammillary body and red nucleus) and left caudate. Lateral ventricles displayed the only positive relationships with gestation week (also depicted in Fig. 1d). The whole-brain subcortical GMV estimates shown here were derived via FreeSurfer and 'aseg' subcortical segmentation. FDRcorrected at q < 0.05. Inset, right ventral diencephalon displayed the strongest negative association with gestation (left; baseline-36 weeks, 19 scans) and did not return to baseline postpartum (right; gestation and postpartum, 26 scans). b , The participant's hippocampus and surrounding cortex were segmented\ninto seven bilateral subregions. Quadratic (CA1, CA2/CA3) and linear regression analyses (PHC) revealed subfields were negatively associated with gestation week (baseline-36 weeks, 18 scans) and did not return to baseline postpartum (gestation and postpartum, 25 scans). Shaded regions in scatterplots represent a 95% confidence interval. Each boxplot represents IQR for each stage, with a horizontal line representing the median value. The whiskers indicate variability outside (±1.5) of this range. Outside values are >1.5× and <3× IQR beyond either end of the box. FDR-corrected at q < 0.05. For a and b , nonsignificant regions were set to zero for interpretability. See Supplementary Fig. 6 for complete labeling of regions in both segmentations. Brain visualizations created with R package ggseg 48 . DC, diencephalon.\noutstanding questions. This study and corresponding open-access dataset offer neuroscientists a detailed map of the human brain across gestation, a resource for which a wide range of previously unattainable neurobiological questions can now be explored.", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed4.pdf" + }, + { + "text": "Whole-brain subcortical volumes\nOur findings from this precision imaging study show that pregnancy is characterized by reductions in GMV, cortical thinning and enhanced white matter microstructural integrity that unfold week by week. These changes were also tied to the significant rise in steroid hormone concentrations over pregnancy. Some of these changes persist at 2 years postpartum (for example, global reductions in GMV and CT), while others, including markers of white matter integrity, appear to be transient. Ventricular expansion and contraction parallel these cortical changes. These widespread patterns, and the notable increase in CSF volume across gestation, could reflect increased water retention and subsequent compression of cortical tissue. However, the persistence of these changes at 2 years postpartum and regional variation in GMV, CT and QA, hint at cellular underpinnings, such as alterations in glia\nNature Neuroscience | Volume 27 | November 2024 | 2253-2260\n2257\nor neuron number, synaptic density and myelination (for review on the latter, see ref. 4). Future studies of the relationship between fluid dynamics and volumetric changes will help clarify the factors that drive global neural changes during pregnancy; such insights will have broad implications for maternal health (for example, neurological effects tied to pre-eclampsia or edema).\nCritically, dynamic neural changes occurred within the pregnancy window itself, a nuance not captured by studies limited to comparisons between prepregnancy and postpregnancy. For example, we observed large increases in white matter microstructural integrity (QA) throughout the first and second trimesters of pregnancy, but these measures fully returned to baseline values by the first postpartum scan. This pattern may explain why previous studies report no pregnancy-related differences in white matter tractography 14 . Other measures, such as GMV and CT, decreased throughout gestation and displayed only a modest rebound postpartum. These nonlinear patterns suggest that only quantifying prepregnancy and postpartum brain structure may\nhttps://doi.org/10.1038/s41593-024-01741-0\nPHC\nResource\nhttps://doi.org/10.1038/s41593-024-01741-0", + "page_start": 4, + "page_end": 5, + "source_file": "pubmed4.pdf" + }, + { + "text": "Comparing brain changes across pregnancy against controls\ncolors denote pregnancy stage. The participant underwent IVF to achieve pregnancy, allowing for precise mapping of ovulation, conception and gestation week. d , Summary (that is, total) of brain measures throughout the experiment. Generalized additive models revealed GMV, CT and total brain volume decreased throughout pregnancy (see Methods for validation with cubic regression), with a slight recovery postpartum. Global QA, lateral ventricle and CSF volumes displayed nonlinear increases across gestation, with a notable rise in the second and third trimesters before dropping sharply postpartum. Shaded regions represent 95% confidence bands; solid lines indicate model fit; dashed line indicates parturition.", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed4.pdf" + }, + { + "text": "Cortical volume and thickness changes tied to gestation\nWe then narrowed the aperture to capture changes unfolding within gestation itself (baseline-36 weeks pregnant, 19 scans). Relationships between summary brain metrics were evident over the gestational period as follows: total brain volume, GMV and CT were positively associated with one another, whereas lateral ventricles, CSF and global QA demonstrated negative relationships with GMV (Supplementary Fig. 1).\nChanges in GMV were near-ubiquitous across the cortical mantle (Fig. 2a). Most large-scale brain networks exhibited decreases in GMV (Fig. 2b and Supplementary Table 1); indeed, 80% of the 400 regions of interest (ROI) demonstrated negative relationships between GMV and gestation week (Fig. 2a and Supplementary Table 2). Together, these results provide evidence of a global decrease in cortical volume across pregnancy. Several sensory and attention subnetworks were particularly sensitive to gestation, including the control (subnetwork B), salience/ventral attention (subnetwork A), dorsal attention (subnetwork B), default (subnetwork A) and somatomotor (subnetworks A and B) networks (Supplementary Table 1). Regions driving these network-level changes include the bilateral inferior parietal lobe, postcentral gyri, insulae, prefrontal cortex, posterior cingulate and somatosensory cortex (Fig. 2c, Supplementary Table 2 and validation of findings using alternate pipeline in Supplementary Tables 1 and 3). These regions and\nNature Neuroscience | Volume 27 | November 2024 | 2253-2260\n2254\nhttps://doi.org/10.1038/s41593-024-01741-0", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed4.pdf" + }, + { + "text": "Discussion\nConverging evidence across mammalian species points to pregnancy as a remarkable period of neuroplasticity, revealing the brain's ability to undergo adaptive, hormonally-driven neuroanatomical changes beyond adolescence 13-15,20,21,24-26 . Investigations that compare women\nNature Neuroscience | Volume 27 | November 2024 | 2253-2260\n2255\nprepregnancy and then again postpartum provide the strongest evidence to date that the human brain undergoes such neural changes 11,27 . But what about pregnancy itself? Over what time course do anatomical changes in the maternal brain manifest? Are they tied to the substantial increase in sex hormone production? Here we begin to address these\nResource\na\nWhole-brain GMV\nGMV ~ gestation week\nFig. 2 | Cortical GMV showed widespread change through gestation and\nhttps://doi.org/10.1038/s41593-024-01741-0\nPostcentral gyrus Dorsal attention network B Regional GMV\nFrontal eye fields\nDorsal attention network B\nc\nPrecuneus/posterior cingulate Default mode network A\nMedial frontal Salience ventral attention network A\nInsula Salience ventral attention network B\npostpartum. a , Multivariate regression analyses reveal largely negative relationships between gestation week and regional GMV, with only a minority of regions unaffected or increasing over the gestational window (baseline-36 weeks). All associations presented here were corrected for multiple comparisons (FDR at q < 0.05; nonsignificant values set to zero for interpretability). b , Average network change was calculated by estimating GMV percent change from baseline (initial) to 36 weeks gestation (final). Attention and control networks appear most affected. c , Six representative regions, classified by major subnetworks, that exhibit pronounced GMV change across gestation. For each panel, we display a scatterplot between average GMV of the ROIs and gestation week (left; gestation sessions only, 19 scans), and summary GMV of ROIs by pregnancy stage across the whole study (right; gestation and postpartum sessions, 26 scans).", + "page_start": 2, + "page_end": 3, + "source_file": "pubmed4.pdf" + } + ] + }, + { + "references": { + "source_file": "6126797.pdf", + "query": "How to light up my sports smart watch?", + "target_page": 2, + "target_passage": "Up button: Short press to light up or turn off the screen", + "chunk_present": { + "presence": true, + "index": 4 + } + }, + "top_chunk": [ + { + "text": "Button down:\nShort press to enter multi-sport mode.\nIn addition, when the watch is in the off-screen state, you can light up the screen by pressing any buttons.", + "page_start": 1, + "page_end": 1, + "source_file": "6126797.pdf" + }, + { + "text": "6. Tilt to wake the screen\nWear the smartwatch correctly on your wrist (left/right hand). when you switch on the feature, you can light up the screen when you raise up your wrist.", + "page_start": 6, + "page_end": 6, + "source_file": "6126797.pdf" + }, + { + "text": "3. Find Watch\nAfter the smartwatch is bound to the APP, you click 'Find Watch' in the APP, the smartwatch will light up and vibrate for once.", + "page_start": 5, + "page_end": 5, + "source_file": "6126797.pdf" + }, + { + "text": "1.1 Shortcut function:\n1) Swipe to the left till you find the \"+\" icon, click the icon to add part of the functions in the shortcut.\n2) Scroll down the screen when the watch is in the dial interface, you can find Bluetooth connection status, time, power, brightness adjustment and other functions.\n3) Swipe to the right when the watch is in the dial interface, you can find time/date/week/the latest message (enter to view multiple messages)/some of the recently used menu functions, and turn on or off audio Bluetooth for calls.\n4) Swipe up the screen when the watch is in the dial interface to enter the menu interface, and scroll up and down to find the corresponding function.\n5) Long press the watch face interface and swipe to right or left to switch the watch face, select one of them and set it with one-click.", + "page_start": 1, + "page_end": 2, + "source_file": "6126797.pdf" + }, + { + "text": "Up button:\nShort press to light up or turn off the screen; one press to go back the dial interface; long press to reactivate the watch.", + "page_start": 1, + "page_end": 1, + "source_file": "6126797.pdf" + }, + { + "text": "1.3 Drop-down menu\nScroll down the screen when the watch is in the dial interface to enter the drop-down menu interface.\n1) Bluetooth connection status; time; power left;\n2) About, where you can check the firmware version of watch and the address of the Bluetooth\n3) Setting, where you can enter it to set part of the functions;\n4) Brightness adjustment; where you can adjust the brightness of the screen;\n5) Alipay. Download the app Alipay in your mobile phone and bind it with your watch to realize offline payment.", + "page_start": 2, + "page_end": 2, + "source_file": "6126797.pdf" + }, + { + "text": "2.1 Remote control music\nBind the smartwatch to the app WearPro, you can control the music to start/pause/play previous song/play next song of your phone.\nBind the audio/calling Bluetooth of the smartwatch also, the music will be broadcast on the smartwatch.", + "page_start": 4, + "page_end": 4, + "source_file": "6126797.pdf" + }, + { + "text": "*No power on, no charging\nIf you receive the goods and the watch does not turn on, it may be caused by a collision during the transportation of the watch and the battery Seiko board has been protected, so plug in the charging cable to activate it.\nIf the battery is too low or the watch does not turn on after a long period of time, please plug in the data cable and charge it for more than half an hour to activate.", + "page_start": 7, + "page_end": 8, + "source_file": "6126797.pdf" + }, + { + "text": "1.5 message\nWhen the watch is successfully bound to the app, and you approve notifications of corresponding apps in your mobile phone system, and switch on these apps or callings notifications functions on your watch, the notifications on your mobile phone can synchronize to your watch.\n1.5.1. Incoming call notification:\nTurn on the incoming call reminder in the app. When the phone has a incoming call, the watch will light up or vibrate.\n1.5.2. SMS notification:\nEnable the SMS notification in the app. When one or more SMS messages are received on the mobile phone, the watch will receive one or more SMS reminders at the same time.\n1.5.3. Other application message notifications:\nTurn on the corresponding application message notification in the app, such as WeChat, QQ, Outlook, Facebook and other applications. When the mobile phone receives one/multiple application message notifications, the watch will receive one/multiple corresponding message reminders at the same time.", + "page_start": 2, + "page_end": 3, + "source_file": "6126797.pdf" + }, + { + "text": "4. Camera\nClick 'camera' in the app WearPro to wake up the camera mode of the watch, click the camera button on the watch to take photos, and the photos will be automatically saved to the phone album.", + "page_start": 6, + "page_end": 6, + "source_file": "6126797.pdf" + } + ] + }, + { + "references": { + "source_file": "6126797.pdf", + "query": "Is my sports smartwatch's fitness data turned on or off by default?", + "target_page": 4, + "target_passage": "Fitness data is turned on by default.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "1.7 Fitness data\nFitness data is turned on by default. When you enter the fitness data interface, scroll up the screen, the smartwatch will display the current data of steps, distance, and calories. The data will be wiped out at 00:00 every day in the morning.", + "page_start": 3, + "page_end": 3, + "source_file": "6126797.pdf" + }, + { + "text": "basketball, football)\n1.8.1 Select the corresponding exercise mode, click the 'Start' button on the screen to start the exercise; click the 'Start' button again to pause the recording of the exercise; click the 'End' button to end the recording, and save to the data.\n1.8.2 The data can only be saved when the recording of the exercise is more than 1 minute; If the recording time is less than 1 minute, the smartwatch will remind you that the data is too little to be saved.", + "page_start": 3, + "page_end": 3, + "source_file": "6126797.pdf" + }, + { + "text": "13. Unbind\nIn the \"Device\" column of WearPro, scroll down to the \"Unbind\" and click to unbind the APP. The iSO users need to go to the Bluetooth settings of the phone, select the Bluetooth name of the\nsmart watch, and click \"Forget this device\". The 'About' of the watch has an 'Unbind' button, click it to unbind or do it in the APP. For the safety of users' data, the watch will implement a factory reset after that.", + "page_start": 7, + "page_end": 7, + "source_file": "6126797.pdf" + }, + { + "text": "Button down:\nShort press to enter multi-sport mode.\nIn addition, when the watch is in the off-screen state, you can light up the screen by pressing any buttons.", + "page_start": 1, + "page_end": 1, + "source_file": "6126797.pdf" + }, + { + "text": "2.1 Unconnected to the APP state:\nAfter the watch is turned on, the Bluetooth will be in the state of being searched. After open the APK/APP, go to Devices > Add Device > click to start searching, select and click the corresponding watch device name, and the watch will be successfully bound to the app.", + "page_start": 5, + "page_end": 5, + "source_file": "6126797.pdf" + }, + { + "text": "5. Data synchronization\nAfter the watch is successfully bound to the application, the data in the smartwatch can be synchronized to the application.", + "page_start": 6, + "page_end": 6, + "source_file": "6126797.pdf" + }, + { + "text": "1.9 Heart rate\nAfter you wearing the smartwatch correctly, you can measure heart rate when you enter the heart rate function. If you don't wear the smartwatch properly, it will remind you to wear firmly for the measurement.", + "page_start": 3, + "page_end": 3, + "source_file": "6126797.pdf" + }, + { + "text": "2.2 Connected to the APP state:\nWatch time synchronization: the time shown at the smartwatch and your mobile phone will synchronized after the smartwatch is bound to the APP successfully.\n2.3 Binding the audio/calling Bluetooth\nWhen the smartwatch is in the dial interface, you can find the audio/calling Bluetooth icon, and click it to turn it on, then go to the Bluetooth settings of your mobile phone and click the name of the audio/calling Bluetooth of the smartwatch to bind it.", + "page_start": 5, + "page_end": 5, + "source_file": "6126797.pdf" + }, + { + "text": "1.10 ECG\nAfter you wearing the smartwatch correctly, and enter the ECG function(you need to turn on the ECG interface in the app, you can have single measurement at a time. The data of ECG will be saved in the mobile phone. This function should be used with the app.", + "page_start": 3, + "page_end": 3, + "source_file": "6126797.pdf" + }, + { + "text": "2.4 Weather\nAfter the smartwatch is connected to the app and the data is synchronized, tap Weather on the watch to display the weather information for the day.", + "page_start": 4, + "page_end": 4, + "source_file": "6126797.pdf" + } + ] + }, + { + "references": { + "source_file": "6126797.pdf", + "query": "When does my Sport smartwatch start and stop monitoring sleep?", + "target_page": 5, + "target_passage": "Sleep monitoring time period: from 18:00 at night to 10:00 the next day", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "2.2 Sleep\nSleep monitoring time period: from 18:00 at night to 10:00 the next day, the data will be generated by the watch. After connecting to the APP, the sleep data on the watch can be synchronized to the APP for you to check.", + "page_start": 4, + "page_end": 4, + "source_file": "6126797.pdf" + }, + { + "text": "7. Do not disturb mode\nIn the APP, tap 'Device' > 'More' > 'Do not disturb mode', set the start to end time, such as 12:00 to 14:00, then you won't receive phone calls and apps notifications on the watch during this period.", + "page_start": 6, + "page_end": 6, + "source_file": "6126797.pdf" + }, + { + "text": "1.7 Fitness data\nFitness data is turned on by default. When you enter the fitness data interface, scroll up the screen, the smartwatch will display the current data of steps, distance, and calories. The data will be wiped out at 00:00 every day in the morning.", + "page_start": 3, + "page_end": 3, + "source_file": "6126797.pdf" + }, + { + "text": "3. Find Watch\nAfter the smartwatch is bound to the APP, you click 'Find Watch' in the APP, the smartwatch will light up and vibrate for once.", + "page_start": 5, + "page_end": 5, + "source_file": "6126797.pdf" + }, + { + "text": "basketball, football)\n1.8.1 Select the corresponding exercise mode, click the 'Start' button on the screen to start the exercise; click the 'Start' button again to pause the recording of the exercise; click the 'End' button to end the recording, and save to the data.\n1.8.2 The data can only be saved when the recording of the exercise is more than 1 minute; If the recording time is less than 1 minute, the smartwatch will remind you that the data is too little to be saved.", + "page_start": 3, + "page_end": 3, + "source_file": "6126797.pdf" + }, + { + "text": "Button down:\nShort press to enter multi-sport mode.\nIn addition, when the watch is in the off-screen state, you can light up the screen by pressing any buttons.", + "page_start": 1, + "page_end": 1, + "source_file": "6126797.pdf" + }, + { + "text": "6. Tilt to wake the screen\nWear the smartwatch correctly on your wrist (left/right hand). when you switch on the feature, you can light up the screen when you raise up your wrist.", + "page_start": 6, + "page_end": 6, + "source_file": "6126797.pdf" + }, + { + "text": "2.2 Connected to the APP state:\nWatch time synchronization: the time shown at the smartwatch and your mobile phone will synchronized after the smartwatch is bound to the APP successfully.\n2.3 Binding the audio/calling Bluetooth\nWhen the smartwatch is in the dial interface, you can find the audio/calling Bluetooth icon, and click it to turn it on, then go to the Bluetooth settings of your mobile phone and click the name of the audio/calling Bluetooth of the smartwatch to bind it.", + "page_start": 5, + "page_end": 5, + "source_file": "6126797.pdf" + }, + { + "text": "1.9 Heart rate\nAfter you wearing the smartwatch correctly, you can measure heart rate when you enter the heart rate function. If you don't wear the smartwatch properly, it will remind you to wear firmly for the measurement.", + "page_start": 3, + "page_end": 3, + "source_file": "6126797.pdf" + }, + { + "text": "2.1 Unconnected to the APP state:\nAfter the watch is turned on, the Bluetooth will be in the state of being searched. After open the APK/APP, go to Devices > Add Device > click to start searching, select and click the corresponding watch device name, and the watch will be successfully bound to the app.", + "page_start": 5, + "page_end": 5, + "source_file": "6126797.pdf" + } + ] + }, + { + "references": { + "source_file": "OTC_NSANY_2004.pdf", + "query": "Have the operating profits in Japan for Nissan gone up or down in 2004?", + "target_page": 5, + "target_passage": "operating profits in Japan came to ¥341.1 billion, a decrease of 3.2 percent compared to last year", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Review of 2004\nNissan lived up to its challenges in fiscal 2004, despite a very challenging year in the global industry, full of risks both anticipated and unexpected.\nConsolidated net revenues reached ¥8 trillion 576.3 billion, up 15.4 percent from last year. Consolidated operating profit improved by 4.4 percent to a record ¥861.2 billion. As a percentage of net revenue, our operating profit margin came to 10 percent, which remains at the top level among global automakers. And our net income reached ¥512.3 billion, or ¥125.16 per share, compared to ¥122.02 per share for the previous fiscal year.", + "page_start": 3, + "page_end": 3, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "Nissan\nNissan Annual Report 2004", + "page_start": 23, + "page_end": 23, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "FISCAL YEAR 2004 FINANCIAL REVIEW\nNISSAN REPORTED A RECORD YEAR IN TERMS OF REVENUES, OPERATING INCOME, NET INCOME, SALES AND PRODUCTION VOLUME IN FISCAL 2004. NISSAN ACHIEVED TWO OF ITS THREE COMMITMENTS FOR NISSAN 180: AN 8 PERCENT OPERATING PROFIT MARGIN AND ZERO NET AUTOMOTIVE DEBT. THE REMAINING COMMITMENT IS THE ACHIEVEMENT OF ONE MILLION ADDITIONAL UNIT SALES. AT MID-YEAR 2005, GLOBAL SALES AT 1,809,000 UNITS WERE SLIGHTLY AHEAD OF THE COMMITMENT TO REACH 3,597,000 UNITS BY THE END OF SEPTEMBER 2005.", + "page_start": 13, + "page_end": 13, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "FISCAL YEAR 2004 SHARE PERFORMANCE\nDESPITE NISSAN'S RECORD OPERATING RESULT IN FISCAL 2004, ITS STOCK PERFORMANCE RETURN WAS NEGATIVE AND LOWER THAN THE TOPIX INDEX. THE INVESTOR RELATIONS TEAM WAS STRENGTHENED AT THE START OF FISCAL 2005 TO BETTER ADDRESS THE NEEDS OF INVESTORS AND ENHANCE THEIR UNDERSTANDING OF NISSAN'S PERFORMANCE. INVESTORS WILL NOW BE ABLE TO GAIN A MORE IN-DEPTH VIEW OF THE COMPANY'S OPERATIONS AND PERFORMANCE INDICATORS.", + "page_start": 16, + "page_end": 16, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "The recovery story is complete\nFiscal 2004 was a tough year, full of both anticipated and unexpected risks, but Nissan lived up to all the challenges. We had a record year in revenues, operating profit, net income, sales volume and production.", + "page_start": 7, + "page_end": 7, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "Share Performance in Fiscal 2004\nNissan's share price began at ¥1,143 at the beginning of fiscal 2004 and ended the fiscal year at ¥1,099, generating a negative return of 3.85 percent. Total shareholder return (TSR) was -1.67 percent, while the dividend yield came to 2.18 percent (¥24 per share dividend, divided by the ¥1,099 closing price). Adverse movements in foreign exchange rates and commodity price hikes adversely affected Nissan's profitability, which was reflected in the share price. In addition, specific events relating directly to the company also had a negative impact. Later in this report, corporate officers will explain what actions Nissan has undertaken to ensure better performance.", + "page_start": 16, + "page_end": 16, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "Operating Income\nConsolidated operating profit improved by 4.4 percent from last year to a record ¥861.2 billion. This resulted in an operating profit margin of 10.0 percent. Operating profit was affected by the following factors:\n· The effect of foreign exchange rates produced a ¥78 billion negative impact for the full year. The depreciation of the U.S. dollar against the yen resulted in a negative impact of ¥74 billion, with an additional ¥13 billion from other currencies. The appreciation of the euro resulted in a positive impact of ¥9 billion.\n· The change in the scope of consolidation produced a positive impact of ¥31 billion. This was primarily from the consolidation of Dongfeng Motor and Yulon Nissan Motor.\n· The impact of the higher volume and mix contributed ¥284 billion. This was mainly driven by an increase in U.S. sales volume.\n· Selling expenses increased by ¥114 billion, also mainly due to the increase of sales in the U.S.\n· The improvement in purchasing costs amounted to ¥131 billion.\nNissan Annual Report 2004\n· Product enrichment and the cost of regulations had a negative impact of ¥92 billion.\n· An additional ¥44 billion was allocated to R&D to reinforce product and technology development.\n· Cost reductions from manufacturing efficiencies were offset by costs associated with expanding the Canton plant's capacity, which resulted in a ¥15 billion increase in manufacturing and logistics expenses.\n· Warranty costs increased by ¥41 billion, partly due to greater volume.\n· General, administrative and other expenses increased by ¥25.7 billion.\nBy region, operating profits in Japan came to ¥341.1 billion, a decrease of 3.2 percent compared to last year. This was mainly due to unfavorable exchange rate fluctuations and an increase in R&D expenses, which reached a record level.\nDue to higher volumes, profitability in the U.S. and Canada increased 7.9 percent from last year and totaled ¥379.7 billion.\nOperating profit in Europe was ¥56 billion, an increase of 13.8 percent compared to last year, owing to a better mix and higher contributions from Russia.\nIn General Overseas Markets, including Mexico, operating profits came to ¥84.8 billion, an increase of 28.5 percent compared to last year. This was primarily due to the consolidation of Dongfeng Motor and Yulon Nissan Motor.\nInter-regional eliminations were negative ¥0.4 billion.", + "page_start": 13, + "page_end": 13, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "Cash Flow\nCash from operating activities was ¥369.4 billion, below the previous year's level of ¥797.4 billion. This drop was primarily caused by a ¥331.2 billion increase in finance receivables in the U.S. and Japan. There were also increases in inventory and income tax paid.\nCash used for investing activities increased by ¥108.9 billion to ¥865.0 billion. This increase was mainly due to an increase of leased vehicles in the U.S.\nCash from financing activities totaled ¥521.0 billion, including an increase in short-term borrowing of ¥666.2 billion, offset by ¥94 billion for the payment of dividends and ¥26 billion for the acquisition of treasury stock.\nIn total, cash and cash equivalents increased by ¥95.6 billion to ¥289.8 billion from fiscal 2004.\nNissan Annual Report 2004\nPERFORMANCE\n13\nPERFORMANCE", + "page_start": 14, + "page_end": 15, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "Growing with Profit, not at Its Expense\nSHOICHI MIYATANI Vice President\n'Within the General Overseas Markets, or GOM, I'm responsible for Nissan business in nearly 110 countries, about 90 of which have Nissan national sales companies. It's a very diverse composition of small and large nations, and many languages and cultures.\nIn fiscal 2004 we met all our targets for sales and\nprofit. Out of Nissan's total unit sales of approximately 3.4 million vehicles, for example, GOM accounted for 678,000 units. We contribute to Nissan's performance in both volume expansion and profitability. And the operating profit margin for GOM is better than the corporate average.\nThe strongest regions in my territory were several African nations, such as South Africa, and Latin America. Our success was due in part to general market strength, but the continuing appeal of the Nissan Pickup in South Africa and Latin America was also a key. Aside from the Middle East, where larger vehicles like the Armada are preferred, sales for the Pickup and the X-TRAIL have been consistently strong in all markets. We produce the Pickup in South Africa and currently sell over 40,000 vehicles there every year; our market share is around 9 percent. In addition to Africa, the vehicles produced here will be sold in Europe, Australia and New Zealand starting at the beginning of 2006. In 2005, in the Middle East, we are already seeing significant increases in volume due to the launch of Infiniti and the introduction of new Nissan models in the latter half of 2004.\nThere are several risks associated with a diverse territory like ours, including political issues, economic issues, and a range of other external factors. At Nissan,\nour policy is to stay flexible and adapt to the situation. For example, we had initially planned to supply Pathfinder vehicles to the Middle East from Spain. However, the rise in the euro raised costs, so we quickly shifted production to the U.S. Because our job is so diversified, we felt we needed more strategic thinking within GOM. For this reason we established the GOM Plan Department, which is a cross-functional unit comprised of various departments, such as Manufacturing, Purchasing, and Engineering. This department is responsible for functions formerly performed by Marketing and Sales.", + "page_start": 68, + "page_end": 68, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "Growing with Profit, not at Its Expense\nSince we did not roll out many new models in our region, we had to upgrade our network structure to increase sales. The next new core model for us is the Tiida, which enjoyed a successful launch in China. It's a critical launch for us; through 2005 and 2006 we will complete the introduction of the model in all markets. The new model introductions will give us added strength in the markets during the NISSAN Value-Up period.\nAnother important development this year was the start of production of the Nissan Pickup in Egypt. Many in the industry doubted we would succeed, but we achieved our targets for quality. Vehicles produced here will also be exported to other countries in the region.\nEurope is a tough market, as is Japan. If Nissan becomes too dependent on its major markets like North America, there is an inherent risk, and GOM helps minimize that risk. The markets we represent will contribute substantially to Nissan's total profit. Our focus now is on deepening the foundations of our business. A few years ago, for instance, we designed six activities that all the national sales companies are required to carry out. In 2005, we'll establish even more advanced activities. We constantly review their performance and, if necessary, take aggressive actions, including replacing companies whose performance is consistently unsatisfactory. That is why our activities will expand with profit, not at its expense. The General Overseas Markets are where Nissan will really be growing.'\nNissan Annual Report 2004\n67\nOUR WORLD\nFINANCIAL SECTION\nNissan Annual Report 2004 68", + "page_start": 68, + "page_end": 69, + "source_file": "OTC_NSANY_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "Microscope Manual.pdf", + "query": "How can CEDAR Oil be used with the AY11236 microscope?", + "target_page": 10, + "target_passage": "1. Drop some cedar oil on to the top of the 100x objective when the 100x objective is being used. NOTE: To maintain a good quality image, rotate the turret right and left several times to eliminate bubbles in the cedar oil. 2. After finishing the observation, wipe off the cedar oil. 3. Do not use the 40x objective until you have wiped off all of the cedar oil.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "TROUBLESHOOTING\n1. Image not clear., Possible Cause = 1.Specimen is in incorrect position. 2. Lens is dirty. 3. Cedar oil not placed on immersion objective. 4. Bubbles in Cedar oil.. 1. Image not clear., Solution = 1. Re-position specimen. 2. Clean lens. 3. Put a drop of Cedar oil on immersion objective. 4. Rotate turret several times to eliminate bubbles.. 2. Poor illumination., Possible Cause = 1. Condenser position is incorrect. 2. Lens is dirty. 3. Specimen is not placed level.. 2. Poor illumination., Solution = 1. Re-position condenser. 2. Clean lens. 3. Re-position specimen so it is level.. 3. Illumination not bright., Possible Cause = 1. Iris diaphragm opening too small. 2. Position of condenser too low. 3. Lens is dirty.. 3. Illumination not bright., Solution = 1. Open iris diaphragm wider. 2. Raise condenser. 3. Clean lens.. 4. Cannot focus at high magnification., Possible Cause = 1. Specimen is in incorrect position.. 4. Cannot focus at high magnification., Solution = 1. Re-position specimen.. 5. Objective lenses touch specimen., Possible Cause = 1. Stage is too high.. 5. Objective lenses touch specimen., Solution = 1. Re-position stage.\n18", + "page_start": 9, + "page_end": 9, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "USING THE CEDAR OIL\n1. Drop some cedar oil on to the top of the 100x objective when the 100x objective is being used. NOTE: To maintain a good quality image, rotate the turret right and left several times to eliminate bubbles in the cedar oil.\n2. After finishing the observation, wipe off the cedar oil.\n3. Do not use the 40x objective until you have wiped off all of the cedar oil.\n17", + "page_start": 9, + "page_end": 9, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "PARTS LIST\nMicroscope Stand, Name = Microscope Stand. , Name = 4x (parfocal distance adjustable). , Name = 10x. , Name = 40x (s) (parfocal distance adjustable). , Name = 100x (oil,s) (parfocal distance adjustable). 10x Wide Field Eyepiece w/Pointer, Name = 10x Wide Field Eyepiece w/Pointer. Abbe Condenser NA1.25, Name = Abbe Condenser NA1.25. , Name = . Spare 6V20W Halogen Bulb, Name = Spare 6V20W Halogen Bulb. Lens Cleaning Tissue, Name = Lens Cleaning Tissue. Cedar Oil, Name = Cedar Oil. 1A Fuse (spare), Name = 1A Fuse (spare). Specification, Name = Specification. Inspection Certificate, Name = Inspection Certificate. Packing List, Name = Packing List", + "page_start": 8, + "page_end": 8, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "MICROSCOPE USER MANUAL\nMODEL AY11240 40X,100X,400X COMPOUND MONOCULAR\nMODEL AY11238 40X,100X,400X COMPOUND MONOCULAR\nMODEL AY11228 20X,40X STEREO BINOCULAR\nMODEL AY11232 7X-45X STEREO ZOOM\nMODEL AY11230 20X,40X STEREO TRINOCULAR\nMODEL AY11236\n40X,100X,400X,1000X COMPOUND\nMODEL AY11234 7X-45X ZOOM STEREO TRINOCULAR", + "page_start": 0, + "page_end": 0, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "Model AY11238\nMicroscope Stand, Name = Microscope Stand. Microscope Stand, Qty = 1. , Name = 4x. , Qty = 1. Achromatic Objective, Name = 10x. Achromatic Objective, Qty = 1. , Name = 40x (s). , Qty = 1. 10x Wide Field Eyepiece, Name = 10x Wide Field Eyepiece. 10x Wide Field Eyepiece, Qty = 1. Plastic Dust Cover, Name = Plastic Dust Cover. Plastic Dust Cover, Qty = 1. Spare Bulb, Name = Spare Bulb. Spare Bulb, Qty = 1. Lens Cleaning Tissue, Name = Lens Cleaning Tissue. Lens Cleaning Tissue, Qty = 1. Specification, Name = Specification. Specification, Qty = 1. Inspection Certificate, Name = Inspection Certificate. Inspection Certificate, Qty = 1. Packing List, Name = Packing List. Packing List, Qty = 1\n7. To clearly see the outline of the specimen, rotate the coarse adjustment knob and lower the barrel to the space limiter.\n8. Rotate the fine adjustment knob until the image is in sharp focus. When using other objectives, rotate the fine focus adjustment until the image is in focus.\n6. To clearly see the outline of the specimen, rotate the coarse adjustment knob and lower the barrel to the space limiter.\n7. Rotate the fine adjustment knob until the image is in sharp focus. When using other objectives, rotate the fine focus adjustment until the image is in focus.", + "page_start": 2, + "page_end": 3, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "CONSTRUCTION\nBARSKA Model AY11236 is a fixed power compound microscope. It is constructed with two optical paths at the same angle. It is equipped with transmitted illumination. By using this instrument, the user can observe specimens at magnification from 40x to 1000x by selecting the desired objective lens. Coarse and fine focus adjustments provide accuracy and image detail. The rotating head allows the user to position the eyepieces for maximum viewing comfort and easy access to all adjustment knobs.\n14", + "page_start": 7, + "page_end": 7, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "Model AY11238\n1. Remove components from package. identify all parts before assembling.\n2. Attach 4x, 10x and 40x objectives to revolving turret.\n3. Place the specimen on the stage and secure with spring clips. NOTE: The cover glass must face upward (the thinner glass is the cover glass), otherwise when the 40x objective is used the specimen cannot be observed. Observation is best when the thickness of the cover glass is 0.1-1.1mm and the cover glass is 0.17mm.\n4. Adjust the stand to an angle that provides comfortable observation.\n5. Rotate and adjust concave mirror to light the field of view. NOTE: Do not reflect the Sun with the mirror. This can cause serious eye injury or permanent eye damage.\n6. Observe the specimen using the lowest magnification objective first. The 4x objective provides a larger field of view to search specimen.\n1. Remove components from package. identify all parts before assembling.\n2. Attach 4x, 10x and 40x objectives to revolving turret. 3. Place the specimen on the stage and secure with spring clips. NOTE: The cover glass must face upward (the thinner glass is the cover glass), otherwise when the 40x objective is used the specimen cannot be observed. Observation is best when the thickness of the cover glass is 0.1-1.1mm and the cover glass is 0.17mm.\n4. Plug power cord into an electrical outlet. Turn microscope lamp ON.\n5. Observe the specimen using the lowest magnification objective first. The 4x objective provides a larger field of view to search specimen.\n4\n4x\n10x\n40x (s)\nQty\n1\n1\n1\n1", + "page_start": 2, + "page_end": 2, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "Model AY11240\nName\nMicroscope Stand\nAchromatic\nObjective\nPlain Concave Mirror\n1\nPlastic Dust Cover\n1\n10x Wide Field Eyepiece\n1\nLens Cleaning Tissue\n1\nSpecification\n1\nInspection Certificate\n1\nPacking List\n1", + "page_start": 2, + "page_end": 2, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "MICROSCOPE USAGE\nBARSKA Model AY11236 is a powerful fixed power compound microscope designed for biological studies such as specimen examination. It can also be used for examining bacteria and for general clinical and medical studies and other scientific uses.", + "page_start": 7, + "page_end": 7, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "IMPORTANT NOTES\nCongratulations on your purchase of this high quality BARSKA microscope. With proper care, this microscope will provide many years of use. Please read the following instructions before operating this instrument.\n1. Do not attempt to disassemble the instrument. This product has been carefully assembled at the factory and should only be examined by a factory-trained technician.\n2. This instrument should only be used in an environment with an indoor temperature range of 32 o F to 104 o F.\n3. Do not use this instrument in an environment with a lot of dust. Cover the instrument when not in use.\n4. Do not subject the instrument to shock.", + "page_start": 1, + "page_end": 1, + "source_file": "Microscope Manual.pdf" + } + ] + }, + { + "references": { + "source_file": "Microscope Manual.pdf", + "query": "For the AY11230 microscope, what is the interpupillary adjustment?", + "target_page": 7, + "target_passage": "Model AY11230 1. Interpupillary Adjustment: 55mm - 75mm", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Model AY11230\n1. Interpupillary Adjustment: 55mm - 75mm\n2. Working Stage Diameter: 95mm\n3. Focus Knob Adjustment Range: 60mm\n4. Elevator Adjustment Range: 110mm\n5. Right Diopter Adjustment Range: +4 to -6 dopters\n6. Illumination: Input Voltage: 110V AC or 220V Output: Oblique illumination: 12V 10W Halogen Lamp", + "page_start": 6, + "page_end": 6, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "Model AY11232\n1. Interpupillary Adjustment: 55mm - 75mm\n2. Working Stage Diameter: 95mm\n3. Focus Knob Adjustment Range: >50mm\n4. Elevator Adjustment Range: 110mm\n5. Diopter Adjustment Range: +/- 5 diopters\n6. Illumination:\nInput Voltage: 110V AC or 220V Output: Oblique Illumination: 12V 10W Halogen Lamp Transmitted Illumination: 12V 10W Halogen Lamp", + "page_start": 4, + "page_end": 4, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "Model AY11234\n1. Interpupillary Adjustment: 55mm - 75mm\n2. Working Stage Diameter: 95mm\n3. Focus Knob Adjustment Range: >50mm\n4. Elevator Adjustment Range: 110mm\n5. Diopter Adjustment Range: +/- 5 diopters\n6. Illumination:\nInput Voltage: 110V AC or 220V Output: Oblique Illumination: 12V 10W Halogen Lamp Transmitted Illumination: 12V 10W Halogen Lamp", + "page_start": 6, + "page_end": 6, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "Model AY11228\n1. Interpupillary Adjustment: 55mm - 75mm\n2. Working Stage Diameter: 95mm\n3. Focus Knob Adjustment Range: 60mm\n4. Elevator Adjustment Range: 110mm\n5. Right Diopter Adjustment Range: +4 to -6 dopters\n6. Illumination: Input Voltage: 110V AC or 220V Output: Oblique illumination: 12V 10W Halogen Lamp", + "page_start": 4, + "page_end": 4, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "OPERATION ( cont. )\n6. Adjust the interpupillary distance by using the eyepiece interpupillary slide adjustment.\n7. Observe using the right eyepiece adjusting the coarse and fine focus and adjust the diopter ring until image is clear and sharp.\n8. Observe with the left eyepiece and adjust the diopter ring until image is clear and sharp.\n9. Rotate the fine focus adjustment when using other objectives. NOTE: This instrument is equipped with patent objectives so the precision or parfocalization is very high.\nFig. 1 - Objective Parts\n10. If the image is in focus with the 10x objective, you can select other objectives and observe the specimen even if the fine adjustment knob has not been used by using the following method (See Fig. 1):\n1. Unscrew the 40x or 100x objective and remove from turret.\n2. Remove the mark sleeve.\n3. Turn the ring on the objective to adjust its parfocal distance.\n4. Re-insert the objective and compare with the 10x.\n5. Adjust until the 40x and 100x objectives image is clear.", + "page_start": 9, + "page_end": 9, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "CHANGING THE INTERPUPILLARY DISTANCE\n1. The distance between the observer's pupils is the interpupillary distance.\n12 2. To adjust the interpupillary distance rotate the prism caps until both eyes coincide with the image in the eyepiece.", + "page_start": 6, + "page_end": 6, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "CHANGING THE INTERPUPILLARY DISTANCE\n1. The distance between the observer's pupils is the interpupillary distance.\n2. To adjust the interpupillary distance rotate the prism caps until both eyes coincide with the image in the eyepiece.\n8", + "page_start": 4, + "page_end": 4, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "CHANGING THE INTERPUPILLARY DISTANCE\n1. The distance between the observer's pupils is the interpupillary distance.\n2. To adjust the interpupillary distance rotate the prism caps until both eyes coincide with the image in the eyepiece.", + "page_start": 7, + "page_end": 7, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "CHANGING THE INTERPUPILLARY DISTANCE\n1. The distance between the observer's pupils is the interpupillary distance.\n2. To adjust the interpupillary distance rotate the prism caps until both eyes coincide with the image in the eyepiece.", + "page_start": 5, + "page_end": 5, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "Model AY11238\nMicroscope Stand, Name = Microscope Stand. Microscope Stand, Qty = 1. , Name = 4x. , Qty = 1. Achromatic Objective, Name = 10x. Achromatic Objective, Qty = 1. , Name = 40x (s). , Qty = 1. 10x Wide Field Eyepiece, Name = 10x Wide Field Eyepiece. 10x Wide Field Eyepiece, Qty = 1. Plastic Dust Cover, Name = Plastic Dust Cover. Plastic Dust Cover, Qty = 1. Spare Bulb, Name = Spare Bulb. Spare Bulb, Qty = 1. Lens Cleaning Tissue, Name = Lens Cleaning Tissue. Lens Cleaning Tissue, Qty = 1. Specification, Name = Specification. Specification, Qty = 1. Inspection Certificate, Name = Inspection Certificate. Inspection Certificate, Qty = 1. Packing List, Name = Packing List. Packing List, Qty = 1\n7. To clearly see the outline of the specimen, rotate the coarse adjustment knob and lower the barrel to the space limiter.\n8. Rotate the fine adjustment knob until the image is in sharp focus. When using other objectives, rotate the fine focus adjustment until the image is in focus.\n6. To clearly see the outline of the specimen, rotate the coarse adjustment knob and lower the barrel to the space limiter.\n7. Rotate the fine adjustment knob until the image is in sharp focus. When using other objectives, rotate the fine focus adjustment until the image is in focus.", + "page_start": 2, + "page_end": 3, + "source_file": "Microscope Manual.pdf" + } + ] + }, + { + "references": { + "source_file": "Microscope Manual.pdf", + "query": "The illumination of my AY11236 microscope is not very strong, what can I do to solve this?", + "target_page": 10, + "target_passage": "1. Open iris diaphragm wider. 2. Raise condenser. 3. Clean lens.", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "SELECTING THE ILLUMINATION\n1. Depending on microscope use, select oblique or transmitted illumination.\n2. The Brightness Adjustment knobs change the oblique or transmitted light independently. The transmitted illuminator fluorescent lamp cannot be adjusted.\n3. The angle of the oblique lamp can be adjusted to ensure optimum lighting of the sample.\n1. Remove components from package. identify all parts before assembling.\n2. Check the input voltage to ensure that it conforms to the microscopes requirement.\n1. Depending on microscope use, select oblique or transmitted illumination.\n2. The Brightness Adjustment Knobs change the oblique or transmitted light independently. The transmitted illuminator fluorescent lamp cannot be adjusted.\n3. The angle of the oblique lamp can be adjusted to ensure optimum lighting of the sample.", + "page_start": 6, + "page_end": 6, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "SELECTING THE ILLUMINATION\n1. Depending on microscope use, select oblique or transmitted illumination.\n2. The Brightness Adjustment knobs change the oblique or transmitted light independently. The transmitted illuminator fluorescent lamp cannot be adjusted.\n3. The angle of the oblique lamp can be adjusted to ensure optimum lighting of the sample.\n1. Remove components from package. identify all parts before assembling.\n2. Check the input voltage to ensure that it conforms to the microscopes requirement.\n1. Depending on microscope use, select oblique or transmitted illumination.\n2. The Brightness Adjustment Knobs change the oblique or transmitted light independently. The transmitted illuminator fluorescent lamp cannot be adjusted.\n3. The angle of the oblique lamp can be adjusted to ensure optimum lighting of the sample.", + "page_start": 4, + "page_end": 4, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "TROUBLESHOOTING\n1. Image not clear., Possible Cause = 1.Specimen is in incorrect position. 2. Lens is dirty. 3. Cedar oil not placed on immersion objective. 4. Bubbles in Cedar oil.. 1. Image not clear., Solution = 1. Re-position specimen. 2. Clean lens. 3. Put a drop of Cedar oil on immersion objective. 4. Rotate turret several times to eliminate bubbles.. 2. Poor illumination., Possible Cause = 1. Condenser position is incorrect. 2. Lens is dirty. 3. Specimen is not placed level.. 2. Poor illumination., Solution = 1. Re-position condenser. 2. Clean lens. 3. Re-position specimen so it is level.. 3. Illumination not bright., Possible Cause = 1. Iris diaphragm opening too small. 2. Position of condenser too low. 3. Lens is dirty.. 3. Illumination not bright., Solution = 1. Open iris diaphragm wider. 2. Raise condenser. 3. Clean lens.. 4. Cannot focus at high magnification., Possible Cause = 1. Specimen is in incorrect position.. 4. Cannot focus at high magnification., Solution = 1. Re-position specimen.. 5. Objective lenses touch specimen., Possible Cause = 1. Stage is too high.. 5. Objective lenses touch specimen., Solution = 1. Re-position stage.\n18", + "page_start": 9, + "page_end": 9, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "Model AY11234\n1. Remove components from package. identify all parts before assembling.\n2. Tighten the knob on the stand to prevent the elevator from sliding down.\n3. Fix the binocular body on the stand with the tightening screw.\n4. Check the input voltage to ensure that it conforms to the microscopes requirement.", + "page_start": 6, + "page_end": 6, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "Model AY11232\n1. Remove components from package. identify all parts before assembling.\n2. Tighten the knob on the stand to prevent the elevator from sliding down.\n3. Fix the binocular body on the stand with the tightening screw.\n4. Check the input voltage to ensure that it conforms to the microscopes requirement.", + "page_start": 4, + "page_end": 4, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "Model AY11238\n1. Remove components from package. identify all parts before assembling.\n2. Attach 4x, 10x and 40x objectives to revolving turret.\n3. Place the specimen on the stage and secure with spring clips. NOTE: The cover glass must face upward (the thinner glass is the cover glass), otherwise when the 40x objective is used the specimen cannot be observed. Observation is best when the thickness of the cover glass is 0.1-1.1mm and the cover glass is 0.17mm.\n4. Adjust the stand to an angle that provides comfortable observation.\n5. Rotate and adjust concave mirror to light the field of view. NOTE: Do not reflect the Sun with the mirror. This can cause serious eye injury or permanent eye damage.\n6. Observe the specimen using the lowest magnification objective first. The 4x objective provides a larger field of view to search specimen.\n1. Remove components from package. identify all parts before assembling.\n2. Attach 4x, 10x and 40x objectives to revolving turret. 3. Place the specimen on the stage and secure with spring clips. NOTE: The cover glass must face upward (the thinner glass is the cover glass), otherwise when the 40x objective is used the specimen cannot be observed. Observation is best when the thickness of the cover glass is 0.1-1.1mm and the cover glass is 0.17mm.\n4. Plug power cord into an electrical outlet. Turn microscope lamp ON.\n5. Observe the specimen using the lowest magnification objective first. The 4x objective provides a larger field of view to search specimen.\n4\n4x\n10x\n40x (s)\nQty\n1\n1\n1\n1", + "page_start": 2, + "page_end": 2, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "Model AY11238\nMicroscope Stand, Name = Microscope Stand. Microscope Stand, Qty = 1. , Name = 4x. , Qty = 1. Achromatic Objective, Name = 10x. Achromatic Objective, Qty = 1. , Name = 40x (s). , Qty = 1. 10x Wide Field Eyepiece, Name = 10x Wide Field Eyepiece. 10x Wide Field Eyepiece, Qty = 1. Plastic Dust Cover, Name = Plastic Dust Cover. Plastic Dust Cover, Qty = 1. Spare Bulb, Name = Spare Bulb. Spare Bulb, Qty = 1. Lens Cleaning Tissue, Name = Lens Cleaning Tissue. Lens Cleaning Tissue, Qty = 1. Specification, Name = Specification. Specification, Qty = 1. Inspection Certificate, Name = Inspection Certificate. Inspection Certificate, Qty = 1. Packing List, Name = Packing List. Packing List, Qty = 1\n7. To clearly see the outline of the specimen, rotate the coarse adjustment knob and lower the barrel to the space limiter.\n8. Rotate the fine adjustment knob until the image is in sharp focus. When using other objectives, rotate the fine focus adjustment until the image is in focus.\n6. To clearly see the outline of the specimen, rotate the coarse adjustment knob and lower the barrel to the space limiter.\n7. Rotate the fine adjustment knob until the image is in sharp focus. When using other objectives, rotate the fine focus adjustment until the image is in focus.", + "page_start": 2, + "page_end": 3, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "OPERATION\n1. Remove all components from package. Identify all parts before assembling instrument.\n2. Attach 4x, 10x and 40x objectives by screwing into revolving turret. Tighten and secure to maximum finger pressure only.\n3. Place the specimen on the stage and secure with spring clips. NOTE: The cover glass must face upward (the thinner glass is the cover glass), otherwise when the 40x objective is used the specimen cannot be observed. Observation is best when the thickness of the cover glass is 0.1-1.1mm and the cover glass is 0.17mm.\n4. Plug power cord into an electrical outlet. Turn microscope lamp ON.\n5. Observe the specimen using the lowest magnification objective first. The 10x objective provides a larger field of view making it easier to search the specimen.\n16", + "page_start": 8, + "page_end": 8, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "Model AY11230\n1. Interpupillary Adjustment: 55mm - 75mm\n2. Working Stage Diameter: 95mm\n3. Focus Knob Adjustment Range: 60mm\n4. Elevator Adjustment Range: 110mm\n5. Right Diopter Adjustment Range: +4 to -6 dopters\n6. Illumination: Input Voltage: 110V AC or 220V Output: Oblique illumination: 12V 10W Halogen Lamp", + "page_start": 6, + "page_end": 6, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "Model AY11232\n1. Interpupillary Adjustment: 55mm - 75mm\n2. Working Stage Diameter: 95mm\n3. Focus Knob Adjustment Range: >50mm\n4. Elevator Adjustment Range: 110mm\n5. Diopter Adjustment Range: +/- 5 diopters\n6. Illumination:\nInput Voltage: 110V AC or 220V Output: Oblique Illumination: 12V 10W Halogen Lamp Transmitted Illumination: 12V 10W Halogen Lamp", + "page_start": 4, + "page_end": 4, + "source_file": "Microscope Manual.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia3.pdf", + "query": "What event marks the beginning of the field of artificial intelligence?", + "target_page": 22, + "target_passage": "The field of AI research was founded at a workshop at Dartmouth College in 1956.", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "Artificial intelligence\nArtificial intelligence was founded as an academic discipline in 1956, [6] and the field went through multiple cycles of optimism throughout its history, [7][8] followed by periods of disappointment and loss of funding, known as AI winters. [9][10] Funding and interest vastly increased after 2012 when deep learning outperformed previous AI techniques. [11] This growth accelerated further after 2017 with the transformer architecture, [12] and by the early 2020s many billions of dollars were being invested in AI and the field experienced rapid ongoing progress in what has become known as the AI boom. The emergence of advanced generative AI in the midst of the AI boom and its ability to create and modify content exposed several unintended consequences and harms in the present and raised concerns about the risks of AI and its long-term effects in the future, prompting discussions about regulatory policies to ensure the safety and benefits of the technology.", + "page_start": 0, + "page_end": 0, + "source_file": "wikipedia3.pdf" + }, + { + "text": "History\nThe study of mechanical or \"formal\" reasoning began with philosophers and mathematicians in antiquity. The study of logic led directly to Alan Turing's theory of computation, which suggested that a machine, by shuffling symbols as simple as \"0\" and \"1\", could simulate any conceivable form of mathematical reasoning. [319][320] This, along with concurrent discoveries in cybernetics, information theory and neurobiology, led researchers to consider the possibility of building an \"electronic brain\". [r] They developed several areas of research that would become part of AI, [322] such as McCullouch and Pitts design for \"artificial neurons\" in 1943, [115] and Turing's influential 1950 paper 'Computing Machinery and Intelligence', which introduced the Turing test and showed that \"machine intelligence\" was plausible. [323][320]\nThe field of AI research was founded at a workshop at Dartmouth College in 1956. [s][6] The attendees became the leaders of AI research in the 1960s. [t] They and their students produced programs that the press described as \"astonishing\": [u] computers were learning checkers strategies, solving word problems in algebra, proving logical theorems and speaking English. [v][7] Artificial intelligence laboratories were set up at a number of British and U.S. universities in the latter 1950s and early 1960s. [320]", + "page_start": 21, + "page_end": 21, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Artificial intelligence\nArtificial intelligence ( AI ), in its broadest sense, is intelligence exhibited by machines, particularly computer systems. It is a field of research in computer science that develops and studies methods and software that enable machines to perceive their environment and use learning and intelligence to take actions that maximize their chances of achieving defined goals. [1] Such machines may be called AIs.\nHigh-profile applications of AI include advanced web search engines (e.g., Google Search); recommendation systems (used by YouTube, Amazon, and Netflix); virtual assistants (e.g., Google Assistant, Siri, and Alexa); autonomous vehicles (e.g., Waymo); generative and creative tools (e.g., ChatGPT and AI art); and superhuman play and analysis in strategy games (e.g., chess and Go). However, many AI applications are not perceived as AI: \"A lot of cutting edge AI has filtered into general applications, often without being called AI because once something becomes useful enough and common enough it's not labeled AI anymore.\" [2][3]\nVarious subfields of AI research are centered around particular goals and the use of particular tools. The traditional goals of AI research include reasoning, knowledge representation, planning, learning, natural language processing, perception, and support for robotics. [a] General intelligence-the ability to complete any task performed by a human on an at least equal level-is among the field's long-term goals. [4] To reach these goals, AI researchers have adapted and integrated a wide range of techniques, including search and mathematical optimization, formal logic, artificial neural networks, and methods based on statistics, operations research, and economics. [b] AI also draws upon psychology, linguistics, philosophy, neuroscience, and other fields. [5]", + "page_start": 0, + "page_end": 0, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Defining artificial intelligence\nSome authors have suggested in practice, that the definition of AI is vague and difficult to define, with contention as to whether classical algorithms should be categorised as AI, [367] with many companies during the early 2020s AI boom using the term as a marketing buzzword, often even if they did \"not actually use AI in a material way\". [368]", + "page_start": 24, + "page_end": 24, + "source_file": "wikipedia3.pdf" + }, + { + "text": "History\nResearchers in the 1960s and the 1970s were convinced that their methods would eventually succeed in creating a machine with general intelligence and considered this the goal of their field. [327] In 1965 Herbert Simon predicted, \"machines will be capable, within twenty years, of doing any work a man can do\". [328] In 1967 Marvin Minsky agreed, writing that \"within a generation ... the problem of creating 'artificial intelligence' will substantially be solved\". [329] They had, however, underestimated the difficulty of the problem. [w] In 1974, both the U.S. and British governments cut off exploratory research in response to the criticism of Sir James Lighthill [331] and ongoing pressure from the U.S. Congress to fund more productive projects. [332] Minsky's and Papert's book Perceptrons was understood as proving that artificial neural networks would never be useful for solving real-world tasks, thus discrediting the approach altogether. [333] The \"AI winter\", a period when obtaining funding for AI projects was difficult, followed. [9]\nIn the early 1980s, AI research was revived by the commercial success of expert systems, [334] a form of AI program that simulated the knowledge and analytical skills of human experts. By 1985, the market for AI had reached over a billion dollars. At the same time, Japan's fifth generation computer project inspired the U.S. and British governments to restore funding for academic research. [8] However, beginning with the collapse of the Lisp Machine market in 1987, AI once again fell into disrepute, and a second, longerlasting winter began. [10]", + "page_start": 21, + "page_end": 21, + "source_file": "wikipedia3.pdf" + }, + { + "text": "History\nUp to this point, most of AI's funding had gone to projects that used high-level symbols to represent mental objects like plans, goals, beliefs, and known facts. In the 1980s, some researchers began to doubt that this approach would be able to imitate all the processes of human cognition, especially perception, robotics, learning and pattern recognition, [335] and began to look into \"sub-symbolic\" approaches. [336] Rodney Brooks rejected \"representation\" in general and focussed directly on engineering machines that move and survive. [x] Judea Pearl, Lofti Zadeh, and others developed methods that handled incomplete and uncertain information by making reasonable guesses rather than precise logic. [86][341] But the most important development was the revival of \"connectionism\", including neural network research, by Geoffrey Hinton and others. [342] In 1990, Yann LeCun successfully showed that convolutional neural networks can recognize handwritten digits, the first of many successful applications of neural networks. [343]\nAI gradually restored its reputation in the late 1990s and early 21st century by exploiting formal mathematical methods and by finding specific solutions to specific problems. This \"narrow\" and \"formal\" focus allowed researchers to produce verifiable results and collaborate with other fields (such as statistics, economics and mathematics). [344] By 2000, solutions developed by AI researchers were being widely used, although in the 1990s they were rarely described as \"artificial intelligence\" (a tendency known as the AI effect). [345] However, several academic researchers became concerned that AI was no longer pursuing its original goal of creating versatile, fully intelligent machines. Beginning around 2002, they founded the subfield of artificial general intelligence (or \"AGI\"), which had several well-funded institutions by the 2010s. [4]", + "page_start": 22, + "page_end": 22, + "source_file": "wikipedia3.pdf" + }, + { + "text": "History\nDeep learning began to dominate industry benchmarks in 2012 and was adopted throughout the field. [11] For many specific tasks, other methods were abandoned. [y] Deep learning's success was based on both hardware improvements (faster computers, [347] graphics processing units, cloud computing [348] ) and access to large amounts of data [349] (including curated datasets, [348] such as ImageNet). Deep learning's success led to an enormous increase in interest and funding in AI. [z] The amount of machine learning research (measured by total publications) increased by 50% in the years 2015-2019. [306]\nIn 2016, issues of fairness and the misuse of technology were catapulted into center stage at machine learning conferences, publications vastly increased, funding became available, and many researchers refocussed their careers on these issues. The alignment problem became a serious field of academic study. [283]\nIn the late teens and early 2020s, AGI companies began to deliver programs that created enormous interest. In 2015, AlphaGo, developed by DeepMind, beat the world champion Go player. The program taught only the game's rules and developed a strategy by itself. GPT-3 is a large language model that was released in 2020 by OpenAI and is capable of generating high-quality human-like text. [350] ChatGPT, launched on November 30, 2022, became the fastest-growing consumer software application in history, gaining over 100 million users in two months. [351] It marked what is widely regarded as AI's breakout year, bringing it into the public consciousness. [352] These programs, and others, inspired an aggressive AI boom, where large companies began investing billions of dollars in AI research. According to AI Impacts, about $50 billion annually was invested in \"AI\" around 2022 in the U.S. alone and about 20% of the new\nU.S. Computer Science PhD graduates have specialized in \"AI\". [353] About 800,000 \"AI\"-related U.S. job openings existed in 2022. [354] According to PitchBook research, 22% of newly funded startups in 2024 claimed to be AI companies. [355]", + "page_start": 22, + "page_end": 23, + "source_file": "wikipedia3.pdf" + }, + { + "text": "The top AI-powered tech trends in 2025\n(NC) As we look ahead to 2025, artificial intelligence (AI) continues to revolutionize our lives. From enhancing our daily routines to transforming entire industries, AI's impact is undeniable.\nThese five innovations are set to shape our future, offering unprecedented convenience, efficiency and personalization.", + "page_start": 0, + "page_end": 0, + "source_file": "news4.pdf" + }, + { + "text": "History of AI\nCrevier, Daniel (1993). AI: The Tumultuous Search for Artificial Intelligence . New York, NY: BasicBooks. ISBN 0-465-02997-3.\nMcCorduck, Pamela (2004), Machines Who Think (2nd ed.), Natick, Massachusetts: A. K. Peters, ISBN 1-5688-1205-1\nNewquist, H. P. (1994). The Brain Makers: Genius, Ego, And Greed In The Quest For Machines That Think . New York: Macmillan/SAMS. ISBN 978-0-6723-0412-5.\nHarmon, Paul; Sawyer, Brian (1990). Creating Expert Systems for Business and Industry . New York: John Wiley & Sons. ISBN 0471614963.", + "page_start": 51, + "page_end": 51, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Other sources\nMcCarthy, John; Minsky, Marvin; Rochester, Nathan; Shannon, Claude (1955). \"A Proposal for the Dartmouth Summer Research Project on Artificial Intelligence\" (https://web.archive.org/w eb/20070826230310/http://www-formal.stanford.edu/jmc/history/dartmouth/dartmouth.html). Archived from the original (http://www-formal.stanford.edu/jmc/history/dartmouth/dartmouth. html) on 26 August 2007. Retrieved 30 August 2007.\nMcCarthy, John (2007), \"From Here to Human-Level AI\", Artificial Intelligence , p. 171\nMcCarthy, John (1999), What is AI? (http://jmc.stanford.edu/artificial-intelligence/what-is-ai/inde x.html), archived (https://web.archive.org/web/20221204051737/http://jmc.stanford.edu/artifi cial-intelligence/what-is-ai/index.html) from the original on 4 December 2022, retrieved 4 December 2022\nMcCauley, Lee (2007). \"AI armageddon and the three laws of robotics\". Ethics and Information Technology . 9 (2): 153-164. CiteSeerX 10.1.1.85.8904 (https://citeseerx.ist.psu.edu/viewdo c/summary?doi=10.1.1.85.8904). doi:10.1007/s10676-007-9138-2 (https://doi.org/10.1007% 2Fs10676-007-9138-2). S2CID 37272949 (https://api.semanticscholar.org/CorpusID:372729 49).", + "page_start": 60, + "page_end": 60, + "source_file": "wikipedia3.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia3.pdf", + "query": "What would a superintelligence need?", + "target_page": 27, + "target_passage": "possess intelligence far surpassing that of the brightest and most gifted human mind.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Superintelligence and the singularity\nA superintelligence is a hypothetical agent that would possess intelligence far surpassing that of the brightest and most gifted human mind. [379] If research into artificial general intelligence produced sufficiently intelligent software, it might be able to reprogram and improve itself. The improved software would be even better at improving itself, leading to what I. J. Good called an \"intelligence explosion\" and Vernor Vinge called a \"singularity\". [395]\nHowever, technologies cannot improve exponentially indefinitely, and typically follow an S-shaped curve, slowing when they reach the physical limits of what the technology can do. [396]", + "page_start": 26, + "page_end": 26, + "source_file": "wikipedia3.pdf" + }, + { + "text": "General intelligence\nA machine with artificial general intelligence should be able to solve a wide variety of problems with breadth and versatility similar to human intelligence. [4]", + "page_start": 4, + "page_end": 4, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Other sources\nAltman, Sam; Brockman, Greg; Sutskever, Ilya (22 May 2023). \"Governance of Superintelligence\" (https://openai.com/blog/governance-of-superintelligence). openai.com . Archived (https://web.archive.org/web/20230527061619/https://openai.com/blog/governanc e-of-superintelligence) from the original on 27 May 2023. Retrieved 27 May 2023.\nAnderson, Susan Leigh (2008). \"Asimov's \"three laws of robotics\" and machine metaethics\". AI & Society . 22 (4): 477-493. doi:10.1007/s00146-007-0094-5 (https://doi.org/10.1007%2Fs0 0146-007-0094-5). S2CID 1809459 (https://api.semanticscholar.org/CorpusID:1809459).\nAnderson, Michael; Anderson, Susan Leigh (2011). Machine Ethics . Cambridge University Press.\nArntz, Melanie; Gregory, Terry; Zierahn, Ulrich (2016), \"The risk of automation for jobs in OECD countries: A comparative analysis\", OECD Social, Employment, and Migration Working Papers 189\nAsada, M.; Hosoda, K.; Kuniyoshi, Y.; Ishiguro, H.; Inui, T.; Yoshikawa, Y.; Ogino, M.; Yoshida, C. (2009). \"Cognitive developmental robotics: a survey\". IEEE Transactions on Autonomous Mental Development . 1 (1): 12-34. doi:10.1109/tamd.2009.2021702 (https://doi.org/10.110 9%2Ftamd.2009.2021702). S2CID 10168773 (https://api.semanticscholar.org/CorpusID:101 68773).", + "page_start": 52, + "page_end": 52, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Goals\nThe general problem of simulating (or creating) intelligence has been broken into subproblems. These consist of particular traits or capabilities that researchers expect an intelligent system to display. The traits described below have received the most attention and cover the scope of AI research. [a]", + "page_start": 1, + "page_end": 1, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Further reading\nBoyle, James, The Line: AI and the Future of Personhood (https://direct.mit.edu/books/book/585 9/The-LineAI-and-the-Future-of-Personhood), MIT Press, 2024.\nCukier, Kenneth, \"Ready for Robots? How to Think about the Future of AI\", Foreign Affairs , vol. 98, no. 4 (July/August 2019), pp. 192-198. George Dyson, historian of computing, writes (in what might be called \"Dyson's Law\") that \"Any system simple enough to be understandable will not be complicated enough to behave intelligently, while any system complicated enough to behave intelligently will be too complicated to understand.\" (p. 197.) Computer scientist Alex Pentland writes: \"Current AI machine-learning algorithms are, at their core, dead simple stupid. They work, but they work by brute force.\" (p. 198.)\nEvans, Woody (2015). \"Posthuman Rights: Dimensions of Transhuman Worlds\" (https://doi.org/ 10.5209%2Frev_TK.2015.v12.n2.49072). Teknokultura . 12 (2). doi:10.5209/rev_TK.2015.v12.n2.49072 (https://doi.org/10.5209%2Frev_TK.2015.v12.n2.49 072). S2CID 147612763 (https://api.semanticscholar.org/CorpusID:147612763).", + "page_start": 66, + "page_end": 66, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Other sources\nGood, I. J. (1965), Speculations Concerning the First Ultraintelligent Machine (https://exhibits.st anford.edu/feigenbaum/catalog/gz727rg3869), archived (https://web.archive.org/web/20230 710131733/https://exhibits.stanford.edu/feigenbaum/catalog/gz727rg3869) from the original on 10 July 2023, retrieved 5 October 2024\nGoodfellow, Ian; Bengio, Yoshua; Courville, Aaron (2016), Deep Learning (https://web.archive.or g/web/20160416111010/http://www.deeplearningbook.org), MIT Press., archived from the original (http://www.deeplearningbook.org) on 16 April 2016, retrieved 12 November 2017\nGoodman, Bryce; Flaxman, Seth (2017). \"EU regulations on algorithmic decision-making and a 'right to explanation' \". AI Magazine . 38 (3): 50. arXiv:1606.08813 (https://arxiv.org/abs/1606. 08813). doi:10.1609/aimag.v38i3.2741 (https://doi.org/10.1609%2Faimag.v38i3.2741). S2CID 7373959 (https://api.semanticscholar.org/CorpusID:7373959).\nGovernment Accountability Office (13 September 2022). Consumer Data: Increasing Use Poses Risks to Privacy (https://www.gao.gov/products/gao-22-106096). gao.gov (Report). Archived (https://web.archive.org/web/20240913011410/https://www.gao.gov/products/gao-22-10609 6) from the original on 13 September 2024. Retrieved 5 October 2024.", + "page_start": 56, + "page_end": 56, + "source_file": "wikipedia3.pdf" + }, + { + "text": "References\n1. Russell & Norvig (2021), pp. 1-4.\n2. AI set to exceed human brain power (http://www.cnn.com/2006/TECH/science/07/24/ai.bostr om/) Archived (https://web.archive.org/web/20080219001624/http://www.cnn.com/2006/TEC H/science/07/24/ai.bostrom/) 2008-02-19 at the Wayback Machine CNN.com (July 26, 2006)\n3. Kaplan, Andreas; Haenlein, Michael (2019). \"Siri, Siri, in my hand: Who's the fairest in the land? On the interpretations, illustrations, and implications of artificial intelligence\". Business Horizons . 62 : 15-25. doi:10.1016/j.bushor.2018.08.004 (https://doi.org/10.1016%2Fj.bushor. 2018.08.004). ISSN 0007-6813 (https://search.worldcat.org/issn/0007-6813). S2CID 158433736 (https://api.semanticscholar.org/CorpusID:158433736).\n4. Artificial general intelligence: Russell & Norvig (2021, pp. 32-33, 1020-1021) Proposal for the modern version: Pennachin & Goertzel (2007) Warnings of overspecialization in AI from leading researchers: Nilsson (1995), McCarthy (2007), Beal & Winston (2009)\n5. Russell & Norvig (2021, §1.2).\n6. Dartmouth workshop: Russell & Norvig (2021, p. 18), McCorduck (2004, pp. 111-136), NRC (1999, pp. 200-201) The proposal: McCarthy et al. (1955)\n7. Successful programs of the 1960s: McCorduck (2004, pp. 243-252), Crevier (1993, pp. 52107), Moravec (1988, p. 9), Russell & Norvig (2021, pp. 19-21)", + "page_start": 30, + "page_end": 30, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Explanatory notes\nab. Daniel Crevier wrote that \"time has proven the accuracy and perceptiveness of some of Dreyfus's comments. Had he formulated them less aggressively, constructive actions they suggested might have been taken much earlier.\" [374]\nac. Searle presented this definition of \"Strong AI\" in 1999. [384] Searle's original formulation was \"The appropriately programmed computer really is a mind, in the sense that computers given the right programs can be literally said to understand and have other cognitive states.\" [385] Strong AI is defined similarly by Russell and Norvig: \"Stong AI - the assertion that machines that do so are actually thinking (as opposed to simulating thinking).\" [386]", + "page_start": 29, + "page_end": 29, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Existential risk\nIt has been argued AI will become so powerful that humanity may irreversibly lose control of it. This could, as physicist Stephen Hawking stated, \"spell the end of the human race\". [265] This scenario has been common in science fiction, when a computer or robot suddenly develops a human-like \"self-awareness\" (or \"sentience\" or \"consciousness\") and becomes a malevolent character. [q] These sci-fi scenarios are misleading in several ways.\nFirst, AI does not require human-like sentience to be an existential risk. Modern AI programs are given specific goals and use learning and intelligence to achieve them. Philosopher Nick Bostrom argued that if one gives almost any goal to a sufficiently powerful AI, it may choose to destroy humanity to achieve it (he used the example of a paperclip factory manager). [267] Stuart Russell gives the example of household robot that tries to find a way to kill its owner to prevent it from being unplugged, reasoning that \"you can't fetch the coffee if you're dead.\" [268] In order to be safe for humanity, a superintelligence would have to be genuinely aligned with humanity's morality and values so that it is \"fundamentally on our side\". [269]\nSecond, Yuval Noah Harari argues that AI does not require a robot body or physical control to pose an existential risk. The essential parts of civilization are not physical. Things like ideologies, law, government, money and the economy are built on language; they exist because there are stories that billions of people believe. The current prevalence of misinformation suggests that an AI could use language to convince people to believe anything, even to take actions that are destructive. [270]\nThe opinions amongst experts and industry insiders are mixed, with sizable fractions both concerned and unconcerned by risk from eventual superintelligent AI. [271] Personalities such as Stephen Hawking, Bill Gates, and Elon Musk, [272] as well as AI pioneers such as Yoshua Bengio, Stuart Russell, Demis Hassabis, and Sam Altman, have expressed concerns about existential risk from AI.", + "page_start": 18, + "page_end": 18, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Other sources\nBostrom, Nick (2014). Superintelligence: Paths, Dangers, Strategies . Oxford University Press.\nBostrom, Nick (2015). \"What happens when our computers get smarter than we are?\" (https://w ww.ted.com/talks/nick_bostrom_what_happens_when_our_computers_get_smarter_than_w e_are/transcript). TED (conference). Archived (https://web.archive.org/web/2020072500571 9/https://www.ted.com/talks/nick_bostrom_what_happens_when_our_computers_get_smart er_than_we_are/transcript) from the original on 25 July 2020. Retrieved 30 January 2020.\nBrooks, Rodney (10 November 2014). \"artificial intelligence is a tool, not a threat\" (https://web.a rchive.org/web/20141112130954/http://www.rethinkrobotics.com/artificial-intelligence-tool-th reat). Archived from the original (http://www.rethinkrobotics.com/artificial-intelligence-tool-thr eat) on 12 November 2014.\nBrooks, Rodney (1990). \"Elephants Don't Play Chess\" (http://people.csail.mit.edu/brooks/paper s/elephants.pdf) (PDF). Robotics and Autonomous Systems . 6 (1-2): 3-15. CiteSeerX 10.1.1.588.7539 (https://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.588. 7539). doi:10.1016/S0921-8890(05)80025-9 (https://doi.org/10.1016%2FS0921-8890%280 5%2980025-9). Archived (https://web.archive.org/web/20070809020912/http://people.csail. mit.edu/brooks/papers/elephants.pdf) (PDF) from the original on 9 August 2007.", + "page_start": 53, + "page_end": 53, + "source_file": "wikipedia3.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia3.pdf", + "query": "Where can I find the Inspect tool to evaluate the safety of our models?", + "target_page": 21, + "target_passage": "The UK AI Safety Institute released in 2024 a testing toolset called 'Inspect' for AI safety evaluations available under a MIT open-source licence which is freely available on GitHub", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Monitor\n· Logs in CloudWatch\n· Errors and tracing in X-Ray\n· Metrics", + "page_start": 53, + "page_end": 53, + "source_file": "serverless-core.pdf" + }, + { + "text": "OSH Barometer -Non-fatal accidents at work:\nhttps://visualisation.osha.europa.eu/osh-barometer/accidents-diseases-well-being/workaccidents/non-fatal-work-accidents", + "page_start": 72, + "page_end": 72, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "References\n300. Kamila, Manoj Kumar; Jasrotia, Sahil Singh (1 January 2023). \"Ethical issues in the development of artificial intelligence: recognizing the risks\" (https://doi.org/10.1108/IJOES-0 5-2023-0107). International Journal of Ethics and Systems . ahead-of-print (ahead-of-print). doi:10.1108/IJOES-05-2023-0107 (https://doi.org/10.1108%2FIJOES-05-2023-0107). ISSN 2514-9369 (https://search.worldcat.org/issn/2514-9369). S2CID 259614124 (https://ap i.semanticscholar.org/CorpusID:259614124). Archived (https://web.archive.org/web/202410 05170207/https://www.emerald.com/insight/content/doi/10.1108/IJOES-05-2023-0107/full/ht ml) from the original on 5 October 2024. Retrieved 5 October 2024.\n301. \"AI Safety Institute releases new AI safety evaluations platform\" (https://www.gov.uk/govern ment/news/ai-safety-institute-releases-new-ai-safety-evaluations-platform). UK Government. 10 May 2024. Archived (https://web.archive.org/web/20241005170207/https://www.gov.uk/g overnment/news/ai-safety-institute-releases-new-ai-safety-evaluations-platform) from the original on 5 October 2024. Retrieved 14 May 2024.\n302. Regulation of AI to mitigate risks: Berryhill et al. (2019), Barfield & Pagallo (2018), Iphofen & Kritikos (2019), Wirtz, Weyerer & Geyer (2018), Buiten (2019)\n303. Law Library of Congress (U.S.). Global Legal Research Directorate (2019).\n304. Vincent (2023).\n305. Stanford University (2023).", + "page_start": 46, + "page_end": 46, + "source_file": "wikipedia3.pdf" + }, + { + "text": "3.6.2.2 Distributions\nThis view provides a detailed report of the distributions ' status of the selected catalogue. The user can see the URLs of the distributions that were checked (access and download URL), the corresponding HTTP response codes and the dates when this issue occurred the first time. Additionally, the distributions ' format is checked for its machine readability. The machine readability check is based on the results of the Open Data Monitor project 1 .\n1 https://github.com/opendatamonitor/odm.restapi/blob/master/odmapi/defformatLists.py#L44-L87\nEuropean Data Portal Version 4.3 -User Manual\nPage 52 of 57", + "page_start": 51, + "page_end": 51, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "C Supplementary materials for models\nWe present in this section the model characteristics we collected for the 46 evaluated models.\nFor evaluating prompt-based models such as intfloat/e5-mistral-instruct-7b , we provide the prompts we used in Table 8.", + "page_start": 11, + "page_end": 11, + "source_file": "arxiv4.pdf" + }, + { + "text": "OSH Barometer - Fatal accidents at work:\nhttps://visualisation.osha.europa.eu/osh-barometer/accidents-diseases-well-being/workaccidents/fatal-work-accidents\nEurostat - Accidents at work (ESAW and LFS Ad hoc modules):\nhttps://ec.europa.eu/eurostat/web/health/data/database", + "page_start": 72, + "page_end": 72, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "3.3. Model Fitting with ActionModels\nparameter recovery and predictive checks. In this section, we outline how to use ActiveInference for simulation and model fitting in conjunction with ActionModels . In the following section, we show how to achieve this on a concrete worked example.", + "page_start": 16, + "page_end": 16, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "https://committee.iso.org/home/tc283\n475 European Agency for Safety and Health at Work: ESENER survey; OSHWiki overview: Key performance indicators, https://oshwiki.eu/wiki/Key_performance_indicators European Agency for Safety and Health at Work, 2017: Methodologies to identify work-related diseases: Review of sentinel and alert approaches, Luxembourg: Publications Office of the European Union, E European Agency for Safety and Health at Work, 2018: Safety and Health in micro and small enterprises in the EU: Final report from the 3-year SESAME project\nEuropean Agency for Safety and Health at Work - EU-OSHA\n159\nOccupational safety and health in Europe - state and trends 2023", + "page_start": 158, + "page_end": 159, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "NAVWEPS 00-8OT-80 HIGH SPEED AERODYNAMICS\nfigure 3.17. Structurd Complications Due to Sweephk\n233", + "page_start": 250, + "page_end": 250, + "source_file": "00-80T-80.pdf" + }, + { + "text": "5.4.1 System overview\nTo view internal components (components that cannot be seen from the outside), review the bottom of the GUI underneath where the list of external components is displayed. You can select any of these components and details show in the right pane, as with the external components.\nFigure 5-33 Viewing internal components\nYou can also choose SAS Chain View to view directly attached expansion enclosures, as shown in Figure 5-34. A useful view of the entire SAS chain is displayed, with selectable components that show port numbers and canister numbers, along with a cable diagram for easy cable tracking.\nFigure 5-34 SAS Chain View\nYou can select any Enclosure to get more information, including serial number and model type, as shown in Figure 5-35 where Expansion Enclosure 3 is selected. You can also see the Events and Component Details areas on the right side of the pane, which shows information that relates to the enclosure or component you select.\nFigure 5-35 Enclosure Details\nChapter 5. Graphical user interface\n151\n152\nImplementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\nWith directly attached expansion enclosures, the view is condensed to show all expansion enclosures on the right side, as shown in Figure 5-36. The number of events against each enclosure and the enclosure status are displayed for quick reference. Each enclosure is selectable, which brings you to the Expansion Enclosure View window.\nFigure 5-36 System Overview with attached enclosures", + "page_start": 171, + "page_end": 173, + "source_file": "sg247938.pdf" + } + ] + }, + { + "references": { + "source_file": "legal2_opengouvernementlicense.pdf", + "query": "What was the age category of most new opiate/crack users during the crime peak in the mid-1990s?", + "target_page": 9, + "target_passage": "mplying that most of these individuals were in their mid-to-late teens during the crime peak of the mid-1990s", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "1. Drug Interventions Programme Data\nThe mean age at test is 32 and the mean year of birth is 1977, implying that most of these individuals were in their mid-to-late teens during the crime peak of the mid-1990s. 9 Given evidence suggesting that the average age of initiation for opiate/crack use is around 18-20 (Millar et al ., 2001), this age profile would tentatively suggest that OCU incidence also peaked in the 1990s and that this created a large cohort of users who would be approaching 40 today.\nThe minimum and maximum years of birth are fixed by construction, because anyone born\n9 Note that the dataset counts tests, not unique individuals, so the same person can appear more than once.\nNew opiate and crack-cocaine users: characteristics and trends\n9\nbefore 1960 was removed and because DIP tests are only administered to those aged 18 and over, so only using data to 2013 means it would not be possible for anyone to be born in 1996 or afterwards to be included. Even so, it is clear from the year-of-birth distribution (Figure 2) that positive opiate tests drop off sharply for those born after 1982. This is in line with other evidence suggesting that the number of new users of opiates decreased sharply in the 2000s. This needs to be considered when interpreting the analysis that follows. When DIP and the NDTMS treatment system began in the mid-2000s, there already existed a cohort of around 320,000 OCUs, according to available estimates by Hay et al ., (2013). And most of these individuals began using opiates/crack during the epidemic years of the 1980s and 1990s. In terms of data capture this means it is hard to separate the gradual inclusion of more and more individuals from this original cohort from genuinely new users of these drugs.\nFigure 2: Year of birth distribution for all opiate-only/positive-for-both tests.\nFigure 3, which shows the age of the individual at a positive test, also reveals that although the average age at positive test is 32, the peak is quite flat, with high numbers of positive tests still being recorded by individuals in their late 30s and even into their 40s.\nNew opiate and crack-cocaine users: characteristics and trends\n10\nFigure 3: Distribution of tester's age at positive test for all opiate-only/positive-for-both tests.", + "page_start": 8, + "page_end": 10, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "Charts showing age-of-onset distributions (by percentage of total cohort) for different cohorts based on year of first treatment\nNew opiate and crack-cocaine users: characteristics and trends\n31\nNew opiate and crack-cocaine users: characteristics and trends\n32", + "page_start": 30, + "page_end": 31, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "Executive summary\n It is estimated that around 5,000 to 8,000 individuals started using opiates or crackcocaine in 2013. There is a high degree of uncertainty around this figure due to the sparse data on this population, but sense-checks based on treatment and criminal justice system data suggest the true figure is unlikely to be much larger than 10,000.\n Data also suggest that the number of current opiate/crack initiates involved with crime may be even lower. The number of arrestees testing positive for the first time for opiates (or for both opiates and crack-cocaine) dropped from 14,750 in 2006 to 4,281 in the first 11 months of 2013, a fall of around 70 per cent 2 . Furthermore, of the new positive testers in 2013, only 721 were aged 18-24. 3 Though this arrestee data will capture only a proportion of the true population, it does suggest that the number of new, young initiates involved with crime - those who have the potential to inflict most societal harm - has decreased markedly, probably just to a few thousand per year; and that this group now make up a small minority of the total number of opiate/crack-cocaine users (estimated to be 294,000 in 2011/12), most of whom are older, longer-term users.\n In terms of trends in new opiate/crack-cocaine users, all available data suggest that figures have dipped by at least a fifth since 2005 and have dropped hugely since the late 1980s and early 1990s when the opiate/crack-cocaine population in the UK grew very rapidly. The current estimate works out at a rate of 0.18 per 1,000 population. During the epidemic years, published estimates of new opiate/crack-cocaine users in Manchester and Bolton show rates more than 11 times larger.\n However, the findings also suggest that between 2011 and early 2014, the number of new opiate/crack-cocaine users stopped decreasing and instead stabilised at a (historically) low level. Further analysis was conducted to try and determine whether this was a precursor to a new rise in initiates. Though the data are not totally conclusive, the results suggest that a marked increase in new opiate/crack-cocaine users in the near future is unlikely. If anything, findings suggested that the downward trend may be set to resume.", + "page_start": 2, + "page_end": 2, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "New opiate and crack-cocaine users: characteristics and trends\nResearch Report 90\nNick Morgan, Daniel Heap, Amy Elliott, Tim Millar\nJanuary 2016", + "page_start": 0, + "page_end": 0, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "Conclusion\nThis report has attempted to draw together available data and evidence to estimate the number of new opiate/crack-cocaine users (OCUs) per year in England since 2005 and then to look briefly at their characteristics. This is important as previous research has suggested that mostly through the actions of a minority - this group has the potential to have a large impact on crime trends and therefore to impose significant societal costs.\nThough data on this population is imperfect, a number of different data sources and methodologies are available to estimate OCU incidence. From these, three key conclusions emerge:\n The number of new opiate/crack users is clearly far lower now than it was in the 1980s and early 1990s and has even dropped 20-45% since 2005.\n This means numbers of new users in 2013 may be around 5,000-8,000 with an approximate upper bound of 10,000; and numbers involved with prolific criminality will be lower still.\n The downward trend in new OCUs has flattened since about 2011, but available data do not suggest that this is the precursor to a new increase. If anything, the downward trend may resume in 2014, though the situation requires further monitoring.\nFor local areas then, this report suggests that it is still important to identify new OCUs as the arrestee data showed that a proportion of these are likely to offend over a long period of time. But also, there was some evidence of a shift to older initiates, which may require a slightly different treatment approach.\nNew opiate and crack-cocaine users: characteristics and trends\n30", + "page_start": 29, + "page_end": 29, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "Executive summary\n Analysis also revealed some possible changes in characteristics of the new opiate/crackcocaine initiates. There is a trend in the treatment data towards new initiates coming to treatment earlier in their drug-using careers than previous cohorts and also to have\n1 At the time of writing, data was unavailable for the period after November 2013.\n2 It is 68 per cent if the 2013 figure is adjusted to correct for the missing month of data.\n3 787 if adjusted for the missing month.\nNew opiate and crack-cocaine users: characteristics and trends\n3\ninitiated use at an older age. Currently it is not possible to determine whether this is a reporting issue or a genuine shift in the age profile of new opiate/crack-cocaine users.\n The report has several important policy implications. Even though numbers of new initiates involved with crime have dropped to the low thousands, putting downward pressure on crime, identification and early diversion to treatment remains paramount. Frontier Economics have estimated that the average 4 lifetime crime cost of an injecting drug user is £445,000, so the potential for social harm - even from a small number of individuals - remains large and potentially long-lasting. This means local areas need to manage both the (relatively large) stock of current users, and the (much smaller) flow of new initiates, whose treatment needs may be different. There is no evidence of any new epidemic in this country, but given the impact of the epidemic of the 80s and early 90s on crime, ongoing monitoring of recent trends is required to spot early signs of any emerging problems.", + "page_start": 2, + "page_end": 3, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "2. Estimating an incidence trend from treatment data\n23 This shift does not appear to be related to the reduction in heroin supply occurring around 2010/11. As Appendix 1 demonstrates, the pattern emerges far earlier.\nNew opiate and crack-cocaine users: characteristics and trends\n28\nFigure 11: Number of recent (within two years) OCU initiates presenting to treatment in 2005 and 2013, by age of individual at first presentation.\nThe mode age of initiation has shifted from around 18 to around 25 and there is an older age profile throughout. Rises in average age of initiation have also been reported recently in cohorts of Australian injecting drug users (Horyniak et al., 2015). There appear to be two possible explanations.\n There is a genuine shift towards new initiates being older, and for them to present to treatment much faster than in previous years.\n There is a consistent, but small number of individuals who mis-report their age of onset when attending treatment i.e. who report that they have only been using opiates/crack for a short period when in fact they have been using for a far longer period, and that this is starting to really bias the numbers for recent cohorts because attendees from the original epidemic are becoming smaller.\nIt is possible then that the flattening we observe in the incidence trend is due to a small in-flux of older initiates, although mis-reporting may also explain that phenomenon. Either way though, as this analysis has made clear throughout, absolute numbers of new OCUs appear to be small probably fewer than 10,000 per annum and the numbers of those involved with crime will be smaller still. In addition, despite a flattening in the probable trend in new users, there is currently no sign that it is likely to tip upwards. If anything, the data suggest the downward trend is set to resume, though clearly it remains important to monitor the situation.\nNew opiate and crack-cocaine users: characteristics and trends\n29", + "page_start": 27, + "page_end": 28, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "Executive summary\nThis paper uses a range of datasets and methodologies to:\n obtain working estimates for the number of individuals in England who started using opiates/crack from 2005 to 2013; 1\n examine the characteristics of these individuals.\nThe main findings of the paper are as follows.", + "page_start": 2, + "page_end": 2, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "Aims and Methodology\n4 The average is useful, but hides the fact that offending within the opiate/crack population is highly skewed with a few individuals responsible for the majority of crime and many individuals manage to use heroin and crack without resorting to acquisitive crime at all (Morgan, 2014).\n5 Though regular national-level estimates have not been attempted, studies have estimated incidence at various times and at various different levels of geography, see for example: De Angelis et al ., 2004, Millar et al ., 2001 and Hickman et al ., 2001.\nNew opiate and crack-cocaine users: characteristics and trends\n4\nmethods for calculating incidence are complicated and imperfect. It should be acknowledged in advance that this paper does not fully resolve these issues. It is merely intended as a first step, to obtain workable estimates upon which to base policy until more sophisticated methods are developed. That said, every effort is made in this analysis to sense-check the results against other available datasets. The datasets used and the structure of the paper is as follows.\ni) Drug Interventions Programme (DIP) data. In part one, we produce general descriptive statistics from these data, which capture individuals who test positive for opiates/crack-cocaine following arrest or charge. Due to the limitations in coverage of these data over time, we draw only broad conclusions, some of which act as a sensecheck for the main results from part two.\nii) Data on presentations to treatment from the National Drug Treatment Monitoring System (NDTMS). In part two, we use two models based on previous research papers to calculate OCU incidence at the national level between 2005 and 2013. Most of the main conclusions come from this section.\nNew opiate and crack-cocaine users: characteristics and trends\n5", + "page_start": 3, + "page_end": 4, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "1. Drug Interventions Programme Data\nTable 9: Table showing the age breakdown of individuals testing positive for opiates-only or positive-for-both as a proportion of all individuals first testing positive in that year.\n35 - 39 = 22%. 22%, Age 40 over = 100%. 22%, Total = 2011. 19%, Age 18 - 24 = 20%. 19%, Age 25 - 29 = 22%. 19%, Age 30 - 34 = 17%. 19%, Age 35 - 39 = 23%. 19%, Age 40 over = 100%. 19%, Total = 2012. 17%, Age 18 - 24 = 20%. 17%, Age 25 - 29 = 22%. 17%, Age 30 - 34 = 16%. 17%, Age 35 - 39 = 25%. 17%, Age 40 over = 100%. 17%, Total = 2013", + "page_start": 19, + "page_end": 19, + "source_file": "legal2_opengouvernementlicense.pdf" + } + ] + }, + { + "references": { + "source_file": "legal2_opengouvernementlicense.pdf", + "query": "According to the National Database Treatment Monitoring System, how many people started using opiates/crack between 2005 and 2014?", + "target_page": 22, + "target_passage": " Only 52,829 individuals said they had an opiate/crack initiation date between 2005 and 2014", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "2. Estimating an incidence trend from treatment data\nThe majority of those presenting for treatment between 2005 and 2014 started using opiates/crack before 2005 (around four in five). Only 52,829 individuals said they had an opiate/crack initiation date between 2005 and 2014. This suggests an average of just under 5,000 new starters per year during this period. But this would be an under-estimate of incidence because it is likely that some of those who began use between 2005 and 2014 would not yet have come to treatment during that period.\nTo correct for this, we use two variants of a methodology employed by researchers in Millar et al . (2001) and Hickman et al . (2001). These papers discuss the methodology in detail.\nNew opiate and crack-cocaine users: characteristics and trends 22 In brief, the method uses the lag-to-treatment distribution for the sample coupled with the number of new treatment presentations in a given year to estimate OCU incidence in that year. So, when presenting to treatment, all individuals are asked to provide the year in which they first began using their primary drug, which for this analysis was limited to opiates and/or crack-\ncocaine. From this information it is possible to create a distribution, for all presentations, of the lag-time between initiation and their first presentation at treatment. This might show - for example - that only ten per cent of all individuals presenting to treatment do so in the first year of use, but that 25 per cent present within two years, and so on. This means that for each year, we can estimate the number of individuals who have begun an opiate-crack career but who have yet to come to treatment . Adding these to the numbers who began in that year and have come to treatment gives our total incidence estimate for each year.\nThe first model uses NDTMS data for the cohort starting use in 2005 (n=8,960), the lag-time distribution for those initiating use in 2005 and presenting to treatment between 2005 and 2014 18 is shown below.\nTable 11: Time-to-treatment distribution for those initiating use in 2005 and presenting to treatment between 2005 and 2014. 19", + "page_start": 21, + "page_end": 22, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "Executive summary\n It is estimated that around 5,000 to 8,000 individuals started using opiates or crackcocaine in 2013. There is a high degree of uncertainty around this figure due to the sparse data on this population, but sense-checks based on treatment and criminal justice system data suggest the true figure is unlikely to be much larger than 10,000.\n Data also suggest that the number of current opiate/crack initiates involved with crime may be even lower. The number of arrestees testing positive for the first time for opiates (or for both opiates and crack-cocaine) dropped from 14,750 in 2006 to 4,281 in the first 11 months of 2013, a fall of around 70 per cent 2 . Furthermore, of the new positive testers in 2013, only 721 were aged 18-24. 3 Though this arrestee data will capture only a proportion of the true population, it does suggest that the number of new, young initiates involved with crime - those who have the potential to inflict most societal harm - has decreased markedly, probably just to a few thousand per year; and that this group now make up a small minority of the total number of opiate/crack-cocaine users (estimated to be 294,000 in 2011/12), most of whom are older, longer-term users.\n In terms of trends in new opiate/crack-cocaine users, all available data suggest that figures have dipped by at least a fifth since 2005 and have dropped hugely since the late 1980s and early 1990s when the opiate/crack-cocaine population in the UK grew very rapidly. The current estimate works out at a rate of 0.18 per 1,000 population. During the epidemic years, published estimates of new opiate/crack-cocaine users in Manchester and Bolton show rates more than 11 times larger.\n However, the findings also suggest that between 2011 and early 2014, the number of new opiate/crack-cocaine users stopped decreasing and instead stabilised at a (historically) low level. Further analysis was conducted to try and determine whether this was a precursor to a new rise in initiates. Though the data are not totally conclusive, the results suggest that a marked increase in new opiate/crack-cocaine users in the near future is unlikely. If anything, findings suggested that the downward trend may be set to resume.", + "page_start": 2, + "page_end": 2, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "Executive summary\nThis paper uses a range of datasets and methodologies to:\n obtain working estimates for the number of individuals in England who started using opiates/crack from 2005 to 2013; 1\n examine the characteristics of these individuals.\nThe main findings of the paper are as follows.", + "page_start": 2, + "page_end": 2, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "2. Estimating an incidence trend from treatment data\nThis section uses treatment data from the National Database Treatment Monitoring System (NDTMS) to estimate the number of new OCUs annually. The NDTMS captures data on the numbers of people presenting to services with problem drug misuse and information about the drug treatment they receive. All drug treatment agencies in England provide a basic level of information to the NDTMS on their activities each month. The data for this report included all unique individuals presenting to treatment with opiates or crack-cocaine listed as their primary drug between 2005 and 2014. All individuals whose age of first use was listed as below ten or before 2005 were then excluded. Excluding individuals who started using opiates/crack before 2005 resulted in a large number of records being left out, due to the fact that the majority of the treatment population, even in 2013/14, initiated in the 1980s and 1990s when heroin and crack use surged in the UK. However, this exclusion is necessary for the incidence methodology, as explained later in this section. The remaining dataset included 52,829 individuals, as shown in Table 10.\nTable 10: Descriptive statistics from the NDTMS data.", + "page_start": 21, + "page_end": 21, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "2. Estimating an incidence trend from treatment data\nReading across the table shows that of all those who said they began using opiates/crack in 2005 (8,960), 1,305 also presented to treatment for the first time in that year (which is 15 per cent of the observed cohort from Table 11 and 12 per cent of our estimated total cohort from Table 12). Another 1,508 presented for the first time a year later, and so on. The first number in the totals column (8,960) therefore represents all individuals who said they began using in 2005. It is therefore the 'observed' incidence level. The column to the right of this is the cumulative percentages from the estimated lag-to-treatment distribution in Table 12. This shows the\notherwise similar data (i.e. first treatment presentation and year of initiation) from OCUs attending treatment in the Manchester area.\n21 Note that the data for 2014 only includes Jan-Oct as this was all that was available. Hence we do not do not attempt to calculate an incidence estimate for 2014 and we adjust all the values in that column by multiplying by (12/10) to account for the missing months.\nNew opiate and crack-cocaine users: characteristics and trends\n24\nestimated percentage of the total incidence captured by the observed incidence. In other words, our lag-to-treatment distribution suggests that of the 8,960 individuals who began use in 2005, 85 per cent will have come to treatment by 2014; so by adding the other 15 per cent on (1,523), we reach our estimated total incidence for that year: 10,483.", + "page_start": 23, + "page_end": 24, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "Aims and Methodology\n4 The average is useful, but hides the fact that offending within the opiate/crack population is highly skewed with a few individuals responsible for the majority of crime and many individuals manage to use heroin and crack without resorting to acquisitive crime at all (Morgan, 2014).\n5 Though regular national-level estimates have not been attempted, studies have estimated incidence at various times and at various different levels of geography, see for example: De Angelis et al ., 2004, Millar et al ., 2001 and Hickman et al ., 2001.\nNew opiate and crack-cocaine users: characteristics and trends\n4\nmethods for calculating incidence are complicated and imperfect. It should be acknowledged in advance that this paper does not fully resolve these issues. It is merely intended as a first step, to obtain workable estimates upon which to base policy until more sophisticated methods are developed. That said, every effort is made in this analysis to sense-check the results against other available datasets. The datasets used and the structure of the paper is as follows.\ni) Drug Interventions Programme (DIP) data. In part one, we produce general descriptive statistics from these data, which capture individuals who test positive for opiates/crack-cocaine following arrest or charge. Due to the limitations in coverage of these data over time, we draw only broad conclusions, some of which act as a sensecheck for the main results from part two.\nii) Data on presentations to treatment from the National Drug Treatment Monitoring System (NDTMS). In part two, we use two models based on previous research papers to calculate OCU incidence at the national level between 2005 and 2013. Most of the main conclusions come from this section.\nNew opiate and crack-cocaine users: characteristics and trends\n5", + "page_start": 3, + "page_end": 4, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "2. Estimating an incidence trend from treatment data\nbetween March 2011 and March 2015 can also be seen in the raw numbers for total new OCU treatment presentations. 22\nFigure 10: New treatment presentations for opiate/crack use.\nFigure 10 shows that, rather than increasing in the current year, new presentations for opiate/crack use have actually fallen slightly from 48,154 in 2013/14 to 47,241 in 2014/15, a decrease of 1.9%. However, given that the early signs of previous opiate/crack use epidemics have been missed before (see Morgan, 2014), and the potential social harm that a fresh increase in new OCUs could cause, further analysis was conducted on the most recent data to try and determine whether the apparent flattening in trends was actually caused by the early stages of a significant surge in new users.\nThe treatment data was broken down by age to check whether the slight fall in total new presentations in 2014/15 masked an increase in younger treatment presentations. This showed instead that opiate/crack presentations by those aged 18-24 had fallen from 3,579 in 2013/14 to 3,021 in 2014/15, a fall of 15.6%. In other words, younger new presentations have fallen at a faster rate over the last year than for those aged over-25. Furthermore, separate statistics produced for those in treatment aged 18-and-under also show a fall in aggregate numbers in treatment for opiates and crack.\nWe also looked at trends at the local level, given that previous epidemics have started in very specific areas and have taken several years to spread nationally. This means that the start of an epidemic can be hidden in the national data because it has not reached enough areas to register.\n22 Note that this series counts the start of any new treatment journey, regardless of whether an individual has been in treatment before. So unlike our definition of 'new' elsewhere it includes individuals who have been to treatment previously.\nNew opiate and crack-cocaine users: characteristics and trends\n27\nThe analysis showed that of the 149 Drug Action Team areas in England, 72 per cent had decreases in new OCU treatment numbers in the year to September 2014 compared to the previous year. Furthermore, of the 42 areas showing an increase, only 11 also showed a rise for the 12 months to September 2010 compared with the 12 months to September 2014, and most of these involved small numbers of individuals.", + "page_start": 26, + "page_end": 27, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "Conclusion\nThis report has attempted to draw together available data and evidence to estimate the number of new opiate/crack-cocaine users (OCUs) per year in England since 2005 and then to look briefly at their characteristics. This is important as previous research has suggested that mostly through the actions of a minority - this group has the potential to have a large impact on crime trends and therefore to impose significant societal costs.\nThough data on this population is imperfect, a number of different data sources and methodologies are available to estimate OCU incidence. From these, three key conclusions emerge:\n The number of new opiate/crack users is clearly far lower now than it was in the 1980s and early 1990s and has even dropped 20-45% since 2005.\n This means numbers of new users in 2013 may be around 5,000-8,000 with an approximate upper bound of 10,000; and numbers involved with prolific criminality will be lower still.\n The downward trend in new OCUs has flattened since about 2011, but available data do not suggest that this is the precursor to a new increase. If anything, the downward trend may resume in 2014, though the situation requires further monitoring.\nFor local areas then, this report suggests that it is still important to identify new OCUs as the arrestee data showed that a proportion of these are likely to offend over a long period of time. But also, there was some evidence of a shift to older initiates, which may require a slightly different treatment approach.\nNew opiate and crack-cocaine users: characteristics and trends\n30", + "page_start": 29, + "page_end": 29, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "1. Drug Interventions Programme Data\nThere were just over 100,000 unique individuals who tested positive for opiates-only or positivefor-both between 2004 and 2013. The distribution of the 296,008 positive tests these individuals gave, shows that the vast majority (55%) were only tested once (see Figure 4), which is likely to be why the age statistics are quite similar between Table 3 and Table 4. However, within this\n10 Examining the data it is also clear that some areas recorded a higher proportion of cases without a PNC number than others. Thus excluding these cases further affects the variation in geographic coverage across time. See Appendix for more.\nNew opiate and crack-cocaine users: characteristics and trends\n12\npopulation there exists a small group of frequent repeat users. 1,828 individuals (1.7% of this population) accounted for just over ten per cent of all positive tests (30,471 tests in total). These individuals provided between 16 and 57 positive tests over the period 2004 to 2013.\nFigure 4: Proportion of positive tests by number of times an individual tested positive.\nThe age and year-of-birth distributions for the 104,817 individuals reveals a similar profile to the distribution for total tests (Figures 5 and 6).\nNew opiate and crack-cocaine users: characteristics and trends\n13\nFigure 5: Year of birth for all individuals on their first positive test (opiates-only or positivefor-both.)\nFigure 6: Age at first positive test (opiates-only or positive-for-both.)\nNote: as a guide to the OCU population, this chart is left-truncated as DIP tests are not given to under-18s.\nNew opiate and crack-cocaine users: characteristics and trends\n14\nThe relationship between the total opiates-only or positive-for-both tests and the individuals responsible for them can also be shown over time, as Table 5 illustrates 11 .\nTable 5: Table showing trends in total positive opiates-only or positive-for-both., in unique individuals testing positive, and in new individuals testing positive.", + "page_start": 11, + "page_end": 14, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "Executive summary\n Analysis also revealed some possible changes in characteristics of the new opiate/crackcocaine initiates. There is a trend in the treatment data towards new initiates coming to treatment earlier in their drug-using careers than previous cohorts and also to have\n1 At the time of writing, data was unavailable for the period after November 2013.\n2 It is 68 per cent if the 2013 figure is adjusted to correct for the missing month of data.\n3 787 if adjusted for the missing month.\nNew opiate and crack-cocaine users: characteristics and trends\n3\ninitiated use at an older age. Currently it is not possible to determine whether this is a reporting issue or a genuine shift in the age profile of new opiate/crack-cocaine users.\n The report has several important policy implications. Even though numbers of new initiates involved with crime have dropped to the low thousands, putting downward pressure on crime, identification and early diversion to treatment remains paramount. Frontier Economics have estimated that the average 4 lifetime crime cost of an injecting drug user is £445,000, so the potential for social harm - even from a small number of individuals - remains large and potentially long-lasting. This means local areas need to manage both the (relatively large) stock of current users, and the (much smaller) flow of new initiates, whose treatment needs may be different. There is no evidence of any new epidemic in this country, but given the impact of the epidemic of the 80s and early 90s on crime, ongoing monitoring of recent trends is required to spot early signs of any emerging problems.", + "page_start": 2, + "page_end": 3, + "source_file": "legal2_opengouvernementlicense.pdf" + } + ] + }, + { + "references": { + "source_file": "legal2_opengouvernementlicense.pdf", + "query": "What proportion of opiate users tested in 2004 were still positive a decade later?", + "target_page": 18, + "target_passage": "Nearly ten per cent (8.9%) of individuals who tested positive for opiates at charge in 2004 also tested positive nearly a decade later in 2013 (on arrest)", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "1. Drug Interventions Programme Data\nThere were just over 100,000 unique individuals who tested positive for opiates-only or positivefor-both between 2004 and 2013. The distribution of the 296,008 positive tests these individuals gave, shows that the vast majority (55%) were only tested once (see Figure 4), which is likely to be why the age statistics are quite similar between Table 3 and Table 4. However, within this\n10 Examining the data it is also clear that some areas recorded a higher proportion of cases without a PNC number than others. Thus excluding these cases further affects the variation in geographic coverage across time. See Appendix for more.\nNew opiate and crack-cocaine users: characteristics and trends\n12\npopulation there exists a small group of frequent repeat users. 1,828 individuals (1.7% of this population) accounted for just over ten per cent of all positive tests (30,471 tests in total). These individuals provided between 16 and 57 positive tests over the period 2004 to 2013.\nFigure 4: Proportion of positive tests by number of times an individual tested positive.\nThe age and year-of-birth distributions for the 104,817 individuals reveals a similar profile to the distribution for total tests (Figures 5 and 6).\nNew opiate and crack-cocaine users: characteristics and trends\n13\nFigure 5: Year of birth for all individuals on their first positive test (opiates-only or positivefor-both.)\nFigure 6: Age at first positive test (opiates-only or positive-for-both.)\nNote: as a guide to the OCU population, this chart is left-truncated as DIP tests are not given to under-18s.\nNew opiate and crack-cocaine users: characteristics and trends\n14\nThe relationship between the total opiates-only or positive-for-both tests and the individuals responsible for them can also be shown over time, as Table 5 illustrates 11 .\nTable 5: Table showing trends in total positive opiates-only or positive-for-both., in unique individuals testing positive, and in new individuals testing positive.", + "page_start": 11, + "page_end": 14, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "1. Drug Interventions Programme Data\nTable 6: Number of positive opiates-only or positive-for-both. tests, by year of first positive test.\n2004, Number of tests per year (positive opiate/opiate + cocaine).2004 = 17,174. 2004, Number of tests per year (positive opiate/opiate + cocaine).2005 = 5,604. 2004, Number of tests per year (positive opiate/opiate + cocaine).2006 = 7,091. 2004, Number of tests per year (positive opiate/opiate + cocaine).2007 = 6,784. 2004, Number of tests per year (positive opiate/opiate + cocaine).2008 = 6,509. 2004, Number of tests per year (positive opiate/opiate + cocaine).2009 = 5,292. 2004, Number of tests per year (positive opiate/opiate + cocaine).2010 = 4,863. 2004, Number of tests per year (positive opiate/opiate + cocaine).2011 = 3,341. 2004, Number of tests per year (positive opiate/opiate + cocaine).2012 = 2,629. 2004, Number of tests per year (positive opiate/opiate + cocaine).2013 = 1,800. 2004, Number of tests per year (positive opiate/opiate + cocaine).Adjusted 2013 = 1,964. 2005, Number of tests per year (positive opiate/opiate + cocaine).2004 = . 2005, Number of tests per year (positive opiate/opiate + cocaine).2005 = 13,553. 2005, Number of tests per year (positive opiate/opiate + cocaine).2006 = 6,066. 2005, Number of tests per year (positive opiate/opiate + cocaine).2007 = 5,110. 2005, Number of tests per year (positive opiate/opiate + cocaine).2008 = 4,941. 2005, Number of tests per year (positive opiate/opiate + cocaine).2009 = 3,983. 2005, Number of tests per year (positive opiate/opiate + cocaine).2010 = 3,549. 2005, Number of tests per year (positive opiate/opiate + cocaine).2011 = 2,323. 2005, Number of tests per year (positive", + "page_start": 16, + "page_end": 16, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "1. Drug Interventions Programme Data\nThese tables can be read both horizontally and vertically. Reading vertically (i.e. down the columns) it can be observed, for example, that of the 12,353 individuals with a positive test in 2013, 4,281 (35%) had not had a previous positive test and over half had already tested positive at least once in 2010 or before.\nReading horizontally - for example from left to right across the first row - it can be concluded that of the 12,246 individuals testing positive in 2004, 3,171 also had a positive test in 2005; 3,299 of the original 12,246 also had a positive test in 2006 and so on. The table does not show whether those who had a subsequent test in 2005 were the same individuals as those who had a subsequent test in 2006. So reading the results of the two tables together, we can say that 12,246 individuals had 17,174 positive tests in 2004, and of these, 3,171 also tested positive in 2005, resulting in 5,604 positive tests because some tested positive more than once in that year. The last figure in each column gives the number of new users that year (10,539 in 2005, 14,750 in 2006 and so on).\nThere are several observations to be drawn from these tables. First, it is clear that a proportion of opiate-using offenders offend over long periods of time. Nearly ten per cent (8.9%) of individuals who tested positive for opiates at charge in 2004 also tested positive nearly a decade later in 2013 (on arrest). And reading vertically, of the 12,253 individuals testing positive in 2013, 1,092 (8.9%) had also tested positive almost a decade earlier.", + "page_start": 17, + "page_end": 17, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "1. Drug Interventions Programme Data\nThe mean age at test is 32 and the mean year of birth is 1977, implying that most of these individuals were in their mid-to-late teens during the crime peak of the mid-1990s. 9 Given evidence suggesting that the average age of initiation for opiate/crack use is around 18-20 (Millar et al ., 2001), this age profile would tentatively suggest that OCU incidence also peaked in the 1990s and that this created a large cohort of users who would be approaching 40 today.\nThe minimum and maximum years of birth are fixed by construction, because anyone born\n9 Note that the dataset counts tests, not unique individuals, so the same person can appear more than once.\nNew opiate and crack-cocaine users: characteristics and trends\n9\nbefore 1960 was removed and because DIP tests are only administered to those aged 18 and over, so only using data to 2013 means it would not be possible for anyone to be born in 1996 or afterwards to be included. Even so, it is clear from the year-of-birth distribution (Figure 2) that positive opiate tests drop off sharply for those born after 1982. This is in line with other evidence suggesting that the number of new users of opiates decreased sharply in the 2000s. This needs to be considered when interpreting the analysis that follows. When DIP and the NDTMS treatment system began in the mid-2000s, there already existed a cohort of around 320,000 OCUs, according to available estimates by Hay et al ., (2013). And most of these individuals began using opiates/crack during the epidemic years of the 1980s and 1990s. In terms of data capture this means it is hard to separate the gradual inclusion of more and more individuals from this original cohort from genuinely new users of these drugs.\nFigure 2: Year of birth distribution for all opiate-only/positive-for-both tests.\nFigure 3, which shows the age of the individual at a positive test, also reveals that although the average age at positive test is 32, the peak is quite flat, with high numbers of positive tests still being recorded by individuals in their late 30s and even into their 40s.\nNew opiate and crack-cocaine users: characteristics and trends\n10\nFigure 3: Distribution of tester's age at positive test for all opiate-only/positive-for-both tests.", + "page_start": 8, + "page_end": 10, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "1. Drug Interventions Programme Data\nTable 8: Unique individuals testing positive for opiates-only or positive-for-both, by age and by year of first test.\n2004, Age 18-24 = 3,150. 2004, Age 25-29 = 3,319. 2004, Age 30-34 = 2,938. 2004, Age 35-39 = 1,958. 2004, Age 40 over = 881. 2004, Total = 12,246. 2005, Age 18-24 = 2,391. 2005, Age 25-29 = 2,832. 2005, Age 30-34 = 2,548. 2005, Age 35-39 = 1,791. 2005, Age 40 over = 977. 2005, Total = 10,539. 2006, Age 18-24 = 3,635. 2006, Age 25-29 = 3,768. 2006, Age 30-34 = 3,275. 2006, Age 35-39 = 2,491. 2006, Age 40 over = 1,580. 2006, Total = 14,749. 2007, Age 18-24 = 3,182. 2007, Age 25-29 = 3,359. 2007, Age 30-34 = 2,869. 2007, Age 35-39 = 2,178. 2007, Age 40 over = 1,803. 2007, Total = 13,391. 2008, Age 18-24 = 2,912. 2008, Age 25-29 = 3,197. 2008, Age 30-34 = 2,857. 2008, Age 35-39 = 2,425. 2008, Age 40 over = 2,238. 2008, Total = 13,629. 2009, Age 18-24 = 2,711. 2009, Age 25-29 = 2,594. 2009, Age 30-34 = 2,304. 2009, Age 35-39 = 1,998. 2009, Age 40 over = 2,048. 2009, Total = 11,655. 2010, Age 18-24 = 2,287. 2010, Age 25-29 = 2,180. 2010, Age 30-34 = 2,105. 2010, Age 35-39 = 1,744. 2010, Age 40", + "page_start": 18, + "page_end": 18, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "1. Drug Interventions Programme Data\nTable 6: Number of positive opiates-only or positive-for-both. tests, by year of first positive test.\n1,105. , Number of tests per year (positive opiate/opiate + cocaine).Adjusted 2013 = 2011. , Number of tests per year (positive opiate/opiate + cocaine).2004 = . , Number of tests per year (positive opiate/opiate + cocaine).2005 = . , Number of tests per year (positive opiate/opiate + cocaine).2006 = . , Number of tests per year (positive opiate/opiate + cocaine).2007 = . , Number of tests per year (positive opiate/opiate + cocaine).2008 = . , Number of tests per year (positive opiate/opiate + cocaine).2009 = . , Number of tests per year (positive opiate/opiate + cocaine).2010 = . , Number of tests per year (positive opiate/opiate + cocaine).2011 = . , Number of tests per year (positive opiate/opiate + cocaine).2012 = 7,265. , Number of tests per year (positive opiate/opiate + cocaine).2013 = 1,359", + "page_start": 16, + "page_end": 16, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "1. Drug Interventions Programme Data\nTable 6: Number of positive opiates-only or positive-for-both. tests, by year of first positive test.\n1,704. , Number of tests per year (positive opiate/opiate + cocaine).Adjusted 2013 = 2008. , Number of tests per year (positive opiate/opiate + cocaine).2004 = . , Number of tests per year (positive opiate/opiate + cocaine).2005 = . , Number of tests per year (positive opiate/opiate + cocaine).2006 = . , Number of tests per year (positive opiate/opiate + cocaine).2007 = . , Number of tests per year (positive opiate/opiate + cocaine).2008 = 14,683. , Number of tests per year (positive opiate/opiate + cocaine).2009 = . , Number of tests per year (positive opiate/opiate + cocaine).2010 = 4,054. , Number of tests per year (positive opiate/opiate + cocaine).2011 = 2,383. , Number of tests per year (positive opiate/opiate + cocaine).2012 = 1,824. , Number of tests per year (positive opiate/opiate + cocaine).2013 = 1,318", + "page_start": 16, + "page_end": 16, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "1. Drug Interventions Programme Data\nTable 7: Number of unique individuals testing positive for opiates-only or positive-for-both, by year of first positive test.\n2004, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2004 = 12,246. 2004, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2005 = 3,171. 2004, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2006 = 3,299. 2004, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2007 = 3,090. 2004, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2008 = 2,992. 2004, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2009 = 2,573. 2004, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2010 = 2,311. 2004, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2011 = 1,766. 2004, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2012 = 1,513. 2004, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2013 = 1,092. 2004, Number of unique individuals with positive opiate/opiate + cocaine tests per year.Adjusted 2013 = 1,191. 2005, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2004 = . 2005, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2005 = 10,539. 2005, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2006 = 3,020. 2005, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2007 = 2,539. 2005, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2008 = 2,478. 2005, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2009 = 2,083. 2005, Number of unique individuals with positive opiate/opiate + cocaine tests per year.2010 = 1,844. 2005, Number of unique individuals with positive opiate/opiate + cocaine tests per", + "page_start": 17, + "page_end": 17, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "1. Drug Interventions Programme Data\nTable 6: Number of positive opiates-only or positive-for-both. tests, by year of first positive test.\n1,438. , Number of tests per year (positive opiate/opiate + cocaine).Adjusted 2013 = 2009. , Number of tests per year (positive opiate/opiate + cocaine).2004 = . , Number of tests per year (positive opiate/opiate + cocaine).2005 = . , Number of tests per year (positive opiate/opiate + cocaine).2006 = . , Number of tests per year (positive opiate/opiate + cocaine).2007 = . , Number of tests per year (positive opiate/opiate + cocaine).2008 = . , Number of tests per year (positive opiate/opiate + cocaine).2009 = 13,075. , Number of tests per year (positive opiate/opiate + cocaine).2010 = . , Number of tests per year (positive opiate/opiate + cocaine).2011 = 2,332. , Number of tests per year (positive opiate/opiate + cocaine).2012 = 1,638. , Number of tests per year (positive opiate/opiate + cocaine).2013 = 1,154 1,259. , Number of tests per year (positive opiate/opiate + cocaine).Adjusted 2013 = 2010. , Number of tests per year (positive opiate/opiate + cocaine).2004 = . , Number of tests per year (positive opiate/opiate + cocaine).2005 = . , Number of tests per year (positive opiate/opiate + cocaine).2006 = . , Number of tests per year (positive opiate/opiate + cocaine).2007 = . , Number of tests per year (positive opiate/opiate + cocaine).2008 = . , Number of tests per year (positive opiate/opiate + cocaine).2009 = . , Number of tests per year (positive opiate/opiate + cocaine).2010 = . , Number of tests per year (positive opiate/opiate + cocaine).2011 = 9,595. , Number of tests per year (positive opiate/opiate + cocaine).2012 = 1,714. , Number of tests per year (positive opiate/opiate + cocaine).2013 = 1,013", + "page_start": 16, + "page_end": 16, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "1. Drug Interventions Programme Data\nTable 6: Number of positive opiates-only or positive-for-both. tests, by year of first positive test.\n33,813. Total, Number of tests per year (positive opiate/opiate + cocaine).2007 = 37,291. Total, Number of tests per year (positive opiate/opiate + cocaine).2008 = 41,232. Total, Number of tests per year (positive opiate/opiate + cocaine).2009 = 38,376. Total, Number of tests per year (positive opiate/opiate + cocaine).2010 = 38,051. Total, Number of tests per year (positive opiate/opiate + cocaine).2011 = 28,476. Total, Number of tests per year (positive opiate/opiate + cocaine).2012 = 23,965. Total, Number of tests per year (positive opiate/opiate + cocaine).2013 = 18,473. Total, Number of tests per year (positive opiate/opiate + cocaine).Adjusted 2013 = 20,152", + "page_start": 16, + "page_end": 16, + "source_file": "legal2_opengouvernementlicense.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia5.pdf", + "query": "Who led the Fronde des princes?", + "target_page": 4, + "target_passage": "It was headed by the highest-ranking French nobles, among them Louis's uncle Gaston, Duke of Orléans and first cousin Anne Marie Louise d'Orléans, Duchess of Montpensier, known as la Grande Mademoiselle; Princes of the Blood such as Condé, his brother Armand de Bourbon, Prince of Conti, and their sister the Duchess of Longueville; dukes of legitimised royal descent, such as Henri, Duke of Longueville, and François, Duke of Beaufort; so-called \"foreign princes\" such as Frédéric Maurice, Duke of Bouillon, his brother Marshal Turenne, and Marie de Rohan, Duchess of Chevreuse; and scions of France's oldest families, such as François de La Rochefoucauld.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Early acts\nAs the Thirty Years' War came to an end, a civil war known as the Fronde erupted in France. It effectively checked France's ability to exploit the Peace of Westphalia. Anne and Mazarin had largely pursued the policies of Cardinal Richelieu, augmenting the Crown's power at the expense of the nobility and the Parlements . Anne was more concerned with internal policy than foreign affairs; she was a very proud queen who insisted on the divine rights of the King of France. [22]\nAll this led her to advocate a forceful policy in all matters relating to the King's authority, in a manner that was much more radical than the one proposed by Mazarin. The Cardinal depended totally on Anne's support and had to use all his influence on the Queen to temper some of her radical actions. Anne imprisoned any aristocrat or member of parliament who challenged her will; her main aim was to transfer to her son an absolute authority in the matters of finance and justice. One of the leaders of the Parlement of Paris, whom she had jailed, died in prison. [23]\nThe Frondeurs , political heirs of the disaffected feudal aristocracy, sought to protect their traditional feudal privileges from the increasingly centralized royal government. Furthermore, they believed their traditional influence and authority was being usurped by the recently ennobled bureaucrats (the Noblesse de Robe , or \"nobility of the robe\"), who administered the kingdom and on whom the monarchy increasingly began to rely. This belief intensified the nobles' resentment.\nIn 1648, Anne and Mazarin attempted to tax members of the Parlement de Paris . The members refused to comply and ordered all of the king's earlier financial edicts burned. Buoyed by the victory of Louis, duc d'Enghien (later known as le Grand Condé ) at the Battle of Lens, Mazarin, on Queen Anne's insistence, arrested certain members in a show of force. [24] The most important arrest, from Anne's point of view, concerned Pierre Broussel, one of the most important leaders in the Parlement de Paris .", + "page_start": 2, + "page_end": 2, + "source_file": "wikipedia5.pdf" + }, + { + "text": "Early acts\nUnfortunately for Anne, her partial victory depended on Condé, who wanted to control the queen and destroy Mazarin's influence. It was Condé's sister who pushed him to turn against the queen. After striking a deal with her old friend Marie de Rohan, who was able to impose the nomination of Charles de l'Aubespine, marquis de Châteauneuf as minister of justice, Anne arrested Condé, his brother Armand de Bourbon, Prince of Conti, and the husband of their sister Anne Genevieve de Bourbon, duchess of Longueville. This situation did not last long, and Mazarin's unpopularity led to the creation of a coalition headed mainly by Marie de Rohan and the duchess of Longueville. This aristocratic coalition was strong enough to liberate the princes, exile Mazarin, and impose a condition of virtual house arrest on Queen Anne.\nPortrait by Justus van Egmont between the years 1649-1652.\nAll these events were witnessed by Louis and\nlargely explained his later distrust of Paris and the higher aristocracy. [27] \"In one sense, Louis's childhood came to an end with the outbreak of the Fronde. It was not only that life became insecure and unpleasant - a fate meted out to many children in all ages - but that Louis had to be taken into the confidence of his mother and Mazarin on political and military matters of which he could have no deep understanding\". [28] \"The family home became at times a near-prison when Paris had to be abandoned, not in carefree outings to other chateaux but in humiliating flights\". [28] The royal family was driven out of Paris twice in this manner, and at one point Louis XIV and Anne were held under virtual arrest in the royal palace in Paris. The Fronde years planted in Louis a hatred of Paris and a consequent determination to move out of the ancient capital as soon as possible, never to return. [29]\nJust as the first Fronde (the Fronde parlementaire of 1648-1649) ended, a second one (the Fronde des princes of 1650-1653) began. Unlike that which preceded it, tales of sordid intrigue and half-hearted warfare characterized this second phase of upper-class insurrection. To the aristocracy, this rebellion represented a protest for the reversal of their political demotion from vassals to courtiers. It was headed by the highest-ranking French", + "page_start": 3, + "page_end": 3, + "source_file": "wikipedia5.pdf" + }, + { + "text": "Minority and the Fronde\nIssue more...\nLouis, Grand Dauphin\nMarie Thérèse, Madame Royale\nPhilippe Charles, Duke of Anjou\nIllegitimate :\nMarie Anne, Princess of Conti\nLouis, Count of Vermandois\nLouis Auguste, Duke of Maine\nLouis César, Count of Vexin\nLouise Françoise, Princess of Condé\nLouise Marie Anne,\nMademoiselle de Tours\nLouise, Baroness of La Queue\nFrançoise Marie, Duchess of Orléans\nLouis Alexandre, Count of Toulouse", + "page_start": 1, + "page_end": 1, + "source_file": "wikipedia5.pdf" + }, + { + "text": "Early acts\nnobles, among them Louis's uncle Gaston, Duke of Orléans and first cousin Anne Marie Louise d'Orléans, Duchess of Montpensier, known as la Grande Mademoiselle ; Princes of the Blood such as Condé, his brother Armand de Bourbon, Prince of Conti, and their sister the Duchess of Longueville; dukes of legitimised royal descent, such as Henri, Duke of Longueville, and François, Duke of Beaufort; so-called \"foreign princes\" such as Frédéric Maurice, Duke of Bouillon, his brother Marshal Turenne, and Marie de Rohan, Duchess of Chevreuse; and scions of France's oldest families, such as François de La Rochefoucauld.\nQueen Anne played the most important role in defeating the Fronde because she wanted to transfer absolute authority to her son. In addition, most of the princes refused to deal with Mazarin, who went into exile for a number of years. The Frondeurs claimed to act on Louis's behalf, and in his real interest, against his mother and Mazarin.\nQueen Anne had a very close relationship with the Cardinal, and many observers believed that Mazarin became Louis XIV's stepfather by a secret marriage to Queen Anne. [30] However, Louis's coming-of-age and subsequent coronation deprived them of the Frondeurs ' pretext for revolt. The Fronde thus gradually lost steam and ended in 1653, when Mazarin returned triumphantly from exile. From that time until his death, Mazarin was in charge of foreign and financial policy without the daily supervision of Anne, who was no longer regent. [31]", + "page_start": 3, + "page_end": 3, + "source_file": "wikipedia5.pdf" + }, + { + "text": "Height of power\nLouis's extravagance at Versailles extended far beyond the scope of elaborate court rituals. He took delivery of an African elephant as a gift from the king of Portugal. [63] He encouraged leading nobles to live at Versailles. This, along with the prohibition of private armies, prevented them from passing time on their own estates and in their regional power bases, from which they historically waged local wars and plotted resistance to royal authority. Louis thus compelled and seduced the old military aristocracy (the \"nobility of the sword\") into becoming his ceremonial courtiers, further weakening their power. In their place, he raised commoners or the more recently ennobled bureaucratic aristocracy (the \"nobility of the robe\"). He judged that royal authority thrived more surely by filling high executive and administrative positions with these men because they could be more easily dismissed than nobles of ancient lineage and entrenched influence. It is believed that Louis's policies were rooted in his\nexperiences during the Fronde , when men of high birth readily took up the rebel cause against their king, who was actually the kinsman of some. This victory over the nobility may thus have ensured the end of major civil wars in France until the French Revolution about a century later.", + "page_start": 8, + "page_end": 9, + "source_file": "wikipedia5.pdf" + }, + { + "text": "See also\nCharles de Lorme, personal medical doctor to Louis XIV\nFundamental laws of the Kingdom of France\nHouse of France\nLevée (ceremony)\nList of French monarchs\nOutline of France\nLouis XIV style\nNicolas Fouquet\nFrench forestry Ordinance of 1669\nPotager du Roi\nÉléphante de Louis XIV", + "page_start": 25, + "page_end": 26, + "source_file": "wikipedia5.pdf" + }, + { + "text": "Louis XIV\nLouis XIV (Louis-Dieudonné; 5 September 1638 - 1 September 1715), also known as Louis the Great ( Louis le Grand ) or the Sun King ( le Roi Soleil ), was King of France from 1643 until his death in 1715. His verified reign of 72 years and 110 days is the longest of any sovereign. [1][a] An emblematic character of the Age of Absolutism in Europe, [3] Louis XIV's legacy is widely characterized by French colonial expansion, the conclusion of Eighty Years' War involving the Habsburgs, and his architectural bequest, marked by commissioned works of art and buildings. His pageantry, opulent lifestyle and ornate cultivated image earned him enduring admiration. Louis XIV raised France to be the exemplar nation-state of the early modern period, and established a cultural prestige which lasted through the subsequent centuries, and continues today.\nLouis began his personal rule of France in 1661, after the death of his chief minister Cardinal Mazarin, when the King famously declared that he would take over the job himself. [4] An adherent of the divine right of kings, Louis continued his predecessors' work of creating a centralised state governed from the capital. He sought to eliminate the remnants of feudalism persisting in parts of France; by compelling many members of the nobility to reside at his lavish Palace of Versailles, he succeeded in pacifying the aristocracy, many of whom had participated in the Fronde rebellions during his minority. He thus became one of the most powerful French monarchs and consolidated a system of absolute monarchy in France that endured until the French Revolution. Louis also enforced uniformity of religion under the Catholic Church. His revocation of the Edict of Nantes abolished the rights of the Huguenot Protestant minority and subjected them to a wave of dragonnades, effectively forcing Huguenots to emigrate or convert, virtually destroying the French Protestant community.", + "page_start": 0, + "page_end": 0, + "source_file": "wikipedia5.pdf" + }, + { + "text": "Early acts\nPeople in France were complaining about the expansion of royal authority, the high rate of taxation, and the reduction of the authority of the Parlement de Paris and other regional representative entities. Paris erupted in rioting as a result, and Anne was forced, under intense pressure, to free Broussel. Moreover, on the night of 9-10 February 1651, when Louis was twelve, a mob of angry Parisians broke into the royal palace and demanded to see their king. Led into the royal bed-chamber, they gazed upon Louis, who was feigning sleep, were appeased, and then quietly departed. [25] The threat to the royal family prompted Anne to flee Paris with the king and his courtiers.\nShortly thereafter, the conclusion of the Peace of Westphalia allowed Condé's army to return to aid Louis and his court. Condé's family was close to Anne at that time, and he agreed to help her attempt to restore the king's authority. [26] The queen's army, headed by\nBaptismal certificate, 1638\nLouis XIV, then Dauphin of France, in 1642, one year before his accession to the throne, by Philippe de Champaigne\nLouis XIV in 1643, by Claude Deruet\nEurope after the Peace of Westphalia in 1648\nCondé, attacked the rebels in Paris; the rebels were under the political control of Anne's old friend Marie de Rohan. Beaufort, who had escaped from the prison where Anne had incarcerated him five years before, was the military leader in Paris, under the nominal control of Conti. After a few battles, a political compromise was reached; the Peace of Rueil was signed, and the court returned to Paris.", + "page_start": 2, + "page_end": 3, + "source_file": "wikipedia5.pdf" + }, + { + "text": "Further reading\nShennan, J. H. Louis XIV (1993)\nThompson, Ian. The Sun King's Garden: Louis XIV, André Le Nôtre And the Creation of the Gardens of Versailles . London: Bloomsbury Publishing, 2006 ISBN 1-5823-4631-3\nTreasure, Geoffrey. The Making of Modern Europe, 1648-1780 (3rd ed. 2003). pp. 230-296.\nWilkinson, Rich. Louis XIV (Routledge, 2007). ISBN 978-0-4153-5815-6\nCénat, Jean-Philippe. Le roi stratège: Louis XIV et la direction de la guerre, 1661-1715 (Presses universitaires de Rennes, 2019).\nCroix, Alain. \"Vingt millions de Français et Louis XIV.\" Revue dhistoire moderne contemporaine 2 (2020): 27-46.\nEngerand, Fernand, editor (1899). (in French) Inventaire des tableaux du Roy rédigé en 1709 et 1710 par Nicolas Bailly . Paris: Ernest Leroux. Copy (http://gallica.bnf.fr/ark:/12148/bpt6k6323734m/f11.image) Archived (https://we b.archive.org/web/20160307153902/http://gallica.bnf.fr/ark:/12148/bpt6k6323734m/f11.image) 7 March 2016 at the Wayback Machine at Gallica.", + "page_start": 33, + "page_end": 33, + "source_file": "wikipedia5.pdf" + }, + { + "text": "Image and depiction\nFew rulers in world history have commemorated themselves in as grand a manner as Louis. [114] He cultivated his image as the Sun King ( le Roi Soleil ), the centre of the universe \"without equal\". Louis used court ritual and the arts to validate and augment his control over France. With his support, Colbert established from the beginning of Louis's personal reign a centralised and institutionalised system for creating and perpetuating the royal image. The King was thus portrayed largely in majesty or at war, notably against Spain. This portrayal of the monarch was to be found in numerous media of artistic expression, such as painting, sculpture, theatre, dance, music, and the almanacs that diffused royal propaganda to the population at large.", + "page_start": 16, + "page_end": 16, + "source_file": "wikipedia5.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia5.pdf", + "query": "What was one of Louis XIV's most ill-famed decrees?", + "target_page": 6, + "target_passage": "One of Louis's more infamous decrees was the Grande Ordonnance sur les Colonies of 1685, the Code Noir (black code)", + "chunk_present": { + "presence": true, + "index": 5 + } + }, + "top_chunk": [ + { + "text": "Quotes\nNumerous quotes have been attributed to Louis XIV by legend.\nThe well-known \"I am the state\" ( \"L'État, c'est moi.\" ) was reported from at least the late 18th century. [143] It was widely repeated but also denounced as apocryphal by the early 19th century. [144][b][145]\nHe did say, \"Every time I appoint someone to a vacant position, I make a hundred unhappy and one ungrateful.\" [146][147] Louis is recorded by numerous eyewitnesses as having said on his deathbed: \" Je m'en vais, mais l'État demeurera toujours. \" (\"I depart, but the State shall always remain.\") [148]", + "page_start": 21, + "page_end": 22, + "source_file": "wikipedia5.pdf" + }, + { + "text": "Louis XIV\nLouis XIV (Louis-Dieudonné; 5 September 1638 - 1 September 1715), also known as Louis the Great ( Louis le Grand ) or the Sun King ( le Roi Soleil ), was King of France from 1643 until his death in 1715. His verified reign of 72 years and 110 days is the longest of any sovereign. [1][a] An emblematic character of the Age of Absolutism in Europe, [3] Louis XIV's legacy is widely characterized by French colonial expansion, the conclusion of Eighty Years' War involving the Habsburgs, and his architectural bequest, marked by commissioned works of art and buildings. His pageantry, opulent lifestyle and ornate cultivated image earned him enduring admiration. Louis XIV raised France to be the exemplar nation-state of the early modern period, and established a cultural prestige which lasted through the subsequent centuries, and continues today.\nLouis began his personal rule of France in 1661, after the death of his chief minister Cardinal Mazarin, when the King famously declared that he would take over the job himself. [4] An adherent of the divine right of kings, Louis continued his predecessors' work of creating a centralised state governed from the capital. He sought to eliminate the remnants of feudalism persisting in parts of France; by compelling many members of the nobility to reside at his lavish Palace of Versailles, he succeeded in pacifying the aristocracy, many of whom had participated in the Fronde rebellions during his minority. He thus became one of the most powerful French monarchs and consolidated a system of absolute monarchy in France that endured until the French Revolution. Louis also enforced uniformity of religion under the Catholic Church. His revocation of the Edict of Nantes abolished the rights of the Huguenot Protestant minority and subjected them to a wave of dragonnades, effectively forcing Huguenots to emigrate or convert, virtually destroying the French Protestant community.", + "page_start": 0, + "page_end": 0, + "source_file": "wikipedia5.pdf" + }, + { + "text": "See also\nCharles de Lorme, personal medical doctor to Louis XIV\nFundamental laws of the Kingdom of France\nHouse of France\nLevée (ceremony)\nList of French monarchs\nOutline of France\nLouis XIV style\nNicolas Fouquet\nFrench forestry Ordinance of 1669\nPotager du Roi\nÉléphante de Louis XIV", + "page_start": 25, + "page_end": 26, + "source_file": "wikipedia5.pdf" + }, + { + "text": "Health and death\nCardinal Armand Gaston Maximilien de Rohan gave Last Rites (confession, viaticum, and unction) to king Louis XIV. [128]", + "page_start": 19, + "page_end": 19, + "source_file": "wikipedia5.pdf" + }, + { + "text": "Arms\nCoat of arms of Louis XIV", + "page_start": 22, + "page_end": 22, + "source_file": "wikipedia5.pdf" + }, + { + "text": "Relations with the major colonies\nLouis's legal reforms were enacted in his numerous Great Ordinances. Prior to that, France was a patchwork of legal systems, with as many traditional legal regimes as there were provinces, and two co-existing legal systems-customary law in the north and Roman civil law in the south. [36] The Grande Ordonnance de Procédure Civile of 1667, the Code Louis , was a comprehensive legal code imposing a uniform regulation of civil procedure throughout the kingdom. Among other things, it prescribed baptismal, marriage and death records in the state's registers, not the church's, and it strictly regulated the right of the Parlements to remonstrate. [37] The Code Louis later became the basis for the Napoleonic code, which in turn inspired many modern legal codes.\nOne of Louis's more infamous decrees was the Grande Ordonnance sur les Colonies of 1685, the Code Noir (black code). Although it sanctioned slavery, it attempted to humanise the practice by prohibiting the separation of families. Additionally, in the colonies, only Roman Catholics could own slaves, and these had to be baptised.\nLouis ruled through a number of councils:\nConseil d'en haut (\"High Council\", concerning the most important matters of state)-composed of the king, the crown prince, the controller-general of finances, and the secretaries of state in charge of various departments. The members of that council were called ministers of state.\nLouis and his family portrayed as Roman gods in a 1670 painting by Jean Nocret. L to R: Louis's aunt, Henriette-Marie; his brother, Philippe, duc d'Orléans; the Duke's daughter, Marie Louise d'Orléans, and wife, Henriette-Anne Stuart; the Queen-mother, Anne of Austria; three daughters of Gaston d'Orléans; Louis XIV; the Dauphin Louis; Queen Marie-Thérèse; la Grande Mademoiselle .\nConseil des dépêches (\"Council of Messages\", concerning notices and administrative reports from the provinces).\nConseil de Conscience (\"Council of Conscience\", concerning religious affairs and episcopal appointments).\nConseil royal des finances (\"Royal Council of Finances\") headed by the \"chef du conseil des finances\" (an honorary post in most cases)-this was one of the few posts in the council available to the high aristocracy. [38]", + "page_start": 5, + "page_end": 5, + "source_file": "wikipedia5.pdf" + }, + { + "text": "Coming of age and early reforms\nLouis XIV was declared to have reached the age of majority on the 7th of September 1651. On the death of Mazarin, in March 1661, Louis personally took the reins of government and astonished his court by declaring that he would rule without a chief minister: \"Up to this moment I have been pleased to entrust the government of my affairs to the late Cardinal. It is now time that I govern them myself. You [secretaries and ministers] will assist me with your counsels when I ask for them. I request and order you to seal no orders except by my command . . . I order you not to sign anything, not even a passport . . . without my command; to render account to me personally each day and to favor no one\". [33] Capitalizing on the widespread public yearning for peace and order after decades of foreign and civil strife, the young king consolidated central political authority at the expense of the feudal aristocracy. Praising his ability to choose and encourage men of talent, the historian Chateaubriand noted: \"it is the voice of genius of all kinds which sounds from the tomb of Louis\". [34]\nLouis began his personal reign with administrative and fiscal reforms. In 1661, the treasury verged on bankruptcy. To rectify the situation, Louis chose Jean-Baptiste Colbert as Controller-General of Finances in 1665. However, Louis first had to neutralize Nicolas Fouquet, the powerful Superintendent of Finances. Although Fouquet's financial indiscretions were not very different from Mazarin's before him or Colbert's after him, his ambition worried Louis. He lavishly entertained the king at the opulent château of Vaux-le-\nRoyal Monogram\nVicomte, flaunting a wealth which could hardly have accumulated except through embezzlement of government funds.\nFouquet appeared eager to succeed Mazarin and Richelieu in power, and he indiscreetly purchased and privately fortified the remote island of Belle Île. These acts sealed his doom. Fouquet was charged with embezzlement; the Parlement found him guilty and sentenced him to exile; and finally Louis altered the sentence to life imprisonment.", + "page_start": 4, + "page_end": 4, + "source_file": "wikipedia5.pdf" + }, + { + "text": "Issue\nThis is an incomplete list of Louis XIV's illegitimate children. He reputedly had more, but the difficulty in fully documenting all such births restricts the list only to the better-known and/or legitimised.", + "page_start": 24, + "page_end": 24, + "source_file": "wikipedia5.pdf" + }, + { + "text": "Reputation\nAccording to Philippe de Courcillon's Journal , Louis on his deathbed advised his heir with these words:\nDo not follow the bad example which I have set you; I have often undertaken war too lightly and have sustained it for vanity. Do not imitate me, but be a peaceful prince, and may you apply yourself principally to the alleviation of the burdens of your subjects. [132]\nSome historians point out that it was a customary demonstration of piety in those days to exaggerate one's sins. Thus they do not place much emphasis on Louis's deathbed declarations in assessing his accomplishments. Rather, they focus on military and diplomatic successes, such as how he placed a French prince on the Spanish throne. This, they contend, ended the threat of an aggressive Spain that historically interfered in domestic French politics. These historians also emphasise the effect of Louis's wars in expanding France's boundaries and creating more defensible frontiers that preserved France from invasion until the Revolution. [132]\nArguably, Louis also applied himself indirectly to \"the alleviation of the burdens of [his] subjects.\" For example, he patronised the arts, encouraged industry, fostered trade and commerce, and sponsored the founding of an overseas empire. Moreover, the significant reduction in civil wars and aristocratic rebellions during his reign are seen by these\nTerritorial expansion of France under Louis XIV (1643-1715) is depicted in orange.\nhistorians as the result of Louis's consolidation of royal authority over feudal elites. In their analysis, his early reforms centralised France and marked the birth of the modern French state. They regard the political and military victories as well as numerous cultural achievements as how Louis helped raise France to a preeminent position in Europe. [133] Europe came to admire France for its military and cultural successes, power, and sophistication. Europeans generally began to emulate French manners, values, goods, and deportment. French became the universal language of the European elite.\nLouis's detractors have argued that his considerable foreign, military and domestic expenditure impoverished and bankrupted France. His supporters, however, distinguish the state, which was impoverished, from France, which was not. As supporting evidence, they cite the literature of the time, such as the social commentary in Montesquieu's Persian Letters . [134]", + "page_start": 20, + "page_end": 20, + "source_file": "wikipedia5.pdf" + }, + { + "text": "Louis XIV\nDuring Louis's long reign, France emerged as the leading European power and regularly made war. A conflict with Spain marked his entire childhood, while during his personal rule, Louis fought three major continental conflicts, each against powerful foreign alliances: the Franco-Dutch War, the Nine Years' War, and the War of the Spanish Succession. In addition, France contested shorter wars such as the War of Devolution and the War of the Reunions. Warfare defined Louis's foreign policy, impelled by his personal ambition for glory and power: \"a mix of commerce, revenge, and pique\". [5] His wars strained France's resources to the utmost, while in peacetime he concentrated on preparing for the next war. He taught his diplomats that their job was to create tactical and strategic advantages for the French military. [6] Upon his death in 1715, Louis XIV left his great-grandson and successor, Louis XV, a powerful but war-weary kingdom, in major debt after the War of the Spanish Succession that had raged on since 1701.\nSome of his other notable achievements include the construction of the Canal du Midi, the patronage of artists, and the founding of the French Academy of Sciences.\nPortrait by Hyacinthe Rigaud , 1701\nKing of France (more...)\nReign\n14 May 1643 - 1 September\n1715\nCoronation\n7 June 1654\nReims Cathedral\nPredecessor\nLouis XIII\nSuccessor\nLouis XV\nRegent\nAnne of Austria (1643-1651)\nChief ministers See list\nCardinal Mazarin (1643-1661)\nJean-Baptiste Colbert (1661-1683)\nThe Marquis of Louvois (1683-1691)\nBorn\n5 September 1638\nChâteau de Saint-Germain- en-Laye, Saint-Germain-en- Laye, France\nDied\n1 September 1715 (aged 76) Palace of Versailles, Versailles, France\nBurial\n9 September 1715 Basilica of Saint-Denis\nSpouses\nMaria Theresa of Spain (m. 1660; died 1683)\nFrançoise d'Aubigné, Marquise de Maintenon (private) (m. 1683)", + "page_start": 0, + "page_end": 0, + "source_file": "wikipedia5.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia5.pdf", + "query": "What did Louis XIV do to avoid the Spanish War of Succession in 1698?", + "target_page": 13, + "target_passage": "In an attempt to avoid war, Louis signed the Treaty of the Hague with William III of England in 1698. This agreement divided Spain's Italian territories between Louis's son le Grand Dauphin and Archduke Charles, with the rest of the empire awarded to Joseph Ferdinand.", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "Louis XIV\nDuring Louis's long reign, France emerged as the leading European power and regularly made war. A conflict with Spain marked his entire childhood, while during his personal rule, Louis fought three major continental conflicts, each against powerful foreign alliances: the Franco-Dutch War, the Nine Years' War, and the War of the Spanish Succession. In addition, France contested shorter wars such as the War of Devolution and the War of the Reunions. Warfare defined Louis's foreign policy, impelled by his personal ambition for glory and power: \"a mix of commerce, revenge, and pique\". [5] His wars strained France's resources to the utmost, while in peacetime he concentrated on preparing for the next war. He taught his diplomats that their job was to create tactical and strategic advantages for the French military. [6] Upon his death in 1715, Louis XIV left his great-grandson and successor, Louis XV, a powerful but war-weary kingdom, in major debt after the War of the Spanish Succession that had raged on since 1701.\nSome of his other notable achievements include the construction of the Canal du Midi, the patronage of artists, and the founding of the French Academy of Sciences.\nPortrait by Hyacinthe Rigaud , 1701\nKing of France (more...)\nReign\n14 May 1643 - 1 September\n1715\nCoronation\n7 June 1654\nReims Cathedral\nPredecessor\nLouis XIII\nSuccessor\nLouis XV\nRegent\nAnne of Austria (1643-1651)\nChief ministers See list\nCardinal Mazarin (1643-1661)\nJean-Baptiste Colbert (1661-1683)\nThe Marquis of Louvois (1683-1691)\nBorn\n5 September 1638\nChâteau de Saint-Germain- en-Laye, Saint-Germain-en- Laye, France\nDied\n1 September 1715 (aged 76) Palace of Versailles, Versailles, France\nBurial\n9 September 1715 Basilica of Saint-Denis\nSpouses\nMaria Theresa of Spain (m. 1660; died 1683)\nFrançoise d'Aubigné, Marquise de Maintenon (private) (m. 1683)", + "page_start": 0, + "page_end": 0, + "source_file": "wikipedia5.pdf" + }, + { + "text": "Causes and build-up to the war\nBy the time of the Peace of Ryswick, the Spanish succession had been a source of concern to European leaders for well over forty years. King Charles II ruled a vast empire comprising Spain, Naples, Sicily, Milan, the Spanish Netherlands, and numerous Spanish colonies. He produced no children, however, and consequently had no direct heirs.\nThe principal claimants to the throne of Spain belonged to the ruling families of France and Austria. The French claim derived from Louis XIV's mother Anne of Austria (the older sister of Philip IV of Spain) and his wife Maria Theresa (Philip IV's eldest daughter). Based on the laws of primogeniture, France had the better claim as it originated from the eldest daughters in two generations. However, their renunciation of succession rights complicated matters. In the case of Maria Theresa, nonetheless, the renunciation was considered null and void owing to Spain's breach of her marriage contract with Louis. In contrast, no renunciations tainted the claims of Emperor Leopold I's son Charles, Archduke of Austria, who was a grandson of Philip III's youngest daughter Maria Anna. The English and Dutch feared that a French or Austrian-born Spanish king would threaten the balance of power and thus preferred the Bavarian Prince Joseph Ferdinand, a grandson of Leopold I through his first wife Margaret Theresa of Spain (the younger daughter of Philip IV).\nIn an attempt to avoid war, Louis signed the Treaty of the Hague with William III of England in 1698. This agreement divided Spain's Italian territories between Louis's son le Grand Dauphin and Archduke Charles, with the rest of the empire awarded to Joseph Ferdinand. William III consented to permitting the Dauphin's new territories to become part of France when the latter\nPhilip V of Spain\nsucceeded to his father's throne. [90] The signatories, however, omitted to consult the ruler of these lands, and Charles II was passionately opposed to the dismemberment of his empire. In 1699, he re-confirmed his 1693 will that named Joseph Ferdinand as his sole successor. [91]", + "page_start": 12, + "page_end": 13, + "source_file": "wikipedia5.pdf" + }, + { + "text": "Causes and conduct of the war\nAlthough an attempt to restore James II failed at the Battle of the Boyne in 1690, France accumulated a string of victories from Flanders in the north, Germany in the east, and Italy and Spain in the south, to the high seas and the colonies. Louis personally supervised the captures of Mons in 1691 and Namur in 1692. Luxembourg gave France the defensive line of the Sambre by capturing Charleroi in 1693. France also overran most of the Duchy of Savoy after the battles of Marsaglia and Staffarde in 1693. While naval stalemate ensued after the French victory at the Battle of Beachy Head in 1690 and the Allied victory at Barfleur-La Hougue in 1692, the Battle of Torroella in 1694 exposed Catalonia to French invasion, culminating in the capture of Barcelona.\nThe Dutch captured Pondichéry in 1693, but a 1697 French raid on the Spanish treasure port of Cartagena, Spain, yielded a fortune of 10,000,000 livres.\nIn July 1695, the city of Namur, occupied for three years by the French, was besieged by an allied army led by William III. Louis XIV ordered the surprise destruction of a Flemish city to divert the attention of these troops. This led to the bombardment of Brussels, in which more than 4,000 buildings were destroyed, including the entire city centre. The strategy failed, as Namur fell three weeks later, but harmed Louis XIV's reputation: a century later, Napoleon deemed the bombardment \"as barbarous as it was useless\". [85]\nPeace was broached by Sweden in 1690. By 1692, both sides evidently wanted peace, and secret bilateral talks began, but to no avail. [86] Louis tried to break up the alliance against him by dealing with individual opponents but did not achieve his aim until 1696 when the Savoyards agreed to the Treaty of Turin and switched sides. Thereafter, members of the League of Augsburg rushed to the peace table, and negotiations for a general peace began in earnest, culminating in the Peace of Ryswick of 1697. [87]\nMarshal de Luxembourg", + "page_start": 11, + "page_end": 12, + "source_file": "wikipedia5.pdf" + }, + { + "text": "Acceptance of the will of Charles II and consequences\nOn his deathbed in 1700, Charles II of Spain unexpectedly changed his will. The clear demonstration of French military superiority for many decades before this time, the pro-French faction at the court of Spain, and even Pope\nInnocent XII convinced him that France was more likely to preserve his empire intact. He thus offered the entire empire to the Dauphin's second son Philip, Duke of Anjou, provided it remained undivided. Anjou was not in the direct line of French succession, thus his accession would not cause a Franco-Spanish union. [92] If Anjou refused, the throne would be offered to his younger brother Charles, Duke of Berry. If the Duke of Berry declined it, it would go to Archduke Charles, then to the distantly related House of Savoy if Charles declined it. [93]\nLouis was confronted with a difficult choice. He could agree to a partition of the Spanish possessions and avoid a general war, or accept Charles II's will and alienate much of Europe. He may initially have been inclined to abide by the partition treaties, but the Dauphin's insistence persuaded him otherwise. [94] Moreover, Louis's foreign minister, Jean-Baptiste Colbert, marquis de Torcy, pointed out that war with the Emperor would almost certainly ensue whether Louis accepted the partition treaties or Charles II's will. He emphasised that, should it come to war, William III was unlikely to stand by France since\nLouis in 1701\nhe \"made a treaty to avoid war and did not intend to go to war to implement the treaty\". [91] Indeed, in the event of war, it might be preferable to be already in control of the disputed lands. Eventually, therefore, Louis decided to accept Charles II's will. Philip, Duke of Anjou, thus became Philip V, King of Spain.", + "page_start": 13, + "page_end": 13, + "source_file": "wikipedia5.pdf" + }, + { + "text": "Causes and conduct of the war\nThe Nine Years' War, which lasted from 1688 to 1697, initiated a period of decline in Louis's political and diplomatic fortunes. It arose from two events in the Rhineland. First, in 1685, the Elector Palatine Charles II died. All that remained of his immediate family was Louis's sister-in-law, Elizabeth Charlotte. German law ostensibly barred her from succeeding to her brother's lands and electoral dignity, but it was unclear enough for arguments in favour of Elizabeth Charlotte to have a chance of success. Conversely, the princess was demonstrably entitled to a division of the family's personal property. Louis pressed her claims to land and chattels, hoping the latter, at least, would be given to her. [76] Then, in 1688, Maximilian Henry of Bavaria, Archbishop of Cologne, an ally of France, died. The archbishopric had traditionally been held by the Wittelsbachs of Bavaria, but the Bavarian claimant to replace Maximilian Henry, Prince Joseph Clemens of Bavaria, was at that time not more than 17 years old and not even ordained. Louis sought instead to install his own candidate, Wilhelm Egon von Fürstenberg, to ensure the key Rhenish state remained an ally. [77]\nIn light of his foreign and domestic policies during the early 1680s, which were perceived as aggressive, Louis's actions, fostered by the succession crises of the late 1680s, created concern and alarm in much of Europe. This led to the formation of the 1686 League of Augsburg by the Holy Roman Emperor, Spain, Sweden, Saxony, and Bavaria. Their stated intention was to return France to at least the borders agreed to in the Treaty of Nijmegen. [78] Emperor Leopold I's persistent refusal to convert the Truce of Ratisbon into a permanent treaty fed Louis's fears that the Emperor would turn on France and attack the Reunions after settling his affairs in the Balkans. [79]\nAnother event Louis found threatening was England's Glorious Revolution of 1688. Although King James II was Catholic, his two Anglican daughters, Mary and Anne, ensured the English people a Protestant succession. But when James II's son James Francis Edward Stuart was born, he took precedence in succession over his sisters. This seemed to herald an era of Catholic monarchs in England. Protestant lords called on the Dutch Prince\nBattle of Fleurus, 1690\nLouis in 1690", + "page_start": 11, + "page_end": 11, + "source_file": "wikipedia5.pdf" + }, + { + "text": "Causes and conduct of the war\nWilliam III of Orange, grandson of Charles I of England, to come to their aid. He sailed for England with troops despite Louis's warning that France would regard it as a provocation. Witnessing numerous desertions and defections, even among those closest to him, James II fled England. Parliament declared the throne vacant, and offered it to James's daughter Mary II and his son-inlaw and nephew William. Vehemently anti-French, William (now William III of England) pushed his new kingdoms into war, thus transforming the League of Augsburg into the Grand Alliance. Before this happened, Louis expected William's expedition to England to absorb his energies and those of his allies, so he dispatched troops to the Rhineland after the expiry of his ultimatum to the German princes requiring confirmation of the Truce of Ratisbon and acceptance of his demands about the succession crises. This military manoeuvre was also intended to protect his eastern provinces from Imperial invasion by depriving the enemy army of sustenance, thus explaining the preemptive scorched earth policy pursued in much of southwestern Germany (the \"Devastation of the Palatinate\"). [80]\nLouis XIV at the siege of Namur (1692)\nFrench armies were generally victorious throughout the war because of Imperial commitments in the Balkans, French logistical superiority, and the quality of French generals such as Condé's famous pupil, François Henri de Montmorency-Bouteville, duc de Luxembourg. [81] He triumphed at the Battles of Fleurus in 1690, Steenkerque in 1692, and Landen in 1693, although, the battles proved to be of little of strategic consequence, [82][83] mostly due to the nature of late 17th-century warfare. [84]", + "page_start": 11, + "page_end": 11, + "source_file": "wikipedia5.pdf" + }, + { + "text": "Spain\nThe death of Louis's maternal uncle King Philip IV of Spain in 1665 precipitated the War of Devolution. In 1660, Louis had married Philip IV's eldest daughter, Maria Theresa, as one of the provisions of the 1659 Treaty of the Pyrenees. [39] The marriage treaty specified that Maria Theresa was to renounce all claims to Spanish territory for herself and all her descendants. [39] Mazarin\nLouis XIV in 1670, engraved portrait by Robert Nanteuil\nand Lionne, however, made the renunciation conditional on the full payment of a Spanish dowry of 500,000 écus. [40] The dowry was never paid and would later play a part persuading his maternal first cousin Charles II of Spain to leave his empire to Philip, Duke of Anjou (later Philip V of Spain), the grandson of Louis XIV and Maria Theresa.\nThe War of Devolution did not focus on the payment of the dowry; rather, the lack of payment was what Louis XIV used as a pretext for nullifying Maria Theresa's renunciation of her claims, allowing the land to \"devolve\" to him. In Brabant (the location of the land in dispute), children of first marriages traditionally were not disadvantaged by their parents' remarriages and still inherited property. Louis's wife was Philip IV's daughter by\nhis first marriage, while the new king of Spain, Charles II, was his son by a subsequent marriage. Thus, Brabant allegedly \"devolved\" to Maria Theresa, justifying France to attack the Spanish Netherlands.", + "page_start": 5, + "page_end": 6, + "source_file": "wikipedia5.pdf" + }, + { + "text": "France as the pivot of warfare\nUnder Louis, France was the leading European power, and most wars pivoted around its aggressiveness. No European state exceeded it in population, and no one could match its wealth, central location, and very strong professional army. It had largely avoided the devastation of the Thirty Years' War. Its weaknesses included an inefficient financial system that was hard-pressed to pay for its military adventures, and the tendency of most other powers to gang up against it.\nDuring Louis's reign, France fought three major wars: the Franco-Dutch War, the Nine Years' War, and the War of the Spanish Succession. There were also two lesser conflicts: the War of Devolution and the War of the Reunions. [64] The wars were very expensive but defined Louis XIV's foreign policy, and his personality shaped his approach. Impelled \"by a mix of commerce, revenge, and pique\", Louis sensed that war was the ideal way to enhance his glory. In peacetime, he concentrated on preparing for the next war. He taught his diplomats that their job was to create tactical and strategic advantages for the French military. [6] By 1695, France retained much of its dominance but had lost control of the seas to England and Holland, and most countries, both Protestant and Catholic, were in alliance against it. Sébastien Le Prestre de Vauban, France's leading military strategist, warned Louis in 1689 that a hostile \"Alliance\" was too powerful at sea. He recommended that France fight back by licensing French merchant ships to privateer and seize enemy merchant ships while avoiding its navies:\nLouis XIV\nFrance has its declared enemies Germany and all the states that it embraces; Spain with all its dependencies in Europe, Asia, Africa and America; the Duke of Savoy [in Italy], England, Scotland, Ireland, and all their colonies in the East and West Indies; and Holland with all its possessions in the four corners of the world where it has great establishments. France has ... undeclared enemies, indirectly hostile, hostile, and envious of its greatness, Denmark, Sweden, Poland, Portugal, Venice, Genoa, and part of the Swiss Confederation, all of which states secretly aid France's enemies by the troops that they hire to them, the money they lend them and by protecting and covering their trade. [65]\nVauban was pessimistic about France's so-called friends and allies:", + "page_start": 9, + "page_end": 9, + "source_file": "wikipedia5.pdf" + }, + { + "text": "Louis XIV\nLouis XIV (Louis-Dieudonné; 5 September 1638 - 1 September 1715), also known as Louis the Great ( Louis le Grand ) or the Sun King ( le Roi Soleil ), was King of France from 1643 until his death in 1715. His verified reign of 72 years and 110 days is the longest of any sovereign. [1][a] An emblematic character of the Age of Absolutism in Europe, [3] Louis XIV's legacy is widely characterized by French colonial expansion, the conclusion of Eighty Years' War involving the Habsburgs, and his architectural bequest, marked by commissioned works of art and buildings. His pageantry, opulent lifestyle and ornate cultivated image earned him enduring admiration. Louis XIV raised France to be the exemplar nation-state of the early modern period, and established a cultural prestige which lasted through the subsequent centuries, and continues today.\nLouis began his personal rule of France in 1661, after the death of his chief minister Cardinal Mazarin, when the King famously declared that he would take over the job himself. [4] An adherent of the divine right of kings, Louis continued his predecessors' work of creating a centralised state governed from the capital. He sought to eliminate the remnants of feudalism persisting in parts of France; by compelling many members of the nobility to reside at his lavish Palace of Versailles, he succeeded in pacifying the aristocracy, many of whom had participated in the Fronde rebellions during his minority. He thus became one of the most powerful French monarchs and consolidated a system of absolute monarchy in France that endured until the French Revolution. Louis also enforced uniformity of religion under the Catholic Church. His revocation of the Edict of Nantes abolished the rights of the Huguenot Protestant minority and subjected them to a wave of dragonnades, effectively forcing Huguenots to emigrate or convert, virtually destroying the French Protestant community.", + "page_start": 0, + "page_end": 0, + "source_file": "wikipedia5.pdf" + }, + { + "text": "Acceptance of the will of Charles II and consequences\nMost European rulers accepted Philip as king, some reluctantly. Depending on one's views of the war's inevitability, Louis acted reasonably or arrogantly. [95] He confirmed that Philip V retained his French rights despite his new Spanish position. Admittedly, he may only have been hypothesising a theoretical eventuality and not attempting a Franco-Spanish union. But his actions were certainly not read as disinterested. Moreover, Louis sent troops to the Spanish Netherlands to evict Dutch garrisons and secure Dutch recognition of Philip V. In 1701, Philip transferred the asiento (the right to supply slaves to Spanish colonies) to France, as a sign of the two nations' growing connections. As tensions mounted, Louis decided to acknowledge James Stuart, the son of James II, as King of England, Scotland and Ireland on the latter's death, infuriating William III. These actions enraged Britain and the Dutch Republic. [96] With the Holy Roman Emperor and the petty German states, they formed another Grand Alliance and declared war on France in 1702. French diplomacy secured Bavaria, Portugal, and Savoy as Franco-Spanish allies. [97]", + "page_start": 13, + "page_end": 13, + "source_file": "wikipedia5.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed2.pdf", + "query": "Does nerve transection or crushing affect small afferents within the dorsal root ganglion in the same way?", + "target_page": 5, + "target_passage": "Both SNItrans (Fig. 2C) and SNIcrush (Fig. 2D) injuries resulted in a rightward shift in population distributions of the cross-sectional area of nucleated, FB-labelled DRG neurons when compared with contralateral DRG, consistent with a loss of small afferents post–nerve injury.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "3.1. Peripheral nerve injury induces a loss of small neurons from the dorsal root ganglion\nSNItrans resulted in a mixed population of axotomized and intact afferents within the L4 DRG. Therefore, we developed an approach to restrict our analysis to axotomized afferents, without relying on transgenic labelling, and used this as a complementary approach to confirm our findings. We injected the neuronal tracer FB into the glabrous, tibial innervation territory of both hindpaws 1 week before common peroneal and tibial transection (SNItrans) or crush (SNIcrush) surgeries ( Figs. 2A and B ). FastBlue-uptake was complete across neurons of all sizes by 1 week (Fig. S3, http://links.lww.com/PAIN/ C84), so this approach allowed us to profile a sample of the axotomized afferents. Both SNItrans ( Fig. 2C ) and SNIcrush ( Fig. 2D ) injuries resulted in a rightward shift in population distributions of the cross-sectional area of nucleated, FB-labelled DRG neurons when compared with contralateral DRG, consistent with a loss of small afferents post-nerve injury.\nAs a third complementary approach, we applied semiautomated volumetric analyses of nuclei size following tissue clearing. In this study, whole DRGs were cleared 4 weeks after SNItrans for nuclei counting in 'complete' tissue ( Figs. 2E-H ). Nuclei were labelled by TDP-43, in line with the study by West et al., 67 and were quantified using Imaris software ( Fig. 2F , Video 1). We observed a slight but significant rightward shift in nuclear spot volume population distribution 4 weeks after SNItrans ( Fig. 2G ). In addition, there was a significant reduction in the number of small but not medium or large nuclear spots, in support of a loss of small-diameter neuron populations ( Fig. 2H ).\nTogether, our data derived from several different experimental approaches show that a population of small-diameter afferents are lost following peripheral nerve injury.", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed2.pdf" + }, + { + "text": "3.1. Peripheral nerve injury induces a loss of small neurons from the dorsal root ganglion\nobserved 7809 6 153 neurons per DRG; this was not significantly different to the number of neurons in the contralateral DRG (7917 6 349), whereas cell number approximately halved by 8 weeks postinjury to 3963 6 410 neurons per DRG ( Fig. 1C ). Separating analysis into intact vs axotomized afferents revealed that only axotomized afferents were lost, with no difference observed in numbers of intact afferents ( Fig. 1D ). Between 1 and 8 weeks after injury, we observed a 61.0 6 7.0% decrease in the number of GFP 1 neurons. This loss of injured afferents resulted in a loss of neuron-containing (ie, excluding white matter regions) DRG volume ( Fig. 1E ), but not neuron density ( Fig. 1F ). Cell loss predominantly occurred between 1 and 2 weeks postinjury and stabilized after this timepoint. Population distributions of the cross-sectional area of nucleated, tdTomato-expressing cell profiles were not significantly different at 1 vs 8 weeks postSNItrans, in contrast to GFP-expressing/injured afferents, in which a loss of a population of small afferents at 8 weeks postinjury was observed ( Fig. 1G ).", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed2.pdf" + }, + { + "text": "3.2. Spared nerve crush or transection results in death of Mrgprd-expressing neurons\nFigure 1. SNItrans induces death of small primary afferent neurons, accompanied by a reduction in volume, not cell density, of the dorsal root ganglion. (A) Approach to differentially labelled intact afferents with tdTomato and damaged afferents with GFP after peripheral nerve injury using the Avil FlpO ;Atf3 CreERT2 ;RC:: FLTGmouseline and schematic of experimental timeline. (B) Representative image of GFP, tdTomato, and NeuN expression in an L4 DRG, 2 weeks after SNItrans. Scale bars 5 100 m m. (C and D) Stereological quantification of the total number of DRG neurons (C) or number of axotomized and intact neurons (D) in the L4 DRG 1, 2, 4, and 8 weeks after SNItrans or contralateral (contra) to injury. (C) One-way ANOVA with Tukey posttests; F 4,10 5 37.98, P , 0.001. (D) Two-way RM ANOVA; Timepoint 3 Color interaction F 4,10 5 39.04, P , 0.001, n 5 3 mice; Tukey posttests (between injured groups): † P , 0.05 vs contra, ‡ P , 0.05 vs 1-week. (E) Volume of DRG-containing cells (ie, excluding white matter tracts) following SNItrans. One-way ANOVA with Tukey posttests; F 4,10 5 21.25, P , 0.001, n 5 3. (F) Neuronal density within the DRG following SNItrans. One-way ANOVA; F 4,10 5 2.77, P 5 0.09, n 5 3. (G) Population distribution of uninjured and injured afferents by cross-sectional area, 1 and 8 weeks post-SNItrans. Kolmogorov-Smirnov tests of cumulative distributions; Uninjured: D 5 0.08, P 5 0.18; Injured: D 5 0.32, P , 0.001; n 5 310 to 427 neurons from 3 mice. * P , 0.05, ** P , 0.01, ***", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed2.pdf" + }, + { + "text": "3.2. Spared nerve crush or transection results in death of Mrgprd-expressing neurons\nFigure 2. Spared nerve crush and transection lead to a loss of small DRG neurons. (A) Approach to restrict analysis to damaged afferents: a subcutaneous injection of the tracer FB into both hindpaws labelled tibial afferents, before unilateral SNItrans or SNIcrush surgery. (B) Representative image of FB labelling and NeuN immunostaining in the L4 DRG. The image is a projection of optical sections at 3m mintervals through the entirety of a 30m m-thick tissue section. Scale bar 5 100 m m. (C and D) Quantification of the cross-sectional area of FastBlue labelled DRG neurons ipsilateral and contralateral to SNItrans (C) or SNIcrush injury (D) reveals a loss of small afferents and subsequent shift in population distribution. Kolmogorov-Smirnov tests of cumulative distributions; SNItrans: D 5 0.25, P , 0.001; n 5 183 or 191 neurons from 3 mice; SNIcrush: D 5 0.22, P , 0.001, n 5 319 or 325 neurons from 3 mice. (E) Experimental approach for whole DRG volumetric analyses after SNItrans. (F) Representative 3D rendering of TDP-43 profiles and corresponding nuclear spot profiles following Imaris-based spot detection feature. Scale bar 5 100 m m. (G) Quantification of DRG nuclear spot volume ipsilateral and contralateral to SNItrans. Kolmogorov-Smirnov tests of cumulative distribution: D 5 0.06, P , 0.001, n 5 30,206 (contra) or 32,544 (ipsi) nuclei from 4 (contra) or 5 (ipsi) mice. (H) Total number of nuclear spots, by size, per DRG. Two-way RM ANOVA; size bin 3 injury interaction: F 2,14 5 8.26, P 5 0.004; n 5 4 to 5 mice; ˇ S'ıd 'ak multiple comparisons tests: ** P , 0.01. ANOVA, analysis of variance; DRG, dorsal root ganglion; FB, FastBlue; RM, repeated measures.", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed2.pdf" + }, + { + "text": "4.3. Implications for pain pathogenesis\nThere are many anatomical sites within the somatosensory nervous system where differential loss of sensory neuron populations could impact neurobiology. For example, loss of cutaneous afferents may afford more opportunity for plasticity in reinnervation patterns, such as collateral sprouting of uninjured or surviving afferents, and the types of nerve endings made by different molecular subpopulations. 17,27 It also seems likely that the death of many neurons within a DRG could contribute to the expansion and activation of immune cell types, which are known to play a major role in neuropathic pain. 30,69 Finally, under normal conditions, peripheral sensory input is integrated into the dorsal horn of the spinal cord by complex interneuron circuitry. Many spinal circuits are engaged by convergent input from different afferent types. 9,41,70 Therefore, selective loss of input from discrete afferent types could undoubtedly impact the normal processing of remaining afferent signals. 34 Experimentally abrogating neuronal loss may be a fruitful approach to assess the contribution to nervous system plasticity (adaptive or maladaptive) following injury. In this regard, our in vitro readout would be a useful experimental\nPAIN ®\nplatform to help delineate the precise cell death pathways and signaling cascades engaged (which could then be experimentally manipulated). Such studies should consider that plasticity may evolve over time. The loss of IB4 1 central terminals is transient following crush and has even been observed to reverse at longer timepoints following SNItrans. 36 These observations, in conjunction with ours of loss of neurons, raise the intriguing question of the source of such central reinnervation.", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed2.pdf" + }, + { + "text": "4. Discussion\nWe present data herein to support the hypothesis that traumatic nerve injury in rodents leads to a profound loss of small-diameter DRG neurons. Taking advantage of newly\nPAIN ®\ndeveloped transgenic recombinase driver lines, we have shown that loss is biased across molecularly defined subpopulations. Nonpeptidergic nociceptive neurons are particularly susceptible to loss, with almost all Mrgprd 1 axotomized afferents lost following an unrepaired transection injury (SNItrans) and roughly half lost following a model which contrastingly allows for nerve regenerations (SNIcrush). Finally, we have observed that the vulnerability of Mrgprd 1 neurons extends to the in vitro setting and provide data to support the hypothesis that loss is driven by a lack of neurotrophic support following injury.", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed2.pdf" + }, + { + "text": "3.3. Spared nerve injury induces a loss of Trpm8 1 and calcitonin gene-related peptide 1 but not myelinated dorsal root ganglion neurons\nFigure 3. Spared nerve crush or transection results in death of nonpeptidergic neurons. (A) Schematic of experimental approach for (B and C). (B) MrgD ChR2-YFP L4 DRGs4weeks after SNI, contralateral or ipsilateral to injury. Images are projections of optical sections at 3m mintervals through the entirety of 30m m-thick tissue sections. Scale bars 5 100 m m. (C) Quantification of total number of MrgD-YFP 1 cells per L4 DRG 4 weeks after SNI revealed a significant loss in ipsilateral DRG. Two-way RM ANOVA with ˇ S'ıd 'ak multiple comparisons tests; Side x Treatment interaction: F1,5 5 9.23, P 5 0.029; n 5 3 mice. (D) The experimental approach used to generate data presented in (E-G). (E and F) MrgD-YFP expression and FB labelling in the L4 DRG, 14 days after SNI or crush surgery or contralateral to injury. White boxes represent regions enlarged in (F). Scale bars 5 100 m m(E) or 20 m m(F). (G) The proportion of FB-labelled DRG neurons decreased after spared nerve crush injury, and co-labelling is almost completely absent after SNI. Two-way RM ANOVA with ˇ S'ıd 'ak multiple comparisons tests; side 3 injury interaction: F 1,4 5 7.80, P 5 0.049; n 5 3 mice. Posttests: * P , 0.05, ** P , 0.01. ANOVA, analysis of variance; DRG, dorsal root ganglion; SNI, spared nerve injury; FB, FastBlue; RM, repeated measures.\nDecember 2024 · Volume 165 · Number 12", + "page_start": 7, + "page_end": 8, + "source_file": "pubmed2.pdf" + }, + { + "text": "3.2. Spared nerve crush or transection results in death of Mrgprd-expressing neurons\nTo date, determining cell loss among specific populations of afferent neurons has proved challenging due to the downregulation of subpopulation-specific marker genes following axonal transection. 37,44 To overcome this issue, we took advantage of transgenic strategies to label populations in a manner that persisted after injury. Owing to the bias for the loss of small neurons and the known loss of IB4-binding central terminals postinjury, 36 we initially focused on nonpeptidergic nociceptive neurons. We used MrgD ChR2-YFP mice to identify neurons belonging to the largest of the 3 classes of nonpeptidergic nociceptors, NP1. 55,59 To determine whether these neurons are lost following nerve injury, we used a stereological method to quantify L4 DRG MrgD-YFP 1 (yellow fluorescent\n2868\nA.H. Cooper et al. · 165 (2024) 2863-2876\nPAIN ®", + "page_start": 4, + "page_end": 5, + "source_file": "pubmed2.pdf" + }, + { + "text": "1. Introduction\nDorsal root ganglion (DRG) neurons represent a molecularly and functionally heterogeneous population. Under normal conditions, this diversity contributes to the ability of the somatosensory nervous system to detect a myriad of sensory stimuli that result in the perceptions of touch, temperature, itch, and pain. Following nerve injury, physiological changes in DRG neurons lead to hyperexcitability, 57 which is a key pathological driver of neuropathic pain. 20,63 Concomitant molecular changes in discrete subpopulations also occur, and these have recently been comprehensively described in single-cell 37,44 and subpopulation-specific sequencing studies. 3 These studies describe a transient and generalized reduction in the expression of subpopulation-specific genes following nerve injury. 3,37,44\nIn addition to molecular changes, there is a rich literature describing the frank loss of DRG neurons following traumatic\nSponsorships or competing interests that may be relevant to content are disclosed at the end of this article.\na School of Psychology and Neuroscience, University of Glasgow, Glasgow, United Kingdom, b Nuffield Department of Clinical Neurosciences, University of Oxford, Oxford, United Kingdom\n*Corresponding author. Address: School of Psychology and Neuroscience, University of Glasgow, Glasgow G12 8QQ, United Kingdom. Tel.: 1 44 (0) 141 330 7023. E-mail address: gregory.weir@glasgow.ac.uk (G.A. Weir).\nSupplemental digital content is available for this article. Direct URL citations appear in the printed text and are provided in the HTML and PDF versions of this article on the journal's Web site (www.painjournalonline.com).\nCopyright © 2024 The Author(s). Published by Wolters Kluwer Health, Inc. on behalf of the International Association for the Study of Pain. This is an open access article distributed under the Creative Commons Attribution License 4.0 (CCBY), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.\nhttp://dx.doi.org/10.1097/j.pain.0000000000003321\nDecember 2024 · Volume 165 · Number 12", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed2.pdf" + }, + { + "text": "3.3. Spared nerve injury induces a loss of Trpm8 1 and calcitonin gene-related peptide 1 but not myelinated dorsal root ganglion neurons\nby a population of small-diameter, putative cold-sensitive neurons ( Fig. 4B ), accounting for 8.3 6 0.27% of FB-labelled neurons in contralateral DRG. This decreased to 4.2 6 0.96% ipsilateral to SNItrans injury ( Fig. 4E ), indicating a partial loss of Trpm8 1 afferents. When examining peptidergic afferents, we found that 48.1 6 2.42% of FB-labelled neurons in contralateral DRG were Calca-YFP 1 , compared with 34.3 6 2.54% 4 weeks after SNItrans injury ( Figs. 4C and F ), consistent with a partial loss of CGRP 1 afferents. We used a Thy1-CFP line that demonstrates consistent expression postinjury 61 and labels a sample of medium/large diameter myelinated afferents. CFP was largely restricted to NF200 1 neurons, labelling 56% of this population.\nExpression was present in a heterogenous population of nociceptive (TrkA 1 ) and nonnociceptive (TrkA-) myelinated neurons (Fig. S5, http://links.lww.com/PAIN/C84). Contralateral to injury, 15.6 6 1.8% of FB-labelled neurons expressed Thy1CFP ( Figs. 4D and G ). In contrast to unmyelinated subpopulations, this proportion was higher in ipsilateral DRG following SNItrans (23.3 6 3.2%), consistent with no (or minimal) loss of Thy1-CFP-expressing afferents, accompanied by a loss of Thy1CFP-negative neurons. We did not observe significant alterations in the population distributions of the cross-sectional area of surviving, damaged Trpm8-tdTom 1 , Calca-YFP 1 , or Thy1CFP 1 DRG neurons when compared with DRG contralateral to\nwww.painjournalonline.com\n2871\n2872\nA.H. Cooper et al. · 165 (2024) 2863-2876", + "page_start": 8, + "page_end": 9, + "source_file": "pubmed2.pdf" + } + ] + }, + { + "references": { + "source_file": "legal5_eubiodiversity_cc4.pdf", + "query": "What are the EU's key nature conservation commitments for 2030?", + "target_page": 6, + "target_passage": "1. Legally protect a minimum of 30% of the EU’s land area and 30% of the EU’s sea area and integrate ecological corridors, as part of a true Trans-European Nature Network. 2. Strictly protect at least a third of the EU’s protected areas, including all remaining EU primary and old-growth forests. 3. Effectively manage all protected areas, defining clear conservation objectives and measures, and monitoring them appropriately.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Nature protection: key commitments by 2030\n1. Legally protect a minimum of 30% of the EU's land area and 30% of the EU's sea area and integrate ecological corridors, as part of a true Trans-European Nature Network.\n2. Strictly protect at least a third of the EU's protected areas, including all remaining EU primary and old-growth forests.\n3. Effectively manage all protected areas, defining clear conservation objectives and measures, and monitoring them appropriately.\n27 Guidance on a strategic framework for further supporting the deployment of EU-level green and blue infrastructure (SWD(2019) 193).\n5", + "page_start": 5, + "page_end": 5, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "EU Nature Restoration Plan: key commitments by 2030\n1. Legally binding EU nature restoration targets to be proposed in 2021, subject to an impact assessment. By 2030, significant areas of degraded and carbon-rich ecosystems are restored; habitats and species show no deterioration in conservation trends and status; and at least 30% reach favourable conservation status or at least show a positive trend.\n2. The decline in pollinators is reversed.\n3. The risk and use of chemical pesticides is reduced by 50% and the use of more hazardous pesticides is reduced by 50%.\n4. At least 10% of agricultural area is under high-diversity landscape features.\n5. At least 25% of agricultural land is under organic farming management, and the uptake of agro-ecological practices is significantly increased.\n6. Three billion new trees are planted in the EU, in full respect of ecological principles.\n7. Significant progress has been made in the remediation of contaminated soil sites.\n8. At least 25,000 km of free-flowing rivers are restored.\n54 Sustainable Use of Pesticides Directive (2009/128/EC).\n55 European Strategy for Plastics in a Circular Economy (COM(2018) 28).\n56 A new Circular Economy Action Plan for a cleaner and more competitive Europe (COM(2020) 98).\n57 See for example: Hulme P. (2014). Invasive species challenge the global response to emerging diseases, Trends in parasitology (2014) Vol. 30, Issue 6 ; Duscher et al. (2017).\n58 Regulation (EU) 1143/2014 on invasive alien species.\n59 Red List of the International Union for the Conservation of Nature (IUCN).\n14\n9. There is a 50% reduction in the number of Red List species threatened by invasive alien species.\n10. The losses of nutrients from fertilisers are reduced by 50%, resulting in the reduction ofthe use of fertilisers by at least 20%.\n11. Cities with at least 20,000 inhabitants have an ambitious Urban Greening Plan.\n12. No chemical pesticides are used in sensitive areas such as EU urban green areas.\n13. The negative impacts on sensitive species and habitats, including on the seabed through fishing and extraction activities, are substantially reduced to achieve good environmental status.\n14. The by-catch of species is eliminated or reduced to a level that allows species recovery and conservation.", + "page_start": 14, + "page_end": 15, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "4.1. Raising the level of ambition and commitment worldwide\nProtecting biodiversity is a global challenge and the next decade will be decisive. Global efforts under the United Nations Convention on Biological Diversity have largely been insufficient. Nature cannot afford any half measures or lack of ambition.\nIn this spirit, the EU is ready to lead all efforts - working with like-minded partners in a high-ambition coalition on biodiversity - to agree an ambitious new global framework for post-2020 at the upcoming 15 th Conference of the Parties to the Convention on Biological Diversity.\nWith this strategy, the Commission proposes ambitious commitments for the EU to bring to the table. The EU should also support governments and stakeholders across the globe to significantly step up their ambition and their action.\nThe Commission proposes that the EU ensures that the post-2020 global framework includes, at a minimum, the elements outlined below:\n Overarching global goals for biodiversity for 2050, in line with the United Nations 2030 Agenda for Sustainable Development and the vision of 'living in harmony with nature'. The ambition should be that, by 2050, all of the world's ecosystems are restored, resilient, and adequately protected. The world should commit to the net-gain principle to give nature back more than it takes. The world should commit to no human-induced extinction of species, at minimum where avoidable.\n Ambitious global 2030 targets in line with EU commitments in this strategy. These should clearly address the drivers of biodiversity loss and be specific, measurable, actionable, relevant and time-bound.\n A much stronger implementation, monitoring and review process. Parties should revise their National Biodiversity Strategies and Action Plans by the end of 2021, or as a minimum, submit national commitments for the most important targets. There should be a regular review cycle to look at progress towards the\n76 Green alliances focus on cooperation with African and other partners to implement the European Green Deal.\n19\ntargets, with the ability to ratchet up action if needed. These reviews should be based on an independent, science-based gap-analysis and foresight process, with common headline indicators for all Parties.", + "page_start": 19, + "page_end": 20, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "2.1. A coherent network of protected areas\nStates and the European Environment Agency, will put forward in 2020 criteria and guidance for identifying and designating additional areas, including a definition of strict protection, as well as for appropriate management planning. In doing so, it will indicate how other effective area-based conservation measures and greening of cities could contribute to the targets.\nThe targets relate to the EU as a whole and could be broken down according to the EU bio-geographical regions and sea basins or at a more local level. Every Member State will have to do its fair share of the effort based on objective ecological criteria, recognising that each country has a different quantity and quality of biodiversity. Particular focus will be placed on protecting and restoring the tropical and sub-tropical marine and terrestrial ecosystems in the EU's outermost regions given their exceptionally high biodiversity value.\nIn addition, in order to have a truly coherent and resilient Trans-European Nature Network, it will be important to set up ecological corridors to prevent genetic isolation, allow for species migration, and maintain and enhance healthy ecosystems. In this context, investments in green and blue infrastructure 27 and cooperation across borders among Member States should be promoted and supported, including through the European Territorial Cooperation.\nThe Commission will aim to agree the criteria and guidance for additional designations with Member States by the end of 2021. Member States will then have until the end of 2023 to demonstrate significant progress in legally designating new protected areas and integrating ecological corridors. On this basis, the Commission will assess by 2024 whether the EU is on track to meet its 2030 targets or whether stronger actions, including EU legislation, are needed.\nFinally, the Overseas Countries and Territories also host important biodiversity hotspots, not governed by EU environmental rules. The Commission encourages relevant Member States to consider promoting equal or equivalent rules in these countries and territories.", + "page_start": 5, + "page_end": 5, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "2. PROTECTING AND RESTORING NATURE IN THE EUROPEAN UNION\nThe EU has legal frameworks, strategies and action plans to protect nature and restore habitats and species. But protection has been incomplete, restoration has been smallscale, and the implementation and enforcement of legislation has been insufficient 17 .\nTo put biodiversity on the path to recovery by 2030, we need to step up the protection and restoration of nature. This should be done by improving and widening our network of protected areas and by developing an ambitious EU Nature Restoration Plan .", + "page_start": 3, + "page_end": 3, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "5. CONCLUSION\nProtecting and restoring biodiversity is the only way to preserve the quality and continuity of human life on Earth. The commitments proposed in this strategy pave the way for ambitious and necessary changes - changes that will ensure the wellbeing and economic prosperity of present and future generations in a healthy environment. The implementation of these commitments will take into account the diversity of challenges across sectors, regions and Member States, recognise the need to ensure social justice, fairness and inclusiveness in line with the European Pillar of Social Rights, and will require a sense of responsibility and strong joint efforts from the EU, its Member States, stakeholders and citizens.\nThe Commission invites the European Parliament and the Council to endorse this strategy ahead of the 15 th Conference of the Parties to the Convention on Biological Diversity. To ensure full political ownership of this strategy, the Commission will suggest a standing progress point at the Council and at the European Parliament. It will review the strategy by 2024 to assess progress and whether further action is needed to meet its objectives.\n83 https://www.who.int/features/qa/one-health/en/\n22", + "page_start": 22, + "page_end": 22, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS\nEU Biodiversity Strategy for 2030\nBringing nature back into our lives", + "page_start": 0, + "page_end": 0, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "4.2.3. International cooperation, neighbourhood policy and resource mobilisation\nDelivering an ambitious post-2020 global biodiversity framework will require greater cooperation with partners, increased support and financing and phasing out of subsidies harmful to biodiversity. In the last decade, the EU and its Member States collectively upheld their commitment to double financial flows to developing countries for biodiversity 82 . The EU is ready to continue working with its partners and further increase its support post-2020. This will be part of its work on biodiversity conservation, restoration, sustainable use and mainstreaming in all development and partnership\n79 Under Article 191.2 TFEU, the Union policy on the environment shall aim at a high level of protection and shall be based on the precautionary principle.\n80 European Parliament Resolution on international ocean governance (2017/2055(INI)).\n81 In line with the Commission Communication on Stepping up EU Action to Protect and Restore the World's Forests (COM(2019) 352).\n82 Including international financing where biodiversity is the principal objective and where it is a significant secondary objective, in line with CBD COP11 Decision XI/4 and EU and Member States financial reports submitted to the Convention on Biological Diversity in 2015 and 2018.\n21\npolicies. In addition, by integrating policy coherence for sustainable development in all its policies, the EU will reduce the pressure on biodiversity worldwide. In all of its international cooperation, the EU should promote sustainable agricultural and fisheries practices and actions to protect and restore the world's forests. Particular attention will also be paid to sustainable water resource management, the restoration of degraded land, and the protection and restoration of biodiverse areas with high ecosystem services and climate mitigation potential. A better protection of natural ecosystems, coupled with efforts to reduce wildlife trade and consumption, will also help prevent and build up resilience to possible future diseases and pandemics. The EU will enhance its support to global efforts to apply the One Health approach 83 , which recognises the intrinsic connection between human health, animal health and healthy resilient nature.\nThe EU will step up support to partner countries across the world to achieve the new global targets, fight environmental crime, and tackle the drivers of biodiversity loss. In Africa, the EU will launch the NaturAfrica initiative to protect wildlife and key ecosystems while offering opportunities in green sectors for local populations. Similar projects will be developed in other regions. The EU will also support the Western Balkans and EU Neighbourhood countries in their efforts to protect biodiversity.", + "page_start": 21, + "page_end": 22, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "4. THE EUROPEAN UNION FOR AN AMBITIOUS GLOBAL BIODIVERSITY AGENDA\nBiodiversity is a priority of the EU's external action and an integral part of efforts to meet the United Nations Sustainable Development Goals. It will be mainstreamed throughout bilateral and multilateral engagements, through the EU's 'Green Deal diplomacy', and forthcoming green alliances 76 . The Commission will work closely with the European Parliament and Member States to ensure a high level of EU ambition and mobilise all efforts for the good of the world's biodiversity.", + "page_start": 19, + "page_end": 19, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "1. BIODIVERSITY - THE NEED FOR URGENT ACTION\n7 Food and Agriculture Organization (2019), State of the World's Biodiversity for Food and Agriculture.\n8 IPBES (2019), Summary for policymakers, p. 3, A1.\n9 IPBES (2019), Summary for policymakers, pp. 17-19, B.10-B.14; European Environment Agency (2019), The European environment - state and outlook 2020.\n10 World Wildlife Fund (2018), Living Planet Report - 2018: Aiming Higher.\n11 IPBES (2019), Summary for policymakers, p. 4, A4.\n12 Idem.\n13 https://ec.europa.eu/research/environment/index.cfm?pg=nbs\n14 World Economic Forum (2020), The Global Risks Report 2020.\n15 Organisation for Economic Co-operation and Development (OECD) (2019), Biodiversity: Finance and the Economic and Business Case for Action.\n16 Idem.\n2\nbuild on the headline ambition to ensure that by 2050 all of the world's ecosystems are restored, resilient, and adequately protected. The world should commit to the net-gain principle to give nature back more than it takes. As part of this, the world should commit to no human-induced extinction of species, at minimum where avoidable.\nThis strategy sets out how Europe can help make this happen. As a milestone, it aims to ensure that Europe's biodiversity will be on the path to recovery by 2030 for the benefit of people, the planet, the climate and our economy, in line with the 2030 Agenda for Sustainable Development and with the objectives of the Paris Agreement on Climate Change. It addresses the five main drivers of biodiversity loss, sets out an enhanced governance framework to fill remaining gaps, ensures the full implementation of EU legislation, and pulls together all existing efforts. This strategy is enterprising and incentivising in spirit and action. It reflects the fact that protecting and restoring nature will need more than regulation alone . It will require action by citizens, businesses, social partners and the research and knowledge community, as well as strong partnerships between local, regional, national and European level. This strategy is in line with the ambitions and commitment set out in President von der Leyen's Political Guidelines and in the European Green Deal.", + "page_start": 2, + "page_end": 3, + "source_file": "legal5_eubiodiversity_cc4.pdf" + } + ] + }, + { + "references": { + "source_file": "legal5_eubiodiversity_cc4.pdf", + "query": "Was there a biodiversity governance framework in place in the EU before the European Commission's proposal?", + "target_page": 16, + "target_passage": "In the EU, there is currently no comprehensive governance framework to steer the implementation of biodiversity commitments agreed at national, European or international level. To address the gap, the Commission will put in place a new European biodiversity governance framework. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "3.1. A new governance framework\nIn the EU, there is currently no comprehensive governance framework to steer the implementation of biodiversity commitments agreed at national, European or international level. To address the gap, the Commission will put in place a new European biodiversity governance framework . This will help map obligations and commitments and set out a roadmap to guide their implementation.\nAs part of this new framework, the Commission will put in place a monitoring and review mechanism. This will include a clear set of agreed indicators and will enable regular progress assessment and set out corrective action if necessary. This mechanism will feed the Environmental Implementation Review and contribute to the European Semester.\nThe new governance framework will ensure co-responsibility and co-ownership by all relevant actors in meeting the EU's biodiversity commitments. It will support administrative capacity building, transparency, stakeholder dialogue, and participatory governance at different levels.\nThe Commission will assess the progress and suitability of this approach in 2023, and consider whether a legally binding approach to governance is needed.", + "page_start": 15, + "page_end": 15, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "3.3.1. Business for biodiversity\nIn the partnership spirit of this strategy, all parts of the economy and society will have to play their role. Industry and business have an impact on nature, but they also produce the important innovations, partnerships and expertise that can help address biodiversity loss.\nTo ensure environmental and social interests are fully embedded into business strategies, the Commission will put forward a new initiative in 2021 on sustainable corporate governance . This initiative, which may take the form of a legislative proposal, will address human rights and environmental duty of care and due diligence across economic value chains in a proportionate way according to different sizes of entreprises 64 . This will help ensure that shareholder and stakeholder interests are fully aligned with the objectives set out in this strategy. In addition, in 2020, the Commission launched a review of the reporting obligations of businesses under the Non-Financial Reporting Directive 65 , with a view to improving the quality and scope of non-financial disclosures, including on environmental aspects such as biodiversity.\nThrough its existing platforms 66 , the Commission will help to build a European Business for Biodiversity movement, taking inspiration from recent initiatives 67 and making this movement an integral part of the European Climate Pact. Particular attention will be paid to measures to incentivise and eliminate barriers for the take-up of naturebased solutions, as these can lead to significant business and employment opportunities in various sectors 68 and are the key to innovation for economic or societal needs that rely on nature.\n62 Such as the Directives on Environmental Impact Assessment (2014/52/EU), on Strategic Environmental Assessment (2001/42/EC), on Environmental Liability (2004/35/CE) and on Environmental Crime (2008/99/EC).\n63 https://ec.europa.eu/environment/aarhus/\n64 Study on due diligence requirements through the supply chain - Final Report.\n65 Directive 2014/95/EU amending Directive 2013/34/EU as regards disclosure of non-financial and diversity information by certain large undertakings.\n66 Such as the EU Business @ Biodiversity Platform (B@B).\n67 See for example Business for Nature or One Planet Business for Biodiversity.\n68 BenDor et al. (2015), Estimating the Size and Impact of the Ecological Restoration Economy.\n16", + "page_start": 16, + "page_end": 16, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "3.3.2. Investments, pricing and taxation\nTackling biodiversity loss and restoring ecosystems will require significant public and private investments at national and European level. This will mean making the most of all relevant EU programmes and financing instruments. The Commission will strengthen its biodiversity proofing framework 69 , inter alia by using in an appropriate way the criteria established under the EU taxonomy, to ensure that EU funding supports biodiversity-friendly investments.\nTo meet the needs of this strategy, including investment priorities for Natura 2000 and green infrastructure, at least €20 billion a year 70 should be unlocked for spending on nature . This will require mobilising private and public funding at national and EU level 71 , including through a range of different programmes in the next long-term EU budget. Moreover, as nature restoration will make a major contribution to climate objectives, a significant proportion of the 25% of the EU budget dedicated to climate action will be invested on biodiversity and nature-based solutions.\nUnder Invest EU, a dedicated natural-capital and circular-economy initiative will be established to mobilise at least €10 billion over the next 10 years, based on public/private blended finance. Nature and biodiversity is also a priority for the European Green Deal Investment Plan. To help unlock the investment needed, the EU must provide long-term certainty for investors and help embed sustainability in the financial system. The EU sustainable finance taxonomy will help guide investment towards a green recovery and the deployment of nature-based solutions. In 2021, the Commission will adopt a delegated act under the Taxonomy Regulation 72 to establish a common classification of economic activities that substantially contribute to protecting and restoring biodiversity and ecosystems. This will be further supported by a Renewed Sustainable Finance Strategy later this year which will help ensure that the financial system contributes to mitigating existing and future risks to biodiversity and better reflect how biodiversity loss affects companies' profitability and long-term prospects 73 .\nThe Commission will further promote tax systems and pricing that reflect environmental costs, including biodiversity loss. This should encourage changes in national fiscal systems to shift the tax burden from labour to pollution, under-priced resources, and other environmental externalities. The ' user pays' and 'polluter pays' principles have to be applied to prevent and correct environmental degradation.\nPublic authorities' purchasing power represents 14% of EU GDP and can serve as a powerful driver of demand for the products and services of companies that invest in or contribute to nature-based solutions. To tap into this potential, when proposing further", + "page_start": 17, + "page_end": 17, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "4. THE EUROPEAN UNION FOR AN AMBITIOUS GLOBAL BIODIVERSITY AGENDA\nBiodiversity is a priority of the EU's external action and an integral part of efforts to meet the United Nations Sustainable Development Goals. It will be mainstreamed throughout bilateral and multilateral engagements, through the EU's 'Green Deal diplomacy', and forthcoming green alliances 76 . The Commission will work closely with the European Parliament and Member States to ensure a high level of EU ambition and mobilise all efforts for the good of the world's biodiversity.", + "page_start": 19, + "page_end": 19, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "2.2.1. Strengthening the EU legal framework for nature restoration\nNature restoration is already partially required from the Member States in existing EU legislation 28 . However, significant implementation and regulatory gaps hinder progress . For instance, there is no requirement for Member States to have biodiversity restoration plans. There are not always clear or binding targets and timelines and no definition or criteria on restoration or on the sustainable use of ecosystems. There is also no requirement to comprehensively map, monitor or assess ecosystem services, health or restoration efforts. These issues are exacerbated by the gaps in implementation that prevent the existing legislation from achieving its objectives 29 . Stronger implementation support and enforcement is required. To ensure that nature restoration across land and sea picks up, increases the EU's resilience, and contributes to climate change mitigation and adaptation as a key nature-based solution, this strategy puts forward two strands of actions:\n Firstly, and subject to an impact assessment, the Commission will put forward a proposal for legally binding EU nature restoration targets in 2021 to restore degraded ecosystems, in particular those with the most potential to capture and store carbon and to prevent and reduce the impact of natural disasters. This will identify the conditions in which the targets must be met, as well as the most effective measures to reach them. The impact assessment will also look at the possibility of an EU-wide methodology to map, assess and achieve good condition of ecosystems so they can deliver benefits such as climate regulation, water regulation, soil health, pollination and disaster prevention and protection.\n In that context, the Commission will request and support Member States to raise the level of implementation of existing legislation within clear deadlines. It will in particular request Member States to ensure no deterioration in conservation trends and status of all protected habitats and species by 2030 30 . In addition, Member States will have to ensure that at least 30% of species and habitats not\n28 Notably the EU Birds Directive (2009/147/EC), Habitats Directive (92/43/EEC), Water Framework Directive (2000/60/EC), Floods Directive (2007/60/EC) and Marine Strategy Framework Directive (2008/56/EC).\n29 See Fitness Check of the EU Nature Legislation (SWD(2016) 472) and Fitness Check of the EU Water Legislation (SWD(2019) 439). See also below, Section 3.2.\n30 Habitats and species listed under the Birds and Habitats Directives.\n6", + "page_start": 6, + "page_end": 6, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "4.2.3. International cooperation, neighbourhood policy and resource mobilisation\nDelivering an ambitious post-2020 global biodiversity framework will require greater cooperation with partners, increased support and financing and phasing out of subsidies harmful to biodiversity. In the last decade, the EU and its Member States collectively upheld their commitment to double financial flows to developing countries for biodiversity 82 . The EU is ready to continue working with its partners and further increase its support post-2020. This will be part of its work on biodiversity conservation, restoration, sustainable use and mainstreaming in all development and partnership\n79 Under Article 191.2 TFEU, the Union policy on the environment shall aim at a high level of protection and shall be based on the precautionary principle.\n80 European Parliament Resolution on international ocean governance (2017/2055(INI)).\n81 In line with the Commission Communication on Stepping up EU Action to Protect and Restore the World's Forests (COM(2019) 352).\n82 Including international financing where biodiversity is the principal objective and where it is a significant secondary objective, in line with CBD COP11 Decision XI/4 and EU and Member States financial reports submitted to the Convention on Biological Diversity in 2015 and 2018.\n21\npolicies. In addition, by integrating policy coherence for sustainable development in all its policies, the EU will reduce the pressure on biodiversity worldwide. In all of its international cooperation, the EU should promote sustainable agricultural and fisheries practices and actions to protect and restore the world's forests. Particular attention will also be paid to sustainable water resource management, the restoration of degraded land, and the protection and restoration of biodiverse areas with high ecosystem services and climate mitigation potential. A better protection of natural ecosystems, coupled with efforts to reduce wildlife trade and consumption, will also help prevent and build up resilience to possible future diseases and pandemics. The EU will enhance its support to global efforts to apply the One Health approach 83 , which recognises the intrinsic connection between human health, animal health and healthy resilient nature.\nThe EU will step up support to partner countries across the world to achieve the new global targets, fight environmental crime, and tackle the drivers of biodiversity loss. In Africa, the EU will launch the NaturAfrica initiative to protect wildlife and key ecosystems while offering opportunities in green sectors for local populations. Similar projects will be developed in other regions. The EU will also support the Western Balkans and EU Neighbourhood countries in their efforts to protect biodiversity.", + "page_start": 21, + "page_end": 22, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "2.1. A coherent network of protected areas\nStates and the European Environment Agency, will put forward in 2020 criteria and guidance for identifying and designating additional areas, including a definition of strict protection, as well as for appropriate management planning. In doing so, it will indicate how other effective area-based conservation measures and greening of cities could contribute to the targets.\nThe targets relate to the EU as a whole and could be broken down according to the EU bio-geographical regions and sea basins or at a more local level. Every Member State will have to do its fair share of the effort based on objective ecological criteria, recognising that each country has a different quantity and quality of biodiversity. Particular focus will be placed on protecting and restoring the tropical and sub-tropical marine and terrestrial ecosystems in the EU's outermost regions given their exceptionally high biodiversity value.\nIn addition, in order to have a truly coherent and resilient Trans-European Nature Network, it will be important to set up ecological corridors to prevent genetic isolation, allow for species migration, and maintain and enhance healthy ecosystems. In this context, investments in green and blue infrastructure 27 and cooperation across borders among Member States should be promoted and supported, including through the European Territorial Cooperation.\nThe Commission will aim to agree the criteria and guidance for additional designations with Member States by the end of 2021. Member States will then have until the end of 2023 to demonstrate significant progress in legally designating new protected areas and integrating ecological corridors. On this basis, the Commission will assess by 2024 whether the EU is on track to meet its 2030 targets or whether stronger actions, including EU legislation, are needed.\nFinally, the Overseas Countries and Territories also host important biodiversity hotspots, not governed by EU environmental rules. The Commission encourages relevant Member States to consider promoting equal or equivalent rules in these countries and territories.", + "page_start": 5, + "page_end": 5, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "4.2.3. International cooperation, neighbourhood policy and resource mobilisation\nIn all of its work, the EU will strengthen the links between biodiversity protection and human rights , gender, health, education, conflict sensitivity, the rights-based approach, land tenure and the role of indigenous peoples and local communities.\nAs part of its global efforts, the EU will promote biodiversity coalitions with partners and civil society around the world. For example, in March 2020, the Commission launched the Global Biodiversity Coalition of national parks, aquariums, botanic gardens, zoos, natural history and sciencemuseums to help raise awareness around the world on the need to protect and nurture biodiversity. The Commission will consider launching or joining other High Ambition Coalitions to help develop the post-2020 framework.", + "page_start": 22, + "page_end": 22, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "3.3.2. Investments, pricing and taxation\n69 See Common framework and guidance documents for biodiversity proofing of the EU budget.\n70 The cost estimate is based on the 2018 Impact Assessment of the LIFE Regulation (SWD(2018) 292), a Study on the costs of implementing the Target 2 of the EU Biodiversity Strategy to 2020 and data submitted by 16 Member States under Article 8(1) of the Habitats Directive. The Commission will update the estimate, notably based on Member States' Prioritised Action Frameworks under the Habitats Directive.\n71 Including the Common Agricultural Policy, Cohesion Policy funds, Horizon Europe, the European Maritime and Fisheries Fund, LIFE and external action funds.\n72 See EU taxonomy for sustainable activities.\n73 World Wildlife Fund (2019), The Nature of Risk - A Framework for Understanding Nature-Related Risk to Business.\n17\nlegislation and guidance on green public procurement , the Commission will integrate criteria and monitoring to boost nature-based solutions.", + "page_start": 17, + "page_end": 18, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "5. CONCLUSION\nProtecting and restoring biodiversity is the only way to preserve the quality and continuity of human life on Earth. The commitments proposed in this strategy pave the way for ambitious and necessary changes - changes that will ensure the wellbeing and economic prosperity of present and future generations in a healthy environment. The implementation of these commitments will take into account the diversity of challenges across sectors, regions and Member States, recognise the need to ensure social justice, fairness and inclusiveness in line with the European Pillar of Social Rights, and will require a sense of responsibility and strong joint efforts from the EU, its Member States, stakeholders and citizens.\nThe Commission invites the European Parliament and the Council to endorse this strategy ahead of the 15 th Conference of the Parties to the Convention on Biological Diversity. To ensure full political ownership of this strategy, the Commission will suggest a standing progress point at the Council and at the European Parliament. It will review the strategy by 2024 to assess progress and whether further action is needed to meet its objectives.\n83 https://www.who.int/features/qa/one-health/en/\n22", + "page_start": 22, + "page_end": 22, + "source_file": "legal5_eubiodiversity_cc4.pdf" + } + ] + }, + { + "references": { + "source_file": "legal5_eubiodiversity_cc4.pdf", + "query": "What is the EU's tolerance for unauthorised fishing?", + "target_page": 21, + "target_passage": "The EU will apply zero tolerance towards illegal, unreported and unregulated fishing", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "4.2.1. International Ocean Governance\nIn line with the International Ocean Governance agenda 77 , the EU will support the conclusion of an ambitious legally binding agreement on marine biological diversity of areas beyond national jurisdiction (BBNJ) by the end of 2020. It must set clear global procedures for identifying, designating and effectively managing ecologically representative marine protected areas in the high seas. It should be ratified and implemented as quickly as possible.\nThe EU should also use all of its diplomatic leverage and outreach capacities to help broker agreement on the designation of three vast Marine Protected Areas in the Southern Ocean 78 , two of which were co-proposed by the EU in East Antarctica and in the Weddell Sea. If agreed, this would constitute one of the biggest acts of nature protection in history.\nWork will continue with partner countries and regional organisations to put in place measures to protect and sustainably use sensitive maritime ecosystems and species, including in areas beyond national jurisdiction, with a focus on marine biodiversity hotspots. The EU should continue supporting Small Island Developing States and other relevant partner countries to participate in meetings of regional and global organisations and bodies, and to implement relevant international commitments and regulations.\nThe EU will apply zero tolerance towards illegal, unreported and unregulated fishing and will combat overfishing, including through WTO negotiations on a global agreement to ban harmful fisheries subsidies .\nIn international negotiations, the EU should advocate that marine minerals in the international seabed area cannot be exploited before the effects of deep-sea mining on the marine environment, biodiversity and human activities have been sufficiently researched, the risks are understood and the technologies and operational practices are able to demonstrate no serious harm to the environment, in line with the precautionary\n77 International ocean governance agenda: an agenda for the future (JOIN(2016) 49).\n78 In the framework of the Commission for the Conservation of Antarctic Marine Living Resources.\n20\nprinciple 79 and taking into account the call of the European Parliament 80 . In parallel, the EU will continue to fund research on the impact of deep-sea mining activities and on environmentally-friendly technologies. The EU should also advocate for more transparency in international bodies such as the International Seabed Authority.", + "page_start": 20, + "page_end": 21, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "2.2.6. Restoring the good environmental status of marine ecosystems\nRestored and properly protected marine ecosystems bring substantial health, social and economic benefits to coastal communities and the EU as a whole. The need for stronger action is all the more acute as marine and coastal ecosystem biodiversity loss is severely exacerbated by global warming 42 .\nAchieving good environmental status of marine ecosystems, including through strictly protected areas, must involve the restoration of carbon-rich ecosystems as well as important fish spawning and nursery areas. Some of today's sea uses endanger food security, fishers' livelihoods, and the fishery and seafood sectors. Marine resources must be harvested sustainably and there must be zero-tolerance for illegal practices . In this regard, the full implementation of the EU's Common Fisheries Policy, the Marine Strategy Framework Directive and the Birds and Habitats Directives is essential.\nThe application of an ecosystem-based management approach under EU legislation 43 will reduce the adverse impacts of fishing, extraction and other human activities, especially on sensitive species and seabed habitats. To support this, national maritime spatial plans , which Member States have to deliver in 2021, should aim at covering all maritime sectors and activities, as well as area-based conservation-management measures. 44 The Commission will also propose a new action plan to conserve fisheries resources and protect marine ecosystems by 2021. Where necessary, measures will be introduced to limit the use of fishing gear most harmful to biodiversity, including on the seabed. It will also look at how to reconcile the use of bottom-contacting fishing gear with biodiversity goals, given it is now the most damaging activity to the seabed. This must be done in a fair and just way for all. The European Maritime and Fisheries Fund should also support the transition to more selective and less damaging fishing techniques.\nHealthy fish stocks are key to the long-term prosperity of fishermen and the health of our oceans and biodiversity. This makes it all the more important to maintain or reduce fishing mortality at or under Maximum Sustainable Yield levels . This will help achieve a healthy population age and size distribution for fish stocks.\nThe by-catch of species threatened with extinction must also be eliminated or reduced to a level that allows full recovery. This should also be the case for those in bad conservation status or not in good environmental status. Furthermore, the by-catch of other species 45 must be eliminated or, where this is not possible, minimised so as not to\n41 Article 29 of the EU Renewable Energy Directive 2018/2001.", + "page_start": 11, + "page_end": 11, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "2.2.7. Restoring freshwater ecosystems\nThe EU's legal framework on water is ambitious but implementation is lagging behind and enforcement must be stepped up 46 . Greater efforts are needed to restore freshwater ecosystems and the natural functions of rivers in order to achieve the objectives of the Water Framework Directive. This can be done by removing or adjusting barriers that prevent the passage of migrating fish and improving the flow of water and sediments. To help make this a reality, at least 25,000 km of rivers will be restored into free-flowing rivers by 2030 47 through the removal of primarily obsolete barriers and the restoration of floodplains and wetlands. Technical guidance and support to the Member States to identify sites and help mobilise funding will be provided by the Commission in 2021, in consultation with all relevant authorities 48 . Member State authorities should review water abstraction and impoundment permits to implement ecological flows in order to achieve good status or potential of all surface waters and good status of all groundwater by 2027 at the latest, as required by the Water Framework Directive 49 . To that effect, the Commission will provide technical support to Member States on their measures by 2023.\nOverall, large-scale river and floodplain restoration investments 50 can provide a major economic boost for the restoration sector and for local socioeconomic activities such as tourism and recreation. At the same time, these investments can improve water regulation, flood protection, nursery habitats for fish, and the removal of nutrient pollution.", + "page_start": 12, + "page_end": 12, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "Prohibition on arrival of vessels into England\n3. -(1) A controller must not cause or permit a vessel whose last point of departure was a country or territory listed in paragraph 5 to moor at a port in England unless mooring at a port in England-\n(a) is reasonably necessary to secure the safety of the vessel or the health and safety of any person aboard it; or\n(b) is otherwise required pursuant to a direction issued under Schedule 3A to the Merchant Shipping Act 1995.\n(2) This paragraph does not apply in relation to-\n(a) a commercially operated vessel carrying no passengers;\n(b) a vessel operated by or in support of Her Majesty's Government in the United Kingdom;\n(c) a vessel operated by or in support of a foreign country or territory where, prior to its arrival in England, a United Kingdom Government Department has provided written confirmation to the operator that the vessel is carrying passengers who are travelling to conduct official business with the United Kingdom.\n4. The countries or territories referred to in paragraph 2(1) are-\n(a) Argentina;\n(b) Brazil;\n(c) Cape Verde;\n(d) Chile;\n(e) Ethiopia;\n(f) The Maldives;\n(g) Oman;\n(h) Qatar;\n(i) South Africa;\n(j) Turkey;\n(k) United Arab Emirates.\n5. The countries or territories referred to in paragraph 3(1) are-\nTurkey\n6. A controller who contravenes paragraph 2(1) or 3(1) commits an offence punishable on summary conviction by a fine.", + "page_start": 84, + "page_end": 84, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "6.1 Foundation, legislation, compliance and supervision\nIn 2018, the European Commission estimated the scale of undeclared work in the EU. According to this estimate, on average, 11.6% of total labour input in the private sector is undeclared, and undeclared work constitutes on average 16.4% of gross value added. The main sectors according to the Special Flash Eurobarometer from 2019 360 are personal services (childcare/elderly care/cleaning) followed by construction and hospitality services. 361 The 'European Platform tackling undeclared work' provides fact sheets about the type and quantity of undeclared work in all EU Member States. 362\nThe compliance of enterprises with OSH regulations is supervised by state institutions, mainly the Labour Inspectorates . 363 At EU level, the SLIC developed common principles for their work. These common principles aim at harmonising their work and facilitate collaboration; they include planning and monitoring, inspectors' competencies and independence, prevention, protection, and assistance and guidance for inspectors, and internal and external communication. 364\nPractically all labour inspections in the EU Member States worked in the past two decades on organisational and strategic measures to achieve an effective and broad impact , and also to better adapt to new and emerging risks. 365 To enhance the level of implementation in terms of coverage and quality, many labour inspections developed smart enforcement and supervision concepts . 366\nOn average, two million visits per year were made by labour inspectorates, in approximately 22 million businesses in the EU, in the decade 2010-2020, with a steady decline over the years. 367 . 368 Many enterprises that are regarded as low-risk establishments have never been inspected by a labour inspectorate. Often more than one inspection is done in large enterprises, for example, as a follow-up inspection; there might also be more than one annual inspection in enterprises with high risks. The labour inspection is also tasked to supervise enterprises with many separated sites or establishments, for example, construction companies and shops of supermarket chains. The visit of one headquarter or one shop cannot be regarded as a visit of a representative selection of enterprises' locations, which possibly show different levels of safety and health.", + "page_start": 122, + "page_end": 122, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "II.24. Checks and audits\nII.24.5 In accordance with Council Regulation (Euratom, EC) No 2185/96 of 11 November 1996 concerning on-the-spot checks and inspection carried out by the Commission in order to protect the European Communities' financial interests against fraud and other irregularities and Regulation (EU, Euratom) No 883/2013 of the European Parliament and of the Council of 11 September 2013 concerning investigations conducted by the European Anti-Fraud Office, the European AntiFraud Office may carry out investigations, including on the spot checks and inspections, to establish whether there has been fraud , corruption or any other illegal activity under the contract affecting the financial interests of the Union. Findings arising from an investigation may lead to criminal prosecution under national law.\nThe investigations may be carried out at any moment during the provision of the services and up to five years starting from the payment of the balance of the last specific contract issued under this FWC.\nII.24.6 The Court of Auditors, the European Public Prosecutor's Office established by Council Regulation (EU) 2017/19397 7 ('the EPPO') and, for the processing of personal data, the European Data Protection Supervisor have the same rights as the contracting authority, particularly right of access, for the purpose of checks,\n7 Council Regulation (EU) 2017/1939 of 12 October 2017 implementing enhanced cooperation on the establishment of the European Public Prosecutor's Office\n38\nContract number: ECHA/2019/355\nFWC conditions of October 2018\naudits and investigations.\n39\nContract number: ECHA/2019/355\nFWC conditions of October 2018", + "page_start": 37, + "page_end": 39, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "4.2.3. International cooperation, neighbourhood policy and resource mobilisation\nDelivering an ambitious post-2020 global biodiversity framework will require greater cooperation with partners, increased support and financing and phasing out of subsidies harmful to biodiversity. In the last decade, the EU and its Member States collectively upheld their commitment to double financial flows to developing countries for biodiversity 82 . The EU is ready to continue working with its partners and further increase its support post-2020. This will be part of its work on biodiversity conservation, restoration, sustainable use and mainstreaming in all development and partnership\n79 Under Article 191.2 TFEU, the Union policy on the environment shall aim at a high level of protection and shall be based on the precautionary principle.\n80 European Parliament Resolution on international ocean governance (2017/2055(INI)).\n81 In line with the Commission Communication on Stepping up EU Action to Protect and Restore the World's Forests (COM(2019) 352).\n82 Including international financing where biodiversity is the principal objective and where it is a significant secondary objective, in line with CBD COP11 Decision XI/4 and EU and Member States financial reports submitted to the Convention on Biological Diversity in 2015 and 2018.\n21\npolicies. In addition, by integrating policy coherence for sustainable development in all its policies, the EU will reduce the pressure on biodiversity worldwide. In all of its international cooperation, the EU should promote sustainable agricultural and fisheries practices and actions to protect and restore the world's forests. Particular attention will also be paid to sustainable water resource management, the restoration of degraded land, and the protection and restoration of biodiverse areas with high ecosystem services and climate mitigation potential. A better protection of natural ecosystems, coupled with efforts to reduce wildlife trade and consumption, will also help prevent and build up resilience to possible future diseases and pandemics. The EU will enhance its support to global efforts to apply the One Health approach 83 , which recognises the intrinsic connection between human health, animal health and healthy resilient nature.\nThe EU will step up support to partner countries across the world to achieve the new global targets, fight environmental crime, and tackle the drivers of biodiversity loss. In Africa, the EU will launch the NaturAfrica initiative to protect wildlife and key ecosystems while offering opportunities in green sectors for local populations. Similar projects will be developed in other regions. The EU will also support the Western Balkans and EU Neighbourhood countries in their efforts to protect biodiversity.", + "page_start": 21, + "page_end": 22, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "2.2.1. Strengthening the EU legal framework for nature restoration\nNature restoration is already partially required from the Member States in existing EU legislation 28 . However, significant implementation and regulatory gaps hinder progress . For instance, there is no requirement for Member States to have biodiversity restoration plans. There are not always clear or binding targets and timelines and no definition or criteria on restoration or on the sustainable use of ecosystems. There is also no requirement to comprehensively map, monitor or assess ecosystem services, health or restoration efforts. These issues are exacerbated by the gaps in implementation that prevent the existing legislation from achieving its objectives 29 . Stronger implementation support and enforcement is required. To ensure that nature restoration across land and sea picks up, increases the EU's resilience, and contributes to climate change mitigation and adaptation as a key nature-based solution, this strategy puts forward two strands of actions:\n Firstly, and subject to an impact assessment, the Commission will put forward a proposal for legally binding EU nature restoration targets in 2021 to restore degraded ecosystems, in particular those with the most potential to capture and store carbon and to prevent and reduce the impact of natural disasters. This will identify the conditions in which the targets must be met, as well as the most effective measures to reach them. The impact assessment will also look at the possibility of an EU-wide methodology to map, assess and achieve good condition of ecosystems so they can deliver benefits such as climate regulation, water regulation, soil health, pollination and disaster prevention and protection.\n In that context, the Commission will request and support Member States to raise the level of implementation of existing legislation within clear deadlines. It will in particular request Member States to ensure no deterioration in conservation trends and status of all protected habitats and species by 2030 30 . In addition, Member States will have to ensure that at least 30% of species and habitats not\n28 Notably the EU Birds Directive (2009/147/EC), Habitats Directive (92/43/EEC), Water Framework Directive (2000/60/EC), Floods Directive (2007/60/EC) and Marine Strategy Framework Directive (2008/56/EC).\n29 See Fitness Check of the EU Nature Legislation (SWD(2016) 472) and Fitness Check of the EU Water Legislation (SWD(2019) 439). See also below, Section 3.2.\n30 Habitats and species listed under the Birds and Habitats Directives.\n6", + "page_start": 6, + "page_end": 6, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "here\n353 Ibid., p. 67.\n354 Ibid., p. 94.\n355 Graveling, 2018: Transposition, implementation and enforcement of EU OSH legislation - Thematic Discussion Paper\n356 EU-OSHA, 2021: Summary - Improving compliance with occupational safety and health regulations: an overarching review (p. 4).\n357 The authors explain the difference between 'substantive and rule compliance as follows: '... 'substantive compliance', which requires compliance with the collective goals underpinning the regulatory scheme (better OSH practice); and 'rule compliance', which envisages compliance with the content of legal standards only ' (p. 11). 358 EU-OSHA, 2021: Improving compliance with occupational safety and health regulations: an overarching review (p. 43).\n359 Fundamental Rights Agency (FRA), here, section on Trafficking and labour exploitation\n360 Special Eurobarometer 498: Undeclared Work in the European Union\n361 European Commission, Directorate-General for Employment, Social Affairs and Inclusion et al., 2018: An evaluation of the scale of undeclared work in the European Union and its structural determinants : estimates using the labour input method, here\n362 ELA: European Platform tackling undeclared work\n363 The OSH Barometer contains a special section on enforcement capacities, here\n364 SLIC, 2015: Common Principles for Labour Inspection in Relation to Health and Safety In the Workplace\n365 Cardiff University et al., 2011: Contract to assess the potential impact of emerging trends and risks on labour inspection methodologies in the domain of occupational health and safety,\nEuropean Federation of Public Service Unions (EPSU), 2012: A mapping report on Labour Inspection Services in 15 European countries (p. 13ff).\n366 The Nordic countries (Denmark, Finland, Iceland, Norway and Sweden) are particularly active in this area. They have summarised the current challenges for labour inspections and supervision in general, giving extensive and detailed recommendations; Nordic Future of Work Group, 2020: Work today and in the future : Perspectives on Occupational Safety and Health challenges and opportunities for the Nordic labour inspectorates, here BAuA, 2020: Scientific workshop on the future of smart and effective labour inspection, 3 November 2020, here\nEuropean Agency for Safety and Health at Work - EU-OSHA\n154\nOccupational safety and health in Europe - state and trends 2023\n367 ETUC, 2021: Huge fall in labour inspections raises Covid risk", + "page_start": 153, + "page_end": 154, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "3.3.2. Investments, pricing and taxation\n69 See Common framework and guidance documents for biodiversity proofing of the EU budget.\n70 The cost estimate is based on the 2018 Impact Assessment of the LIFE Regulation (SWD(2018) 292), a Study on the costs of implementing the Target 2 of the EU Biodiversity Strategy to 2020 and data submitted by 16 Member States under Article 8(1) of the Habitats Directive. The Commission will update the estimate, notably based on Member States' Prioritised Action Frameworks under the Habitats Directive.\n71 Including the Common Agricultural Policy, Cohesion Policy funds, Horizon Europe, the European Maritime and Fisheries Fund, LIFE and external action funds.\n72 See EU taxonomy for sustainable activities.\n73 World Wildlife Fund (2019), The Nature of Risk - A Framework for Understanding Nature-Related Risk to Business.\n17\nlegislation and guidance on green public procurement , the Commission will integrate criteria and monitoring to boost nature-based solutions.", + "page_start": 17, + "page_end": 18, + "source_file": "legal5_eubiodiversity_cc4.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_SMFG_2011.pdf", + "query": "What are the missions of the Sumitomo Mitsui Financial Group?", + "target_page": 7, + "target_passage": "• To provide optimum added value to our customers and together with them achieve growth • To create sustainable shareholder value through business growth• To create sustainable shareholder value through business growth • To provide a challenging and professionally rewarding work environment for our dedicated employees• To provide a challenging and professionally rewarding work environment for our dedicated employee", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Corporate Outline (as of September 30, 2011)\nCompany Name\nBusiness Description\nEstablished\nHead Office\nChairman of the Board\nPresident\nCapital\nStock Exchange Listings\nSumitomo Mitsui Financial Group, Inc. ::\nManagement of banking subsidiaries (under the stipulations of Japan's Banking Act) and of non-bank subsidiaries, as well as the performance of ancillary functions :\nDecember 2, 2002 :\n1-2, Marunouchi 1-chome, Chiyoda-ku, Tokyo, Japan :\nMasayuki Oku :\nKoichi Miyata (Concurrent Director at Sumitomo Mitsui Banking Corporation) :\n¥2,337.8 billion :\nTokyo Stock Exchange (First Section) :\nOsaka Securities Exchange (First Section) Nagoya Stock Exchange (First Section) Note: American Depositary Receipts (ADRs) are listed on the New York Stock Exchange.", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "www.smfg.co.jp/english\nSumitomo Mitsui Financial Group CSR Report\nDigest version", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "Structure of Sumitomo Mitsui Financial Group (as of September 30, 2011)\n* SMFG plans to make PROMISE a wholly owned subsidiary in April 2012.", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "About this Report\nPeriod Covered\nPublication Date of Japanese Document\nContact\n: April 1, 2010 to March 31, 2011 ( 'Fiscal 2010' )\n: December 2011\n:\nNote: Certain items in this report refer to activities taking place after April 2011.\nGroup CSR Department, Sumitomo Mitsui Financial Group, Inc. 1-2 Marunouchi 1-chome, Chiyoda-ku, Tokyo 100-0005 TEL: +81-3-3282-8111", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "Listing on the New York Stock Exchange\nIn November 2010, the Sumitomo Mitsui In November 2010, the Sumitomo Mitsui Financial Group listed on the New York Financial Group listed on the New York Stock Exchange. This move, we believe, not Stock Exchange. This move, we believe, not only significantly increases convenience for only significantly increases convenience for our overseas shareholders and investors, our overseas shareholders and investors, but also broadens our customer base as it but also broadens our customer base as it further increases the transparency of our further increases the transparency of our financial position. Listing on the New York financial position. Listing on the New York Stock Exchange as a socially responsible Stock Exchange as a socially responsible corporation accelerates our evolution into a corporation accelerates our evolution into a global player. global player.\nSumitomo Mitsui Financial Group CSR Report\nSpecific Examples of CSR Activities", + "page_start": 9, + "page_end": 10, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "Sumitomo Mitsui Finance & Leasing: Promoting recycling and reuse\nAs part of its core leasing operations, As part of its core leasing operations, Sumitomo Mitsui Finance & Leasing is Sumitomo Mitsui Finance & Leasing is helping reduce customers' environmental helping reduce customers' environmental\nRecycling and reuse of old equipment and machinery\nload through measures such as 'carbon load through measures such as 'carbon neutral leases' (with carbon credits allocated neutral leases' (with carbon credits allocated in proportion to emission volumes of leased in proportion to emission volumes of leased assets) and leasing of environment-friendly assets) and leasing of environment-friendly and energy-saving equipment. and energy-saving equipment.\nLikewise, by trading used machinery and Likewise, by trading used machinery and semiconductor- manufacturing equipment, semiconductor- manufacturing equipment, Sumitomo Mitsui Finance & Leasing is Sumitomo Mitsui Finance & Leasing is supporting more efficient capital investment supporting more efficient capital investment by its customers, while itself evolving into a by its customers, while itself evolving into a recycling-oriented, environment-friendly recycling-oriented, environment-friendly company. company.", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "Company name abbreviations and other special terminology\nThroughout this report, 'Sumitomo Mitsui Financial Group' or 'SMFG' refers to the holding company alone. 'The SMFG Group' refers to the holding company and its primary domestic and international subsidiaries and affiliates.", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "Scholarships at major universities\nSumitomo Mitsui Banking Corporation (China) Limited Sumitomo Mitsui Banking Corporation (China) Limited established a scholarship program for students of Zhejiang established a scholarship program for students of Zhejiang\nUniversity, Shanghai Inter University, Shanghai International Studies University, national Studies University, Sun Yat-sen University, Sun Yat-sen University, and other universities. and other universities.\nScholarship students at Sun Yat-sen University", + "page_start": 14, + "page_end": 14, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "Koichi Miyata\nPresident Sumitomo Mitsui Financial Group, Inc.\nThe SMFG Group has 62,000 employees, The SMFG Group has 62,000 employees, 'stepping up to the plate and working hard 'stepping up to the plate and working hard to give something back to society.' I think it to give something back to society.' I think it is important to develop ways of making this is important to develop ways of making this a shared aspiration of all the employees of a shared aspiration of all the employees of\nthe Group. the Group.\n05\nCSR REPORT 2011\nCSR REPORT 2011\n06", + "page_start": 2, + "page_end": 3, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "Today, Tomorrow and Beyond\nPresident Sumitomo Mitsui Financial Group, Inc.\nKoichi Miyata\n01 CSR REPORT 2011\nCSR REPORT 2011 02\nFirst, I would like to extend our deepest sympathies and heartfelt First, I would like to extend our deepest sympathies and heartfelt condolences to all those who have suffered and condolences to all those who have suffered and to the families and friends of those who tragically lost their lives in to the families and friends of those who tragically lost their lives in the devastating earthquake and tsunami the devastating earthquake and tsunami that struck northeastern Japan on March 11, 2011. We pray for the that struck northeastern Japan on March 11, 2011. We pray for the early recovery of the affected people and areas.early recovery of the affected people and areas. SMFG is dedicated to seamlessly responding to clients' needs by SMFG is dedicated to seamlessly responding to clients' needs by leveraging our group-wide capabilities, leveraging our group-wide capabilities, offering optimal products and services, and ensuring that every offering optimal products and services, and ensuring that every employee and the overall group are capable of employee and the overall group are capable of responding to the challenges of globalization. I believe that responding to the challenges of globalization. I believe that through these measures, through these measures, we will contribute to the growth and development of our clients we will contribute to the growth and development of our clients and society, and ourselves grow in partnership with them.and society, and ourselves grow in partnership with them. Through our basic policy of becoming 'a globally competitive Through our basic policy of becoming 'a globally competitive financial services group financial services group with the highest trust of our clients, society and other stakeholders' with the highest trust of our clients, society and other stakeholders' by maximizing our core strengths of by maximizing our core strengths of 'Spirit of Innovation,' 'Speed' and 'Solution & Execution,' we 'Spirit of Innovation,' 'Speed' and 'Solution & Execution,' we will continue to stay ahead of the times, will continue to stay ahead of the times, no matter how challenging, and actively adapt to changes in our no matter how challenging, and actively adapt to changes in our business environment.business environment.", + "page_start": 1, + "page_end": 1, + "source_file": "NYSE_SMFG_2011.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_SMFG_2011.pdf", + "query": "Did Katsutoshi Konuma participate in the August 2011 expert roundtable on the role of the Sumitomo Mitsui Financial Group's new Food and Agricultural Assessment Loan? ", + "target_page": 8, + "target_passage": "Key comments of participants Together with Our Customers Katsutoshi Konuma, Section Manager, Social & Environmental Management, Asahi Breweries Ltd", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "Roundtable session: SMBC Food and Agricultural Assessment Loan\nA roundtable session with experts held in August 2011 considered the role of the new SMBC Food and Agricultural Assessment Loan in improving the food supply chain that links food and fishery producers with food processors and consumers. Opinions were also exchanged on what other future role the bank might assume in this regard, given the current situation and issues facing the food industry\nand agriculture in Japan.", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "The financial sector's role in improving the nation's diet and in strengthening the agricultural and fisheries sectors\nFor many years, food supply networks in For many years, food supply networks in Japan were premised on mass production and Japan were premised on mass production and mass consumption, enabling the country to mass consumption, enabling the country to meet soaring food demand at a time of rapid meet soaring food demand at a time of rapid growth in the population and economy. growth in the population and economy.\nBut in recent years, consumers have come to But in recent years, consumers have come to place more priority on factors other than place more priority on factors other than volume and price, such as food safety and volume and price, such as food safety and healthiness, and the cultural aspects of diet. healthiness, and the cultural aspects of diet. As discussion continues on the need for As discussion continues on the need for farmers to increase production scale and farmers to increase production scale and move into processing and marketing, major move into processing and marketing, major changes are underway in the agriculture and changes are underway in the agriculture and fisheries sector in Japan. fisheries sector in Japan.\nAgainst this backdrop, SMBC has developed Against this backdrop, SMBC has developed a new financial product for this sector. a new financial product for this sector.", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "Key comments of participants\n'We want to deliver value by creating demand and quality combined with safety, peace of mind and trust.' Katsutoshi Konuma, Section Manager, Social & Environmental Management, Asahi Breweries Ltd.\nYasuhiro Nakashima Associate Professor Graduate School of Agricultural and Life Sciences, The University of Tokyo\n'Eating should be something that generates emotion. New potential exists in the world of cuisine.' Daisuke Yamamoto, Vice Senior Consultant, Research Department,\nThe Japan Research Institute, Limited\n'As consumer tastes go through a time of great change, I think it is important to prioritize ingredients and the attitude of customers toward eating.'\nYoichiro Fukayama, Planning Dept., Deputy Head (with powers of representation) of the Corporate Banking Unit & Middle Market Banking Unit, SMBC\n'An important concept is multilateral dialogue as the number of parties involved in food production increases throughout the supply chain.'\nModerated by Kenji Sawami, Partner, Ernst & Young ShinNihon LLC\nThe SMBC Food and Agricultural Assessment The SMBC Food and Agricultural Assessment Loan comes with conditions, depending on Loan comes with conditions, depending on the results of an evaluation of food-producers' the results of an evaluation of food-producers' progress in areas such as food safety and progress in areas such as food safety and environment-friendliness, healthiness and environment-friendliness, healthiness and nutritional value, and efficiency of distribution. nutritional value, and efficiency of distribution. The Japan Research Institute researches The Japan Research Institute researches\nmeasures in the measures in the areas areas of food and o f f o o d a n d farming being taken farming being taken by the loan applicant, by the loan applicant, and drafts a simple and drafts a simple 'diagnosis' stating 'diagnosis' stating whether there is room whether there is room\nfor future improvement. Ernst & Young for future improvement. Ernst & Young ShinNihon LLC provides expert opinions on ShinNihon LLC provides expert opinions on ongoing improvement of this system. ongoing improvement of this system.\nBy backing customer companies' own By backing customer companies' own initiatives in the areas of food and agriculture initiatives in the areas of food and agriculture in this way, SMBC will be supporting measures in this way, SMBC will be supporting measures to improve the diet of the Japanese and to improve the diet of the Japanese and strengthen the agriculture and fisheries sector. strengthen the agriculture and fisheries sector.", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "Corporate Outline (as of September 30, 2011)\nCompany Name\nBusiness Description\nEstablished\nHead Office\nChairman of the Board\nPresident\nCapital\nStock Exchange Listings\nSumitomo Mitsui Financial Group, Inc. ::\nManagement of banking subsidiaries (under the stipulations of Japan's Banking Act) and of non-bank subsidiaries, as well as the performance of ancillary functions :\nDecember 2, 2002 :\n1-2, Marunouchi 1-chome, Chiyoda-ku, Tokyo, Japan :\nMasayuki Oku :\nKoichi Miyata (Concurrent Director at Sumitomo Mitsui Banking Corporation) :\n¥2,337.8 billion :\nTokyo Stock Exchange (First Section) :\nOsaka Securities Exchange (First Section) Nagoya Stock Exchange (First Section) Note: American Depositary Receipts (ADRs) are listed on the New York Stock Exchange.", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "About this Report\nPeriod Covered\nPublication Date of Japanese Document\nContact\n: April 1, 2010 to March 31, 2011 ( 'Fiscal 2010' )\n: December 2011\n:\nNote: Certain items in this report refer to activities taking place after April 2011.\nGroup CSR Department, Sumitomo Mitsui Financial Group, Inc. 1-2 Marunouchi 1-chome, Chiyoda-ku, Tokyo 100-0005 TEL: +81-3-3282-8111", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "Today, Tomorrow and Beyond\nPresident Sumitomo Mitsui Financial Group, Inc.\nKoichi Miyata\n01 CSR REPORT 2011\nCSR REPORT 2011 02\nFirst, I would like to extend our deepest sympathies and heartfelt First, I would like to extend our deepest sympathies and heartfelt condolences to all those who have suffered and condolences to all those who have suffered and to the families and friends of those who tragically lost their lives in to the families and friends of those who tragically lost their lives in the devastating earthquake and tsunami the devastating earthquake and tsunami that struck northeastern Japan on March 11, 2011. We pray for the that struck northeastern Japan on March 11, 2011. We pray for the early recovery of the affected people and areas.early recovery of the affected people and areas. SMFG is dedicated to seamlessly responding to clients' needs by SMFG is dedicated to seamlessly responding to clients' needs by leveraging our group-wide capabilities, leveraging our group-wide capabilities, offering optimal products and services, and ensuring that every offering optimal products and services, and ensuring that every employee and the overall group are capable of employee and the overall group are capable of responding to the challenges of globalization. I believe that responding to the challenges of globalization. I believe that through these measures, through these measures, we will contribute to the growth and development of our clients we will contribute to the growth and development of our clients and society, and ourselves grow in partnership with them.and society, and ourselves grow in partnership with them. Through our basic policy of becoming 'a globally competitive Through our basic policy of becoming 'a globally competitive financial services group financial services group with the highest trust of our clients, society and other stakeholders' with the highest trust of our clients, society and other stakeholders' by maximizing our core strengths of by maximizing our core strengths of 'Spirit of Innovation,' 'Speed' and 'Solution & Execution,' we 'Spirit of Innovation,' 'Speed' and 'Solution & Execution,' we will continue to stay ahead of the times, will continue to stay ahead of the times, no matter how challenging, and actively adapt to changes in our no matter how challenging, and actively adapt to changes in our business environment.business environment.", + "page_start": 1, + "page_end": 1, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "www.smfg.co.jp/english\nSumitomo Mitsui Financial Group CSR Report\nDigest version", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "as a whole. as a whole.\nMiyata : SMFG unit Japan Research : S M F G u n i t J a p a n R e s e a r c h Institute serves as an adviser to the I n s t i t u t e s e r v e s a s a n a d v i s e r t o t h e Tianjin Eco-City project in China, and Tianjin Eco-City project in China, and SMBC and our securities units can SMBC and our securities units can provide funding when needed. Through provide funding when needed. Through such organic assistance, we provide such organic assistance, we provide support through our core operations as support through our core operations as a comprehensive financial services group. a comprehensive financial services group. Kunibe : Mr. Ando pointed out that : M r. A n d o p o i n t e d o u t t h a t Japanese companies hold a lot of good Japanese companies hold a lot of good technology. I think that technology. I think that's true. With the s true. With the above-mentioned 'Growing Industrial above-mentioned 'Growing Industrial Cluster Project Team,' for example, if Cluster Project Team,' for example, if technologies are being exported to Asia technologies are being exported to Asia for an infrastructure project, bank f o r a n i n f r a s t r u c t u r e p r o j e c t , b a n k employees will be involved from the employees will be involved from the project planning stage. I think this is one project planning stage. I think this is one of the roles of a financial institution. of the roles of a financial institution.\nAndo : I think that the role of financial : I think that the role of financial institutions is significant. They do indeed institutions is significant. They do indeed have the power to get things moving, and have the power to get things moving, and it is a very great power. it is a very great power.", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "Combining the proposals of every employee\nThe Great East Japan Earthquake of March The Great East Japan Earthquake of March 2011 not only devastated the directly hit 2011 not only devastated the directly hit areas of northeastern Japan at the epicenter, areas of northeastern Japan at the epicenter, but also had severe consequences for the but also had severe consequences for the entire Japanese economy, due to loss of entire Japanese economy, due to loss of power generation capacity, disruption of power generation capacity, disruption of manufacturing supply chains and damage to manufacturing supply chains and damage to agriculture and fisheries. The earthquake and agriculture and fisheries. The earthquake and tsunami raised a wide range of issues. tsunami raised a wide range of issues.\nUnder the Save Power & the Nation Under the Save Power & the Nation ('SPN'SPN') ) banner, all employees and executives of the banner, all employees and executives of the bank urged each other to rack their brains to bank urged each other to rack their brains to come up with ways of saving energy, a press come up with ways of saving energy, a pressing issue, and of supporting reconstruction ing issue, and of supporting reconstruction in in the disaster-affected areas. Ideas were t h e dis a s ter-af fected areas. Ideas were solicited in the following categories. solicited in the following categories.", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "Sumitomo Mitsui Finance & Leasing: Promoting recycling and reuse\nAs part of its core leasing operations, As part of its core leasing operations, Sumitomo Mitsui Finance & Leasing is Sumitomo Mitsui Finance & Leasing is helping reduce customers' environmental helping reduce customers' environmental\nRecycling and reuse of old equipment and machinery\nload through measures such as 'carbon load through measures such as 'carbon neutral leases' (with carbon credits allocated neutral leases' (with carbon credits allocated in proportion to emission volumes of leased in proportion to emission volumes of leased assets) and leasing of environment-friendly assets) and leasing of environment-friendly and energy-saving equipment. and energy-saving equipment.\nLikewise, by trading used machinery and Likewise, by trading used machinery and semiconductor- manufacturing equipment, semiconductor- manufacturing equipment, Sumitomo Mitsui Finance & Leasing is Sumitomo Mitsui Finance & Leasing is supporting more efficient capital investment supporting more efficient capital investment by its customers, while itself evolving into a by its customers, while itself evolving into a recycling-oriented, environment-friendly recycling-oriented, environment-friendly company. company.", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_SMFG_2011.pdf" + } + ] + }, + { + "references": { + "source_file": "news2.pdf", + "query": "What is the trend of flood risk in Canada in 2024?", + "target_page": 1, + "target_passage": "(NC) Communities in Canada are facing increased flood risks, with 1.5 million homes highly exposed", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Three ways Canadian communities are reducing flood risks\n(NC) Communities in Canada are facing increased flood risks, with 1.5 million homes highly exposed. There are large-scale programs available across the country providing flood protection measures for communities at risk, such as Intact's Municipal Climate Resiliency Grants. This program is helping build the resilience of communities and homes through a variety of preventative actions.\nWetlands can reduce flood risk by absorbing large quantities of water, but they are not typically found in cities. In Vancouver, B.C., Environmental Youth Alliance and Strathcona Community Gardens created a wetland on downtown's east side, an area historically prone to flooding. Made up of natural elements like ponds and marshes, the wetland reduces the community's flood risk by catching and absorbing rainfall and runoff from surrounding surfaces.\nKnowing the risks is the first step to protecting homes and communities. In New Brunswick, the City of Fredericton launched a Neighbourhood Flood Risk Tool to provide easy access to online flood prevention guidance. Residents can input their addresses to see if they are at risk and learn tips to reduce the risk of flooding around their properties. The portal launched in the summer of 2023 and was viewed 27,000 times in its first year.\nRebate programs are a powerful motivation for homeowners to make upgrades that might otherwise be put off. In PEI, the City of Charlottetown offered rebates covering 75 per cent of eligible material and labour costs, up to a maximum of $1,000. More than 90 properties completed upgrades, including installing sump pumps, backup batteries, backwater valves, and water monitors and alarms, to better prepare them for extreme weather events.\nCommunities can learn more about the grant program and how to apply at intactfc.com/mcrg.\nwww.newscanada.com\nWord Count: 281\nNews Canada and L'édition Nouvelles are either registered trademarks or trademarks of News Canada Inc. All rights reserved.", + "page_start": 0, + "page_end": 0, + "source_file": "news2.pdf" + }, + { + "text": "(b) Impacts at 1.5 ° Cglobalwarmingcomparedto2 ° C\nTable 6. Global mean changes at 1.5 ° C global warming compared to present day for individual ensemble members, for the ClimPACT indices, the /flood and drought proxies used as input to the HCVI calculations, and percentage change in mean precipitation (Pmean), mean run-o/ff (Rmean) and low run-o/ff (Rlow).\n.........................................................................................................................................................................................................., ACCESS1-0 = 0.73. /flood proxy", + "page_start": 16, + "page_end": 16, + "source_file": "pubmed11.pdf" + }, + { + "text": "(b) Impacts at 1.5 ° Cglobalwarmingcomparedto2 ° C\nTable 6. Global mean changes at 1.5 ° C global warming compared to present day for individual ensemble members, for the ClimPACT indices, the /flood and drought proxies used as input to the HCVI calculations, and percentage change in mean precipitation (Pmean), mean run-o/ff (Rmean) and low run-o/ff (Rlow).\n.........................................................................................................................................................................................................., GFDL- ESM2M = 0.73. /flood proxy", + "page_start": 16, + "page_end": 16, + "source_file": "pubmed11.pdf" + }, + { + "text": "ISSUE\nDecember 2024", + "page_start": 0, + "page_end": 0, + "source_file": "news4.pdf" + }, + { + "text": "ISSUE\nDecember 2024", + "page_start": 0, + "page_end": 0, + "source_file": "news2.pdf" + }, + { + "text": "(b) Impacts at 1.5 ° Cglobalwarmingcomparedto2 ° C\nTable 6. Global mean changes at 1.5 ° C global warming compared to present day for individual ensemble members, for the ClimPACT indices, the /flood and drought proxies used as input to the HCVI calculations, and percentage change in mean precipitation (Pmean), mean run-o/ff (Rmean) and low run-o/ff (Rlow).\n.........................................................................................................................................................................................................., ensemble mean = 0.42. /flood proxy", + "page_start": 16, + "page_end": 16, + "source_file": "pubmed11.pdf" + }, + { + "text": "(b) Impacts at 1.5 ° Cglobalwarmingcomparedto2 ° C\nTable 6. Global mean changes at 1.5 ° C global warming compared to present day for individual ensemble members, for the ClimPACT indices, the /flood and drought proxies used as input to the HCVI calculations, and percentage change in mean precipitation (Pmean), mean run-o/ff (Rmean) and low run-o/ff (Rlow).\n.........................................................................................................................................................................................................., IPSL- CM5A-MR = 0.73. /flood proxy", + "page_start": 16, + "page_end": 16, + "source_file": "pubmed11.pdf" + }, + { + "text": "(a) Climate-change impacts at 2 ° Cglobalwarming\nTable 5. Global mean changes at 2 ° C global warming compared to present day for individual ensemble members, for the ClimPACT indices, the /flood and drought proxies used as input to the HCVI calculations, and percentage change in mean precipitation (Pmean), mean run-o/ff (Rmean) and low run-o/ff (Rlow).\nensemble mean = 0.61. /flood proxy .........................................................................................................................................................................................................., IPSL- CM5A-LR = 0.83. /flood proxy", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed11.pdf" + }, + { + "text": "(b) Impacts at 1.5 ° Cglobalwarmingcomparedto2 ° C\nTable 6. Global mean changes at 1.5 ° C global warming compared to present day for individual ensemble members, for the ClimPACT indices, the /flood and drought proxies used as input to the HCVI calculations, and percentage change in mean precipitation (Pmean), mean run-o/ff (Rmean) and low run-o/ff (Rlow).\n.........................................................................................................................................................................................................., MIROC- ESM-CHEM = 0.79. /flood proxy", + "page_start": 16, + "page_end": 16, + "source_file": "pubmed11.pdf" + }, + { + "text": "(b) Impacts at 1.5 ° Cglobalwarmingcomparedto2 ° C\nTable 6. Global mean changes at 1.5 ° C global warming compared to present day for individual ensemble members, for the ClimPACT indices, the /flood and drought proxies used as input to the HCVI calculations, and percentage change in mean precipitation (Pmean), mean run-o/ff (Rmean) and low run-o/ff (Rlow).\n.........................................................................................................................................................................................................., IPSL- CM5A-LR = 0.75. /flood proxy", + "page_start": 16, + "page_end": 16, + "source_file": "pubmed11.pdf" + } + ] + }, + { + "references": { + "source_file": "news2.pdf", + "query": "How flooding was prevented in Vancouver? ", + "target_page": 1, + "target_passage": "In Vancouver, B.C., Environmental Youth Alliance and Strathcona Community Gardens created a wetland on downtown’s east side, an area historically prone to flooding. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Three ways Canadian communities are reducing flood risks\n(NC) Communities in Canada are facing increased flood risks, with 1.5 million homes highly exposed. There are large-scale programs available across the country providing flood protection measures for communities at risk, such as Intact's Municipal Climate Resiliency Grants. This program is helping build the resilience of communities and homes through a variety of preventative actions.\nWetlands can reduce flood risk by absorbing large quantities of water, but they are not typically found in cities. In Vancouver, B.C., Environmental Youth Alliance and Strathcona Community Gardens created a wetland on downtown's east side, an area historically prone to flooding. Made up of natural elements like ponds and marshes, the wetland reduces the community's flood risk by catching and absorbing rainfall and runoff from surrounding surfaces.\nKnowing the risks is the first step to protecting homes and communities. In New Brunswick, the City of Fredericton launched a Neighbourhood Flood Risk Tool to provide easy access to online flood prevention guidance. Residents can input their addresses to see if they are at risk and learn tips to reduce the risk of flooding around their properties. The portal launched in the summer of 2023 and was viewed 27,000 times in its first year.\nRebate programs are a powerful motivation for homeowners to make upgrades that might otherwise be put off. In PEI, the City of Charlottetown offered rebates covering 75 per cent of eligible material and labour costs, up to a maximum of $1,000. More than 90 properties completed upgrades, including installing sump pumps, backup batteries, backwater valves, and water monitors and alarms, to better prepare them for extreme weather events.\nCommunities can learn more about the grant program and how to apply at intactfc.com/mcrg.\nwww.newscanada.com\nWord Count: 281\nNews Canada and L'édition Nouvelles are either registered trademarks or trademarks of News Canada Inc. All rights reserved.", + "page_start": 0, + "page_end": 0, + "source_file": "news2.pdf" + }, + { + "text": "Washington State Encourages the Use of Compost, to Protect Our Water Quality\nThe Washington State Department of Ecology recommends that soils on construction sites be restored with compost before planting, and also encourages the use of compost for construction site erosion control, to reduce stormwater runoff and help keep our rivers, lakes, and Puget Sound clean. Learn more at www.SoilsforSalmon.org or www.BuildingSoil.org.", + "page_start": 5, + "page_end": 5, + "source_file": "CompostGuide.pdf" + }, + { + "text": "OPERATIONS REVIEW\nbreakwater will be an over capping type, which interrupts the waves progress, but does not totally protect from wave penetration. These events are manageable and estimated as a once in 50 years possibility.\nThe breakwater core will be used as a construction causeway allowing land based equipment to perform the work. The greater part of the breakwater work involves winning the material as opposed to actual construction.", + "page_start": 15, + "page_end": 15, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "A. DREDGING\nApproximately 700,000 m3 of material is to be dredged in King Bay to form an entrance channel, vessel berths, cyclone moorings and to provide access to the slipway.\nThe experience of Woodside constructing their nearby base in 1981 indicates that two types of dredges will be required, a Cutter Suction to remove the soft unconsolidated material (approx.70%) and a Dipper Dredge (barge mounted back-hoe) to remove harder consolidated material.\nThe Cutter Suction dredge size will be deliberately modest due to onshore spoil management requirement and environmental considerations.\nThe Dipper Dredge will be the largest of its type in the world, and will be an ideal remedial dredging tool using the experience gained from the earlier Woodside project.\nThe layout of the Base has been very much driven by the desire to avoid or minimize blasting while fulfilling functional objectives.\nThe entrance channel into the Mermaid Base will be 30 m wide and dredged to 6 m below chart datum. The dredge spoil will be pumped ashore and used as fill around the Base.\nDredges are expected to be onsite for approximately 7 months commencing mid November.", + "page_start": 13, + "page_end": 13, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "(c) Food security: the Hunger and Climate Vulnerability Index\nTable 2. Proxies for /flood and drought events used in the HCVI.\nextreme weather event, 1 = description of proxy. average length of /flood events, 1 = number of days in which the cumulative daily rainfall excess is positive, compared with the 95th percentile in the 1981-2010 average ........................................................................................................................................................................................................... average length of drought events, 1 = number of days in which the cumulative daily rainfall de/ficit is positive, compared with the 20th percentile in the 1981-2010 average", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed11.pdf" + }, + { + "text": "E. CYCLONE MOORINGS.\nThe extent of the cyclone problem in Australia's north and north west was emphasised when Cyclone Tracey struck Darwin in 1974. The most powerful cyclone to cross the Australian coast was Cyclone Vance in 1999, which passed near Dampier, destroying large parts of the towns of Onslow and Exmouth further to the south.\nThe problem is acute, particularly in the area between Exmouth and Port Hedland, which suffers cyclones of an intensity and frequency as high as anywhere in the world. The Mermaid Base is typically on cyclone alert three times per season. The season is November to April.\nTo date there have been three options available to vessel owners when a cyclone approaches:.\n· Run to sea\n· Take refuge with crew onboard, on a mooring in the most sheltered location available such as the Dampier Archipelago or the Monte Bello Islands.\n· Construct a cyclone shelter.\nThere are serious personal safety and environmental considerations related to Options 1 and 2 and it is obvious that best practice universally adopted by large responsible Companies can be satisfied in this way.\nOnly Woodside at Dampier and BHP at Port Hedand have taken the step of building shelters which provides protection to 12 of the region's 60 vessels and this at very considerable cost.\nMermaid has undertaken significant engineering work on the placing of vessels on partially sheltered spread moorings, allowing the vessels to be secured near to shore and the crews demobilized to take care of their families and attend to household cyclone preparation.\nMermaid is taking a leadership role with a technical solution which will lead to wider adoption as vessel owners and the insurance industry fully value the arrangements. Mermaid will provide\nMERMAID MARINE AUSTRALIA LIMITED\n12", + "page_start": 15, + "page_end": 15, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "Environmentally Friendly Operations\nAt Chesapeake, we realize that the way a great product is produced is as important as the product itself. For example, we have helped pioneer the use of multiwell padsites to drill up to 16 wells from a single location, greatly reducing our land and road use and overall environmental footprint. We use the latest horizontal and directional drilling technology to place wells at a safe distance from homes, schools and businesses. In addition, we build and maintain access roads and work to eliminate soil erosion near our sites, as well as restore local vegetation.\nWe implement advanced, modern protective measures known as Best Management Practices (BMPs) to help ensure energy development is conducted in an environmentally responsible manner. Procedures are implemented throughout our operations to protect freshwater aquifers and reduce environmental impacts. BMPs protect wildlife, air quality, water and landscapes as we work to develop vitally needed domestic energy sources.\nImplemented throughout the entire life cycle of a well, BMPs can be as simple as strategically placing a berm, or land barrier, on locations to control surface water runoff. Others involve cutting-edge operational technologies such as utilizing the most advanced techniques offered in drilling fluids, well casing and cement design. Regardless of complexity, all BMPs are based on the idea that the environmental footprint of\nenergy development should be as small and temporary as possible. These practices are continually evolving and further improving as Chesapeake and the industry develop new innovative techniques and approaches to business.\nIn addition to our BMPs, Chesapeake has also initiated several innovative internal programs focused on water recycling and greener hydraulic fracturing processes.", + "page_start": 27, + "page_end": 27, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "D. BREAKWATER.\nThe rubble mount type breakwater will be an extension of the wharf, constructed using core and armor rock largely won from excavations on the Base. The excavations created will become depositories for dredge spoil.\nBecause the storm surge associated with major cyclones can be up to 7 m above chart datum (low tide), before imposing the wave height, a fully protective breakwater is not practical. The\n11", + "page_start": 14, + "page_end": 14, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "Additional information\nCorrespondence and requests for materials should be addressed to K.L.\nReprints and permissions information is available at www.nature.com/reprints.\nPublisher's note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional a/ffiliations.\nOpen Access /T_his article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. /T_he images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http:// creat iveco mmons. org/ licen ses/ by/4. 0/.\n© /T_he Author(s) 2022\nScientific Reports\n| (2022) 12:17268 |\nhttps://doi.org/ͷͶ.ͷͶ͹;/sͺͷͻͿ;-Ͷ͸͸-͸͸͸͸;-ͽ\nVol:.(1234567890)\nͷͺ", + "page_start": 13, + "page_end": 13, + "source_file": "pubmed9.pdf" + }, + { + "text": "OPERATIONS REVIEW\nThe foreshore of King Bay will be redeveloped as part of the Mermaid Marine Dampier Base Expansion works.\nleased facilities to seven third party vessels and protection for three of our own vessels using this technique by the cyclone season in 2001.\nAs more vessels seek protection, additional breakwaters can be constructed and sea room dredged. Each mooring involves a pattern of pin piles drilled into the granite sea floor with four vessel specific mooring lines secured to special attachment points on the vessel.\nMany smaller vessels including Mermaid's will be lifted from the water and tied down on purpose built cradles for cyclones.", + "page_start": 16, + "page_end": 16, + "source_file": "ASX_MRM_2000.pdf" + } + ] + }, + { + "references": { + "source_file": "news2.pdf", + "query": "How can citizens in Fredericton easily access flood risk data?", + "target_page": 1, + "target_passage": "New Brunswick, the City of Fredericton launched a Neighbourhood Flood Risk Tool to provide easy access to online flood prevention guidance.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Three ways Canadian communities are reducing flood risks\n(NC) Communities in Canada are facing increased flood risks, with 1.5 million homes highly exposed. There are large-scale programs available across the country providing flood protection measures for communities at risk, such as Intact's Municipal Climate Resiliency Grants. This program is helping build the resilience of communities and homes through a variety of preventative actions.\nWetlands can reduce flood risk by absorbing large quantities of water, but they are not typically found in cities. In Vancouver, B.C., Environmental Youth Alliance and Strathcona Community Gardens created a wetland on downtown's east side, an area historically prone to flooding. Made up of natural elements like ponds and marshes, the wetland reduces the community's flood risk by catching and absorbing rainfall and runoff from surrounding surfaces.\nKnowing the risks is the first step to protecting homes and communities. In New Brunswick, the City of Fredericton launched a Neighbourhood Flood Risk Tool to provide easy access to online flood prevention guidance. Residents can input their addresses to see if they are at risk and learn tips to reduce the risk of flooding around their properties. The portal launched in the summer of 2023 and was viewed 27,000 times in its first year.\nRebate programs are a powerful motivation for homeowners to make upgrades that might otherwise be put off. In PEI, the City of Charlottetown offered rebates covering 75 per cent of eligible material and labour costs, up to a maximum of $1,000. More than 90 properties completed upgrades, including installing sump pumps, backup batteries, backwater valves, and water monitors and alarms, to better prepare them for extreme weather events.\nCommunities can learn more about the grant program and how to apply at intactfc.com/mcrg.\nwww.newscanada.com\nWord Count: 281\nNews Canada and L'édition Nouvelles are either registered trademarks or trademarks of News Canada Inc. All rights reserved.", + "page_start": 0, + "page_end": 0, + "source_file": "news2.pdf" + }, + { + "text": "How can I get the information and when?\nAccess to the raw data, pre-prepared data and maps, headline messages and user guidance will be available through a dedicated website.\nA dedicated user interface will provide users with a means to download the data and produce customised visualisations. The exact nature of these outputs is still the subject of consultation with users.\nDetailed descriptions of the scientific basis of the projections will be available as the project progresses. For the latest information visit:\nhttp://ukclimateprojections.metoffice.gov.uk/24125\nUKCP Project Team\nJuly 2017", + "page_start": 3, + "page_end": 3, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "4.5. Educate citizens to understand and use data\nIt is necessary to guarantee the widest possible availability of all the pre-requisites for effective use of Open Data. In other words, it is necessary to provide free and widely accessible training, oriented to average citizens, on how and why to visualize Public Data and use them to make informed\n30/34\nCopyright 2011 LEM, Scuola Superiore Sant'Anna. This work is released under a Creative Commons attribution license (http://creativecommons.org/licenses/by/3.0/)\ndecisions. Ideally, this training should be provided at a local level with local programs, in a way that makes it possible to use it on local issues, for the reasons and in the ways discussed in the next paragraph. For example, visualization techniques like those used by ABC News to show the effects of the March 2011 Japan Earthquake, in which all the user has to do to compare scenes from before and after the earthquake is to move a slider, should be routinely used to explain proposals about urban planning, zoning and related topics.", + "page_start": 29, + "page_end": 30, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "2. Social and political landscape\nmore concrete over time is damage control. In a world that produces digital data without interruption, uncontrolled and unpredictable data releases are facts of life that are very hard to predict, practically impossible to avoid and increasingly common. Opening public government data, that is providing plenty of officially verified information, becomes therefore also a damage control solution, to prevent or at least minimize damages from such uncontrolled releases. Without official Open Public Data, individual citizens, political parties or other organizations will start to process and compare (if they already aren't...) data from unofficial sources anyway, maybe from different countries. In such cases, it will be unavoidable not reach sometimes, even in good faith, wrong conclusions. This is not some theoretical possibility far in the future, as this real world example (from a comment to an Open Data discussion in an italian blog) proves:\n\" on the [non italian] Geonames website you can download geo-referenced data about... 47000 Italian municipalities. That worries me, because there are only 8094 of them. Besides, I grabbed a few random data about population, and I can guarantee you that not one was right. What should be done in such cases?\nFrom an Open Data perspective, all these recent stories have (at least) one thing in common: they suggest that, considering its current needs and problems, current societies want and need more Open Data than they already have.", + "page_start": 4, + "page_end": 4, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "Obtaining Access to S upport S tructures and Municipal Rights of Way\nWe must have access to support structures and municipal rights of way for our cable facilities. We can apply to the CRTC to obtain a right of access under the Telecommunications Act in areas where we cannot secure access to municipal rights of way. Failure to obtain access could increase Cable costs and adversely affect our business.\nThe Supreme Court of Canada ruled in 2003, however, that the CRTC does not have the jurisdiction to establish the terms and conditions of accessing the poles of hydroelectric companies. As a result, we obtained access under orders from the Ontario Energy Board and the New Brunswick Public Utilities Board.", + "page_start": 79, + "page_end": 79, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "2013 Dispositions - Investment Properties\nmHcs, Location = . mHcs, Disposal Date = . mHcs, Sites = . mHcs, Acres = . Burton estates, Location = Burton, nB. Burton estates, Disposal Date = 29-Nov-13. Burton estates, Sites = 91. Burton estates, Acres = 32. crown & currie estates, Location = Fredericton, nB. crown & currie estates, Disposal Date = 29-Nov-13. crown & currie estates, Sites = 176. crown & currie estates, Acres = 140. Kent & Bayview, Location = Bathurst & Beresford, nB. Kent & Bayview, Disposal Date = 29-Nov-13. Kent & Bayview, Sites = 148. Kent & Bayview, Acres = 123. milford estates, Location = saint John, nB. milford estates, Disposal Date = 29-Nov-13. milford estates, Sites = 152. milford estates, Acres = 22. Park P'tiso estates, Location = edmundston, nB. Park P'tiso estates, Disposal Date = 29-Nov-13. Park P'tiso estates, Sites = 79. Park P'tiso estates, Acres = 18. Pine tree Village, Location = moncton, nB. Pine tree Village, Disposal Date = 29-Nov-13. Pine tree Village, Sites = 828. Pine tree Village, Acres = 260. Parkside estates, Location = Quispamis, NB. Parkside estates, Disposal Date = 29-Nov-13. Parkside estates, Sites = 94. Parkside estates, Acres = 15. river east estates, Location = moncton, nB. river east estates, Disposal Date = 29-Nov-13. river east estates, Sites = 109. river east estates, Acres = 72. tamarack estates, Location = Fredericton, nB. tamarack estates, Disposal Date = 29-Nov-13. tamarack estates, Sites = 419. tamarack estates, Acres = 75. White Frost estates, Location = moncton, nB. White Frost estates, Disposal Date = 29-Nov-13. White Frost estates, Sites = 212. White Frost estates, Acres = 51", + "page_start": 48, + "page_end": 48, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "(c) Food security: the Hunger and Climate Vulnerability Index\nUN Food and Agriculture Organization, UN Development Programme and UN Population Fund [22]. The exposure component comprised proxies for the average length of flood and drought events calculated with daily precipitation data [23] (table 2). These proxies were chosen above other possible metrics as they were required to replace self-reported instances of flood and drought events used in the original HCVI, which correlate with undernutrition data at the country-level [23]. The proxies were therefore masked to only include data where a significant proportion of people live and grow crops before aggregating to country level and combining to comprise a measure of exposure [23]; nevertheless, it is recognized that precipitation data alone may not always be adequate for representing flood and drought events, so the current method is regarded as preliminary.\nThe impacts of projected climate change, therefore, act through changes in these quantities. In the current version of the HCVI, climate-change impacts on other quantities such as crop yield are not considered. Socio-economic factors affecting sensitivity and adaptive capacity are fixed at present-day conditions.\nThe ensemble-mean baseline HCVI calculated with the high-resolution bias-corrected HadGEM3 ensemble is shown in figure 1. The spatial pattern is compatible with HCVI values calculated using reanalysis data at the CMIP5 grid-scale resolution [23]; the most vulnerable regions are sub-Saharan Africa and South Asia. This higher-resolution climate data enables inclusion of additional countries which were not resolved in the lower-resolution CMIP5 data.\n6\nrsta.r o y alsociet ypublishing . or g P h i l .T r a n s .R . S o c .A 376 : 2 0160452 ........................................................\nIn the present study, processing errors in the input data for one ensemble member, the HadGEM2-ES-driven member, caused the results to be invalid. Results for this member for the HCVI are, therefore, not presented here.", + "page_start": 5, + "page_end": 6, + "source_file": "pubmed11.pdf" + }, + { + "text": "5. Bibliography\nBesides those explicitly linked from the text, this report has drawn inspiration by many other resources. The most important ones are listed here, but the complete list should be much longer. We wish to thank first the authors of the works listed below and, immediately after, to all the activists, inside and outside governments worldwide, who are working on this topic.\n1. Are you prepared for the pitfalls of Gov 2.0?\n2. Can we use Mobile Tribes to pay for the costs of Open Data?\n3. Canada launches data.gc.ca - what works and what is broken\n4. Creative Commons and data bases: huge in 2011, what you can do\n5. Defining Gov 2.0 and Open Government\n6. How Government Data Can Improve Lives\n7. If you like solar, tell your utility to publish this map\n8. Indian corruption backlash builds after \"year of the treasure hunters\"\n9. Información Cívica / Just What is Civic Information?\n10.Is open government just about information?\n11.LSDI : In un click la mappa del crimine\n12.La casta è online: dategli la caccia!\n13.Linee guida UK sull'opendata\n14.MSc dissertation on Open Government Data in the UK\n15.Open Data (2): Effective Data Use .\n16.Open Data: quali prospettive per la pianificazione?\n17.Open Knowledge Foundation Blog \" Blog Archive \" Keeping Open Government Data\nOpen?\n18.Open data, democracy and public sector reform\n19.Pubblicato Camere Aperte 2011 - blog - OpenParlamento\n20.Reasons for not releasing data in government\n21.The impact of open data: first evidence\n33/34\nCopyright 2011 LEM, Scuola Superiore Sant'Anna. This work is released under a Creative Commons attribution license (http://creativecommons.org/licenses/by/3.0/)", + "page_start": 32, + "page_end": 32, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "(c) Food security: the Hunger and Climate Vulnerability Index\nTable 2. Proxies for /flood and drought events used in the HCVI.\nextreme weather event, 1 = description of proxy. average length of /flood events, 1 = number of days in which the cumulative daily rainfall excess is positive, compared with the 95th percentile in the 1981-2010 average ........................................................................................................................................................................................................... average length of drought events, 1 = number of days in which the cumulative daily rainfall de/ficit is positive, compared with the 20th percentile in the 1981-2010 average", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed11.pdf" + }, + { + "text": "3.2. Creative, unforeseen uses of local Open Data increase\nwith a project called \"Tales of Things\" to allow people to leave messages for each other (or just for the world) at the bus stops. Scanning the QR code now allows people to see not just the bus timetable, but also the notes other travelers have left on that stop, including \"what's nearby, who's waiting for whom, what number can you call for a good time. It's a cross between bus stop Facebook and digital graffiti\" , that happened thanks to the openness of the original bus stop data.\nThe Social Life of Data Project will study instead how particular datasets have been used, who used them, how those people are connected and what conversations happen around Open Data.", + "page_start": 12, + "page_end": 12, + "source_file": "Open_Data_Report.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed2.pdf", + "query": "In these mice, which lumbar levels were the dorsal root ganglion removed from?", + "target_page": 3, + "target_passage": "L3 to L5 DRGs were removed and postfixed for another 2 hours", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "4.5. Conclusions\nIn sum, we have provided data from multiple complementary experimental approaches to support the hypothesis that DRG neurons are lost following nerve injury in mice. We describe a substantial loss, which is biased towards specific subpopulations and particularly present in small-diameter nonpeptidergic nociceptive neurons.", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed2.pdf" + }, + { + "text": "2.8. Dorsal root ganglion culture\nDorsal root ganglia were dissected from MrgD CreERT2 ;Ai32 and Calca CreERT2 ;Ai32 mice . 1 week after dosing with tamoxifen and enzymatically digested at 37˚˚C for 80 minutes in dispase type II (4.7 mg/mL) plus collagenase type II (4 mg/mL) (Worthington Biochemical), as described previously. 63 Mechanically dissociated cells were plated onto laminin/poly-D-lysine (R&D Systems, Minneapolis, MN) treated coverslips in complete Neurobasal Plus medium (Neurobasal Plus media supplemented with 2% (vol/vol) B27 Plus, 1% N2, 1% Glutamax, and 1% antibiotic-antimycotic [ThermoFisher Scientific, Waltham, MA]). Mouse nerve growth factor (GF) (50 ng/mL; nerve growth factor (NGF), PeproTech, Cranbury, NJ) and 10 ng/mL glial-derived neurotrophic factor (GDNF, PeproTech) were added to the media under some conditions. Cytosine b -D-arabinofuranoside (4 m M) was added to the media for 24 hours the day after plating to reduce the proliferation of nonneuronal cells. Media was refreshed 3 times per week thereafter. Cultures were fixed for 10 minutes at room temperature with 4% paraformaldehyde and subsequently processed by immunocytochemistry (described earlier).", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed2.pdf" + }, + { + "text": "Acknowledgments\nThe authors thank Dr Mark Hoon for providing the Trpm8-Flp transgenic mouse line and Prof Andrew Todd and Dr David Hughes for their critical feedback on the manuscript. Neuron and ganglion illustrations in Figure 1 and S1 (http://links.lww.com/ PAIN/C84) were adapted from images provided by Servier Medical Art, licensed under CC BY 4.0. The research was funded by an MRC Fellowship grant awarded to GAW. (MR/T01072X/1) and a Tenovus Scotland Pilot Grant awarded to AHC and GAW (S22-17). This work was also funded by the Wellcome Trust (DPhil scholarship to AMB, 215145/Z/18/Z) and a Wellcome Investigator Grant to D.L.B. (223149/Z/21/Z), as well as the MRC (MR/ T020113/1), and with funding from the MRC and Versus Arthritis to the PAINSTORM consortium as part of the Advanced Pain Discovery Platform (MR/W002388/1). AMB further received a GTC MSDTC Scholarship.", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed2.pdf" + }, + { + "text": "2.6. Tissue clearing and 3D volumetric analyses\nDorsal root ganglia were extracted from animals 4 weeks postSNItrans for whole DRG analyses. In this study, tissue was extracted\nPAIN ®", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed2.pdf" + }, + { + "text": "3.3. Spared nerve injury induces a loss of Trpm8 1 and calcitonin gene-related peptide 1 but not myelinated dorsal root ganglion neurons\nLoss restricted to nonpeptidergic nociceptors would not fully account for the degree of total neuron loss that we observed. Therefore, we studied a range of other subpopulations, both small and large in diameter, for their vulnerability to injury-\ninduced loss. To investigate potential loss of Trpm8 1 (coldsensitive), calcitonin gene-related peptide 1 (CGRP) (peptidergic), and myelinated subpopulations of DRG neurons following nerve injury, we applied our FB-labelling approach in Trpm8 FlpO ; RC::FLTG (FlpO-dependent tdTom expression), Calca CreERT2 ; Ai32 (Cre-dependent ChR2-YFP expression) and Thy1-CFP mice, respectively ( Figs. 4A-D ). Trpm8-tdTom was expressed\n2870\nA.H. Cooper et al. · 165 (2024) 2863-2876\nPAIN ®", + "page_start": 6, + "page_end": 7, + "source_file": "pubmed2.pdf" + }, + { + "text": "3.3. Spared nerve injury induces a loss of Trpm8 1 and calcitonin gene-related peptide 1 but not myelinated dorsal root ganglion neurons\nFigure 3. Spared nerve crush or transection results in death of nonpeptidergic neurons. (A) Schematic of experimental approach for (B and C). (B) MrgD ChR2-YFP L4 DRGs4weeks after SNI, contralateral or ipsilateral to injury. Images are projections of optical sections at 3m mintervals through the entirety of 30m m-thick tissue sections. Scale bars 5 100 m m. (C) Quantification of total number of MrgD-YFP 1 cells per L4 DRG 4 weeks after SNI revealed a significant loss in ipsilateral DRG. Two-way RM ANOVA with ˇ S'ıd 'ak multiple comparisons tests; Side x Treatment interaction: F1,5 5 9.23, P 5 0.029; n 5 3 mice. (D) The experimental approach used to generate data presented in (E-G). (E and F) MrgD-YFP expression and FB labelling in the L4 DRG, 14 days after SNI or crush surgery or contralateral to injury. White boxes represent regions enlarged in (F). Scale bars 5 100 m m(E) or 20 m m(F). (G) The proportion of FB-labelled DRG neurons decreased after spared nerve crush injury, and co-labelling is almost completely absent after SNI. Two-way RM ANOVA with ˇ S'ıd 'ak multiple comparisons tests; side 3 injury interaction: F 1,4 5 7.80, P 5 0.049; n 5 3 mice. Posttests: * P , 0.05, ** P , 0.01. ANOVA, analysis of variance; DRG, dorsal root ganglion; SNI, spared nerve injury; FB, FastBlue; RM, repeated measures.\nDecember 2024 · Volume 165 · Number 12", + "page_start": 7, + "page_end": 8, + "source_file": "pubmed2.pdf" + }, + { + "text": "3.3. Spared nerve injury induces a loss of Trpm8 1 and calcitonin gene-related peptide 1 but not myelinated dorsal root ganglion neurons\nby a population of small-diameter, putative cold-sensitive neurons ( Fig. 4B ), accounting for 8.3 6 0.27% of FB-labelled neurons in contralateral DRG. This decreased to 4.2 6 0.96% ipsilateral to SNItrans injury ( Fig. 4E ), indicating a partial loss of Trpm8 1 afferents. When examining peptidergic afferents, we found that 48.1 6 2.42% of FB-labelled neurons in contralateral DRG were Calca-YFP 1 , compared with 34.3 6 2.54% 4 weeks after SNItrans injury ( Figs. 4C and F ), consistent with a partial loss of CGRP 1 afferents. We used a Thy1-CFP line that demonstrates consistent expression postinjury 61 and labels a sample of medium/large diameter myelinated afferents. CFP was largely restricted to NF200 1 neurons, labelling 56% of this population.\nExpression was present in a heterogenous population of nociceptive (TrkA 1 ) and nonnociceptive (TrkA-) myelinated neurons (Fig. S5, http://links.lww.com/PAIN/C84). Contralateral to injury, 15.6 6 1.8% of FB-labelled neurons expressed Thy1CFP ( Figs. 4D and G ). In contrast to unmyelinated subpopulations, this proportion was higher in ipsilateral DRG following SNItrans (23.3 6 3.2%), consistent with no (or minimal) loss of Thy1-CFP-expressing afferents, accompanied by a loss of Thy1CFP-negative neurons. We did not observe significant alterations in the population distributions of the cross-sectional area of surviving, damaged Trpm8-tdTom 1 , Calca-YFP 1 , or Thy1CFP 1 DRG neurons when compared with DRG contralateral to\nwww.painjournalonline.com\n2871\n2872\nA.H. Cooper et al. · 165 (2024) 2863-2876", + "page_start": 8, + "page_end": 9, + "source_file": "pubmed2.pdf" + }, + { + "text": "References\nmouse: marked changes both in cell numbers and neuropeptide expression. Neuroscience 2001;105:249-63.\n[51] Song H, Yao E, Lin C, Gacayan R, Chen MH, Chuang PT. Functional characterization of pulmonary neuroendocrine cells in lung development, injury, and tumorigenesis. Proc Natl Acad Sci 2012;109:17531-6.\n[52] Takasu K, Sakai A, Hanawa H, Shimada T, Suzuki H. Overexpression of GDNF in the uninjured DRG exerts analgesic effects on neuropathic pain following segmental spinal nerve ligation in mice. J Pain 2011;12: 1130-1139.\n[53] Tandrup T, Woolf CJ, Coggeshall RE. Delayed loss of small dorsal root ganglion cells after transection of the rat sciatic nerve. J Comp Neurol 2000;422:172-80.\n[54] Terenghi G, Hart A, Wiberg M. The nerve injury and the dying neurons: diagnosis and prevention. J Hand Surg Eur Vol 2011;36:730-4.\n[55] Usoskin D, Furlan A, Islam S, Abdo H, Lonnerberg P, Lou D, HjerlingLeffler J, Haeggstrom J, Kharchenko O, Kharchenko PV, Linnarsson S, Ernfors P. Unbiased classification of sensory neuron types by large-scale single-cell RNA sequencing. Nat Neurosci 2015;18:145-53.\n[56] Vestergaard S, Tandrup T, Jakobsen J. Effect of permanent axotomy on number and volume of dorsal root ganglion cell bodies. J Comp Neurol 1997;388:307-12.\n[57] Wall PD, Gutnick M. Properties of afferent nerve impulses originating from a neuroma. Nature 1974;248:740-43.", + "page_start": 13, + "page_end": 13, + "source_file": "pubmed2.pdf" + }, + { + "text": "1. Introduction\nDorsal root ganglion (DRG) neurons represent a molecularly and functionally heterogeneous population. Under normal conditions, this diversity contributes to the ability of the somatosensory nervous system to detect a myriad of sensory stimuli that result in the perceptions of touch, temperature, itch, and pain. Following nerve injury, physiological changes in DRG neurons lead to hyperexcitability, 57 which is a key pathological driver of neuropathic pain. 20,63 Concomitant molecular changes in discrete subpopulations also occur, and these have recently been comprehensively described in single-cell 37,44 and subpopulation-specific sequencing studies. 3 These studies describe a transient and generalized reduction in the expression of subpopulation-specific genes following nerve injury. 3,37,44\nIn addition to molecular changes, there is a rich literature describing the frank loss of DRG neurons following traumatic\nSponsorships or competing interests that may be relevant to content are disclosed at the end of this article.\na School of Psychology and Neuroscience, University of Glasgow, Glasgow, United Kingdom, b Nuffield Department of Clinical Neurosciences, University of Oxford, Oxford, United Kingdom\n*Corresponding author. Address: School of Psychology and Neuroscience, University of Glasgow, Glasgow G12 8QQ, United Kingdom. Tel.: 1 44 (0) 141 330 7023. E-mail address: gregory.weir@glasgow.ac.uk (G.A. Weir).\nSupplemental digital content is available for this article. Direct URL citations appear in the printed text and are provided in the HTML and PDF versions of this article on the journal's Web site (www.painjournalonline.com).\nCopyright © 2024 The Author(s). Published by Wolters Kluwer Health, Inc. on behalf of the International Association for the Study of Pain. This is an open access article distributed under the Creative Commons Attribution License 4.0 (CCBY), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.\nhttp://dx.doi.org/10.1097/j.pain.0000000000003321\nDecember 2024 · Volume 165 · Number 12", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed2.pdf" + }, + { + "text": "3.3. Spared nerve injury induces a loss of Trpm8 1 and calcitonin gene-related peptide 1 but not myelinated dorsal root ganglion neurons\ninjury (Fig. S6A-C, http://links.lww.com/PAIN/C84), indicating that any loss of neurons within specific neuronal subpopulations wasnot biased towards soma size. Collectively, these data show that unrepaired axonal damage to peripheral sensory neurons induces a partial loss of Trpm8 1 and CGRP 1 subpopulations, but no major loss of myelinated afferents.\nBased on our findings of preferential loss of nonpeptidergic nociceptors, we re-analyzed a previous population-specific transcriptomic dataset of mouse DRG neurons following nerve injury for potential upregulation of cell death pathways (Fig. S7, http://links.lww.com/PAIN/C84). 3 Wefound that early after injury (3 days post-SNItrans), nonpeptidergic (MrgD CreERT2 -expressing) neurons showed enhanced enrichment of GO terms associated with apoptosis, in contrast to a broad population of nociceptors (labelled with Scn10a CreERT2 ), peptidergic nociceptors (CalcaCreERT2 ), C-LTMRs (Th CreERT2 ), and A b -RA (rapidly adapting) and A d -LTMRs (A d /A b -LTMR, Ntrk2 CreERT2 ;Advillin FlpO ), in which there was less or no enrichment of cell death pathways. By 4 weeks, only C-LTMR and A d /A b -LTMR subtypes show any overrepresentation of cell death pathways (in the populations studied). Both injury-specific and apoptotic signatures in nonpeptidergic neurons were no longer significantly enriched, consistent with a loss of axotomized nonpeptidergic afferents by this late timepoint postinjury. These data suggest that apoptotic pathways are upregulated acutely after injury in a celltype-specific manner.", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed2.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed2.pdf", + "query": "Did the researcher responsible for quantifying the cells in the dorsal root ganglion know which group each mouse belonged to?", + "target_page": 4, + "target_passage": "During all image quantification, the experimenter was blind to the experimental groups.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "4.5. Conclusions\nIn sum, we have provided data from multiple complementary experimental approaches to support the hypothesis that DRG neurons are lost following nerve injury in mice. We describe a substantial loss, which is biased towards specific subpopulations and particularly present in small-diameter nonpeptidergic nociceptive neurons.", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed2.pdf" + }, + { + "text": "3.2. Spared nerve crush or transection results in death of Mrgprd-expressing neurons\nTo date, determining cell loss among specific populations of afferent neurons has proved challenging due to the downregulation of subpopulation-specific marker genes following axonal transection. 37,44 To overcome this issue, we took advantage of transgenic strategies to label populations in a manner that persisted after injury. Owing to the bias for the loss of small neurons and the known loss of IB4-binding central terminals postinjury, 36 we initially focused on nonpeptidergic nociceptive neurons. We used MrgD ChR2-YFP mice to identify neurons belonging to the largest of the 3 classes of nonpeptidergic nociceptors, NP1. 55,59 To determine whether these neurons are lost following nerve injury, we used a stereological method to quantify L4 DRG MrgD-YFP 1 (yellow fluorescent\n2868\nA.H. Cooper et al. · 165 (2024) 2863-2876\nPAIN ®", + "page_start": 4, + "page_end": 5, + "source_file": "pubmed2.pdf" + }, + { + "text": "2.5. Image analysis\nFor quantification of the proportion of FB-labelled cells colabelled with afferent subpopulation markers, initially, the total number of FB-filled neuronal cell profiles with a visible nucleus anywhere within the section was counted, with the observer blind to other channels. The other channel was then revealed, and instances of co-labelling were quantified. No stereological correction was applied, given that the similar size of neuronal nuclei would prevent over-counts of large neurons and that no comparisons of the total number of labelled cells were made. For soma area analyses, the area of neuronal soma expressing the appropriate marker was measured in the optical section within the Z-stack in which that neuron was at its largest, by drawing around the perimeter of the neuron in Fiji/ImageJ v2.14.0/1.54f.", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed2.pdf" + }, + { + "text": "4.4. Study limitations\nOur efforts focused on traumatic nerve injury paradigms owing to previous contrasting results using these robust and reproducible experimental models. We did not extend our studies to systemic neuropathy models, such as chemotherapy or diabetic neuropathy. A recent postmortem analysis reported a neuronal loss in the DRG from patients with painful diabetic peripheral neuropathy. 19 Transcriptional responses vary substantially across different nerve insults, 44 so it would be of interest to test whether neuronal loss and the subpopulation vulnerability reported in this study are common features across different types of insults.\nUsing multiple approaches, we assess the na¨ıve mouse L4 DRG to contain approximately 8000 neurons, consistent with a previous estimate, 67 and observed a frank loss of smalldiameter neurons following injury. However, the extent of loss observed using our semiautomated approach was less than that observed using manual techniques. 67 Two major limitations in this study may explain this discrepancy: First, owing to technical issues, the cleared DRG dataset is unpaired ipsilateral-contralateral which adds larger variability. Second, the analysis method is prone to undercounting deep nuclei. The signal-to-noise is better for superficial nuclei and smaller tissue volumes. Given the reduction in DRG volume after SNItrans, nuclei in larger contralateral DRG may be undercounted.\nWhile we made efforts to profile the loss of several molecularly discrete sensory neuron populations, we acknowledge that not all subtypes were profiled. Furthermore, recent single-cell RNA sequencing has given us a more granular appreciation of the heterogeneity of sensory neurons. 42 Future studies could leverage our experimental approach and new transgenic lines to characterize the loss of neurons in more detail. Such experiments may be pertinent before embarking on molecular or functional profiling of populations post-nerve injury.", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed2.pdf" + }, + { + "text": "1. Introduction\nnerve injury in experimental rodent models. 24,50,53,56 Some studies have suggested that neuron loss occurs in certain patient cohorts, 48,66 but this is yet to be definitively demonstrated in humans. In rodents, most studies support a preferential loss of small cells that give rise to unmyelinated fibers 53 but some contrasting studies describe the preferential loss of large cells 6 or loss of cells of all sizes. 46 Variation is evident across studies in terms of experimental species, age, type of injury, and quantification methods. 56 Shi et al. 50 used stereological counting methods to identify a 54% loss of DRG neuron number 4 weeks after 'mid-thigh' sciatic nerve transection in C57BL/6 mice. Estimates for the degree of loss following commonly used nerve injury paradigms (eg, spared nerve injury [SNI] and sciatic nerve crush) are not available and because of the neurochemical changes following injury and the loss of subpopulation marker gene expression, 5,44,50 the vulnerability of molecularly defined subpopulations has not been characterized. Moreover, more recent studies have cast doubt on the extent or even presence of DRG neuron death following nerve injury. One study which developed a deep learning approach to assess rat DRG cellular plasticity found no loss of neurons up to 2 weeks post-SNI, 49 while another observed no loss of genetically labelled damaged DRG neurons 2 months after sciatic nerve crush. 44\nThe issue of whether neuron loss occurs, and if so, in what subpopulations, is important. It will likely have implications for our understanding of reinnervation and functional recovery in patients. Furthermore, better insight will provide critical context for those investigating the plasticity that occurs following nerve injury and may inform therapeutic targeting of sensory neuron populations.\nAn expanding repertoire of transgenic recombinase driver lines now makes it possible to permanently label DRG neuron subpopulations and study their fate in rodent nerve injury paradigms. The aim of this study was to use this technology to characterize\nwww.painjournalonline.com\n2863\n2864\nA.H. Cooper et al. · 165 (2024) 2863-2876\nneuron loss after nerve injury and to test the hypothesis that loss is not equally distributed across molecular populations.", + "page_start": 0, + "page_end": 1, + "source_file": "pubmed2.pdf" + }, + { + "text": "1. Introduction\nDorsal root ganglion (DRG) neurons represent a molecularly and functionally heterogeneous population. Under normal conditions, this diversity contributes to the ability of the somatosensory nervous system to detect a myriad of sensory stimuli that result in the perceptions of touch, temperature, itch, and pain. Following nerve injury, physiological changes in DRG neurons lead to hyperexcitability, 57 which is a key pathological driver of neuropathic pain. 20,63 Concomitant molecular changes in discrete subpopulations also occur, and these have recently been comprehensively described in single-cell 37,44 and subpopulation-specific sequencing studies. 3 These studies describe a transient and generalized reduction in the expression of subpopulation-specific genes following nerve injury. 3,37,44\nIn addition to molecular changes, there is a rich literature describing the frank loss of DRG neurons following traumatic\nSponsorships or competing interests that may be relevant to content are disclosed at the end of this article.\na School of Psychology and Neuroscience, University of Glasgow, Glasgow, United Kingdom, b Nuffield Department of Clinical Neurosciences, University of Oxford, Oxford, United Kingdom\n*Corresponding author. Address: School of Psychology and Neuroscience, University of Glasgow, Glasgow G12 8QQ, United Kingdom. Tel.: 1 44 (0) 141 330 7023. E-mail address: gregory.weir@glasgow.ac.uk (G.A. Weir).\nSupplemental digital content is available for this article. Direct URL citations appear in the printed text and are provided in the HTML and PDF versions of this article on the journal's Web site (www.painjournalonline.com).\nCopyright © 2024 The Author(s). Published by Wolters Kluwer Health, Inc. on behalf of the International Association for the Study of Pain. This is an open access article distributed under the Creative Commons Attribution License 4.0 (CCBY), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.\nhttp://dx.doi.org/10.1097/j.pain.0000000000003321\nDecember 2024 · Volume 165 · Number 12", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed2.pdf" + }, + { + "text": "Abstract\nThere is a rich literature describing the loss of dorsal root ganglion (DRG) neurons following peripheral axotomy, but the vulnerability of discrete subpopulations has not yet been characterised. Furthermore, the extent or even presence of neuron loss following injury has recently been challenged. In this study, we have used a range of transgenic recombinase driver mouse lines to genetically label molecularly defined subpopulations of DRG neurons and track their survival following traumatic nerve injury. We find that spared nerve injury leads to a marked loss of cells containing DRG volume and a concomitant loss of small-diameter DRG neurons. Neuron loss occurs unequally across subpopulations and is particularly prevalent in nonpeptidergic nociceptors, marked by expression of Mrgprd. We show that this subpopulation is almost entirely lost following spared nerve injury and severely depleted (by roughly 50%) following sciatic nerve crush. Finally, we used an in vitro model of DRG neuron survival to demonstrate that nonpeptidergic nociceptor loss is likely dependent on the absence of neurotrophic support. Together, these results profile the extent to which DRG neuron subpopulations can survive axotomy, with implications for our understanding of nerve injury-induced plasticity and pain.\nKeywords: Sensory neuron, Neuron death, Transgenic reporter line, Neuropathic pain, Nerve injury", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed2.pdf" + }, + { + "text": "Acknowledgments\nThe authors thank Dr Mark Hoon for providing the Trpm8-Flp transgenic mouse line and Prof Andrew Todd and Dr David Hughes for their critical feedback on the manuscript. Neuron and ganglion illustrations in Figure 1 and S1 (http://links.lww.com/ PAIN/C84) were adapted from images provided by Servier Medical Art, licensed under CC BY 4.0. The research was funded by an MRC Fellowship grant awarded to GAW. (MR/T01072X/1) and a Tenovus Scotland Pilot Grant awarded to AHC and GAW (S22-17). This work was also funded by the Wellcome Trust (DPhil scholarship to AMB, 215145/Z/18/Z) and a Wellcome Investigator Grant to D.L.B. (223149/Z/21/Z), as well as the MRC (MR/ T020113/1), and with funding from the MRC and Versus Arthritis to the PAINSTORM consortium as part of the Advanced Pain Discovery Platform (MR/W002388/1). AMB further received a GTC MSDTC Scholarship.", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed2.pdf" + }, + { + "text": "4. Discussion\nWe present data herein to support the hypothesis that traumatic nerve injury in rodents leads to a profound loss of small-diameter DRG neurons. Taking advantage of newly\nPAIN ®\ndeveloped transgenic recombinase driver lines, we have shown that loss is biased across molecularly defined subpopulations. Nonpeptidergic nociceptive neurons are particularly susceptible to loss, with almost all Mrgprd 1 axotomized afferents lost following an unrepaired transection injury (SNItrans) and roughly half lost following a model which contrastingly allows for nerve regenerations (SNIcrush). Finally, we have observed that the vulnerability of Mrgprd 1 neurons extends to the in vitro setting and provide data to support the hypothesis that loss is driven by a lack of neurotrophic support following injury.", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed2.pdf" + }, + { + "text": "References\nmouse: marked changes both in cell numbers and neuropeptide expression. Neuroscience 2001;105:249-63.\n[51] Song H, Yao E, Lin C, Gacayan R, Chen MH, Chuang PT. Functional characterization of pulmonary neuroendocrine cells in lung development, injury, and tumorigenesis. Proc Natl Acad Sci 2012;109:17531-6.\n[52] Takasu K, Sakai A, Hanawa H, Shimada T, Suzuki H. Overexpression of GDNF in the uninjured DRG exerts analgesic effects on neuropathic pain following segmental spinal nerve ligation in mice. J Pain 2011;12: 1130-1139.\n[53] Tandrup T, Woolf CJ, Coggeshall RE. Delayed loss of small dorsal root ganglion cells after transection of the rat sciatic nerve. J Comp Neurol 2000;422:172-80.\n[54] Terenghi G, Hart A, Wiberg M. The nerve injury and the dying neurons: diagnosis and prevention. J Hand Surg Eur Vol 2011;36:730-4.\n[55] Usoskin D, Furlan A, Islam S, Abdo H, Lonnerberg P, Lou D, HjerlingLeffler J, Haeggstrom J, Kharchenko O, Kharchenko PV, Linnarsson S, Ernfors P. Unbiased classification of sensory neuron types by large-scale single-cell RNA sequencing. Nat Neurosci 2015;18:145-53.\n[56] Vestergaard S, Tandrup T, Jakobsen J. Effect of permanent axotomy on number and volume of dorsal root ganglion cell bodies. J Comp Neurol 1997;388:307-12.\n[57] Wall PD, Gutnick M. Properties of afferent nerve impulses originating from a neuroma. Nature 1974;248:740-43.", + "page_start": 13, + "page_end": 13, + "source_file": "pubmed2.pdf" + } + ] + }, + { + "references": { + "source_file": "basic-english-language-skills.PDF", + "query": "Does the Oxbridge Academy have a guide on how to apply to college?", + "target_page": 21, + "target_passage": "To make the college registration process easier for you, we’ve compiled a comprehensive guide on how to register at Oxbridge Academy (www.oxbridgeacademy.co.za/enrol-now/).", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "TIPS FOR FILLING IN YOUR COLLEGE REGISTRATION FORM\nApplying for college (www.oxbridgeacademy.co.za/enrol-now/) can be a daunting experience. Not only do you need to choose a course, but you also need to make sure that you:\n· meet the entry requirements\n· meet the deadlines\n· fill in the forms correctly\n· send the forms to the right address\n· include all the necessary attachments\nTo make the college registration process easier for you, we've compiled a comprehensive guide on how to register at Oxbridge Academy (www.oxbridgeacademy.co.za/enrol-now/). The guide also includes general tips that will be relevant to the application and registration processes at other colleges.", + "page_start": 20, + "page_end": 20, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "1. Read (and follow) the instructions carefully.\nIf you are an Oxbridge Academy student, the general assignment guidelines will be provided in your 'Success' Study Guide. Specific instructions will also be included at the beginning of each of your assignments.", + "page_start": 37, + "page_end": 37, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "There are 4 steps you need to follow when you want to register as a student at Oxbridge Academy:\n1. Select Your Course\n2. Fill in Your Student Details\n3. Select Your Delivery Option\n4. Pay Your Registration Fee and Send in Your Form\nBasic English Language Skills", + "page_start": 20, + "page_end": 21, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "STEP 1 - SELECT YOUR COURSE\nOxbridge Academy Short Course: Marketing Management\nADV101\nBefore you start filling in the registration form, you need to choose your course. Once you've identified the course that you would like to study, remember to check that you meet the entry requirements.\nYou can find the course name and course code for your chosen course on the relevant detailed course information page on our website. Have a look at the example in the screenshot below (the course name and course code are circled in red):\nPlease make sure to check the accreditation status of your chosen course. Some of our courses are non-credit bearing skills development courses, which are neither accredited by external bodies nor registered on the NQF. Please go to our website: oxbridgeacademy.co.za for more information about our skills development courses.\nDeveloped for Oxbridge Academy\nBasic English Language Skills", + "page_start": 21, + "page_end": 22, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "Did you enjoy reading this book?\nJoin our online social community and share your opinion:\nwww.facebook.com/oxbridgeacademysa twitter.com/oxbridgeEdu www.linkedin.com/company/oxbridge-academy\nOxbridge Academy is an established distance learning college offer -ing skills courses, national qualifications, and internationally recognised courses to students in South Africa and abroad.\nWith our head office in Stellenbosch in the Western Cape, we cater to our students' needs by recruiting industry-expert tutors to provide academic assistance via telephone and e-mail, as well as by designing our study material in such a way that it is clear, simple, and easy for our students to understand.\nWith us, studying from home is easy, affordable, and convenient.", + "page_start": 58, + "page_end": 58, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "STEP 4 - PAY YOUR REGISTRATION FEE AND SEND IN YOUR FORM\nDifferent courses have different registration fees. Please check the course fees list (www.oxbridgeacademy.co.za/Documents/ Price-list-2015.pdf) to find out how much you need to pay to register for your chosen course, and pay this amount using the banking details provided at the bottom of the registration form. Remember to attach your proof of payment.\nIf you are under the age of 18, your parent or guardian will need to sign this section of the form to state that they are aware of your registration with Oxbridge Academy, and that they do not have any objections. If you are unemployed, you will need a guarantor to sign this section of the form. Your parent or guarantor will be held responsible if you miss any of your payments in relation to your course fees.\nDeveloped for Oxbridge Academy\n3\nBasic English Language Skills\n4\nSend your registration form to the registrations office at Oxbridge Academy via one of the following channels:\nFax:\n086 262 5550\nPost: PO Box 12723, Die Boord, 7613 E-mail: registrar@oxbridgeacademy.co.za\n6\nBasic English Language Skills", + "page_start": 25, + "page_end": 27, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "Be clear and concise.\nMake sure that your tutor will be able to understand what it is that you are asking.\nDeveloped for Oxbridge Academy\nBasic English Language Skills", + "page_start": 33, + "page_end": 34, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "CONTACT NUMBERS:\nTel: 021 1100 200 Tel:+2721 883 2454 (international) Fax: 086 111 2121\nFax: +2721 883 2378 (international)\nWhatsapp: 0605671585 Email: info@oxbridgeacademy.co.za\nPostal Address:\nPO Box 12723, Die Boord, Stellenbosch, 7613\nWe are registered with the Department of Higher Education and Training as a Private College in terms of Section 31(6)(a) of the Continuing Education and Training Act, 2006 (Act No. 16 of 2006). Registration No. 2009/FE07/070.\nDeveloped for Oxbridge Academy", + "page_start": 58, + "page_end": 58, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "TIPS FOR COMPLETING YOUR WRITTEN ASSIGNMENTS\nDepending on which course you study, you will either be assessed by means of written assignments, or through a combination of written assignments and exams. Assignments not only help to deepen your understanding of the work, but they often also count toward your final mark.\nIt is therefore important that you put effort into your assignments, and that you complete them to the best of your ability.\nWe realise that, like many other students, you might be unsure of how to go about completing your assignments, or that you might be afraid of failure.\nIf you are an Oxbridge Academy student, we'd like you to know that we are here to help you every step of the way, and that we will give you the opportunity to resubmit your assignments if you don't achieve a pass mark the first time around.\nBasic English Language Skills", + "page_start": 36, + "page_end": 37, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "HOW TO ASK FOR HELP FROM YOUR TUTOR\nAs a student, you are going to experience times when you need help with your studies. You might be unsure about an assignment question, you might be confused by a particular concept, or you might be stressed about the upcoming exams.\nAnd if you are studying via distance learning (www.oxbridgeacademy.co. za/distance-learning/), where you don't have any face-to-face interaction with lecturers, you will need to rely on your tutors for the necessary academic support.\nBasic English Language Skills\nIf you have any questions about your course work, you are always welcome to approach your tutors for help. Just remember that your tutors cannot guess what your needs are: you will have to make contact with your tutors and communicate your questions clearly if you want to get the assistance that you need.\nWhen it comes to contacting your tutors, your best option will usually be to send an e-mail.\nHere are some important tips to keep in mind when requesting help from a tutor via e-mail:", + "page_start": 32, + "page_end": 33, + "source_file": "basic-english-language-skills.PDF" + } + ] + }, + { + "references": { + "source_file": "basic-english-language-skills.PDF", + "query": "I have trouble writing effective summaries in English, do you have any tips?", + "target_page": 29, + "target_passage": "To make a good summary, you need to: • Keep it brief. • Make sure to use main headings and keywords. • Focus on the main ideas. • Classify and organise the information in a logical manner. • Use your own words where possible. • Include examples. • Remember that your summaries are there to help you", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "To make a good summary, you need to:\n· Keep it brief.\n· Make sure to use main headings and keywords.\n· Focus on the main ideas.\n· Classify and organise the information in a logical manner.\n· Use your own words where possible.\n· Include examples.\n· Remember that your summaries are there to help you.", + "page_start": 28, + "page_end": 28, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "Summarise:\nGive the main points\nBasic English Language Skills", + "page_start": 40, + "page_end": 41, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "General Tips for Making Summaries\n· Underline or highlight key points as you work through your study material, and make notes.\n· When you come across a word or concept you don't understand, look it up in a dictionary, or do some research on the concept, and add your own definition to your summary.\nDeveloped for Oxbridge Academy\nBasic English Language Skills", + "page_start": 31, + "page_end": 32, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "SUMMARISING YOUR WORK GIVES YOU AN OPPORTUNITY TO:\n· Organise your study material into a structure that makes sense to you.\n· Arrange your study material into a format that suits your learning style.\n· Create memory aids for yourself.\n· Identify key ideas and concepts.\n· Focus on what's important.\n· Prepare for exams more easily.\nDeveloped for Oxbridge Academy\nBasic English Language Skills", + "page_start": 27, + "page_end": 28, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "Do the following:\n25. Create a mind map to summarise Chapter 7 (How to Ask for Help from Your Tutor). (5)\n26. List 3 things you need to do if you want to earn good marks for your written assignments. (3)\n27. List 5 important things to keep in mind when writing a cover letter.\n(5)\n28. List 5 of the things that you should include in a resignation letter.\n(5)\n29. List 3 methods you can use to summarise your study material. (3)\n30. Give 2 examples of how good language skills can benefit your ca -reer. (2)\n31. Complete the following sentence:\nSummarising your study material gives you the opportunity to\nDeveloped for Oxbridge Academy\nBasic English Language Skills", + "page_start": 57, + "page_end": 58, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "SO WHAT EXACTLY IS A SUMMARY?\nA summary is more than just a condensed or shortened version of your work. A summary requires you to analyse your study material, to identify the key concepts, and to explain it in your own words.", + "page_start": 28, + "page_end": 28, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "Discuss:\nConsider the topic from various points of view.\nBasic English Language Skills", + "page_start": 39, + "page_end": 39, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "7. When it comes to essay questions:\n· Plan/outline your answer before doing the final draft.\n· Remember that essays have titles, introductions, bodies, and conclusions.\n· Use headings and paragraphs to structure your answer.\nDeveloped for Oxbridge Academy\nBasic English Language Skills\n· Each paragraph should contain one main thought or idea, and there should be a logical link between each paragraph and the next.\n· Make sure that you focus on answering the question - only include relevant information, and remember to present logical arguments in support of your answer.\n8. Proofread your assignment before handing it in. Tip: read your answers out loud to make sure that they sound logical.", + "page_start": 37, + "page_end": 38, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "LEARN HOW TO SUMMARISE YOUR STUDY MATERIAL\nTo be successful in your studies, you need to learn how to create meaningful summaries of your course material. This is especially important if you are a distance learning student (www.oxbridgeacademy. co.za/distance-learning/), as you won't have a teacher or lecturer to point out key concepts, or to give you tips about the types of questions you can expect in the exams.", + "page_start": 27, + "page_end": 27, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "BULLET POINTS OR LISTS\nIf you find that you memorise things more easily when they are in list form, then it might be a good idea to use bullet points when summarising your work.\nUsing bullet points can help you to understand (and memorise) your work more easily, as it requires you to:\n· Identify the key points that you want to include in your lists.\n· Come up with a logical structure for your lists.\n· Categorise information into relevant lists.\nHere is an example:", + "page_start": 29, + "page_end": 29, + "source_file": "basic-english-language-skills.PDF" + } + ] + }, + { + "references": { + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf", + "query": "Is exposure to risk factors that may affect mental wellbeing at work comparable across European countries?", + "target_page": 25, + "target_passage": "The country data vary significantly. Sweden, Greece and Luxembourg report over two-thirds such exposures, and Germany, Lithuania and Czechia one-third or less.", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "References and notes\n12 Eurostat: Persons reporting exposure to risk factors that can adversely affect mental well-being by sex, age and factor, data here and explanatory metadata here\n13 It has to be noted that in 2007 and 2013 the interviews were done face-to-face. In 2020 the interviews were conducted either face-to-face or by phone, depending on the public health measures in each country. The responses were influenced by work under conditions of the pandemic.\n14 Eurostat: Persons reporting exposure to risk factors that can adversely affect mental well-being by sex, age and educational attainment level\n15 Rigó et al., 2021: Work stress on rise? Comparative analysis of trends in work stressors using the European working conditions survey\n16 WHO/ILO, 2021: WHO/ILO joint estimates of the work-related burden of disease and injury, 2000-2016: Global monitoring report (p. 35ff).\n17 Eurostat provide data for the periods before and after the NACE revision in 2008. Data for 2019: Average number of usual weekly hours of work in main job, by sex, professional status, full-time/part-time and economic activity (from 2008 onwards, NACE Rev. 2), here Filter: Full-time, 15-64 years, all NACE sectors. Data for 2006: Average number of usual weekly hours of work in main job, by sex, professional status, full-time/part-time and economic activity (1998-2008, NACE Rev. 1.1), here\n18 Eurostat, 2018: How many hours do Europeans work per week? Average number of usual weekly hours of work in main job, by sex, professional status, full-time/part-time and economic activity (from 2008 onwards, NACE Rev. 2) - hours[lfsa_ewhun2], here\n19 Mean duration of commuting time one-way between work and home by sex and age (source: Eurofound), Here", + "page_start": 140, + "page_end": 140, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "3.1 Psychosocial risks at work\nConcerning the complaints about poor communication and cooperation within the organisation, all three Nordic EU Member States are represented in the seven countries with the highest burden, together with several central European countries. This is valid for both selected groupings, 'All sectors' and 'HHSW'.\nRegarding long or irregular working hours , we see a mix of countries from all regions. The order of countries in the sector HHSW - a mixture of countries from the East, South and North - is probably due to specific sectoral regulations of working times. Sweden is at the top in HHSW with 57%, followed by Denmark, Cyprus, Latvia and Czechia, all between 44% and 48%.\nMany analyses of psychosocial risks include other relevant factors like decision latitude (or decision authority) and skill discretion (level of skill and creativity required on the job). In a long-term analysis of the responses to the EWCS between 1995 and 2015, the authors conclude: 15\n'Our findings suggest that work stress generally increased from 1995 to 2015, and that the increase was mostly driven by psychological demands. People working in lower-skilled occupations had generally higher levels of job strain and effort-reward imbalance, as well as they tend to have a steeper increase in job strain than people working in higher-skilled occupations. Most of the change occurred from 1995 to 2005.'\nAccording to this study, the differences between the skills groups are significant, below illustrated for the development of 'Psychological demands' and 'Job strain' ; for these two indicators high-skilled and low-skilled manual workers are at the top of the scale.\nFigure 4: Psychosocial risk factors - Differences between skill groups (Job strain)\nEuropean Agency for Safety and Health at Work - EU-OSHA\n27\nOccupational safety and health in Europe - state and trends 2023\nFigure 5 : Psychosocial risk factors - Differences between skill groups (Psychological demand)\nRegarding the other two analysed indicators, decision authority and skill discretion , the clerical workers show higher levels (a positive outcome) and both manual worker groups are at the lowest level.\nFigure 6: Psychosocial risk factors - Differences between skill groups (Decision authority)\nEuropean Agency for Safety and Health at Work - EU-OSHA\n28\nOccupational safety and health in Europe - state and trends 2023\nFigure 7: Psychosocial risk factors - Differences between skill groups (Skill discretion)", + "page_start": 26, + "page_end": 28, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "3.1 Psychosocial risks at work\n1. Severe time pressure or overload of work;\n2. Violence or threat of violence;\n3. Harassment or bullying;\n4. Poor communication or cooperation within the organisation;\n5. Having to deal with difficult customers, patients, pupils etc.;\n6. Job insecurity;\n7. Lack of autonomy, or lack of influence over the work pace or work processes; and\n8. Another significant risk factor for mental well-being.\nForty-five per cent of the employed persons reported being exposed to risk factors that can adversely affect mental wellbeing. The country data vary significantly. Sweden, Greece and Luxembourg report over two-thirds such exposures, and Germany, Lithuania and Czechia one-third or less. 13\nEuropean Agency for Safety and Health at Work - EU-OSHA\n25\nOccupational safety and health in Europe - state and trends 2023\nFigure 3: 'Exposure to risk factors adversely affecting mental wellbeing' - LFS Ad hoc survey 2020 14\nESENER 2019 reveals that several psychosocial risk factors are reported to be present in a significant share of establishments in the EU27, namely having to deal with difficult customers, patients and pupils (59%) and time pressure (45%).\nThe aspects 'Difficult clients', 'Poor communication' and 'Long working hours' are major psychosocial risks. The increase of workforce in communicative and client-oriented occupations - social work, education, tourism and entertainment, health and care - during the last 30 years adds to the conventional work with clients in service, sales and health occupations.\nThe next table shows the top seven EU Member states with the highest share of these risks for all sectors and for the sector 'Human health and social work activities' (HHSW).\nTable 1: Psychosocial risks, Top countries 'All Sectors' and 'Human health and social work' - ESENER 2019\nDifficult customers, patients and pupils ('clients') seem to be the most widespread psychosocial burden, with workers in Portugal, Malta and Cyprus are most exposed. In the sector HHSW, eastern European countries are much more present, Slovenia at the top, followed by Portugal, Estonia, Poland and Bulgaria.\nEuropean Agency for Safety and Health at Work - EU-OSHA\n26\nOccupational safety and health in Europe - state and trends 2023", + "page_start": 24, + "page_end": 26, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "3.1 Psychosocial risks at work\nDuring the last 30 years, the scientific, political and practical discussions on psychosocial risks and preventive measures against psychosocial risks have gained strong importance. After a period of doubts and resistance, today they are regarded as risks of the same severity as the classical physical safety and health risks. 4 (Chapter 1 covers the psychosocial risk aspect; for the prevalence of mental diseases and the burden of mental diseases see Chapter 2.2. 5 )\nLooking at the steady increase of certain psychosocial risk indicators at workplace level, either the risks have increased and/or the number of people working in occupations with higher psychosocial risks has increased. 6,7 This is valid, for example, for the indicator time pressure, for example, in delivery services, transport, and often also clerical work; the workforce has grown in sectors where emotional demands from dealing with difficult clients, customers, pupils or patients are common; there are also more workers employed (or self-employed) in interactional occupations, for example, in call centres, or in occupations with a high level of emotional tensions, for example, education, health and care.\nFigure 2: Risk factors that can adversely affect mental wellbeing - EWCS 8 and ESENER 9\nA major difference between the ESENER and the EWCS survey is the respondent. In ESENER those persons who are most familiar with OSH or responsible for OSH in an enterprise were asked whether a certain risk factor exists in the enterprise; in the EWCS survey workers themselves were asked whether they are exposed to a risk factor.\nEuropean Agency for Safety and Health at Work - EU-OSHA\n24\nOccupational safety and health in Europe - state and trends 2023\nIn 2007, 2013 and 2020, Eurostat asked employed persons in its ad hoc surveys to the Labour Force Survey (LFS) whether they had '… exposure to risk factors that can adversely affect mental wellbeing' . 10 In 2007 and 2013, the questions covered four items (time pressure and overload of work, violence or threat of violence, harassment and bullying, other factors). In the 2020 survey, 11 'Mental well-being' was operationalised by an additional four response options, resulting in a total of eight options: 12", + "page_start": 23, + "page_end": 24, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "4.4 Conclusions\nWork accident data - fatal and non-fatal - show an impressive decline in the past 20 years, even if one takes into account the significant level of underreporting. Preventive technical and organisational safety measures and sectoral shifts were the crucial factors for this improvement. The relevance of nonfatal accidents with severe health consequences - permanent disability or more than three months' time-off period (more than 230,000) - should be recognised and further investigated.\nPublic health data show a significant increase in life expectancy and substantial shifts in morbidity during the past three decades at EU level, also documenting major differences between EU Member States in mortality and morbidity. Socioeconomic inequality is an evident reason for higher mortality and morbidity. There is less evidence concerning the correlation between working conditions - as a major element of the socioeconomic status - and mortality and morbidity at EU level.\nThe clearest evidence on the relationship between working conditions and diseases exists for recognised occupational diseases, and for these, the trend is also strongly downwards. In contrast, the estimates of the development of work-related diseases - based on fractions of diseases attributable to work occupation - show a persistently high burden. The current estimates of ILO/WHO and of ICOH range between 115,000 and 180,000 deaths and between 4.5 million and 6.9 million DALYs; advanced research and the incorporation of more disease groups - mental health, diseases caused by biological agents - will significantly increase these figures. Literature, studies and surveys like the EWCS, LFS and the Flash Eurobarometer clearly show the strong relations between health status and occupation. Eurostat works on improvements concerning the morbidity statistics (task force, pilot statistics on occupational diseases). EU-wide morbidity statistics from national administrative sources might be available in the future; currently self-reported health data are the major source for EU-wide harmonised quantitative data.\nWellbeing and satisfaction at work show similar patterns as health and work accidents and workrelated health issues. Sectors with high physical demands and high customer and client orientation and occupations with a lower skill level report lower wellbeing and satisfaction levels; these groups report a good health status - mostly being younger - but fewer expectations to be able to work in this occupation until the age of 60. Professions with strong customer and client orientation have lower-thanaverage wellbeing and satisfaction rates.", + "page_start": 98, + "page_end": 98, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "3.6 Conclusions\nThe exposure to psychosocial risks is increasing, with mental health prevalence still emerging. Major work-related exposures have grown in the past 15 to 25 years that is, time pressure, difficult clients, longer working hours and poor communication. There is also some evidence that countries with overaverage employment in sectors like health and care or other human and client-oriented services (education, social work, tourism, entertainment) suffer from longer working hours and more mental burden. The northern countries are at the top of the countries with highest mental burden. The southern countries have a high share of specific psychosocial risks related to work in tourism and entertainment, characterised by atypical working times and issues with difficult clients.", + "page_start": 58, + "page_end": 58, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "Wellbeing and health\nExisting concepts of wellbeing cover more aspects of work than working conditions or safety and health at work. Eurofound mentions as the most relevant components: income, working time arrangements, possibilities for skills development and career advancement, and the degree of individual control over work.\nILO defines wellbeing at work under the term 'Workplace Wellbeing' : 'Workplace Wellbeing relates to all aspects of working life, from the quality and safety of the physical environment, to how workers feel about their work, their working environment, the climate at work and work organization. The aim of measures for workplace well-being is to complement OSH measures to make sure workers are safe, healthy, satisfied and engaged at work.'\nA common methodology to collect data on health status and wellbeing is self-reporting and selfassessment of risks at work, health risks and health problems, absence, job satisfaction and working life perspectives from a health point of view. This allows insight into the subjective assessment of health risks at work and wellbeing.\nIndicators on wellbeing and satisfaction at work show similar patterns to health and work accidents. Sectors with high physical demands and high customer and client orientation and occupations with a lower skill level report lower wellbeing and satisfaction levels; they report a good health status but fewer expectations to be able to work in this occupation until the age of 60 years. Concerning the levels of self-reported 'Health at risk' , the LFS Ad hoc module on 'Accidents at work and other work-related health problems' suggests that the situation has improved. According to the LFS, in 2007 14.6% of employed persons reported a work-related health problem; this figure decreased in 2013 to 8.8% and went slightly up again - during the pandemic - to 10.3% in 2020 (EU27 level).\nEuropean Agency for Safety and Health at Work - EU-OSHA\n13\nOccupational safety and health in Europe - state and trends 2023", + "page_start": 12, + "page_end": 13, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "4.2.1 Statistical picture of mortality and morbidity\nThe impact of work - as one essential element of the socioeconomic status - on health was the subject of numerous academic studies, often performed as specific case studies. The authors of an overview study on 'Cross-country inequality in the EU' summarise (more references in the original text):\n'Occupational grade and labour market status are among the factors most often studied in relation to health and mortality. Occupational grade has been found to be associated with self-rated health, mental and physical health, such as the presence of long-standing illness and a number of diseases. Lower occupation might affect health through poor working conditions, such as the higher exposure to occupational hazards and toxic compounds, health-damaging behaviours and psychosocial stress. Work-based stress combined with a lack of autonomy over one's work are believed to be the psychosocial factors that can cause physiological changes, such as increased risk of cardiovascular diseases and reduced immune system response. It has been shown that the gaps in mortality between different occupational grades persist in old age and tend to widen with age. 202\nEurostat provides in the LFS 2020 Ad hoc module on 'Accidents at work and other work-related health problems' a rough overview on such relations, with some specification, for example, for sectors, attainment levels, professional status, size of enterprise or occupation. 203 The differences between four aggregated occupational groups and work-related health problems is shown in the next table.\nTable 23: People reporting work-related health problems by group of occupations (ISCO) - LFS Ad hoc 2020 204\n9.4% of the group of 'Managers, professionals, technicians and associate professionals' and also 9.4% of the group of 'Clerical support workers, service and sales workers' report work-related health problems, 2.4% to 4% lower than the two groups with predominantly manual occupations.\nBased on a systematic review of literature on the topic of health factors, a consortium of World Bank and Harvard School of Public Health developed for the WHO in the early 1990s a new approach, the Global Burden of Disease (BoD) . 205 This approach is meanwhile used by researchers and health institutes across the globe. 206\nEuropean Agency for Safety and Health at Work - EU-OSHA\n80\nOccupational safety and health in Europe - state and trends 2023", + "page_start": 79, + "page_end": 80, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "Working conditions - Risk factors at work\nA certain ergonomic risk of many administrative and supervisory jobs is physical inactivity (61%), in practice meaning sitting most of the working time in front of digital equipment, sitting to make phone calls or sitting in meetings. Not only administrative tasks but also many occupations in transport and industry require prolonged sitting (transport, cashiers, parts assembly, etc.).\nIn the 10-year period before 2005, EU-wide surveys found a significant increase in work intensity. Major differences in work intensity and working time patterns can be seen between occupations, forms of work, sectors and enterprise size, for example. The length of the daily or weekly working time and its allocation with the 24 hours of a day or at night are important factors for health and wellbeing. The Eurostat data show a slight decrease in the average weekly working time for full-time employees (15-64 years) from 40.2 to 39.9 hours between 2006 and 2019.\nEurostat reports for all types of 'employment at atypical working time' a minor decrease between 2011 and 2019, from 38.8% to 37.2% (EU27 average), for all employed workforce and all types of such atypical time. The data also document slight increases or decreases of the different types of work during atypical times > on Saturdays the percentage decreased from 28% to 25%, working in the evenings decreased from 19% to 15%, working on Sundays remained stable at around 13.5%, work at night fell from 7% to 5%, and shift work increased slightly from 17% to 18%. Some groups of self-employed show a higher rate of atypical working times: for high-managerial self-employed , this rate is 43.2% and for low-managerial self-employed 64.5%.\nSignificant differences also exist between eastern/southern and central/northern/western European countries. More physical and ergonomic risks (except inactivity) are reported from eastern and southern EU Member States but more emotional demands (e.g. difficult clients, poor communication and long working hours) in northern and central European countries. One of the major reasons might be the reallocation of industrial production to eastern countries after the EU extension to 24 and later to 27 Member States.", + "page_start": 10, + "page_end": 10, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "Working conditions - Risk factors at work\nShifts in work tasks and workforce between sectors, technological progress and the development of higher skill levels have led to less work in manual occupations and more work in administrative (clerical, professional, managerial, etc.) occupations as well as in client-oriented and communicative occupations.\nConsequently, these developments caused a shift of risks to psychosocial and emotional challenges . This can be documented by the growing percentage of workers who report difficult clients (60%), long or irregular working hours (22%), and poor communication in the organisation (18%) (all data from ESENER 2019 or EWCS 2015) The OSH risks for these occupations - gradually but also significantly - shifted from safety risks to health risks. The psychosocial risks for mental health and the emotional challenges increased; they clearly correlate with more work in emotionally demanding and/or client-oriented sectors, be it in tourism, entertainment or education, public transport, social work, or health and care.\nThe trend towards more psychosocial and emotional challenges at work does not mean that 'classical' exposures or ergonomically burdensome work has disappeared . There is a large number of workers in all sectors - between 40% and 75% in ESENER and the EWCS - who report ergonomic risks . These are, for example, repetitive hand and arm movements in industry and service occupations, where a particularly high percentage is reported by low-skilled manual workers; moving heavy loads in craft occupations, or patients in health and care occupations, where a particularly high percentage is reported by high-skilled manual workers; and tiring and painful positions, where again the highest level is reported by high-skilled manual workers.\nStill a quite constant share of workers reports exposure to physical risks like noise, vibrations, high or low temperatures and to chemical and biological agents ; depending on occupation and sector, between 15% and 30% of workers are exposed to such risks (EWCS). No or very minor decreases in these risks can be seen during the past 15 years.\nEuropean Agency for Safety and Health at Work - EU-OSHA\n10\nOccupational safety and health in Europe - state and trends 2023\nIn several occupations, classical safety risks often add to the above-mentioned exposures , that is, slips, trips and falls, risks related to moving parts of machinery, moving vehicles, exposure to hot, cold, or hazardous materials, loud noise, chemical or biological substances, and in general physically exhaustive work.", + "page_start": 9, + "page_end": 10, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + } + ] + }, + { + "references": { + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf", + "query": "Has the average working week for employees working full-time decreased since 2006?", + "target_page": 31, + "target_passage": ". The statistical data (Eurostat) show a slight decrease of the average weekly working time for full-time employees (15-64 years) from 40.2 to 39.9 hours between 2006 and 2019.", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "3.1.1 Working time in hours and at atypical times\nConcluding, it can be stated that there is a slight trend towards a reduction of weekly working hours for regularly employed workers, including a stable commuting time. Working hours at atypical times show a mixed picture. Looking at most types of employees, atypical working time decreased, except work on Sundays . For self-employed with employees, the working time at atypical hours is in general at a higher level. The number of employees in night work is decreasing. More employees in service and client-related occupations at night or in shifts but also here the atypical times are slightly decreasing.\nProbably these changes mirror the structural economic changes , that is, the shift of workforce between sectors. Night work was common in many industries as part of a three 8-hours shifts, not only in industries with permanent production processes (steel, chemicals, etc.). 27 Moreover night work is and was common in essential services like health, transport, technical infrastructure and security. The\nEuropean Agency for Safety and Health at Work - EU-OSHA\n32\nOccupational safety and health in Europe - state and trends 2023\nnumber of workers in industry decreased, but the number of workers in the above-mentioned service sectors increased.", + "page_start": 31, + "page_end": 32, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "3.1.1 Working time in hours and at atypical times\nThe length of the daily or weekly working time, its allocation over the 24 hours of a day or at night are important factors for health and wellbeing. The statistical data (Eurostat) show a slight decrease of the average weekly working time for full-time employees (15-64 years) from 40.2 to 39.9 hours between 2006 and 2019. 22 The data also document slight increases and decreases of work at atypical times (response option for frequency: 'usual'). 23 In 2006 and 2019, the following percentages of all employed persons worked at atypical times: on Saturdays the percentage decreased from 28% to 25%, working on Sundays remained stable at around 13.5%, working in the evenings decreased from 19% to 15%, work at night fell from 7% to 5% and shift work increased slightly from 17% to 18%. 24\nEuropean Agency for Safety and Health at Work - EU-OSHA\n31\nOccupational safety and health in Europe - state and trends 2023\nFigure 9: Average working time and work during unsocial hours - Eurostat LFS\nTwo country examples might illustrate these developments (all data for 2019): Slovakia, a country with a high share of process-based industries, reports that 15.0% of its workforce is working at night and 29% in shifts; for the EU27 this rate is 5.2% respectively and 18.3%. 25 Regarding work on Sundays three other countries are at the top of the EU27, the Netherlands, Ireland and Spain; they report between 18% and 21% (EU27 average = 13.5%); all three countries have an above-average share of sectors like transport, tourism and agriculture. 26\nFor all these types of work it should be take into account that other groups of workers under nonstandard types of employment contracts (self-employed, agency workers, students, pensioners, undeclared workers) might have taken over work at these atypical working times.", + "page_start": 30, + "page_end": 31, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "3.1.1 Working time in hours and at atypical times\nRamazzini, 1713: De Morbis Artificum Diatriba.\nEuropean Agency for Safety and Health at Work - EU-OSHA\n30\nOccupational safety and health in Europe - state and trends 2023\nFigure 8: Hours worked per week of full-time employment, EU27 - Eurostat\nThe commuting time between home and workplace is quite stable; in 2005 at EU27 level, it stood at 42.4 minutes, and in 2015 Eurostat reports 40.2 minutes (time for both ways, to the workplace and back). 19\nWork at atypical working times is in general regarded as a working condition with negative health impact, called work extensity . The two major indicators of atypical working times are work at 'atypical working times' and 'long working hours' .\nEurostat reports for 'Employment at atypical working time' 20 a minor decrease between 2011 and 2019, from 38.8% to 37.2% (EU27), for all employed workforce and all types of such atypical time. 21 Some groups of self-employed show a higher rate of atypical working times but also for most of the categories of self-employed the rates decreased during the period 2011 to 2019. High managerial selfemployed had a slight increase from 42.1% to 43.2% in this period. For the low managerial selfemployed Eurostat finds a decrease from 69.2% to 64.5%. The figures for small entrepreneurs dropped slightly from 56.6% to 54.1%, the same applies for employed persons in personal care work with a minor change (50.6% to 49.8%). Agricultural self-employed had the highest level of such working times; they showed a decrease from 68.4% to 63.4%.", + "page_start": 29, + "page_end": 30, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "3.1.1 Working time in hours and at atypical times\nToo many hours of working time and/or working hours at atypical or unsocial times can put the mental and the physical health of humans at risk. It is also regarded as a major contributing factor to work accidents , due to fatigue or exhaustion. 16\nThe main indicator to describe working time is the number of the weekly average working hours of full-time employees. However, regarding its impact on health and safety, other aspects of working time are of the same relevance :\n· How long is the average working day?\n· At which times and days is this work done (typical, atypical times)?\n· How often do long working hours take place?\n· Is the work split between two jobs?\n· How flexible are start and end?\n· How intense is the work during this time (breaks, deadlines)?\n· Which groups of workers have standard working times and which do not (e.g. depending on the sector or the type of contract, e.g. sub-contracted workers or self-employed)?\nThere is a slight trend towards fewer working hours for full-time employees (not 'Employed persons') in the EU27; between 2006 and 2019 the average weekly working time dropped from 40.2 to 39.9 hours, a decrease of approximately 15 minutes. 17\nRegarding the weekly hours, there are no striking differences between the EU27 Member States. In 2019, Cyprus, Austria and Malta with a high share of workers in the sector of tourism (accommodation) had the highest number of working hours per week (above 41 hours), and Denmark, the Netherlands and Italy the lowest number (39 or fewer) (full-time, employees, 15-64 years, all NACE codes). 18\nEuropean Agency for Safety and Health at Work - EU-OSHA\n29\nOccupational safety and health in Europe - state and trends 2023\n'Bakers are craftsmen, working mostly at night, unlike other craftsmen who, once their work during the day is done, can grasp sleep, and by this renew the worn-out forces. The bakers are the whole night rushing about, and then, for most of the day, they are forced to indulge in sleep, just like those animals hiding from the sun (Solifugae). Therefore, in the same city there are Antipodes, men who live a life that is contrary to that of others.'", + "page_start": 28, + "page_end": 29, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "3.1.2 Work intensity\nThe analysis of EU survey data shows a mixed picture : Firstly, ESENER data corroborate this hypothesis, the three countries with highest percentage of work under time constraints - that is, Finland, Sweden and Denmark - all have working hours under the EU average. Secondly, LFS data show a different picture; a country like Greece has the longest working hours and also reports the highest time pressure, the same 'combination' - but less extreme - applies to Austria, Cyprus and Malta. Trends of low or less than average working time and no time constraints are reported for Lithuania, and medium working time and low time constraints for Italy and Ireland.\nAn analysis of EWCS data concluded 39 that in general intensity increases with long working hours, in enterprises with 1-19 the work intensity index (on a scale between 0 and 12) is 4.4, in larger enterprises with above 40 employees it is 6.3. This is in line with ESENER data that corroborate the importance of the size of the enterprise for time pressure and long working hours.\nLiterature - from very diverse disciplines - on work intensification points to reasons for intensification on developments as: 40\n· Economic developments, particularly the dominance of neoliberalist policies and enhanced competition between workers, companies and states; reduction of state influence and privatisation. 41\n· Pressure due to substantial organisational changes, for example, introduction of short-term economic objectives in enterprise policies, 42 expansion into new markets or new countries, acquiring other enterprises or merging, being acquired, restructuring of management or of basic staff working conditions (contracts, working time, flexibility). 43\n· Decrease of trade union influence or worker participation regarding labour relations.\n· Liberalisation of labour legislation, creation of 'new forms of work' and new contract types, beyond the permanent full-time employment. 44\n· New forms of management, application of management concepts like just-in-time production or lean management, higher flexibility of production and higher customer orientation, 45\nEuropean Agency for Safety and Health at Work - EU-OSHA\n36\nOccupational safety and health in Europe - state and trends 2023\nsegmentation of enterprises into profit centres, quality management obligations, externalisation/subcontracting of service areas like cleaning, canteen, security and so on.", + "page_start": 35, + "page_end": 36, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "References and notes\n20 Eurostat definition: The atypical work distinguishes between 'evening or night work', 'Saturday or Sunday working', and 'shift work'. Data for 2020 are available but indicate a strong reduction of atypical working times, the reason is probably that sectors with a high rate of atypical working times like tourism, transport, entertainment, hotels and restaurants could not work as in previous years, and also production lines in industry, often shift work, were stopped.\nEuropean Agency for Safety and Health at Work - EU-OSHA\n141\nOccupational safety and health in Europe - state and trends 2023\n21 Eurostat: Ad hoc module 2019 on work organisation and working time arrangements. Employment at an atypical working time (time period start with 2011), here and here\n22 Eurostat Data for 2019: Average number of usual weekly hours of work in main job, by sex, professional status, full-time/part-time and economic activity (from 2008 onwards, NACE Rev. 2). here Filter: Employees, Full-time, All NACE, EU27 2019 Q4.\nEurostat Data for 2006: Average number of usual weekly hours of work in main job, by sex, professional status, full-time/part-time and economic activity (1998-2008, NACE Rev. 1.1), here Filter: Employees, Full-time, All NACE, EU27 2019 Q4.", + "page_start": 140, + "page_end": 141, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "3.1.2 Work intensity\nThere are numerous references showing that during the period between 1990 and 2005 work intensity has considerably increased . 28\nFor example, Eurofound has analysed the responses to the two EWCS questions on high speed at work and tight deadlines. The EWCS found a significant increase of work intensity between 1991 and 2005. In 1991, 'Working at a very high speed' was for the majority of respondents not an issue. Fifty-two per cent of the workers responded to this statement 'Never' or 'Almost never'; in 1991, 24% worked at high speed and responded 'Around ¾ of the time', 'Almost all of the time' and 'All of the time'; until 2005 this response rate went up by 11% to 35%.\nWorking to tight deadlines was not an issue for 34% in 1990, and in 2005 only for 19%, a reduction of 15%. The percentage of the sum of responses 'Around ¾ of the time', 'Almost all of the time' or 'All of the time' to this question on tight deadlines increased between 1991 and 2005 from 29% to 37%. Regarding these two indicators, work intensity has evidently increased between 1991 and 2005. 29\nAfter that first period between 1991 and 2005, this development seems to stagnate between 2005 and 2015 . 30 The responses 'Almost all of the time' or 'All of the time' vary only slightly, between 33% and 37% depending on year and question ('Working at high speed' or 'Working to tight deadlines').\nDifferences can be seen regarding sector, company size and occupation. Regarding work intensity , ESENER enterprise data on time pressure for the EU27 indicate a slight increase of 2.3% between 2014 and 2019 from 43% to 45%. 31 Interestingly, according to ESENER, time pressure drastically increases with the size of the enterprise . In enterprises with 5 - 9 employees, 39% report time pressure, and in enterprises with above 250 employees 69%. 32 The same applies for long working hours, where enterprises with 5 - 9 employees report 19% 'long working hours', and in enterprises with above 250 employees this percentage increases to about 39% (EU27, 2019). 33\nEuropean Agency for Safety and Health at Work - EU-OSHA\n33\nOccupational safety and health in Europe - state and trends 2023\nFigure 11: Establishment size and 'Pressure due to time constraints' - ESENER 2014 and 2019 34", + "page_start": 32, + "page_end": 33, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "Major economic changes of sectors with over average work accident rates\nThe decrease of production in the mining and textile sectors was replaced by the import of mining or textile products. Nowadays the share of workforce in these sectors is much smaller in the EU than 30 years ago. In the EU28 in 2019, mining and quarrying employed 392,000 people, or 0.2% of all employed persons,128 and the textile industry 129 employed 1.5 million people, or 0.7% of all employed persons. 130\nThe share of employees in agriculture, also a sector with high accident rates, dropped mainly due to automation from 6.5% in 2005 to 4.5% in 2019 131 (worldwide still at 27% 132 ). In construction, another sector with work accident rates over average, the employment is quite stable in the past 25 years and fell only from 6.9% to 6.5%. Some specific works with high accident risk have been outsourced to other regions, well-known examples are the dangerous shipwrecking but also recycling of plastics and electric and electronic devices. 133\nThe decline of these sectors and the growth of workforce in other sectors like wholesale, transport, education, health and care shifted the safety risks of working conditions. Several EU Member States also observe a growth of road transport-related accidents during work. 134", + "page_start": 63, + "page_end": 63, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "Working conditions - Risk factors at work\nA certain ergonomic risk of many administrative and supervisory jobs is physical inactivity (61%), in practice meaning sitting most of the working time in front of digital equipment, sitting to make phone calls or sitting in meetings. Not only administrative tasks but also many occupations in transport and industry require prolonged sitting (transport, cashiers, parts assembly, etc.).\nIn the 10-year period before 2005, EU-wide surveys found a significant increase in work intensity. Major differences in work intensity and working time patterns can be seen between occupations, forms of work, sectors and enterprise size, for example. The length of the daily or weekly working time and its allocation with the 24 hours of a day or at night are important factors for health and wellbeing. The Eurostat data show a slight decrease in the average weekly working time for full-time employees (15-64 years) from 40.2 to 39.9 hours between 2006 and 2019.\nEurostat reports for all types of 'employment at atypical working time' a minor decrease between 2011 and 2019, from 38.8% to 37.2% (EU27 average), for all employed workforce and all types of such atypical time. The data also document slight increases or decreases of the different types of work during atypical times > on Saturdays the percentage decreased from 28% to 25%, working in the evenings decreased from 19% to 15%, working on Sundays remained stable at around 13.5%, work at night fell from 7% to 5%, and shift work increased slightly from 17% to 18%. Some groups of self-employed show a higher rate of atypical working times: for high-managerial self-employed , this rate is 43.2% and for low-managerial self-employed 64.5%.\nSignificant differences also exist between eastern/southern and central/northern/western European countries. More physical and ergonomic risks (except inactivity) are reported from eastern and southern EU Member States but more emotional demands (e.g. difficult clients, poor communication and long working hours) in northern and central European countries. One of the major reasons might be the reallocation of industrial production to eastern countries after the EU extension to 24 and later to 27 Member States.", + "page_start": 10, + "page_end": 10, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "Conditions of employment and workforce development\nDuring the past decades and at faster pace after 1990, a greater variety of non-standard contractual relations has emerged. Typical characteristics of non-standard work are part-time work, temporary (or fixed-term) work, seasonal work, casual work, home-based work, telework, self-employment or family work. Currently, high public awareness is directed to those types of non-standard work that are connected either to new forms of contracts (voucher, platform, zero-hours, portfolio, etc.) or increasing types of work not bound to the premises of the employer (mobile, at home, at client's place), mostly made possible by the increased use of modern information and communication technologies (ICT). These forms of work often have as a - additional - major characteristic a less clear employerworker relationship .\nHowever, in 2019 the conventional employment contract still accounted for around 86% of the workforce (EU27), 9% are 'own-account' workers, that is, self-employed without employees. The remaining 4% were self-employed with employees (employers) and less than 1% were contributing family workers. Of all employed workers, 17.2% worked part-time and 13.3% had temporary contracts.\nNon-standard types of work that are characterised by the circumstance that the work is not taking place at the premises of the employer are mobile and home-based work, domestic work, care work and long-term domestic care work, and online platform work. In 2019, approximately 77% worked at the employer's premises, 5% at home, 9% at the clients' places and 8% at non-fixed workplaces. With the onset of the COVID-19 pandemic in 2020, the share of work at home more than doubled; in the EU27 it increased from 5.4% in 2019 to 13.4% in 2021.\nCompared to work at the premises of the employer, such non-standard workplaces often miss basic OSH facilities (Minimum requirements at workplaces directive), availability and suitability of help tools (Work equipment directive and Personal protective equipment directive), or provision of adequate digital and mobile tools (Display screen equipment directive).\nEuropean Agency for Safety and Health at Work - EU-OSHA\n11\nOccupational safety and health in Europe - state and trends 2023\nThe workforce structure also significantly changed during the past 15 years, requiring new or adapted prevention solutions, organisationally and technically.", + "page_start": 10, + "page_end": 11, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + } + ] + }, + { + "references": { + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf", + "query": "What is the definition of a work accident according to the International Labour Organisation?", + "target_page": 38, + "target_passage": "ILO Definition of accident: ‘An occupational accident is an unexpected and unplanned occurrence, including acts of violence, arising out of or in connection with work, which results in one or more workers incurring a personal injury, disease or death.’", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "What is an accident?\n'Accident at work' is defined in the ESAW methodology 135 as a 'discrete occurrence in the course of work which leads to physical or mental harm.'", + "page_start": 63, + "page_end": 63, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "Accidents at work\nAccidents at work are the most common indicator regarding the quality of prevention in an enterprise, a sector or a country. Between 1998 and 2019 (EU level), the incidence rate of non-fatal work accidents fell about 58%, from 4,089 to 1,713. Most of this decrease took place in the first half of this decade. Between 1998 and 2008, the incidence rate fell by 54%, and between 2009 and 2019 by 9%.\nBetween 1998 and 2019, the incidence rate for fatal accidents dropped about 57% from 5.03 to 2.17, almost the same decrease as for non-fatal accidents.\nFour major sectors, agriculture, manufacturing, construction and transport , employed just under 40% of the workforce (in 1998 as well as in 2019). However, in 1998, more than 60% of the accidents at work took place in these sectors, thus the reduction of accidents in these sectors was crucial for the overall reduction. In addition, economic developments - sector decline and shift of workforce between sectors - reduced the number of workers exposed to common safety risks in these sectors.\nThere have always been concerns in national or sectoral case studies about underreporting of work accidents for different reasons: accidents suffered by self-employed who are not obliged to notify or are insured via private or non-occupational public health insurances, work-related traffic accidents that are reported as traffic accidents only, declaration of less severe accidents as private to avoid administrative burden, administrative burden in general. This leads to several approaches to estimate the true number of accidents at work. Currently, these estimates result in figures of around 5.45 million work accidents at EU27 level in 2019 for all economic sectors and all types of employment. That means that the reported 3.14 million accidents represent approximately 57.5% of all work accidents resulting in more than three days of absence, while 42.5% are not reported.\nThe pure distinction between fatal and non-fatal work accidents does not reveal that a very large part of the human and financial burden is caused by severe but not fatal accidents . In 2019, 232,892 work accidents resulted in an absence of more than three months or caused a permanent disability, compared to 3,008 fatal accidents (NACE Rev. 2 activity A, C-N). That is, in addition to every worker who dies, another 77 suffer injuries resulting in at least three months off work or in permanent disability.", + "page_start": 11, + "page_end": 11, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "3.2 Physical health risks at work\nRisks at work that can result in physical harm can be divided into safety and health risks .\nThe main result of insufficient safety is a work accident. A work accident has as immediate consequences either a personal injury, a disease, or death of one or more workers. Eurostat distinguishes between non-fatal and fatal work accidents, and for the majority of sectors it provides also the duration of the absence due to the accident - an indicator for the severity of the injury. Non-fatal accidents at work can cause medium- or long-term health consequences, and in the worst case a permanent disability.\nILO Definition of accident: 'An occupational accident is an unexpected and unplanned occurrence, including acts of violence, arising out of or in connection with work, which results in one or more workers incurring a personal injury, disease or death.' 51\nPhysical health risks can be caused by a variety of circumstances and exposures or by inadequate ergonomics . Natural circumstances at work can pose such health risks, that is, temperature, storms and floods, unsafe terrain, biological agents and so on; or the risks are due to manmade circumstances, that is, work in buildings, on roofs and towers, on traffic routes, under artificial ventilation. Exposure is a general term to describe the interaction between environment / emissions / contaminants and the human organism. In a workplace context, 'exposure' mainly covers emissions from machinery or from tools and materials, for example, noise, vibration, dust, electromagnetic fields and chemical substances.\nRisks from inadequate ergonomics harm in particular the musculoskeletal system. Ergonomic risks of manual work are typically caused by repetitive hand and arm movements, tiring positions, for example, permanent kneeling or overhead work, lifting and moving of heavy loads, or of patients and so on. A certain ergonomic risk is physical inactivity , in practice sitting most of the working time. Not only administrative tasks but also many occupations in service or industry require permanent sitting, for example, drivers, cashiers, part assembly operators and so on (often called 'sedentary occupations').", + "page_start": 37, + "page_end": 37, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "Methodology:\nEU-OSHA used the average coefficient between non-fatal and fatal work accidents of the four countries Finland, France, Germany and Spain. The coefficient of registered non-fatal accident per fatal accident varies between 970 (France) and 2,085 (Germany), in 2019. The coefficient average for these four countries is 1,462. If we multiply all ESAW-registered fatal accidents in the EU27 (3,408 cases) with this coefficient, we end up at 4.98 million non-fatal accidents with more than three days of absence.\nFor the EU27 in 2019, the average ratio is 922 non-fatal accidents for every fatal accident . 147 For an estimate, the coefficients of benchmark countries with a known high reporting rate are used to estimate underreporting throughout the EU27. 148\nThe following table shows the data and the calculation steps.\nEuropean Agency for Safety and Health at Work - EU-OSHA\n66\nOccupational safety and health in Europe - state and trends 2023\nTable 16: Non-fatal accidents estimated via coefficient of fatal accidents, 4 benchmark countries 149\nThe application of the average coefficient of four benchmark countries to all the EU27 leads to an estimated number of non-fatal accidents with more than three days absence of approximately 4.98 million. This is 1.84 million more work accidents than reported in ESAW; the reporting rate of ESAW for non-fatal work accidents with four or more days of absence would be at around 63% . Countryspecific reports about underreporting determine similar figures and support these findings. 150\nThere seems to be a difference in the reporting level between countries with a universal health system where the reasons for an accident play a minor role and do not impact compensation and treatment. In more fragmented health systems with distinguished work accident insurances, the 'sphere' (work or private life) - where the accident took place - is more relevant and influences the granted treatment and compensation. Some researchers perform this calculation only based on the coefficient of two countries, Finland and Germany. 151 Both have separated insurance-based systems and are regarded as countries with a high reporting level. The coefficient would be 1,734 (average of both countries without weighing of population size); this would result in an estimated number of non-fatal work accidents of 5.91 million.", + "page_start": 65, + "page_end": 66, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "4.1.2 Serious non-fatal and fatal work accidents\nEurostat defines a fatal work accident as follows : 'A 'fatal accident' means an accident which leads to the death of a victim within one year of the accident'. 160 Fatal commuting accidents are excluded, or when counted at national level, excluded from the ESAW data.\nIn the last decade, most EU Member States registered a significant decrease of fatal work accidents . 161 From 2010 to 2019, for the EU27, the incidence rate of fatal accidents decreased over all sectors from 2.31 to 1.74 , or a minus of 25%. In the period between 2010 and 2019 the sectoral figures of five major sectors developed as follows:\nTable 19: Incidence rates of fatal accidents per sector in 2010 and 2019 (EU27) 162\nAlso, large differences between countries can be noted. The following figure - taken from the OSH Barometer - calculates the number of fatal accidents in periods and compares the period 2010-2014 with 2015-2020. The reason is that - particularly in smaller Member States - a year with one serious and large work accident and several fatalities, or another year without any fatal accident, would distort the annual picture and create significant changes from year to year. Romania, Luxembourg and Bulgaria have the highest incident rates, and the Netherlands, Sweden and Germany the lowest. In 25 countries the rate fell or stagnated in these two periods, with exceptions being Luxembourg and Greece.\nFigure 23: Comparison of the average incidence rate of fatal accidents in two periods: 2010-2014 and 20152020 163\nEuropean Agency for Safety and Health at Work - EU-OSHA\n71\nOccupational safety and health in Europe - state and trends 2023\nESAW provides more detailed data about the severity of non-fatal accidents . 164 According to Eurostat's evaluation of 'Causes and circumstances' of work accidents ( data from 2005, EU-15 and Norway ), in 2005, 3.9% of the non-fatal work accidents or 157,494 non-fatal accidents led to permanent incapacity (full or partly), and 138,568 (3,4% of all accidents) to absences from three to six months. 165", + "page_start": 70, + "page_end": 71, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "When is a non-fatal work accident counted?\nESAW counts a work accident 'if the resumption of work occurred 5 days after the work accident' ; Chapter 4.2 of the ESAW Methodology 2012 explains: 'Accidents at work with more than three calendar days' absence from work: Only full calendar days of absence from work have to be considered, excluding the day of the accident. Consequently, more than three calendar days' means 'at least four calendar days', which implies that only if the victim resumes work on the fifth (or subsequent) working day after the date on which the accident occurred should the incident be included.'\nExempted are: Commuting accidents, self-inflicted injuries (e.g. suicides), and strictly natural causes that injure people at their workplaces (e.g. earthquakes, floods).\nThe total number of reported non-fatal accidents for the EU27 was 3,140,950 in 2019. 136 As mentioned in the introduction to this chapter, the incident rates of non-fatal accidents fell in about 25 years from 4,089 (year 1998 137 ) to 1,713 (2019), that is, it decreased about 58% . 138 The greatest part of this decrease took place between 1998 and 2010 , 139 the incidence rate halved to 2,021, a drop of 51% . Still, between 2010 and 2019 the incidence rate for the EU27 fell from 2,021 incidents per 100,000 workers to 1,713, a drop of a further 15% (taking 2010 as the reference year). 140\nEuropean Agency for Safety and Health at Work - EU-OSHA\n64\nOccupational safety and health in Europe - state and trends 2023\nFigure 21: Development of the total number of non-fatal accidents at work and incidence rates (accidents per 100,000 workers), 1998 and 2019 - Eurostat\nStill today we can see incident rates above average in sectors like construction and manufacturing, wholesale and retail, transport and storage, and agriculture including forestry and fishing. These are sectors where work with dangerous working conditions is quite common, that is, use or handling of heavy or dangerous equipment (sharp, fast, moving, rotating, high-pressure, hot, etc.), work at height, work on slippery ground, work with electrical equipment, transport and so on.", + "page_start": 63, + "page_end": 64, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "References and notes\n70 De Wispelaere et al., 2022: Posted workers in the European Union - Facts and figures\n71 European Commission, 2020: COVID-19: Guidelines of the Commission on seasonal workers in the EU. Factsheet on practical examples and best practices\n72 OECD, 2019: Pensions at a Glance 2019, OECD and G20 Indicators (p. 67).\n73 OECD, 2019: Pensions at a Glance 2019, OECD and G20 Indicators (p. 69).\n74 OECD, 2019: The Sharing and Gig Economy: Effective Taxation of Platform Sellers: Forum on Tax Administration or Employment outlook.\n75 Eurofound, 2020: New forms of employment: 2020 Update\n76 A first approach to use administrative data: Balogh et al., 2021: Non-standard employment and mortality in Belgian workers: A census-based investigation\n77 Please note that the working conditions of important groups of non-standard work could not sufficiently be covered in this chapter, e.g. for seasonal workers, migrant workers, second jobs of students, employees and pensioners, and self-employed. The main reason for this is that quantitative EU-wide data on the OSH situations of these groups are rare or not reliable due to missing statistics or surveys. There are numerous qualitative reviews and case studies about these groups, and a detailed description would go beyond the frame of this report.\n78 Directive 89/654/EEC concerning the minimum safety and health requirements for the workplace excludes five types of work, to quote: 'This Directive shall not apply to: (a) means of transport used outside the undertaking and /or the establishment, or workplaces inside means of transport; (b) temporary or mobile work sites; …'.\n79 Directive 90/270/EEC of 29 May 1990 on the minimum safety and health requirements for work with display screen equipment (fifth individual Directive within the meaning of Article 16 (1) of Directive 89/391/EEC), here\n80 EU-OSHA's maintenance campaign revealed that maintenance and repair work has an accident risks far over average. EU-OSHA, 2010: Safe maintenance in practice (p. 10): 'Occupational accidents during maintenance work are numerous. Based on the data from several European countries, it is estimated that 10-15% of fatal accidents at work, and 15-20% of all accidents, are connected with maintenance .'\n81 No statistical data available for EU.", + "page_start": 143, + "page_end": 143, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "Which are the areas of concern?\nInternational organisations complain about an unfair divide of OSH risks in globalised supply chains , be it in mining, metallurgy, textile production, disposal of hazardous waste or other sectors. The ILO decided in June 2022 to make OSH one of the Fundamental Principles and Rights at Work. In this context, 10 ILO conventions and instruments are considered now as fundamental, including two OSH conventions: the Occupational Safety and Health Convention, of 1981 (No. 155) and the Promotional Framework for Occupational Safety and Health Convention, of 2006 (No. 187). Ethical, fairness and justice considerations have led to more activities on decent, safe and healthy work in developing countries and a fair share of risks at work in global supply chains. These are important initiatives, but until now they only slightly changed the overall situation when looking at the global scale of the issue.\nEuropean Agency for Safety and Health at Work - EU-OSHA\n19\nOccupational safety and health in Europe - state and trends 2023", + "page_start": 18, + "page_end": 19, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "References and notes\n147 In 2019, there were 3.141 million non-fatal accidents that resulted in at least four calendar days of absence from work and 3,408 fatal accidents in the EU27, a ratio of approximately 922 non-fatal accidents for every fatal accident, here\n148 Kurppa, 2015: Severe Under-reporting of Work Injuries in Many Countries of the Baltic Sea Region: An exploratory semi-quantitative study - 'What goes unreported goes unfixed' (p. 20 ff).\n149 Eurostat: Non-fatal accidents at work by NACE Rev. 2 activity and sex; Eurostat: Fatal Accidents at work by NACE Rev. 2 activity\n150 Detailed studies from hospitals in Denmark show that even a large share of serious work accidents (25%) resulting in amputations and fractions are not registered, see: LO Denmark, 2012: Underrapportering af arbejdsulykker Table 14; and the Danish Working Environment Authority published a report concluding a total of 50% in underreporting, here\n151 Kurppa, 2015: Severe Under-reporting of Work Injuries in Many Countries of the Baltic Sea Region: An exploratory semi-quantitative study - 'What goes unreported goes unfixed' (p. 20ff). 152 LFS Ad hoc module: Accidents at work and other work-related health problems (2020, 2013 and 2007) 153 Eurostat: EU labour force survey 2020 module on accidents at work and other work-related health problems : assessment report : 2021 edition. The exact question is (p. 47): 'Thinking of the year before [last day of reference week], have you had any accident at work? Accidents outside working hours and accidents during the journey from home to work or from work to home are excluded. However, accidents during a journey in the course of work are included.'\n154 Eurostat, Statistics in focus, Theme 3 - 16/2001: Accidents at work in the EU 1998-1999, here 155 ISCO-Groups: 1. Managers, 2. Professionals, 3. Technicians and Associate Professionals, 4. Clerical Support Workers, 5. Services and Sales Workers, 6. Skilled Agricultural, Forestry and Fishery Workers, 7. Craft and Related Trades Workers, 8. Plant and Machine Operators and Assemblers, 9. Elementary Occupations, 0. Armed Forces Occupations.\n156 Eurostat: Persons reporting an accident at work by sex, age and occupation", + "page_start": 146, + "page_end": 146, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "References and notes\n118 Eurostat: Accidents at work by sex and severity (NACE Rev. 2 activity Total).\n119 Eurostat: Statistics in focus, Theme 3-16/2001: Accidents at work in the EU 1998-1999 (p. 3).\n120 Eurostat: Fatal Accidents at work by NACE Rev. 2 activity (HSW_N2_02), filter for sectors Sector A, C-N, NACE 2.\n121 Eurostat: Accidents at work by sex and severity (NACE Rev. 2 activity Total).\n122 Eurostat: Non-fatal accidents at work by NACE Rev. 2 activity and sex\n123 Eurostat: Fatal Accidents at work by NACE Rev. 2 activity; Fatal Accidents at work: Mining and quarrying\n124 Rees, 2016: Comparing European and American Health & Safety Laws - 'Pre-1970, there were approximately 14,000 worker fatalities a year, according to the Occupational Health and Safety Administration (OSHA). By 2010, the workforce had doubled, but fatalities were down to just 4,500 - a workplace fatality rate reduction of 66 percent. Worker injuries and illnesses were also down from 10.9 incidents per 100 workers in 1972 to 3.2 per 100 in 2014.'\n125 WHO/ILO, 2021: WHO/ILO joint estimates of the work-related burden of disease and injury, 2000-2016: Global monitoring report (p. 18).\n126 Source of the picture: here (copyrighted).\n127 Eurostat: Accidents at work, by specific physical activity and economic activity, EU, 2019 (% share).\n128 Eurostat: Businesses in the mining and quarrying sector\n129 European Commission: Textiles and clothing in the EU\n130 European Parliament, 2014: Briefing - Workers' conditions in the textile and clothing sector: just an Asian affair?\n131 Eurostat: National accounts employment data by industry (up to NACE A*64), Filter for years and sector 'Agriculture, forestry and fishing', here\n132 World Bank: Employment in agriculture (% of total employment) (modelled ILO estimate)\nhttps://data.worldbank.org/indicator/SL.AGR.EMPL.ZS?end=2018&most_recent_year_desc=true&start=1991&typ e=shaded&view=chart\n133 United Nations - e-Waste coalition: Global E-waste Monitor 2017\n134 For example: OSH system at national level - France", + "page_start": 145, + "page_end": 145, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + } + ] + }, + { + "references": { + "source_file": "infographic5.pdf", + "query": "Was knowledge domain agnosticism a goal in the development of OLAF?", + "target_page": 1, + "target_passage": "Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations represented largely depend on one or more business use cases. As we designed our framework with industry application in mind, we need to consider it within its real-world usage context.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "OLAF : Ontology Learning Applied Framework\nWe designed the proposed framework focusing on automation with very little, if any, human involvement in mind. Unlike most existing approaches, particular attention is brought to the learned ontology final production use case . We implement the framework as an open-source and openaccess python library. We aim to gather feedback and grow a community to develop and test multiple algorithms. Various satellite tools could be developed to enhance the framework implementation. However, we should focus on developing axiom extraction and automatic ontology evaluation . One exciting research area might be the adaptation of the software industry's \"DevOps\" concepts to knowledge management. The latter field is known as \"SemOps\".\nCimiano P, Völker J. Text2Onto. Natural Language Processing and Information Systems. Berlin, Heidelberg: Springer Berlin Heidelberg; 2005.p. 227-238. ISBN: 978-3-540-32110-1 1.\nDrymonas E, Zervanou K, Petrakis EGM. Unsupervised Ontology Acquisition from Plain Texts: The OntoGain System. Natural Language Processing and Information Systems. Berlin, Heidelberg: Springer Berlin Heidelberg; 2010. p. 277-87. ISBN: 978-3-642-13881-2 2.\nPaola Velardi, Stefano Faralli, Roberto Navigli; OntoLearn Reloaded: A Graph-Based Algorithm for Taxonomy Induction. Computational Linguistics 2013; 39 (3): 665-707. DOI: 10.1162/COLI_a_00146 3.\nMuhammad Nabeel Asim, Muhammad Wasim, Muhammad Usman Ghani Khan, Waqar Mahmood, Hafiza Mahnoor Abbasi, A survey of ontology learning techniques and applications, Database, Volume 2018, 2018, bay101, DOI: 10.1093/database/bay101 4.", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + }, + { + "text": "OLAF : Ontology Learning Applied Framework\nMarion SCHAEFFER (marion.schaeffer@insa-rouen.fr) - Matthias SESBOUE (matthias.sesboue@insa-rouen.fr) Jean-Philippe KOTOWICZ - Nicolas DELESTRE - Cecilia ZANNI-MERK\nSince the beginning of the century, research on ontology learning has gained popularity. Automatically extracting and structuring knowledge relevant to a domain of interest from unstructured data is a major scientific challenge. We propose a new approach with a modular ontology learning framework considering tasks from data pre-processing to axiom extraction. Whereas previous contributions considered ontology learning systems as tools to help the domain expert, we developed the proposed framework with full automation in mind. An implementation as an opensource and collaborative python library is available at https://gitlab.insa-rouen.fr/msesboue/ontology-learning.", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + }, + { + "text": "OLAF : Ontology Learning Applied Framework\n= Activity Optional. Formal concept Analysis Term subsumption algorithm Hierarchical clustering Inductive Logic Programming We only work on unstructured textual data . We apply the framework in two different use cases and datasets to validate our results :, = : Iterative process. Formal concept Analysis Term subsumption algorithm Hierarchical clustering Inductive Logic Programming We only work on unstructured textual data . We apply the framework in two different use cases and datasets to validate our results :, OLAF IN A PRACTICAL CONTEXT.Ontology = : Iterative process. Formal concept Analysis Term subsumption algorithm Hierarchical clustering Inductive Logic Programming We only work on unstructured textual data . We apply the framework in two different use cases and datasets to validate our results :, = : Iterative process. , Pros and cons Ontologies can be exported in = Hierarchisation. , = Axiom Ontology. , Ontology based-system = Artifact. , = . , = CAPTION. , OLAF IN A PRACTICAL CONTEXT.Ontology = CAPTION. , = CAPTION. Rule-based axiom extraction, Pros and cons Ontologies can be exported in = . Rule-based axiom extraction, = Axiom Ontology. Rule-based axiom extraction, Ontology based-system = Artifact. Rule-based axiom extraction, = Different serialization techniques\ncan be used to export and leverage the learned ontology in an application system.. Rule-based axiom extraction, = Different serialization techniques can be used to export and leverage the learned ontology in an application system.. Rule-based axiom extraction, OLAF IN A PRACTICAL CONTEXT.Ontology = Different serialization techniques can be used to export and leverage the learned ontology in an application system.. Rule-based axiom extraction, = Different serialization techniques can be used to export and leverage the learned ontology in an application system.", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + }, + { + "text": "OLAF : Ontology Learning Applied Framework\nText2Onto, 2005, [1] representation-agnostic structure with modular steps and takes into account uncertainty. The system is implemented as a GATE module. OntoGain, It focuses on multiword terms to construct a \"lexicalised ontology\" by adapting an agglomerative clustering and an FCA method. It implements 4, Pros and cons Ontologies can be exported in = various formats. GATE system adds great visualisations. But it is not maintained since 2011.. Text2Onto, 2005, [1] representation-agnostic structure with modular steps and takes into account uncertainty. The system is implemented as a GATE module. OntoGain, It focuses on multiword terms to construct a \"lexicalised ontology\" by adapting an agglomerative clustering and an FCA method. It implements 4, = . Text2Onto, 2005, [1] representation-agnostic structure with modular steps and takes into account uncertainty. The system is implemented as a GATE module. OntoGain, It focuses on multiword terms to construct a \"lexicalised ontology\" by adapting an agglomerative clustering and an FCA method. It implements 4, Ontology based-system = Ontology Use Cases. Text2Onto, 2005, [1] representation-agnostic structure with modular steps and takes into account uncertainty. The system is implemented as a GATE module. OntoGain, It focuses on multiword terms to construct a \"lexicalised ontology\" by adapting an agglomerative clustering and an FCA method. It implements 4, = Final Application. Text2Onto, 2005, [1] representation-agnostic structure with modular steps and takes into account uncertainty. The system is implemented as a GATE module. OntoGain, It focuses on multiword terms to construct a \"lexicalised ontology\" by adapting an agglomerative clustering and an FCA method. It implements 4,", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + }, + { + "text": "OLAF : Ontology Learning Applied Framework\n= Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE. Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE, Ontology based-system = Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE. Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE, = Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE. Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE, = Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE. Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE, OLAF IN A PRACTICAL CONTEXT.Ontology = Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE. Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE, = Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE. Our framework", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + }, + { + "text": "OLAF : Ontology Learning Applied Framework\n= . Text2Onto, 2005, [1] representation-agnostic structure with modular steps and takes into account uncertainty. The system is implemented as a GATE module. OntoGain, It focuses on multiword terms to construct a \"lexicalised ontology\" by adapting an agglomerative clustering and an FCA method. It implements 4, OLAF IN A PRACTICAL CONTEXT.Ontology = . Text2Onto, 2005, [1] representation-agnostic structure with modular steps and takes into account uncertainty. The system is implemented as a GATE module. OntoGain, It focuses on multiword terms to construct a \"lexicalised ontology\" by adapting an agglomerative clustering and an FCA method. It implements 4, = Pipeline Execution. OntoLearn (Reloaded), 2013, [3] It focuses on \"lexicalised ontologies\" and uses seed knowledge. It implements 5 steps: terminology extraction, hypernym graph construction, domain filtering of hypernyms, hypernym graph pruning and 2010, [2] steps: text preprocessing, concept extraction (C/NC- value), taxonomy construction, and non-taxonomic relation acquisition (rule-based and probabilistic)., Pros and cons Ontologies can be exported in = It relies on WordNet and POS It considers only multiword terms and relies on WordNet and POS tags. It does not distinguish between terms and concepts and implements different adaptable approaches.. OntoLearn (Reloaded), 2013, [3] It focuses on \"lexicalised ontologies\" and uses seed knowledge. It implements 5 steps: terminology extraction, hypernym graph construction, domain filtering of hypernyms, hypernym graph pruning and 2010, [2] steps: text preprocessing, concept extraction (C/NC- value), taxonomy construction, and non-taxonomic relation acquisition (rule-based and probabilistic).,", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + }, + { + "text": "OLAF : Ontology Learning Applied Framework\n= OLAF Pipeline Optimisation. OntoLearn (Reloaded), 2013, [3] It focuses on \"lexicalised ontologies\" and uses seed knowledge. It implements 5 steps: terminology extraction, hypernym graph construction, domain filtering of hypernyms, hypernym graph pruning and 2010, [2] steps: text preprocessing, concept extraction (C/NC- value), taxonomy construction, and non-taxonomic relation acquisition (rule-based and probabilistic)., OLAF IN A PRACTICAL CONTEXT.Ontology = . OntoLearn (Reloaded), 2013, [3] It focuses on \"lexicalised ontologies\" and uses seed knowledge. It implements 5 steps: terminology extraction, hypernym graph construction, domain filtering of hypernyms, hypernym graph pruning and 2010, [2] steps: text preprocessing, concept extraction (C/NC- value), taxonomy construction, and non-taxonomic relation acquisition (rule-based and probabilistic)., = . edge recovery. adaptable approaches., Pros and cons Ontologies can be exported in = tags and does not distinguish between terms and concepts. It implements different. edge recovery. adaptable approaches., = . edge recovery. adaptable approaches., Ontology based-system = Knowledge sources Text Corpus. edge recovery. adaptable approaches., = Seed Ontology. edge recovery. adaptable approaches., = . edge recovery. adaptable approaches., OLAF IN A PRACTICAL CONTEXT.Ontology = . edge recovery. adaptable approaches., = . Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE, Pros and cons Ontologies can be exported in = Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE. Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE,", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + }, + { + "text": "OLAF : Ontology Learning Applied Framework\nprovides several algorithms for the different stages of the pipeline. The algorithms are taken from external libraries or directly implemented in the framework. The goal is to have as many methods as possible to cover the maximum needs., Pros and cons Ontologies can be exported in = . Our framework provides several algorithms for the different stages of the pipeline. The algorithms are taken from external libraries or directly implemented in the framework. The goal is to have as many methods as possible to cover the maximum needs., = Data preprocessing. Our framework provides several algorithms for the different stages of the pipeline. The algorithms are taken from external libraries or directly implemented in the framework. The goal is to have as many methods as possible to cover the maximum needs., Ontology based-system = . Our framework provides several algorithms for the different stages of the pipeline. The algorithms are taken from external libraries or directly implemented in the framework. The goal is to have as many methods as possible to cover the maximum needs., = We choose Python numerous. Our framework provides several algorithms for the different stages of the pipeline. The algorithms are taken from external libraries or directly implemented in the framework. The goal is to have as many methods as possible to cover the maximum needs., = as it eases access to the vast python .. Our framework provides several algorithms for the different stages of the pipeline. The algorithms are taken from external libraries or directly implemented in the framework. The goal is to have as many methods as possible to cover the maximum needs., OLAF IN A PRACTICAL CONTEXT.Ontology = community and its library ecosystem, particularly Machine Learning (ML) libraries . The text processing on spaCy helps us many different languages. Our framework provides several algorithms for the different stages of the pipeline. The algorithms are taken from external libraries or directly implemented in the framework. The goal is to have as many methods as possible to cover the maximum needs., = NLP tools", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + }, + { + "text": "Acknowledgments\nThe authors would like to thank the participants in this study and the user representatives from Nordland MS Association for their valuable contributions. The authors also acknowledge philosopher of the mind and cognitive sciences Hanne De Jaegher for the valuable comments on the interpretations and discussions of the results.", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed13.pdf" + }, + { + "text": "Citations\n1. Velleman 2006, pp. 8, 103.\n2. Vickers 2022.\n3. Nunes 2011, pp. 2066-2069.\n4. Pépin 2004, Logos; Online Etymology Staff.\n5. Hintikka 2019, lead section, §Nature and varieties of logic.\n6. Hintikka 2019, §Nature and varieties of logic; Haack 1978, pp. 1-10, Philosophy of logics; Schlesinger, Keren-Portnoy & Parush 2001, p. 220.\n7. Hintikka & Sandu 2006, p. 13; Audi 1999b, Philosophy of logic; McKeon.\n8. Blair & Johnson 2000, pp. 93-95; Craig 1996, Formal and informal logic.\n9. Craig 1996, Formal and informal logic; Barnes 2007, p. 274; Planty-Bonjour 2012, p. 62 (htt ps://books.google.com/books?id=0EpFBgAAQBAJ&pg=PA62); Rini 2010, p. 26 (https://boo ks.google.com/books?id=vard024vjFgC&pg=PA26).\n10. MacFarlane 2017; Corkum 2015, pp. 753-767; Blair & Johnson 2000, pp. 93-95; Magnus 2005, pp. 12-4, 1.6 Formal languages.\n11. McKeon; Craig 1996, Formal and informal logic.\n12. Hintikka & Sandu 2006, p. 13.\n13. Magnus 2005, Proofs, p. 102.\n14. Hintikka & Sandu 2006, pp. 13-16; Makridis 2022, pp. 1-2; Runco & Pritzker 1999, p. 155.\n15. Gómez-Torrente 2019; Magnus 2005, 1.5 Other logical notions, p. 10.\n16. Hintikka & Sandu 2006, p. 16.\n17. Honderich 2005, logic, informal; Craig 1996, Formal and informal logic; Johnson 1999, pp. 265-268.\n18. Craig 1996, Formal languages and systems; Simpson 2008, p. 14.\n19. Craig 1996, Formal languages and systems.", + "page_start": 18, + "page_end": 18, + "source_file": "wikipedia1.pdf" + } + ] + }, + { + "references": { + "source_file": "infographic5.pdf", + "query": "Is OLAF a specific strategy for ontological learning or is it a toolbox of different strategies?", + "target_page": 1, + "target_passage": "Our vision is to implement a toolbox of methods we can gather to build pipelines. ", + "chunk_present": { + "presence": true, + "index": 3 + } + }, + "top_chunk": [ + { + "text": "OLAF : Ontology Learning Applied Framework\nMarion SCHAEFFER (marion.schaeffer@insa-rouen.fr) - Matthias SESBOUE (matthias.sesboue@insa-rouen.fr) Jean-Philippe KOTOWICZ - Nicolas DELESTRE - Cecilia ZANNI-MERK\nSince the beginning of the century, research on ontology learning has gained popularity. Automatically extracting and structuring knowledge relevant to a domain of interest from unstructured data is a major scientific challenge. We propose a new approach with a modular ontology learning framework considering tasks from data pre-processing to axiom extraction. Whereas previous contributions considered ontology learning systems as tools to help the domain expert, we developed the proposed framework with full automation in mind. An implementation as an opensource and collaborative python library is available at https://gitlab.insa-rouen.fr/msesboue/ontology-learning.", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + }, + { + "text": "OLAF : Ontology Learning Applied Framework\nWe designed the proposed framework focusing on automation with very little, if any, human involvement in mind. Unlike most existing approaches, particular attention is brought to the learned ontology final production use case . We implement the framework as an open-source and openaccess python library. We aim to gather feedback and grow a community to develop and test multiple algorithms. Various satellite tools could be developed to enhance the framework implementation. However, we should focus on developing axiom extraction and automatic ontology evaluation . One exciting research area might be the adaptation of the software industry's \"DevOps\" concepts to knowledge management. The latter field is known as \"SemOps\".\nCimiano P, Völker J. Text2Onto. Natural Language Processing and Information Systems. Berlin, Heidelberg: Springer Berlin Heidelberg; 2005.p. 227-238. ISBN: 978-3-540-32110-1 1.\nDrymonas E, Zervanou K, Petrakis EGM. Unsupervised Ontology Acquisition from Plain Texts: The OntoGain System. Natural Language Processing and Information Systems. Berlin, Heidelberg: Springer Berlin Heidelberg; 2010. p. 277-87. ISBN: 978-3-642-13881-2 2.\nPaola Velardi, Stefano Faralli, Roberto Navigli; OntoLearn Reloaded: A Graph-Based Algorithm for Taxonomy Induction. Computational Linguistics 2013; 39 (3): 665-707. DOI: 10.1162/COLI_a_00146 3.\nMuhammad Nabeel Asim, Muhammad Wasim, Muhammad Usman Ghani Khan, Waqar Mahmood, Hafiza Mahnoor Abbasi, A survey of ontology learning techniques and applications, Database, Volume 2018, 2018, bay101, DOI: 10.1093/database/bay101 4.", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + }, + { + "text": "OLAF : Ontology Learning Applied Framework\n= Activity Optional. Formal concept Analysis Term subsumption algorithm Hierarchical clustering Inductive Logic Programming We only work on unstructured textual data . We apply the framework in two different use cases and datasets to validate our results :, = : Iterative process. Formal concept Analysis Term subsumption algorithm Hierarchical clustering Inductive Logic Programming We only work on unstructured textual data . We apply the framework in two different use cases and datasets to validate our results :, OLAF IN A PRACTICAL CONTEXT.Ontology = : Iterative process. Formal concept Analysis Term subsumption algorithm Hierarchical clustering Inductive Logic Programming We only work on unstructured textual data . We apply the framework in two different use cases and datasets to validate our results :, = : Iterative process. , Pros and cons Ontologies can be exported in = Hierarchisation. , = Axiom Ontology. , Ontology based-system = Artifact. , = . , = CAPTION. , OLAF IN A PRACTICAL CONTEXT.Ontology = CAPTION. , = CAPTION. Rule-based axiom extraction, Pros and cons Ontologies can be exported in = . Rule-based axiom extraction, = Axiom Ontology. Rule-based axiom extraction, Ontology based-system = Artifact. Rule-based axiom extraction, = Different serialization techniques\ncan be used to export and leverage the learned ontology in an application system.. Rule-based axiom extraction, = Different serialization techniques can be used to export and leverage the learned ontology in an application system.. Rule-based axiom extraction, OLAF IN A PRACTICAL CONTEXT.Ontology = Different serialization techniques can be used to export and leverage the learned ontology in an application system.. Rule-based axiom extraction, = Different serialization techniques can be used to export and leverage the learned ontology in an application system.", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + }, + { + "text": "OLAF : Ontology Learning Applied Framework\n= Concept/Relation Extraction. ConceptNet-based extraction Grouping terms based on synonyms, Ontology based-system = OLAF. ConceptNet-based extraction Grouping terms based on synonyms, = Our vision is to implement a gather to build pipelines ontology.. ConceptNet-based extraction Grouping terms based on synonyms, = . These pipelines can be run, optimised and analysed to learn the best possible. ConceptNet-based extraction Grouping terms based on synonyms, OLAF IN A PRACTICAL CONTEXT.Ontology = Ressource. ConceptNet-based extraction Grouping terms based on synonyms, = Algorithm implemented Upcoming implementation. Term cooccurrences-based extraction Similarity-based extraction, Pros and cons Ontologies can be exported in = . Term cooccurrences-based extraction Similarity-based extraction, = Concept/Relation Extraction. Term cooccurrences-based extraction Similarity-based extraction, Ontology based-system = OLAF. Term cooccurrences-based extraction Similarity-based extraction, = Our vision is to implement a gather to build pipelines ontology.. Term cooccurrences-based extraction Similarity-based extraction, = . Term cooccurrences-based extraction Similarity-based extraction, OLAF IN A PRACTICAL CONTEXT.Ontology = . Term cooccurrences-based extraction Similarity-based extraction, = . Formal concept Analysis Term subsumption algorithm Hierarchical clustering Inductive Logic Programming We only work on unstructured textual data . We apply the framework in two different use cases and datasets to validate our results :, Pros and cons Ontologies can be exported in = . Formal concept Analysis Term subsumption algorithm Hierarchical clustering Inductive Logic Programming We only work on unstructured textual data . We apply the framework in two different use cases and datasets to validate our results :, = Axiom Ontology. Formal concept Analysis Term subsumption algorithm Hierarchical clustering Inductive Logic Programming We only work on unstructured textual data . We apply the framework in two different use cases and datasets to validate our results :, Ontology based-system = Artifact. Formal concept Analysis Term subsumption algorithm Hierarchical clustering Inductive Logic Programming We only work on unstructured textual data . We apply the framework in two different use cases and datasets to validate our results :,", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + }, + { + "text": "OLAF : Ontology Learning Applied Framework\n= Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE. Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE, Ontology based-system = Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE. Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE, = Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE. Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE, = Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE. Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE, OLAF IN A PRACTICAL CONTEXT.Ontology = Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE. Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE, = Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE. Our framework", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + }, + { + "text": "OLAF : Ontology Learning Applied Framework\nprovides several algorithms for the different stages of the pipeline. The algorithms are taken from external libraries or directly implemented in the framework. The goal is to have as many methods as possible to cover the maximum needs., Pros and cons Ontologies can be exported in = . Our framework provides several algorithms for the different stages of the pipeline. The algorithms are taken from external libraries or directly implemented in the framework. The goal is to have as many methods as possible to cover the maximum needs., = Data preprocessing. Our framework provides several algorithms for the different stages of the pipeline. The algorithms are taken from external libraries or directly implemented in the framework. The goal is to have as many methods as possible to cover the maximum needs., Ontology based-system = . Our framework provides several algorithms for the different stages of the pipeline. The algorithms are taken from external libraries or directly implemented in the framework. The goal is to have as many methods as possible to cover the maximum needs., = We choose Python numerous. Our framework provides several algorithms for the different stages of the pipeline. The algorithms are taken from external libraries or directly implemented in the framework. The goal is to have as many methods as possible to cover the maximum needs., = as it eases access to the vast python .. Our framework provides several algorithms for the different stages of the pipeline. The algorithms are taken from external libraries or directly implemented in the framework. The goal is to have as many methods as possible to cover the maximum needs., OLAF IN A PRACTICAL CONTEXT.Ontology = community and its library ecosystem, particularly Machine Learning (ML) libraries . The text processing on spaCy helps us many different languages. Our framework provides several algorithms for the different stages of the pipeline. The algorithms are taken from external libraries or directly implemented in the framework. The goal is to have as many methods as possible to cover the maximum needs., = NLP tools", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + }, + { + "text": "OLAF : Ontology Learning Applied Framework\n= OLAF Pipeline Optimisation. OntoLearn (Reloaded), 2013, [3] It focuses on \"lexicalised ontologies\" and uses seed knowledge. It implements 5 steps: terminology extraction, hypernym graph construction, domain filtering of hypernyms, hypernym graph pruning and 2010, [2] steps: text preprocessing, concept extraction (C/NC- value), taxonomy construction, and non-taxonomic relation acquisition (rule-based and probabilistic)., OLAF IN A PRACTICAL CONTEXT.Ontology = . OntoLearn (Reloaded), 2013, [3] It focuses on \"lexicalised ontologies\" and uses seed knowledge. It implements 5 steps: terminology extraction, hypernym graph construction, domain filtering of hypernyms, hypernym graph pruning and 2010, [2] steps: text preprocessing, concept extraction (C/NC- value), taxonomy construction, and non-taxonomic relation acquisition (rule-based and probabilistic)., = . edge recovery. adaptable approaches., Pros and cons Ontologies can be exported in = tags and does not distinguish between terms and concepts. It implements different. edge recovery. adaptable approaches., = . edge recovery. adaptable approaches., Ontology based-system = Knowledge sources Text Corpus. edge recovery. adaptable approaches., = Seed Ontology. edge recovery. adaptable approaches., = . edge recovery. adaptable approaches., OLAF IN A PRACTICAL CONTEXT.Ontology = . edge recovery. adaptable approaches., = . Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE, Pros and cons Ontologies can be exported in = Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE. Most ontology learning systems do not consider the targeted ontology- based system. Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations ONTOLOGY LEARNING FRAMEWORK ARCHITECTURE,", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + }, + { + "text": "OLAF : Ontology Learning Applied Framework\nand. C-value-based filtering Linguistic-based filtering TF-IDF value-based filtering, Pros and cons Ontologies can be exported in = . C-value-based filtering Linguistic-based filtering TF-IDF value-based filtering, = Term Extraction. C-value-based filtering Linguistic-based filtering TF-IDF value-based filtering, Ontology based-system = . C-value-based filtering Linguistic-based filtering TF-IDF value-based filtering, = . C-value-based filtering Linguistic-based filtering TF-IDF value-based filtering, = . C-value-based filtering Linguistic-based filtering TF-IDF value-based filtering, OLAF IN A PRACTICAL CONTEXT.Ontology = spaCy Doc objects. C-value-based filtering Linguistic-based filtering TF-IDF value-based filtering, = . Embedding-based similar term extraction ConceptNet synonym extraction, Pros and cons Ontologies can be exported in = . Embedding-based similar term extraction ConceptNet synonym extraction, = Term Enrichment. Embedding-based similar term extraction ConceptNet synonym extraction, Ontology based-system = . Embedding-based similar term extraction ConceptNet synonym extraction, = library spaCy. Embedding-based similar term extraction ConceptNet synonym extraction, = . Embedding-based similar term extraction ConceptNet synonym extraction, OLAF IN A PRACTICAL CONTEXT.Ontology = Our implementation is largely based on the work with data in staying flexible on the methods used. The only constraint is to end up with a list of. Embedding-based similar term extraction ConceptNet synonym extraction, = toolbox of methods we can Python NLP while .. WordNet synonym extraction, Pros and cons Ontologies can be exported in = WordNet synonym extraction. WordNet synonym extraction, = WordNet synonym extraction. WordNet synonym extraction, Ontology based-system = WordNet synonym extraction. WordNet synonym extraction, = WordNet synonym extraction. WordNet synonym extraction, = WordNet synonym extraction. WordNet synonym extraction, OLAF IN A PRACTICAL CONTEXT.Ontology = WordNet synonym extraction. WordNet synonym extraction, = WordNet synonym extraction. ConceptNet-based extraction Grouping terms based on synonyms, Pros and cons Ontologies can be exported in = . ConceptNet-based extraction Grouping terms based on synonyms,", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + }, + { + "text": "OLAF : Ontology Learning Applied Framework\n= . Text2Onto, 2005, [1] representation-agnostic structure with modular steps and takes into account uncertainty. The system is implemented as a GATE module. OntoGain, It focuses on multiword terms to construct a \"lexicalised ontology\" by adapting an agglomerative clustering and an FCA method. It implements 4, OLAF IN A PRACTICAL CONTEXT.Ontology = . Text2Onto, 2005, [1] representation-agnostic structure with modular steps and takes into account uncertainty. The system is implemented as a GATE module. OntoGain, It focuses on multiword terms to construct a \"lexicalised ontology\" by adapting an agglomerative clustering and an FCA method. It implements 4, = Pipeline Execution. OntoLearn (Reloaded), 2013, [3] It focuses on \"lexicalised ontologies\" and uses seed knowledge. It implements 5 steps: terminology extraction, hypernym graph construction, domain filtering of hypernyms, hypernym graph pruning and 2010, [2] steps: text preprocessing, concept extraction (C/NC- value), taxonomy construction, and non-taxonomic relation acquisition (rule-based and probabilistic)., Pros and cons Ontologies can be exported in = It relies on WordNet and POS It considers only multiword terms and relies on WordNet and POS tags. It does not distinguish between terms and concepts and implements different adaptable approaches.. OntoLearn (Reloaded), 2013, [3] It focuses on \"lexicalised ontologies\" and uses seed knowledge. It implements 5 steps: terminology extraction, hypernym graph construction, domain filtering of hypernyms, hypernym graph pruning and 2010, [2] steps: text preprocessing, concept extraction (C/NC- value), taxonomy construction, and non-taxonomic relation acquisition (rule-based and probabilistic).,", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + }, + { + "text": "OLAF : Ontology Learning Applied Framework\n= . OntoLearn (Reloaded), 2013, [3] It focuses on \"lexicalised ontologies\" and uses seed knowledge. It implements 5 steps: terminology extraction, hypernym graph construction, domain filtering of hypernyms, hypernym graph pruning and 2010, [2] steps: text preprocessing, concept extraction (C/NC- value), taxonomy construction, and non-taxonomic relation acquisition (rule-based and probabilistic)., Ontology based-system = . OntoLearn (Reloaded), 2013, [3] It focuses on \"lexicalised ontologies\" and uses seed knowledge. It implements 5 steps: terminology extraction, hypernym graph construction, domain filtering of hypernyms, hypernym graph pruning and 2010, [2] steps: text preprocessing, concept extraction (C/NC- value), taxonomy construction, and non-taxonomic relation acquisition (rule-based and probabilistic)., = Pipeline Building. OntoLearn (Reloaded), 2013, [3] It focuses on \"lexicalised ontologies\" and uses seed knowledge. It implements 5 steps: terminology extraction, hypernym graph construction, domain filtering of hypernyms, hypernym graph pruning and 2010, [2] steps: text preprocessing, concept extraction (C/NC- value), taxonomy construction, and non-taxonomic relation acquisition (rule-based and probabilistic).,", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + } + ] + }, + { + "references": { + "source_file": "infographic5.pdf", + "query": "Is Text2Onto still updated nowadays?", + "target_page": 1, + "target_passage": "But it is not maintained since 2011.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Availability\nThe information in this article is applicable to the following versions of Word.\nWord for Windows Version 2408 and later.\nWord for Mac Version 16.89 and later.\nWord for iOS Version 2.89 and later.\nWord for Android Build 16.0.18025.XXXXX or later.\nWord for the web Build 16.0.18025.XXXXX or later.\nIt is available to customers with Office 2024 or Office LTSC 2024 and to customers with a Microsoft 365 subscription on Current Channel or Monthly Enterprise Channel. For customers with a Microsoft 365 subscription on Semi-Annual Enterprise Channel it will be available on January 14, 2025.", + "page_start": 60, + "page_end": 60, + "source_file": "office-pdf.pdf" + }, + { + "text": "User Manual\n(As of 10 February 2014)", + "page_start": 0, + "page_end": 0, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "Get the latest version of the Redbooks Mobile App\nDownload Now", + "page_start": 14, + "page_end": 14, + "source_file": "sg246915.pdf" + }, + { + "text": "13.4.3 Updating your Storwize V7000 to V8.2.1\nWhen updating from a V8.1 or later level, another window is displayed at this point in which you can choose a fully automated update, one that pauses when half the nodes complete the update, or one that pauses after each node update, as shown in Figure 13-16. The pause option requires that you click Resume to continue the update after each pause. Click Finish .\nFigure 13-16 New V8.1 update pause options\n7. After the update packages upload, the update test utility looks for any known issues that might affect a concurrent update of your system. Click Read more (see Figure 13-17 on page 692).\nChapter 13. RAS, monitoring, and troubleshooting\n691\n692\nImplementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\nFigure 13-17 Issues detected by the update test utility\nThe results pane opens and shows you what issues were detected (see Figure 13-18). In our example, the system identified an error that one or more drives in the system are running microcode with a known issue and a warning that email notification (Call Home) is not enabled. Although this issue is not a recommended condition, it does not prevent the system update from running. Therefore, we click Close and proceed with the update. However, you might need to contact IBM Support to assist with resolving more serious issues before continuing.\nFigure 13-18 Description of the warning from the test utility\n8. Click Resume in the Update System window and the update proceeds, as shown in Figure 13-19.\nFigure 13-19 Resuming the update\n9. Because of the utility detecting issues, another warning comes up to ensure that you investigated them and are certain you want to proceed, as shown in Figure 13-20. When you are ready to proceed, click Yes .\nFigure 13-20 Warning before you can continue\n10.The system begins updating the IBM Spectrum Virtualize software by taking one node offline and installing the new code. This process takes approximately 20 minutes. After the node returns from the update, it is listed as complete, as shown in Figure 13-21.\nFigure 13-21 Update process paused for host path recovery", + "page_start": 712, + "page_end": 714, + "source_file": "sg247938.pdf" + }, + { + "text": "13.4.5 Manually updating the Storwize V7000\nTable 13-8 The iogrp\nnode 1 (config node), iogrp (1) = node 3. node 1 (config node), iogrp (2) = node 5. node 1 (config node), iogrp (3) = node 7. node 2, iogrp (1) = node 4. node 2, iogrp (2) = node 6. node 2, iogrp (3) = node 8", + "page_start": 720, + "page_end": 720, + "source_file": "sg247938.pdf" + }, + { + "text": "D Perplexity issues\nTable 16: Upgrade and downgrade rates for the downgrading variant of our rerouting attack, where the goal is to reroute queries to the weak model (white-box).\nMT-Bench, R SW.Up. = 0 ± 0. MT-Bench, R SW.Down. = 24 ± 2. MT-Bench, R MF.Up. = 0 ± 0. MT-Bench, R MF.Down. = 67 ± 6. MT-Bench, R CLS.Up. = 0 ± 0. MT-Bench, R CLS.Down. = 29 ± 3. MT-Bench, R LLM.Up. = 24 ± 3. MT-Bench, R LLM.Down. = 1 ± 0. MMLU, R SW.Up. = 8 ± 3. MMLU, R SW.Down. = 9 ± 2. MMLU, R MF.Up. = 0 ± 0. MMLU, R MF.Down. = 77 ± 7. MMLU, R CLS.Up. = 0 ± 0. MMLU, R CLS.Down. = 50 ± 4. MMLU, R LLM.Up. = 55 ± 4. MMLU, R LLM.Down. = 5 ± 1. GSM8K, R SW.Up. = 4 ± 2. GSM8K, R SW.Down. = 48 ± 9. GSM8K, R MF.Up. = 1 ± 1. GSM8K, R MF.Down. = 78 ± 11. GSM8K, R CLS.Up. = 0 ± 0. GSM8K, R CLS.Down. = 80 ± 4. GSM8K, R LLM.Up. = 21 ± 4. GSM8K, R LLM.Down. = 4 ± 2", + "page_start": 24, + "page_end": 24, + "source_file": "arxiv1.pdf" + }, + { + "text": "10.Reboot the VMs:\n0:00:02.873 ***** ok: [mstnode01.domain.example.com] PLAY [Populate config host groups] **************************************************************************************** ... Output truncated ... INSTALLER STATUS ********************************************************************************* Initialization : Complete (0:04:13) Wednesday 30 October 2019 19:53:17 +0000 (0:00:00.460)", + "page_start": 148, + "page_end": 148, + "source_file": "sg248459.pdf" + }, + { + "text": "e ,\nJ\nts on San tos' d thr ee-year or in th OR'S tos' 50th year ed in th e gr eat e shapin g\nf\ne\nT\n.\nes an\nactiviti\nT\n.\nts\notes to th\nn\nwh\n.\nts\nes an\nshar\nf\no\n.\nay\ntos tod\nSan\n,\nd\nn\ne\nd\nal divi\ng, fin\neetin\nal M\ner\nal Gen\nu\nAnn\n92\non,\nati\nxplor\ntos' global e\nSan\nf\ns o\non\nLocati\n8\non\nati\norm\nd inf\nes an\ner enquiri\nold\neh\nshar\n.\ners\nold\neh\nor shar\nces f\nesour\nr", + "page_start": 1, + "page_end": 1, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "Stay connected to IBM Redbooks\n/SM590000 Find us on Facebook:\nhttp://www.facebook.com/IBMRedbooks\n/SM590000 Follow us on Twitter:\nhttp://twitter.com/ibmredbooks\n/SM590000 Look for us on LinkedIn:\nhttp://www.linkedin.com/groups?home=&gid=2130806\n/SM590000 Explore new Redbooks publications, residencies, and workshops with the IBM Redbooks weekly newsletter:\nhttps://www.redbooks.ibm.com/Redbooks.nsf/subscribe?OpenForm\n/SM590000 Stay current on recent Redbooks publications with RSS Feeds:\nhttp://www.redbooks.ibm.com/rss.html\nxviii\nImplementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1", + "page_start": 19, + "page_end": 19, + "source_file": "sg247938.pdf" + }, + { + "text": "10.Reboot the VMs:\n0:00:02.605 ***** skipping: [mstnode01.domain.example.com] skipping: [wrknode01.domain.example.com] skipping: [wrknode02.domain.example.com] PLAY [Initialization Checkpoint Start] **************************************************************************************** TASK [Set install initialization 'In Progress'] **************************************************************************************** Thursday 28 November 2019 20:00:37 +0000 (0:00:00.268)", + "page_start": 148, + "page_end": 148, + "source_file": "sg248459.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_RCI_2013.pdf", + "query": "What was the proportion of revenue generated by wireless telecommunications operations in 2009?", + "target_page": 91, + "target_passage": "6,685", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Operating Revenue\nConsolidated revenue increased in 2012 by $140 million from 2011, Wireless contributed $142 million, Cable contributed $49 million and Media contributed $9 million, partially offset by decreases in revenue of $54 million in Business Solutions and in corporate items and intercompany eliminations of $6 million. The increase was due to overall higher subscriber levels, data revenue and equipment sales at Wireless and higher Internet revenue at Cable, partially offset by lower overall revenue at Business Solutions due to the phased exit of the legacy services business.", + "page_start": 59, + "page_end": 59, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Years Ended December 31, 2003, 2002 and 2001\nin thousands, except per share amounts\nOperating revenues:, 2003 = . Operating revenues:, 2002 = . Operating revenues:, 2001 = . Wireless (Notes 7 and 8), 2003 = $ 69,872. Wireless (Notes 7 and 8), 2002 = $ 57,867. Wireless", + "page_start": 15, + "page_end": 15, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "Average Revenue per User Calculations - Wireless\n12. , Years ended December 31.2013 = $ 59.58. , Years ended December 31.2012 = $ 59.79", + "page_start": 85, + "page_end": 85, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "DATA REVENUE GROWTH\nWHAT WE SAID: Generate double-digit wireless and broadband data growth consistent with our data usage monetization strategy.\nWHAT WE DID: Grew wireless and broadband data revenues by 17% and 16%, respectively over 2012 levels.", + "page_start": 1, + "page_end": 1, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Revenue by Product\nWireless:, 2013 = . Wireless:, 2012 = . Postpaid, 2013 = $ 6,470. Postpaid, 2012 = $ 6,402. Prepaid, 2013 = 278. Prepaid, 2012 = 317. Network revenue, 2013 = 6,748. Network revenue, 2012 = 6,719. Equipment sales, 2013 = 522. Equipment sales, 2012 = 561. Total Wireless, 2013 = 7,270. Total Wireless, 2012 = 7,280. Cable:, 2013 = . Cable:, 2012 = . Television, 2013 = 1,809. Television, 2012 = 1,868. Internet, 2013 = 1,159. Internet, 2012 = 998. Cable telephony, 2013 = 498. Cable telephony, 2012 = 477. Service revenue, 2013 = 3,466. Service revenue, 2012 = 3,343. Equipment sales, 2013 = 9. Equipment sales, 2012 = 15. Total Cable, 2013 = 3,475. Total Cable, 2012 = 3,358. Business Solutions:, 2013 = . Business Solutions:, 2012 = . Next generation, 2013 = 213. Next generation, 2012 = 162. Legacy, 2013 = 149. Legacy, 2012 = 183. Service revenue, 2013 = 362. Service revenue, 2012 = 345. Equipment sales, 2013 = 12. Equipment sales, 2012 = 6. Total Business Solutions, 2013 = 374. Total Business Solutions, 2012 = 351. Media:, 2013 = . Media:, 2012 = . Advertising, 2013 = 762. Advertising, 2012 = 784. Subscription, 2013 = 316. Subscription, 2012 = 264. Retail, 2013 = 305. Retail, 2012 = 276. Other, 2013 = 321. Other, 2012 = 296. Total Media, 2013 = 1,704. Total Media, 2012 = 1,620. Corporate items and intercompany eliminations, 2013 = (117). Corporate items and intercompany eliminations, 2012 = (123). , 2013 = $ 12,706. , 2012 = $ 12,486", + "page_start": 106, + "page_end": 106, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Information by S egment\nOperating revenue, Wireless = $ 7,270. Operating revenue, Cable = $ 3,475. Operating revenue, Business Solutions = $ 374. Operating revenue, Media = $ 1,704. Operating revenue, Corporate items and eliminations = $ (117). Operating revenue, Consolidated totals = $ 12,706. Operating costs 1, Wireless = 4,113. Operating costs 1, Cable = 1,757. Operating costs 1, Business Solutions = 268. Operating costs 1, Media = 1,543. Operating costs 1, Corporate items and eliminations = 32. Operating costs 1, Consolidated totals = 7,713. Adjusted operating profit, Wireless = 3,157. Adjusted operating profit, Cable = 1,718. Adjusted operating profit, Business Solutions = 106. Adjusted operating profit, Media = 161. Adjusted operating profit, Corporate items and eliminations = (149). Adjusted operating profit, Consolidated totals = 4,993. Restructuring, acquisition and other expenses, Wireless = . Restructuring, acquisition and other expenses, Cable = . Restructuring, acquisition and other expenses, Business Solutions = . Restructuring, acquisition and other expenses, Media = . Restructuring, acquisition and other expenses, Corporate items and eliminations = . Restructuring, acquisition and other expenses, Consolidated totals = 85. Stock-based compensation expense 1, Wireless = . Stock-based compensation expense 1, Cable = . Stock-based compensation expense 1, Business Solutions = . Stock-based compensation expense 1, Media = . Stock-based compensation expense 1, Corporate items and eliminations = . Stock-based compensation expense 1, Consolidated totals = 84. Depreciation and amortization, Wireless = . Depreciation and amortization, Cable = . Depreciation and amortization, Business Solutions = . Depreciation and amortization, Media = . Depreciation and amortization, Corporate items and eliminations = . Depreciation and amortization, Consolidated totals = 1,898. Operating income, Wireless = . Operating income, Cable = . Operating income, Business Solutions = . Operating income, Media = . Operating income, Corporate items and eliminations = . Operating income, Consolidated totals = 2,926. Finance costs, Wireless = . Finance costs, Cable = . Finance costs, Business Solutions = . Finance costs, Media = . Finance costs, Corporate items and eliminations = . Finance costs, Consolidated totals = (742). Other income, Wireless = . Other", + "page_start": 105, + "page_end": 105, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Operating Revenue\nWireless network revenue was higher than last year because of higher adoption and usage of wireless data services, partially offset by the introduction of lower priced roaming plans and pricing changes made over this year.\nCable operating revenue was higher than last year mainly because of growth in Internet and phone revenues and the acquisition of Mountain Cable, partially offset by a decline in television revenue related principally from competitive TV subscriber losses.\nBusiness Solutions operating revenue was higher than last year mainly because we completed the acquisitions of Blackiron Data and Pivot Data Centres earlier this year combined with the continued growth in on-net and next generation services, partially offset by planned decline in legacy voice and data services.\nMedia operating revenue was higher than last year mainly because of revenue growth at Sportsnet, higher attendance at Toronto Blue Jays games and higher sales at The Shopping Channel.", + "page_start": 39, + "page_end": 39, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "2003 compared to 2002\nTotal revenue was $105.9 million in 2003, an increase of $12.9 million or 13.9%. Total revenues included $70.0 million of wireless revenues, an increase of $12.0 million or 20.7%; wireline revenues of $29.0 million, an increase of $0.3 million or 0.9%; and other revenues of $7.0 million, an increase of $0.6 million or 9.7%.\nWithin wireless revenues, the PCS operation contributed $69.8 million, an increase of $11.6 million, or 20.8%. PCS service revenues were $44.4 million, an increase of $10.9 million or 32.4%. Service revenue growth was driven by the increase in subscribers, totaling 85,139 at December 31, 2003, an increase of 17,297 or 25.5%, compared to 67,842 subscribers at year-end 2002. The company had churn of 2.1% in 2003 compared to 2.8% in 2002. The decline in the churn rate is the result of tightening the credit screening for new subscribers as well as continued efforts to improve the after sales support. Competition in the wireless industry continues to have a significant impact on the results of the Company's PCS operation.\nPCS travel revenue, including reseller revenue, which is compensation between Sprint and its PCS Affiliates for use of the other party's network, was $16.8 million, an increase of $0.3 million or 1.8%. Travel revenue is impacted by the geographic size of the Company's network service area, the overall number of Sprint wireless customers, their travel patterns and the travel exchange rate. The rate received on travel was $0.058 per minute in 2003, compared to $0.10 per minute in 2002. As a part of the amended management agreement signed on January 30, 2004, Sprint and the Company agreed to maintain the travel rate at $0.058 per minute through December 31, 2006.\n45\n■\n2003 ANNUAL REPORT", + "page_start": 46, + "page_end": 46, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "WIRELESS FINANCIAL RESULTS\n$ 1,123. Additions to property, plant and equipment, Years ended December 31.% Chg = (23). Data revenue included in network revenue, Years ended December 31.2013 = $ 3,175. Data revenue included in network revenue, Years ended December 31.2012 = $ 2,722. Data revenue included in network revenue, Years ended December 31.% Chg = 17. Data revenue as % of network revenue, Years ended December 31.2013 = 47 %. Data revenue as % of network revenue, Years ended December 31.2012 = 41 %. Data revenue as % of network revenue, Years ended December 31.% Chg = \n1 Includes the cost of equipment sales and direct channel subsidies.", + "page_start": 42, + "page_end": 42, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "WIRELESS FINANCIAL RESULTS\nOperating revenue, Years ended December 31.2013 = . Operating revenue, Years ended December 31.2012 = . Operating revenue, Years ended December 31.% Chg = . Network revenue, Years ended December 31.2013 = $ 6,748. Network revenue, Years ended December 31.2012 = $ 6,719. Network revenue, Years ended December 31.% Chg = -. Equipment sales, Years ended December 31.2013 = 522. Equipment sales, Years ended December 31.2012 = 561. Equipment sales, Years ended December 31.% Chg = (7). Operating revenue - Wireless, Years ended December 31.2013 = 7,270. Operating revenue - Wireless, Years ended December 31.2012 = 7,280. Operating revenue - Wireless, Years ended December 31.% Chg = -. Operating expenses, Years ended December 31.2013 = . Operating expenses, Years ended December 31.2012 = . Operating expenses, Years ended December 31.% Chg = . Cost of equipment 1, Years ended December 31.2013 = (1,535). Cost of equipment 1, Years ended December 31.2012 = (1,585). Cost of equipment 1, Years ended December 31.% Chg = (3). Other operating expenses, Years ended December 31.2013 = (2,578). Other operating expenses, Years ended December 31.2012 = (2,632). Other operating expenses, Years ended December 31.% Chg = (2). , Years ended December 31.2013 = (4,113). , Years ended December 31.2012 = (4,217). , Years ended December 31.% Chg = (2). Adjusted operating profit - Wireless, Years ended December 31.2013 = $ 3,157. Adjusted operating profit - Wireless, Years ended December 31.2012 = $ 3,063. Adjusted operating profit - Wireless, Years ended December 31.% Chg = 3. Adjusted operating profit margin as % of network revenue, Years ended December 31.2013 = 46.8 %. Adjusted operating profit margin as % of network revenue, Years ended December 31.2012 = 45.6 %. Adjusted operating profit margin as % of network revenue, Years ended December 31.% Chg = . Additions to property, plant and equipment, Years ended December 31.2013 = $ 865. Additions to property, plant and equipment, Years ended December 31.2012 =", + "page_start": 42, + "page_end": 42, + "source_file": "NYSE_RCI_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_RCI_2013.pdf", + "query": "What has Rogers Communications done to improve its television platform?", + "target_page": 2, + "target_passage": "Launched NextBox 3.0 delivering a superior TV experience and leveraged the success of Rogers AnyPlace TV, our Internet and mobile on-demand TV service.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "EVOLVE AND ENHANCE TELEVISION PLATFORM\nWHAT WE SAID: Invest in the evolution of our current TV platform and extend our video offerings to new platforms.\nWHAT WE DID: Launched NextBox 3.0 delivering a superior TV experience and leveraged the success of Rogers AnyPlace TV, our Internet and mobile on-demand TV service.\n24 24 Management's Discussion and Analysis\n88 Management's Responsibility for Financial Reporting\n88 Independent Auditors' Report of Registered Public Accounting Firm\n89 Consolidated Statements of Income\n90 90 Con Con Consolsos idadated Statements of Com Com Comprepreprehenhenhensivsivsive Ie Ie nconcoomeme", + "page_start": 1, + "page_end": 1, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "DELIVERING WHAT'S NEXT\nThese are just a few examples of the ways Rogers continues to innovate and lead the way, introducing wireless, broadband and digital technologies and services that fundamentally change the way customers stay connected, informed and entertained anywhere they are. Canadians know there's one thing to be certain of - if they're with Rogers, they'll never miss a thing.\n2013 ANNUAL REPORT ROGERS COMMUNICATIONS INC. 15", + "page_start": 18, + "page_end": 18, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "DELIVERING WHAT'S NEXT\nLEADING NEXT GENERATION NETWORKS\nDIGITAL MEDIA\nADVANCED IP SOLUTIONS\nMOBILE COMMERCE\nHOME AUTOMATION\nENTERPRISE MOBILE APPLICATIONS\nMACHINE-TOMACHINE COMMUNICATIONS\nMOBILE STREAMING TELEVISION\nCONVERGED WIRELESS/ WIRELINE\n14 ROGERS COMMUNICATIONS INC. 2013 ANNUAL REPORT\nINNOVATION AND A DRIVE TO BE FIRST TO DELIVER THE MOST ADVANCED INFORMATION, COMMUNICATIONS, ENTERTAINMENT AND TRANSACTION SERVICES, SOLUTIONS AND DEVICES ARE AT THE VERY CORE OF ROGERS.\nAs one of the first carriers in the world to offer the telecommunications 'quadruple play' of wireless, television, Internet and telephony services over its own networks, few have more capabilities or success in enabling subscribers to enjoy their experiences across multiple screens.\nRogers has a long history of firsts, including the first cellular call in Canada, the world's first high-speed cable modem service, the first digital cellular network in North America, Canada's first video-on-demand and mobile TV services, the first HSPA and LTE networks and the first to offer iPhone, Android, BlackBerry and Windows 8 in Canada. With the combination of our advanced next-generation national wireless network, our powerful broadband cable infrastructure and our category-leading media assets, we are in a unique position to help Canadians to live like never before.\nOur new wireless Share Everything plans were Canada's first to let individuals, families and small businesses share wireless data and unlimited nationwide talk and text, with up to 10 wireless devices. Rogers recently further enhanced its exciting One Number service by introducing smartphone apps which enable customers to use mobile data or Wi-Fi to talk, text and video chat using their existing Rogers wireless number from any device.\nWe also keep customers informed and entertained with Rogers nextgeneration NextBox 3.0 TV experience which allows customers to view and record up to eight HD programs simultaneously, store hundreds of hours of content and enjoy whole-home PVR capability. And with Rogers Anyplace TV, it's also a wireless experience where viewers can navigate their cable guide, use a virtual remote, set PVR recordings and stream live or on-demand content from a tablet, smartphone, laptop or gaming console.\nRogers continues to be Canada's innovation leader in rapidly growing areas such as wireless machine-to-machine communications, remote home monitoring and automation, mobile payments, in-car infotainment and telematics, and digital media. As well, Rogers has deployed a suite of unique local digital services that create virtual marketplaces for bringing consumers and businesses together and provide location-based targeted offers.", + "page_start": 17, + "page_end": 18, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Rogers Communications is one of Canada's leading diversified communications and media companies.\nWe provide a broad range of services: wireless and wired voice and data communications, cable television, high-speed Internet, cable telephony, wired telecom and data networking services to consumers and businesses. We also compete in television and radio broadcasting, multi-platform shopping, sports media and entertainment, digital media and consumer, trade and professional publications.\nAlmost all of our operations and sales are in Canada. We have a highly skilled and diversified workforce of approximately 28,000 employees. Our head-office is in Toronto, Ontario and we have numerous offices across Canada.", + "page_start": 29, + "page_end": 29, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "OUR PROGRESS IN 2013\nWe expanded our wireless network by establishing key network sharing agreements to bring LTE to more customers at faster speeds to customers in Manitoba, Quebec and the Ottawa region, and through our relationship with AT&T to become the first Canadian carrier to offer LTE roaming for customers travelling to the US. We also secured an option to buy Shaw's Advanced Wireless Service (AWS) spectrum holdings.\n32 ROGERS COMMUNICATIONS INC. 2013 ANNUAL REPORT\nWe launched new products, including Rogers Smart Home Monitoring, to customers in Ontario's Golden Horseshoe area and Atlantic Canada. We completed several strategic acquisitions this year that strengthened our offering of cable television, Internet and telephony services in the Hamilton, Ontario area, established Business Solutions as a leader in Canadian data centre and hosting services and increased the reach of our television broadcast network to over 80 % of Canadian households.", + "page_start": 35, + "page_end": 35, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "CABLE AND BUSINESS SOLUTIONS SEGMENTS\nRogers Cable is a leading Canadian cable services provider, whose service territory covers approximately 4.0 million homes in Ontario, New Brunswick and Newfoundland representing approximately 30% of the Canadian cable market. Our advanced digital hybrid /fibre-coax network provides market leading highspeed broadband Internet access speeds, the most innovative selection of digital television and online viewing and telephony services to millions of residential and small business customers. Together with Rogers Business Solutions, it also provides scalable carrier-grade business telecom, networking, hosting and managed data services, and IP connectivity and solutions to medium and large enterprise, government and carrier customers.", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "STRATEGIC OBJECTIVES AND VALUE DRIVERS\nAt Rogers, our purpose is to easily connect customers with what matters most. Our vision is to be known for leading the enablement of seamless, and reliable experiences across any device, place or time.", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Understanding Our Business\nRogers Communications is one of Canada's leading diversified communications and media companies.\nOur vision is to be known for leading the enablement and delivery of seamless, customer-driven communications, entertainment, information and transactional experiences across any device, place or time.\nWireless provides wireless voice and data communication services, including machine to machine to both consumer and enterprise businesses, governments and other telecommunications service providers. Cable provides voice and data communications, home monitoring, television and high-speed Internet services to both consumers and businesses. Business S olutions provides voice and data communications and advanced services including data centre based solutions and cloud computing services to a wide range of medium to large businesses, including other service providers, and government either wirelessly or over our terrestrial network. Revenue generated from these segments is generally based on monthly subscription and network usage rates. Costs include attracting, setting-up and retaining customers, content, and the costs of upgrading and maintaining the underlying network.\nOur wireless network is currently one of the most extensive and advanced independent high-speed wireless data networks in Canada, capable of supporting wireless services on smartphones, tablets, computers and a broad variety of machine-to-machine and specialized devices. We built the first Long Term Evolution (LTE) high speed network in Canada, reaching nearly 73 % of the Canadian population at December 31, 2013. We also have roaming agreements with international carriers in more than 200 other countries, including 5 LTE roaming operators and have network sharing arrangements with several carriers in Canada.\nOur expansive fibre and hybrid fibre coaxial infrastructure delivers services to consumers and businesses in Ontario, New Brunswick and", + "page_start": 32, + "page_end": 32, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "WHY INVEST IN ROGERS\nRogers Communications has excellent positions in growing markets, powerful brands that stand for innovation, proven management, a long record of driving growth and shareholder value, and the financial strength to continue to deliver long-term growth.", + "page_start": 8, + "page_end": 8, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "MEDIA WIRELESS CABLE\nROGERS.COM\nROGERS COMMUNICATIONS INC. 2013 ANNUAL REPORT", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_RCI_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_RCI_2013.pdf", + "query": "Until what NHL season will the Vancouver's ice hockey team be a Rogers Communications partner?", + "target_page": 39, + "target_passage": "Sportsnet announced a 10-year partnership extension with the Vancouver Canucks through the 2022-2023 NHL seasons", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "MEDIA\nGLYPH<129> Exclusive NHL 12-year licensing agreement to broadcast national NHL games beginning with the 2014-2015 season was signed. The agreement grants Rogers the exclusive distribution of all national live and in-progress regular season and playoff games within Canada, in multiple languages, across all platforms. We executed separate agreements to sublicense certain of these broadcasting rights to TVA Sports and CBC.\nGLYPH<129> Sportsnet 360 was launched, which is comprised of the rebranded theScore assets. The acquisition of theScore received final regulatory approval in the first half of this year.\nGLYPH<129> Sportsnet announced a 10-year partnership extension with the Vancouver Canucks through the 2022-2023 NHL seasons, continuing a 14-year network tradition as the regional television broadcaster of Canucks hockey. The new agreement features a comprehensive suite of multimedia rights including television, online and mobile, delivering up to 60 regular season Vancouver Canucks games each season. Sportsnet is also the official regional television broadcast rights holder for the Toronto Maple Leafs, Calgary Flames and Edmonton Oilers.\nGLYPH<129> Next Issue Canada, an innovative, all-you-can-read subscription digital magazine service that provides consumers with exclusive and unlimited access to a catalogue of more than 100 premium Canadian and US titles was launched. Next Issue Canada delivers access to our leading publishing brands alongside many of the most popular US magazine titles.\nGLYPH<129> The Shopping Channel launched a brighter, easier, and more engaging multi-channel retail experience and a refreshed on-air and online look, an all-new mobile app, special-themed programming and improved shipping. The leading interactive and only national Canadian multi-channel retailer also added on-air social media engagement, new leading brands and more celebrity guest appearances.\nGLYPH<129> Sportsnet announced an eight-year multi-platform broadcast rights extension with MLB Properties and MLB Advanced Media to show live and in-progress regular season and playoff baseball games and highlights within Canada.\n2013 ANNUAL REPORT ROGERS COMMUNICATIONS INC.\n35\nM A NA G E M E N T ' S D I SCU S SI O N AN D ANAL Y S IS\nMANAGEMENT'S DISCUSSION AND ANALYSIS", + "page_start": 38, + "page_end": 39, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "S ignificant Developments\nGLYPH<129> Exclusive 12-year licensing agreement to broadcast national NHL games, beginning with the 2014-2015 season was signed. The agreement grants Rogers the exclusive distribution rights of all national regular season and playoff games within Canada, in multiple languages, across all platforms. At the same time, we executed separate agreements to sublicence certain of these broadcasting rights to TVA Sports and CBC.\nGLYPH<129> Strategic acquisitions of Score Media Inc. (theScore), Mountain Cablevision Ltd. (Mountain Cable), Blackiron Data ULC (Blackiron) and Pivot Data Centres were completed.\nGLYPH<129> Rogers First Rewards, a new loyalty program allowing customers to earn points on their eligible purchases and redeem them online for a wide selection of Rogers products and services, was launched in the Greater Toronto Area, Ottawa, Kingston, Sudbury and other cities throughout Ontario. We also received regulatory approval to launch a Rogers credit card which augments this loyalty program and will accelerate the rate at which customers earn points.", + "page_start": 31, + "page_end": 31, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "NHL\nGLYPH<129> Advanced our strategy of delivering highly sought-after sports content anywhere, anytime, on any platform and strengthening the value of our sports brand by entering into an exclusive 12-year licensing agreement with the NHL which begins with the 2014-2015 season and grants Rogers the following:\n-national rights across television broadcasts, wireless and mobile tablets and Internet streaming\n-national rights to all regular season games, all playoff games and the Stanley Cup Final, and all special events and nongame events (e.g. NHL All-Star Game, NHL Draft) - in multiple languages\n-out-of-market rights for all regional games\n-ownership of all linear and digital highlights, including condensed games and video archives\n-NHL broadcast assets: Rogers to operate NHL Centre Ice and NHL Game Centre Live\n-sponsorship rights to the NHL Shield logo as an official partner of the NHL\n-Canadian representation of ad sales for NHL.com\n-ownership of all commercial inventories for the television broadcasts\n-rights to sublicense broadcasting rights to TVA and CBC\n-rights to use the Hockey Night In Canada brand through the CBC sublicense agreement.\nThrough this agreement, Rogers plans to provide Canadians with a unique viewing experience that will feature expanded pre- and postgame coverage of regular season and playoff games and other enhanced NHL content. We expect this agreement to drive Sportsnet subscriber growth and to provide highly sought after content in multiple languages across all of Rogers' platforms.\n48 ROGERS COMMUNICATIONS INC. 2013 ANNUAL REPORT", + "page_start": 51, + "page_end": 51, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Rogers Communications is one of Canada's leading diversified communications and media companies.\nWe provide a broad range of services: wireless and wired voice and data communications, cable television, high-speed Internet, cable telephony, wired telecom and data networking services to consumers and businesses. We also compete in television and radio broadcasting, multi-platform shopping, sports media and entertainment, digital media and consumer, trade and professional publications.\nAlmost all of our operations and sales are in Canada. We have a highly skilled and diversified workforce of approximately 28,000 employees. Our head-office is in Toronto, Ontario and we have numerous offices across Canada.", + "page_start": 29, + "page_end": 29, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "LEADING CONTENT\n12 ROGERS COMMUNICATIONS INC. 2013 ANNUAL REPORT\nROGERS IS COMMITTED TO DELIVERING WORLD-CLASS CONTENT AND EXPERIENCES TO CONSUMERS AND ADVERTISING SOLUTIONS TO BUSINESSES. THE COMPANY HAS A STRONG LEGACY OF BUILDING POWERFUL MEDIA BRANDS WITH COMPELLING CONTENT THAT RESONATES WITH AUDIENCES ACROSS MULTIPLE PLATFORMS ON ANY DEVICE.\nToday, businesses across Canada connect with customers through Rogers category-leading television and radio assets, sports entertainment, televised and online shopping, publishing, and digital media properties as the one-stop solution for all their local and national advertising needs.\nRogers Media is Canada's premier combination of diversified broadcast, specialty, sports, print and online media assets which together touch nearly 90% of Canadians every week. This includes over 50 popular AM and FM radio stations across Canada. In television, it includes the seven station City network which broadcasts intensely local, urban-oriented\nprogramming across the country's largest markets, as well as five OMNI Television stations which deliver multilingual news, information and entertainment to Canada's multiple language communities.\nThe Sportsnet specialty network provides sports programming across Canada through its four regional television channels and its nationallydistributed Sportsnet ONE, Sportsnet World, and Sportsnet 360 stations. Rogers also owns other Canadian specialty television channels, including FX Canada, OLN, The Biography Channel and G4.\nThe Shopping Channel - Canada's only nationally televised and Internet shopping service - is a leading interactive multi-channel retailer, offering a vast assortment of exclusive products and top brand names. As one of Canada's most innovative and diversified retailers, it provides customers with exceptional selections in health/beauty, jewelry, home/lifestyle, fashion/accessories, and electronics.\nRogers also publishes many well-known consumer magazines, such as Maclean's, Chatelaine, FLARE, L'actualité, and Canadian Business, and is the leading publisher of a number of industry, medical and financial publications. Rogers also controls a suite of fast-growing digital media assets, including 90+ owned and 300+ premium partnership online sites, as well as the recently launched Next Issue Canada digital magazine platform which provides 100+ of North America's most celebrated titles on an unlimited anytime, anywhere basis.\nIn sports entertainment, Rogers owns the Toronto Blue Jays baseball team and Rogers Centre stadium, Canada's largest sports and entertainment facility and home field of the Blue Jays. Rogers also holds a 37.5% investment in Maple Leaf Sports & Entertainment which owns the NHL Maple Leafs, NBA Raptors, MLS Toronto FC and a number of other sports related assets.", + "page_start": 15, + "page_end": 16, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "MEDIA SEGMENT\nRogers Media is Canada's premier destination for category-leading television and radio broadcasting, sports entertainment, publishing, and digital media properties. Television assets include national City network which reaches more than 80% of Canadians, /five OMNI Television multilingual channels, seven regional and national Sportsnet channels, as well as specialty channels FX Canada, OLN, The Biography Channel and G4. Rogers Media also owns The Shopping Channel, Canada's only nationally televised and online shopping service. It operates more than 50 Canadian radio stations, publishes 50+ well known consumer and business magazines, and owns a suite of digital media properties. Media owns the Toronto Blue Jays Baseball Club and Rogers Centre, Canada's largest sports and entertainment facility. Rogers also holds a 37.5% investment in Maple Leaf Sports & Entertainment, owner of NHL Toronto Maple Leafs, NBA Toronto Raptors and MLS Toronto FC.\n'ROGGEERRSS MADE CLEAR PROGRESS ON A NUMBER OF S STTRRAATTEGIC FRONTS, WHILE CONTINUING TO DELIVER S STTRONG RETURNS TO SHAREHOLDERS AND BUILDING U UPPOON THE COMPANY'S DEEP-ROOTED FOUNDATIONS FOORR TTHHE FUTURE BENEFIT OF ALL OUR STAKEHOLDERS.'\nALAN HORN, CPA, CA", + "page_start": 3, + "page_end": 5, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "OUR PROGRESS IN 2013\nWe continued to evolve our wireless offering this year, redesigning and simplifying wireless offerings and pricing tiers, and introducing Canada's first wireless Share Everything plan. We also launched a hybrid wireless home and small business phone solution that operates on our national wireless network.\nCable unveiled the next generation of TV experience with NextBox 3.0, and Media made significant progress this year, announcing a landmark exclusive 12-year licensing agreement to broadcast national NHL games, launching a subscription digital magazine service, upgrading The Shopping Channel, and including adding a mobile app and social media. It also launched Sportsnet 360, and announced a 10-year partnership extension with the Vancouver Canucks.", + "page_start": 35, + "page_end": 35, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "DELIVERING WHAT'S NEXT\nThese are just a few examples of the ways Rogers continues to innovate and lead the way, introducing wireless, broadband and digital technologies and services that fundamentally change the way customers stay connected, informed and entertained anywhere they are. Canadians know there's one thing to be certain of - if they're with Rogers, they'll never miss a thing.\n2013 ANNUAL REPORT ROGERS COMMUNICATIONS INC. 15", + "page_start": 18, + "page_end": 18, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "A MESSAGE FROM THE PRESIDENT & CEO\nAs I write these words after recently joining the company, I can say with genuine enthusiasm that it's great to be here at Rogers. I took this post because Rogers is a remarkable company with a rich history and an unrivalled mix of wireless, cable and media assets. It is a good match with my background and my experience.\nDuring the recruiting and onboarding process, I spent considerable time with the Rogers family, the Board of Directors and the leadership team. I am struck by their energy, passion and drive to win, which I think we can harness to do even greater things. I also value the support and longerterm focus of the founding Rogers family who own significant equity in the company.\nSince joining, I have criss-crossed Canada meeting my team, external stakeholders and customers. I have also conducted numerous business reviews, overseen the 700 MHz spectrum auction and reviewed the regulatory agenda. All this with the view to developing a detailed set of priorities and plans for the company going forward. After I complete this review in the Spring I will outline a detailed strategy and business plan working with my management team.\nRogers has many strengths and I intend to capitalize on them. This is a financially strong company with a solid balance sheet and investment grade credit ratings. We have highly advanced cable and wireless networks and a robust portfolio of media assets. We also have a strong pipeline of new products and services to offer to our customers and some of the most passionate, committed employees I have ever worked with.\nWhile it is early days, I believe we can evolve the business in a way that will be even more rewarding for our customers, our shareholders and employees. Our goal is clear - winning on a consistent basis. And while our industry faces the challenge of moderating growth and regulatory uncertainty, few industries are more dynamic and better at leveraging new technologies.\nTo win, we must put our customers' needs front and centre in everything we do. This means delivering a better and more consistent customer experience. It means strengthening our value proposition to make sure our customers can answer the question 'why Rogers?' As a company, we need to bring our collection of assets together in a way that strengthens and differentiates Rogers with our customers and our shareholders. We also need to align and focus our investments in key areas to accelerate our growth. Internally we need to execute with operational excellence. And we need to focus on clarifying accountabilities and strengthening our teams at all levels of the company.", + "page_start": 6, + "page_end": 6, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Understanding Our Business\nRogers Communications is one of Canada's leading diversified communications and media companies.\nOur vision is to be known for leading the enablement and delivery of seamless, customer-driven communications, entertainment, information and transactional experiences across any device, place or time.\nWireless provides wireless voice and data communication services, including machine to machine to both consumer and enterprise businesses, governments and other telecommunications service providers. Cable provides voice and data communications, home monitoring, television and high-speed Internet services to both consumers and businesses. Business S olutions provides voice and data communications and advanced services including data centre based solutions and cloud computing services to a wide range of medium to large businesses, including other service providers, and government either wirelessly or over our terrestrial network. Revenue generated from these segments is generally based on monthly subscription and network usage rates. Costs include attracting, setting-up and retaining customers, content, and the costs of upgrading and maintaining the underlying network.\nOur wireless network is currently one of the most extensive and advanced independent high-speed wireless data networks in Canada, capable of supporting wireless services on smartphones, tablets, computers and a broad variety of machine-to-machine and specialized devices. We built the first Long Term Evolution (LTE) high speed network in Canada, reaching nearly 73 % of the Canadian population at December 31, 2013. We also have roaming agreements with international carriers in more than 200 other countries, including 5 LTE roaming operators and have network sharing arrangements with several carriers in Canada.\nOur expansive fibre and hybrid fibre coaxial infrastructure delivers services to consumers and businesses in Ontario, New Brunswick and", + "page_start": 32, + "page_end": 32, + "source_file": "NYSE_RCI_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_EMMS_2004.pdf", + "query": "I am a shareholder of Emmis Communication, but I will be available from the 20th of June to the 4th of July, will the Annual Meeting take place during this period?", + "target_page": 6, + "target_passage": "The Annual Meeting of shareholders will be held at 10 a.m. Central Time on Wednesday, June 30, 2004, at Emmis’ Corporate office.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Annual Meeting\nThe Annual Meeting of shareholders will be held at 10 a.m. Central Time on Wednesday, June 30, 2004, at Emmis' Corporate office.", + "page_start": 5, + "page_end": 5, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "ANNUAL MEETING\nThe Board of Directors extends an invitation to all shareholders to attend the Annual Meeting of Shareholders. The meeting will be held at 11:00 AM (EST) on April 20, 2004 in the Auditorium of the Company's offices at the Shentel Center, 500 Mill Road, Edinburg, Virginia.", + "page_start": 58, + "page_end": 58, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "ANNUAL MEETING\nThe Company's annual shareholders' meeting will be held at 10:30 a.m. on May 4, 2004, at the Holiday Inn, Highways 61 & 38 North, Muscatine, Iowa. Shareholders and other interested investors are encouraged to attend the meeting.", + "page_start": 62, + "page_end": 62, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "DIRECTORS' REPORT\nat the Company's annual general meeting in November 2000, it was proposed to invite each holder of the above options to subscribe for one new 30 November 2001, 0.75 cent option for each of the above options held on its expiry at a proposed issue price of 1 cent per new option.\nThere is no inherent right arising from these options to participate in any new issue of shares in the Company which may be offered to shareholders from time to time prior to the exercise of the options. The Company will ensure however, that during the exercise period, for the purpose of determining entitlement to any new issue, the relevant record date will be at least 12 business days after the new issue is exercised, so as to give the holder of options an opportunity to exercise their options prior to the relevant record date of any new issue.\nIn accordance with the provisions of the", + "page_start": 34, + "page_end": 34, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "A NNUAL M EETING\nThe annual meeting of shareholders will be held on Thursday, April 24, 2003, in Corning, NY. A formal notice of the meeting together with a proxy statement will be mailed to shareholders on or about March 12, 2003. The proxy statement can also be accessed electronically through the Investor Relations category of the Corning home page on the Internet at www.corning.com. A summary report of the proceedings at the annual meeting will be available without charge upon written request to Ms. Denise A. Hauselt, Secretary and Assistant General Counsel, Corning Incorporated, HQ-E2-10, Corning, NY 14831.", + "page_start": 10, + "page_end": 10, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "Form 10-K\nA copy of the Annual Report on Form 10-K for the fiscal year ended February 29, 2004, which was filed with the Securities and Exchange Commission, will be sent to shareholders without charge upon written request to Kate Healey, Emmis Communications Corporation, One Emmis Plaza, 40 Monument Circle, Suite 700, Indianapolis, Indiana 46204, or ir@emmis.com.", + "page_start": 5, + "page_end": 5, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "Annual General Meeting\nThe Annual General Meeting of Shareholders will be held on Wednesday, May 7, 2014, at 2:00 pm Atlantic Time at the Halifax Marriott Harbourfront Hotel, 1919 Upper Water Street, Halifax, Nova Scotia.\nour annual report is printed on stock containing recycled material. Please recycle. our report is also available on-line at: killamproperties.com/ financial-reports\nKillam ProPerties inc | 2013 97\nKillam properties Inc. suite 100 3700 Kempt road Halifax, nova scotia B3K 4X8\n1.866.453.8900 killamproperties.com tsx: kmp", + "page_start": 96, + "page_end": 97, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "ANNUAL MEETING\nThe Annual Meeting of Shareholders will be held at 10:00 a.m., Tuesday, October 23, 2012, at the Corporate Headquarters of Applied Industrial Technologies, 1 Applied Plaza, East 36th and Euclid Avenue, Cleveland, Ohio 44115.", + "page_start": 46, + "page_end": 46, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "Item 13. Certain Relationships and Related Transactions, and Director Independence.\nThe information required under this item is included in the following sections of our Proxy Statement for our 2015 Annual Meeting of Shareholders, the sections of which are incorporated by reference herein and will be filed within 120 days after the end of our fiscal year:\nElection of Directors\nCertain Relationships and Related Transactions", + "page_start": 79, + "page_end": 79, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Item 12. Security Ownership of Certain Beneficial Owners and Management and Related Shareholder Matters.\nThe information required under this item is included in the following sections of our Proxy Statement for our 2015 Annual Meeting of Shareholders, the sections of which are incorporated by reference herein and will be filed within 120 days after the end of our fiscal year:\nSecurity Ownership of Certain Beneficial Owners and Management Equity Compensation Plans", + "page_start": 79, + "page_end": 79, + "source_file": "NYSE_JWN_2014.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_EMMS_2004.pdf", + "query": "Who is the President of the TV Department of Emmis Communications?", + "target_page": 6, + "target_passage": "Randall Bongarten Television Division President", + "chunk_present": { + "presence": true, + "index": 6 + } + }, + "top_chunk": [ + { + "text": "Business\nEmmis Communications (NASDAQ: EMMS) is a diversified media firm with awardwinning radio broadcasting, television broadcasting and magazine publishing operations. Emmis' 23 FM and 4 AM domestic radio stations serve the nation's largest markets of New York, Los Angeles and Chicago as well as Phoenix, St. Louis, Austin, Indianapolis and Terre Haute, Ind. The company's 16 television stations are located in Albuquerque, N.M.; Fort Myers, Fla.; Green Bay, Wis.; Honolulu; Huntington, W.Va.; Mobile, Ala./Pensacola, Fla.; New Orleans; Omaha, Neb.; Orlando, Fla.; Portland, Ore.; Terre Haute, Ind.; Topeka, Kan.; Tucson, Ariz.; and Wichita, Kan. Emmis also publishes Indianapolis Monthly, Texas Monthly, Cincinnati, Atlanta, Los Angeles and Country Sampler Group magazines; has a 59.5% interest in Sláger Rádió, a national radio network in Hungary; operates nine FM radio stations serving more than 50 percent of the population in the Flanders region of Belgium; and has ancillary businesses in broadcast sales, publishing and interactive products.", + "page_start": 5, + "page_end": 5, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "about emmis\nEmmis Communications (NASDAQ: EMMS) owns 23 FM and 4 AM domestic radio stations serving the nation's largest markets of New York, Los Angeles and Chicago as well as Phoenix, St. Louis, Austin, Indianapolis and Terre Haute, Ind. In addition, Emmis owns 16 television stations, award-winning regional and specialty magazines, a radio network, international radio interests, and ancillary businesses in broadcast sales and publishing.\nEmmis was founded in 1980, and the company launched its first radio station, WENS-FM, in July 1981. As Emmis (the Hebrew word for 'truth') acquired more radio stations across the nation, it established a reputation for sound operations and emerged as a radio industry leader and innovator. Emmis was the first broadcast company to own toprated radio stations in both L.A. and New York, and it pioneered such concepts as the all-sports format.\nThe company launched its magazine division in 1988 with the purchase of Indianapolis Monthly , and moved into the world of international radio in 1997, when it was awarded a license to operate a national radio network in Hungary. In 1998, Emmis expanded into television by buying six television stations in markets throughout the United States. In the last six years, the company has added properties in each of its divisions.\nWith its emphasis on solid operations, integrity, community involvement and fun, the company's culture has been repeatedly lauded by both its employees and its peers. Trade publications have regularly cited the company's leaders as being among the best in the business.\nEmmis became a public company in 1994. It maintains its worldwide headquarters in Indianapolis, where the company was founded.\nThis annual report contains certain non-GAAP measures. For a presentation of the directly comparable GAAP measure and a reconciliation of the non-GAAP measures to the GAAP measures, see the attachment to the back of our Form 10-K in this Annual Report.", + "page_start": 1, + "page_end": 1, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "Board of Directors\nJeffrey H. Smulyan Chairman of the Board, President and Chief Executive Officer\nSusan B. Bayh\nFormer Commissioner of the International Joint Commission of the United States and Canada\nWalter Z. Berger\nExecutive Vice President,\nChief Financial Officer and Treasurer\nGary L. Kaseff Executive Vice President, General Counsel\nRichard A. Leventhal\nPresident and Majority Owner,\nLMCS, LLC\nPeter A. Lund\nMedia consultant and former President of CBS Inc.\nGreg A. Nathanson Media consultant and former President of Fox Television Stations and Emmis Television\nFrank V. Sica\nSenior Advisor\nSoros Fund Management LLC\nLawrence B. Sorrel Managing Partner and Co-CEO Tailwind Capital Partners\nemmis entities, 1 = St. Louis. emmis", + "page_start": 5, + "page_end": 6, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "The year ahead\nThat last point - innovation - is an important one, especially for the future of Emmis, because we are planning something\nthat could change the face of American TV and once again demonstrate that Emmis is a company that leads the way.\nForty years ago, Americans began taking down their TV antennas and severing broadcasters' direct link to television audiences. Since then, the cable companies-the middlemen who replaced us-have created more than $300 billion of value for themselves. However, changes in technology have given broadcasters the ability to provide the American public with the most popular TV channels, without the middlemen and at a more reasonable price.\nWe are developing an innovative model that will leverage that technology to get broadcast companies back into the game. I believe it has the potential to revolutionize the television industry. I also believe it will add substantial value to your investment.\nWe unveiled this concept at the National Association of Broadcasters meeting in April. I am proud to say that 11 other television companies joined us at that meeting to express their support for what we're calling the Broadcasters' Initiative, and more are signing on each week. Once again, Emmis has leveraged innovation to take a leading role in our industries.\nWe'll continue to use innovation to push us forward. Meanwhile, we'll also build and maintain the best teams, produce the best media content, outhustle and outsell our competitors, seize the best opportunities and operate this company better than any other.\nIn other words, you can count on Emmis to continue to do what it has always done: Outperform.\nThank you for your belief and investment in Emmis.\nJeffrey H. Smulyan\nchairman & ceo emmis communications", + "page_start": 4, + "page_end": 4, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "16 Robert W. Bruce\nPresident, Communications Division", + "page_start": 24, + "page_end": 24, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Outperform\nEmmis Communications 2004 Annual Report", + "page_start": 0, + "page_end": 0, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "Executive Officers\nJeffrey H. Smulyan Chairman of the Board, President and Chief Executive Officer\nWalter Z. Berger\nExecutive Vice President, Chief Financial Officer and Treasurer\nRandall Bongarten Television Division President\nRichard F. Cummings Radio Division President\nGary L. Kaseff\nExecutive Vice President, General Counsel\nPaul W. Fiddick International Division President\nMichael Levitan Senior Vice President, Human Resources\nGary Thoe\nPublishing Division President", + "page_start": 5, + "page_end": 5, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "Sean E. O'Hara\nManaging Director", + "page_start": 36, + "page_end": 36, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "Alexis M. Herman\nDirector President, Alexis M. Herman, LLC", + "page_start": 79, + "page_end": 79, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "Annual Meeting\nThe Annual Meeting of shareholders will be held at 10 a.m. Central Time on Wednesday, June 30, 2004, at Emmis' Corporate office.", + "page_start": 5, + "page_end": 5, + "source_file": "NASDAQ_EMMS_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_EMMS_2004.pdf", + "query": "Does the radio station 93.7 in Austin belong to Emmis Communication?", + "target_page": 7, + "target_passage": "KLBJ-FM (93.7), Album Oriented Rock", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Business\nEmmis Communications (NASDAQ: EMMS) is a diversified media firm with awardwinning radio broadcasting, television broadcasting and magazine publishing operations. Emmis' 23 FM and 4 AM domestic radio stations serve the nation's largest markets of New York, Los Angeles and Chicago as well as Phoenix, St. Louis, Austin, Indianapolis and Terre Haute, Ind. The company's 16 television stations are located in Albuquerque, N.M.; Fort Myers, Fla.; Green Bay, Wis.; Honolulu; Huntington, W.Va.; Mobile, Ala./Pensacola, Fla.; New Orleans; Omaha, Neb.; Orlando, Fla.; Portland, Ore.; Terre Haute, Ind.; Topeka, Kan.; Tucson, Ariz.; and Wichita, Kan. Emmis also publishes Indianapolis Monthly, Texas Monthly, Cincinnati, Atlanta, Los Angeles and Country Sampler Group magazines; has a 59.5% interest in Sláger Rádió, a national radio network in Hungary; operates nine FM radio stations serving more than 50 percent of the population in the Flanders region of Belgium; and has ancillary businesses in broadcast sales, publishing and interactive products.", + "page_start": 5, + "page_end": 5, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "about emmis\nEmmis Communications (NASDAQ: EMMS) owns 23 FM and 4 AM domestic radio stations serving the nation's largest markets of New York, Los Angeles and Chicago as well as Phoenix, St. Louis, Austin, Indianapolis and Terre Haute, Ind. In addition, Emmis owns 16 television stations, award-winning regional and specialty magazines, a radio network, international radio interests, and ancillary businesses in broadcast sales and publishing.\nEmmis was founded in 1980, and the company launched its first radio station, WENS-FM, in July 1981. As Emmis (the Hebrew word for 'truth') acquired more radio stations across the nation, it established a reputation for sound operations and emerged as a radio industry leader and innovator. Emmis was the first broadcast company to own toprated radio stations in both L.A. and New York, and it pioneered such concepts as the all-sports format.\nThe company launched its magazine division in 1988 with the purchase of Indianapolis Monthly , and moved into the world of international radio in 1997, when it was awarded a license to operate a national radio network in Hungary. In 1998, Emmis expanded into television by buying six television stations in markets throughout the United States. In the last six years, the company has added properties in each of its divisions.\nWith its emphasis on solid operations, integrity, community involvement and fun, the company's culture has been repeatedly lauded by both its employees and its peers. Trade publications have regularly cited the company's leaders as being among the best in the business.\nEmmis became a public company in 1994. It maintains its worldwide headquarters in Indianapolis, where the company was founded.\nThis annual report contains certain non-GAAP measures. For a presentation of the directly comparable GAAP measure and a reconciliation of the non-GAAP measures to the GAAP measures, see the attachment to the back of our Form 10-K in this Annual Report.", + "page_start": 1, + "page_end": 1, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "what it has always done: outperform.\nIn addition, we commit ourselves to creating the best content in our markets. Our magazines routinely dominate their industry awards ceremonies - last year, Texas Monthly won a coveted National Magazine Award, and Emmis publications claimed more than half of the awards at the City and Regional Magazine competition. Our radio stations feature some of the industry's most popular personalities - in 2003, Emmis people and stations were awarded three Marconi Radio Awards. And our television operations are regularly honored by journalism organizations for their news gathering and community service. In short, we provide our markets with reliable, high-quality content - content that helps us assemble the audiences our advertisers want to reach.\nWe then generate revenue by overallocating to sales. We give our teams well-developed strategies, clearly defined brands and solid products. We build bigger, better sales forces and put a greater emphasis on local dollars than our competitors. We hire aggressive managers, set ambitious goals and then watch our people work harder and smarter than anyone else.\nWe also seize the right opportunities and make the most of them. As the cost of buying radio properties has gone through the roof, we have been careful about buying. However, when we had a chance to acquire the LBJ stations in Austin, we knew it was the right fit: good stations, a tremendous heritage and a great culture, all with an opportunity for growth. And we've already built on that group's track record - since we bought them, we've reformatted one station and quickly sent it to No. 1 in the market, and we've pushed revenues up 9 percent for the entire group.\nFinally, we innovate. Why has Emmis, traditionally a radio company, become the company to emulate in TV? Because we approached TV in a way it's never been approached before. Why do we operate leading hip-hop stations in markets across the nation? Because we pioneered the concept. Why have we created a new 'Music with Class' format in St. Louis' Red 104.1? Because we believe we see a new opportunity. We know that successful companies don't follow the pack. They lead it, and that's what we'll always do.", + "page_start": 4, + "page_end": 4, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "The best year\nThe bottom line is this: Emmis Communications turned in a remarkable performance last year. Again and again, and by a number of measures, we outperformed our peers, our markets and our own solid track record.\nAnd we did this in a year that was challenging in just about every way. The economy was unstable, public companies came under continuing scrutiny, indecency issues hounded broadcasters, competition for tight ad dollars increased and technology continued to reshape the media world.\nBut our people refused to be slowed by those challenges. Instead, they worked through them. They innovated, hustled and focused. And they produced.\nOur radio division's revenue growth led our markets and the industry - in our fiscal year, our group was up 4.5 percent while our markets were up 2.7 percent and the industry only 1 percent. Based on this kind of performance, we have consistently ranked among the nation's leaders in per-station revenue, and we continue to produce top-rated programming in markets across the nation.\nOur TV performance was even more impressive. The Emmis television group's revenues were up 0.5 percent in calendar 2003, a year when our markets saw a 2.3 percent decrease in revenues, and the industry experienced a 4.7 percent revenue decline. This industry-leading result made us one of the few groups in the nation to post positive growth. In addi-\ntion, we gained revenue share at 11 of our 13 measured stations and held the line on expenses, giving us a 1.2 percent increase in fiscal-year cash flow.\nOur publishing and international divisions also posted strong results. In a tough publishing market, our magazines boosted their division's revenues by 4.6 percent over last year and increased cash flow by 3.3 percent. Our international division turned in a revenue increase of 27 percent and a cash flow increase of 31 percent.\nIn addition to boosting performance in our divisions, we honed our corporate operations by continuing to build one of the most adept and hardest-working corporate groups in American media. With this team in place, we've brought our leverage and cost of capital down to more manageable levels, found ways to combat the continually increasing costs of health insurance and, in a truly top-notch effort, smoothly integrated our new Austin radio properties - in just under a year as a part of Emmis, the Austin properties are enjoying significant ratings and revenue increases.", + "page_start": 3, + "page_end": 3, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "Outperform\nEmmis Communications 2004 Annual Report", + "page_start": 0, + "page_end": 0, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "Board of Directors\nWRKS-FM(98.7), Classic Soul/Today's R&B Phoenix, 1 = Mobile, Ala./Pensacola, Fla., WBPG-TV (Channel. WRKS-FM(98.7), Classic Soul/Today's R&B Phoenix, 2 = RELATED BUSINESSES. KKFR-FM(92.3), Rhythmic CHR, 1 = 55), WB programming. KKFR-FM(92.3), Rhythmic CHR, 2 = Emmis Books. KKLT-FM (98.7), Adult Contemporary, 1 = New Orleans, WVUE-TV (Channel 8),. KKLT-FM (98.7), Adult Contemporary, 2 = Emmis Interactive. KMVP-AM (860), Sports, 1 = Fox programming/local news. KMVP-AM (860), Sports, 2 = RDS. KTAR-AM (620), News/Talk/Sports, 1 = Omaha, Neb., KMTV-TV (Channel 3),. KTAR-AM (620), News/Talk/Sports, 2 = . , 1 = CBS programming/local news. , 2 = \nemmis communications one emmis plaza 40 monument circle indianapolis, indiana 46204", + "page_start": 6, + "page_end": 7, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "The year ahead\nThat last point - innovation - is an important one, especially for the future of Emmis, because we are planning something\nthat could change the face of American TV and once again demonstrate that Emmis is a company that leads the way.\nForty years ago, Americans began taking down their TV antennas and severing broadcasters' direct link to television audiences. Since then, the cable companies-the middlemen who replaced us-have created more than $300 billion of value for themselves. However, changes in technology have given broadcasters the ability to provide the American public with the most popular TV channels, without the middlemen and at a more reasonable price.\nWe are developing an innovative model that will leverage that technology to get broadcast companies back into the game. I believe it has the potential to revolutionize the television industry. I also believe it will add substantial value to your investment.\nWe unveiled this concept at the National Association of Broadcasters meeting in April. I am proud to say that 11 other television companies joined us at that meeting to express their support for what we're calling the Broadcasters' Initiative, and more are signing on each week. Once again, Emmis has leveraged innovation to take a leading role in our industries.\nWe'll continue to use innovation to push us forward. Meanwhile, we'll also build and maintain the best teams, produce the best media content, outhustle and outsell our competitors, seize the best opportunities and operate this company better than any other.\nIn other words, you can count on Emmis to continue to do what it has always done: Outperform.\nThank you for your belief and investment in Emmis.\nJeffrey H. Smulyan\nchairman & ceo emmis communications", + "page_start": 4, + "page_end": 4, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "emmis communications 2004 abbreviated financial highlights\nin thousands except where noted\nnet revenues, '00 = 325,265. net revenues, '01 = 473,345. net revenues, '02 = 539,822. net revenues, '03 = 562,363. net revenues, '04 = 591,868. station operating income*, '00 = 125,477. station operating income*, '01 = 174,213. station operating income*, '02 = 185,665. station operating income*, '03 = 213,112. station operating income*, '04 = 220,445. station op income margin, '00 = 38.6%. station op income margin, '01 = 36.8%. station op income margin, '02 = 34.4%. station op income margin, '03 = 37.9%. station op income margin, '04 = 37.2%. leverage, '00 = 2.5x. leverage, '01 = 6.8x. leverage, '02 = 9.3x. leverage, '03 = 6.5x. leverage, '04 = 6.7x\n*excluding noncash compensation\nradio\nstation operating income,\nexcluding noncash compensation\ntv\npublishing\nDear Shareholders,\nOn our year-end conference call, I said that last year was the best in Emmis Communications' history. And while that might have sounded like the usual Wall Street hyperbole - like any other CEO bragging about his company's performance - the difference is, I believed it. And I still do.\nBut I've been in this business long enough to know two things for sure: What I believe is not as important as what I can prove, and what we did last year is only meaningful if it reflects on how we will do in the coming year. The good news is, Emmis does have the results to back up my high praise, and what we did to perform last year does directly relate to how we'll perform in the year ahead.", + "page_start": 2, + "page_end": 3, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "Corporate Office\nOne Emmis Plaza, 40 Monument Circle, Suite 700, Indianapolis, Indiana 46204,\n317.266.0100.", + "page_start": 5, + "page_end": 5, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "Annual Meeting\nThe Annual Meeting of shareholders will be held at 10 a.m. Central Time on Wednesday, June 30, 2004, at Emmis' Corporate office.", + "page_start": 5, + "page_end": 5, + "source_file": "NASDAQ_EMMS_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed1.pdf", + "query": "What are the two components considered in the expected free energy?", + "target_page": 4, + "target_passage": "The former (utilitarian) objective is to realize one’s preferences, such as being satiated or safe, by minimizing the discrepancy between preferred sensa- tions (encoded as “priors over observations” in active inference) and current sensations in different modalities (e.g. interoceptive or exteroceptive). The latter (epistemic) objective is to reduce uncertainty about one’s estimated state", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nTo overcome this difficulty, we have explicitly introduced the CIP in our model (species 3). Straightforward calculations, based on a characteristic-function formalism, allow us to define an equivalent model in which the free ions and the CIP are explicitly taken into account [19, 20]. We apply this formalism by defining a pair as an anion and a cation at a distance less than 4 ˚ A, which corresponds to the position of the effective potential maximum. The interaction between free, like charges in this new system remains unchanged, and the cation-anion interactions are easily approximated by ex-\n2\nFIG. 3: Effective pair potentials derived for MSA3 and BIMSA3. (a) Cation anion (dashed line: without taking the pair into account), (b) pair cation, (c) pair anion, and (d) pair pair. The internal potential of the pair β ˜ V int ( r ) is set equal to βV eff ij ( r ) for distances less than 4 ˚ A.\nrapolating the original potential at the barrier separating pairs from free ions (as shown in Fig. 3). We assume that the interaction potential is averaged over the rotational degrees of freedom of the CIP and thus pairwise additive. Hereafter, the quantities referring to such a three-component model are written with a tilda symbol. The short-range potentials involving the pair can be derived, in the infinite dilution limit, from an average of the contributing ion interactions. In Fourier space,\n˜ V SR 3 i ( k ) = w ( k / 2) [ V SR 1 i + V SR 2 i ] ( k ) , i = 1 , 2 (2a)\nwhere ˜ w ( r ) is the pair probability distribution\n˜ ˜ V SR 33 ( k ) = ˜ w ( k / 2) 2 [ V SR 11 + V SR 22 +2 V SR 12 ] ( k ) (2b)\n˜ w ( r ) = K -1 0 e -β ˜ V int ( r ) (2c)\n˜ V int ( r ) is the internal part of the pair potential (see Fig. 3), and K 0 is the association constant, defined as:", + "page_start": 1, + "page_end": 2, + "source_file": "1001.2648.pdf" + }, + { + "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nThe second stage of our coarse-graining procedure consists in applying LPT, in order to deduce the best analytical model of electrolyte solutions which reproduces this molecular description. The principle of LPT is to describe the properties of a given system in terms of those of a well known reference system, with the difference between them treated as a perturbation in the reference potential. Assuming pairwise additive potentials, V ij = V (0) ij + ∆V ij , a first-order truncated expression for the free energy density of the system βf v is obtained,\nβf v /lessorsimilar βf (0) v + 1 2 β ∑ i,j ρ i ρ j ∫ d r g (0) ij ( r ) ∆V ij ( r ) (1)\nwhich depends only on the free-energy density f (0) v and RDF g (0) of the reference fluid, with β = ( k B T ) -1 and ρ i the concentration of species i . The Gibbs-Bogoliubov inequality [15] ensures that the right-hand side of Eq. (1) is actually a strict upper bound. Once a reference system has been chosen, the expression on the right-hand side of Eq. (1) must be minimized with respect to the parameters defining the reference. This procedure yields the best first-order approximation to the free energy of the system under consideration.\nFor a system of charged particles in solution, the natural reference is the PM, defined in terms of the charge and diameter ( σ i ) of each species. In this case, the perturbing potentials are just the short-range effective potentials computed above (∆ V ij = V SR ij ). We use the MSA [3] solution to the PM, since it provides analytical expressions for both the free energy and the RDF. The perturbation term is evaluated using an exponential approximation to the RDF obtained within the MSA, g ( r ) = exp [ g MSA ( r ) -1], which removes any unphysical negative regions and improves the comparison with HNC calculations.\nΦ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2648.pdf" + }, + { + "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nK 0 = ∫ ∞ 0 d r 4 πr 2 e -β ˜ V int ( r ) = 0 . 43 L . mol -1 (3)\nThe excess free-energy density of the original system βf ex v is that of the three component mixture β ˜ f ex v plus a correction term\nβf ex v = β ˜ f ex v -˜ ρ 3 ln K 0 , (4)\nwhich is due to the change in standard chemical potential between the two component and three component models. It should be noted that the fraction of pairs is now an additional parameter in the minimization scheme, which serves to ensure chemical equilibrium. Within this representation, the pair can be modeled as a hard sphere (MSA3) or as a dumbbell-like CIP (BIMSA3) [4]. Since\n3\nFIG. 4: (Color online) Excess free-energy density βf ex v as a function of the square root of the concentration √ c . (diamond) MC simulations, (dot dashed) MSA2, (dashed) MSA3, (solid) BIMSA3, (dot) DHLL, and (cross) experiments. The inset gives the fraction of pairs (MSA3, BIMSA3) as a function of √ c .\nwe have no additional information, we consider only symmetric dumbbells. Furthermore, since analytic expressions for the RDF within BIMSA are not known, we approximate the dumbbell as a hard sphere when computing the perturbation term (this is not necessary for the reference term, since an expression for the free energy is available). Let ˜ σ c be the diameter of the cation (anion) within the dumbbell, the diameter of the hard sphere representing this dumbbell is taken to be σ 3 = 4 √ 2 π σ c [21].", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2648.pdf" + }, + { + "text": "IV. DISCUSSION AND CONCLUSION\n16 J. Bohr D. Gibbs, J. D. Axe, D. E. Moncton, K. L. D'Amico, C. F. Majkrzak, J. Kwo, M. Hong, C. L. Chien, and J. Jensen, Physica B 159 , 93 (1989).\n17 H. T. Diep, Phys. Rev. B 39 , 397 (1989).\n18 D. Loison, Physica A 275 , 207 (2000).\n19 N. Metropolis, et al. , J. Chem. Phys. 21 , 1087 (1953).\n20 F. R. Brown and T. J. Woch, Phys. Rev. Lett. 58 , 2394 (1987).\n21 D. P. Landau, and K. Binder, A Guide to Monte Carlo Simulation in Statistical Physics , Cambridge University Press, Cambridge (2000).\n22 M. E.J. Newman, and G. T. Barkema, Monte Carlo Methods in Statistical Physics , Clarendon Press, Oxford (1999).\n23 B. Efron, The Annals of Statistics 7 , 1 (1979).\n24 P. M. Chaikin, T. C. Lubensky Principles of condensed matter physics , Cambridge University Press, New York (1995).\n25 K. Binder, Z. Phys. B 43 , 119 (1981). K. Binder, Phys. Rev. Lett. 47 , 693 (1981).\n26 Such observable has been obtained from instantaneous evaluation of the structure factor during the stochastic process, and subsequently statistically analyzed as all the other macroscopic quantities.", + "page_start": 6, + "page_end": 6, + "source_file": "1001.0510.pdf" + }, + { + "text": "References\n1. Parr, T.; Pezzulo, G.; Friston, K.J. Active Inference: The Free Energy Principle in Mind, Brain, and Behavior ; The MIT Press: Cambridge, MA, USA, 2022. [CrossRef]\n2. Friston, K.; FitzGerald, T.; Rigoli, F.; Schwartenbeck, P.; O'Doherty, J.; Pezzulo, G. Active inference and learning. Neurosci. Biobehav. Rev. 2016 , 68 , 862-879. [CrossRef]\n3. Friston, K.; FitzGerald, T.; Rigoli, F.; Schwartenbeck, P.; Pezzulo, G. Active inference: A process theory. Neural Comput. 2017 , 29 , 1-49. [CrossRef]\n4. Friston, K.J.; Stephan, K.E. Free-energy and the brain. Synthese 2007 , 159 , 417-458. [CrossRef] [PubMed]\n5. Friston, K. The free-energy principle: A unified brain theory? Nat. Rev. Neurosci. 2010 , 11 , 127-138. [CrossRef] [PubMed]\n6. Friston, K. The free-energy principle: A rough guide to the brain? Trends Cogn. Sci. 2009 , 13 , 293-301. [CrossRef] [PubMed]\n7. Friston, K. A free energy principle for a particular physics. arXiv 2019 , arXiv:1906.10184. [CrossRef]\n8. Friston, K.; Da Costa, L.; Sajid, N.; Heins, C.; Ueltzhöffer, K.; Pavliotis, G.A.; Parr, T. The free energy principle made simpler but not too simple. Phys. Rep. 2023 , 1024 , 1-29. [CrossRef]\n9. Friston, K.; Kiebel, S. Predictive coding under the free-energy principle. Philos. Trans. R. Soc. B Biol. Sci. 2009 , 364 , 1211-1221. [CrossRef] [PubMed]", + "page_start": 29, + "page_end": 29, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "Abbreviations\nThe following abbreviations are used in this manuscript:\nAIF\nActive inference\nFEP\nFree energy principle\nVFE\nVariational free energy\nEFE\nExpected free energy\nMCMC\nMarkov Chain Monte Carlo\nPOMDP\nPartially Observed Markov Decision Process", + "page_start": 29, + "page_end": 29, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\nof the BIMSA3 appears to be negligible compared to the reference term for concentrations less than 1 mol l -1 . The perturbation can then be omitted to obtain a fully analytical theory, determined by the hard sphere diameters and the pair fraction given by LPT; with the free energy and the RDF given in terms of the BIMSA and MSA solutions, as described above. While the procedure we have followed uses two different approximations for the reference and perturbation terms (MSA vs BIMSA), these are known to be accurate for the systems under consideration and do not appear to be inconsistent with each other.\nTo conclude, we have combined MD simulations with LPT to construct simple models of electrolyte solutions which account for the molecular nature of the solvent. The final result is fully analytical and it yields the thermodynamic and structural properties of the solution, in agreement with the original molecular description. The methodology can in principle be adapted to any molecular description of the system (MD simulations involving interaction potentials accounting for polarization effects or Car-Parrinello MD simulations for example) as long as the ion-ion RDF are known. It can also be generalized to study interfaces. The method appears to be a promising approach toward the description of the specific effects of ions, especially for complex systems whose modeling requires an analytic solution.\nThe authors are particularly grateful to Werner Kunz for fruitful discussions.", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2648.pdf" + }, + { + "text": "III. MODELLING APPROACHES\nIn several respects, however, the kinetic Monte Carlo model is rather simplistic, limiting its potential applications. For instance, the thermodynamic chemical potential as well as any wetting interaction of the solvent with the substrate are collected in a single parameter - an effective chemical potential. This implies that any influence of a disjoining pressure is 'smeared out' over the whole system and that no distinction between the short- and the long-range parts of the disjoining pressure is possible. It is furthermore based on the assumption that evaporation/condensation is\n8\nthe dominant dynamic process, but does not allow one to probe this assumption. In Section III B we show how one may develop a dynamical density functional theory (DDFT) that describes the system at a similar level to the KMC. However, the DDFT may also be easily extended to include other effects such as fluid diffusion, that the KMC does not incorporate.", + "page_start": 7, + "page_end": 8, + "source_file": "1001.2669.pdf" + }, + { + "text": "B. Dynamical Density Functional theory\nThe limitations of the kinetic Monte Carlo model introduced in the previous Section are related to its character as a two-dimensional lattice gas with only three states: gas, liquid or particle. This implies that (i) no liquid can be transported to a site on the surface already filled with liquid, i.e., diffusion of the liquid can not be incorporated in a sensible way and (ii) one is not able to distinguish between the influence of the short- and the long-range parts of the interactions with the substrate, as all such interactions are absorbed into the effective chemical potential.\nHowever, using dynamical density functional theory (DDFT) [78-83] one can develop a model for the processes in the ultrathin postcursor film without these limitations, although here we limit ourselves to developing the theory at the level of the KMC and solely discuss how to extend it to incorporate the influence of the liquid diffusion over the surface. Such a DDFT model describes the coupled dynamics of the density fields of the liquid ρ l and the nanoparticles ρ n . The densities ρ l and ρ n are defined as the probabilities of finding a given lattice site on the surface to be occupied by a film of liquid or by a nanoparticle, respectively. Note that the probability densities correspond to number densities as we use the lattice spacing σ = 1 as our unit of length.\nTo develop the DDFT, one must first derive the underlying free energy functional F [ ρ l , ρ n ] , and secondly, devise dynamical equations for both density fields that account for the conserved and the non-conserved aspects of their dynamics, i.e., transport and phase change processes, respectively. For a system governed by the hamiltonian (3), we may construct a mean-field (Bragg-Williams) approximation for the free energy of the system [78, 84] which contains an entropic contribution and contributions from the interactions between the different species (nanoparticles and liquid). The free energy is a semi-grand free energy, since the liquid is treated grand canonically (it is coupled to a reservoir with chemical potential µ ), whereas the nanoparticles are treated in the\n14\ncanonical ensemble. The free energy functional is first defined on the original KMC lattice. However, after re-writing the interaction terms employing gradient operators [78] one finally obtains the free energy functional for a continuous system", + "page_start": 13, + "page_end": 14, + "source_file": "1001.2669.pdf" + }, + { + "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl solutions\n˜ ˜ Using these two reference systems, the threecomponent MSA3 and BIMSA3, we obtain results in much better agreement with the MC simulations, as shown in Fig. 4. The diameters obtained for species 1, 2, and 3 are 3.65, 4.79, and 5.76 ˚ A for MSA3 and 3.69, 4.75 and 6.19 ˚ A for BIMSA3. The free ion diameters are similar for MSA2, MSA3, and BIMSA3. The pair diameter is smaller when modeled as a hard sphere (MSA3) than when modeled as a dumbbell (BIMSA3). At high concentration (about 1 mol l -1 ), the MSA3 overestimates the free energy, because the excluded volume repulsion becomes too important for the pairs to be represented as hard spheres. The BIMSA3 model is the closest to the MC simulation results. It is worth noting that even at the lowest concentration considered, the fraction of pairs (shown in the insert of Fig. 4), although less then 5%, has a non-negligible effect on the thermodynamics of the system.\nThis procedure also provides an accurate description of the structure over the whole range of concentrations. A development similar to the one that leads to Eq. (2) derives the average unpaired RDF from the corresponding paired quantities:\nρ i ρ j g ij ( k ) = ˜ ρ 3 ˜ w ( k ) (1 -δ ij ) + ˜ ρ i ˜ ρ j ˜ g ij ( k ) + ˜ ρ 3 ˜ w ( k / 2) [ ˜ ρ i ˜ g 3 i + ˜ ρ j ˜ g 3 j ] ( k ) (5) + ˜ ρ 2 3 [ ˜ w ( k / 2)] 2 ˜ g 33 ( k )\nFIG. 5: (Color online) RDF obtained from MC simulations (diamond), BIMSA3 (solid line), and MSA-fit (dot dashed) at two concentrations.", + "page_start": 2, + "page_end": 3, + "source_file": "1001.2648.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed1.pdf", + "query": "How could the heart rate be estimated by means of an active inference paradigm?", + "target_page": 6, + "target_passage": "The second panel of Fig. 2 shows the Shannon surprise of an inference model that estimates the current heart rate using the two standard components of a generative model. The for- mer component is the prior, which encodes the person’s a priori probabilistic belief (i.e. probability distribution) about her “nor- mal” heart rate range; here, the prior is a Gaussian centered on 67 and has a precision of 0.11. The latter component is the likeli- hood, which encodes the probabilistic mapping between sensory (heartbeat) observations and the hidden state (heart rate); here, the likelihood is a Gaussian centered on the current heart rate with an additional bias of 15 pulses, and the panel shows the results for 10 values for precision obtained by subdividing the range [0.1,10] into equal intervals.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Active inference, interoceptive processing, and uncertainty reduction\nThe second panel of Fig. 2 shows the Shannon surprise of an inference model that estimates the current heart rate using the two standard components of a generative model. The former component is the prior, which encodes the person's a priori probabilistic belief (i.e. probability distribution) about her 'normal' heart rate range; here, the prior is a Gaussian centered on 67 and has a precision of 0.11. The latter component is the likelihood, which encodes the probabilistic mapping between sensory (heartbeat) observations and the hidden state (heart rate); here, the likelihood is a Gaussian centered on the current heart rate with an additional bias of 15 pulses, and the panel shows the results for 10 values for precision obtained by subdividing the range [0.1,10] into equal intervals. The results shown in the second panel of Fig. 2 show that Shannon surprise increases dramatically during episodes of tachycardia and bradycardia, which are far from the normal range. The pattern of results is the same across all levels of likelihood precision. However, the inference with a very high precision (a precision of 10) tracks more closely the noise sensory signals and can therefore lead to more extreme results.\nThe third panel shows the Bayesian surprise (or the KullbackLeibler divergence between posterior and prior probability distributions) over time. This is a measure of how much dissimilar the posterior and the prior are, and it always decreases as a result of inference, but note that it decreases much more rapidly when the precision of the likelihood is 10, which is another indication that the posterior is 'overfitting,' meaning that the inference result is excessively biased by the likelihood distribution.", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed1.pdf" + }, + { + "text": "Active inference, interoceptive processing, and uncertainty reduction\nFinally, the two bottom series of panels are organized in two (left and right) columns, which show the first five time steps of inference for the two cases with high precision (of 10) and low precision (of 0.1) of the likelihood, respectively. In these plots, the prior distributions are in blue, the posterior distributions are in green, and the likelihoods are in red. It is possible to note that in the left (high precision) panels, the posterior inference closely follows the likelihood (it 'overfits') after five time steps and the inferred heart rate is slightly biased (i.e. it is 79). Differently, in the right (low precision) panels, the inference converges much slower to a high precision posterior, but without overfitting.\nThese simple examples of Bayesian inference illustrate two things. First, sensory observations that are unpredictable given\nModeling and controlling the body in maladaptive ways\n7\nFigure 2. A simplified example of (Bayesian) inference of one's heart rate. First panel: simulated time series of heartbeat observations. Second panel: Shannon surprise of a generative model composed of a fixed prior about heart rate (a Gaussian with a mean of 67 and a precision of 0.11) and a likelihood (a Gaussian centered on the current heart rate with an additional bias of 15 pulses, with various precisions that vary between 0.47 and 10, see the legend). Third panel: Bayesian surprise, which measures the discrepancy between posterior and prior probabilities over time. Bottom panels: the two series of panels are organized in two (left and right) columns, which show the first five time steps of inference for the two cases with high precision (of 10) and low precision (of 0.1) of the likelihood, respectively. See the main text for an explanation and online article for colored version of this figure.\nthe current model generate significant surprise, and sometimes, the surprise can remain relatively high for long periods before the model adapts (or the world changes), especially with some parameterizations of the generative model. This is particularly relevant in this context since active inference agents strive to minimize their surprise (and the long-term average of surprise, entropy, which is a measure of uncertainty) by changing their model, or changing the world, or both.", + "page_start": 5, + "page_end": 6, + "source_file": "pubmed1.pdf" + }, + { + "text": "Active inference, interoceptive processing, and uncertainty reduction\ninference that tracks the noise rather than the correct state of the estimated variable system (i.e. overfitting), whereas assigning excessively low weight to sensations (or excessively high weight to prior knowledge) makes the system poorly responsive to incoming observations that might signal a change in the state of the system-and both are examples of aberrant inference (Friston et al. 2014).\nFigure 2 provides a formal illustration of the above by plotting some examples of Bayesian inference using generative models under various levels of precision of the model components. For simplicity, we focus on a simplified example of inference of an interoceptive variable: one's heart rate. Heart rate is a 'hidden variable' in Bayesian parlance since it is not directly observable but needs to be inferred through two sources of information: prior knowledge about the most likely heart rate and sensory (heartbeat) observations. The top panel of Fig. 2 shows a series of (noisy) heartbeat observations. In the beginning, they are in the normal range for an adult (time steps 1-10), then they increase significantly, simulating tachycardia (time steps 11-20), then they go back to the normal range (time steps 21-30), then they decrease significantly, simulating bradycardia (time steps 31-40), and finally, they go back to the normal range (time steps 41-50).", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed1.pdf" + }, + { + "text": "Active inference, interoceptive processing, and uncertainty reduction\nparticipants processed faces expressing fear (but not neutral faces or faces expressing other emotions) when their heart rate was high-hence congruent with the fearful expression (Pezzulo et al. 2018, Yu et al. 2021). The generative model shown in Fig. 1 could support this kind of inference by using interoceptive information from the heart (i.e. high heart rate) as evidence that 'there might be something fearful out there' (Pezzulo 2013). Another more complex example regards emotional awareness and self-awareness-which significantly engage the brain regions involved in interoception and the representation of physiological processes (Garfinkel et al. 2013). The generative model shown in Fig. 1 might support processes of emotional awareness in a way that is neither purely bottom-up (i.e. as if interoceptive signals cause emotional awareness) nor top-down (i.e. as if emotional awareness causes interoceptive signals), but rather through a circular causality between central predictions about bodily statethat engage autonomic reflexes-and interoceptive streams-that update the predictions (Seth and Friston 2016). In this perspective, any representation that induces interoceptive predictions could be associated with emotional or affective content; crucially, this is also the case with some aspects of self-awareness (e.g. recognizing one's own face) that require integrating interoceptive streams with concurrent exteroceptive (e.g. visual) and proprioceptive cues. These examples illustrate that the generative model of Fig. 1 natively implements both the multisensory integration required to unite (for example) interoceptive and exteroceptive streams and the active aspects that are supposed to support emotional and self-processing-and the construction of an 'embodied self' (i.e. the circular causality between engaging autonomic reflexes and capturing the ensuing interoceptive signals).", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed1.pdf" + }, + { + "text": "Active inference, interoceptive processing, and uncertainty reduction\nActive inference is based on the idea that in order to engage in adaptive allostatic regulation and goal-directed behavior, living organisms continuously strive to minimize the surprise of their sensations or, more formally, an upper bound to surprise: variational free energy (Parr et al. 2022). Notably, the (expected) free energy minimization processes that drive active inference jointly consider two complementary objectives. The former (utilitarian) objective is to realize one's preferences, such as being satiated or safe, by minimizing the discrepancy between preferred sensations (encoded as 'priors over observations' in active inference) and current sensations in different modalities (e.g. interoceptive or exteroceptive). The latter (epistemic) objective is to reduce\nuncertainty about one's estimated state. This means that active inference agents tend to avoid ambiguous states, encompassing the avoidance of ambiguous places where self-localization is challenging, ambiguous social situations where safety is uncertain, and ambiguous bodily states, such as unsure feelings of fatigue. However, one apparent exception to this aversion to ambiguity arises when exploring novel states implies the opportunity to learn new things and enhance one's model; see Friston et al. (2017) for a discussion. Furthermore, and importantly, active inference agents will actively operate in the environment to reduce their ambiguity; for example, by actively seeking informative sensations that disambiguate in which location they are (e.g. by looking for traffic signs), whether their social context is safe or unsafe (e.g. by trying to understand other's intentions from their facial expressions and actions), or whether they are currently fatigued (e.g. by putting attention to one's heart), happy, or sad.", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed1.pdf" + }, + { + "text": "1. Introduction\nWe introduce a novel software library for Julia, ActiveInference , which lets users produce the simulated behaviour of agents and their internal belief states with active inference (AIF) models, as well as fit such models to empirically observed behaviour. AIF [1-3] is a generally applicable formal framework for understanding and simulating intelligent behaviour that is based in neurobiology and first principles from statistical physics [4-8]. AIF treats action and perception as unified under a joint imperative: to minimise the variational free energy ( VFE ), which quantifies how well the agent's internal generative model explains incoming sensory observations. It is an upper bound on the the surprise from sensory observations, making AIF formally related to prediction error\nAcademic Editor: Astero Provata\nReceived: 25 October 2024 Revised: 2 January 2025 Accepted: 7 January 2025\nPublished: 12 January 2025\nCitation: Nehrer, S.W.; Ehrenreich Laursen, J.; Heins, C.; Friston, K.; Mathys, C.; Thestrup Waade, P. Introducing ActiveInference.jl : A Julia Library for Simulation and Parameter Estimation with Active Inference Models. Entropy 2025 , 27 , 62. https://doi.org/10.3390/e27010062\nCopyright: ©2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/ licenses/by/4.0/).\nEntropy 2025 , 27 , 62\nhttps://doi.org/10.3390/e27010062\nEntropy 2025 , 27 , 62\n2 of 33", + "page_start": 0, + "page_end": 1, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "Active inference, interoceptive processing, and uncertainty reduction\nThe last examples-disambiguating one's fatigue and emotional states-may seem strange if one assumes that we do have direct access to the body- and allostasis-related states (e.g. states of satiation, thirst, and fatigue) and to our emotions (e.g. we automatically know whether we are happy or sad). However, one assumption of active inference is that one's bodily and emotional states are not necessarily observable but, instead, 'hidden states' that need to be inferred on the basis of sensations (especially, but not exclusively, of interoceptive sensations from the inside of the body) and of an implicit, unconscious model of how the body functions (Barrett and Simmons 2015, Pezzulo et al. 2015, Seth and Friston 2016). In other words, the same inferential process that allows active inference agents to estimate the hidden state of the external environment (e.g. the presence or absence of an object in the environment) is also used to estimate other hidden states, such as fatigue, happiness, or sadness. This implies that one can also be wrong, or be fooled, about these states; for example, we could experience the 'interoceptive illusion' of feeling more fatigued than our physiological parameters would afford (Iodice et al. 2019).", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed1.pdf" + }, + { + "text": "Active inference, interoceptive processing, and uncertainty reduction\nIn general, the accuracy of the inference of hidden bodily states, the 'embodied self,' or other aspects of the model depends on the signal-to-noise ratio of the sensations and on the quality of the model. For example, it is difficult to self-localize in a city if it is dark (low signal-to-noise ratio) or if one does not know the city well (poor model). The inference of hidden bodily and emotional states might function in an analogous manner. If the quality of the afferent interoceptive (e.g. cardiac) signals is low, or if one has a poor model of how one's body functions, then it would estimate one's bodily states such as fatigue incorrectly (which in turn would also impair its adaptive regulation of the same bodily states). Interoceptive signals could be 'too noisy' for various reasons, which might be related to physiology, inflammation, or stress. The body model can be poor in various ways, too. For example, it could poorly characterize the statistical relations between interoceptive sensations and hidden bodily states (e.g. systematically mischaracterize high heart rate as caused by hunger but not fatigue or joy).\nFinally, there is a third essential element that determines the accuracy of the inference: precision control. In predictive coding, the influence of prediction errors on inference is weighted by their precision, i.e. inverse variance (pink triangles in Fig. 1). This weighting would ensure that very reliable sensations have more impact on inference than unreliable sensations. However, precision (like all other variables) needs to be estimated, but this might be incorrect. An incorrect setting of precisions has been associated with various psychopathological conditions, such as psychosis (Adams et al. 2013), eating disorders (Barca and Pezzulo 2020), panic disorders (Maisto et al. 2021), symptom perception (Pezzulo et al. 2019), depression (Barrett et al. 2016), and many others (Khalsa et al. 2018, Paulus et al. 2019). Intuitively, assigning excessively high weight to noisy sensations yields an incorrect", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed1.pdf" + }, + { + "text": "Introducing ActiveInference.jl : A Julia Library for Simulation and Parameter Estimation with Active Inference Models\nSamuel William Nehrer 1,† , Jonathan Ehrenreich Laursen 1,† , Conor Heins 2,3, * , Karl Friston 3,4 ,\nChristoph Mathys 5 and Peter Thestrup Waade 5\n1 School of Culture and Communication, Aarhus University, 8000 Aarhus, Denmark; 202204724@post.au.dk (S.W.N.); 202204836@post.au.dk (J.E.L.)\n2 Department of Collective Behaviour, Max Planck Institute of Animal Behavior, D-78457 Konstanz, Germany\n3 VERSES Research Lab., Los Angeles, CA 90016, USA; k.friston@ucl.ac.uk\n4 Queen Square Institute of Neurology, University College London, London WC1N 3BG, UK\n5 Interacting Minds Centre, Aarhus University, 8000 Aarhus, Denmark; chmathys@cas.au.dk (C.M.); ptw@cas.au.dk (P.T.W.)\n* Correspondence: cheins@ab.mpg.de\n† These authors contributed equally to this work.\nAbstract: We introduce a new software package for the Julia programming language, the library ActiveInference.jl . To make active inference agents with Partially Observable Markov Decision Process (POMDP) generative models available to the growing research community using Julia, we re-implemented the pymdp library for Python. ActiveInference.jl is compatible with cutting-edge Julia libraries designed for cognitive and behavioural modelling, as it is used in computational psychiatry, cognitive science and neuroscience. This means that POMDP active inference models can now be easily fit to empirically observed behaviour using sampling, as well as variational methods. In this article, we show how ActiveInference.jl makes building POMDP active inference models straightforward, and how it enables researchers to use them for simulation, as well as fitting them to data or performing a model comparison.\nKeywords: active inference; free energy principle; predictive processing; Markov decision process; cognitive modelling; Julia\nPACS: 87.15.Aa\nMSC: 91-08\nJEL Classification: C63", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "References\n27. Bagaev, D.; Podusenko, A.; Vries, B.d. RxInfer: A Julia package for reactive real-time Bayesian inference. J. Open Source Softw. 2023 , 8 , 5161. [CrossRef]\n28. Bezanson, J.; Karpinski, S.; Shah, V.; Edelman, A. Julia Language Documentation. 2016. Available online: https://readthedocs. org/projects/julia-wf/downloads/pdf/stable/ (accessed on 26 May 2024).\n29. van de Laar, T.W.; de Vries, B. Simulating Active Inference Processes by Message Passing. Front. Robot. AI 2019 , 6 , 20. [CrossRef]\n30. Vanderbroeck, M.; Baioumy, M.; Lans, D.v.d.; Rooij, R.d.; Werf, T.v.d. Active inference for Robot control: A Factor Graph Approach. Stud. Undergrad. Res. E-J. 2019 , 5 , 1-5. [CrossRef]\n31. van de Laar, T.; ¸Senöz, ˙ I.; Özçelikkale, A.; Wymeersch, H. Chance-Constrained Active Inference. Neural Comput. 2021 , 33 , 2710-2735. [CrossRef]\n32. Busemeyer, J.R.; Diederich, A. Cognitive Modeling ; SAGE: Thousand Oaks, CA, USA, 2010; Google-Books-ID: R7KDF35g5LQC.\n33. Smith, R.; Friston, K.J.; Whyte, C.J. A step-by-step tutorial on active inference and its application to empirical data. J. Math. Psychol. 2022 , 107 , 102632. [CrossRef] [PubMed]\n34. Lee, M.D.; Wagenmakers, E.J. Bayesian Cognitive Modeling: A Practical Course , 1st ed.; Cambridge University Press: Cambridge, UK, 2014. [CrossRef]", + "page_start": 30, + "page_end": 30, + "source_file": "pubmed7_cc4.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed1.pdf", + "query": "At what stage of childhood does the construction of narrative identity take place?", + "target_page": 3, + "target_passage": "Among the challenges that adolescents have to face are the structuring of a “narrative identity” or self-story, featuring the development of a sense of personal identity that integrates past experiences with current, and future goals and meanings in a coherent whole over time ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "NSSI in adolescence\nAdolescence is the period of developmental transition from childhood to adulthood, which might be stretched up to the early 20s due to current sociocultural changes (e.g. delays in completing education, occupational attainment, and parenthood) (Patton et al. 2018). Among the challenges that adolescents have to face are the structuring of a 'narrative identity' or self-story, featuring the development of a sense of personal identity that integrates past experiences with current, and future goals and meanings in a coherent whole over time (McAdams and McLean 2013, McLean and Lilgendahl 2019). The definition of the new boundaries of adolescents' personal identity involves significant changes in the\n4 Barca et al.\nreciprocity with caregivers and peers. Thus, in parallel to the negotiation of identity with caregivers (through a relative detachment from them, a renegotiation of intimacy, and the questioning of their confirmatory authority), the modifications of friendship structures-from childhood to adolescence-lay the ground for the progressive recognition of social contexts and peer relationships as the elite territories for the modulation and exploration of personal identity. The redefinition that the adolescent has to face in these territories of exploration (of the self as an individual separated from the other and of the self with the other) might pass through a phase of reduced coherence in the narration of the self and hence an increased level of uncertainty. Coherence in the self's narrative is considered a measure of well-being and has been associated with psychopathology in adulthood (Klimstra and Denissen 2017) and adolescence (Lind et al. 2020, Shiner et al. 2021). For example, narrative incoherence has been found to be associated with personality disorders in adolescents (Lind et al. 2019), where 'identity diffusion' (e.g. feelings of emptiness and being fragmented and lack of a sense of continuity over time) might be considered an expression of high levels of uncertainty of the self.", + "page_start": 2, + "page_end": 3, + "source_file": "pubmed1.pdf" + }, + { + "text": "References\nDutra L, Bureau J-F, Holmes B et al. Quality of early care and childhood trauma: a prospective study of developmental pathways to dissociation. J Nerv Ment Dis 2009; 197 :383-90.\nFonagy P, Campbell C, Luyten P. Attachment, mentalizing and trauma: then (1992) and now (2022). Brain Sci 2023; 13 :459.\nFotopoulou A, Tsakiris M. Mentalizing homeostasis: the social origins of interoceptive inference. Neuropsychoanalysis 2017; 19 :3-28.\nFriston K. A theory of cortical responses. Philos Trans R Soc Lond B Biol Sci 2005; 360 :815-36.\nFriston K, Lin M, Frith CD et al. Active inference, curiosity and insight. Neural Comput 2017; 29 :2633-83.\nFriston KJ, Stephan KE, Montague R et al. Computational psychiatry: the brain as a phantastic organ. Lancet Psychiatry 2014; 1 :148-58.\nGarfinkel SN, Nagai Y, Seth AK et al. Neuroimaging studies of interoception and self-awareness. In: Neuroimaging of Consciousness . Springer Berlin, Heidelberg: Springer, 2013, 207-24.\nGee DG. Sensitive periods of emotion regulation: influences of parental care on frontoamygdala circuitry and plasticity. New Dir Child Adolesc Dev 2016; 2016 :87-110.\nGee DG and Cohodes EM. Influences of Caregiving on Development: A Sensitive Period for Biological Embedding of Predictability and Safety Cues. Curr Dir Psychol Sci 2021; 30 :376-83.\nGlynn LM, Baram TZ. The influence of unpredictable, fragmented parental signals on the developing brain. Front Neuroendocrinol 2019; 53 :100736.\nGlynn LM, Stern HS, Howland MA et al. Measuring novel antecedents of mental illness: the questionnaire of unpredictability in childhood. Neuropsychopharmacol 2019; 44 :876-82.\nGuadagno A, Kang MS, Devenyi GA et al. Reduced resting-state functional connectivity of the basolateral amygdala to the medial\nModeling and controlling the body in maladaptive ways\n11", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed1.pdf" + }, + { + "text": "NSSI in adolescence\nEmotion-wise, a developmental trend toward an increased specificity of emotion-related maps of bodily sensations (Barca et al. 2023)-a proxy of interoceptive representations of emotions-has been reported from children aged 6years to adulthood (Hietanen et al. 2016). Pubertal changes encompass dramatic bodily and neuroendocrine system changes, comprising-but not reduced to-changes in the reproductive, adrenal, and growth axes (Cameron 2004). Thus, adolescents might face at least four sources of uncertainty: (i) the uncertainty due to physiological alterations related to bodily changes and to modification in hormonal levels leading to sexual maturity; (ii) the uncertainty in selfidentity (i.e. the structure of self-awareness) and personal identity (i.e, the narrative diachronic self) (Drummond 2021), which might be coupled with changes in body image and the development of gender identity; (iii) the uncertainty in affect regulation, with the emergence of new forms of affectivity as feelings of love and sexual attraction toward a partner; and (iv) uncertainty in the social context, with respect to their social status and role expectations in the adult society. Such high levels of uncertainty might lead to a poorly defined sense of self, with unclear boundaries and a sense of emptiness. In this context, pain becomes a possible way to recover a bodily sense of self, and self-injurious behavior might be instantiated as an attempt to reduce the rise in the levels of uncertainty in these (and potentially other) domains, toward the transition to adulthood (see Miller et al. 2020 for a closely related approach on addiction).", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed1.pdf" + }, + { + "text": "Highlights\nIn the next sections, we first discuss NSSI behaviors by focusing on the fact that they might occur in non-clinical individuals. We will highlight that this could be not only especially the case during adolescence-a period of life during which people experience various kinds of uncertainties (e.g. their bodies, the self, their social status, and interpersonal relationships), but also more speculatively during other periods of life associated with substantial changes and uncertainty, such as the perimenopause-menopause transition period in women. Then, in the subsequent section, we introduce the main tenets of active inference by focusing on its proposed mechanisms for interoceptive processing and uncertainty reduction. Finally, we discuss how the active inference framework might help conceptualize NSSI as a possible strategy to reduce uncertainty; for example, the uncertainty that some (non-clinical populations of) adolescents might strive to cope with during their transition to adulthood.", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed1.pdf" + }, + { + "text": "Highlights\nDuring infancy, a child starts making sense of her internal experiences through the information she gets from the external world, most notably from caregivers whose behavior has a fundamental regulatory function shaping emotional development, stress physiology, and refinement of limbic circuitry (Gee 2016). In addition to the quality of caregivers' response to the infant's need for proximity, its 'predictability' supports the development of emotions' regulatory capacity (Gee and Cohodes 2021; Wu and Feng 2020) and a cohesive sense of self (Arciero and Bondolfi 2009), increases prosociality (Deneault et al. 2023), and influences the development of social brain structure (see Ilyka et al. 2021 for a review). Self-report assessment of exposure to unpredictability during early life appears to predict symptoms of anxiety, depression, and anhedonia in adulthood (Glynn et al. 2019). Evidence from cross-species studies indicates that the predictability of caregivers' behavior in rodents may specifically influence the offspring's development of corticolimbic circuitry involved in emotion-related functioning (Glynn and Baram 2019). Rodents exposed to unpredictable maternal care exhibit atypical amygdala functioning (Malter Cohen et al. 2013) and weaker connectivity with the medial prefrontal cortex (Guadagno et al. 2018).", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed1.pdf" + }, + { + "text": "Highlights\nAbraham et al. (2019) evaluated a number of features of the neurobiological interoceptive circuit (e.g. the functionality of the amygdala, insula, and oxytocinergic system) in parents and children over the first 6 years of parenthood. Results revealed a critical association between parental interoceptive sensitivity-indexed, e.g. by increased bilateral activation of the anterior insula in response to a video of his/her interacting with his/her infantthe consolidation of the child's interoceptive circuit and mental health. Taken together, thus, consistent evidence indicates that parental ability to respond appropriately to the children's needs and bodily signals supports the child's ability to adequately represent his/her internal bodily states, concurring in the development of self-processes (Fotopoulou and Tsakiris 2017, Ciaunica et al. 2021a, 2021b). The degree of predictability of caregivers' response appears to be critical for the development of affect regulation and a cohesive sense of the self (Ilyka et al. 2021). When caregivers' behavior is less reliable, children have more difficulties in distinguishing their own internal states, making self-other distinctions (Ogawa et al. 1997, Dutra et al. 2009), and-in the most severe cases-developing an integrated sense of the self (Liotti 2004, 2006).\nAs a consequence of these or other deficits in developing appropriate models of emotional and self-models, a person might experience significant interoceptive uncertainty and perceive her own internal states in confused and uncomfortable ways later in life. Suppose that the interoceptive channels are unreliable and the internal models rooted in bodily experiences are poor. In that case, a person might construe a sense of personal stability through external, non-interoceptive signals, such as feedback from others and from the world, rather than via interoceptive signals. Engaging in social interactions, in which we experience affective states relevant to our self-confirmation (e.g. a sense of acceptance and kindness), might be particularly challenging for this person (Guidano 1987, Arciero and Bondolfi 2009). While interacting with others, she might experience ambiguous bodily and emotional states. She might be unable to reduce this uncertainty using the other as an external point of reference since", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed1.pdf" + }, + { + "text": "References\nLiotti G. A model of dissociation based on attachment theory and research. J Trauma Dissocn 2006; 7 :55-73.\nMagerl W, Burkart D, Fernandez A, Schmidt LG, Treede R. Persistent antinociception through repeated self-injury in patients with borderline personality disorder. Pain 2012; 153 :575-84.\nMaisto D, Barca L, Van den Bergh O et al. Perception and misperception of bodily symptoms from an active inference perspective: modelling the case of panic disorder.. Psychol Rev 2021; 128 :690-710.\nMalter Cohen M, Jing D, Yang RR et al. Early-life stress has persistent effects on amygdala function and development in mice and humans. Proc Natl Acad Sci U S A 2013; 110 : 18274-8.\nMcAdams DP, McLean KC. Narrative identity. Curr Dir Psychol Sci 2013; 22 :233-8.\nMcEvoy PM, Mahoney AE. To be sure, to be sure: intolerance of uncertainty mediates symptoms of various anxiety disorders and depression. Behav Ther 2012; 43 :533-45.\nMcLean KC, Lilgendahl JP. Narrative identity in adolescence and adulthood: pathways of development. In: Handbook of Personality Development . New York, United States: The Guilford Press, 2019, 418-32.\nMiller M, Kiverstein J, Rietveld E. Embodying addiction: a predictive processing account. Brain Cogn 2020; 138 :105495.\nMoeller FG, Barratt ES, Dougherty DM et al. Psychiatric aspects of impulsivity. Am J Psychiatry 2001; 158 :1783-93.\nMurphy J, Viding E, Bird G. Does atypical interoception following physical change contribute to sex differences in mental illness? Psychol Rev 2019; 126 :787-9.\nNock MK. Self-injury. Annu Rev Clin Psychol 2010; 6 :339-63.\nNock MK, Joiner TE, Gordon KH et al. Non-suicidal self-injury among adolescents: diagnostic correlates and relation to suicide attempts. Psychiatry Res 2006; 144 :65-72.", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed1.pdf" + }, + { + "text": "2.7 Analysis\nThe transcribed material was analyzed using systematic text condensation (STC) (30) and was organized utilizing NVivo (version 1.7.1). STC is a method for cross-case analysis inspired by phenomenology. It involves four-steps: (1) identi /uniFB01 cation overall themes from the empirical material, (2) extraction of meaning units from the text which were then coded into groups, (3) condensation of all meaning units within the subgroups into an arti /uniFB01 cial quotation, that summarize and represents participants ' voices, (4) recontextualization of the material into categories, presented as analytical texts. The process is iterative, resulting in continuous movement between the transcripts and within different steps of the analysis. An example of the STC process is illustrated in Figure 1.\nThe /uniFB01 rst author (SSHD) transcribed the interviews and read all material several times, while BN and ECA read most of the interviews before preliminary themes were agreed on. SSHD\nidenti /uniFB01 ed meaning units adhering to these themes and coded them into groups. Condensates of the subgroups were written by SSHD and discussed by all researchers. SSHD then recontextualized the material by forming categories described as analytical texts supplemented by quotes, a process that was discussed and revised several times by all authors. All authors contributed to writing the manuscript. Enactive theory was used to interpret the results, aiming at extracting new knowledge beyond what the informants hadprovided(28).", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed13.pdf" + }, + { + "text": "Abstract\nA significant number of persons engage in paradoxical behaviors, such as extreme food restriction (up to starvation) and non-suicidal self-injuries, especially during periods of rapid changes, such as adolescence. Here, we contextualize these and related paradoxical behavior within an active inference view of brain functions, which assumes that the brain forms predictive models of bodily variables, emotional experiences, and the embodied self and continuously strives to reduce the uncertainty of such models. We propose that not only in conditions of excessive or prolonged uncertainty, such as in clinical conditions, but also during pivotal periods of developmental transition, paradoxical behaviors might emerge as maladaptive strategies to reduce uncertainty-by 'acting on the body'- soliciting salient perceptual and interoceptive sensations, such as pain or excessive levels of hunger. Although such strategies are maladaptive and run against our basic homeostatic imperatives, they might be functional not only to provide some short-term reward (e.g. relief from emotional distress)-as previously proposed-but also to reduce uncertainty and possibly to restore a coherent model of one's bodily experience and the self, affording greater confidence in who we are and what course of actions we should pursue.\nKeywords: non-suicidal self-injuries; intolerance of uncertainty; interoception; adolescence; active inference", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed1.pdf" + }, + { + "text": "References\nSeth AK, Friston KJ. Active interoceptive inference and the emotional brain. Philos Trans R Soc Lond B Biol Sci 2016; 371 :20160007.\nSeth AK, Suzuki K, Critchley HD. An interoceptive predictive coding model of conscious presence. Front Psychol 2012; 2 :395.\nSforza A, Bufalari I, Haggard P et al. My face in yours: visuotactile facial stimulation influences sense of identity. Soc Neurosci 2010; 5 :148-62.\nShiner RL, Klimstra TA, Denissen JJ et al. The development of narrative identity and the emergence of personality disorders in adolescence. Curr Opin Psychol 2021; 37 :49-53.\nSkegg K. Self-harm. Lancet 2005; 366 :1471-83.\nSmith R, Feinstein JS, Kuplicki R et al. Perceptual insensitivity to the modulation of interoceptive signals in depression, anxiety, and substance use disorders. Sci Rep 2021; 11 :2108.\nSmith R, Killgore WD, Lane RD. The structure of emotional experience and its relation to trait emotional awareness: A theoretical review.. Emotion 2018; 18 :670-92.\nSmith R, Kuplicki R, Feinstein J et al. A Bayesian computational model reveals a failure to adapt interoceptive precision estimates across depression, anxiety, eating, and substance use disorders. PLoS Comput Biol 2020; 16 :e1008484.\nSmith R, Lane RD. The neural basis of one's own conscious and unconscious emotional states. Neurosci Biobehav Rev 2015; 57 :1-29.\nSmith R, Parr T, Friston KJ. Simulating emotions: an active inference model of emotional state inference and emotion concept learning. Front Psychol 2019; 10 :2844.\nStanley B, Sher L, Wilson S et al. Non-suicidal self-injurious behavior, endogenous opioids and monoamine neurotransmitters. J Affect Disord 2010; 124 :134-40.", + "page_start": 11, + "page_end": 12, + "source_file": "pubmed1.pdf" + } + ] + }, + { + "references": { + "source_file": "OTC_NSANY_2004.pdf", + "query": "What was the indicator related to increasing Nissan's research and development activities in terms of publication of scientific articles in 2004?", + "target_page": 46, + "target_passage": "And the number of research papers we present at societies such as The Japan Society of Mechanical Engineers rose dramatically in fiscal 2004. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Research and Development\nNissan's investment in R&D has been rising. In fiscal 2004 we devoted approximately ¥400 billion to it, equivalent to 4.6 percent of our turnover. We estimate that our financial commitment to R&D will continue to range between 4.5 and 5 percent. R&D investments take a lot of time to pay off, of course, so it's difficult to evaluate our evolution over the short term. Given our expanded output, however, I believe that we are headed in the right direction.\nFor example, the number of patents we have generated is growing quickly, exceeding 4,000 in fiscal 2003-more than twice the fiscal 1999 figure. And the number of research papers we present at societies such as The Japan Society of Mechanical Engineers rose dramatically in fiscal 2004. These are direct results of our commitment to research. We are also generating more new technologies related to safety and the environment, such as the Around View Monitor and the lane-keeping system.\nRear active steering\nNissan Annual Report 2004\nMITSUHIKO YAMASHITA Executive Vice President\nWe have succeeded in shortening our production pipeline, too, using a new vehicle development process called V3P that our engineers devised over the past three years. V3P, which stands for Value-up innovation of Product, Process, and Program, has helped us cut our development time almost in half, from 20 months to just 10.5 months. I believe this makes Nissan the world benchmark in development. That improvement is having a major effect on the flexibility and execution of R&D at Nissan, and will ultimately boost the company's profitability.\nThe number of new products we have brought to market over the past three years is equally significantmore than thirty new vehicles. That's an impressive engineering achievement, and the reason you are seeing so many new Nissan models on the road.\nOur R&D infrastructure, however, is still in need of expansion. We've therefore begun building new facilities at the Nissan Technical Center, NTC, and at the Nissan Advanced Technical Center, NATC, both of which are in Japan. These additions represent a major investment, and show Nissan's dedication to maintaining and enhancing its technological skills.", + "page_start": 45, + "page_end": 45, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "Nissan\nNissan Annual Report 2004", + "page_start": 23, + "page_end": 23, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "Review of 2004\nNissan lived up to its challenges in fiscal 2004, despite a very challenging year in the global industry, full of risks both anticipated and unexpected.\nConsolidated net revenues reached ¥8 trillion 576.3 billion, up 15.4 percent from last year. Consolidated operating profit improved by 4.4 percent to a record ¥861.2 billion. As a percentage of net revenue, our operating profit margin came to 10 percent, which remains at the top level among global automakers. And our net income reached ¥512.3 billion, or ¥125.16 per share, compared to ¥122.02 per share for the previous fiscal year.", + "page_start": 3, + "page_end": 3, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "Growing in Areas of Expansion\nJED CONNELLY Senior Vice President Nissan North America\n'We had a terrific year in North America; sales for calendar year 2004 grew by 24.7 percent, and that growth that came in a flat U.S. market. The auto industry here only rose by about 237,000 vehicles, while Nissan was up by 191,000 cars. It was a strong year with a rich mix of products. The Altima continues to be a core car\nfor us, and our most important car in terms of volume. We sell over 200,000 Altimas a year, at a rate of 20,000 units per month-outstanding for a car so far along in its lifecycle. The Infiniti has also been phenomenal over the past few years. The G35 sedan and coupe continue to be the icons of the brand, driving both volume and profit.\nOur success always comes down to the product. We had great products from top to bottom,\nthroughout the lineup and in both divisions. We were also very intelligent, I believe, in the way we price our vehicles-very close to the transaction price, and with limited reliance on incentives. That's been our strategy for four years, and it works. Customers understand that we provide a great product at a fair price. The other key to our success has been a very consistent marketing message. The SHIFT_ campaign is consistent and has been in place for some time now, and it's starting to gain traction with the public. Consumers look at Nissan products and our dealerships and say, 'Hey, something really is going on at Nissan!'\nIn a year full of successes, the one thing we would like to have handled better was the Quest. We had some initial quality issues, and some trim mix issues. We've corrected\nNissan Annual Report 2004\nthese, however, and repackaged the Quest to give people their most popular options. We've also made great strides in quality and on other aspects get it right.\nFor fiscal 2005 we have a volume growth target of 3.3 percent, but in the first three months of this period we were actually up by 18 percent! We launched a few new products at the end of the last year, so it's probably not realistic to expect that kind of volume for the whole year, but it makes us very confident of reaching our target.", + "page_start": 63, + "page_end": 63, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "FISCAL YEAR 2004 FINANCIAL REVIEW\nNISSAN REPORTED A RECORD YEAR IN TERMS OF REVENUES, OPERATING INCOME, NET INCOME, SALES AND PRODUCTION VOLUME IN FISCAL 2004. NISSAN ACHIEVED TWO OF ITS THREE COMMITMENTS FOR NISSAN 180: AN 8 PERCENT OPERATING PROFIT MARGIN AND ZERO NET AUTOMOTIVE DEBT. THE REMAINING COMMITMENT IS THE ACHIEVEMENT OF ONE MILLION ADDITIONAL UNIT SALES. AT MID-YEAR 2005, GLOBAL SALES AT 1,809,000 UNITS WERE SLIGHTLY AHEAD OF THE COMMITMENT TO REACH 3,597,000 UNITS BY THE END OF SEPTEMBER 2005.", + "page_start": 13, + "page_end": 13, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "Investment Policy\nCapital expenditures increased by ¥50.2 billion to ¥477.5 billion, representing 5.6 percent of net revenue. This increase included the Canton plant expansion. R&D expenditures increased by ¥43.8 billion to ¥398.1 billion. This increase went to fund new technologies and product development. Our R&D resources are focused on projects that add value to our customers and that will deliver an expected return, in both the short and long term.\nNissan Annual Report 2004", + "page_start": 15, + "page_end": 15, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "OUR WAY\nNissan Annual Report 2004", + "page_start": 19, + "page_end": 19, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "Looking to the New Fiscal Year\nNissan will continue to grow in fiscal 2005. Even assuming a relatively flat total industry volume of 61 million units globally, Nissan's sales are forecast to come to 3,618,000 units, a 6.8 percent increase over the prior year.\nWorldwide, we will launch six all-new models-five in Japan, one in Europe-leading to twenty regional product events.", + "page_start": 9, + "page_end": 9, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "Research and Development\nNissan's technology must be 'real world'-useful, pragmatic and easy to use. Nissan anticipates the nature and scope of the market demand, and then prioritizes and invests in new technologies. Nonetheless, any sudden and greater-than-anticipated changes in its business environment or in customer preferences may impact negatively on customer satisfaction with these new technologies.", + "page_start": 72, + "page_end": 72, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "Driving Ahead in a Flat Market\nKAZUHIKO TOIDA Senior Vice President\n'Nissan's performance in Japan in 2004 was solid. Profit rose 1.4 percent and our market share went up 0.4 percent to 14.6 percent. Launching six new models in the second half boosted our results dramatically: we registered a 1.1 percent increase in market share over the previous period. And for the first time in 19\nyears we had four cars-the Tiida, Note, March and Cube-in the top ten.\nOur steady growth has continued into 2005, powered by positive customer response to both the Murano and Tiida. These are the kinds of attractive, unique products that have an immediate impact on consumers. We've also strengthened our position in the important small car market, and plan to augment that with the launch of the Otti, an OEM project with Mitsubishi, and the Moco, an OEM product with Suzuki. While we do need to raise our game in the SUV market, our overall coverage has improved recently.\nWe've set an ambitious sales target of 933,000 vehicles for 2005, which represents an increase of 10 percent. I'm confident that we can achieve this because of the strength of our product lineup. The recently released Serena underwent a full model change, for example, which should give us more muscle in the minivan market. We also recently decided to offer our entire lineup through both our blue and red sales channels, so customers will be able to see every model at any outlet they visit. This is in stark contrast to the traditional dealership system in Japan, which has many different sales channels.\nThe aging of the population has made the automotive market in Japan much tougher, and we expect flat or even\nNissan Annual Report 2004\ndeclining sales as a result. Still, we do see potential in new areas within the market. For example, we increased the number of women employed as 'carlife' advisors and technical advisors. We did this to put both women and older customers at ease when they have sales and service issues. Both types of advisors are important to our sales and service at a dealership because they make the process more transparent and understandable. Service is a very profitable part of business in Japan, so taking ours to the next level is crucial.", + "page_start": 61, + "page_end": 61, + "source_file": "OTC_NSANY_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "OTC_NSANY_2004.pdf", + "query": "What was Nissan's vehicle production in Mexico in 2003?", + "target_page": 72, + "target_passage": "308,322", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Retail Sales by Region\n(Units: 1000s)\n*Including Mexico\nand Canada\nNissan Annual Report 2004\n9\nPERFORMANCE\nPERFORMANCE\n10\nNissan Annual Report 2004", + "page_start": 10, + "page_end": 11, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "CONSOLIDATED FIVE-YEAR SUMMARY\nNotes: 1. Unit sales in Mexico are included in 'North America.'\n2. Sales and Production for Europe and Mexico for each year are on a January to December basis. (In the annual reports for the fiscal years before 2003, production for Europe and Mexico was on April to March basis.)\nNissan Annual Report 2004", + "page_start": 71, + "page_end": 71, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "Nissan\nNissan Annual Report 2004", + "page_start": 23, + "page_end": 23, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "FINANCIAL HIGHLIGHTS\nNissan Motor Co., Ltd. And Consolidated Subsidiaries Fiscal years 2004, 2003, 2002, 2001 and 2000", + "page_start": 2, + "page_end": 2, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "Exceeding expectations -the Nissan automobile\nAt the center of everything we do stands the Nissan automobile. Our vehicles are the most tangible expression of our brand and the values of our company. We make cars that both inspire passion and exceed the expectations of our customers. Through bold and thoughtful designs, innovative technologies, and a richer and more rewarding driving experience, we are defining our unique place in the auto industry.\nOur product development philosophy differs from that which many of our competitors follow. Rather than focus on what the competition is providing, we concentrate on what they do not. We listen to drivers to discover their unmet needs and desires, and follow the most promising threads of emerging trends. Our designs are bold, geared to electrify and inspire. We see little point in building vehicles that please everyone but excite no one.\nThe appeal of a Nissan goes much deeper than the fine lines of its body and the gleam of its paint. We make some of the world's most advanced high-performance engines and transmissions. From our renowned VQ engine series to the latest in high technology, continuously variable transmissions (CVT), we blend driving pleasure with safety, fuel efficiency, and real-world environmental solutions.\nNissan has a long history of leadership and innovation in the automotive industry. We began our quest to create the best cars in the world in 1933, when the company was founded in Yokohama. The first Datsun passenger car rolled off the assembly line two years later. In the years since, we have fashioned a reputation for bold and innovative products. We were the first company to design, manufacture and export a small pickup truck from Japan to the United States, and to build and export a sports sedan, the Datsun 510. And we were the first to produce a true sports car that was also affordable, the Z. Today, we build equally exceptional vehicles in factories throughout the world that consistently rank in the top tier for efficiency, productivity and quality.\nIn the future, we will take the Nissan brand into new segments and markets. We will accelerate the pace of automotive evolution. And our products will continue to define our brand with clarity and consistency that brings lasting value to all our stakeholders.\nNissan Annual Report 2004\n23\nWHO WE ARE\nWHO WE ARE\nNissan Annual Report 2004 24", + "page_start": 23, + "page_end": 25, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "Consolidated subsidiaries\nshare*(%) = 100.00. Canada, Location = . Canada, Principal business = . Canada, As of Mar. 31, 2005.Capital (millions) = . Canada, As of Mar. 31, 2005.Nissan share*(%) = . Nissan Canada, Inc., Location = Mississauga, Ontario. Nissan Canada, Inc., Principal business = Sales of automobiles and parts. Nissan Canada, Inc., As of Mar. 31, 2005.Capital (millions) = CAN$68. Nissan Canada, Inc., As of Mar. 31, 2005.Nissan share*(%) = 100.00. Mexico, Location = . Mexico, Principal business = . Mexico, As of Mar. 31, 2005.Capital (millions) = . Mexico, As of Mar. 31, 2005.Nissan share*(%) = . Nissan Mexicana, S.A. de C.V., Location = Mexico D.F.. Nissan Mexicana, S.A. de C.V., Principal business = Manufacture and sales of automobiles and parts. Nissan Mexicana, S.A. de C.V., As of Mar. 31, 2005.Capital (millions) = P17,056. Nissan Mexicana, S.A. de C.V., As of Mar. 31, 2005.Nissan share*(%) = 100.00\nNissan Annual Report 2004\nEurope", + "page_start": 107, + "page_end": 108, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "CONSOLIDATED FIVE-YEAR SUMMARY\nNissan Motor Co., Ltd. and Consolidated Subsidiaries Fiscal years 2004, 2003, 2002, 2001 and 2000", + "page_start": 71, + "page_end": 71, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "CONSOLIDATED STATEMENTS OF INCOME\nNissan Motor Co., Ltd. and Consolidated Subsidiaries Fiscal years 2004, 2003 and 2002", + "page_start": 75, + "page_end": 75, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "NON-CONSOLIDATED FIVE-YEAR SUMMARY\nNissan Motor Co., Ltd. and Consolidated Subsidiaries Fiscal years 2004, 2003, 2002, 2001 and 2000", + "page_start": 106, + "page_end": 106, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "FISCAL YEAR 2004 FINANCIAL REVIEW\nNISSAN REPORTED A RECORD YEAR IN TERMS OF REVENUES, OPERATING INCOME, NET INCOME, SALES AND PRODUCTION VOLUME IN FISCAL 2004. NISSAN ACHIEVED TWO OF ITS THREE COMMITMENTS FOR NISSAN 180: AN 8 PERCENT OPERATING PROFIT MARGIN AND ZERO NET AUTOMOTIVE DEBT. THE REMAINING COMMITMENT IS THE ACHIEVEMENT OF ONE MILLION ADDITIONAL UNIT SALES. AT MID-YEAR 2005, GLOBAL SALES AT 1,809,000 UNITS WERE SLIGHTLY AHEAD OF THE COMMITMENT TO REACH 3,597,000 UNITS BY THE END OF SEPTEMBER 2005.", + "page_start": 13, + "page_end": 13, + "source_file": "OTC_NSANY_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "ASX_SEA_2014.pdf", + "query": "Why did Sundance Energy's oil sales improve in 2014?", + "target_page": 18, + "target_passage": "The increase in oil revenues was the result of increased oil production volumes ($81.3 million) offset by a decrease in product pricing ($15.7 million). ", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Dear Fellow Shareholders,\n2014 Review -2014 was a year of stark economic contrasts in our industry. During the first half as in the past several years, historically volatile West Texas Intermediate oil prices seemed range bound between $80 and $110 with geopolitical events driving prices towards the ceiling and demand risks pushing prices towards the floor of the range.\nIn the US, E&P companies were spending record amounts of capital, fueled by cheap and plentiful debt, on horizontal drilling and completions to drive production growth while making material strategic acquisitions in order to increase their long-term exposure to oil prices.\nThe easy credit environment caused asset prices to increase significantly to the point where, in our view, risk adjusted returns on new acquisitions were threatening cyclical lows. In line with our strategy, Sundance had monetized several mature assets realizing", + "page_start": 5, + "page_end": 5, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "Dear Fellow Shareholders,\nI am pleased to present Sundance Energy Australia Limited's Annual Report for the 12 months ended 31 December 2014. It has been another year of significant progress for Sundance across our portfolio of liquids rich oil and gas assets in the US.\nThe Company's strategic focus on growing production, cash flows and reserves from large, repeatable resource plays in North America continues to deliver positive results with growth in production, cash flows, and reserves.\nDuring late 2013 and 2014, we completed the divestment of our interest in the Williston Basin in North Dakota for $51 million which realised an internal rate of return of 45 percent; and also opportunistically divested our interest in the Denver-Julesburg Basin in Colorado for $114 million which realised an internal rate of return of 104 percent. These divestitures of smaller, less scalable positions enabled us to focus on developing and growing our assets in the Eagle Ford in Texas and our Mississippian/Woodford assets in Oklahoma.\nDespite the reduction in crude oil and liquids prices towards the end of the year and continuing into 2015, the operational performance and focused, value-adding transactions during the past year have positioned the Company very favourably for future growth in net asset value and shareholder returns.", + "page_start": 3, + "page_end": 3, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "Positive outlook for 2015\nDespite the current oil pricing scenario, Sundance's medium-to-long term growth trajectory looks very positive.\nWe can demonstrate this through:\n· A track record of capital efficient growth\n· A track record of value creation\n· Being a low cost/high margin operator\n· Having top tier Eagle Ford assets with an extensive drilling inventory\n· Having a clean balance sheet\nAs a mid-tier oil and gas producer and explorer in the S&P/ASX All Australian 200 index, and with the increasing interest and support from institutional and retail investors. I believe that Sundance will deliver significant long-term value from our assets for our shareholders.", + "page_start": 4, + "page_end": 4, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "Dear Fellow Shareholders,\n2014, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN 2P PV10 (NET ASSET VALUE) PER DEBT ADJUSTED SHARE = 21.6%. 2014, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN SUNDANCE PRICE PER SHARE = -48.0%. 2014, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN ASX200 = 1.1%. 2013, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN 2P PV10 (NET ASSET VALUE) PER DEBT ADJUSTED SHARE = 63.3%. 2013, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN SUNDANCE PRICE PER SHARE = 29.9%. 2013, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN ASX200 = 15.1%. 2012, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN 2P PV10 (NET ASSET VALUE) PER DEBT ADJUSTED SHARE = -15.6%. 2012, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN SUNDANCE PRICE PER SHARE = 87.8%. 2012, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN ASX200 = 14.6%. 2011, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN 2P PV10 (NET ASSET VALUE) PER DEBT ADJUSTED SHARE = 59.7%. 2011, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN SUNDANCE PRICE PER SHARE = -44.6%. 2011, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN ASX200 = -14.5%\n~$50 million in current period gains while freeing up ~$165 million in invested capital.\nWe primarily reinvested this capital in production growth and cash flow with only about $75 million reinvested in acquiring oil and gas leases and producing properties. This resulted in our production increasing from 5,028 BOEPD to 9,434 BOEPD by December 2014 and full year EBITDAX increasing $73.8 million to $126.4 million in 2014. Had prices stayed steady, we likely would have generated earnings before income taxes of over $85 million and a return on capital in excess of 20%.", + "page_start": 5, + "page_end": 5, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "Corporate Overview and Strategy\nSundance Energy Australia Limited (ASX: SEA) is an onshore oil and natural gas company focused on the exploration, development and production of large, repeatable resource plays in North America. The Company's oil and natural gas properties are located in premier U.S. oil and natural gas basins, and its current operational activities are focused in south Texas targeting the Eagle Ford formation (''Eagle Ford'') and north central Oklahoma targeting the Mississippian and Woodford formations (''Mississippian/Woodford'').\nThe Company utilises its U.S.-based management and technical team to appraise, develop, produce and grow its portfolio of assets. The Company's strategy focuses on generating cash flow from its existing production base, developing assets where it is the operator and has high working interests, exploring for additional resources within its existing basins and pursuing strategic merger and acquisition opportunities, which positions it to control the pace of its development and the allocation of capital resources.", + "page_start": 1, + "page_end": 1, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "The Eagle Ford - driving value and production growth\nSundance has grown its Eagle Ford acreage position from ~7,200 acres upon entering the basin to approximately 26,160 net mineral acres in the Eagle Ford at the end of 2014 which includes the acquisition of approximately 18,000 net acreage in 2014. By the end of the first quarter 2015 this had grown to 38,701 net mineral acres. Our growing presence in this prolific oil and gas region has been driving significant value for the Company and our shareholders, and continues to form our priority focus for development and acreage growth in the coming years.\nAt year end, we had 197 gross 3P Reserves drilling locations across our Eagle Ford acreage where we continue to pursue operational and drilling efficiencies, opportunities to further improve well economics by improving recoveries and reducing costs. In 2014 this included a switch to pad drilling with zipper fracs and new completion techniques that have provided significant upside in production.\nDespite our current scaling back of drilling activity, we have set 2015 production guidance at 7,850 - 8,500 BOEPD, an increase from the previous year of some 13 - 17 percent, but a target that we believe is achievable while maintaining acceptable levels of liquidity given our demonstrated abilities and growing footprint in the Eagle Ford.", + "page_start": 3, + "page_end": 4, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "A year of growing production, cash flow and reserves\nIn line with our strategy we continued to increase the level of company operated assets, and successfully maintained a very strong focus on optimising our operations and reducing costs. This resulted in an impressive improvement in well performance combined with a top tier cost structure.\nThrough our operated development program, we ended 2014 with record production of 9,434 barrels of oil equivalent per day (BOEPD) compared with an exit rate of 5,028 BOEPD in December 2013 and an average annual production of 6,635 BOEPD compared to 3,015 BOEPD in 2013. During 2014 we drilled and completed 42.7 net wells, primarily in the Eagle Ford, bringing our total well count to 81.3 by 31 December 2014. High value oil comprised approximately 69 percent of our total 2014 annual production and production from Sundance-operated projects accounted for 89 percent of total production for the year.\nCorresponding with the growth in annual production, the Company's full year revenues increased to $159.8 million and Adjusted EBITDAX increased to $126.4 million.\nThe Company's development program also generated significant growth in Constant Case reserves during the year. More details are contained elsewhere in this Annual Report, but in summary our 1P Reserves at the end of 2014 were 26.0 MBOE, 2P Reserves 54.1 MBOE, and 3P Reserves 147.7 MBOE. This compares with Reserves of 20.7 MBOE, 34.6 MBOE, and 92.8 MBOE, respectively, at the end of 2013.\nIn the current price environment, we have elected to scale back our drilling program to mainly concentrate on limited drilling obligations to hold Eagle Ford acreage. This will enable us to maintain our low leverage profile, which was approximately 1.03x debt to Adjusted EBITDAX at year end, and focus on growing our drilling inventory in an environment with less competition for leases and small acquisitions. Liquidity was $84 million at year end, with a borrowing base redetermination in 2015 expected to materially increase debt availability if the use of such funds is justified in line with our strategy.", + "page_start": 3, + "page_end": 3, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "Review of Operations\nNatural gas sales. Natural gas sales increased by $3.4 million (122.1%) to $6.2 million for the year ended 31 December 2014 from $2.8 million for the prior year. The increase in natural gas revenues was primarily the result of increased production volumes ($2.6 million) and improved product pricing ($0.8 million). Natural gas production volumes increased 868,800 Mcf (93.0%) to 1,803,000 Mcf for the year ended 31 December 2014 compared to 934,200 Mcf for the prior year. The average price we realised on the sale of our natural gas increased by 15.1% to $3.42 per Mcf for the year ended 31 December 2014 from $2.97 per Mcf for the prior year.\n- 16 -\nNatural gas liquids sales (NGL) . NGL sales increased by $5.4 million (169.5%) to $8.6 million for the year ended 31 December 2014 from $3.2 million for the same period in prior year. The increase in NGL revenues was primarily the result of increased production volumes in the Eagle Ford and Anardarko Basins. NGL production volumes increased 172,131 Bbls (179.6%) to 267,952 Bbls for the year ended 31 December 2014 compared to 95,821 Bbls for the prior year. The average price we realised on the sale of our natural gas liquids decreased by 3.6% to $32.24 per Bbl for the year ended 31 December 2014 from $33.45 per Bbl for the prior year.", + "page_start": 17, + "page_end": 18, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "A strong financial position\nSundance is well placed for future growth in the Eagle Ford. The Company has a strong balance sheet to withstand the current low oil price environment, and our sound financial management strategy has seen the Company well supported by both new and existing investors in Australia and internationally.\nWe expect that Sundance will grow organically and also through further leasing or bolt-on acquisitions in our core Eagle Ford focus area within our current, conservative balance sheet parameters.", + "page_start": 4, + "page_end": 4, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "Sundance Energy Australia Limited\nABN 76 112 202 883", + "page_start": 112, + "page_end": 112, + "source_file": "ASX_SEA_2014.pdf" + } + ] + }, + { + "references": { + "source_file": "ASX_SEA_2014.pdf", + "query": "I heard that Sundance Energy has acquired land in South Texas in July 2014, where is it?", + "target_page": 21, + "target_passage": "In July 2014, the Company completed the acquisition of approximately 5,700 net Eagle Ford acres in Dimmit County, South Texas", + "chunk_present": { + "presence": true, + "index": 8 + } + }, + "top_chunk": [ + { + "text": "Corporate Overview and Strategy\nSundance Energy Australia Limited (ASX: SEA) is an onshore oil and natural gas company focused on the exploration, development and production of large, repeatable resource plays in North America. The Company's oil and natural gas properties are located in premier U.S. oil and natural gas basins, and its current operational activities are focused in south Texas targeting the Eagle Ford formation (''Eagle Ford'') and north central Oklahoma targeting the Mississippian and Woodford formations (''Mississippian/Woodford'').\nThe Company utilises its U.S.-based management and technical team to appraise, develop, produce and grow its portfolio of assets. The Company's strategy focuses on generating cash flow from its existing production base, developing assets where it is the operator and has high working interests, exploring for additional resources within its existing basins and pursuing strategic merger and acquisition opportunities, which positions it to control the pace of its development and the allocation of capital resources.", + "page_start": 1, + "page_end": 1, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "Sundance Energy Australia Limited\nABN 76 112 202 883", + "page_start": 112, + "page_end": 112, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "Dear Fellow Shareholders,\nI am pleased to present Sundance Energy Australia Limited's Annual Report for the 12 months ended 31 December 2014. It has been another year of significant progress for Sundance across our portfolio of liquids rich oil and gas assets in the US.\nThe Company's strategic focus on growing production, cash flows and reserves from large, repeatable resource plays in North America continues to deliver positive results with growth in production, cash flows, and reserves.\nDuring late 2013 and 2014, we completed the divestment of our interest in the Williston Basin in North Dakota for $51 million which realised an internal rate of return of 45 percent; and also opportunistically divested our interest in the Denver-Julesburg Basin in Colorado for $114 million which realised an internal rate of return of 104 percent. These divestitures of smaller, less scalable positions enabled us to focus on developing and growing our assets in the Eagle Ford in Texas and our Mississippian/Woodford assets in Oklahoma.\nDespite the reduction in crude oil and liquids prices towards the end of the year and continuing into 2015, the operational performance and focused, value-adding transactions during the past year have positioned the Company very favourably for future growth in net asset value and shareholder returns.", + "page_start": 3, + "page_end": 3, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "Registered Office\n32 Beulah Road\nNorwood SA 5067\nPhone: (61 8) 8363 0388\nFax: (61 8) 8132 0766\nWebsite: www.sundanceenergy.com.au", + "page_start": 112, + "page_end": 112, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "Interest in Shares :\n596,700 Ordinary Shares in Sundance Energy Australia Limited", + "page_start": 26, + "page_end": 26, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "Dear Fellow Shareholders,\n2014 Review -2014 was a year of stark economic contrasts in our industry. During the first half as in the past several years, historically volatile West Texas Intermediate oil prices seemed range bound between $80 and $110 with geopolitical events driving prices towards the ceiling and demand risks pushing prices towards the floor of the range.\nIn the US, E&P companies were spending record amounts of capital, fueled by cheap and plentiful debt, on horizontal drilling and completions to drive production growth while making material strategic acquisitions in order to increase their long-term exposure to oil prices.\nThe easy credit environment caused asset prices to increase significantly to the point where, in our view, risk adjusted returns on new acquisitions were threatening cyclical lows. In line with our strategy, Sundance had monetized several mature assets realizing", + "page_start": 5, + "page_end": 5, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "Sundance Energy, Inc.\n633 17th Street, Suite 1950\nDenver, CO 80202 USA\nPhone: (303) 543-5700\nFax: (303) 543-5701\nWebsite: www.sundanceenergy.net", + "page_start": 112, + "page_end": 112, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "Interest in Shares :\n1,059,000 ordinary shares in Sundance Energy Australia Limited", + "page_start": 24, + "page_end": 24, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "Acquisitions\nIn April 2014, the Company acquired approximately 4,800 net acres in the Eagle Ford for an initial purchase price of approximately $10.5 million and two separate earn out payments due upon commencement of drilling in each of three blocks of acreage (total for all three blocks of $7.7 million) and payout of the first two wells drilled on each block of the acreage ($7.7 million). The term of the agreement is two years and provides a one year extension for $500 per acre extended. This acquired acreage is adjacent to our existing acreage in McMullen County, Texas.\nIn July 2014, the Company completed the acquisition of approximately 5,700 net Eagle Ford acres in Dimmit County, South Texas, for approximately $36 million and a commitment to drill four Eagle Ford wells. The Company also has the option, at its sole discretion, to acquire the Seller's remaining working interest for an additional $45 million for the earlier of one year from closing the acquisition or six months from first production of hydrocarbons.\n- 19 -", + "page_start": 20, + "page_end": 20, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "Dear Fellow Shareholders,\n2014, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN 2P PV10 (NET ASSET VALUE) PER DEBT ADJUSTED SHARE = 21.6%. 2014, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN SUNDANCE PRICE PER SHARE = -48.0%. 2014, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN ASX200 = 1.1%. 2013, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN 2P PV10 (NET ASSET VALUE) PER DEBT ADJUSTED SHARE = 63.3%. 2013, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN SUNDANCE PRICE PER SHARE = 29.9%. 2013, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN ASX200 = 15.1%. 2012, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN 2P PV10 (NET ASSET VALUE) PER DEBT ADJUSTED SHARE = -15.6%. 2012, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN SUNDANCE PRICE PER SHARE = 87.8%. 2012, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN ASX200 = 14.6%. 2011, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN 2P PV10 (NET ASSET VALUE) PER DEBT ADJUSTED SHARE = 59.7%. 2011, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN SUNDANCE PRICE PER SHARE = -44.6%. 2011, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN ASX200 = -14.5%\n~$50 million in current period gains while freeing up ~$165 million in invested capital.\nWe primarily reinvested this capital in production growth and cash flow with only about $75 million reinvested in acquiring oil and gas leases and producing properties. This resulted in our production increasing from 5,028 BOEPD to 9,434 BOEPD by December 2014 and full year EBITDAX increasing $73.8 million to $126.4 million in 2014. Had prices stayed steady, we likely would have generated earnings before income taxes of over $85 million and a return on capital in excess of 20%.", + "page_start": 5, + "page_end": 5, + "source_file": "ASX_SEA_2014.pdf" + } + ] + }, + { + "references": { + "source_file": "ASX_SEA_2014.pdf", + "query": "I am the CFO of Sundance Energy, will my base increase in 2015 as it did in 2014?", + "target_page": 31, + "target_passage": "No increases to Managing Director’s or KMP’s base salary", + "chunk_present": { + "presence": true, + "index": 9 + } + }, + "top_chunk": [ + { + "text": "Positive outlook for 2015\nDespite the current oil pricing scenario, Sundance's medium-to-long term growth trajectory looks very positive.\nWe can demonstrate this through:\n· A track record of capital efficient growth\n· A track record of value creation\n· Being a low cost/high margin operator\n· Having top tier Eagle Ford assets with an extensive drilling inventory\n· Having a clean balance sheet\nAs a mid-tier oil and gas producer and explorer in the S&P/ASX All Australian 200 index, and with the increasing interest and support from institutional and retail investors. I believe that Sundance will deliver significant long-term value from our assets for our shareholders.", + "page_start": 4, + "page_end": 4, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "Dear Fellow Shareholders,\n2014, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN 2P PV10 (NET ASSET VALUE) PER DEBT ADJUSTED SHARE = 21.6%. 2014, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN SUNDANCE PRICE PER SHARE = -48.0%. 2014, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN ASX200 = 1.1%. 2013, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN 2P PV10 (NET ASSET VALUE) PER DEBT ADJUSTED SHARE = 63.3%. 2013, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN SUNDANCE PRICE PER SHARE = 29.9%. 2013, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN ASX200 = 15.1%. 2012, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN 2P PV10 (NET ASSET VALUE) PER DEBT ADJUSTED SHARE = -15.6%. 2012, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN SUNDANCE PRICE PER SHARE = 87.8%. 2012, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN ASX200 = 14.6%. 2011, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN 2P PV10 (NET ASSET VALUE) PER DEBT ADJUSTED SHARE = 59.7%. 2011, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN SUNDANCE PRICE PER SHARE = -44.6%. 2011, Sundance's Performance versus the ASX 200.ANNUAL PERCENTAGE CHANGE.IN ASX200 = -14.5%\n~$50 million in current period gains while freeing up ~$165 million in invested capital.\nWe primarily reinvested this capital in production growth and cash flow with only about $75 million reinvested in acquiring oil and gas leases and producing properties. This resulted in our production increasing from 5,028 BOEPD to 9,434 BOEPD by December 2014 and full year EBITDAX increasing $73.8 million to $126.4 million in 2014. Had prices stayed steady, we likely would have generated earnings before income taxes of over $85 million and a return on capital in excess of 20%.", + "page_start": 5, + "page_end": 5, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "Dear Fellow Shareholders,\nI am pleased to present Sundance Energy Australia Limited's Annual Report for the 12 months ended 31 December 2014. It has been another year of significant progress for Sundance across our portfolio of liquids rich oil and gas assets in the US.\nThe Company's strategic focus on growing production, cash flows and reserves from large, repeatable resource plays in North America continues to deliver positive results with growth in production, cash flows, and reserves.\nDuring late 2013 and 2014, we completed the divestment of our interest in the Williston Basin in North Dakota for $51 million which realised an internal rate of return of 45 percent; and also opportunistically divested our interest in the Denver-Julesburg Basin in Colorado for $114 million which realised an internal rate of return of 104 percent. These divestitures of smaller, less scalable positions enabled us to focus on developing and growing our assets in the Eagle Ford in Texas and our Mississippian/Woodford assets in Oklahoma.\nDespite the reduction in crude oil and liquids prices towards the end of the year and continuing into 2015, the operational performance and focused, value-adding transactions during the past year have positioned the Company very favourably for future growth in net asset value and shareholder returns.", + "page_start": 3, + "page_end": 3, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "Dear Fellow Shareholders,\n2014 Review -2014 was a year of stark economic contrasts in our industry. During the first half as in the past several years, historically volatile West Texas Intermediate oil prices seemed range bound between $80 and $110 with geopolitical events driving prices towards the ceiling and demand risks pushing prices towards the floor of the range.\nIn the US, E&P companies were spending record amounts of capital, fueled by cheap and plentiful debt, on horizontal drilling and completions to drive production growth while making material strategic acquisitions in order to increase their long-term exposure to oil prices.\nThe easy credit environment caused asset prices to increase significantly to the point where, in our view, risk adjusted returns on new acquisitions were threatening cyclical lows. In line with our strategy, Sundance had monetized several mature assets realizing", + "page_start": 5, + "page_end": 5, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "2015 RSU Plan\nStarting with the 2015 fiscal year, the RSU Plan has been amended for executives to reflect 50% time based vesting and 50% vesting based on total shareholder return (TSR) relative to our peer group over a three-year period. The time-based vesting will vest 1/3 on each of the three anniversaries following the grant date subject to continued employment with Sundance. TSR is calculated as the change in stock price plus dividends over the three year period. The stock price used to calculate the starting stock price value will be the average price of Sundance's stock for the 20 trading days before the first day of the measurement period. The ending-period stock price will be the average price of Sundance's stock for the last 20 trading days of the measurement period.\nThe number of shares that can be earned under TSR performance ranges from 0% to 200% of the target share grant based on Sundance's percentile rank among the peer set. If Sundance's TSR is negative for the three-year period, but the percentile rank is above median, the payout will be capped at the target payout. If Sundance's TSR is between any of the percentile ranks listed in the table below, the payout as a percent of target will be on a pro-rata basis.\nTSR Percentile Rank, 1 = Payout % of Target. 90 th and above, 1 = 200%. 50 th, 1 = 100%. 30 th, 1 = 50%. Below 30 th, 1 = 0%\n- 37 -\nTSR will be compared to a set of 22 oil and gas exploration and production companies headquartered in the United States and Australia. The Australian-headquartered companies are highlighted. The chart on the right depicts the TSR over a three year period ending 31 December 2014. Diamondback Energy Inc, Matador Resources Co and Midstates Petroleum Co Inc were excluded from the chart as there was not enough historical data to measure the defined TSR.\nRetirement and Other Benefits\nExecutive management participates in the same benefit plans and on the same basis as other employees. Those plans include health, dental and vision insurance (for which a premium contribution is required by the participant) and a 401(k) retirement plan under which the Company makes an annual contribution equal to 3 percent of the participant's eligible compensation.\nPost-Termination and Change In Control Benefits", + "page_start": 38, + "page_end": 39, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "A strong financial position\nSundance is well placed for future growth in the Eagle Ford. The Company has a strong balance sheet to withstand the current low oil price environment, and our sound financial management strategy has seen the Company well supported by both new and existing investors in Australia and internationally.\nWe expect that Sundance will grow organically and also through further leasing or bolt-on acquisitions in our core Eagle Ford focus area within our current, conservative balance sheet parameters.", + "page_start": 4, + "page_end": 4, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "In our opinion:\na. the financial report of Sundance Energy Australia is in accordance with the Corporations Act 2001 , including:\ni giving a true and fair view of the consolidated entity's financial position as at 31 December 2014 and of its performance for the year ended on that date; and\nii complying with Australian Accounting Standards and the Corporations Regulations 2001 ; and\nb. the financial report also complies with International Financial Reporting Standards issued by the IASB as disclosed in Note 1.", + "page_start": 109, + "page_end": 109, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "Senior Credit Facility\nOn 31 December 2012, Sundance Energy entered into a credit agreement with Wells Fargo Bank, N.A. (the 'Senior Credit Facility'), pursuant to which up to $300 million is available on a revolving basis. The borrowing base under the Senior Credit Facility is determined by reference to the value of the Company's proved reserves. The agreement specifies a semi-annual borrowing base redetermination and the Company can request two additional redeterminations each year. The borrowing capacity was increased from prior year to $110 million as at 31 December 2014 based on Company reserves as at 31 December 2014. As at 31 December 2014, the Company had $15 million undrawn on the Senior Credit Facility. In conjunction with the increase in the borrowing base, the Company has expanded the syndicate of banks under the Senior Credit Facility. With Wells Fargo as administrative agent, Bank of America Merrill Lynch and the Bank of Nova Scotia have now joined the banking group.\nInterest on borrowed funds accrue, at the Company's option, of i) LIBOR plus a margin that ranges from 175 to 275 basis points or ii) the Base Rate, defined as a rate equal to the highest of (a) the Federal Funds Rate plus ½ of 1%, (b) the Prime Rate, or (c) LIBOR plus a margin that ranges from 75 to 175 basis points. The applicable margin varies depending on the amount drawn. The Company also pays a commitment that ranges from 37.5 to 50 basis points on the undrawn balance of the borrowing base. The agreement has a five-year term and contains both negative and affirmative covenants, including minimum current ratio and maximum leverage ratio requirements consistent with the Junior Credit Facility's. Certain development and production assets are pledged as collateral and the facility is guaranteed by the Parent Company.\nFor the years ended 31 December 2014 and 2013, the Company capitalised nil and $0.2 million, respectively, of financing costs related to the Senior Credit Facility, which offset the principal balance. As at 31 December 2014 there was $95.0 million outstanding under the Company's Senior Credit Facility. As at 31 December 2014, the Company was in compliance with all restrictive financial and other covenants under the Senior Credit Facility.\nThe Company capitalised $3.4 million and $1.3 million of interest expense during the years ended 31 December 2014 and 2013, respectively.\n- 87 -", + "page_start": 88, + "page_end": 88, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "Cashflow\nCash provided by operating activities for the year ended 31 December 2014 increased 104.5% to $128.1 million compared to the prior year. This increase was primarily due to receipts from sales increasing $85.7 million, or 101.2%, to $170.4 million, while keeping payments to suppliers and employees relatively stable with an increase of $8.2 million, or 37.7%, to $30.0 million. See Review of Operations for more information.\nCash used in investing activities for the year ended 31 December 2014 increased $158.9 million, or 96.7%, to $323.2 million. This increase is due to successful implementation of the Company's strategy to develop and grow the reserves from our high working interest, repeatable resource plays, primarily in the Eagle Ford. Due to funding available to the Company through asset sales, capital raises and credit facilities, the Company was able to accelerate its 2015 drilling program into 2014. However, due to the reduction in crude oil prices in the fourth quarter of 2014 and continuing into early 2015, the Company will scale back its drilling program to concentrate on limited drilling obligations to hold Eagle Ford acreage during the 2015 year.\nCash provided by financing activities for the year ended 31 December 2014 increased $123.1 million, or 277.0%, to $167.6 million. This increase is a result of the increased availability and draws under the Company's credit facilities and proceeds received in a private placement of shares. In February 2014, the Company completed a private placement in which we sold 84.2 million ordinary shares at A$0.95 per share, resulting in net proceeds of approximately $68.4 million. The first tranche of 63.7 million shares was issued in March 2014 and the second tranche of 20.5 million shares was issued in April 2014.", + "page_start": 22, + "page_end": 22, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "A. Key Fiscal Year 2014 Remuneration and Key Changes for Fiscal Year 2015\n- 28 -\nNon-executive Director Compensation, Action = Increased total director base compensation during 2014 by approximately A$65,000 per Director.. Non-executive Director Compensation, Rationale = Based on market review of director compensation at peer group companies and to reflect the increasing complexity of the Company's operations and therefore the related time commitment and performance expectations of the\nAMED E\nFixed Remuneration, Action = No increases to Managing Director's or KMP's base salary.. Cash Short-Term Incentive, Action = Short-Term Incentive payments earned for 2014 will be paid out in Restricted Stock Units during 2015 instead of cash to reflect the current low commodity price environment and preserve liquidity.. Equity Long-Term Incentive, Action = Long-Term Incentive RSUs to KMPs earned for 2014 will be paid out in 2015 with 50% time based vesting and 50% vesting tied to Total Shareholder Return compared to the peer group over a three year period.. Non-executive Director Compensation, Action = No increases to NED fees\nCOMPENSATION (cont'd)", + "page_start": 29, + "page_end": 30, + "source_file": "ASX_SEA_2014.pdf" + } + ] + }, + { + "references": { + "source_file": "sg247938.pdf", + "query": "What are the physical requirements for installing the Storwize V7000?", + "target_page": 70, + "target_passage": "You must consider several key factors when you are planning the physical site of a Storwize V7000 installation. The physical site must have the following characteristics: \u0002 Meets power, cooling, and location requirements of the Storwize V7000 nodes. \u0002 Has two separate power sources. \u0002 Sufficient rack space exists for the installation of controller and disk expansion enclosures. \u0002 Has sufficient maximum power rating of the rack. Plan your rack placement carefully to not exceed maximum power rating of the rack. For more information about the power and environmental requirements, see this website", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "3.4 Physical planning\nYou must consider several key factors when you are planning the physical site of a Storwize V7000 installation. The physical site must have the following characteristics:\n/SM590000 Meets power, cooling, and location requirements of the Storwize V7000 nodes.\n/SM590000 Has two separate power sources.\n/SM590000 Sufficient rack space exists for the installation of controller and disk expansion enclosures.\n/SM590000 Has sufficient maximum power rating of the rack. Plan your rack placement carefully to not exceed maximum power rating of the rack. For more information about the power and environmental requirements, see this website.\nYour Storwize V7000 2076-524 and Storwize V7000 2076-624 order includes a printed copy of the IBM Storwize V7000 Gen2 and Gen2+ Quick Installation Guide, which also provides information about environmental and power requirements.", + "page_start": 69, + "page_end": 69, + "source_file": "sg247938.pdf" + }, + { + "text": "4.1 Prerequisites\nBefore initializing and setting up the Storwize V7000, ensure that the following prerequisites are met:\n/SM590000 The installation of physical components is planned to fulfill all requirements and correctly executed, including:\n- Control enclosures are physically installed with the correct cabling.\n- The Ethernet and Fibre Channel connectivity are correctly configured.\n- Expansion enclosures, if available, are physically installed and attached to the Storwize V7000 nodes in the I/O group that is meant to use them.\n- The Storwize V7000 control enclosures and optional expansion enclosures are powered on.\n/SM590000 Your web browser is supported and has the appropriate settings enabled. For more information about supported browsers and settings, see IBM Knowledge Center.\n/SM590000 You have the required information available, including:\n- For IPv4 addressing (if used):\nGLYPH<129> Cluster IPv4 address, which is the address that is used for the management of the system.\nGLYPH<129> Service IPv4 addresses, which are used to access node service interfaces. You need one address for each node.\nGLYPH<129> IPv4 subnet mask for each subnet used.\nGLYPH<129> IPv4 gateway for each subnet used.\n- For IPv6 addressing (if used):\nGLYPH<129> Cluster IPv6 address, which is used for the management of the system.\nGLYPH<129> Service IPv6 addresses, which are used to access node service interfaces. You need one address for each node.\nGLYPH<129> IPv6 prefix for each subnet used.\nGLYPH<129> IPv6 gateway. for each subnet used.\n- The licenses that enable you to use licensed functions, which include the licenses that indicate your entitlement to use licensed functions:\nGLYPH<129> Remote Copy\nGLYPH<129> External Virtualization\nGLYPH<129> Real-time Compression\nGLYPH<129> Transparent Cloud Tiering\n- Physical location of the system.\n- The name, email address, and phone number of the storage administrator who IBM can contact if necessary.\n- The Network Time Protocol (NTP) server IP address (optional, but recommended), which is necessary only if you want to use an NTP service instead of manually entering date and time.", + "page_start": 109, + "page_end": 109, + "source_file": "sg247938.pdf" + }, + { + "text": "8.3.1 NPIV prerequisites\nConsider the following key points for NPIV enablement:\n/SM590000 The IBM Storwize V7000 system must be running V7.7 or later.\n/SM590000 A V7.7 or later system with NPIV enabled as backend storage for a system that is earlier than V7.7 is not supported.\nChapter 8. Hosts\n321\n/SM590000 Both nodes in an I/O group should have identical hardware to allow failover to work as expected.\n/SM590000 The Fibre Channel switches to which the Storwize V7000 ports are attached must support NPIV and have this feature enabled.", + "page_start": 342, + "page_end": 343, + "source_file": "sg247938.pdf" + }, + { + "text": "3.1 General planning rules\nImportant: At the time of this writing, the statements that are provided in this book are accurate but can change. Always verify any statements that are made in this book with the IBM Storwize V7000 supported hardware list, device driver, firmware, and recommended software levels information that are available at the following websites:\n/SM590000 Support Information for Storwize V7000\n/SM590000 IBM System Storage Interoperation Center (SSIC)\nTo maximize the benefit that is realized from the Storwize V7000, pre-installation planning must include several important steps. These steps ensure that the Storwize V7000 provides the best possible performance, reliability, and ease of management for your application needs. The correct configuration also helps minimize downtime by avoiding changes to the Storwize V7000 and the storage area network (SAN) environment to meet future growth needs.\nThis book is not intended to provide in-depth information about the described topics. For an enhanced analysis of advanced topics, see IBM System Storage SAN Volume Controller and Storwize V7000 Best Practices and Performance Guidelines , SG24-7521.", + "page_start": 65, + "page_end": 65, + "source_file": "sg247938.pdf" + }, + { + "text": "8.3.2 Enabling NPIV on a new system\nNew Storwize V7000 systems that are shipped with V7.7 or later should have NPIV enabled by default. If your new Storwize V7000 does not have NPIV enabled, it can be enabled by completing the following steps:\n1. Run the lsiogrp command to list the I/O groups present in a system, as shown in Example 8-1.\nExample 8-1 Listing the I/O groups in a system", + "page_start": 343, + "page_end": 343, + "source_file": "sg247938.pdf" + }, + { + "text": "2.8 Useful IBM Storwize V7000 websites\nSee the following IBM Storwize V7000 web pages for more information:\n/SM590000 IBM Support page:\nhttps://www.ibm.com/support/home/product/5402112/IBM_Storwize_V7000_(2076)\n/SM590000 IBM Storwize V7000 Unified and IBM Storwize V7000 Systems:\nhttps://www.ibm.com/support/home/product/5421300/IBM_Storwize_V7000_Unified\n/SM590000 IBM Storwize V7000 page support\nhttp://www-01.ibm.com/support/docview.wss?uid=ssg1S1003741\n/SM590000 Direct attachment of IBM Storwize V7000\nhttps://www-01.ibm.com/support/docview.wss?uid=ssg1S1005776\n/SM590000 IBM Knowledge Center:\nhttps://www.ibm.com/support/knowledgecenter/en/ST3FR7_8.2.1/com.ibm.storwize.v7 000.821.doc/v7000_ichome.html\n42\nImplementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\nChapter 3.", + "page_start": 63, + "page_end": 64, + "source_file": "sg247938.pdf" + }, + { + "text": "Implementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\nISBN 0 7 3 845 77 79\nSG24 -7 938 -0 7\nBack cover\nISBN 0738457779 SG24-7938-07\nPrinted in U.S.A.", + "page_start": 822, + "page_end": 825, + "source_file": "sg247938.pdf" + }, + { + "text": "2.3.1 IBM Storwize V7000 models\nThe first generation of IBM Storwize V7000 hardware is not supported by IBM Spectrum Virtualize V8.1. Any attempt to upgrade to V8.1 is rejected by the software. The last supported version for first-generation Storwize V7000 is V7.8.", + "page_start": 35, + "page_end": 35, + "source_file": "sg247938.pdf" + }, + { + "text": "2.3.1 IBM Storwize V7000 models\nTable 2-1 IBM Storwize V7000 models\n2076-AF1 (with two node canisters Gen2+), Cache = 64, 128, or 256 gigabytes (GB). 2076-AF1 (with two node canisters Gen2+), Fibre Channel (FC) / iSCSI / SAS ports = 16 x 16 Gb / 6 x 1 Gb + 8x 10 Gb / 4 x 12 Gb. 2076-AF1 (with two node canisters Gen2+), Drive slots = 24 x 2.5-inch (All Flash). 2076-AF1 (with two node canisters Gen2+), Power supply = Integrated dual power supplies with battery", + "page_start": 34, + "page_end": 34, + "source_file": "sg247938.pdf" + }, + { + "text": "4.2.1 System initialization wizard\nImplementing the IBM Storwize V7000 with IBM Spectrum Virtualize V8.2.1\nNote: Make sure that your PC or notebook has a network route to the system IP address that you specified. In particular, you can access the management GUI from any management console that is connected to the same subnet as the system. Enter the system IP address on a supported browser to access the management GUI.", + "page_start": 113, + "page_end": 113, + "source_file": "sg247938.pdf" + } + ] + }, + { + "references": { + "source_file": "sg247938.pdf", + "query": "Is '1oijizer--10108453535318919918883384---jhjjzhiuhzrh--14584joiz///KK ' valid for a pool?", + "target_page": 218, + "target_passage": "Naming rules: When you choose a name for a pool, the following rules apply: \u0002 Names must begin with a letter. \u0002 The first character cannot be numeric. \u0002 The name can be a maximum of 63 characters. \u0002 Valid characters are uppercase letters (A - Z), lowercase letters (a - z), digits (0 - 9), underscore (_), period (.), hyphen (-), and space. \u0002 Names must not begin or end with a space. \u0002 Object names must be unique within the object type. For example, you can have a volume that is named ABC and a storage pool that is calledvolumes that are calledvolumes called ABC. \u0002 The default object name is valid (object prefix with an integer). \u0002 Objects can be renamed to their current names", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Example 7-1 The lsvdisk command\n6005076400F580049800000000000004 0 1 empty 0 no 0 0 Pool0 no yes 2 vdisk0 3 THIN_PROVISION_VOL_1 0 io_grp0 online 0 Pool0 100.00GB striped 6005076400F580049800000000000005 0 1 empty 1 no 0 0 Pool0 no yes 3 THIN_PROVISION_VOL_1 4 COMPRESSED_VOL_2 0 io_grp0 online 1 Pool1 30.00GB striped 6005076400F580049800000000000006 0 1 empty 0 no 1 1 Pool1 no yes 4 COMPRESSED_VOL_2 5 COMPRESS_VOL_3 0 io_grp0 online 1 Pool1 30.00GB striped 6005076400F580049800000000000007 0 1 empty 0 no 1 1 Pool1 no yes 5 COMPRESS_VOL_3 6 MIRRORED_SYNC_RATE_16 0 io_grp0 online many many 10.00GB many 6005076400F580049800000000000008 0 2 empty 0 no 0 many many no yes 6 MIRRORED_SYNC_RATE_16 7 THIN_PROVISION_MIRRORED_VOL 0 io_grp0 online many many 10.00GB many 6005076400F580049800000000000009 0 2 empty 2 no 0 many many no yes 7 THIN_PROVISION_MIRRORED_VOL 8 Tiger 0 io_grp0 online 0 Pool0 10.00GB striped 6005076400F580049800000000000010 0 1 not_empty 0 no 0 0 Pool0 yes yes 8 Tiger 12 vdisk0_restore 0 io_grp0 online 0 Pool0 10.00GB striped 6005076400F58004980000000000000E 0 1 empty 0 no 0 0 Pool0 no yes 12 vdisk0_restore 13 vdisk0_restore1 0 io_grp0 online 0 Pool0 10.00GB striped 6005076400F58004980000000000000F 0 1 empty 0 no 0 0 Pool0 no yes 13 vdisk0_restore1", + "page_start": 310, + "page_end": 310, + "source_file": "sg247938.pdf" + }, + { + "text": "6.1.1 Creating storage pools\n/SM590000 Names must begin with a letter.\n/SM590000 The first character cannot be numeric.\n/SM590000 The name can be a maximum of 63 characters.\n/SM590000 Valid characters are uppercase letters (A - Z), lowercase letters (a - z), digits (0 - 9), underscore (_), period (.), hyphen (-), and space.\n/SM590000 Names must not begin or end with a space.\n/SM590000 Object names must be unique within the object type. For example, you can have a volume that is named ABC and a storage pool that is calledvolumes that are calledvolumes called ABC.\n/SM590000 The default object name is valid (object prefix with an integer).\n/SM590000 Objects can be renamed to their current names.\nThe new pool is created and is included in the list of storage pools with zero bytes, as shown in Figure 6-8.\nFigure 6-8 Newly created empty pool\nTo perform this task with the CLI, the mkmdiskgrp command is used. The only required parameter is extent size. It is specified with the -ext parameter, which must have one of the following values: 16, 32, 64, 128, 256, 512, 1024, 2048, 4096, or 8192 (MB). To create Data Reduction Pool, specify -datareduction yes . In Example 6-2, the command creates DRP named 'Pool2' with no MDisks in it.\nExample 6-2 mkmdiskgrp command\nIBM_Storwize:ITSOV7K:superuser>mkmdiskgrp -name Pool2 -datareduction yes -ext 8192 MDisk Group, id [2], successfully created", + "page_start": 217, + "page_end": 217, + "source_file": "sg247938.pdf" + }, + { + "text": "arXiv:2501.01818v1 [cs.CR] 3 Jan 2025", + "page_start": 0, + "page_end": 0, + "source_file": "arxiv1.pdf" + }, + { + "text": "* Projects [project]:\nAGE, 4 = . service/docker-registry ClusterIP 172.30.26.207 5000/TCP 1d, 1 = . service/docker-registry ClusterIP 172.30.26.207 5000/TCP 1d, 2 = . service/docker-registry ClusterIP 172.30.26.207 5000/TCP 1d, 3 = . service/docker-registry ClusterIP 172.30.26.207 5000/TCP\n1d, 4 = . service/kubernetes ClusterIP 172.30.0.1 443/TCP,53/UDP,53/TCP 1d, 1 = service/kubernetes ClusterIP 172.30.0.1 443/TCP,53/UDP,53/TCP 1d. service/kubernetes ClusterIP 172.30.0.1 443/TCP,53/UDP,53/TCP 1d, 2 = . service/kubernetes ClusterIP 172.30.0.1 443/TCP,53/UDP,53/TCP 1d, 3 = . service/kubernetes ClusterIP 172.30.0.1 443/TCP,53/UDP,53/TCP 1d, 4 = . service/router ClusterIP 172.30.1.163 80/TCP,443/TCP,1936/TCP 1d, 1 = service/router ClusterIP 172.30.1.163 80/TCP,443/TCP,1936/TCP 1d. service/router ClusterIP 172.30.1.163 80/TCP,443/TCP,1936/TCP 1d, 2 = . service/router ClusterIP 172.30.1.163 80/TCP,443/TCP,1936/TCP 1d, 3 = . service/router", + "page_start": 165, + "page_end": 165, + "source_file": "sg248459.pdf" + }, + { + "text": "7.8.21 Listing volumes defined in the storage pool\n13,vdisk0_restore1,0,io_grp0,online,0,Pool0,10.00GB,striped,,,,,6005076400F5800498000000000 0000F,0,1,empty,0,no,0,0,Pool0,no,yes,13,vdisk0_restore1,", + "page_start": 333, + "page_end": 333, + "source_file": "sg247938.pdf" + }, + { + "text": "#Network configuration\n#---------------------------------\nnet1_name = \"net_ocp_cluster2\" # Network Name\nnet1_vlan_id = \"1\" # VLAN ID\nnet1_subnet = \"192.168.11.0/21\"\n# Network/Mask\nnet1_gateway = \"192.168.11.1\"\n# Gateway\nnet1_start = \"192.168.11.202\"\n# First IP from Pool\nnet1_end = \"192.168.11.212\"\n# Last IP from Pool", + "page_start": 131, + "page_end": 131, + "source_file": "sg248459.pdf" + }, + { + "text": "arXiv:2404.08471v1 [cs.CV] 15 Feb 2024", + "page_start": 0, + "page_end": 0, + "source_file": "arxiv3.pdf" + }, + { + "text": "#Network configuration\n#---------------------------------\nnet1_name = \"net_ocp_cluster1\" # Network Name\nnet1_vlan_id = \"1\" # VLAN ID\nnet1_subnet = \"192.168.11.0/21\"\n# Network/Mask\nnet1_gateway = \"192.168.11.1\"\n# Gateway\nnet1_start = \"192.168.11.223\"\n# First IP from Pool\nnet1_end = \"192.168.11.223\"\n# Last IP from Pool", + "page_start": 130, + "page_end": 130, + "source_file": "sg248459.pdf" + }, + { + "text": "26. Specified Dir ector and Specified Ex ecutiv e Disclosur es (continued) (c) Remuner ation o f Specified Dir ector s and Specified Ex ecutiv es (continued)\n$, 3 = -. es $, 4 = -. es $, 5 = - -. es $, 6 = -. es $, 7 = . es $, 8 = 58,939 18,731 58,819 15,674. es $, 9 = 79,052 20,000. es $, 10 = 62,341. es $, 11 = 18,900. es $, 12 = 40,583 83,443 30,833. es $, 13 = 361,494. Shar, 1 = 15,569. Shar, 2 = -. Shar, 3 = . Shar, 4 = -. Shar, 5 = . Shar, 6 = . Shar, 7 = 79,457 1,120,000. Shar, 8 = - -. Shar, 9 = . Shar, 10 = -. Shar, 11 = -. Shar, 12 = - -. Shar, 13 = -. Super annuation Retir ement $ $, 1 = 9,945 9,425 15,927. Super annuation Retir ement $ $, 2 = 514,500. Super annuation Retir ement $ $, 3 = 11,293 -. Super annuation Retir ement $ $, 4 = 5,040. Super annuation Retir ement $ $, 5 = 10,157 15,716 9,360 16,842. Super annuation Retir ement $ $, 6 = 10,090 15,403. Super annuation Retir ement $ $, 7 = 579,810. Super annuation Retir ement $ $, 8 = 24,292 40,606. Super annuation Retir ement $ $, 9 = . Super annuation Retir ement $ $, 10 = 49,361. Super annuation Retir ement $ $, 11 = 62,583. Super annuation Retir ement $ $, 12 = 29,594 50,263. Super annuation Retir ement $ $, 13", + "page_start": 78, + "page_end": 78, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "arXiv:2405.20468v2 [cs.CL] 17 Jun 2024", + "page_start": 0, + "page_end": 0, + "source_file": "arxiv4.pdf" + } + ] + }, + { + "references": { + "source_file": "news4.pdf", + "query": "I want to start a company that automates kitchen tasks, does that sound like a good idea for 2025?", + "target_page": 1, + "target_passage": "Smart home automation Smart home automation has been around for a while, but AI is taking it to the next level. Imagine a home that not only follows your commands, but also anticipates your needs. Enhanced smart home systems can learn your daily routines and adjust settings accordingly, from lighting and temperature to security and entertainment, making your home smarter and more responsive than ever before.", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "Other sources\nMahdawi, Arwa (26 June 2017). \"What jobs will still be around in 20 years? Read this to prepare your future\" (https://www.theguardian.com/us-news/2017/jun/26/jobs-future-automation-robo ts-skills-creative-health). The Guardian . Archived (https://web.archive.org/web/20180114021 804/https://www.theguardian.com/us-news/2017/jun/26/jobs-future-automation-robots-skillscreative-health) from the original on 14 January 2018. Retrieved 13 January 2018.\nMaker, Meg Houston (2006), AI@50: AI Past, Present, Future (https://web.archive.org/web/200 81008120238/http://www.engagingexperience.com/2006/07/ai50_ai_past_pr.html), Dartmouth College, archived from the original (http://www.engagingexperience.com/2006/0 7/ai50_ai_past_pr.html) on 8 October 2008, retrieved 16 October 2008\nMarmouyet, Françoise (15 December 2023). \"Google's Gemini: is the new AI model really better than ChatGPT?\" (https://theconversation.com/googles-gemini-is-the-new-ai-model-really-bet ter-than-chatgpt-219526). The Conversation . Archived (https://web.archive.org/web/202403 04215625/https://theconversation.com/googles-gemini-is-the-new-ai-model-really-better-tha n-chatgpt-219526) from the original on 4 March 2024. Retrieved 25 December 2023.\nMinsky, Marvin (1986), The Society of Mind , Simon and Schuster", + "page_start": 59, + "page_end": 59, + "source_file": "wikipedia3.pdf" + }, + { + "text": "EDITOR'S PICKS\nEN\nHave your say! Complete our 2025 Media Survey\nRetrain your way to a new job\nThe top AI-powered tech trends in 2025", + "page_start": 0, + "page_end": 0, + "source_file": "news2.pdf" + }, + { + "text": "Smart home automation\nSmart home automation has been around for a while, but AI is taking it to the next level. Imagine a home that not only follows your commands, but also anticipates your needs. Enhanced smart home systems can learn your daily routines and adjust settings accordingly, from lighting and temperature to security and entertainment, making your home smarter and more responsive than ever before.", + "page_start": 0, + "page_end": 0, + "source_file": "news4.pdf" + }, + { + "text": "The top AI-powered tech trends in 2025\n(NC) As we look ahead to 2025, artificial intelligence (AI) continues to revolutionize our lives. From enhancing our daily routines to transforming entire industries, AI's impact is undeniable.\nThese five innovations are set to shape our future, offering unprecedented convenience, efficiency and personalization.", + "page_start": 0, + "page_end": 0, + "source_file": "news4.pdf" + }, + { + "text": "Further reading\nAutor, David H., \"Why Are There Still So Many Jobs? The History and Future of Workplace Automation\" (2015) 29(3) Journal of Economic Perspectives 3.\nBerlinski, David (2000). The Advent of the Algorithm (https://archive.org/details/adventofalgorith 0000berl). Harcourt Books. ISBN 978-0-1560-1391-8. OCLC 46890682 (https://search.world cat.org/oclc/46890682). Archived (https://web.archive.org/web/20200726215744/https://arch ive.org/details/adventofalgorith0000berl) from the original on 26 July 2020. Retrieved 22 August 2020.", + "page_start": 66, + "page_end": 66, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Finance\nFinance is one of the fastest growing sectors where applied AI tools are being deployed: from retail online banking to investment advice and insurance, where automated \"robot advisers\" have been in use for some years. [161]\nWorld Pensions experts like Nicolas Firzli insist it may be too early to see the emergence of highly innovative AI-informed financial products and services: \"the deployment of AI tools will simply further automatise things: destroying tens of thousands of jobs in banking, financial planning, and pension advice in the process, but I'm not sure it will unleash a new wave of [e.g., sophisticated] pension innovation.\" [162]", + "page_start": 10, + "page_end": 10, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Further reading\nFrank, Michael (22 September 2023). \"US Leadership in Artificial Intelligence Can Shape the 21st Century Global Order\" (https://thediplomat.com/2023/09/us-leadership-in-artificial-intelli gence-can-shape-the-21st-century-global-order). The Diplomat . Archived (https://web.archiv e.org/web/20240916014433/https://thediplomat.com/2023/09/us-leadership-in-artificial-intelli gence-can-shape-the-21st-century-global-order/) from the original on 16 September 2024. Retrieved 8 December 2023. \"Instead, the United States has developed a new area of dominance that the rest of the world views with a mixture of awe, envy, and resentment: artificial intelligence... From AI models and research to cloud computing and venture capital, U.S. companies, universities, and research labs - and their affiliates in allied countries appear to have an enormous lead in both developing cutting-edge AI and commercializing it. The value of U.S. venture capital investments in AI start-ups exceeds that of the rest of the world combined.\"\nGertner, Jon. (2023) \"Wikipedia's Moment of Truth: Can the online encyclopedia help teach A.I. chatbots to get their facts right - without destroying itself in the process?\" New York Times Magazine (July 18, 2023) online (https://www.nytimes.com/2023/07/18/magazine/wikipediaai-chatgpt.html) Archived (https://web.archive.org/web/20230720125400/https://www.nytime s.com/2023/07/18/magazine/wikipedia-ai-chatgpt.html) 20 July 2023 at the Wayback Machine", + "page_start": 66, + "page_end": 66, + "source_file": "wikipedia3.pdf" + }, + { + "text": "EDITOR'S PICKS\nHave your say! Complete our 2025 Media Survey\nRetrain your way to a new job\nThe top AI-powered tech trends in 2025\nNews Canada and L'édition Nouvelles are either registered trademarks or trademarks of News Canada Inc. All rights reserved.\nEN", + "page_start": 1, + "page_end": 1, + "source_file": "news4.pdf" + }, + { + "text": "Further reading\nHalpern, Sue, \"The Coming Tech Autocracy\" (review of Verity Harding, AI Needs You: How We Can Change AI's Future and Save Our Own , Princeton University Press, 274 pp.; Gary Marcus, Taming Silicon Valley: How We Can Ensure That AI Works for Us , MIT Press, 235 pp.; Daniela Rus and Gregory Mone, The Mind's Mirror: Risk and Reward in the Age of AI , Norton, 280 pp.; Madhumita Murgia, Code Dependent: Living in the Shadow of AI , Henry Holt, 311 pp.), The New York Review of Books , vol. LXXI, no. 17 (7 November 2024), pp. 44-46. \"'We can't realistically expect that those who hope to get rich from AI are going to have the interests of the rest of us close at heart,' ... writes [Gary Marcus]. 'We can't count on governments driven by campaign finance contributions [from tech companies] to push back.'... Marcus details the demands that citizens should make of their governments and the tech companies. They include transparency on how AI systems work; compensation for individuals if their data [are] used to train LLMs (large language model)s and the right to consent to this use; and the ability to hold tech companies liable for the harms they cause by eliminating Section 230, imposing cash penalties, and passing stricter product liability laws... Marcus also suggests... that a new, AI-specific federal agency, akin to the FDA, the FCC, or the FTC, might provide the most robust oversight.... [T]he Fordham law professor Chinmayi Sharma... suggests... establish[ing] a professional licensing regime for engineers that would function in a similar way to medical licenses, malpractice suits, and the Hippocratic oath in medicine. 'What if, like doctors,' she asks..., 'AI engineers also vowed to do no harm?'\" (p. 46.)", + "page_start": 67, + "page_end": 67, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Always in Motion\nWe would love to look back at 2004 forever, given that it was our company's best year ever. But our work is only beginning. New history is still to be made; records are waiting to be broken; and we must vigilantly maintain our momentum. As stewards of your company, our goals are to continue to perform at peak levels and manage our growth initiatives to ensure maximum value for our shareholders. I hope to report on new defining moments in next year's Annual Report.\nJAMES J. MURREN President, Chief Financial Officer & Treasurer\nS T O C K P R I C E H I S T O R Y ( 2 0 0 2 - 2 0 0 4 )\n17\n18", + "page_start": 26, + "page_end": 27, + "source_file": "NYSE_MGM_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "news4.pdf", + "query": "I want to help my parents who are in residential care, are there any trendy AI-related devices I could help them with? ", + "target_page": 1, + "target_passage": "Wearable devices equipped with this technology can offer real-time health insights, helping individuals make informed decisions about their well-being", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Applications\nAI and machine learning technology is used in most of the essential applications of the 2020s, including: search engines (such as Google Search), targeting online advertisements, recommendation systems (offered by Netflix, YouTube or Amazon), driving internet traffic, targeted advertising (AdSense, Facebook), virtual assistants (such as Siri or Alexa), autonomous vehicles (including drones, ADAS and self-driving cars), automatic language translation (Microsoft Translator, Google Translate), facial recognition (Apple's Face ID or Microsoft's DeepFace and Google's FaceNet) and image labeling (used by Facebook, Apple's iPhoto and TikTok). The deployment of AI may be overseen by a Chief automation officer (CAO).", + "page_start": 8, + "page_end": 8, + "source_file": "wikipedia3.pdf" + }, + { + "text": "EDITOR'S PICKS\nEN\nHave your say! Complete our 2025 Media Survey\nRetrain your way to a new job\nThe top AI-powered tech trends in 2025", + "page_start": 0, + "page_end": 0, + "source_file": "news2.pdf" + }, + { + "text": "Smart home automation\nSmart home automation has been around for a while, but AI is taking it to the next level. Imagine a home that not only follows your commands, but also anticipates your needs. Enhanced smart home systems can learn your daily routines and adjust settings accordingly, from lighting and temperature to security and entertainment, making your home smarter and more responsive than ever before.", + "page_start": 0, + "page_end": 0, + "source_file": "news4.pdf" + }, + { + "text": "Other sources\nBuiten, Miriam C (2019). \"Towards Intelligent Regulation of Artificial Intelligence\" (https://doi.org/ 10.1017%2Ferr.2019.8). European Journal of Risk Regulation . 10 (1): 41-59. doi:10.1017/err.2019.8 (https://doi.org/10.1017%2Ferr.2019.8). ISSN 1867-299X (https://sea rch.worldcat.org/issn/1867-299X).\nBushwick, Sophie (16 March 2023), \"What the New GPT-4 AI Can Do\" (https://www.scientificam erican.com/article/what-the-new-gpt-4-ai-can-do/), Scientific American , archived (https://we b.archive.org/web/20230822233655/https://www.scientificamerican.com/article/what-the-ne w-gpt-4-ai-can-do/) from the original on 22 August 2023, retrieved 5 October 2024\nButler, Samuel (13 June 1863). \"Darwin among the Machines\" (https://nzetc.victoria.ac.nz/tm/sc holarly/tei-ButFir-t1-g1-t1-g1-t4-body.html). Letters to the Editor. The Press . Christchurch, New Zealand. Archived (https://web.archive.org/web/20080919172551/http://www.nzetc.org/ tm/scholarly/tei-ButFir-t1-g1-t1-g1-t4-body.html) from the original on 19 September 2008. Retrieved 16 October 2014 - via Victoria University of Wellington.\nButtazzo, G. (July 2001). \"Artificial consciousness: Utopia or real possibility?\". Computer . 34 (7): 24-30. doi:10.1109/2.933500 (https://doi.org/10.1109%2F2.933500).", + "page_start": 53, + "page_end": 53, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Further reading\nVaswani, Ashish, Noam Shazeer, Niki Parmar et al. \"Attention is all you need.\" Advances in neural information processing systems 30 (2017). Seminal paper on transformers.\nVincent, James, \"Horny Robot Baby Voice: James Vincent on AI chatbots\", London Review of Books , vol. 46, no. 19 (10 October 2024), pp. 29-32. \"[AI chatbot] programs are made possible by new technologies but rely on the timelelss human tendency to anthropomorphise.\" (p. 29.)\nWhite Paper: On Artificial Intelligence - A European approach to excellence and trust (https://e c.europa.eu/info/sites/info/files/commission-white-paper-artificial-intelligence-feb2020_en.pd f) (PDF). Brussels: European Commission. 2020. Archived (https://web.archive.org/web/202 00220173419/https://ec.europa.eu/info/sites/info/files/commission-white-paper-artificial-intell igence-feb2020_en.pdf) (PDF) from the original on 20 February 2020. Retrieved 20 February 2020.", + "page_start": 69, + "page_end": 69, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Further reading\nHalpern, Sue, \"The Coming Tech Autocracy\" (review of Verity Harding, AI Needs You: How We Can Change AI's Future and Save Our Own , Princeton University Press, 274 pp.; Gary Marcus, Taming Silicon Valley: How We Can Ensure That AI Works for Us , MIT Press, 235 pp.; Daniela Rus and Gregory Mone, The Mind's Mirror: Risk and Reward in the Age of AI , Norton, 280 pp.; Madhumita Murgia, Code Dependent: Living in the Shadow of AI , Henry Holt, 311 pp.), The New York Review of Books , vol. LXXI, no. 17 (7 November 2024), pp. 44-46. \"'We can't realistically expect that those who hope to get rich from AI are going to have the interests of the rest of us close at heart,' ... writes [Gary Marcus]. 'We can't count on governments driven by campaign finance contributions [from tech companies] to push back.'... Marcus details the demands that citizens should make of their governments and the tech companies. They include transparency on how AI systems work; compensation for individuals if their data [are] used to train LLMs (large language model)s and the right to consent to this use; and the ability to hold tech companies liable for the harms they cause by eliminating Section 230, imposing cash penalties, and passing stricter product liability laws... Marcus also suggests... that a new, AI-specific federal agency, akin to the FDA, the FCC, or the FTC, might provide the most robust oversight.... [T]he Fordham law professor Chinmayi Sharma... suggests... establish[ing] a professional licensing regime for engineers that would function in a similar way to medical licenses, malpractice suits, and the Hippocratic oath in medicine. 'What if, like doctors,' she asks..., 'AI engineers also vowed to do no harm?'\" (p. 46.)", + "page_start": 67, + "page_end": 67, + "source_file": "wikipedia3.pdf" + }, + { + "text": "AI-powered computing\nAI-powered computing, such as Intel-powered laptops - or AI PC - is at the forefront of technological advancement. But what, exactly, is an AI PC? They're computers that have AI built into their processors - also known as the brain of the computer - which optimizes performance, enhances security and provides a more personalized experience as they learn from your usage patterns. For consumers, this means faster, smarter and more secure computing tailored to your individual needs.", + "page_start": 0, + "page_end": 0, + "source_file": "news4.pdf" + }, + { + "text": "Other sources\nMoravec, Hans (1988). Mind Children (https://archive.org/details/mindchildrenfutu00mora). Harvard University Press. ISBN 978-0-6745-7616-2. Archived (https://web.archive.org/web/2 0200726131644/https://archive.org/details/mindchildrenfutu00mora) from the original on 26 July 2020. Retrieved 18 November 2019.\nMorgenstern, Michael (9 May 2015). \"Automation and anxiety\" (https://www.economist.com/new s/special-report/21700758-will-smarter-machines-cause-mass-unemployment-automation-a nd-anxiety). The Economist . Archived (https://web.archive.org/web/20180112214621/https:// www.economist.com/news/special-report/21700758-will-smarter-machines-cause-mass-une mployment-automation-and-anxiety) from the original on 12 January 2018. Retrieved 13 January 2018.\nMüller, Vincent C.; Bostrom, Nick (2014). \"Future Progress in Artificial Intelligence: A Poll Among Experts\" (http://www.sophia.de/pdf/2014_PT-AI_polls.pdf) (PDF). AI Matters . 1 (1): 9-11. doi:10.1145/2639475.2639478 (https://doi.org/10.1145%2F2639475.2639478). S2CID 8510016 (https://api.semanticscholar.org/CorpusID:8510016). Archived (https://web. archive.org/web/20160115114604/http://www.sophia.de/pdf/2014_PT-AI_polls.pdf) (PDF) from the original on 15 January 2016.", + "page_start": 60, + "page_end": 60, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Further reading\nMitchell, Melanie (2019). Artificial intelligence: a guide for thinking humans . New York: Farrar, Straus and Giroux. ISBN 978-0-3742-5783-5.\nMnih, Volodymyr; Kavukcuoglu, Koray; Silver, David; et al. (26 February 2015). \"Human-level control through deep reinforcement learning\" (https://www.nature.com/articles/nature14236). Nature . 518 (7540): 529-533. Bibcode:2015Natur.518..529M (https://ui.adsabs.harvard.edu/ abs/2015Natur.518..529M). doi:10.1038/nature14236 (https://doi.org/10.1038%2Fnature142 36). PMID 25719670 (https://pubmed.ncbi.nlm.nih.gov/25719670). S2CID 205242740 (http s://api.semanticscholar.org/CorpusID:205242740). Archived (https://web.archive.org/web/20 230619055525/https://www.nature.com/articles/nature14236) from the original on 19 June 2023. Retrieved 19 June 2023. Introduced DQN, which produced human-level performance on some Atari games.\nPress, Eyal, \"In Front of Their Faces: Does facial-recognition technology lead police to ignore contradictory evidence?\", The New Yorker , 20 November 2023, pp. 20-26.\n\"Robots could demand legal rights\" (http://news.bbc.co.uk/2/hi/technology/6200005.stm). BBC News . 21 December 2006. Archived (https://web.archive.org/web/20191015042628/http://ne ws.bbc.co.uk/2/hi/technology/6200005.stm) from the original on 15 October 2019. Retrieved 3 February 2011.", + "page_start": 68, + "page_end": 68, + "source_file": "wikipedia3.pdf" + }, + { + "text": "References\n1. Russell & Norvig (2021), pp. 1-4.\n2. AI set to exceed human brain power (http://www.cnn.com/2006/TECH/science/07/24/ai.bostr om/) Archived (https://web.archive.org/web/20080219001624/http://www.cnn.com/2006/TEC H/science/07/24/ai.bostrom/) 2008-02-19 at the Wayback Machine CNN.com (July 26, 2006)\n3. Kaplan, Andreas; Haenlein, Michael (2019). \"Siri, Siri, in my hand: Who's the fairest in the land? On the interpretations, illustrations, and implications of artificial intelligence\". Business Horizons . 62 : 15-25. doi:10.1016/j.bushor.2018.08.004 (https://doi.org/10.1016%2Fj.bushor. 2018.08.004). ISSN 0007-6813 (https://search.worldcat.org/issn/0007-6813). S2CID 158433736 (https://api.semanticscholar.org/CorpusID:158433736).\n4. Artificial general intelligence: Russell & Norvig (2021, pp. 32-33, 1020-1021) Proposal for the modern version: Pennachin & Goertzel (2007) Warnings of overspecialization in AI from leading researchers: Nilsson (1995), McCarthy (2007), Beal & Winston (2009)\n5. Russell & Norvig (2021, §1.2).\n6. Dartmouth workshop: Russell & Norvig (2021, p. 18), McCorduck (2004, pp. 111-136), NRC (1999, pp. 200-201) The proposal: McCarthy et al. (1955)\n7. Successful programs of the 1960s: McCorduck (2004, pp. 243-252), Crevier (1993, pp. 52107), Moravec (1988, p. 9), Russell & Norvig (2021, pp. 19-21)", + "page_start": 30, + "page_end": 30, + "source_file": "wikipedia3.pdf" + } + ] + }, + { + "references": { + "source_file": "news4.pdf", + "query": "Is the topic of finance trending among AI topics for 2015 in Canada?", + "target_page": 1, + "target_passage": "Financial services", + "chunk_present": { + "presence": true, + "index": 5 + } + }, + "top_chunk": [ + { + "text": "Finance\nFinance is one of the fastest growing sectors where applied AI tools are being deployed: from retail online banking to investment advice and insurance, where automated \"robot advisers\" have been in use for some years. [161]\nWorld Pensions experts like Nicolas Firzli insist it may be too early to see the emergence of highly innovative AI-informed financial products and services: \"the deployment of AI tools will simply further automatise things: destroying tens of thousands of jobs in banking, financial planning, and pension advice in the process, but I'm not sure it will unleash a new wave of [e.g., sophisticated] pension innovation.\" [162]", + "page_start": 10, + "page_end": 10, + "source_file": "wikipedia3.pdf" + }, + { + "text": "EDITOR'S PICKS\nHave your say! Complete our 2025 Media Survey\nRetrain your way to a new job\nThe top AI-powered tech trends in 2025\nNews Canada and L'édition Nouvelles are either registered trademarks or trademarks of News Canada Inc. All rights reserved.\nEN", + "page_start": 1, + "page_end": 1, + "source_file": "news4.pdf" + }, + { + "text": "Artificial intelligence\nArtificial intelligence was founded as an academic discipline in 1956, [6] and the field went through multiple cycles of optimism throughout its history, [7][8] followed by periods of disappointment and loss of funding, known as AI winters. [9][10] Funding and interest vastly increased after 2012 when deep learning outperformed previous AI techniques. [11] This growth accelerated further after 2017 with the transformer architecture, [12] and by the early 2020s many billions of dollars were being invested in AI and the field experienced rapid ongoing progress in what has become known as the AI boom. The emergence of advanced generative AI in the midst of the AI boom and its ability to create and modify content exposed several unintended consequences and harms in the present and raised concerns about the risks of AI and its long-term effects in the future, prompting discussions about regulatory policies to ensure the safety and benefits of the technology.", + "page_start": 0, + "page_end": 0, + "source_file": "wikipedia3.pdf" + }, + { + "text": "EDITOR'S PICKS\nEN\nHave your say! Complete our 2025 Media Survey\nRetrain your way to a new job\nThe top AI-powered tech trends in 2025", + "page_start": 0, + "page_end": 0, + "source_file": "news2.pdf" + }, + { + "text": "Other sources\nLenat, Douglas; Guha, R. V. (1989). Building Large Knowledge-Based Systems . AddisonWesley. ISBN 978-0-2015-1752-1.\nLighthill, James (1973). \"Artificial Intelligence: A General Survey\". Artificial Intelligence: a paper symposium . Science Research Council.\nLipartito, Kenneth (6 January 2011), The Narrative and the Algorithm: Genres of Credit Reporting from the Nineteenth Century to Today (https://mpra.ub.uni-muenchen.de/28142/1/ MPRA_paper_28142.pdf) (PDF) (Unpublished manuscript), doi:10.2139/ssrn.1736283 (http s://doi.org/10.2139%2Fssrn.1736283), S2CID 166742927 (https://api.semanticscholar.org/C orpusID:166742927), archived (https://ghostarchive.org/archive/20221009/https://mpra.ub.u ni-muenchen.de/28142/1/MPRA_paper_28142.pdf) (PDF) from the original on 9 October 2022\nLohr, Steve (2017). \"Robots Will Take Jobs, but Not as Fast as Some Fear, New Report Says\" (https://www.nytimes.com/2017/01/12/technology/robots-will-take-jobs-but-not-as-fast-as-so me-fear-new-report-says.html). The New York Times . Archived (https://web.archive.org/web/ 20180114073704/https://www.nytimes.com/2017/01/12/technology/robots-will-take-jobs-butnot-as-fast-as-some-fear-new-report-says.html) from the original on 14 January 2018. Retrieved 13 January 2018.", + "page_start": 59, + "page_end": 59, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Financial services\nAI is also making waves in the financial sector, offering smarter and more secure ways to manage money. From AI-driven investment platforms that provide personalized financial advice to fraud detection systems that protect against cyber threats, AI can analyze vast amounts of data to identify trends and make more informed financial decisions.", + "page_start": 0, + "page_end": 0, + "source_file": "news4.pdf" + }, + { + "text": "(5) Net Assets\nNet assets with donor restrictions at June 30, 2024 and 2023 are available for the following purposes:\nRestricted to future periods:, 2024 = $ 50,000. Restricted to future periods:, 2023 = 100,000. Restricted by purpose:, 2024 = . Restricted by purpose:, 2023 = . Abstract Wikipedia, 2024 = 861,008. Abstract Wikipedia, 2023 = 1,249,004. Artificial intelligence, 2024 = 239,878. Artificial intelligence, 2023 = -. Endowment support, 2024 = -. Endowment support, 2023 = 1,297,620. Future Audiences, 2024 = 500,000. Future Audiences, 2023 = -. Knowledge equity, 2024 = 965,910. Knowledge equity, 2023 = 2,228,134. Machine learning, 2024 = 24,528. Machine learning, 2023 = 860,620. Media Wiki, 2024 = 1,500,000. Media Wiki, 2023 = -. Other, 2024 = 125,000. Other, 2023 = 147,295. Restricted to future periods and by purpose:, 2024 = . Restricted to future periods and by purpose:, 2023 = . Artificial intelligence, 2024 = 1,430,000. Artificial intelligence, 2023 = -. Net assets with donor restrictions, 2024 = $ 5,696,324. Net assets with donor restrictions, 2023 = 5,782,673", + "page_start": 15, + "page_end": 15, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "Other sources\nCNA (12 January 2019). \"Commentary: Bad news. Artificial intelligence is biased\" (https://www.c hannelnewsasia.com/news/commentary/artificial-intelligence-big-data-bias-hiring-loans-keychallenge-11097374). CNA . Archived (https://web.archive.org/web/20190112104421/https:// www.channelnewsasia.com/news/commentary/artificial-intelligence-big-data-bias-hiring-loan s-key-challenge-11097374) from the original on 12 January 2019. Retrieved 19 June 2020.\nCybenko, G. (1988). Continuous valued neural networks with two hidden layers are sufficient (Report). Department of Computer Science, Tufts University.\nDeng, L.; Yu, D. (2014). \"Deep Learning: Methods and Applications\" (http://research.microsoft.c om/pubs/209355/DeepLearning-NowPublishing-Vol7-SIG-039.pdf) (PDF). Foundations and Trends in Signal Processing . 7 (3-4): 197-387. doi:10.1561/2000000039 (https://doi.org/10. 1561%2F2000000039). Archived (https://web.archive.org/web/20160314152112/http://resea rch.microsoft.com/pubs/209355/DeepLearning-NowPublishing-Vol7-SIG-039.pdf) (PDF) from the original on 14 March 2016. Retrieved 18 October 2014.\nDennett, Daniel (1991). Consciousness Explained . The Penguin Press. ISBN 978-0-7139-90379.", + "page_start": 54, + "page_end": 54, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Other sources\n\"Ask the AI experts: What's driving today's progress in AI?\" (https://www.mckinsey.com/business -functions/mckinsey-analytics/our-insights/ask-the-ai-experts-whats-driving-todays-progressin-ai). McKinsey & Company . Archived (https://web.archive.org/web/20180413190018/http s://www.mckinsey.com/business-functions/mckinsey-analytics/our-insights/ask-the-ai-expert s-whats-driving-todays-progress-in-ai) from the original on 13 April 2018. Retrieved 13 April 2018.\nBarfield, Woodrow; Pagallo, Ugo (2018). Research handbook on the law of artificial intelligence . Cheltenham, UK: Edward Elgar Publishing. ISBN 978-1-7864-3904-8. OCLC 1039480085 (https://search.worldcat.org/oclc/1039480085).\nBeal, J.; Winston, Patrick (2009), \"The New Frontier of Human-Level Artificial Intelligence\", IEEE Intelligent Systems , vol. 24, pp. 21-24, doi:10.1109/MIS.2009.75 (https://doi.org/10.11 09%2FMIS.2009.75), hdl:1721.1/52357 (https://hdl.handle.net/1721.1%2F52357), S2CID 32437713 (https://api.semanticscholar.org/CorpusID:32437713)", + "page_start": 52, + "page_end": 52, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Other sources\nFrey, Carl Benedikt; Osborne, Michael A (1 January 2017). \"The future of employment: How susceptible are jobs to computerisation?\". Technological Forecasting and Social Change . 114 : 254-280. CiteSeerX 10.1.1.395.416 (https://citeseerx.ist.psu.edu/viewdoc/summary?d oi=10.1.1.395.416). doi:10.1016/j.techfore.2016.08.019 (https://doi.org/10.1016%2Fj.techfor e.2016.08.019). ISSN 0040-1625 (https://search.worldcat.org/issn/0040-1625).\n\"From not working to neural networking\" (https://www.economist.com/news/special-report/2170 0756-artificial-intelligence-boom-based-old-idea-modern-twist-not). The Economist . 2016. Archived (https://web.archive.org/web/20161231203934/https://www.economist.com/news/s pecial-report/21700756-artificial-intelligence-boom-based-old-idea-modern-twist-not) from the original on 31 December 2016. Retrieved 26 April 2018.\nGalvan, Jill (1 January 1997). \"Entering the Posthuman Collective in Philip K. Dick's \"Do Androids Dream of Electric Sheep?\" \". Science Fiction Studies . 24 (3): 413-429. JSTOR 4240644 (https://www.jstor.org/stable/4240644).\nGeist, Edward Moore (9 August 2015). \"Is artificial intelligence really an existential threat to humanity?\" (http://thebulletin.org/artificial-intelligence-really-existential-threat-humanity857 7). Bulletin of the Atomic Scientists . Archived (https://web.archive.org/web/2015103005433 0/http://thebulletin.org/artificial-intelligence-really-existential-threat-humanity8577) from the original on 30 October 2015. Retrieved 30 October 2015.", + "page_start": 55, + "page_end": 55, + "source_file": "wikipedia3.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_CHK_2010.pdf", + "query": "Is there any chance that my cousin has been granted financial aid from Chesapeak Energy? He's studying at a college in Oklahoma.", + "target_page": 26, + "target_passage": "hat’s why we gave $1.0 million to establish the Chesapeake Energy dormitory for students at the Oklahoma School for Science and Mathematics (OSSM", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Educational Impact\nWe are also proud to help prepare tomorrow's leaders today. In 2010 Chesapeake supported universities, schools, academic chairs, scholarships and other educational programs with contributions totaling $5.4 million.\nInvesting in programs that promote technology and innovation is a key to our country's success. That's why we gave $1.0 million to establish the Chesapeake Energy dormitory for students at the Oklahoma School for Science and Mathematics (OSSM), a public, tuition-free, residential high school located in Oklahoma City for juniors and seniors with exceptional abilities. The extremely competitive school is helping train the next generation of scientists and mathematicians.\nWe also established the Chesapeake Energy Presidential Scholars Program at the Oklahoma City University Meinders School of Business, making a $5.0 million commitment to be distributed over the next five years. The Chesapeake Scholars Program will provide up to $25,000 per year in tuition\nto selected students pursuing careers in finance, economics, accounting, marketing, business administration, computer science and information technology. In addition, scholars will take part in a Chesapeake Presidential Leadership Course facilitated by faculty members in coordination with designated Chesapeake leadership coaches, including a Chesapeake senior vice president and OCU alumni.\nIn 2007 Chesapeake launched a scholarship program in Texas with an initial $1.25 million contribution, challenging the cities of Fort Worth and Dallas to match its gift within a year. The cities responded and matched the gift, so Chesapeake in 2008 added another $1.25 million to the fund, bringing the total to $3.75 million. The Chesapeake Scholarship Fund currently funds the cost of higher education for 48 minority students. The fund provides each student $20,000 a year for up to four years at the school of their choice. To date more than $1.0 million has been distributed to deserving local students.\nTo help ensure the training of qualified geologists, engineers, landmen and energy lawyers in the next generation, we award scholarships to students pursuing energy-related degrees. We also help mentor them through Chesapeake's Peak Program. Junior- and senior-level scholarship recipients are paired with Chesapeake employee mentors who help develop students' knowledge and provide career advice. There are currently 25 mentors and 40 scholarship recipients participating in the Peak Program.", + "page_start": 25, + "page_end": 26, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "Dear Fellow Shareholders,\nOur second capital priority for the year was to conclude the appraisal of the Woodford formation in our Logan County, Oklahoma assets. We viewed this relatively modest, but higher risk, investment as having a 25% chance of success with a 15x upside. Unfortunately, we met with mixed success in our appraisal activities proving that in today's onshore US oil and gas industry that the best absolute returns are generated by drilling in proved regions. There are plenty of solid opportunities to efficiently grow the business without exposure to undue geologic risk.\nLike many prior bubbles driven by new technologies, the second half of the year saw the pricing environment come crashing down around us. The market became fundamentally unbalanced, driving prices down almost 50% and rendering material portions of global oil and gas development uneconomic.\nOur peers went from talking about their growth prospects to fretting about cash costs and liquidity, a stark contrast from the go-go growth times which existed in the first half of the year. This shift in industry strategy has now come in line with our general business philosophy-in the resource space, low-cost, low debt businesses will survive and thrive across cycles; and, relative to our US onshore peer group, Sundance boasts a top 15% cost structure and balance sheet.\nOur position as a cost and balance sheet leader is underpinned by two key philosophies: 1) investment in a leading technical team that is encouraged to take reasonable risks to improve recoveries and/or reduce costs, and 2) a ruthless focus on portfolio returns as demonstrated by our consistent track record of divesting assets that don't fit our strategic objectives or promise lower forward return profiles.\nOur high quality Eagle Ford acreage produces strong recoveries at reasonable costs and thus generates good returns, even in a low price environment. Because of these characteristics, the majority of our forward capital is expected to be invested generating strong growth and shareholder returns in the Eagle Ford.\nWith mixed appraisal results in the Woodford, Sundance's Mississippian/Woodford position generally requires higher prices to meet our hurdle rates. Because of the mixed Woodford results, higher overall unit costs, and depressed pricing at year end, we recognized an impairment charge of ~$60 million on these assets at year 2014. Had prices maintained their strength, we likely would have been in a position to recover our investment from these assets.", + "page_start": 5, + "page_end": 5, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "Chesapeake's $25 million of charitable giving in 2010\nCommunity Development\nEducation\nHealth and Medical\nSocial Services\nequates to one-third of the goods that otherwise would have been destined for Oklahoma City-area landfills. In West Virginia, we helped fund construction of the Morgantown Market\nEquipping the next generation - West Virginia students hold their new laptops from Chesapeake as part of the company's Discovering Tomorrow's Leaders program.\nPlace, a permanent site for the city's farmers' market, creating more business opportunities for local farmers.\nChesapeake also supports local chambers of commerce and city councils in all of its operating areas. In the Haynesville Shale last year, we awarded grants to the Shelby County, Sabine Parish and Coushatta-Red River chambers of commerce to help fund tourism, business communications and chamber events. In Texas, we assisted more than 250 civic, professional and community service organizations throughout Johnson, Tarrant and western Dallas counties, and sponsored memberships in 35 local Texas chambers of commerce. By helping local chambers and businesses grow and thrive, we are creating stronger economies.\nWe also hire locally whenever possible to help stimulate the local economy, and we provide training when the local work force isn't yet qualified for the jobs we have open. For example, when Chesapeake began operating in the Marcellus Shale of West Virginia and Pennsylvania, finding experienced rig workers was a challenge. To meet that need, Chesapeake's wholly owned subsidiary, Nomac Drilling, built the 40,000-square-foot Eastern Training Center and Housing Facility in Bradford County, near Sayre, Pennsylvania. The campus opened in 2010 and serves as a housing facility and training ground for 266 workers at a time. Nomac and Chesapeake host regular job fairs in the region and the lines of interested candidates often extend out the door.", + "page_start": 25, + "page_end": 25, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "Junior Credit Facility\nIn August 2013, Sundance Energy, Inc. ('Sundance Energy'), a wholly owned subsidiary of the Company, entered into a second lien credit agreement with Wells Fargo Energy Capital, Inc., as the administrative agent (the 'Junior Credit Facility'), which provides for term loans to be made in a series of draws up to $100 million. The Junior Credit Facility matures in June 2018 and is secured by a second priority lien on substantially all of the Company's assets. Upon entering into the Junior Credit Facility, the Company immediately borrowed $15 million pursuant to the terms of the Junior Credit Facility and paid down the outstanding principal of the Senior Credit Facility. In May 2014, the Company's borrowing capacity increased to $35 million. As at 31 December 2014, the borrowing capacity under the Junior Credit Facility remains at $35 million.\n- 86 -", + "page_start": 87, + "page_end": 87, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "Scholarships at major universities\nSumitomo Mitsui Banking Corporation (China) Limited Sumitomo Mitsui Banking Corporation (China) Limited established a scholarship program for students of Zhejiang established a scholarship program for students of Zhejiang\nUniversity, Shanghai Inter University, Shanghai International Studies University, national Studies University, Sun Yat-sen University, Sun Yat-sen University, and other universities. and other universities.\nScholarship students at Sun Yat-sen University", + "page_start": 14, + "page_end": 14, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "ts . ess\nen\nd\ns an d divestm evelopm en t an stay-in-busin ditur e . eportin g peri on over th e sam tag e . ose qu an ed . I t m es or a gr oup\ne\nDevelopm\ne\nu\nd\n, r\nod\nes\ntiti\nay\npetr\nf\nad diti on s n et o f acquisiti on en t in clu d s all d fix ed asset e xpen ditur e n et o an d corpor ate capital e xpen eserv eplacement r a tio Reserves ad d ed d urin g th e r ed by th e pr od cti eported as a per cen ce potential ce poten ti al r efers to th oleum yet to be discover efer to sin gle opportuniti opportuniti es . ag e equity .\ne n\nf\nr\nf\no\nds o f th e elem en ts a m e given to eir liqui d state . ecover able r divi peri r o r o RO\ne\ng\nf\nesour\nResour\nd or gas compoun d carbon. al gas . oleum gas , th d butan e in th els . ce potential th e r a n\noil\nE\nC\nA\nRO\n.\nels\ne\nch ar\nes 9 , on . en t h y dr ocarbons Soli d , liqui h y d r og en an LNG Liquefi ed n LPG Liquefi ed petr pr opan e an mb bls Th ousan d barr mean r esour Th e aver ag e o r esour ces . mmb bls Milli on barr\nf\ncti\nu\ns whi\nocarbon\nr\nd\ny\nh\nf\nes o\ntiti\nan\nose qu\nTh\natur", + "page_start": 94, + "page_end": 94, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "Recent Events and a Better Way Forward\nYou may be aware that I have been outspoken in attempting to persuade our country's political leadership to recognize that the discovery of vast resources of unconventional natural gas and oil in the U.S. is a complete game changer for our country from an economic, national security and environmental perspective. After two years of my best efforts and the efforts of many others in the industry, most notably T. Boone Pickens,\n2010 ANNUAL REPORT |\n13\nDeveloping great assets begins with great people, such as the hardworking crews of Nomac, Chesapeake's wholly owned drilling subsidiary. Employees take pride in the critical roles they play in finding and delivering natural gas to their fellow Americans.\nRig lights come on at twilight in the Permian Basin of Texas, where crews drill around the clock in the liquids-rich Bone Spring play. This is the newest in a series of energy booms that has enabled West Texas cities like Midland to prosper for almost 100 years.\nI am pleased to report that we have apparently finally convinced President Barack Obama and Congressional leadership to recognize that the energy path America is on today is completely unsustainable. There appears to be growing recognition that it is spectacularly dangerous for America to continue importing 9 million barrels of oil per day and exporting\nmore than $1 billion per day in national wealth to oil exporting countries.\nAmerica's undiminished appetite for foreign oil has created the largest wealth transfer in the history of the world. The political leadership in Washington, D.C., has not seemed overly concerned about this issue until recently. However, after President Obama's recent speech calling", + "page_start": 13, + "page_end": 15, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "as a whole. as a whole.\nAndo : I agree. We need industry, : I a g r e e . W e n e e d i n d u s t r y , government and academia to really talk government and academia to really talk to each other and take this seriously. If to each other and take this seriously. If they t hey just butt heads, that won j u s t b u t t h e a d s , t h a t w o n' t get us t g e t u s anywhere. anywhere.\nKunibe : I see the environmental business : I see the environmental business as a linchpin of our CSR program, which we as a linchpin of our CSR program, which we can promote through our core businesses. can promote through our core businesses. For example, SMBC has created a For example, SMBC has created a 'Growing Industrial Cluster Project 'Growing Industrial Cluster Project Team' to organize projects in the fields Team' to organize projects in the fields of water, resources, the environment and of water, resources, the environment and new energy sources, involving entities new energy sources, involving entities from different fields, not just working f rom different fields, not just working within one particular sector. We regard within one particular sector. We regard this process of engagement as forming a this process of engagement as forming a single undertaking and act accordingly. single undertaking and act accordingly. We believe this initiative can contribute We believe this initiative can contribute to the sustainable development of Asia to the sustainable development of Asia and the rest of the world. and the rest of the world.", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "Utility and Fuel Expense - Same Store\nFor the years ended December 31,\nnatural gas, 2013 = $4,565. natural gas, 2012 = $2,729. natural gas, % change = 67.3%. oil, 2013 = 1,523. oil, 2012 = 2,095. oil, % change = (27.3)%. electricity, 2013 = 5,197. electricity, 2012 = 4,671. electricity, % change = 11.3%. Water, 2013 = 3,582. Water, 2012 = 3,474. Water, % change = 3.1%. other, 2013 = 30. other, 2012 = 33. other, % change = (9.1)%. Total utility and fuel expenses, 2013 = $14,897. Total utility and fuel expenses, 2012 = $13,002. Total utility and fuel expenses, % change = 14.6%\nKillam's apartment properties are heated with a combination of natural gas (55%), electricity (36%), oil (8%) and other sources (1%).\nElectricity costs at the unit level are usually paid directly by tenants, reducing Killam's exposure to the majority of the 4,500 units heated with electricity. Fuel costs associated with natural gas or oil fired heating plants are paid by Killam. As such, the Company is exposed to fluctuations in natural gas and oil costs, which represent 40.9% of total same store utility and fuel costs in 2013. Killam invests in green initiatives at its properties to maximize efficiencies, including converting many of its Halifax properties to natural gas from oil over the last three years as natural gas infrastructure has been expanded in the city. The decision to convert was supported by the substantial price difference between the cost of natural gas and oil in recent years.\nAs noted in the table above, Killam's utility and fuel expenses increased 14.6% in 2013 compared to 2012. The increase was primarily attributable to higher natural gas, electricity costs and water costs.\nKillam's natural gas expenses increased by 67.3% in 2013 due to higher gas prices in Atlantic Canada and an increase in properties burning natural gas following conversions of certain Halifax heating plants from oil to gas in 2012 and 2013. The reduction in oil expense in the quarter and year-to-date reflects this reduction in oil exposure.", + "page_start": 37, + "page_end": 37, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "Say 'thank you'.\nIf you receive a reply from your tutor, it is good manners to acknowledge receipt of the response by sending a 'thank you' e- mail.\nBy following these tips, you are more likely to establish good relationships with your tutors, as well as to get the type of academic support that you need.\nRemember that asking for help is a sign of strength. And asking for help early on in your studies will increase your chances of success.\nDeveloped for Oxbridge Academy\nBasic English Language Skills", + "page_start": 35, + "page_end": 36, + "source_file": "basic-english-language-skills.PDF" + } + ] + }, + { + "references": { + "source_file": "NYSE_SMFG_2011.pdf", + "query": "Has the Sumitomo Mitsui Financial Group offered help to the elderly?", + "target_page": 6, + "target_passage": "Currently, the proportion of people aged 65 or over in Japan has reached 23.4%*. SMFG will help create frameworks enabling the elderly to enjoy a vibrant lifestyle with peace of mind, through support for life-cycleframeworks enabling the elderly to enjoy a vibrant lifestyle with peace of mind, through support for life-cycle planning and other measures. The SMFG Group aims to create systems and a corporate culture that foster a soundplanning and other measures. The SMFG Group aims to create systems and a corporate culture that foster a sound balance between work and care needs, given that many group employees will later need to nurse ailing relatives.balance between work and care needs, given that many group employees will later need to nurse ailing relatives", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Shrinking and aging population\nCurrently, the proportion of people aged 65 or over in Japan has reached 23.4%*. SMFG will help create Currently, the proportion of people aged 65 or over in Japan has reached 23.4%*. SMFG will help create frameworks enabling the elderly to enjoy a vibrant lifestyle with peace of mind, through support for life-cycle frameworks enabling the elderly to enjoy a vibrant lifestyle with peace of mind, through support for life-cycle planning and other measures. The SMFG Group aims to create systems and a corporate culture that foster a sound planning and other measures. The SMFG Group aims to create systems and a corporate culture that foster a sound balance between work and care needs, given that many group employees will later need to nurse ailing relatives. balance between work and care needs, given that many group employees will later need to nurse ailing relatives.\n*Estimates by the Statistics Bureau, Ministry of Internal Affairs and Communications (October 1, 2011)", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "Koichi Miyata\nPresident Sumitomo Mitsui Financial Group, Inc.\nThe SMFG Group has 62,000 employees, The SMFG Group has 62,000 employees, 'stepping up to the plate and working hard 'stepping up to the plate and working hard to give something back to society.' I think it to give something back to society.' I think it is important to develop ways of making this is important to develop ways of making this a shared aspiration of all the employees of a shared aspiration of all the employees of\nthe Group. the Group.\n05\nCSR REPORT 2011\nCSR REPORT 2011\n06", + "page_start": 2, + "page_end": 3, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "About this Report\nPeriod Covered\nPublication Date of Japanese Document\nContact\n: April 1, 2010 to March 31, 2011 ( 'Fiscal 2010' )\n: December 2011\n:\nNote: Certain items in this report refer to activities taking place after April 2011.\nGroup CSR Department, Sumitomo Mitsui Financial Group, Inc. 1-2 Marunouchi 1-chome, Chiyoda-ku, Tokyo 100-0005 TEL: +81-3-3282-8111", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "What can we do now to spur the reconstruction and revitalization of Japan, and help resolve global issues?\nUplifting the nation's spirits Uplifting the nation's spirits\nJapan is now facing a wide variety of problems, ranging from the reconstruction of the Tohoku region (the northeastern region of Japan) Japan is now facing a wide variety of problems, ranging from the reconstruction of the Tohoku region (the northeastern region of Japan) after the March 11 earthquake and tsunami ('the Great East Japan Earthquake') to a shrinking and aging population, with falling birth rates after the March 11 earthquake and tsunami ('the Great East Japan Earthquake') to a shrinking and aging population, with falling birth rates and increasing numbers of the aged. and increasing numbers of the aged.\nWe must now find ways for people to coexist in harmony with nature, based on a global perspective. We must now find ways for people to coexist in harmony with nature, based on a global perspective.\nSumitomo Mitsui Financial Group (SMFG) invited the world-famous architect Tadao Ando to join in a conversation on the issues facing society Sumitomo Mitsui Financial Group (SMFG) invited the world-famous architect Tadao Ando to join in a conversation on the issues facing society and the ways in which SMFG and its Group companies can bring their expertise to bear as a financial services group. and the ways in which SMFG and its Group companies can bring their expertise to bear as a financial services group.", + "page_start": 2, + "page_end": 2, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "www.smfg.co.jp/english\nSumitomo Mitsui Financial Group CSR Report\nDigest version", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "Donations to charity groups\nEmployees of Sumitomo Mitsui Banking Corporation Europe Employees of Sumitomo Mitsui Banking Corporation Europe (SMBCE) conducted volunteer activities in their time off. (SMBCE) conducted volunteer activities in their time off. SMBCE contributes to charitable organizations through an SMBCE contributes to charitable organizations through an in-house fund and also uses a matching gifts program under in-house fund and also uses a matching gifts program under\nwhich it donates a which it donates a certain amount for certain amount for every donation made every donation made by its employees. by its employees.\nEmployee volunteers who participated in landscape improvement projects\nEurope", + "page_start": 14, + "page_end": 14, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "Scholarships at major universities\nSumitomo Mitsui Banking Corporation (China) Limited Sumitomo Mitsui Banking Corporation (China) Limited established a scholarship program for students of Zhejiang established a scholarship program for students of Zhejiang\nUniversity, Shanghai Inter University, Shanghai International Studies University, national Studies University, Sun Yat-sen University, Sun Yat-sen University, and other universities. and other universities.\nScholarship students at Sun Yat-sen University", + "page_start": 14, + "page_end": 14, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "Further measures needed\n● Share expertise in corporate social responsibility Share expertise in corporate social responsibility with the international community with the international community\n● Improve financial services in preparation for the Improve financial services in preparation for the globalization of operations in Japan (multilingual globalization of operations in Japan (multilingual support) support)\n● Promote diversity Promote diversity\nCSR REPORT 2011\n10\nIn the past, the Sumitomo Group In the past, the Sumitomo Group programs to solve the problem of programs to solve the problem of mine, while the Mitsui Group set up mine, while the Mitsui Group set up give the poorest in society access to give the poorest in society access to corporate social responsibility corporate social responsibility philosophies of both the Sumitomo philosophies of both the Sumitomo years of their existence, we will years of their existence, we will problems facing the international problems facing the international service service operations.operations.\nundertook large-scale afforestation undertook large-scale afforestation pollution around the Besshi copper pollution around the Besshi copper the Mitsui Memorial Hospital to the Mitsui Memorial Hospital to basic medical care. Based on this basic medical care. Based on this DNA embedded in the business DNA embedded in the business and Mitsui groups over the 400 and Mitsui groups over the 400 continue to play our part in solving continue to play our part in solving community through our financial community through our financial", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "Sumitomo Mitsui Finance & Leasing: Promoting recycling and reuse\nAs part of its core leasing operations, As part of its core leasing operations, Sumitomo Mitsui Finance & Leasing is Sumitomo Mitsui Finance & Leasing is helping reduce customers' environmental helping reduce customers' environmental\nRecycling and reuse of old equipment and machinery\nload through measures such as 'carbon load through measures such as 'carbon neutral leases' (with carbon credits allocated neutral leases' (with carbon credits allocated in proportion to emission volumes of leased in proportion to emission volumes of leased assets) and leasing of environment-friendly assets) and leasing of environment-friendly and energy-saving equipment. and energy-saving equipment.\nLikewise, by trading used machinery and Likewise, by trading used machinery and semiconductor- manufacturing equipment, semiconductor- manufacturing equipment, Sumitomo Mitsui Finance & Leasing is Sumitomo Mitsui Finance & Leasing is supporting more efficient capital investment supporting more efficient capital investment by its customers, while itself evolving into a by its customers, while itself evolving into a recycling-oriented, environment-friendly recycling-oriented, environment-friendly company. company.", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "Corporate Outline (as of September 30, 2011)\nCompany Name\nBusiness Description\nEstablished\nHead Office\nChairman of the Board\nPresident\nCapital\nStock Exchange Listings\nSumitomo Mitsui Financial Group, Inc. ::\nManagement of banking subsidiaries (under the stipulations of Japan's Banking Act) and of non-bank subsidiaries, as well as the performance of ancillary functions :\nDecember 2, 2002 :\n1-2, Marunouchi 1-chome, Chiyoda-ku, Tokyo, Japan :\nMasayuki Oku :\nKoichi Miyata (Concurrent Director at Sumitomo Mitsui Banking Corporation) :\n¥2,337.8 billion :\nTokyo Stock Exchange (First Section) :\nOsaka Securities Exchange (First Section) Nagoya Stock Exchange (First Section) Note: American Depositary Receipts (ADRs) are listed on the New York Stock Exchange.", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_SMFG_2011.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_CHK_2010.pdf", + "query": "Does Chesapeake Energy have a project to reduce excessive water use?", + "target_page": 28, + "target_passage": "Created to meet the challenge of reducing our water usage, Chesapeake’s Aqua Renew® program uses state-of-the-art technology to recycle pro- duced water.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Aqua Renew ®\nCreated to meet the challenge of reducing our water usage, Chesapeake's Aqua Renew ® program uses state-of-the-art technology to recycle pro-\nduced water. Since the company's preliminary reclamation project in\n2006, our focus on water reuse and conservation has become a companywide endeavor, stretching from the Barnett Shale of North Texas to the Marcellus Shale of northern Pennsylvania.\nThe Aqua Renew program has yet to find a limit to how much recycled water could be used without compromising well production. In fact, our Marcellus Shale operations are treating and recycling virtually 100% of produced water (more than 10 million gallons per month) for reuse in our hydraulic fracturing operations. Properly conducted modern fracking is a highly engineered, controlled, sophisticated and safe procedure.\nWith such large volumes of recycled water, the company is seeing more than just environmental advantages. We estimate that this\nGreen operations - Chesapeake's Best Management Practices ensure our operations are as environmentally friendly as possible, while protecting our employees, neighbors and the areas where we operate.\nprocess is saving the company an average of $12 million per year in the Marcellus Shale alone.", + "page_start": 27, + "page_end": 28, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "Environmentally Friendly Operations\nAt Chesapeake, we realize that the way a great product is produced is as important as the product itself. For example, we have helped pioneer the use of multiwell padsites to drill up to 16 wells from a single location, greatly reducing our land and road use and overall environmental footprint. We use the latest horizontal and directional drilling technology to place wells at a safe distance from homes, schools and businesses. In addition, we build and maintain access roads and work to eliminate soil erosion near our sites, as well as restore local vegetation.\nWe implement advanced, modern protective measures known as Best Management Practices (BMPs) to help ensure energy development is conducted in an environmentally responsible manner. Procedures are implemented throughout our operations to protect freshwater aquifers and reduce environmental impacts. BMPs protect wildlife, air quality, water and landscapes as we work to develop vitally needed domestic energy sources.\nImplemented throughout the entire life cycle of a well, BMPs can be as simple as strategically placing a berm, or land barrier, on locations to control surface water runoff. Others involve cutting-edge operational technologies such as utilizing the most advanced techniques offered in drilling fluids, well casing and cement design. Regardless of complexity, all BMPs are based on the idea that the environmental footprint of\nenergy development should be as small and temporary as possible. These practices are continually evolving and further improving as Chesapeake and the industry develop new innovative techniques and approaches to business.\nIn addition to our BMPs, Chesapeake has also initiated several innovative internal programs focused on water recycling and greener hydraulic fracturing processes.", + "page_start": 27, + "page_end": 27, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "Chesapeake Energy Corporation is the second-largest producer of natural gas, a Top 15 producer of oil and natural gas liquids and the most active driller of new wells in the U.S.\nHeadquartered in Oklahoma City, the company's operations are focused on discovering and developing unconventional natural gas and oil fields onshore in the U.S. Chesapeake owns leading positions in the Barnett, Haynesville, Bossier, Marcellus and Pearsall natural gas shale plays and in the Granite Wash, Cleveland, Tonkawa, Mississippian, Bone Spring, Avalon, Wolfcamp, Wolfberry, Eagle Ford,", + "page_start": 1, + "page_end": 1, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "AMERICA'S PREMIER ENERGY RESOURCE BASE »\nChesapeake is the second-largest producer of U.S. natural gas and a Top 15 producer of U.S. oil and natural gas liquids. The company has built a large resource base of high-quality U.S. assets in the Barnett, Haynesville, Bossier, Marcellus and Pearsall natural gas shale plays and in the Granite Wash, Cleveland, Tonkawa, Mississippian, Bone Spring, Avalon, Wolfcamp, Wolfberry, Eagle Ford, Niobrara and Utica unconventional liquids plays. In 2010 Chesapeake increased its focus on applying the geoscientific and horizontal drilling expertise gained from developing unconventional natural gas shale plays to unconventional liquids-rich plays. Our goal is to reach a balanced mix of natural gas and liquids revenue as quickly as possible through organic drilling. We invested approximately $4.7 billion in 2010, net of divestitures, primarily in liquids-rich acreage to provide the foundation for this shift toward more profitable plays.\nWe own interests in approximately 46,000 producing natural gas and oil wells, and in 2010 we produced approximately 1.035 trillion cubic feet of natural gas equivalent (tcfe) for an average of 2.8 billion cubic feet of natural gas equivalent (bcfe) per day. At year-end 2010, our proved reserves were 17.1 trillion cubic feet of natural gas equivalent, of which 90% were natural gas and all were onshore in the U.S. We have also captured an inventory of up to 115,000 unrisked net future drilling opportunities - almost 50 years worth of drilling opportunities - on approximately 13.2 million net leasehold acres in the U.S. The following highlights Chesapeake's ownership position in our key operating areas.\nUnconcerned by a Chesapeake drilling rig, antelope continue their daily routines in southeastern Wyoming's Powder River Basin where the company is developing the promising Niobrara Play.\n17\n| OPERATING AREAS", + "page_start": 17, + "page_end": 19, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "LIQUIDS-RICH AREAS\nPermian Basin Chesapeake has built a strong position of approx imately 1.2 million net leasehold acres in the Permian Basin including 560,000 net leasehold acres in the Bone Spring, Avalon, Wolfcamp and Wolfberry unconventional liquids plays. This area has the potential to deliver significant upside as we move toward increasing our oil production substantially in the years ahead. We have developed multiple new horizontal oil projects in this area, where we plan to utilize an average of approximately eight operated rigs in 2011 to further develop our leasehold in the Permian and Delaware basins and estimate we could drill up to 4,400 net wells. 7\nRockies Chesapeake is the second-largest leasehold owner in the Niobrara Shale, Frontier and Codell plays in the Powder River and Denver Julesburg (DJ) basins of Wyoming and Colorado. In February 2011, Chesapeake completed a $1.3 billion joint venture agreement with CNOOC, whereby CNOOC acquired a 33.3% interest in Chesapeake's approximately 800,000 net leasehold acres in the Powder River and DJ basins. CNOOC paid Chesapeake approximately $570 million in cash at closing and will pay an additional $697 million in carries by funding 66.7% of Chesapeake's 8\nNote: Figures do not add to company totals.\n* Compared to last year\n** % of company total\n*** Bossier Shale acreage overlaps with Haynesville Shale acreage\nNM Not meaningful\nshare of drilling and completion expenditures, which Chesapeake expects to occur by year-end 2014. We plan to utilize an average of approximately 11 rigs in 2011 to develop our current 535,000 net leasehold acres with our partner and estimate that we could drill up to 7,600 net wells.", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "What advantages does CHK's unique vertical integration strategy provide?\nChesapeake has built a large inventory of low-risk natural gas and liquids-rich plays that we plan to develop aggressively over the next two decades. As a result, we know that our company will consistently utilize a tremendous (and growing) amount of oilfield services for this resource development. This high level of planned drilling activity will create value for the provider of oilfield services, and Chesapeake's strategy is to capture a portion of this value for our shareholders rather than transfer it to third-party vendors whose interests and investments are not always aligned with ours. To date, Chesapeake has invested in drilling rigs, rental tools, water management equipment, trucking, compression equipment, midstream services, and most recently pressure pumping and fracture stimulation equipment. Chesapeake's activities require a high level of planning and project coordination that is best accomplished through vertical integration and ownership of the oilfield services we utilize. This approach creates a multitude of cost savings, an alignment of interests, operational synergies, greater capacity of equipment, increased safety and better coordinated logistics. In addition, Chesapeake's control of a large portion of the oilfield service equipment it utilizes provides a unique advantage to control the timing of leasehold development. Simply put, faster development of resources maximizes the present value of leasehold. This has been a key advantage for\nChesapeake over the past three years as the company has monetized leasehold investments at premium values through our joint ventures.", + "page_start": 22, + "page_end": 22, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "It is often said that the energy industry has an aging work force that is fast approaching retirement age. How is Chesapeake addressing this?\nIt is no secret that there is a shortage of experienced professionals in the natural gas and oil industry. The industry down turn of the 1980s and 1990s discouraged many from pursuing energy careers. In the following decades, strong competition from other industries lured away many of the best and brightest science and technology graduates, and today many experienced professionals who stayed in the industry through the downturn are approaching retirement age. As a result, one of our industry's greatest challenges over the past 10 years has been to develop a new generation of natural gas and oil professionals who have the knowledge and experience required to meet the nation's growing energy needs.\nIn 2000 Chesapeake was one of the first companies to recognize this trend and to understand how recruiting and training a new generation of energy professionals would impact the company's future success and its ability to compete in the industry. At that time, Chesapeake formulated a business strategy to address future staffing needs and decided to create a world-class college recruiting and intern program to recruit the most promising industry talent. Today, Chesapeake hosts more than 150 interns every summer in its internship program, many of whom go on to become full-time Chesapeake employees upon graduation. In addition, we have 350 students who receive\nMartha Burger\nSenior Vice President Human and Corporate Resources\nscholarships through Chesapeake programs, and our staff of college recruiters has developed strong relationships with professors, department heads and career counselors at the more than 31 universities where we actively recruit.\nAs a result of these efforts, young professionals in a wide range of disciplines, from scientists and engineers to land management and legal specialists, are being groomed to take over the reins as they learn the business through mentoring, extensive training, development opportunities and challenging work assignments. They are generously rewarded with excellent compensation and benefits, as well as an industry-leading working environment that encourages camaraderie and teamwork. The success of Chesapeake's strategy is apparent: the average age of the company's geoscience, land and engineering departments has dropped from 49 in 2000 to 36 today. In addition, the average age of the company's 4,000 Oklahoma City headquarters employees is 33. Even as some of Chesapeake's employees retire, the company is well equipped with a seasoned work force that is prepared to support and lead the way in Chesapeake's continued growth.\nJeff Fisher Senior Vice President - Production\n2010 ANNUAL REPORT |\n21", + "page_start": 21, + "page_end": 22, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "What innovations and advancements have led to CHK's ability to produce liquids from shales and other tight reservoirs?\nDuring the past five years, Chesapeake and a few other leaders in the independent E&P industry have developed expertise in exploiting shales and other tight reservoir formations targeting natural gas through the combination of horizontal drilling and advanced fracture stimulation techniques. This has allowed the commercialization of plays that were previously uneconomic, most notably in shale formations. Part of our success in producing liquids from tight reservoirs has come from the company's ability to extend the technological advances gained in the development of tight natural gas formations to new formations known to contain substantial liquids. This led to our first liquids-rich play discovery in the Colony Granite Wash in 2007. As we have increased our focus on liquids-rich plays, we have benefited from a growing understanding and mapping of petrophysical properties in unconventional formations as well as an enhanced understanding of the geochemical nature of liquids-rich reservoirs. This has allowed Chesapeake to better identify formations most likely to generate liquids-rich production, including more than a dozen new plays for the company. We have subsequently improved the success of our liquids-rich plays through the use of optimal wellbore lateral lengths, better placement of well laterals though advanced wellbore steering techniques and customized fracture stimulation designs for liquids-rich plays that allow the company to achieve a greater stimulated rock volume in low permeability reservoirs. Finally, the advancements Chesapeake has made in developing liquids-rich plays have\nExecutive Vice President Chief Operating Officer\nbeen made possible through the use of our proprietary Reservoir Technology Center that has become the industry's most advanced shale core laboratory.", + "page_start": 21, + "page_end": 21, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "J. Mike Stice\nSenior Vice President - Natural Gas Projects and Chief Executive Officer Chesapeake Midstream Partners, L.P.", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "LIQUIDS-RICH AREAS\nAnadarko Basin The Anadarko Basin is home to four of Chesapeake's liquids-rich plays, which we anticipate will become significant contributors to our growth in the years ahead. Chesapeake was one of the first to utilize modern horizontal drilling methods and has assembled an unrivaled leasehold position in numerous horizontal liquids-rich plays in the basin. Chesapeake will continue drilling with a focus on the Granite Wash, where rates of return are the highest in our company, and with an increasing focus on the Cleveland, Tonkawa and Mississippian liquids-rich unconventional plays. We estimate we could drill up to 11,400 net wells on our Anadarko Basin acreage in the future and plan to utilize an average of 31 operated rigs in 2011 to further develop our current 1.7 million net leasehold acres. 5\n2010 ANNUAL REPORT |\n18\nEagle Ford Shale As part of a growing emphasis on increasing oil and natural gas liquids production, Chesapeake has built the industry's second-largest leasehold position in the Eagle Ford Shale play in South Texas. In 2010 Chesapeake increased its leasehold from 80,000 net acres at the beginning of the year to more than 600,000 net acres. In November 2010, Chesapeake completed a $2.2 billion Eagle Ford Shale joint venture agreement with Beijing-based CNOOC Limited (NYSE:CEO), whereby CNOOC acquired a 33.3% interest in 600,000 net leasehold acres in the Eagle Ford Shale. CNOOC paid Chesapeake approximately $1.12 billion in cash at closing and will pay 75% of Chesapeake's share of drilling and completion expenditures until the $1.08 billion carry obligation has been funded, which Chesapeake expects to occur by year-end 2012. Our focus has been in the wet gas and oil prone portions of the play. We estimate we could drill up to 5,500 net wells on our Eagle Ford acreage and plan to utilize an average of 23 operated rigs in 2011 to further develop our leasehold position in the Eagle Ford Shale. In addition, we believe that the Pearsall Shale should be prospective for natural gas underneath approximately 75% of our Eagle Ford leasehold. 6", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_CHK_2010.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_CHK_2010.pdf", + "query": "Has the CEO of Chesapeake Energy met with the US President about America's energy production?", + "target_page": 16, + "target_passage": "I am pleased to report that we have apparently finally convinced President Barack Obama and Congressional leadership to recognize that the energy path America is on today is completely unsustainable.", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "Recent Events and a Better Way Forward\nThe good news, however, is that America can now secure a new energy future thanks to Chesapeake and a handful of other leading U.S. E&P companies that have reinvented the process of finding natural gas and oil during the past five years. In doing so, we have discovered twice the resources of natural gas in the U.S. that Saudi Arabia possesses in oil. Furthermore, these same few companies that led the unconventional natural gas revolution have in just the past two years also reinvented the way in which we can find large new oil resources onshore in the U.S. In fact, I believe the U.S. can possibly increase its production of oil from the current 5.8 million barrels per day by 30-50% during the next 5-10 years, thereby potentially reaching the President's 2025 goal of reducing foreign oil imports by 33%, 5-10 years earlier than hoped.\n2010 ANNUAL REPORT |\n15\nThe combination of these vast new discoveries of unconventional natural gas and liquids provides America with a unique future pathway toward greater energy independence, an industrial renaissance, economic rejuvenation and greater national security. I remain fully confident that the marketplace understands this and that over time the U.S. will more fully embrace and utilize clean, affordable, abundant American natural gas and increased domestic oil production as the best alternatives to burning environmentally challenged coal and expensive and dangerous foreign oil.\nThere is now a clear road ahead toward a more sustainable, affordable, dynamic and independent future if America embraces the remarkable gift of energy abundance that Chesapeake has helped discover in the U.S. You have my commitment, and the commitment of more than\nThe combination of these vast new discoveries of unconventional natural gas and liquids provides America with a unique future pathway toward greater energy independence, an industrial renaissance, economic rejuvenation and greater national security.\n10,000 other Chesapeake employees, that every day we are working hard to create shareholder value and a better future for our communities, our states and our country through the continued discovery and development of unconventional natural gas and liquids.\nBest regards,\nAubrey K. McClendon\nChairman and Chief Executive Officer April 15, 2011\n16\n| OPERATING AREAS", + "page_start": 16, + "page_end": 17, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "Aubrey K. McClendon\nChairman of the Board and Chief Executive Officer Chesapeake Energy Corporation Oklahoma City, Oklahoma", + "page_start": 29, + "page_end": 29, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "Recent Events and a Better Way Forward\nYou may be aware that I have been outspoken in attempting to persuade our country's political leadership to recognize that the discovery of vast resources of unconventional natural gas and oil in the U.S. is a complete game changer for our country from an economic, national security and environmental perspective. After two years of my best efforts and the efforts of many others in the industry, most notably T. Boone Pickens,\n2010 ANNUAL REPORT |\n13\nDeveloping great assets begins with great people, such as the hardworking crews of Nomac, Chesapeake's wholly owned drilling subsidiary. Employees take pride in the critical roles they play in finding and delivering natural gas to their fellow Americans.\nRig lights come on at twilight in the Permian Basin of Texas, where crews drill around the clock in the liquids-rich Bone Spring play. This is the newest in a series of energy booms that has enabled West Texas cities like Midland to prosper for almost 100 years.\nI am pleased to report that we have apparently finally convinced President Barack Obama and Congressional leadership to recognize that the energy path America is on today is completely unsustainable. There appears to be growing recognition that it is spectacularly dangerous for America to continue importing 9 million barrels of oil per day and exporting\nmore than $1 billion per day in national wealth to oil exporting countries.\nAmerica's undiminished appetite for foreign oil has created the largest wealth transfer in the history of the world. The political leadership in Washington, D.C., has not seemed overly concerned about this issue until recently. However, after President Obama's recent speech calling", + "page_start": 13, + "page_end": 15, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "Chesapeake Energy Corporation is the second-largest producer of natural gas, a Top 15 producer of oil and natural gas liquids and the most active driller of new wells in the U.S.\nHeadquartered in Oklahoma City, the company's operations are focused on discovering and developing unconventional natural gas and oil fields onshore in the U.S. Chesapeake owns leading positions in the Barnett, Haynesville, Bossier, Marcellus and Pearsall natural gas shale plays and in the Granite Wash, Cleveland, Tonkawa, Mississippian, Bone Spring, Avalon, Wolfcamp, Wolfberry, Eagle Ford,", + "page_start": 1, + "page_end": 1, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "AMERICA'S PREMIER ENERGY RESOURCE BASE »\nChesapeake is the second-largest producer of U.S. natural gas and a Top 15 producer of U.S. oil and natural gas liquids. The company has built a large resource base of high-quality U.S. assets in the Barnett, Haynesville, Bossier, Marcellus and Pearsall natural gas shale plays and in the Granite Wash, Cleveland, Tonkawa, Mississippian, Bone Spring, Avalon, Wolfcamp, Wolfberry, Eagle Ford, Niobrara and Utica unconventional liquids plays. In 2010 Chesapeake increased its focus on applying the geoscientific and horizontal drilling expertise gained from developing unconventional natural gas shale plays to unconventional liquids-rich plays. Our goal is to reach a balanced mix of natural gas and liquids revenue as quickly as possible through organic drilling. We invested approximately $4.7 billion in 2010, net of divestitures, primarily in liquids-rich acreage to provide the foundation for this shift toward more profitable plays.\nWe own interests in approximately 46,000 producing natural gas and oil wells, and in 2010 we produced approximately 1.035 trillion cubic feet of natural gas equivalent (tcfe) for an average of 2.8 billion cubic feet of natural gas equivalent (bcfe) per day. At year-end 2010, our proved reserves were 17.1 trillion cubic feet of natural gas equivalent, of which 90% were natural gas and all were onshore in the U.S. We have also captured an inventory of up to 115,000 unrisked net future drilling opportunities - almost 50 years worth of drilling opportunities - on approximately 13.2 million net leasehold acres in the U.S. The following highlights Chesapeake's ownership position in our key operating areas.\nUnconcerned by a Chesapeake drilling rig, antelope continue their daily routines in southeastern Wyoming's Powder River Basin where the company is developing the promising Niobrara Play.\n17\n| OPERATING AREAS", + "page_start": 17, + "page_end": 19, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "Will U.S. natural gas prices reconnect with world natural gas prices?\ncurrent price disparity between natural gas and oil will increasingly lead to greater use of natural gas in the U.S. transportation system. Whether it be compressed natural gas (CNG) for medium and light-duty vehicles, LNG for heavy-duty vehicles or the commercialization of gas-to-liquids (GTL) natural gas refineries that supplement the U.S. liquid fuel supply stream, we believe that the marketplace will increasingly utilize and embrace natural gas. Chesapeake is working with industry, public policymakers and potential partners on each of these demand reinvention opportunities. Natural gas is clean, affordable, abundant and American. Why shouldn't it trade at a BTU premium in the years ahead?\nNick Dell'Osso\nExecutive Vice President and Chief Financial Officer", + "page_start": 22, + "page_end": 22, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "J. Mike Stice\nSenior Vice President - Natural Gas Projects and Chief Executive Officer Chesapeake Midstream Partners, L.P.", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "It is often said that the energy industry has an aging work force that is fast approaching retirement age. How is Chesapeake addressing this?\nIt is no secret that there is a shortage of experienced professionals in the natural gas and oil industry. The industry down turn of the 1980s and 1990s discouraged many from pursuing energy careers. In the following decades, strong competition from other industries lured away many of the best and brightest science and technology graduates, and today many experienced professionals who stayed in the industry through the downturn are approaching retirement age. As a result, one of our industry's greatest challenges over the past 10 years has been to develop a new generation of natural gas and oil professionals who have the knowledge and experience required to meet the nation's growing energy needs.\nIn 2000 Chesapeake was one of the first companies to recognize this trend and to understand how recruiting and training a new generation of energy professionals would impact the company's future success and its ability to compete in the industry. At that time, Chesapeake formulated a business strategy to address future staffing needs and decided to create a world-class college recruiting and intern program to recruit the most promising industry talent. Today, Chesapeake hosts more than 150 interns every summer in its internship program, many of whom go on to become full-time Chesapeake employees upon graduation. In addition, we have 350 students who receive\nMartha Burger\nSenior Vice President Human and Corporate Resources\nscholarships through Chesapeake programs, and our staff of college recruiters has developed strong relationships with professors, department heads and career counselors at the more than 31 universities where we actively recruit.\nAs a result of these efforts, young professionals in a wide range of disciplines, from scientists and engineers to land management and legal specialists, are being groomed to take over the reins as they learn the business through mentoring, extensive training, development opportunities and challenging work assignments. They are generously rewarded with excellent compensation and benefits, as well as an industry-leading working environment that encourages camaraderie and teamwork. The success of Chesapeake's strategy is apparent: the average age of the company's geoscience, land and engineering departments has dropped from 49 in 2000 to 36 today. In addition, the average age of the company's 4,000 Oklahoma City headquarters employees is 33. Even as some of Chesapeake's employees retire, the company is well equipped with a seasoned work force that is prepared to support and lead the way in Chesapeake's continued growth.\nJeff Fisher Senior Vice President - Production\n2010 ANNUAL REPORT |\n21", + "page_start": 21, + "page_end": 22, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "Common Stock\nChesapeake Energy Corporation's common stock is listed on the New York Stock Exchange (NYSE) under the symbol CHK. As of March 31, 2011, there were approximately 415,000 beneficial owners of our common stock.", + "page_start": 46, + "page_end": 46, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "Great Assets = A Great Future\nThe very significant upward trajectory of value creation that Chesapeake is on today is primarily driven by the quality of our assets, which feature dominant positions in 16 of the 20 most important major unconventional natural gas and liquids plays in the U.S. - the Barnett, Haynesville, Bossier, Marcellus, Eagle Ford, Pearsall, Niobrara and Utica shales and the Granite Wash, Cleveland, Tonkawa, Mississippian, Bone Spring, Avalon, Wolfcamp and Wolfberry tight sands and fractured carbonates. Having only missed the Bakken Shale play in the Williston Basin, having passed on the Cana Shale play in Oklahoma and having sold out of the Woodford and Fayetteville shale plays in Oklahoma and Arkansas (for overall value creation of $5.4 billion), Chesapeake's unrivaled position in the 16 other major U.S. unconventional plays is remarkable and unprecedented and should form the foundation of further substantial value creation for Chesapeake's shareholders for decades to come.\nThe gathering of these assets has been hard work for our employees and management team, and during 2010 it stretched our balance sheet and tested the patience of some of our shareholders. What is\nThe knowledge and experience Chesapeake gained in the Barnett Shale, the granddaddy of all U.S. shale plays, has been instrumental in the company's successful development of all subsequent unconventional natural gas and liquids plays.\nclear now, however, is that we have created a tremendous storehouse of value and an abundance of opportunities for bountiful harvests for years to come for our shareholders.\nGiven the importance of these 16 unconventional plays, I have provided below a brief summary of our position in each of them:\nBarnett Shale - Discovered in the 1990s, the Barnett is the granddaddy of all U.S. shale plays. Chesapeake acquired its first assets in the Barnett in 2001, and in 2005 we began aggressively leasing in the core of the play in Johnson and Tarrant counties. Today we own approximately 220,000 net leasehold acres, on which we estimate we could drill up to 2,300 future net wells in addition to our 965 net wells currently producing. We are currently using 18 rigs to develop this inventory of drillsites and our gross operated production in the Barnett recently set a record of more than 1.3 bcfe per day.", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_CHK_2010.pdf" + } + ] + } + ] +] \ No newline at end of file